Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 11, Issue 12 - Dec 2008
Volume 11, Issue 11 - Nov 2008
Volume 11, Issue 10 - Oct 2008
Volume 11, Issue 9 - Sep 2008
Volume 11, Issue 8 - Aug 2008
Volume 11, Issue 7 - Jul 2008
Volume 11, Issue 6 - Jun 2008
Volume 11, Issue 5 - May 2008
Volume 11, Issue 4 - Apr 2008
Volume 11, Issue 3 - Mar 2008
Volume 11, Issue 2 - Feb 2008
Volume 11, Issue 1 - Jan 2008
Selecting the target year
A Log-Energy Feature Normalization Method Using ARMA Filter
Shen, Guang-Hu ; Jung, Ho-Youl ; Chung, Hyun-Yeol ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1325~1337
The difference of environments between training and recognition is the major reason of degradation of speech recognition. To solve this mismatch of environments, various noise processing methods have been studied. Among them, ERN(log-Energy dynamic Range Normalization) and SEN(Silence Energy Normalization) for normalization of log energy features show better performance than others. However, these methods have a problem that they can hardly achieve normalization for the relatively higher values of log energy features and the environmental mismatch caused by this problem becomes bigger especially in low SNR environments. To solve these problems, we propose applying ARMA filter as post-processing for smoothing log energy features by calculating the moving average in auto-regression scheme. From the recognition results conducted on Aurora 2.0 DB, the proposed method shows improved recognition results comparing with conventional methods.
A Study of Music Recommendation System in P2P Network using Collaborative Filtering
Won, Hee-Jae ; Park, Kyu-Sik ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1338~1346
In this paper, we propose a new P2P-based music recommendation system. In comparison with previous system in client-server environment, the proposed system shows higher quality of music recommendation through real-time sharing of music preference information between peers. A collaborative filtering is implemented as a recommendation algorithm. As a user preference profile, we use the inherit KID music genre index contained in all legitimate music file instead of music feature vectors as in previous research so that the proposed system can mitigate the performance degradation and high computational load caused by feature inaccuracy and feature extraction. The performance of the proposed system is evaluated in various ways with real 16-weeks transaction data provided by Korean music portal, 5 company and it shows comparative quality of recommendation with only small amount of computational load.
Robust Blind- Video Watermarking against MPEG-4 Scalable Video Coding and Multimedia Transcoding
Yoon, Ji-Sun ; Lee, Suk-Hwan ; Song, Yoon-Chul ; Jang, Bong-Joo ; Kwon, Ki-Ryong ; Kim, Min-Hwan ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1347~1358
A blind video watermarking scheme for providing safety, authenticity, and copyright protection is proposed in this paper, which is robust to MPEG-4 SVC and multimedia transcoding. In proposed method, embedding and detecting of watermark is performed based on base layer with considering spatial SVC. To be robust from temporal SVC, our method embeds repeatedly a permutated character with ordering number per one frame. Also for robustness from multimedia transcoding and FGS, the method is embedded watermark in low middle frequency of each frame adaptively based on DCT in ROI. Through experimental results, invisibility of the watermark is confirmed and robustness of the watermark against the spatial SVC, temporal SVC, FGS and video transcoding between MPEG-2 and MPEG-4 SVC is also verified.
Efficient Coding of Motion Vector and Mode Information for H.264/AVC
Lee, Dong-Shik ; Kim, Young-Mo ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1359~1365
The portion of header in H.264 gets higher than those of previous standards instead of its better compression efficiency. Therefore, this paper proposes a new technique to compress the header of H.264. Unifying a sentence elementary in H.264, H.264 does not consider the distribution of element which be encoded and uses existing Exp-Golomb method, but it is uneffective for variable length coding. Most of the header are block type(s) and motion vector difference(s), and there are redundancies in the header of H.264. The redundancies in the header of H.264 which are analyzed in this paper are three. There are frequently appearing symbols and non-frequently appearing symbols in block types. And when mode 8 is selected in macroblock, all of four sub-macroblock types are transferred. At last, same values come in motion vector difference, especially '0.' This paper proposes the algorithm using type code and quadtree, and with them presents the redundant information of header in H.264. The type code indicates shape of the macroblock and the quadtree does the tree structured motion compensation. Experimental results show that proposed algorithm achieves lower total number of encoded bits over JM12.4 up to 32.51% bit reduction.
Design and Implementation of Remote Control System for Measuring Instrument using Smart Network Card
Park, Jin-Ho ; Jung, Min-Soo ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1366~1375
To verify correct operation of measuring instruments, we request the verification of measuring instrument to the agency that holds inspection devices. This works requires time and cost to the company. For this reason. We proposed "Smart Network Interface Card Model" for remote control of measuring instruments. Our model based on Web adapter, can add, delete and change the program to an existing web adapter from remote system. Furthermore, more than one program can be loaded, and can be updated from the remote system of internet. And also we can change the verification requirement of measuring instrument, hence it makes more good quality and competitive power of instruments.
Design and Implementation of Network Self-Configuration Based on Bluetooth
Kang, Seong-Ho ; Choo, Young-Yeol ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1376~1384
Numerous researches on network self-configuration have been conducted on Wireless Sensor Network (WSN) and Ad Hoc network but the results have not been applied yet for factory automation. This paper presents development of intelligent process management systems conducting process monitoring and control irrelevant to physical position of a plant operator. The systems are indispensable for diagnosis of rotating machines which cannot exploit wired network. The system was implemented in a Personal Digital Assistant (PDA) using Bluetooth communication protocol. When a mobile terminal reaches to communication range of the process management server, the server detects the mobile terminal to reconfigure plant network automatically. The server authenticates a user of the terminal to download and installs monitoring and control program considering authorized level of the user. If the terminal leaves communication range of the server, it deletes the node from the network and removes the program automatically to save resources and prevent security problems such as missing terminal. Operation of developed functions was verified in a testbed emulating steel-making plant.
A Nested Network Mobility Support Scheme in a Proxy MIPv6 Domain
Park, Hee-Dong ; Kim, Do-Hyeon ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1385~1391
The network-based IP mobility solution - Proxy MIPv6 provides a mobile node with local mobility support without requiring MIPv6 functionality of the mobile node by using two principle functional entities, LMA (Local Mobility Anchor) and MAG (Mobile Access Gateway) located in a Proxy MIPv6 domain. Yet, in case that a mobile node moves into a mobile network located in the domain, the mobile node can't receive the local mobility support any more because it can't communicate with the MAG. This paper proposes a scheme to support nested network mobility in a Proxy MIPv6 domain by adding MAG functionality to a mobile router in the mobile network and evaluates the performance of the proposed scheme. Performance analysis shows that the proposed scheme can increase the performance of handover delay, signaling costs, and packet loss ratio.
Design and Performance Analysis of a Traffic-based Power Saving Mode Decision Algorithm for Energy-efficient Home Networks
Kong, In-Yeup ; Hwang, Won-Joo ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1392~1402
Home gateway is always full-powered for ubiquitous home services, and consumes much energy yearly. Power-saving algorithm to conserve this energy must reduce the energy consumption and preserve always-on services. Our algorithm predicts current idle period using the history of the past idle period when the idle period starts, and then determines whether the power mode is changed to the saving mode or not. On the power saving mode, it processes the simple protocol data for network control using proxying with no wakeup. And it changes the power mode to active mode when user's traffic exists. As the results of the simulation using real traffic, our algorithm saves the energy consumption from 14% to 49% as compared with existing method.
Analysis on Security Vulnerability of Password-based key Exchange and Authentication Protocols
Park, Choon-Sik ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1403~1408
A number of three party key exchange protocols using smart card in effort to reduce server side workload and two party password based key exchange authentication protocols has been proposed. In this paper, we introduce the survey and analysis on security vulnerability of smart card based three party authenticated key exchange protocols. Furthermore, we analyze Kwak et al's password based key exchange and authentication protocols which have shown security weakness such as Shim et al's off-line password guessing attack and propose the countermeasure to deter such attack.
A Reputation Management Scheme Improving the Trustworthiness of Multi-peers and Shared Resources in P2P Networks
Shin, Jung-Hwa ; Kim, Tae-Hoon ; Tak, Sung-Woo ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1409~1419
Inauthentic resources can be easily spread by P2P (Peer-to-Peer) participants due to the openness and anonymity of P2P networks. A possible way to restrict the distribution of inauthentic resources and prevent malicious peers from joining P2P networks is to exploit peers' reputation which reflect their past behaviors and are also helpful to predict peers' future behaviors. There is a possibility that some peers intentionally plays along with other peers in order to increase/decrease its reputation through false feedback exchanges. Therefore, we propose a new reputation management scheme, called TrustRRep (Trustable Resource sharing service using Reputation) scheme, which improves the trustworthiness and efficiency of P2P networks by identifying peers who give false feedback. The TrustRRep scheme is also capable of providing peers with the trustworthiness of shared resources by discriminating resources distributed by malicious peers. We implement the proposed TrustRRep scheme on the NS-2 simulator for evaluating its performance compared to the recent reputation management work available in literature. A case study on simulations shows that the proposed reputation management scheme yields efficient performance in terms of the minimal download ratio and dissemination of inauthentic resources, the efficient identification of peers who give false feedback, and the provisioning of the trustworthiness of peers' reputation. It also shows that the proposed TrustRRep scheme imposes the restrictions of participating P2P networks on a malicious peers by diminishing its trust value.
Design of General-Purpose Resource Management System with Tree Structure
Sin, Hyun-Kyu ; Lee, Choong-Ho ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1420~1426
The most recent programs tend to use picture or audio files which need mass storage resources. For these mass storages, the performance of automatic management decreases as the sizes of these resources increases. Moreover, the more the number of resources increases, the more the management of resources gets difficult. This paper suggests a resource management system to which the interface of tree-structure file system is applied in order to increase convenience and efficiency. The system uses the access technique based on character string path to have more compatibility, and supports tree structure which is more systematic. Further, it supports virtual nodes to show high performance. The system can be used to control resources from outside as well as inside of processes.
Ubiquitous Cyber Aquarium Using Schooling Animation
Kim, Jong-Chan ; Cho, Seung-Il ; Kim, Eung-Kon ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1427~1435
It is worth it to properly present the behaviors of cyberspace and game characters. It is not so easy to manually supply the actions for all objects one by one, so we need to use crowd animation techniques in order to display automatically, realistically, and effectively. In this paper, we construct a ubiquitous cyber aquarium based on sensors, using the crowd behavior library, which is applied to programming crowd behavior in cyberspace and game applications. We use a sensor board to become aware of a person approaching the cyber aquarium, and according to the perceived distance, the objects in the cyber aquarium automatically react and behave accordingly.
A Development of Mobile Vehicle Diagnostic System on .NET System and Bluetooth
Park, Dong-Gyu ; Uh, Yoon ; Ha, Jae-Deok ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1436~1445
Currently, mobile handset embeds many communication modules including CDMA and Bluetooth, and many applications are developed based on these modules. In this paper, we study about wireless vehicle diagnosis software and user interface based on bluetooth system on mobile handset. We developed Bluetooth communication system on protocol converter between OBD(On Board Diagnostics)-II system. Based on this system, we can communicate ECU(Engine Control Unit) and mobile device based on windows .NET compact framework platform. Therefore we can easily diagnose vehicle state and obtain engine data. All user interface and vehicle diagnosis systems on mobile handset are developed under windows .NET compact framework platform. Using this system we achieved several improvements over existing vehicle diagnostic system; 1) the software download and upgrade can be achieve on wireless environment, 2) no additional diagnostic devices are requires, which saves additional cost and we can diagnose the vehicle easily, 3) we can easily port our system on many embedded systems including PDA and navigator, etc.
A MAC Enhancement Technique for Quality of Service Guarantee in Wireless Local Area Networks
Lee, Dong-Geon ; Kim, Byoung-Hoon ; Tak, Sung-Woo ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1446~1459
In an infrastructure-based wireless network, an access point is used for all communications among mobile devices. However, when a mobile device moves into a dead Bone, a connectivity disruption between the mobile device and the access point occurs. Such connectivity disruption consequently leads to another connectivity disruption between the mobile device moving toward the dead zone and other wireless-enabled devices located within the area of the infrastructure-based wireless network. To cope with the connectivity disruption in the infrastructure-based wireless network the ad hoc network that dynamically forms a network without any preexisting communication infrastructure needs to be set up to provide seamless connections among mobile devices. In this paper, we propose the DNSQ-MAC (Dynamic Network State aware QoS-Medium Access Control) technique that meets the deadlines of MAC frames forwarded over hop-by-hop multipaths and guarantees the QoS performance of an ad hoc-based wireless network. Mobile devices incorporating the DNSQ-MAC technique are capable of adjusting to the new dynamic network status in order to enhance the QoS performance in the ad hoc-based wireless network. A case study which exploits the Qualnet simulator shows that the proposed DNSQ-MAC technique can guarantee the deadlines of MAC frames forwarded over hop-by-hop multipaths and enhance the QoS performance of various routing protocols and packet schedulers running on the network layer above the MAC layer.
Design of Open Vector Graphics Accelerator for Mobile Vector Graphics
Kim, Young-Ouk ; Roh, Young-Sup ;
Journal of Korea Multimedia Society, volume 11, issue 10, 2008, Pages 1460~1470
As the performance of recent mobile systems increases, a vector graphic has been implemented to represent various types of dynamic menus, mails, and two-dimensional maps. This paper proposes a hardware accelerator for open vector graphics (OpenVG), which is widely used for two-dimensional vector graphics. We analyze the specifications of an OpenVG and divide the OpenVG into several functions suitable for hardware implementation. The proposed hardware accelerator is implemented on a field programmable gate array (FPGA) board using hardware description language (HDL) and is about four times faster than an Alex processor.