Proceedings of the IEEK Conference (대한전자공학회:학술대회논문집)
The Institute of Electronics and Information Engineers (IEIE)
- 기타
2004.08c
-
We studied on the performance optimized synthesis and mapping of design on to one or more FPGA device. Our multi-phased approach optimized the key parameters that affect performance by adequately modeling the impact on wire length, routability, and performance during technology mapping to produce designs that have high performance and high routability potential.
-
Electrostatic discharge(ESD) is a serious reliability concern. It causes approximately most of all field failures of integrated circuits. Inevitably, future IC technologies will shrink the dimensions of interconnects, gate oxides, and junction depths, causing ICs to be increasingly susceptible to ESD-induced damage [1][2][3]. This thesis shows the optimization of the ESD protection circuit based on the tested results of MM (Machine Model) and HBM (Human Body Model), regardless of existing Reference in fully silicided 0.18 um CMOS process. His thesis found that, by the formation of silicide in a source and drain contact, the dimensions around the contact had a less influence on the ESD robustness and the channel width had a large influence on the ESD robustness [8].
-
The control of the data retention time is a main issue for realizing future high density dynamic random access memory. There are several leakage current mechanisms in which the stored data disappears. The mechanisms of data disappear is as follow, 1 )Junction leakage current between the junction, 2) Junction leakage current from the capacitor node contact, 3)Sub-threshold leakage current if the transfer transistor is affected by gate etch damage etc. In this paper we showed the plasma edge damage effect to find out data retention time effectiveness. First we measured the transistor characteristics of forward and reverse bias. And junction leakage characteristics are measured with/without plasma damage by HP4145. Finally, we showed the comparison TRET with etch damage, damage_cure_RTP and hydrogen_treatment. As a result, hydrogen_treatment is superior than any other method in a curing plasma etch damage side.
-
A FTS (Flight Termination System) is a system that resides in a flying object such as a rocket, unmanned airplane, helicopter, missile, etc., receives commands from ground stations or detects coordinates automatically, and accomplishes a destruction command in case the object does not follow the presumed orbit. In this paper, we address the implementation of a communication modem for the FTS modem. We present general theory, simulation results using Matlab, and several results on the implementation using VHDL.
-
In this paper a VLSI design for the automatic magnetizing system has been presented. This is the design of a peripheral controller, which magnetizes CRTs and computers monitors and controls the automatic inspection system. We implemented a programmable peripheral interface(PPI) circuit of the control and protocol module for the magnetizer controller by using a O.8um CMOS SOG(Sea of Gate) technology of ETRI. Most of the PPI functions has been confirmed. In the conventional method, the propagation/ramp delay model was used to predict the delay of cells, but used to model on only a single cell. Later, a modified "apos;Linear delay predict model"apos; was suggested in the LODECAP(LOgic Design Capture) by adding some factors to the prior model. But this has not a full model on the delay chain. In this paper a new "apos;delay predict equationapos;" for the design of the timing control block in PPI system has been suggested. We have described the detail method on a design of delay chain block according to the extracted equation and applied this method to the timing control block design.
-
Low-Density Parity-Check (LDPC) codes are recently emerged due to its excellent performance to use. However, the parity check matrices (H) of the previous works are not adequate for hardware implementation of encoders or decoders. This paper proposes a hybrid parity check matrix for partially parallel decoder structures, which is efficient in hardware implementation of both decoders and encoders. Using proposed methods, the encoding design can become practical while keeping the hardware complexity of partially parallel decoder structures.
-
High Quality CD, OAT audio requires that large amount of data. Currently, multi channel preference has been rapidly propagated among latest users. The MPEG(Moving Picture Expert Group) is provides data compression technology of sound and image system. The MPEG standard provides multi channel and 5.1 sounds, using the same audio algorithm as MPEG-l. And MPEG-2 audio is forward and backward compatible. The MDCT (Modified Discrete Cosine Transform) is a linear orthogonal lapped transform based on the idea of TDAC(Time Domain Aliasing Cancellation). In this paper, we proposed the micro-program type vector processor architecture a benefit in MDCT/IMDCT of MPEG-II AAC. And it's reduced operating coefficient by overlapped area to bind. To compare original algorithm with optimized algorithm that cosine coefficient reduced
$0.5\%$ multiply operating$0.098\%$ and add operating80.58\%$ . Algorithm test is used C-language then we designed hardware architecture of micro-programmed method that applied to optimized algorithm. This processor is 20MHz operation 5V. -
We fabricated a hybrid bulk/fully depleted silicon on insulator (FDSOI) complementary metal oxide semiconductor (CMOS) active pixel image sensor. The active pixel is comprised of reset and source follower transistors on the SOI seed wafer, while the pinned photodiode and readout gate and floating diffusion are fabricated on the SOI handle wafer after the removal of the buried oxide. The source of dark current is eliminated by hybrid bulk/FDSOI pixel structure between localized oxidation of silicon (LOCOS) and photodiode(PD). By using the low noise hybrid pixel structure, dark currents qm be suppressed significantly. The pinned photodiode can also be optimized for quantum efficiency and reduce the noise of dark current. The spectral response of the pinned photodiode on the SOI handle wafer is very flat between 400 nm and 700 nm and the dark current that is higher than desired is about 10 nA/cm2 at a
$V_{DD}$ of 2 V. -
Programmable logic controller (PLC) is widely used in manufacturing system or process control. This paper presents the design of a 32-bit microprocessor for a sequence control using an Application Specification Integrated Circuit (ASIC). The 32-bit microprocessor was designed by a VHDL with top down method; the program memory was separated from the data memory for high speed execution of 274 specified sequence instructions. Therefore it was possible that sequence instructions could be operated at the same time during the instruction fetch cycle. And in order to reduce the instruction decoding time and the interface time of the data memory interface, an instruction code size was implemented by 32-bits. And the real time debugging as single step run, break point run was implemented. Pulse instruction, step controller, master controllers, BIN and BCD type arithmetic instructions, barrel shit instructions were implemented for many used in PLC system. The designed microprocessor was synthesized by the S1L50000 series which contains 70,000 gates with 0.65um technology of SEIKO EPSON. Finally, the benchmark was performed to show that designed 32-bit microprocessor has better performance than Q4A PLC of Mitsubishi Corporation.
-
In this paper, a direct controller for nonlinear plants using a neural network is presented. The controller is composed of an approximate controller and a neural network auxiliary controller. The approximate controller gives the rough control and the neural network controller gives the complementary signal to further reduce the output tracking error. This method does not put too much restriction on the type of nonlinear plant to be controlled. In this method, a RBF neural network is trained and the system has a stable performance for the inputs it has been trained for. Simulation results show that it is very effective and can realize a satisfactory control of the nonlinear system.
-
In this paper, the design of a CMOS exponential V-I converter (EVIC,) based on Taylor's concept, is presented. The composite NMOS transistor is used for realizing the exponential characteristics. In a 0.25
$\mu$ m CMOS process, the simulations show more than 20 dB output current range and 15 dB linear range with the linearity error less than$\pm$ 0.5 dB. The power dissipation is less than 0.3 mW with$\pm$ 1.5 V supply voltage. The proposed EVIC can be used for the design of an extremely lowvoltage and low-power variable gain amplifier (VGA) and automatic gain control (AGC). -
A two-stage Class E power amplifier operated at 2.44GHz is designed in 0.25-
$\mu$ m CMOS process for Class-l Bluetooth application. The power amplifier employs c1ass-E topology to exploit its soft-switching property for high efficiency. A preamplifter with common-mode configuration is used to drive the output-stage of Class-E type. The amplifier delivers 20-dBm output power with70$\%$ PAE (power -added-efficiency) at 2-V supply voltage. -
This paper proposes an efficient computation method for fixed and mixed polarity Reed -Muller function vector over Galois field GF(p). Function vectors of fixed polarity Heed Muller function with single variable can be generated by proposed method. The n-variable function vectors can be calculated by means of the Kronecker product of a single variable function vector corresponding to each variable. Thus, all fixed and mixed polarity Reed-Muller function vectors are calculated directly without using a polarity function vector table or polarity coefficient matrix.
-
An area of research called evolvable hardware (EHW) has recently emerged which combines aspects of evolutionary computation with hardware design and synthesis. The features that can be used to identify and classify evolvable hardware are the evolutionary algorithm, the implementation and the genotype representation. This paper gives an introduction to the field. It continues by including classifying the EHW and the applications of the area.
-
This paper presents an algorithm generating inverse element over finite fields
$GF(3^{m})$ , and constructing method of inverse element generator based on inverse element generating algorithm. A method computing inverse of an element over$GF(3^{m})$ which corresponds to a polynomial over$GF(3^{m})$ with order less than equal to m-l. Here, the computation is based on multiplication, square and cube method derived from the mathematics properties over finite fields. -
In this paper we challenge the user Authentication using KerberosV5 authentication protocol in WPKI environment. This paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses wireless public key based structure and transmission hierarchical security back of a WAP forum, and a server client holds for user authentication of an application layer all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 V3 with using WIM for complement an authentication protocol KerberosV5 and its disadvantages.
-
New concept of hybrid divisible load theory is introduced in this paper. Hybrid system deals with a combination of modularly divisible load and arbitrarily divisible load. Main idea of hybrid divisible load theory is introduced with a simple example. A condition of optimality is derived for the hybrid case.
-
This paper presents the design and implementation of a QoS based IrDA in mobile phones. The IrDA standards have arised from the need to connect various mobile devices together. But currently, we have a difficult to connecting various mobile devices together. The difficult thing is to adjust the minimum turn around time. The minimum turn around time in IrDA deals with the time needed for a receiver circuit to recover following saturation by transmissions from the same device (turn around latency). This parameter corresponds to the required time delay between the last byte of the last frames sent by a station and the point at which it is ready the first byte of a frame from another station. This parameter comes into play when the link is turned around and is negotiated independency for each station. We solve this matter by using the Dynamic Adjustment Algorithm (DAA). The dynamic adjustment algorithm adjusts the minimum turn around time according to the numbers of devices. We apply our direct adjustment algorithm to our QoS based IrDA in mobile phones and show the improved performance of connection with various mobile phones together.
-
Architecture generation is the first step in the design of software systems. Most of the qualities that the final software system possesses are usually decided at the architecture development stage itself. Thus, if the final system should be usable, testable, secure, high performance, mobile and adaptable, then these qualities or nonfunctional requirements should be engineered into the architecture itself. In particular, adaptability is emerging as an important attribute required by almost all software systems. The machinery and tools in the remote site surveillance and connects intelligence information machinery and tools at Internet. We need the server which uses different embedded operating system to become private use. With the progress of information-oriented society, many device with advanced technologies invented by many companies. However, the current firmware technologies have many problems to meet such high level of new technologies. In this paper, we have successfully ported linux on an embedded system, which is based on intel StrongARM SA-1 1 10 processor, then written several network modules for internet-based network devices.
-
IEEE 802.11 Point Coordination Function (PCF) mode is defined to support time bounded traffic, such as voice in wireless LANs. The poll scheduling plays an important role in IEEE 802.11 PCF mode operation. This paper proposed a Multicast Polling Scheme (MPC) to increase the performance of wireless LANs. Moreover, we proposed a polling schedule scheme for our proposed multi-poll to serve real-time traffic. The results show that the proposed mechanism is more efficient than the original IEEE 802.11 PCF.
-
Address Resolution Protocol (ARP) cache poisoning is a MAC layer attack that can only be carried out when an attacker is connected to the same local network as the target machines. ARP is not a new problem, but wireless network introduces a new attack point and more vulnerable to the attack. The attack on wireless network cannot be detected by current detection tool installed on wired network. In order to detect the ARP poisoning attack, there must be a ARP poisoning detection tool for wireless LAN environment. This paper proposes linux-based ARP poisoning detection system equipped with wireless LAN card and Host AP device driver
-
DHCP(Dynamic Host Configuration Protocol) is a protocol which dynamically allocates an IP address and/or host configuration parameters to a host. The DHCP client's address can be changed dynamically any time. For the possible communication with other system, the DHCP client has to inform its address to the DNS system with dynamic update facility. But the DNS dynamic update has a problem related to the security. So we proposed the efficient mechanism for the secure integration of DHCP and DNS by using DNS security extensions. The system also uses the DNS server as the certificate repository for the storing & retrieval of each other's certificate.
-
This paper used OPNET to simulate video streaming service a test IP network and MPLS network with the traffic shaping that have with CQ_ LLQ algorithm, LSP of fixed bandwidth, policy of limitation users and measures parameters such as delay, throughput, packet loss. To verify the performance of video streaming service in IP network and MPLS network, two scenario that have same topology and traffic source. One is the simulation for best-effort service in pure IP network. The other is the simulation for QoS-enabled service in MPLS Network. Based on simulation result, the MPLS network with CQ_ LLQ algorithm and fixed LSP show advantage of the video streaming service QoS, specially delay and packet loss
-
Mobile Ad Hoc Network (MANET) is a network architecture, which has no backbone network and is deployed temporarily and rapidly in emergency or war without fixed mobile infrastructures. All communications between network entities are carried in ad-hoc networks over the wireless medium. Due to the radio communications being extremely vulnerable to propagation impairments, connectivity between network nodes is not guaranteed. Therefore, previously developed routing algorithms in wired networks cannot be used. And many new algorithms have been undergone. This study proposes the secondary leader approach to the cluster based routing protocol(CBRP). In case, the primary leader becomes abnormal status so that the primary leader cannot participate the communications between network entities, the secondary leader immediately replaces the primary header without selecting process of the new primary leader. The performances of proposed algorithm ACBRP(Advanced Cluster. Based Routing Protocol;CBRP using secondary leader) are compared with CBRP and results are presented in order to show the effectiveness of the algorithm.
-
Currently, most IP multicasting applications are implemented based on Any-Source Multicast (ASM) model that supports many to many multicast services. However, it is known that current ASM-based multicast architecture has several deployment problems such as address allocation, lack of access control, and inefficient handling of well-known multicast sources. Source-Specific Multicast (SSM) working group in IETF proposed SSM architecture to overcome the weaknesses of ASM architecture. The architecture of SSM is based on one to many multicast services. Also, in order to provide SSM service, Multicast Listener Discovery Version 2 (MLDv2) protocol should be supported. In this paper, we introduce the architecture of SSM protocol and multicast group management protocol. After that, we present the architecture and implementation of IPv6 SSM and MLDv2 protocols in Linux systems.
-
In this paper, we propose a method for constructing terrestrial/cable PSIP converting system, so-called a PSIP converter, which is converting terrestrial PSIP into cable PSIP for a data broadcasting service in the interoperable network of terrestrial and cable, and define an interface between the PSIP converter and the OOB SI generator by using PMCP messages compliant to ATSC T3/S1. The exiting PSIP converter just converts terrestrial PSIP into cable PSIP compliant to ATSC and OCAP standard and transmits by a MPEG-2 TS format. That is to say, it is not for the digital data broadcasting but for the digital broadcasting. Say in other word, the proposed PSIP converter is designed to convert and transmit PSIP including DET information which is necessary data event information for data broadcasting service. In addition, the PSIP converter can support various types of PSIP information to the OOB SI generator by using PMCP messages defined by a hierarchical structure as per each channel, audio/video event, data event and so on.
-
IPv6 enables stateless address configuration of hosts. Using this technique, a host in an IPv6 network can configure its address automatically with the help of a router. This eliminates the need for a server to manage the address dispatching state in conventional IPv4 networks. In this paper, we present a stateless configuration technique for routers. By expanding IPv6 stateless address configuration, a router can configure its network with the help of an upper level router, enabling a hierarchical, router-to-router network automatic configuration
-
Having age of ubiquitous ahead, existing IPv4's address space insufficiency phenomenon appears because of increasing network usage as well as multimedia data transmission becomes much, necessity of new IP address system that guarantee QoS are needed. IPv6 was made to solve these problem. IPv6 solves address space insufficiency phenomenon offering by 128bit address space, and also offers hierarchical address layer that support improved QoS. IPv6 defines relation between surrounding node using Neighbor Discovery protocol. Used Neighbor Discovery messages, grasp surrounding node, include important informations about network. These network information outcrops can give rise in network attack and also service that use network will paralysis. Various kinds of security limitation was found in Present Neighbor Discovery protocol therefore security function to supplement tris problem was required. In this thesis, Secure Neighbor Discovery protocol that add with security function was design and embody by CGA module and SEND module.
-
In this paper, we present a design and implementation of a TV-Anytime compliant STB to provide personalized content consumption according to user preferences and various terminal/network conditions. This paper mainly details with a metadata engine which consists of meta data de-multiplexing, metadata decoding, and metadata-based content browsing. For personalized content consumption, the proposed metadata engine provides the following key functionalities: advanced EPG, non-linear segment navigation wirh Tables-of-Content and/or event-based summary, automatic recommendation of user-preferred programs, and etc. The implemented STB employing the metadata engine is successfully tested with a set of service scenarios in an end-to-end broadcasting test-bed.
-
Currently, there are many subscriber access networks: PSTN, ADSL, Cellular Network, IMT200 and so on. To these service providers that provide above network service, it is important that they authenticate and authorize legal subscribers and account for their usage. At present, There exist the several protocols that Support AAA(Authentication, Authorization and Accounting) service : RADIUS, Diameter, TACACS+. Nowadays, RADIUS has used for AAA service widely. It has been extended to support other access network environment. So, we extend RADIUS to support environment of Mobile IPv6. Mobile IPv6 uses IPsec as a security mechanism, basically. But, IPsec is a heavy security technology for small, portable, mobile device. Especially, it is serious at IKE, the subset of IPsec. IKE is a key distribution protocol that distributes the key to the endpoints of IPsec. In t:lis paper, we extend RADIUS to support environment of Mobile IPv6 and simplify the IKE phase of IPsec by AAA system distributing the keys by using its security communication channel. Namely, we propose the key distribution method for IPsec SA establishment between mobile node and home agent. The suggested method was anticipated to be effective at low-power, low computing deyice. Finally, end users feel the faster authentication.
-
Diameter base protocol is intended to provide an AAA framework for applications such as IP mobility. Currently Diameter base protocol is standardized to RFC 3588, but there are some problems. One of them, path authorization is already argued at IETF WG Mailing List. According to RFC 3588, path authorization function causes inefficient data traffic and conflicts with RFC 3588 itself. In this paper, we analysis these problems about path authorization function and propose more improved solution.
-
This paper describes a new approach to Internet host mobility. We argue that local mobility, the performance of existing mobile host protocol can be significantly improved. It proposes Fast Moving Detection scheme that based on neighbor AP channel information and moving detection table. And, it composes Local Area Clustering Path (LACP) domain that collected in AP's channel information and MN interface information. It stored the roaming table to include channel information and moving detection. Those which use the proposal scheme will need to put LACP information into the beacon or probe frame. Each AP uses scheme to inform available channel information to MN. From the simulation result, we show that the proposed scheme is advantageous over the legacy schemes in terms of the burst blocking probability and the link utilization.
-
Recently the numbers of patent about the technology for mobile payment with Ie or bluetooth-chip are being increased more and more. The reasons of patent increment for mobile payment are advancement of wireless internet technology and rising of customer's request for it. The customer wants to be able to pay for purchase, tax and aid with own mobile phone. So every mobile service provider applies for patents about that competitively. And in the near future the biometrics is generalized in the mobile payment system. Especially the payment service of iris recognition is significant technique in this area for the future prospect. The biometrics of iris is an accurate authentication method because it has about 250 distinguish parameters to the finger print's 30. The biometrics of iris can recognize and identify a person for 2 seconds. But the image of iris is changed by transformation of body in the life. And the existing iris authentication system has problem that can be miss-recognized. In this paper, we propose the new method that reduces miss-recognizing rate with Renewable Iris Authentication Algorithm(RIAA) in mobile system.
-
We propose an Alamouti-like scheme for combining space-time block coding with single-carrier frequency-domain equalization(SC-FDE) in fixed broadband wireless access environment. With two transmit antennas, the scheme is shown to achieve significant diversity gains at low complexity over frequency-selective fading channels
-
The paper describes the implementation of the video conferencing system using public key infrastructure which is used for user authentication and media stream encryption. Using public key infrastructure, we are able to reinforce the authentication for conference participant and block several malicious hacking while protecting conference control information. The paper shows the implementation of the transportation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric key encryption algorithm (RC2, SEED, DES and 3DES) for media stream encryption. The feature of the paper is transportation layer secure protocol that is implemented for protection of information on a user authentication and video conference and the media streaming encryption algorithm also can be envisioned with another block encryption algorithm. The key for media streaming encryption may be safely distributed by the transportation layer secure protocol.
-
Grid computing environment can be used to interconnect a wide variety of geographically distributed heterogeneous computing resources based on high-speed network. To make business service, it is necessary for Grid accounting system to measure the computational cost by consuming computer resources. To collect resource consumption data, and to keep track of process without needing to recompile kernel source, we use system call wrapping. By making use of this technique, we modifies system call table and replace existing system call to new system call that can monitor processes running in CPU kernel currently. Therefore we can measure user process resource usage for Grid accounting system.
-
A high-voltage generator is used to program the anti-fuse of the semiconductor chip. A new high-voltage generator consists of PN diodes and new stack type capacitors. An oscillator supply pulses to the high-voltage generator. The pulse period of the oscillator is delayed by controlling gate-voltage of the MOS. The pulse period is about 27ns, therefore the pulse frequency is about 37MHz. The threshold voltage of PN diode is about 0.8V. The capacitance of new stack type capacitor is about 4pF. The output voltage of the new high-voltage generator is about 7.9V and its current capacity is about
$488{\mu}$ A. -
This paper investigated the speed sensorless indirect vector control of a two-phase induction motor to implement adjustable-speed drive for low-power applications. The sliding mode observer estimates rotor speed. The convergence of the nonlinear time-varying observer along with the asymptotic stability of the controller was analyzed. To define the control action which maintains the motion on the sliding manifold, an 'equivalent control' concept was used. It was simulated and implemented on a sensorless indirect vector drive for 150W two-phase induction motor. The simulation and experimental results demonstrated effectiveness of the estimation method.
-
This paper investigated the speed sensorless indirect vector control of a two-phase induction motor to implement adjustable-speed drive for low-power applications. The sliding mode observer estimates rotor speed. The convergence of the nonlinear time-varying observer along with the asymptotic stability of the controller was analyzed. To define the control action which maintains the motion on the sliding manifold, an 'equivalent control' concept was used. It was simulated and implemented on a sensorless indirect vector drive for 150W two-phase induction motor. The simulation and experimental results demonstrated effectiveness of the estimation method.
-
The characteristic of thin film resistor with low TCR( temperature coefficient of resistance ) and high precision are studied. The thin film resistor for 1/4W was fabricated and characteristic of these resistors was investigated. The fabricated device had the thickness of
$2.48{\leqq}$ and the resistivity of$0.27{\omega}mm$ . The electrical characteristic was evaluated by HP 4339B and 4284A instruments with HP l6339A. The profile of trimmed structure was also measured by non contact interferometer. The change of resistance and TCR increased with increasing roughness and resistance. To reduce the effect of stress annealing treatment was performed in the range of 563 to 623 K after trimming. The characteristic was improved after annealing. It is expected the fabricated device can be useful for high precision and low TCR. Fabricated thin film resistor has average deviation of resistance less than$0.35{\%}$ and TCR within 60.60ppm/K. -
The rapid development of digital media and communication network urgently brings about the need of data certification technology to protect IPR (Intellectual property right). This paper proposed a new watermarking method for embedding contents owner's audio signal in order to protect color image IPR. Since this method evolves the existing static model and embeds audio signal of big data, it has the advantage of restoring signal transformed due to attacks. Three basic stages of watermarking include: 1) Encode analogue ID owner's audio signal using PCM and create new 3D audio watermark; 2) Interleave 3D audio watermark by linear bit expansion and 3) Transform Y signal of color image into wavelet and embed interleaved audio watermark in the low frequency band on the transform domain. The results demonstrated that the audio signal embedding in color image proposed in this paper enhanced robustness against lossy JPEG compression, standard image compression and image cropping and rotation which remove a part of image.
-
Yang Dong Hyun;Ku Dae Sung;Kim Phil Jung;Yon Jung Hyun;Kim Sang Duk;Hwang Jung Yeun;Jeong Rae Sung;Kim Jong Bin 636
In present, there are many methods such as DCT, Wavelet Transform, or Quantization -to the image compression field, but the basic image compression method have based on DCT. The representative thing of the efficient techniques for information compression is DCT method. It is more superior than other information conversion method. It is widely applied in digital signal processing field and MPEG and JPEG which are selected as basis algorithm for an image compression by the international standardization group. It is general that DCT is consisted of using multiplier with main arithmetic blocks having many arithmetic amounts. But, the use of multiplier requires many areas when hardware is embodied, and there is fault that the processing speed is low. In this paper, we designed the hardware module that could run high-speed operation using row-column separation calculation method and Chen algorithm by distributed arithmetic method using ROM table instead of multiplier for design DCT module of high speed. -
Since the existing quadtree image segmentation methods decide the presence of image information using the maximum and minimum pixel value within an image block, they are very sensitive to noise. Although many image segmentation methods have been researched up to date, they can not execute the optimum image segmentation if noise is included in an image because there is no accurate parameters which can distinguish noise. For that reason, all application using the existing quadtree segmentation has potential of decreasing in performance due to noise. This paper proposed a quadtree image segmentation based on SDT (Standard Deviation Threshold) that can effectively extract image information parameters from a noise image. This method has the advantage of distinguishing the presence of image information even if the image has noises caused by communication. Furthermore, this paper verified through test comparison that the proposed quadtree segmentation could estimate more accurate image information parameters than the existing ones even in noise-added environment.
-
In this paper, we drive a theoretical performance of complementary code keying (CCK) codes on additive white Gaussian noise (AWGN) channel. The CCK codes can be demodulated by the optimal maximum likelihood decoding method and sub-optimal correlation magnitude decoding algorithm. We calculate the bit error rate (BER) and symbol or codeword error rate (SER) of the CCK codes using the above mentioned two decoding algorithms. To derive the error performance, we use the weigh distributions and cross-correlation distributions of CCK codes.
-
In this paper, a concatenated RS and Turbo code is proposed for OFDM system over burst error channel. The concatenated code used in this study is a RS(255,2D2) code and a rate 1/2 turbo code. The turbo code uses 2 recursive systematic convolutional (RSC) code as the constituent codes and the parity bit are punctured to get the desired code rate. It is shown by simulation that the conventional OFDM system fails when there exists burst noise. The concatenated RS and turbo code obtains at least 5dB gain over the turbo code at the bit error probability of
$10^{-3}$ . -
The average bit error rate (HER) performance of a Gray coded arbitrary rectangular quadrature amplitude modulation (AR-QAM) signal with maximal ratio combining (MRC) diversity in an arbitrarily correlated Nakagami-m fading channel is derived and analyzed. The derived two types of general solutions are a simple closed-form and an integral form, depending on the types of the values (integer and non-integer) of the fading parameter. Using the derived equations in this paper, we analyzed the HER performances numerically based on the practical base station antenna configuration. The results show that MRC reception is a very effective scheme so far even though the combined signals are not independent each other because of the correlation values. The antenna height and separation of the MRC system relate to the correlation coefficient value between antennas, and go a long way with the diversity advantage. In particular, it is needed to be determined the antenna height that is carefully do for the diversity advantage because the correlation coefficient and the antenna height gain are contrary to each other from the aspect of the system performance. The expressions presented here can offer a convenient way to evaluate the exact HER performance of an arbitrary rectangular QAM signal with MRC diversity reception for various cases of practical interest on a correlated Nakagami fading channel.
-
This paper proposes an orthogonal reception structure for OS/SS communication with time-shifted m-sequences, and compares the performances of the proposed and conventional receiver. This structure provides two important characteristics to reference user signal with not only increment of auto-correlation value but also cancel of the cross-correlation value out to zero between the reference user and other user signals. In addition, the structure can be easily implemented with the conventional receiver adding an additional integrator path in parallel and an adder that sums the conventional path output and the new path output signal. Hence, the proposed structure can be applied for channel impulse response measurement, and efficiently used for multi-user interference signal cancellation and channel capacity increment by flexible structural inter-working operation, connection or disconnection, of the new path to conventional receiver structure.
-
In this paper, a modified-SOYA (soft output viterbi algorithm) of turbo codes is proposed for quantized channel receiver filter outputs. We derive optimum branch values for the Viterbi algorithm. Here we assume that received filter outputs are quantized and the channel is additive white Gaussian noise. The optimum non-uniform quantizer is used to quantize channel receiver filter outputs. To compare the BER (bit error rate) performance we perform simulations for the modified SOYA algorithm and the general SOYA
-
In this paper, we have presented the improved IF transceiver architecture and the implementation and experimental results on re-configurable transceiver based on digital IF for multiple wideband OFDM/TDD base stations for high-speed portable internet-service in which is issued Korea. The implemented IF transceiver has been designed to support multiple frequency allocations and multiple standards by only modifying the programmable software not its hardware like as the software-defined-radio concept. Also, the digital complex quadrature modulation technique has been used for the digital IF transmitter, which is able to combine multiple frequency bands in digital processing block not RF block and to reject the image frequency signals. And the bandpass sampling technique has been used for the digital IF receiver to reduce the sampling rate of ADC. This paper has shown the experiment results on the frequency response and constellation on the base-station implemented using the modified IEEE 802.16a/e physical layer channel structure based on OFDM/TDD.
-
We propose accurate classification method of EEG signals during mental tasks. In the experimental task, the tasks of subjects show 3 major measurements; there are mathematical tasks, color decision tasks, and Chinese phrase tasks. The classifier implemented for this work is a feed-forward neural network that trained with the error back-propagation algorithm. The new BCI system is proposed by using neural network. In this system, tr e architecture of the neural network is composed of three layers with a feed-forward network, which implements the error back propagation-learning algorithm. By applying this algorithm to 4 subjects, we achieved
$95{\%}$ classification rates. The results for BCI mathematical task experiments show performance better than those of the Chinese phrase tasks. The selection time of each task depends on the mental task of subjects. We expect that the proposed detection method can be a basic technology for brain-computer interface by combining with left/right hand movement or yes/no discrimination methods. -
The existing conjugated blue emitting material polymer which has been used for the two-wavelength method white-emission has good stability and low operating voltage as merits, but the imbalanced carrier transport has been indicated as problem area. We have introduced a novel blue emitting material having perylene moiety unit with hole transporting ability and blue emitting property and triazine moiety unit with electron transporting ability into the same host chain. We have synthesized N-[p-(perylen-3-y1)pheny1]methacry1 amide (PPMA) monomer and [N-(2,4-dipheny1-1,3,5-triazine)pheny1 methacry1 amide] (DTPM) monomer having blue light-emitting unit and electron transport unit, respectively by three steps. A novel non-conjugated blue emitting material Poly[N -[p(perylene-3-y1) pheny1] methacry1 amide-co-N-[P-(4,6-dipheny1-1,3,5-triazine-2-y1]pheny1]methacry1 amide] (PPPMA-co-DTPM) copolymer having electron transporting unit was synthesized by the solution polymerization of PPMA and DTPM monomers with an AIBN initiator and showed high yield of
$75{\%}$ . It was very soluble in common organic solvents, and the fabrication of the thin film using a spin coating method was very simple. The PPPMA exhibited a good thermal stability. -
A Developed Collision Resolution Algorithm in MAC Protocol for IEEE 802.11b Wireless LANs (ICEIC'04)Design of efficient Medium Access Control (MAC) protocols with both high throughput performances is a major focus in distributed contention-based MAC protocol research. In this paper, we propose an efficient contention-based MAC protocol for wireless Local Area Networks, namely, the Developed Collision Resolution (DCR) algorithm. This algorithm is developed based on the following innovative ideas: to speed up the collision resolution, we actively redistribute the backoff timers for all active nodes; to reduce the average number of idle slots, we use smaller contention window sizes for nodes with successful packet transmissions and reduce the backoff timers exponentially fast when a fixed number of consecutive idle slots are detected. We show that the proposed DCR algorithm provides high throughput performance and low latency in wireless LANs.
-
Doo Gil Su;Oh Young Ju;Kim Beob Kyun;Hwang Ho Jeon;Jang Haeng Jin;An Dong Un;Chung Seung Jong 686
Computational grids are emerging as a new infrastructure for internet-based parallel and distributed computing. Grid systems are enables the sharing, exchanging, discovery and aggregation of resources which distributed multiple administrative domains, organizations and enterprises. Accounting information service is one of the main obstacles to widespread adoption of the grid. But, most of grid portals do not support accounting information service. In this paper, we design an accounting information service and build a web-based grid portal including account management service and accounting information service. -
This paper describes Web based education technique. We implemented a remote compile system with 8051 micro controller. It implemented the system in this paper so that a learner compiled 8051 control programs to the remote. Most big restriction subject is the control of the hardware in an engineering field even though it implements a remote education system. We download the Java Application to Java Web Start and execute in this system. In this paper the learner controls 8051 executions in Web to the remote and implemented so that we confirmed the action. The supplementary problem will be the construction of a remote education system which offeres existing text and sound information, flash animation.
-
The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.
-
This paper discusses about the mechanism of catching an image through an optical manipulation of each organizations in the eye, more specifically, mechanism of catching an image on a retina through a Camera and a Crystal Lens. In the retina, the macula roles as a fovea contrails and it leads the image which is about 3 mm to be shaped on there. However, even the macula may not properly function, our eyes still can catch the image by shifting the optical path to around of the macula, even if the sensitivity of the image is generally lower than the image on the macula. This paper proposes a method of shifting the shaped image on the retina by refracting the optical path through a prism located on the rear of a screen which consists of a 0.7' TFT LCD. Applying this method that throwing an image around on the macula, central visual disturbance patients among retinitis pimentos patients can expect to recover such a mechanism to catch an image.
-
Jang Haeng Jin;Doo Gil Su;Lee Jeong Jin;Kim Beob Kyun;Hwang Ho Jeon;An Dong Un;Chung Seung Jong 703
Grid computing represents the fundamental computing shift from a localized resource computing model to a fully-distributed virtual organization with shared resources. Accounting is one of the main obstacles to widespread adoption of the grid. Accounting has until recently, been a sparsely-addressed problem, particularly in practice. In this paper, we design and implement the accounting information gathering system. Implemented system is based on OGSA, following GSAX framework of RUS-WG in GGF. And the schema of gathered and serviced accounting information is following Usage Record Fields of UR-WG in GGF. Also, the accounting information integrating and monitoring tool for system management in the grid environment are implemented. -
Recently, Web service has emerged as a promising solution for enabling enterprises to offer service outlets for customized client application, Especially. Web services provide more flexible access to servers than current Web potted sites, This paper will introduce the concept of Web services and illustrate the. use and benefits of Web services in the context of an e-Card mailing system, An experimental solution that we implement will be also presented.
-
Because of rapid development of software technology, a number of software professionals have been concerned with component-based development methodologies. Up to date, the evaluation of component quality has been focused on object-oriented metric based methodology. But this paper presents the selection process and evaluation criteria based on an MCDM(Multiple Criteria Decision Making) technique for the selection of optimal COTS component from consumers' viewpoints. We considered functionality, efficiency and usability based on ISO/IEC 9126 for quality measurement and conducted practical analysis into commercial EJB component in internet. This paper shows that the proposed selection technique is applicable for the selection of the optimal COTS component.
-
A design was done, and all characteristic of photodetectr of the web pattern type which a standard process of the Bipolar which Si PIN structure was used in this paper, and was used for the current amplifier design was used, and high-speed, was used as receiving optcal area of high altitude, and the module which had a low dark current characteristic was implemented with one chip with a base. Important area decreases an area of Ie at the time of this in order to consider an electrical characteristic and economy than the existing receiving IC, and performance of a product and confidence are got done in incense. First of all, the receiving IC which a spec, pattern of a wafer to he satisfied with the following electrical optical characteristic that produced receiving IC of 5V and structure are determined, and did one-chip is made. On the other hand, the time when AR layer of double is
$Si_{3}N_{4}/SiO_{2}=1500/1800$ has an optical reflectivity of less than$10{\%}$ on an incidence optical wavelength of 660 ,and, in case of photo detector which reverse voltage made with 1.8V runs in 1.65V, an error about a change of thickness is very the thickness that can be improved surely. And, as for the optical current characteristic, about 5 times increases had the optical current with 274nA in 55nA when Pc was -27dBm. A BJT process is used, and receiving IC running electricity suitable for low voltage and an optical characteristic in minimum 1.8V with a base with two phases is made with one chip. IC of low voltage operates in 1.8V and 3.0V at the same time, and optical link receiving IC is going to be implemented -
Recently, because of the extensive use of geographic information in the various fields, the requirement for the easy circulation and utilization of the various geographic information among the individuals, organizations, societies and countries is raised. In order to support the interoperability of the heterogeneous geographic information in the various fields, OGC(Open GIS Consortium) proposed the GML(Geography Markup Language) specification that defines the XML encoding rule about the heterogeneous geographic information. In addition, ISO/TC 211 adopted the GML specification to make it as the international standard. Therefore, in this paper, we first analyzed the GML 3.0 specification in detail that can support the interoperability of the heterogeneous geographic information. And then we suggested and applied the mapping rule that define the encoding method to improve the encoding process easily and efficiently. Finally, we designed and implemented the GML 3.0 encoding system using the mapping rule to encode the geographic information that was constructed in spatial databases into the GML 3.0 document. Especially, we used ZEUS as a spatial database system to test our encoding system in this paper.
-
The e-Logistics means the virtual business activity and service architecture among the logistics companies based on the Internet technology. The management of vehicles' location in most conventional vehicle tracking system has some critical defects when it deals with data which are continuously changed. It means the conventional vehicle tracking system based on the conventional database is unable eventually to cope with the environment that should manage the frequently changed location of vehicles. The important things in the evaluation of the vehicle tracking system is to determine the threshold of cost of database ,update period and communication period between vehicles and the system. In other words, the difference between the reallocation of vehicle and the data in database can evaluate the overall performance of vehicle tracking systems. Most of the previous works considers only the information that is valid at the current time, and is hard to manage efficiently the past and future information. To overcome this problem, the efforts on moving objects management system(MOMS) and uncertainty processing have been started from a few years ago. In this paper, we propose an uncertainty processing model and system implementation of moving object that tracks the location of the vehicles. We adopted both linear-interpolation method and trigonometric function to chase up the location of vehicles for the past time as well as future time, respectively. We also explain the comprehensive examples of MOMS and uncertainty processing in parcel application that is one of major application of e-Logistics domain.
-
In this experiment, we developed a ubiquitous computing platform that can analyze vibration and noise in wireless environment by wireless LAN and sensors. In order to utilize the COTS(Commercial Off The Shell) concept, we used a PDA that supports wireless LAN and serial communication as a main board. Following platform is used to measure the noise level of heavy construction equipments in a remote area.
-
The term 'Grid' refers to systems and applications that integrate and manage resources and services distributed across multiple control domains. Resource sharing is, necessarily, highly controlled, with resource providers and consumers defining clearly and carefully just what is shared, who is allowed to share, and the conditions under which sharing occurs. In this paper, we design and implement a grid access control system, called PGAM. This system works on heterogeneous resources, can be applied to the additional service development and its service, provides template account management mechanism, and tries to ensure site autonomy. This system is implemented to increase portability and to be tit tll any kind of economic model.
-
This study is generally purposed to develop a mobile augmentative and alternative communication system (hereinafter referred to as 'a mobile AAC system'). Also the device is aimed as a mobile AAC system for helping communication of persons who suffer from speech disorders in a free and convenient manner. One thing firstly considered for a successful AAC system is selection of vocabularies. For this purpose, the above researchers collected utterances in actual situations to select vocabularies of higher frequencies. For generation of sentences by maximizing the use of limited space in the AAC system, this study specifically presents a method of predicting predictions. This method includes selecting vocabulary and classifying it by domains so as to meet the characteristics of the mobile AAC communication, using a noun thesaurus for semantic analysis, and building a sub-category dictionary. Predicting predicates by selecting symbols in accordance with this method is tested and the utility thereof is confirmed.
-
The researching content of this article is to implement the image grabber system for use the dental hospital image examination. It receives the NTSC analog image through CCD optical camera, which is using the close photographing. we made the image grabber board, which gathers and obtains the analog image, by PCI format. We developed the C++ application and device drive to operate this board so that we totally could implement and confirm this Image grabber system.
-
Nowadays a large number of PLCs are being used in automatic machines for factory automation in industry, and HMI is essential for the effective and convenient operation of PLCs. Each screen displayed in actual EMI equipment should be created, modified and deleted using a PC-based editor and it should be composed of necessary display components to express desired OUI. Based object-oriented development methodology, this study designed screen objects representing a editing screen, display components forming the UI of screens and data management objects necessary for data exchange with HIM system and, based on the objects, implemented a HMI screen editor.
-
A hearing aid performs the role of fitting in order to provide those with a hearing problem with a better hearing ability in ordinary circumstances. The existing Fitting system in the hearing aid is consisted somewhat complex, and simply performs the role of Fitting without any supervisions of those with a hearing problem. Such is these methods makes it unable to establish an organized supervision, and shows a problem in making high efficiency. In order to solve this problem mentioned as above, the based thesis have connected the Fitting program and the patient-management database program for the easy use by the user.
-
While the needs for VoIPs(Voice over IP) encourage the commercial trials for VoIP services, there are many problems such as user authentication, blocking of illegal user and eavesdropping. In this paper, a management algorithm of registration of VoIP terminals is explained and security methods for tolling and data encryption module is designed and built up. The module structure will have the advantages of the entire development of secured gatekeeper without whole modification of gatekeeper. In order to secure the ordinary gatekeeper based on H.323 standard, user authentication and data encryption technologies are developed based on the H.235 standard and simply located over the plain H.323 stacks. The data structures for secured communications are implemented according to ASN.1 structures by H.235.
-
The performance of a speech recognition system is generally degraded in telephone environment because of distortions caused by background noise and various channel characteristics. In this paper, data-driven temporal filters are investigated to improve the performance of a specific recognition task such as telephone speech. Three different temporal filtering methods are presented with recognition results for Korean connected-digit telephone speech. Filter coefficients are derived from the cepstral domain feature vectors using the principal component analysis.
-
In this paper, we propose a content-based audio genre classification algorithm that automatically classifies the query audio into five genres such as Classic, Hiphop, Jazz, Rock, Speech using digital signal processing approach. From the 20 second query audio file, 54 dimensional feature vectors, including Spectral Centroid, Rolloff, Flux, LPC, MFCC, is extracted from each query audio. For the classification algorithm, k-NN, Gaussian, GMM classifier is used. In order to choose optimum features from the 54 dimension feature vectors, SFS (Sequential Forward Selection) method is applied to draw 10 dimension optimum features and these are used for the genre classification algorithm. From the experimental result, we verify the superior performance of the SFS method that provides near
$90{\%}$ success rate for the genre classification which means$10{\%}$ -$20{\%}$ improvements over the previous methods -
Kil Se Kee;Han Young Hwan;Lee Eung Hyuk;Park Young Bae;Cho Heung Ho;Min Hong Ki;Hong Seung Hong 772
Generally, arterial pulse waves are measured at the radial arterial of wrist or carotid arterial of neck using a sensor such as pressure sensor, piezoelectric sensor or optic sensor. But in this paper, arterial pulse wave is measured at the temple using PZT piezo sensor which is attached on the temple in form of a hair-band. Arterial Pulse waves are generally measured when a reagent is in a static state. But in this paper, we implemented the arterial pulse wave measurement system, as a previous stage of the arterial pulse wave measurement system for running at outdoors or on a running machine, that measures arterial pulse waves at the temple, which is the least moving part when running. Thorough the continuous study, if the motion artifact when running is possible to be removed, the system will be able to perform monitoring of running men's states and especially emergency signals such as serious pulse waves of an/old and feeble persons and handicapped persons. -
A RF front-end module is designed for GIS(Gas Insulated Substation) which is employed for effective and efficient very high voltage transmission. Major advantage of the unit is improved PO detection sensitivity through minimizing the effect of surrounding interference signals, which is achieved by controlling the gain and the selection of the frequency band, for the precise detection of any UHF PO (Partial Discharge) disturbance occurred in the GIS due to some unwanted problems. For the development of the module, various switches for providing selected signal paths, wideband LNA, 3 BPF for selecting detection frequency band, and video detector are designed, fabricated and measured on 1 mm FR4 substrate with various RF components. The detection sensitivity of the unit was <-60 dBm that is sufficient to detect UHF PO signals as low as 1 pC. It is believed that the value is enough to detect the signal occurred in GIS.
-
The two-dimensional modeling of the non-stationary thermal state and voltage responsivity of the sensitive elements usually used in solid-state pyroelectric focal plane arrays are presented. Temperature distributions under periodical thermal excitation and the response of the thermal imaging device, which is composed of the pyroelectric sensitive elements mounted on a single silicon substrate, are numerically calculated. The sensitive element consists of a covering metal layer, infrared polymer absorber, front metal contact, sensitive pyroelectric element, the interconnecting column and the bulk silicon readout. The results of the numerical modeling show that the thermal crosstalk between sensitive elements to be critical especially at low frequency (f < 10Hz) of periodically modulated light. It is also shown that the use of our models gives the possibility to improve the design, operating regimes and sensitivity of the device.
-
Overlap errors and side-lobes can be simultaneously solved by the rule-based correction using scattering bars with the rules extracted from test patterns. Process parameters affecting the attPSM lithography simulation have been determined by the fitting method to the process data. Overlap errors have been solved applying the correction rules to the metal patterns overlapped with contact/via. Moreover, the optimal insertion rule of the scattering bars has made it possible to suppress the side-lobes and to get additional pattern fidelity at the same time.
-
We investigated field-effect ion-transport devices based on carbon nanotubes by using classical molecular dynamics simulations under applied external force fields, and we present model schematics that car be applied to the nanoscale data storage devices and unipolar ionic field-effect transistors. As the applied external force field is increased, potassium ions rapidly flow through the nanochannel. Under low external force fields, ther nal fluctuations of the nanochannels affect tunneling of the potassium ions whereas the effects of thermal fluctuations are negligible under high external force fields. Since the electric current conductivity increases when potassium ions are inserted into fullerenes or carbon nanotubes, the field effect due to the gate, which can modify the position of the potassium ions, changes the tunneling current between the drain and the source.
-
This paper is an interference analysis from S-DAB(Satellite-Digital Audio Broadcasting) into terrestrial IMT-2000 systems intending to use the band 2630-2 655 MHz and that could be used to determine the impact of SDAB on terrestrial IMT-2000 in the context of co-frequency sharing through the development of pfd masks.
-
Han Dong Ok;Choi Seung Chul;Lim Ji Hoon;Choo Sung Joong;Shin Sang Chul;Lee Jun Jae;Shim SunIl;Park Jung Ho 796
The main research on this paper is to model on-chip inductor in digital CMOS technology by using the foundry parameters and the physical structure. The s-parameters of a spiral inductor are extracted from the modeled equivalent circuit and then compared to the results obtained from HFSS. The structure and material of the inductor used for modeling in this work is identical with those of the inductor fabricated by CMOS process. To show why the modeled inductor instead of ideal inductor should be used to design a RF system, we designed dual band RF front-end receiver and then compared the results between when using the ideal inductor and using the modeled inductor. -
The current drive in an MOSFET is limited by the intrinsic channel resistance. All the other parasitic elements in a device structure playa significant role and degrade the device performance. These other resistances need to be less than
$10{\%}-20{\%}$ of the channel resistance. To achieve the requirements, we should investigate the methodology of separation and quantification of those resistances. In this paper, we developed the extraction method of resistances using calibrated TCAD simulation. The resistance of the extension region is also partially determined by the formation of a surface accumulation region that forms under the gate in the tail region of the extension profile. This resistance is strongly affected by the abruptness of the extension profile because the steeper the profile is, the shorter this accumulation region will be. -
It is essential to calibrate a camera in order to recover 3-dimensional reconstruction from uncalibrated images. This paper proposes a new technique of the camera calibration using a homography between the planar patterns image taken by the camera, which is located at the three planar patterns image. Since the proposed method should be computed from the homography among the three planar patterns from a single image, it is implemented more easily and simply to recover 3D object than the conventional. Experimental results show the performances of the proposed method are the better than the conventional. We demonstrate the examples of 3D reconstruction using the proposed algorithm from image sequence.
-
In this paper, a background initialization for video surveillance proposed. The proposed algorithm is that the background images are sampled n frames during
${\Delta}t$ All Sampling frames are divided by$M{\times}N$ size block every frame. Average values of pixels for same location block of the sampling frames during${\Delta}t$ t are taken. then the maximum intensity$\alpha$ and the minimun intensity$\beta$ is obtained, respecticely. The intial by$M{\times}N$ size block, then average intensity$\eta$ of pixels for the block is obtained. If the average intensity$\eta$ is out of the initial range of the background image, it is decided the moving object image, and if the average intensity$\eta$ is included in the initial range of the background image. it is decided the background image. To examine the propriety of the proposed algorithm in this paper, the accuracy and robustness evaluation results for human and car in the indoor and outdoor enviroment. the error rate of the proposed method is less than the existing methods and the extraction rate of the proposed method is better than the existing methods. -
A Study on the Preprocessing Method Using Construction of Watershed for Character Image segmentationOff-line handwritten character recognition is in difficulty of incomplete preprocessing because it has not dynamic and timing information besides has various handwriting, extreme overlap of the consonant and vowel and many error image of stroke. Consequently off-line handwritten character recognition needs to study about preprocessing of various methods such as binarization and thinning. This paper considers running time of watershed algorithm and the quality of resulting image as preprocessing For off-line handwritten Korean character recognition. So it proposes application of effective watershed algorithm for segmentation of character region and background region in gray level character image and segmentation function for binarization image and segmentation function for binarization by extracted watershed image. Besides it proposes thinning methods which effectively extracts skeleton through conditional test mask considering running time and quality. of skeleton, estimates efficiency of existing methods and this paper's methods as running time and quality. Watershed image conversion uses prewitt operator for gradient image conversion, extracts local minima considering 8-neighborhood pixel. And methods by using difference of mean value is used in region merging step, Converted watershed image by means of this methods separates effectively character region and background region applying to segmentation function. Average execution time on the previous method was 2.16 second and on this paper method was 1.72 second. We prove that this paper's method removed noise effectively with overlap stroke as compared with the previous method.
-
To transmit MPEG-2 video on an erroneous channel, a number of error control techniques He needed. Especially, error concealment techniques which can be implemented on receivers independent of transmitters are essential to obtain good video quality. In this paper, a motion adaptive boundary matching algorithm (MA-BMA) is presented for temporal error concealment. Before carrying out BMA, we perform error concealmmt by a motion vector prediction using neighboring motion vectors. If the candidate of error concealment is rot satisfied, search range and reliable boundary pixels are selected by the motion activity or motion vectors ane a damaged macroblock is concealed by applying the MA-BMA. This error concealment technique reduces the complexity and maintains PSNR gain of 0.3 0.7dB compared to the conventional BMA.
-
In this paper, A tracking of the moving objects using normalized hue distribution in HSI color model was proposed. Moving objects are detected by using difference image method and integral projection method to background image and objects image only with hue area. Hue information of the detected moving area are normalized by 24 levels from
$0^{\circ}$ to$3600^{\circ}A$ distance in between normalized levels with a hue distribution chart of the normalized moving objects is used for the identity distinction feature parameters of the moving objects. To examine proposed method in this paper, image of moving cars are obtained by setting up three cameras at different places every 1 km on outer motorway. The simulation results of identity distinction show that it is possible to distinct the identity a distance in between normalization levels of a hue distribution chart without background. -
-
In this paper, we proposed a blind watermarking algorithm to use characteristics of a scalar quantizer which is similar with the recommended in the JPEG2000 and JPEG. This algorithm shifts a quantization index according to the value of each watermark bit to prevent losing the watermark information during the compression by quantization. Therefore, the watermark is embedded during the process of quantization, not an additional process for watermarking, and adaptively applied as an assigned quantizer according to application area. In the embedding process, a LFSR(Linear feedback shift register) is used to hide the watermarking positions. Therefore the embedded watermark can be extracted by only the owner who knows the initial value of LFSR without the original image. The experimental results showed that the proposed algorithm satisfies the robustness and imperceptibility corresponding to the major requirement of watermarking.
-
This paper describes ASIC design for brightness revision control, A LED Pixel Matrix (LPM) design and LPM in natural color LED vision. A designed chip has 256 levels of gradation correspond to each Red, Green, Blue LED pixel respectively, which have received 8bit image data. In order to maintain color uniformity by reducing the original rank error of LED, we adjusted the specific character value 'a' and brightness revision value 'b' to pixel unit, module unit and LED vision respectively by brightness characteristic function with 'Y=aX+b'. In this paper, if designed custom chip and brightness revision control method are applied to manufacturing of natural color LED vision, we can obtain good quality of image. Furthermore, it may decrease the cost for manufacturing LED vision or installing the plants.
-
The aim of this study is to compare the classification results for choosing the fuzzy membership function within fuzzy rules. There are various methods of extracting rules from training data in the process of fuzzy rules generation. Pattern distribution characteristics are considered to produce fuzzy rules. The accuracy of classification results are depended on not only considering the characteristics of fuzzy subspaces but also choosing the fuzzy membership functions. This paper shows how to produce various type of fuzzy rules from the partitioning the pattern spaces and results of land cover classification in satellite remote sensing images by adopting various fuzzy membership functions. The experiments of this study is applied to Landsat TM image and the results of classification are compared by fuzzy membership functions.
-
Compared to the bar code which is being widely used for commercial products management, color code is advantageous in both the outlook and the number of combinations. And the color code has application areas complement to the RFID's. However, due to the severe distortion of the color component values, which is easily over
$50{\%}$ of the scale, color codes have difficulty in finding applications in the industry. To improve the accuracy of recognition of color codes, it'd better to statistically process an entire color region and then determine its color than to process some samples selected from the region. For this purpose, we suggest a technique to detect edges between color regions in this paper, which is indispensable for an accurate segmentation of color regions. We first transformed RGB color image to HSI and YIQ color models, and then extracted I- and Y-components from them, respectively. Then we performed Canny edge detection on each component image. Each edge image usually had some edges missing. However, since the resulting edge images were complementary, we could obtain an optimal edge image by combining them. -
The usable output of glassware formation production line depends, among other factors, on the weight and shape of a lump of hot molten glass called a gob. In this paper, an automated image processing system for monitoring gob weight and shape on a production line is proposed. Present techniques often rely on manual weighing of gobs on a sample basis by manually controlling the gob feeder. The proposed automated image monitoring system checks the weight and shape of every free-falling gob before it reaches the mould. In this system, the estimated weight of the gob is sufficiently close to its actual weight.
-
Image data processing on the region of interest (ROI) for providing the primary information is needed the view of saving search time and bandwidth over image communications related to web browsing, image database, and telemedicine, etc. Hence, the issue on extracting the region of interest is drawing a plenty of attention for the communication environment with a relatively low bandwidth such as mobile internet. In this paper, we propose a improved standard Maxshift method. The proposed algorithm compress image that includes multiple ROI using Maxshift method in Part 1 of JPEG2000. Simulation results show that proposed method increases PSNR vs. compression ratio performance above the Maxshift method.
-
This paper describes preliminary results we have obtained in developing a computer vision system based on active IR illumination for real time gaze tracking for interactive graphic display. Unlike most of the existing gaze tracking techniques, which often require assuming a static head to work well and require a cumbersome calibration process for each person, our gaze tracker can perform robust and accurate gaze estimation without calibration and under rather significant head movement. This is made possible by a new gaze calibration procedure that identifies the mapping from pupil parameters to screen coordinates using the Generalized Regression Neural Networks (GRNN). With GRNN, the mapping does not have to be an analytical function and head movement is explicitly accounted for by the gaze mapping function. Furthermore, the mapping function can generalize to other individuals not used in the training. The effectiveness of our gaze tracker is demonstrated by preliminary experiments that involve gaze-contingent interactive graphic display.
-
Non-intrusive methods based on active remote IR illumination for eye tracking is important for many applications of vision-based man-machine interaction. One problem that has plagued those methods is their sensitivity to lighting condition change. This tends to significantly limit their scope of application. In this paper, we present a new real-time eye detection and tracking methodology that works under variable and realistic lighting conditions. Based on combining the bright-pupil effect resulted from IR light and the conventional appearance-based object recognition technique, our method can robustly track eyes when the pupils are not very bright due to significant external illumination interferences. The appearance model is incorporated in both eyes detection and tracking via the use of support vector machine and the mean shift tracking. Additional improvement is achieved from modifying the image acquisition apparatus including the illuminator and the camera.
-
In this paper, a new analytic approach for shape preserving contrast enhancement is presented. Contrast enhancement is achieved by means of segmental histogram stretching modification which preserves the given image shape, not distorting the original shape. After global stretching, the image is partitioned into several level-sets according to threshold condition. The image information of each level-set is represented as typical value based on grouped differential values. The basic property is modified into common local schemes, thereby introducing the enhanced effect through extreme discrimination between subsets. The scheme is based on stretching the histogram of subsets in which the intensity gray levels between connected pixels are approximately same In spite of histogram widening, stretched by local image information, it neither creates nor destroys the original image, thereby preserving image shape and enhancing the contrast. By designing local histogram stretching operations, we can preserve the original shape of level-sets of the image, and also enhance the global intensity. Thus it can hold the main properties of both global and local image schemes, which leads to versatile applications in the field of digital epigraphy.
-
In this paper, thermal response analysis of a temperature controlled three-axis accelerometer for high temperature environments with integrated micro-heaters and temperature sensors is investigated with finite element method (FEM) program, ANSYS and infrared thermal measurement systems. And availability to application fields from a viewpoint about short thermal response time is discussed. In this paper, the time of three-axis accelerometer for high temperatures becoming
$300^{\circ}C$ by integrated micro-heaters and temperature sensors to reduce thermal drift characteristics was analyzed as a thermal response time of this device. The simulated thermal response time (time until SOI piezoresistors actually becomes$300^{\circ}C$ ) of three-axis accelerometer for high temperatures with ANSYS is about 0.6s, and measured result with infrared temperature measurement systems is about 0.64s. Experimental results using infrared thermal measurement systems agreed well with these theoretical results. -
The buried fiber optic cable as a distributed intrusion sensor for detecting and locating intruders along the long perimeters is proposed. Phase changes resulting from either the pressure of the intruder on the ground immediately above the buried fiber or from seismic disturbances in the vicinity are sensed by a phase-sensitive optical time-domain reflectometer. Light pulses from a Er:fiber cw laser with a narrow, <3kHz-range, spectral width and a frequency drift of < 1 MHz/min are injected into one end of the fiber, and the backscattered light from the fiber is monitored with a photodetector. Results of preliminary studies, measurement of phase changes produced by pressure and seismic disturbances in buried fiber optic cables and simulation of
${\varphi}-OTDR$ response over long fiber paths, to establish the feasibility of the concept are described. The field experiments indicate adequate phase changes, more than 1t-rad, are produced by intruders on foot and vehicle for burial depths in the 0.2 m to 1 m range in sand, clay and fine gravel soils. The simulations predict a range of 10 km with 35 m range resolution and 30 km with 90 m range resolution. This technology could in a cost-effective manner provide enhanced perimeter security. -
This paper presents the design and simulation results of 7 waveguide dielectric rod array antennas for 7 channel DBF(Digital beamformer) receivers for stratospheric system. A waveguide. dielectric antenna type, which has FTEP(Flat-toped element pattern) to manufacture easily. Also, the calculated element patterns according to the permittivity are compared. The designed antenna will be used for generating multibeam radiation pattern by means DBF.
-
High-speed IC for time-division multiplexing (TDM) optical transmission systems have been designed and fabricated by using InP heterojunction-bipolar-transistor (HBT) technology. The driver IC was developed for driving external modulators, featuring differential outputs and the operation speed up to 10 Gbps with an output voltage swing of 1.3 Vpp at each output which was the limit of the measurement. Because -3 dB frequency was 20GHz, this circuit will be operated up to 20Gbps. 1.3Vpp differential output was achieved by switching 50 mA into a 50
$\Omega$ load. The power dissipation of the driver IC was 1W using a single supply voltage of -3.5Y. Input md output return loss of the IC were better than 10 dB and 15 dB, respectively, from DC to 20GHz. The chip size of fabricated IC was$1.7{\Box}1.2 mm^{2}$ . -
Fast and high-quality document clustering algorithms play an important role in providing data exploration by organizing large amounts of information into a small number of meaningful clusters. Hierarchical clustering improves the performance of retrieval and makes that users can understand easily. For outperforming of clustering, we implemented hierarchical structure with variety and readability, by careful selection of cluster topic words and deciding the number of clusters dynamically. It is important to select topic words because hierarchical clustering structure is summarizes result of searching. We made choice of noun word as a cluster topic word. The quality of topic words is increased
$33\%$ as follows. As the topic word of each cluster, the only noun word is extracted for the top-level cluster and the used topic words for the children clusters were not reused. -
This paper describes constant alarm rates process of millimeter wave radar that exits on non-stationary target detection schemes in the ground clutter conditions. The comparison of various CFAR processes such as CA(Cell-Average)-CFAR, GO(Greatest Of)/SO(Smallest Of)-CFAR and OS(Order Statistics)-CFAR performance are applied. Using matlab software, we show the performance and loss between detection probability and signal to noise ratio. When rang bins increase, this results show the OS-CFAR process performance is better than any others and satisfies the optimal detection probability without loss of detection in the homogeneous clutter.
-
There is scientific work containing the recurrence method of synthesis the new class of orthogonal circle m-invariant signals: designed effective algorithms of fast-direct computing m-convolution in time domain: engineer methods of design economic scheme of decoders for optimal receiving in aggregate of suggested signal.