Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 6, Issue 8 - Dec 2002
Volume 6, Issue 7 - Nov 2002
Volume 6, Issue 6 - Oct 2002
Volume 6, Issue 5 - Aug 2002
Volume 6, Issue 4 - Jun 2002
Volume 6, Issue 3 - May 2002
Volume 6, Issue 2 - Apr 2002
Volume 6, Issue 1 - Feb 2002
Selecting the target year
Development of Database Supported Graph Library and Graph Algorithms
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 653~660
This paper proposes a method for storing graphs and defining graph algorithms based on the well-developed relational database. In this method, graphs are represented in the form of relations. Each vertex and edge of a graph is represented as tuples of the table and saved in a database. We developed a library of graph operations for the storage and management of graphs and the development of graph applications. Furthermore, we defined graph algorithms in terms of relational algebraic operations such as projection, selection, and join. They can be implemented with the database language such as SQL. This database approach provides an efficient methodology to deal with very large-scale graphs and to support the development of graph applications.
A HELPDESK system design for communication network service
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 661~666
We need the flexible method for communication network configuration and fault management business procedure. Therefore development of systematic integrating fault management system is essential to meet on these requests. We must design the integrating fault management system so that can run the repair processing for both data communication network management and new next generation data communication network of various type. In general it is effective that the system is consisted of decentralized module to be accessibele for business logic and datum to remote area. To Solve these problem, a method is to use object-oriented design technique. That is, it is to abstract reusability objects and make component module using the abstracted objects. In this paper, we propose a fault management system of communication network service using object-oriented design techniques which are UML(Unified Modeling Language) and EJB(Enterprise Java Bean).
Nonlinear Active Noise Control with On-Line Secondary Path Modeling
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 667~675
In this Paper, we present a new nonlinear active noise control scheme using neural networks. Two neural network4 are used, one is for the active controller and another one is for the secondary path model. This scheme is suitable for the plant which has time-varing secondary path dynamics, because the secondary path modeling is performed via on-line fashion. Simulation results of active noise control with nonlinear primary/secondary path are presented. The results show that the new algorithm can reduce the noise level greatly.
Implementation of bluetooth LAN Access Point for the wireless Local access
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 676~683
In this paper, LAN Access Point is realized by making out bluetooth protocol stack in Linux Kernel, porting Linux in an embeded system employed bluetooth module. Hardware for a general-purpose embeded system is designed and Linux Kernel is ported after deploying Bluetooth Module. Also, Boot loader for system booting and management is composed, and Kernel is modified to meet with the system. Finally, Ethernet devise driver is made out, and bluetooth protocol Stack and Lan Access Point are realized. The possibility of TCP/IP communication through LAN Access Point to PC employed Bluetooth module, which is considered as client, is evaluated. From the evaluation results, we can see that the performance in Telnet FTP, Web browsing through Bluetooth LAN Access Point is satisfactory.
A study of Intrusion Detection System applying for association rule agent
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 684~688
One of the Problems, which the Intrusion Detection System has, is a False Positive. This False make to low condition of the Intrusion Detection System. The cause of the False Positive is that the learning is not enough during audit data learning steps. Therefore, in this paper, 1 propose the method of the Intrusion Detection System that be learnt audit data to agent with association rule.
A Study on the Characteristics change of WSix Thin Films by S/H Life Time
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 689~695
Film compositions are needed in semiconductor manufacturing for such diverse application as production tool qualifications and process development. Surface and interface information is generally provided with Auger electron spectroscopy(AES). In this paper, WSix films were analyzed for structural, electrical, and compositional properties of tungsten silicide thin films produced by low pressure chemical vapor deposition as a function of temperature, DCS post flow, shower head life time, and the silicon to tungsten ratios have been investigated. We find that Si/W composition ratio is increased in the surface and interface of WSix thin films by the DCS post flow process and increasing deposition temperature, respectively. The results obtained in this study are also applicable to process control of WSix deposition for memory device fabrication.
Electrical Characteristics of BST Thin Films with Various Film Thickness
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 696~702
(50/50) thin film has been grown by RF magnetron reactive sputtering and its characteristics such as crystallization, surface roughness, and electrical properties have been investigated with varying the film thickness. The crystallization and surface roughness of BST thin film are investigated by using XRD and AFM, respectively. The BST thin film annealed at
for 2 min has pure perovskite structure and good surface roughness of 16.1
. As the film thickness increases from 80 nm to 240 nm, the dielectric constant at 10 KHz increases from 199 to 265 and the leakage current density at 250 ㎸/cm decreases from
. In the case of 240 nm-thick BST thin film, the charge storage density and leakage current density at 5V are 50.5 fC/
, respectively. The values indicate that the BST thin film is a very useful dielectric material for the DRAM capacitor.
Implementation of a Shared Buffer ATM Switch Embedded Scalable Pipelined Buffer Memory
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 703~717
This paper illustrates the implementation of a scalable shared buffer asynchronous transfer mode (ATM) switch. The designed shared buffer ATM switch has a shared buffet of a pipelined memory which has the access time of 4 ns. The high-speed buffer access time supports a possibility of the implementation of a shared buffer ATM switch which has a large switching capacity. The designed switch architecture provides flexible switching performance and port size scalability with the independence of queue address control from buffer memory control. The switch size and the buffer size of the designed ATM switch can be reconfigured without serious circuit redesign. The designed prototype chip has a shared buffer of 128-cell and 4
4 switch size. It is integrated in 0.6um, double-metal, and single-poly CMOS technology. It has 80MHz operating frequency and supports 640Mbps per port.
The clone of Moore machine using hardware genetic algorithm
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 718~723
This paper proposes a new type of evolvable hardware for implementing the clone of Moore State machine. The proposed Evolvable Hardware is employed efficient pipeline parallelization, handshaking mechanism and fitness function in FPGA. Genetic Algorithm(GA) has known as a method of solving NP problem in various applications. Since a major drawback of the GA is that it needs a long computation time, the hardware implementation of Genetic Algorithm is focused on in recent studies. Conventional hardware GA uses the fixed length of chromosome but the proposed Evolvable Hardware uses the variable length of chromosome by the efficient 16 bit Pipeline Unit. Experimental results show that the proposed evolvable hardware is applicable to the implementation of the clone for Moore State machine.
A Study on the Design of Linear Power Amplifier at Digital Control System
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 724~730
Digital communication systems are required to cause the minimum interference to adjacent channels, they must therefore employ the linear power amplifiers. In respect to linear power amplifiers, there are many linearization techniques. Feedforward power amplifier represent very wide bandwidth and high linearization capability. In the feedforward systems, overall efficiency is reduced due to the loss of delay line. In this paper, delay filter instead of transmission delay line adapted to get more high efficiency. Experimental results showed that ACLR (Adjacent Channel Leakage Ratio) has improved 17.43(dB), which is added 3.44(dB) by using the delay filter.
Analysis of Medium Voltage Power-Line Channel Characteristics Considering the Skin Effect
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 731~738
In this paper, we analyzed a medium voltage power line characteristics considering the skin effect for high speed data transmission. Medium power-line characteristics impedance was obtained by the S-parameter method which is used in high frequency band. Power line channel characteristics was measured using it designed coupler, it is a wide band coupler between medium powe-line and measurement system. Attenuation characteristics along the frequency was decreased linearly when skin effect was considered but attenuation characteristics along the frequency was decreased linearly when skin effect was not considered. Impedance was showed lower and lower in proportional to frequency, and variation was decreased in proportional to frequency.
Visual Telephone System of Differential Task Interrupt Method
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 739~746
In this paper, a new visual telephone system which has a differential task interrupt transfer feature for real time video phone service is presented. Owing to the result of Interrupt transfer of different speed according to the time critical degree of tasks, the flow of audio and video data stream can be kept as constant speed in other word that means video phone services are carried out in real time. The ITU-T H.32x visual telephone recommendations are first analyzed, and the unsatisfactory items of existing systems are second inquired the cause, such as performance, quality. And then the design concept and ideas which enable it to solve them are third devised, the next, the new architecture of visual telephone system for real time video phone source are designed, which make it possible to solve the existing problems by means of different tasks interrupt transfer method.
Development of a Solid Modeler for Web-based Collaborative CAD System
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 747~754
We propose a Web-based collaborative CAD system which is independent from any platforms, and develop a 3D solid modeler in the system. We developed a new prototype of 3D solid modeler based on the web using Java 3D API, which could be executed without any 3D graphics software and worked collaboratively interacting with each user. The modeler can create primitive objects and get various 3D objects by using loader. The interactive control is available to manipulate-objects such as picking, translating, rotating, zooming. Users connect to this solid modeler and they can create 3D objects and modify them as they want. When this solid modeler is imported to collaborative design system, it will be proved its real worth in today's CAD system. Moreover, if we improve this solid modeler adding to the 3D graphic features such as rendering and animation, it will be able to support more detail design and effect view.
WEBIO Libraries for C and Prolog Languages
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 755~761
Before the Internet was available, most application programs were executed using terminals, connected to host computers, as standard input output devices. The Internet is popular today and many services are provided on web browsers connected to the Internet. Since the standard I/O method used for terminals is different from the communication I/O methods used for web browsers, it is not possible to execute many application programs developed for the conventional terminals on web browsers. In this paper, we describe Web Input Output(WEBIO) library that enables application programs conventional on terminals to be executed on web browsers by recompilation without source modification. The WEBIO libraries for C and Prolog languages have been developed and they are under test now.
Credit Card and On-line Financial Business Method Using on Wireless Terminal
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 762~767
In this paper, We suggest Credit Card and On-line Financial Business Method Using on Wireless Terminal. First, wireless mobile terminal of credit card member is received suity code from dealing verification system of credit card company. Second, a credit card member give security code to member store. Third, the security code is compared with security code of the member in dealing verification system of credit card company.
A Study on Role-Based Access Control Modeling in Public Key Infrastructure
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 768~776
According as practical use of server system is generalized in multimedia and internet environment, the security of all data that is stored to system is actuality that security mechanism of high level such as competence grant or access control is required. Also, standardization of informations that is stored in system in scattered environment protection technology of more complicated system by absence of done schema, non-systemicity etc. Therefore in this paper. General access control way explained basic modeling because enough investigate and analyze general access control way. And assigning role about each modules separating module of RBAC(Role-Based Access Control) modeling, existent access control modeling and RBAC modeling using mixing new access control modeling present.
A study on the implementation of identification system using facial multi-modal
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 777~782
This study will offer multimodal recognition instead of an existing monomodal bioinfomatics by using facial multi-feature to improve the accuracy of recognition and to consider the convenience of user . Each bioinfomatics vector can be found by the following ways. For a face, the feature is calculated by principal component analysis with wavelet multiresolution. For a lip, a filter is used to find out an equation to calculate the edges of the lips first. Then by using a thinning image and least square method, an equation factor can be drawn. A feature found out the facial parameter distance ratio. We've sorted backpropagation neural network and experimented with the inputs used above. Based on the experimental results we discuss the advantage and efficiency.
A study on the lip shape recognition algorithm using 3-D Model
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 783~788
Recently, research and developmental direction of communication system is concurrent adopting voice data and face image in speaking to provide more higher recognition rate then in the case of only voice data. Therefore, we present a method of lipreading in speech image sequence by using the 3-D facial shape model. The method use a feature information of the face image such as the opening-level of lip, the movement of jaw, and the projection height of lip. At first, we adjust the 3-D face model to speeching face Image sequence. Then, to get a feature information we compute variance quantity from adjusted 3-D shape model of image sequence and use the variance quality of the adjusted 3-D model as recognition parameters. We use the intensity inclination values which obtaining from the variance in 3-D feature points as the separation of recognition units from the sequential image. After then, we use discrete HMM algorithm at recognition process, depending on multiple observation sequence which considers the variance of 3-D feature point fully. As a result of recognition experiment with the 8 Korean vowels and 2 Korean consonants, we have about 80% of recognition rate for the plosives md vowels.
Image Segmentation Using Color Morphological Pyramids
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 5, 2002, Pages 789~795
Color image is formed of combination of three color channels. Therefore its architecture is very complicated and it requires complicated image Processing for effective image segmentation. In this paper. we propose architecture of universalized Color Morphological Pyramids(CMP) which is able to give effective image segmentation. Image Pyramid architecture is a successive Image sequence whose area ratio
after filtering and subsampling of input image. In this technique, noise removed by sequential filtering and resolution is degraded by downsampling using CMP in various color spaces. After that, new level images are constructed that apply formula using distance of neighbor vectors in close level images and segments its image. The feasibility of proposed method is examined by comparing with the results obtained from the existing method.