Kyungpook National University

Displaying 1-14 of 14 results

  • White Papers // Nov 2013

    Analysis of Wireless Power Transmission

    The advent of various wireless technologies have revolutionized the communication infrastructure and consequently changed the entire world into a global village. Use of wireless technology has also been made for transmission of electric power wirelessly. It increases the portability of power systems and integrates the communication technologies and electric power...

    Provided By Kyungpook National University

  • White Papers // Dec 2012

    Design of Optimal Waveforms in MIMO Radar Systems Based on the Generalized Approach to Signal Processing

    The authors consider the problem of waveform design for Multiple-Input Multiple-Output (MIMO) radar systems employing the generalized detector that is constructed based on the generalized approach to signal processing in noise. They investigate the case of an extended target and without limiting ourselves to orthogonal waveforms. Instead, they develop a...

    Provided By Kyungpook National University

  • White Papers // Oct 2012

    A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output

    The goal of a fault injection attack is to extract a secret key which is embedded in a cryptographic device by injecting a fault during execution of the algorithm. In particular, an attacker can extract the master key of the Advanced Encryption Standard (AES) using only a one-byte fault injection....

    Provided By Kyungpook National University

  • White Papers // Feb 2012

    Adaptive Global Asymptotic Stable Based on Model Reference and Disturbance Attenuation for MIMO Uncertain Linear Systems with Persistent Disturbances

    In this paper, the authors address an Adaptive Global Asymptotical Stable (adaptive GAS) controller for Multi-Input Multi Output (MIMO) uncertain linear systems based on the model reference adaptive control. There are many uncertainties, such as system parameter uncertainties, external load disturbance, friction force and model uncertainty. These are always reducing...

    Provided By Kyungpook National University

  • White Papers // Feb 2011

    A Voice Operating System Designed by the Combination of VB6 and SAPI Software

    This paper presents a technique for recognition of voice command (say) by analyzing and matching word with a number of words stored in the computer. Such a technique of recognition of a word is useful in the execution of a voice command in the process control, robot system or for...

    Provided By Kyungpook National University

  • White Papers // Feb 2011

    The Standard of Embedded World by Studying of OSEK/VDX

    This paper will describe the concept of a real-time operating system, capable of multitasking, which can be used for motor vehicles. Embedded systems are characterized by stringent real-time requirements. Therefore the OSEK/VDX operating system offers the necessary functionality to support event driven control systems. This paper also specifies the OSEK/VDX...

    Provided By Kyungpook National University

  • White Papers // Dec 2010

    An Empirical Study About RFID Acceptance - Focus on the Employees in Korea -

    The number of the companies accepting RFID in Korea has been increased continuously due to the domestic development of information technology. The acceptance of RFID by companies in Korea enabled them to do business with many global enterprises in a much more efficient and effective way. According to a survey,...

    Provided By Kyungpook National University

  • White Papers // Dec 2010

    Analyzing Routing Protocols for Underwater Wireless Sensor Networks

    UnderWater Sensor Networks (UWSN) resembles terrestrial sensor networks in many aspects. However, the high propagation delay and limited bandwidth make terrestrial sensor network's protocols unsuitable for UWSN. For instance, routing protocols proposed for terrestrial networks are not applicable in an underwater network. Therefore, enormous efforts have been made for designing...

    Provided By Kyungpook National University

  • White Papers // Sep 2010

    Seamless Multicast Handover in Fmipv6-Based Networks

    This paper proposes a fast tree join scheme to provide seamless multicast handover in the mobile networks based on the Fast Mobile IPv6 (FMIPv6). In the existing FMIPv6-based multicast handover scheme, the bi-directional tunneling or the remote subscription is employed with the packet forwarding from the previous Access Router (AR)...

    Provided By Kyungpook National University

  • White Papers // Jun 2010

    The Trend of The Security Research for The Insider Cyber Threat

    In this paper, the authors discuss an insider security which has been one of the biggest issues in the network security. By surveying and analyzing an issue of previous studies, they suggest an effective approach for future research. Approximately 90% of the information leakage incidents are recently being performed by...

    Provided By Kyungpook National University

  • White Papers // Jan 2010

    A Study on the Application of an AMR Speech Codec to VoIP

    Degradation of speech quality caused by packet loss of voice traffic is still one of critical technical barriers of VoIP system. The paper proposes a new VoIP system that can adapt transmission bit rate flexibly to network conditions to reduce packet loss. In order to determine the transmission bit rate...

    Provided By Kyungpook National University

  • White Papers // Jul 2009

    Optimal Combining, Partial Cancellation and Channel Estimation and Correlation in DS-CDMA Systems Employing The Generalized Detector

    The Symbol-Error Rate (SER) of a quadrature subbranch hybrid selection/maximal-ratio combining scheme for 1-D modulations in Rayleigh fading under employment of the Generalized Detector (GD), which is constructed based on the generalized approach to signal processing in noise, is investigated. At the GD, N diversity branches are split into 2N...

    Provided By Kyungpook National University

  • White Papers // Jun 2009

    Global Security Using Human Face Understanding Under Vision Ubiquitous Architecture System

    Different methods containing biometric algorithms are presented for the representation of eigenfaces detection including face recognition, are identification and verification. The theme of this research is to manage the critical processing stages (accuracy, speed, security and monitoring) of face activities with the flexibility of searching and edit the secure authorized...

    Provided By Kyungpook National University

  • White Papers // May 2006

    Improved Double Auction Protocol Based on a Hybrid Trust Model

    The researchers proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive in computation, and are not robust in dealing with system malfunction or user misbehavior. In this paper, they propose a secure and practical double auction protocols based...

    Provided By Kyungpook National University

  • White Papers // Dec 2012

    Design of Optimal Waveforms in MIMO Radar Systems Based on the Generalized Approach to Signal Processing

    The authors consider the problem of waveform design for Multiple-Input Multiple-Output (MIMO) radar systems employing the generalized detector that is constructed based on the generalized approach to signal processing in noise. They investigate the case of an extended target and without limiting ourselves to orthogonal waveforms. Instead, they develop a...

    Provided By Kyungpook National University

  • White Papers // Jul 2009

    Optimal Combining, Partial Cancellation and Channel Estimation and Correlation in DS-CDMA Systems Employing The Generalized Detector

    The Symbol-Error Rate (SER) of a quadrature subbranch hybrid selection/maximal-ratio combining scheme for 1-D modulations in Rayleigh fading under employment of the Generalized Detector (GD), which is constructed based on the generalized approach to signal processing in noise, is investigated. At the GD, N diversity branches are split into 2N...

    Provided By Kyungpook National University

  • White Papers // Feb 2012

    Adaptive Global Asymptotic Stable Based on Model Reference and Disturbance Attenuation for MIMO Uncertain Linear Systems with Persistent Disturbances

    In this paper, the authors address an Adaptive Global Asymptotical Stable (adaptive GAS) controller for Multi-Input Multi Output (MIMO) uncertain linear systems based on the model reference adaptive control. There are many uncertainties, such as system parameter uncertainties, external load disturbance, friction force and model uncertainty. These are always reducing...

    Provided By Kyungpook National University

  • White Papers // Jun 2010

    The Trend of The Security Research for The Insider Cyber Threat

    In this paper, the authors discuss an insider security which has been one of the biggest issues in the network security. By surveying and analyzing an issue of previous studies, they suggest an effective approach for future research. Approximately 90% of the information leakage incidents are recently being performed by...

    Provided By Kyungpook National University

  • White Papers // Oct 2012

    A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output

    The goal of a fault injection attack is to extract a secret key which is embedded in a cryptographic device by injecting a fault during execution of the algorithm. In particular, an attacker can extract the master key of the Advanced Encryption Standard (AES) using only a one-byte fault injection....

    Provided By Kyungpook National University

  • White Papers // Jan 2010

    A Study on the Application of an AMR Speech Codec to VoIP

    Degradation of speech quality caused by packet loss of voice traffic is still one of critical technical barriers of VoIP system. The paper proposes a new VoIP system that can adapt transmission bit rate flexibly to network conditions to reduce packet loss. In order to determine the transmission bit rate...

    Provided By Kyungpook National University

  • White Papers // Jun 2009

    Global Security Using Human Face Understanding Under Vision Ubiquitous Architecture System

    Different methods containing biometric algorithms are presented for the representation of eigenfaces detection including face recognition, are identification and verification. The theme of this research is to manage the critical processing stages (accuracy, speed, security and monitoring) of face activities with the flexibility of searching and edit the secure authorized...

    Provided By Kyungpook National University

  • White Papers // Dec 2010

    An Empirical Study About RFID Acceptance - Focus on the Employees in Korea -

    The number of the companies accepting RFID in Korea has been increased continuously due to the domestic development of information technology. The acceptance of RFID by companies in Korea enabled them to do business with many global enterprises in a much more efficient and effective way. According to a survey,...

    Provided By Kyungpook National University

  • White Papers // Feb 2011

    A Voice Operating System Designed by the Combination of VB6 and SAPI Software

    This paper presents a technique for recognition of voice command (say) by analyzing and matching word with a number of words stored in the computer. Such a technique of recognition of a word is useful in the execution of a voice command in the process control, robot system or for...

    Provided By Kyungpook National University

  • White Papers // Feb 2011

    The Standard of Embedded World by Studying of OSEK/VDX

    This paper will describe the concept of a real-time operating system, capable of multitasking, which can be used for motor vehicles. Embedded systems are characterized by stringent real-time requirements. Therefore the OSEK/VDX operating system offers the necessary functionality to support event driven control systems. This paper also specifies the OSEK/VDX...

    Provided By Kyungpook National University

  • White Papers // Sep 2010

    Seamless Multicast Handover in Fmipv6-Based Networks

    This paper proposes a fast tree join scheme to provide seamless multicast handover in the mobile networks based on the Fast Mobile IPv6 (FMIPv6). In the existing FMIPv6-based multicast handover scheme, the bi-directional tunneling or the remote subscription is employed with the packet forwarding from the previous Access Router (AR)...

    Provided By Kyungpook National University

  • White Papers // Dec 2010

    Analyzing Routing Protocols for Underwater Wireless Sensor Networks

    UnderWater Sensor Networks (UWSN) resembles terrestrial sensor networks in many aspects. However, the high propagation delay and limited bandwidth make terrestrial sensor network's protocols unsuitable for UWSN. For instance, routing protocols proposed for terrestrial networks are not applicable in an underwater network. Therefore, enormous efforts have been made for designing...

    Provided By Kyungpook National University

  • White Papers // May 2006

    Improved Double Auction Protocol Based on a Hybrid Trust Model

    The researchers proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive in computation, and are not robust in dealing with system malfunction or user misbehavior. In this paper, they propose a secure and practical double auction protocols based...

    Provided By Kyungpook National University

  • White Papers // Nov 2013

    Analysis of Wireless Power Transmission

    The advent of various wireless technologies have revolutionized the communication infrastructure and consequently changed the entire world into a global village. Use of wireless technology has also been made for transmission of electric power wirelessly. It increases the portability of power systems and integrates the communication technologies and electric power...

    Provided By Kyungpook National University