Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of the Korea institute of electronic communication sciences
Journal Basic Information
Journal DOI :
The Korea Institute of Electronic Communication Science
Editor in Chief :
Volume & Issues
Volume 5, Issue 6 - Dec 2010
Volume 5, Issue 5 - Oct 2010
Volume 5, Issue 4 - Aug 2010
Volume 5, Issue 3 - Jun 2010
Volume 5, Issue 2 - Apr 2010
Volume 5, Issue 1 - Feb 2010
Selecting the target year
TS-FVTD Techniques for Electromagnetic Field Computation by Dielectric Boundary with Rough Surface
Yoon, Kwang-Yeol ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 345~351
The finite volume time domain (FVTD) method gives accurate results for the calculation of electromagnetic wave propagation but it requires large amount of computer memory. In this paper we propose a modified FVTD that employs a time subdivision. The time-subdivided FVTD (TS-FVTD) method is enough to divide the space domain grid with a large step size. This method can reduce computation time and memory resources. We check the effectiveness of the proposed method in order to apply to the analysis of electromagnetic field from rough surface with dielectric waveguide.
The effects of a temporal masking on the sound laterlization
Lee, Chai-Bong ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 352~356
In this study, it is discussed how the directional property of the sound lateralization is influenced by proceeding or succeeding tone. The acoustic source applied here is a reference sound which has 0.5 msec interaural time difference(ITD). Based on this reference sound, interfering sounds with five levels of magnitude are applied to the subjects with four kinds of inter-stimuli time intervals(ISI). The interfering sounds are also added as two different types, proceeding tone and succeeding tone. Additionally, in order to investigate a frequency influence, the reference sound and the interfering sounds are generated by using 2kHz, 4 kHz and a white noise. As a result, the influence on lateralization by proceeding tone is lager than that by succeeding tone. It can consider this result as the effect of temporal masking on lateralization. Moreover, there are small differences of masking effect on lateralization by combinations of pure tone. This result shows that the dependency of frequency domain between reference sound and interfering sound is small on the sound lateralization.
Speech and Noise Recognition System by Neural Network
Choi, Jae-Sung ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 357~362
This paper proposes the speech and noise recognition system by using a neural network in order to detect the speech and noise sections at each frame. The proposed neural network consists of a layered neural network training by back-propagation algorithm. First, a power spectrum obtained by fast Fourier transform and linear predictive coefficients are used as the input to the neural network for each frame, then the neural network is trained using these power spectrum and linear predictive coefficients. Therefore, the proposed neural network can train using clean speech and noise. The performance of the proposed recognition system was evaluated based on the recognition rate using various speeches and white, printer, road, and car noises. In this experiment, the recognition rates were 92% or more for such speech and noise when training data and evaluation data were the different.
The Effect of FIR Filtering and Spectral Tilt on Speech Recognition with MFCC
Lee, Chang-Young ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 363~371
In an effort to enhance the quality of feature vector classification and thereby reduce the recognition error rate for the speaker-independent speech recognition, we study the effect of spectral tilt on the Fourier magnitude spectrum en route to the extraction of MFCC. The effect of FIR filtering on the speech signal on the speech recognition is also investigated in parallel. Evaluation of the proposed methods are performed by two independent ways of the Fisher discriminant objective function and speech recognition test by hidden Markov model with fuzzy vector quantization. From the experiments, the recognition error rate is found to show about 10% relative improvements over the conventional method by an appropriate choice of the tilt factor.
Fast Motion Estimation with Adaptive Search Range Adjustment using Motion Activities of Temporal and Spatial Neighbor Blocks
Lee, Sang-Hak ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 372~378
This paper propose the fast motion estimation algorithm with adaptive search range adjustment using motion activities of temporal and spatial neighbor blocks. The existing fast motion estimation algorithms with adaptive search range adjustment use the maximum motion vector of all blocks in the reference frame. So these algorithms may not control a optimum search range for slow moving block in current frame. The proposed algorithm use the maximum motion vector of neighbor blocks in the reference frame to control a optimum search range for slow moving block. So the proposed algorithm can reduce computation time for motion estimation. The experiment results show that the proposed algorithm can reduce the number of search points about 15% more than Simple Dynamic Search Range(SDSR) algorithm while maintaining almost the same bit-rate and motion estimation error.
A Study on the Relationship between MPEG-2 Continuous Count Error (CCE) and Quality of Experience (QoE) for IPTV Services
Kim, Beom-Joon ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 379~384
The service quality is one of the most important issue for successful deployment of IPTV services. Currently, a number of parameters have been reported that they have an effect on the quality of IPTV services. However, it is almost impossible to monitor and manage all the parameters in real time. Key parameters, therefore, should be chosen as a service metric for efficient quality management of IPTV services. For this purpose, we implement an environment for monitoring and measuring the quality of IPTV services and try to figure out the effect of each parameter on the quality of IPTV services. In particular, we focus on a parameter called continuous count error (CCE) measured at the level of MPEG transport stream (TS) and show that it has a greater effect on the quality of IPTV services than other parameters.
Analysis of key technologies related to VoIP security
Rha, Sung-Hun ; Shin, Hyun-Sik ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 385~390
VoIP Service is provided voice & image call using internetwork unlike traditional call. VoIP usage is becoming generalization & development. As a result, threats of security are steadily increasing. Regarding this situation, we will investigate the security problem of VoIP in various aspects. Also We will investigate main technology of security solution method for solve this problem.
The Efficient Computation of Node Position on Mobile Sensor Network
Park, Na-Yeon ; Son, Cheol-Su ; Kim, Won-Jung ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 391~398
Because mobile sensor network is different with the existing wireless sensor network with fixed nodes, it is more difficult to implement a positioning algorithm in mobile sensor network than in mobile sensor network. In case of fast moving node, a positioning algorithm may be not completed in a given time. In this paper we present the positioning algorithm that improves performance and can complete a computation in time on mobile sensor network.
A Study on real time Gaze Discimination Using Kalman Fillter
Jeong, You-Sun ; Hong, Sung-Soo ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 399~405
In this paper, the movement faces the problem of the difficult points upon the gaze of the user that corrective action is needed to solve the identification system offers a new perspective. Using the Kalman filter using the position information of the current head position estimated the future. In order to determine the authenticity of the face features of the face structural element information and the processing time is relatively fast horizontal and vertical histogram analysis method to detect the elements of the face. and people grow and infrared bright pupil effect obtained by constructing a real-time pupil detection, tracking and pupil - geulrinteu vectors are extracted.
A Development of Novel Attack Detection Methods using Virtual Honeynet
Kang, Dae-Kwon ; Euom, Ieck-Chae ; Kim, Chun-Suk ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 406~411
A honeynet is a closely monitored computing resource that we want to be probed, attacked or compromised. More precisely, a honeypot is "an information system resource whose value lies in unauthorized or illicit use of that resource The value of honeynet is weighed by the information that can be obtained from it. but It's very difficult to deploy Honeynet in Real World, So I focused on Virtual Honeynet. The strength of virtual honeynet is scalability and ease of maintenance. It is inexpensive to deploy and accessible to almost everyone. Compared with physical honeypots, this approach is more lightweight. Instead of deploying a physical computer system that acts as a honeypot, we can also deploy one physical computer that hosts several virtual machines that act as honeypots.
Analysis of nonlinear sequences based on shrinking generator
Choi, Un-Sook ; Cho, Sung-Jin ; Kim, Han-Doo ; An, Hyun-Joo ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 412~417
In this paper, we analyze the properties of nonlinear sequence generated by the shrinking generator. Also we propose a method for recovering the original sequence from intercepted bits by analyzing phase shifts of the output sequence using the properties of sequences generated from control register.
Analysis of Shrunken Sequences using LFSR and CA on GF(2
Choi, Un-Sook ; Cho, Sung-Jin ; Kim, Jin-Gyoung ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 418~424
Many researchers studied methods for the generation of maximum length pseudo random sequences. Sabater et al. analyzed shrunken sequences which are effectively generated by SG(Shrinking Generator) using CA(Cellular Automata). In this paper we propose a new SG which is called LCSG(LFSR and CA based Shrinking Generator) using an LFSR with control register and CA with generator register. The proposed shrunken sequences generated by LCSG have longer periods and high complexities than the shrunken sequences generated by the known method. And we analyze the generated sequences using LCSG.
A Study on the 3D-Puzzle Security Policy in Integrated Security System Network
Seo, Woo-Seok ; Jun, Moon-Seog ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 425~434
This study shows a limit to attacks that the prevention system, which is used as the mutual third aggressive packet path between open heterogeneous networks and applies prevention techniques according to the trace like IP tracking and attack methods, can prevent. Therefore, the study aims to learn information of constant attack routing protocol and of the path in network, the target of attack and build a database by encapsulating networks information routing protocol operates in order to prevent source attack paths. In addition, the study is conducted to divide network routing protocols developed from the process of dividing the various attack characters and prevent various attacks. This study is meaningful in that it analyzes attack path network and attacks of each routing protocol and secure exact mechanism for prevention by means of 3D-Puzzle, Path, and Cube of the integrated security system which is an implementation method of integrated information protection for access network defense.
Development of OPAMP in an A/D Converter for Pressure Measurement
Chai, Yong-Yoong ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 435~442
The efficiency of the car's wiper blade has a great contribution to the guarantee of security. To guarantee the wiper blade's ability of getting rid of dust sticking on the glass surface, the qualities of lubricant, durability, heat resistant, low temperature, ozone resistant, chemical resistant must be good as well as it being noiseless. Like this, in order to improve the wiper's skills, it is essential to have a system that is able to assess and analyse the properties of the wiper. In this paper, to create a system that measures the car's wiper pressure, an analog/digital converter (ADC) that receives signals generated from the pressure sensor and transmits it to a personal computer is proposed. The designed ADC is one of the pipeline ADCs that can obtain fast movement rate and also a structure that can optimize the entire system's area as well as the consumption of strength.
Object Oriented Fault Detection for Fault Models of Current Testing
Bae, Sung-Hwan ; Han, Jong-Kil ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 443~449
Current testing is an effective method which offers higher fault detection and diagnosis capabilities than voltage testing. Since current testing requires much longer testing time than voltage testing, it is important to note that a fault is untestable if the two nodes have same values at all times. In this paper, we present an object oriented fault detection scheme for various fault models using current testing. Experimental results for ISCAS benchmark circuits show the effectiveness of the proposed method in reducing the number of faults and its usefulness in various fault models.
The Study on the Adactive H-ARQ Technique in TD-CDMA 3G System
Suk, Kyung-Hyu ; Park, Sung-Ho ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 450~456
In the high-speed packet service, next generation mobile communication system has emerged as a major feature. If the fire of these high-speed kit services and non-continuous transmission of data due to the symmetrical nature of daeyiteo traffic for D-CDMA system has been actively studied. Small amounts of data moving in the uplink, but the real-time video downlink transmission, such as downloading large files to move data and services to those with asymmetric traffic characteristics, a system that can efficiently handle the data requirements be. Of 3GPP TDD(Time Division Duplex) scheme based on CDMA and TDMA in a way by introducing the concept through the proper allocation of time slots that can handle asymmetric traffic efficiently, has an advantage. TD-CDMA system by considering the characteristics of the frame configuration of transmission methods, such as physical channel structure and channel coding has been investigated. In addition, the HARQ scheme TD-CDMA system performance is analyzed by comparing them.
A Study on the Theoretical Approach of Purchase and Postpurchase Behavior in Real Estate Marketing
Lee, Eiy-Joung ; Cho, Kwang-Haeng ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 457~463
In this study I hope to answer the questions, "In real estate marketing, what are the steps on Purchase and Postpurchase Behavior in Real Estate Marketing?" The findings of this study can suggest the implications as follows. As the purchase decision making process of consumer in real estate marketing, purchase and postpurchase behavior are specifically proposed. They will contribute to the theoretical progress of understanding on consumer behavior in real estate. And this study enlarges general marketing to real estate marketing by analyzing specific purchase and postpurchase behavior in real estate.
About troubleshooting plan of real estate transaction research
Jung, Me-Ae ; Min, Guy-Sik ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 464~470
Real estate transactions and real estate in harmony with the hospital and the relationship between the human being requested would improve the trade process, according to the fire, rather than deal with the accident occurred is often the relationship is deteriorating. The practice of real estate transactions in Korea in connection with real estate transactions, the system is very difficult to receive assistance, real estate and related transactions as well as the right to review the essential detail and accurate analysis is bound to be limits to. Therefore, a real estate transaction due to the damage prevention and compensation system to complement, brokerage transaction activity in the current real estate brokerage system problems to overcome real estate transactions incident root cause of one of the intellectual is the realtor system improve the quality and professionalism propose to raise.
Development of Holonomic Drive Technology with Variable Manipulability
Lee, Ho-Hyoung ; Cho, Whang ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 471~479
A holonomic drive can provide rotational and translational acceleration simultaneously in any direction. For this reason the holonomic drive technology is very desirable in creating motion for any mobile platform and has many promising mobility applications in the field of robotics and automation where manipulability is critical issue especially when the mobile system is operated in obstacle prone environment. In this paper a pragmatic methodology for realizing a holonomic drive system using multiple servo-casters is presented. The steering and driving of each servo-caster is controlled such that they are coordinated with the motions of other servo-casters in order to realize holonomic motion. This paper also proposes algorithms for varying manipulability as operation situation demands.
The Development of Ecobot Robot for Friendly Environment Smart Home Appliance Application System
Moon, Yong-Seon ; Bae, Young-Chul ; Cha, Hyun-Rok ; Roh, Sang-Hyun ; Park, Jong-Kyu ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 480~485
In this paper, we developed mobile robot platform called Ecobot for the application system of friendly environment smart home appliance. Ecobot fulfills the purposes of monitoring of the healthy environment and guidance in the application system of friendly smart environment home appliance, home network formed by Zigbee network. For the healthy environment, the system contains monitoring sensor. Moreover, it continuously keeps the healthy environment by controlling the smart home appliances linkng with Zigbee network. And also using the URG-04LX laser distance sensor, it monitors indoor environment through autonomous moving and collision avoidance.
Design and Implementation of Fruits Warehouse Management System using Mobile Terminals
Jang, Yong-Jae ; Lee, Sung-Keun ; Jung, Chang-Ryul ;
The Journal of the Korea institute of electronic communication sciences, volume 5, issue 4, 2010, Pages 486~493
This paper demonstrates the design and implementation of fruit larder system that is able to monitor and control restoration environment using mobile equipment. Based on RFID/USN technology, it builds wireless sensor network to enhance its efficiency to fruit larder environment and inventory management and performs automated environment management through window-based application that works in desktop environment. Additionally, using WINC service, it provides remote control function for fruit larder using mobile equipment.