Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 14, Issue 12 - Dec 2011
Volume 14, Issue 11 - Nov 2011
Volume 14, Issue 10 - Oct 2011
Volume 14, Issue 9 - Sep 2011
Volume 14, Issue 8 - Aug 2011
Volume 14, Issue 7 - Jul 2011
Volume 14, Issue 6 - Jun 2011
Volume 14, Issue 5 - May 2011
Volume 14, Issue 4 - Apr 2011
Volume 14, Issue 3 - Mar 2011
Volume 14, Issue 2 - Feb 2011
Volume 14, Issue 1 - Jan 2011
Selecting the target year
A Comparison of Distance Metric Learning Methods for Face Recognition
Suvdaa, Batsuri ; Ko, Jae-Pil ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 711~718
DOI : 10.9717/kmms.2011.14.6.711
The k-Nearest Neighbor classifier that does not require a training phase is appropriate for a variable number of classes problem like face recognition, Recently distance metric learning methods that is trained with a given data set have reported the significant improvement of the kNN classifier. However, the performance of a distance metric learning method is variable for each application, In this paper, we focus on the face recognition and compare the performance of the state-of-the-art distance metric learning methods, Our experimental results on the public face databases demonstrate that the Mahalanobis distance metric based on PCA is still competitive with respect to both performance and time complexity in face recognition.
Line Detection in the Image of a Wireless Mobile Robot using an Efficient Preprocessing and Improved Hough Transform
Cho, Bo-Ho ; Jung, Sung-Hwan ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 719~729
DOI : 10.9717/kmms.2011.14.6.719
This paper presents a research on the fast and accurate method of line detection in the image of a wireless mobile robot (WMR). For the improvement of the processing time to detect lines, the characteristics of the transmitted image from the WMR was analyzed, and the efficient preprocessing method among the existing preprocessing methods was selected. And for the improvement of the accuracy to detect lines, the selection method of local maximum value at the Hough array (HA) which has the result of Hough transform was improved by designing a mask and applying it to HA. The experiment was performed with acquired images from the WMR, and the proposed method outperformed the existing methods in terms of processing time and line detection.
Hierarchical Automatic Classification of News Articles based on Association Rules
Joo, Kil-Hong ; Shin, Eun-Young ; Lee, Joo-Il ; Lee, Won-Suk ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 730~741
DOI : 10.9717/kmms.2011.14.6.730
With the development of the internet and computer technology, the amount of information through the internet is increasing rapidly and it is managed in document form. For this reason, the research into the method to manage for a large amount of document in an effective way is necessary. The conventional document categorization method used only the keywords of related documents for document classification. However, this paper proposed keyword extraction method of based on association rule. This method extracts a set of related keywords which are involved in document`s category and classifies representative keyword by using the classification rule proposed in this paper. In addition, this paper proposed the preprocessing method for efficient keywords creation and predicted the new document`s category. We can design the classifier and measure the performance throughout the experiment to increase the profile`s classification performance. When predicting the category, substituting all the classification rules one by one is the major reason to decrease the process performance in a profile. Finally, this paper suggested automatically categorizing plan which can be applied to hierarchical category architecture, extended from simple category architecture.
Robust 3D Model Hashing Scheme Based on Shape Feature Descriptor
Lee, Suk-Hwan ; Kwon, Seong-Geun ; Kwon, Ki-Ryong ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 742~751
DOI : 10.9717/kmms.2011.14.6.742
This paper presents a robust 3D model hashing dependent on key and parameter by using heat kernel signature (HKS), which is special shape feature descriptor, In the proposed hashing, we calculate HKS coefficients of local and global time scales from eigenvalue and eigenvector of Mesh Laplace operator and cluster pairs of HKS coefficients to 2D square cells and calculate feature coefficients by the distance weights of pairs of HKS coefficients on each cell. Then we generate the binary hash through binarizing the intermediate hash that is the combination of the feature coefficients and the random coefficients. In our experiment, we evaluated the robustness against geometrical and topological attacks and the uniqueness of key and model and also evaluated the model space by estimating the attack intensity that can authenticate 3D model. Experimental results verified that the proposed scheme has more the improved performance than the conventional hashing on the robustness, uniqueness, model space.
Transmission Probability of Car-to-Car Message Delivery Link based on Visible Light Communications
Kang, Moon-Soo ; Lee, Chung-Ghiu ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 752~758
DOI : 10.9717/kmms.2011.14.6.752
In this paper, we perform a research on a message delivery link based on visible light communication using illumination light-emitting diodes (LEDs) for car-to-car communications and the link transmission success probability is analyzed for the link. The message delivery system is modeled and the signal-to-noise ratio is calculated from the received optical power. Then, the link transmission probability is estimated from the calculated bit error rates (BERs). The message delivery system has optical links from an LED transmitter near the rear lamp of a car ahead to a receiver near the headlamp of a car behind, whose positions are assumed to follow the normal Gaussian distribution. The link transmission success probability is calculated considering the physical characteristics of the optical link. The car positions are generated according to the normal distribution and the bit error rates are calculated for all links. The link transmission success probability is defined. For the unoptimized optical car-to-car message delivery links, it is shown that the link transmission success probability is larger than 0.9 with the transmitted optical power of 400 mW and the semi-angle at half power of 30 degree.
MS64: A Fast Stream Cipher for Mobile Devices
Kim, Yoon-Do ; Kim, Gil-Ho ; Cho, Gyeong-Yeon ; Seo, Kyung-Ryong ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 759~765
DOI : 10.9717/kmms.2011.14.6.759
In this paper, we proposed fast stream cipher MS64 for use mobile that it is secure, fast, and easy to implement software. The proposed algorithm use the fast operating 213-bit arithmetic shift register(ASR) to generate a binary sequence and produce 64-bit stream cipher by using simple logical operation in non linear transform. MS64 supports 128-bit key in encryption algorithm and satisfy with the safety requirement in modern encryption algorithm. In simulation result shows that MS64 is faster than a 32-bit stream cipher SSC2 in the speed of operation with small usage of memory thus MS64 can be used for mobile devices with fast ciphering.
The Analysis of Software Fault and Application Method of Weight using the Testing Data
Jung, Hye-Jung ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 766~774
DOI : 10.9717/kmms.2011.14.6.766
We survey the software faults according to the software characteristics, so we can use it to make a software testcases. We divide the software fault according to six characteristics, functionality, usability, reliability, efficiency, maintainability, and portability. We analyze the software faults to find the common factors according to the software products, also we survey the number of faults according to six characteristics. We propose the method of weight application using the relative comparison of the number of faults.
A Multi-receiver Certificateless Encryption Scheme and Its Application
Sur, Chul ; Park, Young-Ho ; Rhee, Kyung-Hyune ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 775~784
DOI : 10.9717/kmms.2011.14.6.775
In this paper we introduce the notion of multi-receiver certificateless encryption that avoids the inherent key escrow problem of multi-receiver identity-based encryption, and also present a highly efficient multi-receiver certificateless encryption scheme which eliminates pairing computation to encrypt a message for multiple receivers, Moreover, the proposed scheme only needs one pairing computation to decrypt the ciphertext. Finally, we discuss how to properly transform our scheme into a new public key broadcast encryption scheme for stateless receivers based on the subset-cover framework, which enjoys the advantages of certificateless cryptography.
A Study on One-Time Password Authentication Scheme in Mobile Environment
Kim, Hong-Gi ; Lee, Im-Yeong ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 785~793
DOI : 10.9717/kmms.2011.14.6.785
Since then, with the advance of computing environment, various Internet services are emerging and the importance of user authentication technology is increasing for verifying users authorized to use such services. Along with the advance of authentication technology, research is being made actively on one time password, which is used once in a session and then discarded. In existing one time passwords, however, the values of one time passwords in a created table are stored in serial order, and therefore, if the seed value and the number of one time passwords used are disclosed, one may infer the value of the one time password to be used next. What is more, one time passwords of the S/Key type have the problem that the number of uses is fixed. In this paper, We analysis the existing one time password. Also, We propose one time password methods using elliptic curve cryptography scheme and using enhanced randomness with time value.
Design and Implementation of the JAVA Serial Communication Program to Control the Industrial Digital Indicator
Kim, Tai-Suk ; Kim, Jong-Soo ; Lee, Jung-Hwa ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 794~801
DOI : 10.9717/kmms.2011.14.6.794
Main machinery in the factory have various digital indicator to display its operating data for the manager. It is useful to control these datum at the remote office for factory automation in order to increase machine productivity. It is easy to use Ethernet infrastructure for remote communication. But most of all machinery in domestic factories still support RS232c or RS485 serial communication way. In this case to control machinery datum on the ethernet base, it is need to change RS232C or RS485 data to ethernet base. In this paper, in order to develop a remote progress management system through the wireless Internet, we show a design method to make easy maintenance by developing the system with both the JAVA language and RxTx Package for RS232c serial communication. For the system implementation, we added the digital indicator connect with a thermo couple to a machine which provide the real time status data of temperature. To connect machines management server program, we set up a convertor to change the RS485 data to the RS232c and also another convertor to change the RS232c data to wireless ethernet.
A Study on Effective Web Site Implementation using Reliability Measurement
Kwon, Young-Gik ; Cui, Jun ; Kwon, Dong-Hoon ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 802~812
DOI : 10.9717/kmms.2011.14.6.802
In this paper, we derived 7 reliability measurement factors for effective web site construction through literature research and empirically measured reliability of the web site using "Xenu" and "Yslow" which are reliability measurement tools. We selected and tested total 12 domestic and foreign web sites. As a result of measuring those 12 web sites, the reliability level was varied in a number of aspects according to 7 measurement factors, and we suggested alternatives based on those 7 factors in order to build the effective web site.
Development of Facial Animation Generator on CGS System
Cho, Dong-Min ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 813~823
DOI : 10.9717/kmms.2011.14.6.813
This study is to suggest the facial animation methodology for that 3D character animators can use CGS system effectively during on their stage which they create ideas and use repeating a process of facial animation, it has suggested the CGS(Character Generation System) that is a creative idea generation methodology identified and complemented the problem of the existing computerized idea generation, in addition, this research being extended on the article vol.13, no.7, "CGS System based on Three-Dimensional Character Modeling II (Part2: About Digital Process)," on Korea Multimedia Society in July 2010 issue, Through the preceding study on 3D character facial expression according to character`s feelings as an anatomical structure and the case study on character expressions of theatrical animation, this study is expected to have effectives as one method for maximization of facial animation and idea generation ability.
Character Facial Animation Retargeting based on SVG
Kang, Gi-Tae ; Hong, Soo-Hyeon ; Kim, Jae-Ho ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 824~834
DOI : 10.9717/kmms.2011.14.6.824
In this study, the method to generate facial animation of SVG format based online character AUtomatically was proposed. The re-targeted character can reproduce the modeling facial movements itself without losing the unique formative properties by modeling abundant facial movements of the character in the existing animation for movie theater through the mathematical calculation and `retargeting` this to other character of SVG format. The method of retargeting facial movements like this can be applied to the various characters by only one facial data so although non-specialists, even not an animator can create facial animation of character easily and rapidly. The suggested facial movement in this study is nonlinear and an exaggerated motion so it is friendly to the viewers and it is lively. Besides, it is based on the SVG format, so the smooth facial movements can be implemented by less capacity than existing GIF animation.
Web-Based Distributed Visualization System for Large Scale Geographic Data
Hwang, Gyu-Hyun ; Yun, Seong-Min ; Park, Sang-Hun ;
Journal of Korea Multimedia Society, volume 14, issue 6, 2011, Pages 835~848
DOI : 10.9717/kmms.2011.14.6.835
In this paper, we propose a client server based distributed/parallel system to effectively visualize huge geographic data. The system consists of a web-based client GUI program and a distributed/parallel server program which runs on multiple PC clusters. To make the client program run on mobile devices as well as PCs, the graphical user interface has been designed by using JOGL, the java-based OpenGL graphics library, and sending the information about current available memory space and maximum display resolution the server can minimize the amount of tasks. PC clusters used to play the role of the server access requested geographic data from distributed disks, and properly re-sample them, then send the results back to the client. To minimize the latency happened in repeatedly access the distributed stored geography data, cache data structures have been maintained in both every nodes of the server and the client.