Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 10, Issue 12 - Dec 2007
Volume 10, Issue 11 - Nov 2007
Volume 10, Issue 10 - Oct 2007
Volume 10, Issue 9 - Sep 2007
Volume 10, Issue 8 - Aug 2007
Volume 10, Issue 7 - Jul 2007
Volume 10, Issue 6 - Jun 2007
Volume 10, Issue 5 - May 2007
Volume 10, Issue 4 - Apr 2007
Volume 10, Issue 3 - Mar 2007
Volume 10, Issue 1 - Jan 2007
Selecting the target year
Semantic Scenes Classification of Sports News Video for Sports Genre Analysis
Song, Mi-Young ;
Journal of Korea Multimedia Society, volume 10, issue 5, 2007, Pages 559~568
Anchor-person scene detection is of significance for video shot semantic parsing and indexing clues extraction in content-based news video indexing and retrieval system. This paper proposes an efficient algorithm extracting anchor ranges that exist in sports news video for unit structuring of sports news. To detect anchor person scenes, first, anchor person candidate scene is decided by DCT coefficients and motion vector information in the MPEG4 compressed video. Then, from the candidate anchor scenes, image processing method is utilized to classify the news video into anchor-person scenes and non-anchor(sports) scenes. The proposed scheme achieves a mean precision and recall of 98% in the anchor-person scenes detection experiment.
POCS Based Digital Watermarking in Buyer-Seller Watermarking Protocal
Kwon, Seong-Geun ; Lee, Ji-Hye ; Lee, Suk-Hwan ; Kwon, Ki-Ryong ;
Journal of Korea Multimedia Society, volume 10, issue 5, 2007, Pages 569~582
Digital watermarking technique for copyright protection and prevention of illegal copy and distribution can provide the reliable transaction to both buyer and seller in e-commerce through the cryptographic protocol such as 'Buyer-seller watermarking protocol'. Recently there has been researched about some cryptographic protocols for watermarking system but there has no yet mentioned about the implementation of practical watermarking technique in protocol. This paper presents the watermark embedding technique based on POCS in buyer-seller watermarking protocol. The proposed method designs the robust convex set based on EZW and the invisible convex set using PSNR and then projects into two sets until the convergence condition is satisfied. Experimental results verified that BER of watermark that is embedded by the proposed method has lower 0.02-0.10 than BER of the conventional method.
A Study on Demand Paging For NAND Flash Memory Storages
Yoo, Yoon-Suk ; Ryu, Yeon-Seung ;
Journal of Korea Multimedia Society, volume 10, issue 5, 2007, Pages 583~593
We study the page replacement algorithms for demand paging, called CFLRU/C, CFLRU/E and DL-CFLRU/E, that reduce the number of erase operations and improve the wear-leveling degree of flash memory. Under the CFLRU/C and CFLRU/E algorithms, the victim page is the least recently used dean page within the pre-specified window. However, when there is not any dean page within the window, the CFLRU/C evicts the dirty page with the lowest frequency while the CFLRU/E evicts the dirty page with the highest number of erase operations. The DL-CFLRU/E algorithm maintains two page lists called the dean page list and the dirty page list, and first finds the page within the dean page list when it selects a victim. However, when it can not find any dean page within the dean page list, it evicts the dirty page with the highest number of erase operations within the window of the dirty page list. In this thesis, we show through simulation that the proposed schemes reduce the number of erase operations and improve the wear-leveling than the existing schemes like LRU.
A Watermarking Scheme of CAD Design Drawing Based on Line, Arc, and Polygon Face Components for Copyright Protection
Moon, Kwang-Seok ; Lee, Suk-Hwan ; Kwon, Seong-Geun ; Kwon, Ki-Ryong ;
Journal of Korea Multimedia Society, volume 10, issue 5, 2007, Pages 594~603
This paper proposes a watermarking scheme for 3D CAD design drawing. In the proposed scheme, we embed binary watermarks into line, arc, and polygon face components that are the basic component of 3D CAD design drawing. The embedding target component can be selected randomly among three components or by the component distribution in drawing. In line components, a watermark bit is embedded into the ratio of the length of a target line and an average length of lines that are connected into a target line. Furthermore, a watermark bit is embedded into a curvature radius on the basis of a center point in a arc component and also is embedded into a ratio of two sides in a polygonal face component. Experimental results verified that the proposed watermarking has the robustness against Format conversion, rotation translation, scaling, cropping, and layer cutting and also SNR of watermarked component is about 39.89-42.50 dB.
An Improvement in Loading Speed Using RAM-based Java Card Installer
Jin, Min-Sik ; Choi, Won-Ho ; Lee, Dong-Wook ; Kim, Han-Na ; Jung, Min-Soo ; Park, Kyoo-Seok ;
Journal of Korea Multimedia Society, volume 10, issue 5, 2007, Pages 604~611
Java Card has gained genera1 acceptance with standard for smart card and (U)SIM technology, and it is in distinction from native card by its post-issuance of an application and independence from hardware platforms. However, a main weak point of Java Card is its low execution speed caused by the hardware limitation and Java programming language itself. In this paper, we propose a new Java Card Installer to improve the download speed during the post-issuance of an application by resolving symbolic references to physical references in HAM. Our Resolution_In_RAM is based on the improved new RAM writing is 100,000 times faster than EEPROM writing and PageBuffer that is operated as block mode, rather than cell mode is used to write to EEPROM. Consequently, the total number of EEPROM writing are reduced 37%, and the times of downloading are reduced over 30% by using the Resolution_In_RAM-based Java Card Installer.
Power-Efficient Broadcasting Scheme for Mobile VOD System
Choi, Young ; Choi, Hwang-Kyu ;
Journal of Korea Multimedia Society, volume 10, issue 5, 2007, Pages 612~622
As compared with wired network environment, mobile VOD service in wireless network environment is difficult to guarantee the quality of VOD service due to the limitation of the system resources. Moreover, the wireless network has small bandwidth resources and short access range so that has limitations for providing the service to a large number of mobile clients. The limited battery capacity of a mobile device becomes an obstacle to mobile clients for enjoying VOD service for a long time. Therefore, these drawbacks should be considered in developing mobile VOD applications. This paper proposes a new technique for improving QoS of mobile VOD service by jointly use of broadcasting technique, which can provide VOD service to a large number of mobile clients simultaneously, and bursty communication technique, which can reduce the power consumption of a mobile device. With having these two techniques, streaming data are divided into segments, each of which is grouped into a particular packet and then transmitted at a time in the busty communication manner. In the performance evaluation, the power consumption on WNIC of a mobile device can be reduced by over 80%, and the initial service delay can be reduced in proportion to the number of channels compared with the existing staggered broadcasting technique.
A Study on Privacy Protect Scheme of RFID Provide Synchronization using Random Number
Kang, Soo-Young ; Lee, Im-Yeong ;
Journal of Korea Multimedia Society, volume 10, issue 5, 2007, Pages 623~630
With the development in IT technology and with growing demands of users, a ubiquitous environment is being made. Because of individuals identification is important in ubiquitous environment, RFID, a technology used frequently. RFID, a technology that radio frequency identification, reader send signer, then tag provide user information. RFID has various strengths, such as high recognition rates, quick recognition speed, but Eavesdropping is possible and problem that user information is revealed happens. To solve this, study is proceeded with activity, but, because of low-cost passive tag is limited operation capability, usually used hash function and random number. Also updates value that is used to present session and uses in next session. Therefore, this scheme protects user privacy using random number. And this sheme can offer synchronization by creating variable value without updating value.
A Study on Implementation of Intelligent Character for MMORPG using Genetic Algorithm and Neural Networks
Kwon, Jang-Woo ; Jang, Jang-Hoon ;
Journal of Korea Multimedia Society, volume 10, issue 5, 2007, Pages 631~641
The domestic game market is developmental in the form which is strange produces only the MMORPG. But the level of the intelligence elder brother character is coming to a standstill as ever. It uses a gene algorithm and the neural network from the dissertation which it sees and embodies the character which has a more superior intelligence the plan which to sleep and it presents it does. When also currently it is used complaring different artificial intelligence technologies and this algorism from the MMORPG, the efficiency proves is not turned over and explains the concrete algorithm it will be able to apply in the MMORPG and an embodiment method.
MHP-based SCORM Contents Trans-Coding System for DiTV Service
Im, Seung-Hyun ; Lee, Si-Hwa ; Hwang, Dae-Hoon ;
Journal of Korea Multimedia Society, volume 10, issue 5, 2007, Pages 642~651
Recently, digital convergence, whose core demand is OSMU (One Sourse Multi Use),has been the main topic in e-learning domain and industry. However, the existing web learning content and the new resource developed toprovide contents to different learning environment must be processed to adapt the new learning settings, which causes the cost and time problem, So in this paper we design and implement a Java based SCORM content transcoding system which can transcode the SCORM-based learning content into MHP-based DiTV content in order to adapt t-learning environment using DiTV, which is closer to our real life. Using this system which has ability of inter-operation, reuse, highly-use, the problem mentioned above can be solved well. Moreover, it is possible for a learner who is not familiar with computer to study using DiTV instead of PC.
Automatic Generation of XForms Interfaces for XML Data Input
Song, Ki-Sub ; Lee, Kyong-Ho ;
Journal of Korea Multimedia Society, volume 10, issue 5, 2007, Pages 652~667
With the wide spread of XML data in various fields, the interest in developing convenient user interfaces for inputting XML data is increasing. Previous works on the automated generation of user interfaces have given insufficient supports for various user environments and inconvenient editing tools for complex documents. In this paper, we presents an approach to generate XForms based user interfaces from XML schemas, for inputting XML data. The proposed method consists of three steps: parsing XML schemas, generating XForms codes, and embedding it into host language documents. Specifically, to generate XFonns codes, the rules for generating XForms codes, which support complex types and map simple types to appropriate input controls, are proposed. Experimental results with various kind of schemas show that the proposed method can generate XForms interfaces successfully.
Protecting Technique for the Executable File of Virtual Machines
Park, Ji-Woo ; Yi, Chang-Hwan ; Oh, Se-Man ;
Journal of Korea Multimedia Society, volume 10, issue 5, 2007, Pages 668~678
The development of a wire and wireless communication technologies might permit easily accessing on various information. But, the easiness of accessing information has basically the problem of an unintended information outflow. An executable file which has key algorithms, data and resources for itself has very weak point in the security. Because the various information such as algorithms, data and resources is included in an executable file on embedded systems or virtual machines, the information outflow problem may appear more seriously. In this paper, we propose a technique which can be protecting the executable file contents for resolving the outflow problem through the encryption. Experimentally, we applied the proposed technique to EVM-the virtual machine for embedded system and verified it. Also, we tried a benchmark test for the proposed technique and obtained reasonable performance overhead.
On Estimation and Distribution of Game Satisfaction
Ham, Hyung-Bum ;
Journal of Korea Multimedia Society, volume 10, issue 5, 2007, Pages 679~686
Every year, although the number of game enterprises increases, every game which is developed and distributed by these enterprises do not have competitiveness. One game even increasing competitiveness and added value of game industry, we have to develop games which are satisfied with users, and for it, we need scientific research which evaluates about satisfaction. In this paper, We quantatively estimate game satisfaction by using AHP and statistical method. Also we discuss the method which derive distribution of game satisfaction. We can acquire expected effect which predicts satisfaction level and standard about games by using these methods.
Processing of Code Optimization in CTOC
Kim, Ki-Tae ; Yoo, Weon-Hee ;
Journal of Korea Multimedia Society, volume 10, issue 5, 2007, Pages 687~697
Although the Java bytecode has numerous advantages, there are also shortcomings such as slow execution speed and difficulty in analysis. Therefore, in order for the Java class file to be effectively executed under the execution environment such as the network, it is necessary to convert it into optimized code. We implemented CTOC for transforming to optimized code. In Optimization, SSA Form that distinguish variable by assignment is used to determine value and type statically. Copy propagation, dead code elimination optimization is applied to SSA Form. However, existing SSA Form is related to variable than expression. Therefore, in this paper, to performing optimization to SSA Form expression, after performing copy propagation and dead code elimination, in addition to that, partial redundant expression elimination is performed