Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 11, Issue 12 - Dec 2008
Volume 11, Issue 11 - Nov 2008
Volume 11, Issue 10 - Oct 2008
Volume 11, Issue 9 - Sep 2008
Volume 11, Issue 8 - Aug 2008
Volume 11, Issue 7 - Jul 2008
Volume 11, Issue 6 - Jun 2008
Volume 11, Issue 5 - May 2008
Volume 11, Issue 4 - Apr 2008
Volume 11, Issue 3 - Mar 2008
Volume 11, Issue 2 - Feb 2008
Volume 11, Issue 1 - Jan 2008
Selecting the target year
Similarity Measure based on XML Document's Structure and Contents
Kim, Woo-Saeng ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1043~1050
XML has become a standard for data representation and exchange on the Internet. With a large number of XML documents on the Web, there is an increasing need to automatically process those structurally rich documents for information retrieval, document management, and data mining applications. In this paper, we propose a new method to measure the similarity between XML documents by considering their structures and contents. The similarity of document's structure is found by a simple string matching technique and that of document's contents is found by weights taking into account of the names and positions of elements. The overall algorithm runs in time that is linear in the combined size of the two documents involved in comparison evaluation.
Simulation of Traffic Signal Control with Adaptive Priority Order through Object Extraction in Images
Youn, Jae-Hong ; Ji, Yoo-Kang ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1051~1058
The advancement of technology for image processing and communications makes it possible for current traffic signal controllers and vehicle detection technology to make both emergency vehicle preemption and transit priority strategies as a part of integrated system. Present]y traffic signal control in crosswalk is controlled by fixed signals. The signal control keeps regular signals traffic even with no traffic, when there is traffic, should wait until the signal is given. Waiting time causes the risk of traffic accidents and traffic congestion in accordance with signal violation. To help reduce the risk of accidents and congestion, this paper explains traffic signal control system for the adaptive priority order so that signal may be preferentially given in accordance with the situation of site through the object detect images.
UbiController: Universal Mobile System for Controlling Appliances in Smart Home Environment
Yoon, Hyo-Seok ; Kim, Hye-Jin ; Woo, Woon-Tack ; Lee, Sang-Goog ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1059~1071
Users in ubiquitous computing environment can easily access and use a multitude of devices and services anywhere and anytime. The key technology to realize this scenario is the method to intuitively provide proper user interfaces for each device and service. Previous attempts simply provided a designated user interface for each device and service or provided an abstract user interface to control common functions of different services. To select a target appliance, either user directly specified the target device or depended on sensors such as RFID tags and readers limiting the applicable scenarios. In this paper, we present UbiController which uniquely uses camera on the mobile device to recognize markers of appliances to acquire user interface for controlling task. UbiController aims to provide automatic discovery of multiple services in the smart home environment, support traditional GUI and novel camera-based recognition method as well as intuitive interaction methods for users. In this paper, we show experiments on the performance of UbiController's discovery and recognition methods and user feedback on interaction methods from a user study.
An Automatic Address Allocation Mechanism based on the Signal Strength for the PLC-based Home Network
Hwang, Min-Tae ; Choi, Sung-Soo ; Lee, Won-Tae ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1072~1081
We can categorize the network address allocation mechanism into two types. One is to assign a unique network address using the address allocation server and the other is to make a random address by itself and process the DAD(Duplicate Address Detection) procedure. In this paper we suggest a new address allocation mechanism based on the signal strength for the PLC-based home network. As the combined mechanism of two types this mechanism allocates a unique address for the new node from one of the existing nodes with the simple equation and with the priority based on the signal strength from the new node to the existing nodes. We can use this mechanism for the self-healing function when the packet from the source node may not be delivered to the destination node directly. We developed the simulator for our mechanism using the C# programming and verified the network address assigned uniquely based on the signal strength.
An Energy Efficient Variable Area Routing protocol in Wireless Sensor networks
Choi, Dong-Min ; Moh, Sang-Man ; Chung, Il-Yong ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1082~1092
In wireless sensor networks, clustering protocol such as LEACH is an efficient method to increase whole networks lifetime. However, this protocol result in high energy consumption at the cluster head node. Hence, this protocol must changes the cluster formation and cluster head node in each round to prolong the network lifetime. But this method also causes a high amount of energy consumption during the set-up process of cluster formation. In order to improve energy efficiency, in this paper, we propose a new cluster formation algorithm. In this algorithm, we define a intra cluster as the sensor nodes within close proximity of each other. In a intra cluster, a node senses and transmits data at a time on the round-robin basis. In a view of whole network, intra cluster is treated as one node. During the setup phase of a round, intra clusters are formed first and then they are re-clustered(network cluster) by choosing cluster-heads(intra clusters). In the intra cluster with a cluster-head, every member node plays the role of cluster-head on the round-robin basis. Hence, we can lengthen periodic round by a factor of intra cluster size. Also, in the steady-state phase, a node in each intra cluster senses and transmits data to its cluster-head of network cluster on the round-robin basis. As a result of analysis and comparison, our scheme reduces energy consumption of nodes, and improve the efficiency of communications in sensor networks compared with current clustering methods.
Symmetry structured SPN block cipher algorithm
Kim, Gil-Ho ; Park, Chang-Soo ; Cho, Gyeong-Yeon ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1093~1100
Feistel and SPN are the two main structures in designing a block cipher algorithm. Unlike Feistel, an SPN has an asymmetric structure in encryption and decryption. In this paper we propose an SPN algorithm which has a symmetric structure in encryption and decryption. The whole operations in our SPN algorithm are composed of the even numbers of N rounds where the first half of them, 1 to N/2, applies function and the last half of them, (N+1)/2 to N, employs inverse function. Symmetry layer is executed to create a symmetry block in between function layer and inverse function layer. AES encryption and decryption algorithm, whose safety is already proved, are exploited for function and inverse function, respectively. In order to be secure enough against the byte or word unit-based attacks, 32bit rotation and simple logical operations are performed in symmetry layer. Due to the simplicity of the proposed encryption and decryption algorithm in hardware configuration, the proposed algorithm is believed to construct a safe and efficient cipher in Smart Card and RFID environments where electronic chips are built in.
Advanced WLAN Authentication Mechanism using One-time Session Key based on the Vulnerability Analysis in Nespot Wireless Lan System
Lee, Hyung-Woo ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1101~1110
Nespot provides a convenient wireless internet connection service. The existing IEEE 802.1X EAP-MD5 authentication mechanism can be achieved based on ID/password information for a wireless connection. The Nespot system offers an advanced accounting and authorization procedure for providing wireless user authentication mechanism. However, many problems were found on the existing Nespot EAP-MD5 mechanism such as a ill value exposure, a leakage of personal information on wireless authentication procedure and a weakness on Nespot mutual authentication mechanism. Therefore, we analyzed the limitation of the existing IEEE 802.1X EAP-MD5 certification system, and suggested a one-time session key based authentication mechanism. And then we offered a simplified encryption function on the Nespot certification process for providing secure mutual authentication process.
Cryptanalysis of Two Block Ciphers based on Cellular Automata
Ryu, Han-Seong ; Lee, Je-Sang ; Lee, Chang-Hoon ; Hong, Seok-Hie ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1111~1120
Cellular automata(CA) is often applied to design cryptosystems because it has good diffusion and local interaction effects. Recently, a 128-bit CA-based block cipher, called CAB1, and a 64-bit reversible CA-based block cipher, called CAB2, were proposed in KMMS'02 and CEC'04, respectively. In this paper, we introduce cryptanalytic results on CAB1 and CAB2. Firstly, we propose a differential attack on CAB1, which requires
chosen plaintexts with about
encryptions. Secondly, we show that CAB2 has a security of 184 bits using the statistical weakness. Note that the designers of CAB2 insist that it has a security of 224 bits. These are the first known cryptanalytic results on them.
A Study on Efficient Routing and Authentication Scheme in Ad-Hoc Environment
Kang, Seo-Il ; Lee, Im-Yeong ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1121~1128
Ad-Hoc network is consisted with the device of wireless communication. Therefore, the organization of network is dynamic and the changing communication channel is essential. According this, the study of secure routing route and certification technique has to be needed. In we research, we suggest not only the secure routing scheme in Ad-Hoc circumstance but also the method that user can be serviced the type of network which is connected Ad-Hoc network and wireless lam. In case of the routing form of Ad-Hoc Network, although in preexist study, when the device of organization withdraws, routing is needed, in we research, we suggest the detour route that is used hop frequency. We can offer the service of ubiquitous that the certification of secure user and the creation of routing route in Ad-Hoc network.
Adaptive Keystroke Authentication Method for Online Test
Ko, Joo-Young ; Shim, Jae-Chang ; Kim, Hyen-Ki ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1129~1137
E-learning as a new education trend is being applied not only to cyber school but also various education fields such as employee training for companies or interactive learning for consumers. Users of the E-learning can take online tests individually anywhere, to evaluate their achievement level. Because users who are taking the online tests may show their own IDs or passwords to others, the possibility of cheating is very high. Therefore, it is very important to authenticate the users. In this paper, we propose an adaptive-keyboard authentication method which depends on user behavior patterns through the use of IDs and passwords. This method does not need any additional devices or special effort. An adaptive method to update patterns in which IDs and passwords are entered was previously suggested and this new method has proved to be better than previous methods through simulations and implementation.
Real-time Facial Modeling and Animation based on High Resolution Capture
Byun, Hae-Won ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1138~1145
Recently, performance-driven facial animation has been popular in various area. In television or game, it is important to guarantee real-time animation for various characters with different appearances between a performer and a character. In this paper, we present a new facial animation approach based on motion capture. For this purpose, we address three issues: facial expression capture, expression mapping and facial animation. Finally, we show the results of various examination for different types of face models.
A Study of a Physical Property Setting Method for Haptic Rendering of Deformable Volumetric Objects
Kim, Jae-Oh ; Kim, Sang-Youn ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1146~1159
This paper proposes a method for determining material property of a haptic model which represents the haptic behavior of a target object. This paper also presents a haptic rendering framework. We adapt elastography to obtain the physical property of a target object. One of the key differences between the proposed framework and a traditional method is that the physical property of the target object can be easily set into a haptic model. For evaluating the proposed method, we construct a real-time palpation prototype simulator. In our work, a human liver is selected as a target object and the liver is represented by Shape-retaining Chain Linked Model(S-chain model) for satisfying the real-time performance. We conduct experiments whether a user easily distinguishes abnormal portions from normal portions. From the experimental results, we evaluate that the proposed method provides the discriminable force to users in real-time.
DMGL: An OpenGL ES Based Mobile 3D Rendering Libraries
Hwang, Gyu-Hyun ; Park, Sang-Hun ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1160~1168
Recent technological innovations of mobile hardware which make it possible to implement real-time 3D rendering effects under mobile environment have provided a potential to develop realistic mobile application programs. This paper presents platform independent, OpenGL ES based, real-time mobile rendering libraries, called DMGL for supporting high quality 3D rendering on handhold devices. The libraries allows the programmers who develops mobile graphics softwares to generate varying advanced real-time 3D graphics effects without great effort. Moreover, GPGPU-based libraries give a set of functions to solve complex equations for simulating natural phenomena such as smoke and fire, and to render the results in real-time.
Design and Implementation of Tag Clustering System for Efficient Image Retrieval in Web2.0 Environment
Lee, Si-Hwa ; Lee, Man-Hyoung ; Hwang, Dae-Hoon ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1169~1178
Most of information in Web2.0 is constructed by users and can be classified by tags which are also constructed and added by users. However, as we known, referring by the related works such as automatic tagging techniques and tag cloud's construction techniques, the research to be classified information and resources by tags effectively is to be given users which is still up to the mark. In this paper, we propose and implement a clustering system that does mapping each other according to relationships of the resource's tags collected from Web and then makes the mapping result into clusters to retrieve images. Tn addition, we analyze our system's efficiency by comparing our proposed system's image retrieval result with the image retrieval results searched by Flickr website.
Migration of Web Services in a Mobile Environment
Park, Myung-Woo ; Kim, Yeon-Seok ; Lee, Kyong-Ho ;
Journal of Korea Multimedia Society, volume 11, issue 8, 2008, Pages 1179~1193
Recently, mobile devices enabled with Web services are being considered as equal participants of the Web services environment. The frequent mobility of devices and the intermittent disconnection of wireless network require migrating or replicating Web services onto adjacent devices appropriately. This paper proposes an efficient method for migrating and replicating Web services among mobile devices through code splitting. Specifically, the proposed method split the source code of a Web service into sub-codes based on users' preference to its constituent operations. The sub-code with higher preference is migrated earlier than others. The proposed method also replicates a Web service to other devices to enhance its performance by considering context information such as network traffic or the parameter size of its operations.