Soongsil University

Displaying 1-7 of 7 results

  • White Papers // Nov 2009

    RCFT : Re-Clustering Formation Technique in Hierarchical Sensor Network

    Because of limited energy of nodes, an important issue for sensor network is efficient use of the energy. The clustering technique reduces energy consumption as cluster head sends sensed information to a sink node. Because of such character of clustering technique, electing cluster head is an important element for networks....

    Provided By Soongsil University

  • White Papers // Nov 2009

    Routing Technique Based on Clustering for Data Duplication Prevention in Wireless Sensor Network

    Wireless Sensor Networks are important to node's energy consumption for long activity of sensor nodes because nodes that compose sensor network are small size, and battery capacity is limited. For energy consumption decrease of sensor nodes, sensor network's routing technique is divided by flat routing and hierarchical routing technique. Specially,...

    Provided By Soongsil University

  • White Papers // Nov 2009

    AES Implementation and Performance Evaluation on 8-Bit Microcontrollers

    The sensor network is a network technique for the implementation of Ubiquitous computing environment. It is wireless network environment that consists of the many sensors of lightweight and low-power. Though sensor network provides various capabilities, it is unable to ensure the secure authentication between nodes. Eventually it causes the losing...

    Provided By Soongsil University

  • White Papers // Jun 2009

    Optimization of SAD Algorithm on VLIW DSP

    SAD (Sum of Absolute Difference) algorithm is heavily used in motion estimation which is computationally highly demanding process in motion picture encoding. To enhance the performance of motion picture encoding on a VLIW processor, an efficient implementation of SAD algorithm on the VLIW processor is essential. SAD algorithm is programmed...

    Provided By Soongsil University

  • White Papers // Jun 2009

    Face Authentication for Access Control Based on SVM Using Class Characteristics

    Face authentication for access control is a face membership authentication which passes the person of the incoming face if he turns out to be one of an enrolled person based on face recognition or rejects if not. Face membership authentication belongs to the two class classification problem where SVM(Support Vector...

    Provided By Soongsil University

  • White Papers // Jun 2009

    Real-Time 3D Feature Extraction Without Explicit 3D Object Reconstruction

    For the communication between human and computer in an interactive computing environment, the gesture recognition is studied vigorously. Therefore, a lot of studies have proposed efficient methods about the recognition algorithm using 2D camera captured images. However, there is a limitation to these methods, such as the extracted features cannot...

    Provided By Soongsil University

  • White Papers // Jan 2009

    A Fast Handoff Using State Information in Mobile VoIP Environment

    Recent growth of the wireless Internet provides various multimedia services including video, audio, and voice. Especially, the VoIP has been become an important technology supporting transmission of voice data over wireless environment. This paper proposes a fast handoff scheme based on state information for guarantee QoS of VoIP services in...

    Provided By Soongsil University

  • White Papers // Jan 2009

    A Fast Handoff Using State Information in Mobile VoIP Environment

    Recent growth of the wireless Internet provides various multimedia services including video, audio, and voice. Especially, the VoIP has been become an important technology supporting transmission of voice data over wireless environment. This paper proposes a fast handoff scheme based on state information for guarantee QoS of VoIP services in...

    Provided By Soongsil University

  • White Papers // Nov 2009

    RCFT : Re-Clustering Formation Technique in Hierarchical Sensor Network

    Because of limited energy of nodes, an important issue for sensor network is efficient use of the energy. The clustering technique reduces energy consumption as cluster head sends sensed information to a sink node. Because of such character of clustering technique, electing cluster head is an important element for networks....

    Provided By Soongsil University

  • White Papers // Nov 2009

    Routing Technique Based on Clustering for Data Duplication Prevention in Wireless Sensor Network

    Wireless Sensor Networks are important to node's energy consumption for long activity of sensor nodes because nodes that compose sensor network are small size, and battery capacity is limited. For energy consumption decrease of sensor nodes, sensor network's routing technique is divided by flat routing and hierarchical routing technique. Specially,...

    Provided By Soongsil University

  • White Papers // Nov 2009

    AES Implementation and Performance Evaluation on 8-Bit Microcontrollers

    The sensor network is a network technique for the implementation of Ubiquitous computing environment. It is wireless network environment that consists of the many sensors of lightweight and low-power. Though sensor network provides various capabilities, it is unable to ensure the secure authentication between nodes. Eventually it causes the losing...

    Provided By Soongsil University

  • White Papers // Jun 2009

    Optimization of SAD Algorithm on VLIW DSP

    SAD (Sum of Absolute Difference) algorithm is heavily used in motion estimation which is computationally highly demanding process in motion picture encoding. To enhance the performance of motion picture encoding on a VLIW processor, an efficient implementation of SAD algorithm on the VLIW processor is essential. SAD algorithm is programmed...

    Provided By Soongsil University

  • White Papers // Jun 2009

    Face Authentication for Access Control Based on SVM Using Class Characteristics

    Face authentication for access control is a face membership authentication which passes the person of the incoming face if he turns out to be one of an enrolled person based on face recognition or rejects if not. Face membership authentication belongs to the two class classification problem where SVM(Support Vector...

    Provided By Soongsil University

  • White Papers // Jun 2009

    Real-Time 3D Feature Extraction Without Explicit 3D Object Reconstruction

    For the communication between human and computer in an interactive computing environment, the gesture recognition is studied vigorously. Therefore, a lot of studies have proposed efficient methods about the recognition algorithm using 2D camera captured images. However, there is a limitation to these methods, such as the extracted features cannot...

    Provided By Soongsil University