An Experimental Study of a Single Axis Seesaw Attitude Control Consisting of Motor and Propeller
김재남 Jae Nam Kim , 노민식 Min Shik Roh , 송준범 Jun Beom Song , 송우진 Woo Jin Song , 강범수 Beom Soo Kang , 김정 Jeong Kim
16(1) 1-7, 2012
김재남 Jae Nam Kim , 노민식 Min Shik Roh , 송준범 Jun Beom Song , 송우진 Woo Jin Song , 강범수 Beom Soo Kang , 김정 Jeong Kim
DOI: JANT Vol.16(No.1) 1-7, 2012
In this research, a single-axis attitude control test bed is developed, and simulation and tests experiments are performed, as a preliminary research of a quad-rotor aerial vehicle development. A single-axis test bed with seesaw configuration is manufactured using two motors and propellers, and the aerodynamic parameters are derived by thrust tests. The response of the system is estimated with Matlab/Simulink, and experiments are performed with attitude control computer and an attitude sensor onboard the test bed. Comparing the results of simulated and tested data, factors of steady-state errors during experiments are found, and performances of used attitude control algorithm and the control computer were verified. In these process, essential preliminary data for attitude control of a quad-rotor unmanned aerial vehicle were acquired.
|
Guidance Law of Missiles for Control Impact-Time-and-Angle by Flight Path Angle in Three Dimensional Space
김승호 Sheng Hao Jin , 이천기 Chun Gi Lee , 양빈 Bin-yang , 황정원 Chung Won Hwang , 박승엽 Seung Yub Park
16(1) 8-15, 2012
김승호 Sheng Hao Jin , 이천기 Chun Gi Lee , 양빈 Bin-yang , 황정원 Chung Won Hwang , 박승엽 Seung Yub Park
DOI: JANT Vol.16(No.1) 8-15, 2012
This paper on the assumption that the target is stationary and the velocity of missile is fixed value. In three dimensional space. Using flight path angle to simultaneous control impact-time-and-angle base on a homing guidance law. The independent variable in the nonlinear engagement model is the flight path angle of the missile. The propose homing guidance law can see the controllability of impact-time-and-angle. And also can see the processing of the missile arrive at the target. It is applied to several salvo attack scenarios. The performance of the proposed guidance law is verified by simulations.
|
GPS L1, L2C Signal Acquisition Performance of GPS Software Receiver with respect to Pseudolite Pulsing Scheme
권금철 Keum Cheol Kwon , 양철관 Cheol Kwan Yang , 심덕선 Duk Sun Shim , 정태상 Tae Sang Chung , 기창돈 Chang Don Kee
16(1) 16-26, 2012
권금철 Keum Cheol Kwon , 양철관 Cheol Kwan Yang , 심덕선 Duk Sun Shim , 정태상 Tae Sang Chung , 기창돈 Chang Don Kee
DOI: JANT Vol.16(No.1) 16-26, 2012
Pseudolites are ground-based transmitters that can be configured to emit GPS-like signals for enhancing the GPS by providing increased accuracy, integrity, and availability. However, a pseudolite (PL) can interfere with GPS satellite signals while it is transmitting or cause saturation to automatic gain control circuit. To solve these problems pulsing scheme is used, which transmits PL signal during a short period of time. In this paper the effect of the number of PL and pulsing scheme on the software GPS L1 and L2C signal acquisition performance is studied for the three pulsing schemes such as static pulsing, sweep pulsing, and pseudo random pulsing. For GPS L1 signal, static pulsing shows the best signal acquisition and tracking performance with one PL, and random pulsing shows the best performance with more than or equal to two PLs. For GPS L2C signal, all three pulsing schemes show the similar signal acquisition and tracking performance, but static pulsing shows a little better performance. For GPS L1 and L2C signals, software GPS receivers can do positioning with up to three PLs.
|
Bent slot Loop antenna for the dual band wireless LAN
이영순 Young Soon Lee , 임성균 Seong Gyun Im
16(1) 27-34, 2012
이영순 Young Soon Lee , 임성균 Seong Gyun Im
DOI: JANT Vol.16(No.1) 27-34, 2012
In this paper, Coplanar waveguide(CPW)-fed slot loop antenna, which is applicable to the dual band(2.4GHz~2.4835GHz, 5.15GHz~5.825GHz) for the wireless LAN, is proposed. In order to miniaturize the proposed antenna, slot loop is bent by meandering. The resonant frequencies in the required dual band are adjusted by variation of the resonant length of slot loop as well as slot width. In particular, use of capacitive coupling CPW feed provides impedance matching without a seperate matching circuit, because the amount of electromagnetic coupling can be controlled by the offset between feed and radiator. As a result, it has been observed that the proposed antenna satisfies not only the required return loss(≤10dB) but also has high efficiency(≥80%) over the whole frequency band. In order to check the validity of the proposed antenna, some simulated results for return loss and radiation pattern are presented in comparison with the measured results.
|
Size Reduction of HF Whip Antenna for Ship Communication
박동국 Dong Kook Park , 양규식 Gyu Sik Yang , 정기룡 Gi Ryong Jeong , 김정창 Jeong Chang Kim , 정성훈 Sung Hun Jung
16(1) 35-40, 2012
박동국 Dong Kook Park , 양규식 Gyu Sik Yang , 정기룡 Gi Ryong Jeong , 김정창 Jeong Chang Kim , 정성훈 Sung Hun Jung
DOI: JANT Vol.16(No.1) 35-40, 2012
In this paper, we present the size reduction method of HF whip antenna for ship communication. To reduce the size of the HF whip, the end part of linear whip is modified to helical type. We designed the whip antenna with 60% size of the commercial whip antenna and carried out communication experiments using the commercial and the designed whip antennas. From the experimental results, we found that the proposed whip antenna can replace the commercial whip antenna for ship communication.
|
Analysis on the Infection Process and Abstract of the Hidden Files of Rustock B and C
이경률 Kyung Roul Lee , 임강빈 Kang Bin Yim
16(1) 41-53, 2012
이경률 Kyung Roul Lee , 임강빈 Kang Bin Yim
DOI: JANT Vol.16(No.1) 41-53, 2012
The technologies used by the malicious codes have been being advanced and complicated through a merge of the existing techniques, while the damages by the malicious codes are moving from individuals and industries to organizations and countries. In this situation, the security experts are corresponding with the static analysis and the dynamic analysis such as signature searching and reverse engineering, respectively. However, they have had a hard time to respond against the obfuscated intelligent new zero day malicious codes. Therefore, it is required to prepare a process for a preliminary investigation and consequent detailed investigation on the infection sequence and the hiding mechanism to neutralize the malicious code. In this paper, we studied the formalization of the process against the infection sequence and the file hiding techniques with an empirical application to the Rustock malicious code that is most notorious as a spammer. Using the result, it is expected to promptly respond to newly released malicious codes.
|
RF Circuit Design for IEEE 802.11p Implementation
이세연 Se Yeun Lee , 이명호 Myung Ho Lee
16(1) 54-61, 2012
이세연 Se Yeun Lee , 이명호 Myung Ho Lee
DOI: JANT Vol.16(No.1) 54-61, 2012
The WAVE specification, which for the Next-Generation ITS environment is a common title: IEEE 802.11p and IEEE P1609 specifications. These days, there are many activities for researching WAVE specification by release of the IEEE 802.11p specification. The difference between high-speed vehicle environment and the indoor environment, the wireless communication channel mode is that much more severe. Thus, the wireless communication system design, temperature, noise, multipath fading and can degrade the performance of the system points should be fully considered matters of. In this paper, we showed WAVE wireless communication system which based on IEEE 802.11p PHY/MAC design process, and also showed solving process many implementation problems.
|
Realization of Multiple-Control Toffoli gate based on Mutiple-Valued Quantum Logic
박동영 Dong Young Park
16(1) 62-69, 2012
박동영 Dong Young Park
DOI: JANT Vol.16(No.1) 62-69, 2012
Multiple-control Toffoli(MCT) gates are macro-level multiple-valued gates needing quantum technology dependent primitive gates, and have been used in Galois Field sum-of-product (GFSOP) based synthesis of quantum logic circuit. Reversible logic is very important in quantum computing for low-power circuit design. This paper presents a reversible GF4 multiplier at first, and GF4 multiplier based quaternary MCT gate realization is also proposed. In the comparisons of MCT gate realization, we show the proposed MCT gate can reduce considerably primitive gates and delays in contrast to the composite one of the smaller MCT gates in proportion to the multiple-control input increase.
|
Security Analysis of Block Cipher LED-64 Suitable for Wireless Sensor Network Environments
정기태 Ki Tae Jeong
16(1) 70-75, 2012
정기태 Ki Tae Jeong
DOI: JANT Vol.16(No.1) 70-75, 2012
LED-64 is a 64-bit block cipher proposed in CHES 2011 and suitable for the efficient implementation in constrained hardware environments such as WSN. In this paper, we propose a differential fault analysis on LED-64. In order to recover the secret key of LED-64, this attack requires only one random nibble fault and an exhaustive search of 28. This work is the first known cryptanalytic result on LED-64.
|
A Study on LMS Using Effective User Interface in Mobile Environment
김시정 Si Jung Kim , 조도은 Do Eun Cho
16(1) 76-81, 2012
김시정 Si Jung Kim , 조도은 Do Eun Cho
DOI: JANT Vol.16(No.1) 76-81, 2012
With the spread of the various mobile devices, the studies on the learning management system based on the u-learning are actively proceeding. The u-learning-based learning management system is very convenient in that there are no restrictions on the various access devices as well as the access time and place. However, the judgments on the authentication for the user and whether learning is focused on are difficult. In this paper, the voice and user face capture interface rather than the common user event oriented interface was applied to the learning management system. When a user is accessing the learning management system, user`s registered password is input and login as voice, and the user`s learning attitude is judged through the response utterance of simple words during the process of learning through contents. As a result of evaluating the proposed learning management system, the user`s learning achievement and concentration were improved, thus enabling the manager to monitor the user`s abnormal learning attitude.
|
Design and Implementation of interlocking between Physical Computing and Social Network Service for disabled people
이병훈 Byung Hoon Lee , 장원태 Won Tae Jang , 서재희 Jae Hee Suh
16(1) 82-88, 2012
이병훈 Byung Hoon Lee , 장원태 Won Tae Jang , 서재희 Jae Hee Suh
DOI: JANT Vol.16(No.1) 82-88, 2012
In recent years, social awareness and concern about the SNS is getting a lot and many researches on the social impact of the SNS and variety strategies using SNS have emerged one after another. In this paper, we explain the method of interlocking between SNS and variety sensors in physical computing environment. Especially we propose that interlocking technology between sensors and twitter in Arduino platform(open source environment) can be used for the handicapped people. We design a way to send message via twitter for handicapped people using values from various sensors.
|
Survey for U-Greenhouse System Technology
박상오 Sang Oh Park , 이양선 Yang Sun Lee , 김세한 Se Han Kim , 박지수 Ji Soo Park , 이기정 Ki Jung Yi , 박종혁 Jong Hyuk Park
16(1) 89-95, 2012
박상오 Sang Oh Park , 이양선 Yang Sun Lee , 김세한 Se Han Kim , 박지수 Ji Soo Park , 이기정 Ki Jung Yi , 박종혁 Jong Hyuk Park
DOI: JANT Vol.16(No.1) 89-95, 2012
This paper introduces domestic and international trends and researches related with U-Greenhouse systems. USN (Ubiquitous Sensor Networks), along with the development of networks as well as science and technology, is a new computing paradigm which is the convergence of user-oriented physical activity space and virtual space of electronics and computing and also provides services according to change in surrounding environment at anytime and anywhere. The U-Greenhouse system is to apply USN to agricultural production, logistics and distribution management which are relatively insufficient to utilize IT technology. Thus, applying u-IT technology to agriculture can reinforces international competitiveness of the agricultural sector through the effects such as cost cutting as a rise in output, logistics and distribution management.
|
Performance Analysis of Mobile Internet System in Inter-cell Interference Environment
노재성 Jae Sung Roh , 김영철 Young Chul Kim
16(1) 96-102, 2012
노재성 Jae Sung Roh , 김영철 Young Chul Kim
DOI: JANT Vol.16(No.1) 96-102, 2012
The goal of mobile internet system is to provide a high-data-rate, low-latency and optimized packet radio access technology supporting flexible bandwidth deployments. Therefore, network architecture is designed with the goal to support packet-switched traffic with seamless mobility, quality of service and minimal latency. An important requirement for the mobile internet system is improved cell-edge BER performance and data throughput. This is to provide some level of service consistency in terms of geographical coverage as well as in terms of available data throughput within the communication coverage area. In a cellular system, however, the signal to interference plus noise power ratio gap between cell-center and cell-edge users can be of the order of 20 [dB]. The disparity can be even higher in a communication coverage limited cellular system. This leads to vastly lower data throughputs for the cell-edge users relative to cell-center users creating a large QoS gap. This paper proposes a analytical approach that tries to reduce inter-cell interference, and shows the SIR and BER performance according to the OFDM system parameters in mobile Internet environment.
|
Study on Security Transmission of Personal Patient Information in Aerial Emergency Medical Environments
김순석 Soon Seok Kim , 이용희 Yong Hee Lee , 김동호 Dong Ho Kim , 정호영 Ho Young Jeong , 박세일 Se Il Park
16(1) 103-108, 2012
김순석 Soon Seok Kim , 이용희 Yong Hee Lee , 김동호 Dong Ho Kim , 정호영 Ho Young Jeong , 박세일 Se Il Park
DOI: JANT Vol.16(No.1) 103-108, 2012
The basic service model is to be process transmting patient health information from various medical devices to evacuation hospital through gateway collecting it in aerial emergency medicine environments. In this paper, we study on the most secure transmission scheme in case that personal patient informations are transmitted from medical devices to gateway. Moreover we compare and analyze existing methods on secure transmission and suggest an optimal alternative on the basis of international standard, ISO/IEEE 11073.
|
A Path Analysis of Digital Storytelling using Petri-Net Applied Humanities
김진해 Jin Hae Kim , 정화영 Hwayoung Jeong
16(1) 109-115, 2012
김진해 Jin Hae Kim , 정화영 Hwayoung Jeong
DOI: JANT Vol.16(No.1) 109-115, 2012
Humanities is very difficult area to use the computer. However, recently, convergence trend has increase widely at all of the academic area. Therefore, in this paper, we propose a technical method to use an IT for the popularity of humanities. For this purpose, we implement a path process that use Petri-net to apply digital storytelling to humanities. We also make a structure to connect an examples and questions from sentences or articles as digital storytelling. The digital storytelling consists of six factors; author, synopsis, background, construction, view point, and user`s or reader`s review. Proposed method provides a process to analyze the data path of a literary work using Petri-net.
|
Traditional Culture`s Cloud Digital Archive by approach to the Convergence
김동건 Dong Gun Kim , 정화영 Hwa Young Jeong
16(1) 116-121, 2012
김동건 Dong Gun Kim , 정화영 Hwa Young Jeong
DOI: JANT Vol.16(No.1) 116-121, 2012
This research aimed an application method to connect traditional culture and information technology that is one of the digital convergence area. For this purpose, we proposed cloud digital archive framework for traditional culture. Actually, cloud computing environment is one of new technology trend and would be a important keyword for information technology. This research focus on functional framework that is able to support service in cloud computing environment to connect pansori archive model, one of traditional culture. We also make a data structure and metadata by each characteristics, and insert a service framework to support pansori archive. This structure consists of data evaluation, preservation, and access process. This archive has a relation model with digital archive and metadata.
|
Autonomous flight Algorithm Design
이대용 Dae Yong Lee , 강자영 Ja Young Kang
16(1) 122-130, 2012
이대용 Dae Yong Lee , 강자영 Ja Young Kang
DOI: JANT Vol.16(No.1) 122-130, 2012
Airborne separation assurance is a key requirement for Free Flight. This paper is to propose autonomous flight algorithm, such as extended authority of delegation, efficiency of airspace issue to deal with the empirical solution for free flight, and to measure flight efficiency and conflict detection and resolution (CD&R) by utilizing flight performance data under the two circumstances of scenario with the modeling of proposed algorithm and potential field algorithm. The results show that the autonomous flight algorithm is superior to the potential field algorithm under the circumstances of free flight airspace in terms of algorithm performance, CD&R, and flight efficiency.
|
A Study on the influences of the Distribution Channel Characteristics to Conflict and Partnership Performance between Airlines and Travel Agencies
권명옥 Myung Ok Kwon , 이미혜 Mi Hye Lee
16(1) 131-144, 2012
권명옥 Myung Ok Kwon , 이미혜 Mi Hye Lee
DOI: JANT Vol.16(No.1) 131-144, 2012
The purpose of this study was not only to understand what relations the airlines and the travel agencies, who have developed mutually cooperative relation, forge as a supplier and receiver in light of distribution channel but also to identify how they effect conflict and partnership performance, by which it leads to find how two organizations, i.e., the airlines and the travel agencies should be able to develop a business partner relation to grow together. The findings from the actual analysis were as follows. Firstly, the distribution relation characteristics between the airlines and the travel agencies had a significant effect on conflict. Secondly, the conflict between the airlines and the travel agencies had a significant effect on partnership performance. Thirdly, the distribution relation characteristics between the airlines and the travel agencies had a significant effect on partnership performance both the airlines and the travel agencies.
|
An Application and Error Hooking running on Nested Session Management of Cloud Computing Collaboration Environment
고응남 Eung Nam Ko
16(1) 145-150, 2012
고응남 Eung Nam Ko
DOI: JANT Vol.16(No.1) 145-150, 2012
This paper explains a performance analysis of an error detection system running on nested session management of cloud computing collaboration environment using rule-based DEVS modeling and simulation techniques. In DEVS, a system has a time base, inputs, states, outputs, and functions. This paper explains the design and implementation of the FDA(Fault Detection Agent). FDA is a system that is suitable for detecting software error for multimedia remote control based on nested session management of cloud computing collaboration environment.
|
Age of Face Classification based on Gabor Feature and Fuzzy Support Vector Machines
이현직 Hyun Jik Lee , 김윤호 Yoon Ho Kim , 이주신 Joo Shin Lee
16(1) 151-157, 2012
이현직 Hyun Jik Lee , 김윤호 Yoon Ho Kim , 이주신 Joo Shin Lee
DOI: JANT Vol.16(No.1) 151-157, 2012
Recently, owing to the technology advances in computer science and image processing, age of face classification have become prevalent topics. It is difficult to estimate age of facial shape with statistical figures because facial shape of the person should change due to not only biological gene but also personal habits. In this paper, we proposed a robust age of face classification method by using Gabor feature and fuzzy support vector machine(SVM). Gabor wavelet function is used for extracting facial feature vector and in order to solve the intrinsic age ambiguity problem, a fuzzy support vector machine(FSVM) is introduced. By utilizing the FSVM age membership functions is defined. Some experiments have conducted to testify the proposed approach and experimental results showed that the proposed method can achieve better age of face classification precision.
|
Study on the Improvement of OFDM,64QAM Modem
박진수 Jin Soo Park
16(1) 158-162, 2012
박진수 Jin Soo Park
DOI: JANT Vol.16(No.1) 158-162, 2012
In this paper, we propose a wireless modem, which used OFDM/64QAM method and the ISM band with 2.4GHz radio frequency. In this paper proposed the case of a modem, the main program to process the baseband processor, processing speed, operating voltage, and reliability should be ensured. So we have designed with Ralink`s RT2870, witch was used for Wi-Fi solution. The RT2870 provides full support for wireless LAN standard, and supports various modulation formats, 2.4GHz and 5GHz bands, both of which support chip. In this paper, we also output the modulated signal transmitted wirelessly to the 2.4GHz band RF RT2850 chip processing was applied and using 40MHz band 2.422 ~ 2.462GHz wireless bands were designed to occupy. By applying bi-directional transmission between wireless transmitter and receiver, it can be effectively connected with any kinds of wireless LAN with 2.4GHz ISM band. Therefore it could economically be used as peripheral equipments for POS system or personal wireless device based on Android platform.
|
Application design for automatic transmission the incoming informations of the smart phone
박종안 Jong An Park , 김서궁 Seo Goung Kim , 강성관 Seong Kwan Kang , 천종훈 Jong Hoon Chun , 강광원 Kwang Wan Kang
16(1) 163-170, 2012
박종안 Jong An Park , 김서궁 Seo Goung Kim , 강성관 Seong Kwan Kang , 천종훈 Jong Hoon Chun , 강광원 Kwang Wan Kang
DOI: JANT Vol.16(No.1) 163-170, 2012
This thesis suggests the application to the people who are using smart phone which is based on the Android operation system that makes it available to check their call and sms by a repeater and display in the limited places such as at the swimming pool or spa. This application is designed to save user`s basic information. And when the user gets a call or a sms, it can make the sender number and fundamental information a data by PhonStateListener and SmsReceiver. The data is uploaded by bluetooth of a repeater. The smart phone user can use the repeater to check the received information by display.
|