• Title/Summary/Keyword: KICS

Search Result 2,286, Processing Time 0.022 seconds

Development of Path-Finding System for Humanoid Robots Based on Image Pattern Recognition (패턴 인식 알고리즘 기반 휴머노이드 경로 시스템 개발)

  • Park, Hyun;Eun, Jin-Hyuk;Park, Hae-Ryeon;Suk, Jung Bong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.925-932
    • /
    • 2012
  • In this paper, we develop a pattern recognition algorithm applied to a humanoid robot which is exploited as a guide for visually handicapped persons to find a desired path to their destinations. Behavior primitives of a humanoid robot are defined, and Canny's edge detection algorithm is employed to extract the pattern and color of the paving blocks that especially devised for visually handicapped persons. Based on these, an efficient path finding algorithm is developed and implemented on a humanoid robot, running on an embedded linux operating system equipped with a video camera. The performance of our algorithm is experimentally examined in terms of the response time and the pattern recognition ratio. In order to validate our algorithm in various realistic environments, the experiments are repeatedly performed by changing the tilt of paving blocks and the brightness in surrounding area. The results show that our algorithm performs sufficiently well to be exploited as a path finding system for visually handicapped persons.

Efficient Radio Resource Allocation for Cognitive Radio Based Multi-hop Systems (다중 홉 무선 인지 시스템에서 효과적인 무선 자원 할당)

  • Shin, Jung-Chae;Min, Seung-Hwa;Cho, Ho-Shin;Jang, Youn-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5A
    • /
    • pp.325-338
    • /
    • 2012
  • In this paper, a radio resource allocation scheme for a multi-hop relay transmission in cognitive radio (CR) system is proposed to support the employment of relay nodes in IEEE 802.22 standard for wireless regional area network (WRAN). An optimization problem is formulated to maximize the number of serving secondary users (SUs) under system constraints such as time-divided frame structure for multiplexing and a single resource-unit to every relay-hop. However, due to mathematical complexity, the optimization problem is solved with a sub-optimal manner instead, which takes three steps in the order of user selection, relay/path selection, and frequency selection. In the numerical analysis, this proposed solution is evaluated in terms of service rate denoting as the ratio of the number of serving SUs to the number of service-requesting SUs. Simulation results show the condition of adopting multi-hop relay and the optimum number of relaying hops by comparing with the performance of 1-hop system.

A Design and Implementation of a Web-based Ship ERP(SHERP) (웹기반 선박용 ERP (SHERP) 설계 및 구현)

  • Kim, Sang-Rak;Bae, Jae-Hak J.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.710-719
    • /
    • 2011
  • Shipping companies have become interested in the development of strategic ship assets management systems which are implemented for high competitiveness and business rationalization to meet the tough business environment of high oil prices and decrease in cargo. In this paper we introduce a ship assets management system that is suitable for the SAN(Ship Area Network) environment. This system is designed to execute business strategy of ship owners giving consideration to requirements of shipping stakeholders. In addition we have implemented it in a web-based ERP system (SHERP) which separates user interface and business logic. The SHERP is based on STEP and PLIB, which are international standards for data exchange of mechanical devices and parts. It also adopts a ship ontology to manage the ship information and knowledge during its life-cycle. The SHERP will be a concrete example of servitization of shipbuilding, as an information system which is used in ships and ship groups.

Analysis on the Correlation Coefficient for the Diversity Technique Combined with Beamforming Using Measurement Data in Underwater Channel Environments (수중 채널 환경에서 측정 데이터를 이용한 빔형성기가 결합된 다이버시티의 상관 계수 분석)

  • Kim, Min-Sang;Cho, Dae-Young;Park, Jong-Won;Lim, Yong-Kon;Ko, Hak-Lim
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.12
    • /
    • pp.1023-1030
    • /
    • 2012
  • The diversity techniques can benefit underwater acoustic communications when the distance between sensors is sufficiently apart, and this leads to the increases in the physical size of the communication system: thus it is very hard to practically use such systems in real-environments. Therefore, in this paper, we have collected data from real underwater cannel environments in order to analyze the usability of diversity combined with beamforming techniques. And we have estimated the fading characteristics from the measurement data, and analyzed the correlation coefficients using the estimated fading characteristics. After analyzing the estimated fading characteristics from the measurements data, we found out that by applying diversity techniques on the output signals from beamformers that perform beamforming from different multipath directions, we can reduce the distance between sensors and at the same time benefit from the diversity gain.

A Study on the Pattern Matching Algorithm of 3D Coordinates for Quality Control in Ship Blocks (선박블록의 정도관리를 위한 3차원 좌표의 패턴매칭 알고리즘에 대한 연구)

  • Lee, Ho Cheol;Lee, Dong Myung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.933-939
    • /
    • 2012
  • In general, the three-dimensional(3D) coordinates of the manufactured ship blocks are measured using the laser measuring equipment by ship engineers. But, many deflections between the measured coordinates in manufactured step and the designed coordinates in the design step are occurred because of the measuring process of ship blocks manually. Thus, the ship engineer should conform the consistency between the measured coordinates and the designed coordinates step by step, and it largely causes the loss of manpower and time. In this paper, the automated pattern matching algorithm of 3D coordinates for quality control in ship blocks is suggested in order to solve this problem, and the performance of the algorithm is analyzed using the 3D coordinates simulation software developed by our research laboratory. The coordinates matching rate of the measured coordinates in the single/multi ship block(s) is about 90.2% under the tolerated distance error range is 20~25cm.

Averaging Methods for Enhancing the Performance of DOA Estimation Under the Rotor Effect (로터 영향 하에서의 DOA 추정 성능 개선을 위한 평균화 방법)

  • Yun, Seonhui;Oh, Jongchan;Kim, Jun O;Choi, Sangwook;Ahn, Jae Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1245-1255
    • /
    • 2012
  • There are various anti-jamming algorithms for the GNSS system which is vulnerable to jamming, and the methods using array antenna show the best performance. Among them, the DOA estimation algorithms to identify the location of the jammer is very important. However, in case of the rotorcraft, the wireless channel which amplitude and phase changes with time is generated by the rotation of the rotor and it affects the performance of existing anti-jamming algorithms. In this paper, we modeled the effect of the rotor in four scenarios according to the correlation of antennas and assured that the performance of DOA estimation algorithms are degraded and saturated regardless of JNR due to the rotor effect. When we use the averaging method to solve this problem, the performance is improved as increasing samples for estimating. And in case of using moving average method with averaging, it shows similar performance. In addition, it reduces the required memory and moderates the variation of DOA estimation.

A Smart DTMC-based Handover Scheme Using Vehicle's Mobility Behavior Profile (차량의 이동성 행동 프로파일을 이용한 DTMC 기반의 스마트 핸드오버 기법)

  • Han, Sang-Hyuck;Kim, Hyun-Woo;Choi, Yong-Hoon;Park, Su-Won;Rhee, Seung-Hyuong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.697-709
    • /
    • 2011
  • For improvement of wireless Internet service quality at vehicle's moving speed, it is advised to reduce the service disruption time by reducing the handover frequency on vehicle's moving path. Particularly, it is advantageous to avoid the handover to cell whose dwell time is short or can be ignored in terms of service continuity and average throughput. This paper proposes the handover scheme that is suitable for vehicle in order to improve the wireless Internet service quality. In the proposed scheme, the handover process continues to be learned before being modeled to Discrete-Time Markov Chain (DTMC). This modeling reduces the handover frequency by preventing the handover to cell that could provide service sufficiently to passenger even when vehicle passed through the cell but there was no need to perform handover. In order to verify the proposed scheme, we observed the average number of handovers, the average RSSI and the average throughput on various moving paths that vehicle moved in the given urban environment. The experiment results confirmed that the proposed scheme was able to provide the improved wireless Internet service to vehicle that moved to some degree of consistency.

Design and Verification of Flow Mobility Scheme tn the AIMS System (AIMS 시스템에서 플로우 이동성 기법의 설계와 검증)

  • Lee, Sung-Kuen;Lee, Kyoung-Hee;Min, Sung-Gi;Lee, Hyo-Beom;Lee, Hyun-Woo;Han, Youn-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7B
    • /
    • pp.760-770
    • /
    • 2011
  • The existing mobility management schemes do not fully support the next generation network, which is composed of IP-based core network and various access networks. Currently, ETRI has been developing the AIMS (Access Independent Mobility Service) system which satisfies the ITU-T requirements of mobility management in the next generation network. The AIMS system is designed to provide a mobile host with a fast and reliable mobility service among heterogeneous access networks. Recently, many user devices have multiple communication interfaces, e.g., 3G and WLAN, and thus they can make two or more network connections at the same time. In this paper, we design a scheme of flow mobility, i.e., the movement of selected data flows from one access technology to another, to be applied in the AIMS system, and verify the proposed scheme through the NS-3 simulation study. From the simulation results, we can know that the proposed flow mobility scheme can utilize the network resource efficiently in the heterogeneous mobile networks.

Implementation of an Efficient Slotted CSMA/CA Anti-collision Protocol for Active RFID System (능동형 RFID 시스템을 위한 효율적인 Slotted CSMA/CA 충돌방지 프로토콜의 구현)

  • Joo, Jin-Hoon;Chung, Sang-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.12
    • /
    • pp.1013-1022
    • /
    • 2012
  • Tag collection is one of the major concerns in radio frequency identification(RFID) system. All tags in RFID reader's transmission range send response message back to the reader in response to collection request message on the given rf channel. When multiple tags respond simultaneously, tag-collision may occur. Tag-collision problem is one of the most important issues in active RFID performance. To mitigate this problem, frame slotted ALOHA(FSA) anti-collision protocol is widely used in active RFID system. Several studies show that the maximum system efficiency of FSA anti-collision protocol is 36.8%. In this paper, we propose an efficient slotted CSMA/CA protocol to improve tag collection performance. We compare our protocol to the FSA anti-collision protocol. For the experiment, an 433MHz active RFID system is implemented, which is composed of an RFID reader and multiple tags. We evaluated the tag collection performance using one RFID reader and 40 tags in the real test bed. The experimental result shows that proposed protocol improves the tag collection time, round and collision probability by 18%, 37.4% and 77.8%, respectively.

A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device (스마트 기기를 이용한 안전한 QR-Login 사용자 인증 프로토콜의 설계 및 중요 정보의 안전성 보증을 위한 방법)

  • Lee, Jae-Sik;You, Han-Na;Cho, Chang-Hyun;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.949-964
    • /
    • 2012
  • Our PC have been under constant threat of malicious codes and viruses today. As many new ways of cyber attacks are being developed, such as zero-day-attack, nobody's PC is guaranteed to be safe from the attacks. In case where a user uses the existing verification protocol on a unsecured PC, the user's verification information may well be threatened by sniffing or man-in-the-middle attack. Especially, deadly attacks like memory hacking would give hard time for users to even recognize any symptom of virus infection. Therefore, this paper designs secured QR-Login user verification protocol for smart devices that are ready to communicate with QR-Code and proposes a way to keep critical data safe when using the internet. This way, user would be able to safeguard his/her critical data even when under attack by unknown attacks and safely carry out extremely sensitive task, like financial trading, on the device.