http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
이종근,최돈승,이경석 國立 昌原大學校 精報通信硏究所 1998 精報通信論文集 Vol.2 No.-
In this paper, we introduce the authentication methods in data communication to reduce the information risks. Specially, we summarize cipher algorithms, digital signature and access control methods to protect information.
첨단 차량/도로 시스템(AVHS)을 위한 통신 시스템의 신뢰도 분석 : 차량 간 통신에 대하여 Vehicle-to-Vehicle Communication
한기철,김응배,남옥우,김재형 國立 昌原大學校 情報通信硏究所 1997 精報通信論文集 Vol.1 No.-
ITS(Intelligent Transportation System) is the most promising method to maximize the efficiency on existing highways. The major tool that enables ITS schemes is wireless communications either existing dedicated wireless systems. The subject of communication architecture for AVHS has been considered by many in the literature[1-3]. In normal, the length of communication link in vehicle-to-vehicle is relatively short but it suffers from multipath fading and interference. The communication scheme in AVHS needs a extremely high reliability and a very short communication cycle. The objective is to assess the reliability of various communication schemes as a function of the given bandwidth, the distance of communication link and frequency reuse factor. Specifically, TDMA system was considered. To increase the reliability of transmission in a fading environment, the block coded BPSK with perfect channel state information was considered. We present the analytical results of the reliability of TDMA with block code at given transmission bandwidth, frequency reuse distance.
황재문,정성환 國立 昌原大學校 精報通信硏究所 1999 精報通信論文集 Vol.3 No.-
Recently, as spreading of computer supplement and development of communication technology using network, the web users have rapidly increased in number on Internet environment. Then, new technology development to efficiently classify and retrieve this increasing information is necessarily required. In this paper, we propose a method of information classification with text-mining technique based on the document indexing method using representative keywords for efficient information retrieval. In the experimental results using total 1,200 Korean language articles of 4 categories, the proposed method shows average about 95% performance except information communication category in the classification rate.
박정빈,정성환,이우선 國立 昌原大學校 精報通信硏究所 1999 精報通信論文集 Vol.3 No.-
Recently, with advance in computer network and multimedia technology, digital media is rapidly proliferating, and digital copy has been widely practiced. So an efficient technology for the protection of intellectual property is required. Watermark techniques effectively protect the intellectual property for multimedia data, and can prevent an unauthorized person from copying the multimedia data. In this paper, we propose a watermarking scheme to hide watermark information in low-frequency and high-frequency of wavelet transform. Experimental results show that the proposed watermark scheme is robust to several distortions including Gaussian noise and filtering, compression and contrast at different qualities.
문현정,우용태,옥수호 國立 昌原大學校 情報通信硏究所 1997 精報通信論文集 Vol.1 No.-
All the data in the real world have time-varying aspects which are difficult to include in traditional databases that only maintain the data at current time. To solve this problem, temporal databases have been studied by many researchers for two decades. In this paper we present a new bitemporal data model where its bitemporal algebra is adequate to NF²such as extensible relational and object-oriented databases. In this model, transaction and valid time is incorporated to maintain the history of event occurrences such as the data and the valid data history in the real world. Bitemporal objects of this model consist of generic objects with implicit transaction time and historical objects with implicit transaction time and explicit valid time.
홍수민,정성환 國立 昌原大學校 精報通信硏究所 1998 精報通信論文集 Vol.2 No.-
This paper presents a novel method of signature-based video cut detection in a transform domain. First, we partition a video frame into m x n cells and extract DC information from DCT coefficients. We construct frame signatures using extracted DC information and then compare neighbor frame signatures to detect a cut. The conventional methods have the problems of complex calculation, exhaustive processing time, and strong space. The proposed method is an effective and simple method which may solve the problems of these conventional methods. In the experiment using real AVI video data, our method shows about 88% cut detection rate.
강영미,정성환 國立 昌原大學校 精報通信硏究所 1998 精報通信論文集 Vol.2 No.-
In this paper, a face recognition system is proposed, which extracts the feature region in a color face image an recognizes a face using neural net. First, we transform RGB color model into HSI and seek a facial region by hue component range. Next, using Wavelet transform, we remove unnecessary details and extract a feature region. Finally, we recognize the face of an extracted feature region using ART2 neural net. The proposed method does not require individual feature extraction because a feature region preserves its detailed information for each face. It can also process the information in Wavelet transform domain. Therefore, the proposed method can extract features efficiently in large image databases. In the experiment with 150 facial images, the proposed method shows about 93% recognition rate.
사용자 입력을 허용하는 알고리즘 시각화 시스템의 설계 및 구현
이신주,이수현 國立 昌原大學校 精報通信硏究所 1999 精報通信論文集 Vol.3 No.-
The algorithm visualization means the pictorial representations of program structure, algorithm and data structure. That is useful for the program testing and education of data structures and algorithms. JAWAA is a simple command language for creating animations of data structures and displaying them with a web browser. In this research, we can automatically store in a script file the command by which user draw own graphs using user interface and run by the JAWAA applet and selected Algorithm when the applet's web page is accessed through the web.
이종근,최돈승,이경석 國立 昌原大學校 精報通信硏究所 1998 精報通信論文集 Vol.2 No.-
After introduced the modes of cipher-operation in block cryptograpic algorithm like as ECB(Electronic Codebook), CBC(Cipher Block Chaining), CFB(Cipher Feedback) and OFB(Output Feedback), we are introduced a advanced modes of cipher-operation for reduced information risk.
장기화,우용태 國立 昌原大學校 精報通信硏究所 1998 精報通信論文集 Vol.2 No.-
In this paper, we propose a new type of gateway system for WWW-Oracle interface. It supports various types of relational queries on the WWW such as join between two tables, one level nested queries, ORDER BY and GROUP BY operations in conditional clause. In addition, an application designer can suggest an access method for a table by query selection with a hint option on the WWW. It causes the Oracle optimizer to chose the specified access path. By this function, an application designer can choose more efficient way than the optimizer can determine. The designer can also check the execution time of the SQL statement on the WWW.