Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 2, Issue 4 - Dec 1999
Volume 2, Issue 3 - Sep 1999
Volume 2, Issue 2 - Jun 1999
Volume 2, Issue 1 - Mar 1999
Selecting the target year
SQL Extension for Supporting Multimedia Data
Journal of Korea Multimedia Society, volume 2, issue 2, 1999, Pages 109~119
As the importance and utilization of multimedia data increase, we need to study representing and processing multimedia data within databases. To process multimedia data within databases, we need to precisely model multimedia data, to define data types and operations, and to make up query language supporting them. Therefore, in this paper, we modeled multimedia data using OMT so that we can support multimedia data within databases. We also propose an extended SQL, called MMSQl, which includes new types for supporting multimedia data types and efficiently make a query. Especially, MMSQL provides a mechanism to express temporal and spatial relationships which exist among objects in a multimedia data (internal) or among several multimedia data (external).
The Design and Implementation of HTML-based Intelligent Help System
Journal of Korea Multimedia Society, volume 2, issue 2, 1999, Pages 120~128
This paper proposes the design and implementation of HTML-based Intelligent help system for application developers and users. In existing help systems, developers had to write topics, index, and contents of whole document by themselves. Furthermore those files are linked to one project file, which is in previously compiled form, and user can't modify topics and index information of their help documents. Especially in RAD environments, even though new features or packages are additionally announced, still users should be able to access and replace new help documents with existing ones. But these procedures are very complex in real world. The proposed help system is designed to analyze existing HTML documents, extract help data with regard to user's interest and is facilitated to authorize help contents with the user interface. Removing inconvenience in implementing context-sensitive help contents with the user interface. Removing inconvenience in implementing context-sensitive help system is also considered. In conclusion the proposed system in this paper can be actually useful when adopted into any typical Java RAD such as Bluette for its help system.
Fuzzy Scheme for Extracting Linear Features
Journal of Korea Multimedia Society, volume 2, issue 2, 1999, Pages 129~136
A linear feature often provide sufficient information for image understanding and coding. An objective of the research reported in this paper is to develop and analyze the reliable methods of extracting lines in gray scale images. The Hough Transform is known as one of the optimal paradigms to detect or identify the linear features by transforming edges in images into peaks in parameter space. The scheme proposed here uses the fuzzy gradient direction model and weights the gradient magnitudes for deciding the voting values to be accumulated in parameter space. This leads to significant computational savings by restricting the transform to within some support region of the observed gradient direction which can be considered as a fuzzy variable and produces robust results.
A New Error Diffusion Coefficients Reducing Correlation Pattern
Journal of Korea Multimedia Society, volume 2, issue 2, 1999, Pages 137~144
Error diffusion is excellent for reproducing grey-scale images to binary images. The output of conventional error diffusion produces correlated pattern. In this paper, a new error diffusion coefficient set is proposed to reduce correlated pattern and to enhance edge through frequency analysis of the error diffusion coefficients. The error diffusion coefficients of the previous line are designed to enhance the edge. The error diffusion coefficient of the previous pixel of the current pixel is selected to symmeterize the coefficient set. Because the proposed coefficient-set consists of 1 and 2, a few computations are required. As results of experiments, it is shown that the binary image using the proposed coefficients have better quality than conventional ones.
A Study on Efficient Micro Payment System
Journal of Korea Multimedia Society, volume 2, issue 2, 1999, Pages 145~154
We are very interested in electronic commerce today, and it will is more developed in the future. In electronic commerce, we can easily purchase a cheap goods like digital data using a micropayment system. Though small value is used in micropayment system, it is important because it has many application. The transaction cost of a micropayment system must be small. Many protocols for the micropayment system are studied, but it's not support user's anonymity. In this paper, we examines the existing micropayment system and proposes a new micropayment protocol that have a anonymity.
Embedding Method of Secret Data using Error-Diffusion
Journal of Korea Multimedia Society, volume 2, issue 2, 1999, Pages 155~165
Because the encrypted data is random, there is a possibility of threat that attacker reveals the secret data. On the other hand, as the image steganogrphy is to embed the secret data into cover image and to transmit the embedded image to receiver, an attacker could not know the existence of secret data even though he/she sees the embedded image, therefore the sender may reduce the threat of attack. In the image steganography, the secret data is embedded by modifying value of pixels as a form of noise. If the secret data is embedded into gray image, the degradation of image quality results from the modifications of image due to noise. Therefore many methods have been proposed to embed the secret data while dethering the gray image, but the existing method using error-diffusion has a problem that any patterns such as a diagonal lines or vertical take place due to embedding the secret data at the fixed interval. To solve this problem and to improve the existing method, we proposed the new method that embeds the secret data at changed point with respect to 1's run-length or at the position where has the minimum difference with the original dithered value. We evaluated the performance of the proposed method by computer simulation.
Security Model for Intranet Environment
Journal of Korea Multimedia Society, volume 2, issue 2, 1999, Pages 166~175
Since the intranet is a combination of open internet technologies and private information systems, various technologies for information security are essentially needed. On recent, a lot of firewall systems are being constructed to be secure the informations from external networks such as Internet in many private companies. Even though internal attacks are more frequently happened than external ones in the intranet environments, there are quite few researches on secure intranet and the internal threats are underestimated so far. In this paper, we study the security threats for each service in the intranet and propose the security models appropriate to the intranet environments by using several cryptographic tools and protocols. Furthermore, we implement the proposed security models in Java applications through computer simulation.
Algorithm for Generating Traffic Distributions in ATM Networks using 2-D LHCA
Cho, Sung-Jin ; Kim, Seok-Tae ; Kim, Jae-Gyeom ; Kim, Han-Doo ; Park, Un-Sook ;
Journal of Korea Multimedia Society, volume 2, issue 2, 1999, Pages 176~183
Using Asynchronous Transfer Mode(ATM) which is a high-bandwidth, low-delay, cell switching and multiplexing technology, Broadband-Integrated Services Digital Network (B-ISDN) can support communication services of all kinds. To evaluate the performance of ATM networks, traffic source models to meet the requirements are demanded. We can obtain random traffic distribution for ATM networks by using the Cellular Automata (CA) which have effective random pattern generation capability. In this paper we propose an algorithm using 2-D LHCA to generate more effective random patterns with good random characteristics. And we show that the randomness by 2-D LHCA is better than that of the randomness by 1-D LHCA.
A Study on The Efficient Multicast Algorithm of Wormhole Routing Method in Multistage Networks
Journal of Korea Multimedia Society, volume 2, issue 2, 1999, Pages 184~194
We present a new algorithm to minimize channel contention while sending multiple messages from multiple source to overlapped destination set on Multistage Interconnection Network (MIN) which supports wormhole routed turnaround routing. The multicast tree of the U-MIN(Unicast MIN) algorithm is useful in performing messages from one source to multiple destination but gives rise to a serious channel connection in performing multiple multicast because it has been designed for only single multicast. For multiple multicast communication on MIN, we address how to implement multiple multicast services efficiently. And a SPU-MIN(Source Partitioned Unicast MIN) algorithm is proposed and shown to be superior than the U-MIN algorithm for multiple multicast. The turnaround routing algorithm based on wormhole routing technique is employed as a message sending method.
Extending Object-Oriented Models with Scoping Constructs
Journal of Korea Multimedia Society, volume 2, issue 2, 1999, Pages 195~199
While object-oriented models are effective in achieving sharing and code reusability, they unfortunately lack a mechanism for giving scope to objects. We propose an object-oriented model in which each object can be given a scope, i.e., an object becomes available only when it is needed. Thus, the set of currently available objects is dynamically changing and only the needed set of objects is maintained in this model. We illustrate the usefulness of this model through some examples.
A Beta-distributed Timed Petri Net Model for Specification, Analysis and Playout Control of Multimedia Titles
Journal of Korea Multimedia Society, volume 2, issue 2, 1999, Pages 200~216
In this paper, we propose a BTPN (Beta-distributed Timed Petri Net) model which is not only an effective multimedia synchronization and authoring specification model, but also a direct control model for playout of a title. Methods of specification of relationships among all media objects in a title by using the BTPN structure and language, as well as methods of analysis of the BTPN by means of a Remaining Timed Reachability Graph and Timing diagram, are proposed. A concept of critical object path, coming from PERT/CPM, is useful for modeling the uncertainty of playout of a multimedia title and editing of title.
Framework Construction with Multimedia Component Management System on CORBA
Journal of Korea Multimedia Society, volume 2, issue 2, 1999, Pages 217~229
Framework is the set of interrelated classes, constructing reusable design in specific domain or set of abstracted classes, and defines common architecture among applications included in domain. Developers can reuse not only class code but also wide range of knowledge on domain by reusing framework. In this papers, we present COM(Component-Oriented Methodology) for the reuse of framework, and develop construction environment for framework and domain development. That is, domain is analyzed by input of domain knowledge on real world to create software based on component, and hotspot is identified through analyzed information, and redesigned(refactoring) by putting additional information on users and developers. After that, I will create domain framework and application framework depending on domain. In this Component-oriented methodology, information is searched, understood and extracted or composite through component-pattern library storage internally. Then this information is classified into the information on component and pattern respectively, and used as additional information in redesigning. With this, developer can obtain reusability, easiness and portability by constructing infrastructure environment that allow to register, update and delete component through Component Pattern Management System(CPMS) under the development environment which can be easily applied to his own application using multimedia component, in this thesis, CORBA(Common Object Request Broker Architecture) environment.