Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 17, Issue 12 - Dec 2014
Volume 17, Issue 11 - Nov 2014
Volume 17, Issue 10 - Oct 2014
Volume 17, Issue 9 - Sep 2014
Volume 17, Issue 8 - Aug 2014
Volume 17, Issue 7 - Jul 2014
Volume 17, Issue 6 - Jun 2014
Volume 17, Issue 5 - May 2014
Volume 17, Issue 4 - Apr 2014
Volume 17, Issue 3 - Mar 2014
Volume 17, Issue 2 - Feb 2014
Volume 17, Issue 1 - Jan 2014
Selecting the target year
Design and Implementation of Key Frame Sharing Application in Android Using Chord Protocol
Kim, Kang Wook ;
Journal of Korea Multimedia Society, volume 17, issue 4, 2014, Pages 405~412
DOI : 10.9717/kmms.2014.17.4.405
Due to the popularity of mobile phones, Peer-to-Peer (P2P) content sharing in mobile phones is highly desirable, especially in a mobile data connection. In addition, there has been an increasing demand for content sharing applications for P2P communication in Android-based smartphones as ubiquitous mobile devices. However, due to wireless network limits, unstable characteristic and restricted storage space, mobile users confront challenges in establishing connections and sharing video frames with other users. To solve this issue, we propose an architectural design and implementation of key frame sharing application that uses Chord, a distributed lookup protocol to establish a content sharing platform for mobile devices, combined with the Chord SDK based on Android. Our proposed system enables users easily to share key information on video data in real-time over a wireless network without manual processing of devices which join or leave the group and cost associated with the 3G/4G network.
Automatic Coin Calculation System using Circular Hough Transform and Post-processing Techniques
Chae, S. ; Jun, Kyungkoo ;
Journal of Korea Multimedia Society, volume 17, issue 4, 2014, Pages 413~419
DOI : 10.9717/kmms.2014.17.4.413
In this paper, we develop an automatic coin calculation system by using digital image processing. Existing schemes have the problem that is not able to exclude non-circular shape from the calculation. We propose a method to detect only coins which have circular form by applying the circular Hough transform(CHT). However, the CHT has the drawback that detects multiple circles even for just one coin because of shadow noise, the patterns on coins, and non-circular edge detection. We propose a post processing algorithm to overcome these limitations. The proposed system was implemented and successfully calculated the coin amount in the case that non-circular objects are mixed with coins.
An Effective Moving Cast Shadow Removal in Gray Level Video for Intelligent Visual Surveillance
Nguyen, Thanh Binh ; Chung, Sun-Tae ; Cho, Seongwon ;
Journal of Korea Multimedia Society, volume 17, issue 4, 2014, Pages 420~432
DOI : 10.9717/kmms.2014.17.4.420
In detection of moving objects from video sequences, an essential process for intelligent visual surveillance, the cast shadows accompanying moving objects are different from background so that they may be easily extracted as foreground object blobs, which causes errors in localization, segmentation, tracking and classification of objects. Most of the previous research results about moving cast shadow detection and removal usually utilize color information about objects and scenes. In this paper, we proposes a novel cast shadow removal method of moving objects in gray level video data for visual surveillance application. The proposed method utilizes observations about edge patterns in the shadow region in the current frame and the corresponding region in the background scene, and applies Laplacian edge detector to the blob regions in the current frame and the corresponding regions in the background scene. Then, the product of the outcomes of application determines moving object blob pixels from the blob pixels in the foreground mask. The minimal rectangle regions containing all blob pixles classified as moving object pixels are extracted. The proposed method is simple but turns out practically very effective for Adative Gaussian Mixture Model-based object detection of intelligent visual surveillance applications, which is verified through experiments.
Facilitating Data Source Movement with Time-Division Access in Content-Centric Networking
Priyono, Olivica ; Kong, In-Yeup ; Hwang, Won-Joo ;
Journal of Korea Multimedia Society, volume 17, issue 4, 2014, Pages 433~440
DOI : 10.9717/kmms.2014.17.4.433
Wireless communication offers the flexibility to the node movement at the spatial dimension more than the wire communication not only in IP architecture but also in Content-Centric Networking. Although it gives such advantage, the intra-domain movement of a node especially the data source node affects the communication to the access point node which in the end affects the acceptance ratio of the client node that requests the data packets from the data source node. In this paper, we use time-division access method to maintain the acceptance ratio of the client node as the effect of the intra-domain data source node movement in Content-Centric Networking. The simulation result shows that the acceptance ratio of the client node can be maintained using the time-division access method as long as the interval access time is less than the coherence time.
Fundamental Considerations: Impact of Sensor Characteristics, Application Environments in Wireless Sensor Networks
Choi, Dongmin ; Chung, Ilyong ;
Journal of Korea Multimedia Society, volume 17, issue 4, 2014, Pages 441~457
DOI : 10.9717/kmms.2014.17.4.441
Observed from the recent performance evaluation of clustering schemes in wireless sensor networks, we found that most of them did not consider various sensor characteristics and its application environment. Without considering these, the performance evaluation results are difficult to be trusted because these networks are application-specific. In this paper, for the fair evaluation, we measured several clustering scheme's performance variations in accordance with sensor data pattern, number of sensors per node, density of points of interest (data density) and sensor coverage. According to the experiment result, we can conclude that clustering methods are easily influenced by POI variation. Network lifetime and data accuracy are also slightly influenced by sensor coverage and number of sensors. Therefore, in the case of the clustering scheme that did not consider various conditions, fair evaluation cannot be expected.
A Balanced Energy Consumption Strategy using a Smart Base Station in Wireless Sensor Networks
Park, Sun-Young ;
Journal of Korea Multimedia Society, volume 17, issue 4, 2014, Pages 458~465
DOI : 10.9717/kmms.2014.17.4.458
In this paper, we propose a strategy to distribute the energy consumption over the network. The proposed strategy is based on geographic routing. We use a smart base station that maintains the residual energy and location information of sensor nodes and selects a head node and an anchor node using this information. A head node gathers and aggregates data from the sensor nodes in a target region that interests the user. An anchor node then transmits the data that was forwarded from the head node back to the smart base station. The smart base station extends network lifetime by selecting an optimal head node and an optimal anchor node. We simulate the proposed protocol and compare it with the LEACH protocol in terms of energy consumption, the number of dead nodes, and a distribution map of dead node locations.
A Data Hiding Scheme for Grayscale Images Using a Square Function
Kwon, Hyejin ; Kim, Haemun ; Kim, Soonja ;
Journal of Korea Multimedia Society, volume 17, issue 4, 2014, Pages 466~477
DOI : 10.9717/kmms.2014.17.4.466
Many image hiding schemes based on least significant bit (LSB) transformation have been proposed. One of the LSB-based image hiding schemes that employs diamond encoding was proposed in 2008. In this scheme, the binary secret data is converted into base n representation, and the converted secret data is concealed in the cover image. Here, we show that this scheme has two vulnerabilities: noticeable spots in the stego-image, i.e., a non-smooth embedding result, and inefficiency caused by rough re-adjustment of falling-off-boundary value and impractical base translation. Moreover, we propose a new scheme that is efficient and produces a smooth and high quality embedding result by restricting n to power of 2 and using a sophisticated re-adjustment procedure. Our experimental results show that our scheme yields high quality stego-images and is secure against RS detection attack.
Study on the Method of Development of Road Flood Risk Index by Estimation of Real-time Rainfall Using the Coefficient of Correlation Weighting Method
Kim, Eunmi ; Rhee, Kyung Hyun ; Kim, Chang Soo ;
Journal of Korea Multimedia Society, volume 17, issue 4, 2014, Pages 478~489
DOI : 10.9717/kmms.2014.17.4.478
Recently, flood damage by frequent localized downpours in cities are on the increase on account of abnormal climate phenomena and growth of impermeable area by urbanization. In this study, we are focused on flooding on roads which is the basis of all means of transportation. To calculate real-time accumulated rainfall on a road link, we use the Coefficient of Correlation Weighting method (CCW) which is one of the revised methods of missing rainfall as we consider a road link as a unobserved rainfall site. CCW and real-time accumulated rainfall entered through the Internet are used to estimate the real-time rainfall on a road link. Together with the real-time accumulated rainfall, flooding history, rainfall range causing flooding of a road link and frequency probability precipitation for road design are used as factors to determine the Flood Risk Index on roads. We simulated two cases in the past, July, 7th, 2009 and July, 15th, 2012 in Busan. As a result, all of road links included in the actual flooded roads at that time got the high level of flood risk index.
A Study on the ITIL Management Model Based on the IT Governance for Public Sector
Kim, Sang-Gil ; Kim, Jin-Young ; Park, Yeung-Gyu ;
Journal of Korea Multimedia Society, volume 17, issue 4, 2014, Pages 490~505
DOI : 10.9717/kmms.2014.17.4.490
IT governance in order to achieve the strategic goals of the organization, leadership, organizational structure, and the process is defined. In order to achieve IT governance, organizational structure, leadership for spindle formation, maintenance, and standardized processes to specific and an effective ITIL (Information Technology Infrastructure Library) management model is needed. In this study, the K Authority Management Model of IT Governance ITIL - based research on service delivery and customer satisfaction through the effective information for ITSM (Information Technology Service Management, IT Service Management) building measures, information for business planning and performance management PMS (Project Management System, project Management System), survey on ICT service levels established through the process of planning and construction management models such as ITIL future research on the public portion of the proceeds from the ITIL management model can be utilized as a guideline when establishing a theoretical presents a base.
Real-Time Physical Activity Recognition Using Tri-axis Accelerometer of Smart Phone
Yang, Hye Kyung ; Yong, H.S. ;
Journal of Korea Multimedia Society, volume 17, issue 4, 2014, Pages 506~513
DOI : 10.9717/kmms.2014.17.4.506
In recent years, research on user's activity recognition using a smart phone has attracted a lot of attentions. A smart phone has various sensors, such as camera, GPS, accelerometer, audio, etc. In addition, smart phones are carried by many people throughout the day. Therefore, we can collect log data from smart phone sensors. The log data can be used to analyze user activities. This paper proposes an approach to inferring a user's physical activities based on the tri-axis accelerometer of smart phone. We propose recognition method for four activity which is physical activity; sitting, standing, walking, running. We have to convert accelerometer raw data so that we can extract features to categorize activities. This paper introduces a recognition method that is able to high detection accuracy for physical activity modes. Using the method, we developed an application system to recognize the user's physical activity mode in real-time. As a result, we obtained accuracy of over 80%.
A Study on Training Courses Development and Analysis for Improving the Creativity using Arduino
Shim, Jooeun ; Ko, Jooyoug ; Shim, Jaechang ;
Journal of Korea Multimedia Society, volume 17, issue 4, 2014, Pages 514~525
DOI : 10.9717/kmms.2014.17.4.514
We have performed a short-term computer information and communication technology education using Arduino. The purpose of this education was to progress basic training interestingly and discover excellent students. Training was about practicing basic examples about H/W, S/W, communication, and solving creative tasks. We divided training participants into a team composed of each 3 members and educated them for 10 hours. Instructors were consists of 1 main teacher and 3 teacher assistants. Training was about assembling Arduino based robot, blinking LED, operating speaker, serial communication, producing software for wireless communications and autonomous of robot, and control hardware of robot. Through this study, we developed a meaningful ICT integrated curriculum which has high usefulness in a short period. Students participated in this education completed 96% out of 10 creative tasks, and this study analyzes the result of curriculum and suggests further research directions.
Bandwidth Requirement and Priority-based Synchronization Methods in Hybrid Client-Server Architecture for Mobile Multiplayer Games
Kim, Jinhwan ;
Journal of Korea Multimedia Society, volume 17, issue 4, 2014, Pages 526~534
DOI : 10.9717/kmms.2014.17.4.526
Most of the multiplayer games available online are based on a client-server architecture because this architecture gives better administration control to the game providers than peer-to-peer architecture. In this architecture, the server is responsible for all the communication between the connected clients. The weakness of this architecture is its bandwidth requirement and scalability. Peer-to-peer architectures have then been proposed to solve these issues. In this paper, we propose a hybrid client-server architecture in which the game state is partially shared by the mobile terminal to achieve consistency among different players. Like a peer-to-peer architecture, this architecture uses client-side capacities to reduce bandwidth requirements for the server and improves consistency in wireless networks. Client events have different timeliness and consistency requirements according to their nature in the game world. These requirements lead to tasks with different priorities on CPU processing. In the proposed architecture, either the server or the client applies consistency mechanism according to the priority level. Simulation experiments show that the bandwidth of the server in this architecture is smaller than that of the client-server architecture. As a result, the server in the proposed architecture can accommodate more clients with enhancing the scalability.