Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 3, Issue 6 - Dec 2000
Volume 3, Issue 5 - Oct 2000
Volume 3, Issue 4 - Aug 2000
Volume 3, Issue 3 - Jun 2000
Volume 3, Issue 2 - Apr 2000
Volume 3, Issue 1 - Feb 2000
Selecting the target year
Design and Evaluation of a VOD Buffer Management Algorithm Using Fixed Prefetch and Drop Strategics
Journal of Korea Multimedia Society, volume 3, issue 2, 2000, Pages 101~111
Resource managing is very difficult because the multimedia data compressed by a VBR shows a bit rate change within high range, Therefore, the VOD server should use the prefetch method in order to improve system utilization, such as prefetching data in the overload period by a meta table that is the reference pattern of MPEG data which is analyzed off line. This prefetch method will not result in a failure to display at overload, however, this method can not keep a minimum loading time and low costs, because the prefetched section is being maximizes. In this paper, we suggest another method that the system utilization can be improved using the fixed prefetched section to keep loading time and costs under a constant range at overload. But this technique will result in a failure to display, due to fixed prefetched section. Rut, in this paper we suggest a drop module that drops only the B frame in the GOP, consistently distributes a lower drop in media quality for the user.
Real-Time Textile Dimension Inspection System Using Zone-Crossing Method, Distortion Angle Classifier and Gray-Level Co-occurrence Matrix Features
Journal of Korea Multimedia Society, volume 3, issue 2, 2000, Pages 112~120
In this paper, we implement a real-time textile dimension inspection system. It can detect various types of real defects which determine the quality of fabric product, defect positions of textile, classify the distortion angel of moving textile and the density. In the implemented system, we measure the density of textile using zone-crossing method with optical lens to solve the noise and real-time problems. And we compensate distortion angel of textile with the classification of distortion types using gaussian gradient and mean gradient features. And also, it detecs real defects of textile and its positions using gray level co-occurrence matrix features. The implemented texile demension inspection systemcan inspect textile dimensions such as density, distortion angle, defect of textile and defect position at real-time. In the implemented proposed texitile dimension inspection system, It is possible to calculate density and detect default of textile at real-time dimension inspection system, it is possible to calculate density and detect default of textile at textile states throughout at all the significant working process such as dyeing, manufacturing, and other texitle processing
Video Indexing and Retrieval of MPEG Video using Motion and DCT Coefficients in Compressed Domain
Journal of Korea Multimedia Society, volume 3, issue 2, 2000, Pages 121~132
Most of video indexing applications depend on fast and efficient archiving, browsing, retrieval techniques. A number of techniques have been approached about only pixel domain analysis until now. Those approaches brought about the costly overhead of decompressing because the most of multimedia data is typically stored in compressed format. But with a compressed video data, if we can analyze the compressed data directly. then we avoid the costly overhead such as in pixel domain. In this paper, we analyze the information of compressed video stream directly, and then extract the available features for video indexing. We have derived the technique for cut detection using these features, and the stream is divided into shots. Also we propose a new brief key frame selection technique and an efficient video indexing method using the spatial informations(DT coefficients) and also the temporal informations(motion vectors).
An Efficient WWW Metering Scheme based on Hash Functions
Journal of Korea Multimedia Society, volume 3, issue 2, 2000, Pages 133~139
In this paper we propose a secure and an efficient metering scheme for measuring the usage and the popularity of web pages. The proposed scheme is based on the cryptographic secure hash functions. Since the metering schemes based on cryptographic technology provides security, efficiency, accuracy and anonymity comparing to the existing metering schemes in WWW, they have the advantages that are secure against attempts by servers who inflate the number of clients and against attempt of collaboration of severs and clients.
A Study on Secure Electronic Bidding System
Journal of Korea Multimedia Society, volume 3, issue 2, 2000, Pages 140~147
In our modern information society, many subjects related to computer networks are studies. The electronic bidding system based on cryptology is one of such subjects. In this study, we focus upon the bidding system used in the internet electronically. The electronic bidding system compared to the older version is time consuming and cost efficient in the process of bidding. However, there are many issues, that connected with the safety and the equality, to be resolved before the system can be applied in practice. Therefore, in this paper, we consider with the problems and requirements of the electronic bidding system and analyze the conventional electronic bidding systems based on the requirements. Also we propose the new secure efficient electronic bidding system that satisfies all requirments.
Design and Performance Evaluation of IP VPNs based MPLS
Journal of Korea Multimedia Society, volume 3, issue 2, 2000, Pages 148~156
This paper proposed that an MPLS-based VPN using next-generation If switches and appropriate set of traffic engineering algorithms is the best way to implement QoS-capable IP VPNs. While ATM-based solution would not rely scalable the number of connections becomes too large, MPLS-based VPNs’ efficiency could be confirmed network delay time through performance evaluation. And we evaluated the performance about the If VPN based on proposed MPLS, at the result of evaluation. We figured out that delay increased more slowly in case of VPN based on MPLS comparing with the VPN based on ATM which has rapid delay increasement. Therefore we confirm that the VPN based on MPLS has high speed of packet processing and high degree of network efficiency through the performance evaluation.
A Scalable Networked Virtual Reality System
Journal of Korea Multimedia Society, volume 3, issue 2, 2000, Pages 157~163
Introduction of motion video including live video into network virtual reality systems makes virtual spaces more attractive. To handle live video in networked virtual reality s)'stems based on VRML, the scalability of networked virtual reality systems becomes very important on the internet where the performance of the network and the end systems varies dynamically. In this paper, a new quality control algorithm suitable for scalable networked virtual reality systems with live video capability is proposed. Our approach is to introduce the notion of the importance of presence (IoP) which represents the importance of objects in virtual spaces. According to IoPs, the degree of the deterioration of each object presentation will be determined in case of the starvation of system resources.
Bandwidth Allocation for Multiple Two-layer Video Sources of Different Spatial Resolution
Journal of Korea Multimedia Society, volume 3, issue 2, 2000, Pages 164~173
This paper presents an efficient bandwidth allocation method for multiple source in the two-layer video coding of different spatial resolution. We first investigate the model of bitrate distortion in the MPEG-2 spacial scalable coding,. By using approximated model parameters, than we propose an efficient bitrate control method in order to keep the same distortion level among coders and the constant quality ratio between layers. Simulation results show that the proposed method can satify the user requirement in comparison to the conventional method.
Transformation Methodology from Specification of ESTELLE to VHDL
Journal of Korea Multimedia Society, volume 3, issue 2, 2000, Pages 174~183
Formal methods for protocol description of a system is based on the implementation id S/W. However, the importance of H/W implementation for a parts of protocol design is increasing. The combination between H/W and IP technology is needed since the implementation environment is changing from S/W to H/W for implementation of specific application protocol. H/W implementation method starting with formal description procedure is essential to guarantree correctness and reliability of the implemented H/W by characteristic of formal description language. Inthis paper, for an automated H/W implementations, ESTELLE, a formal description method, is adopted. A transformation method from specification of ESTELLE to VHDL is suggested. This is an conceptual method that comparing and analyzing similarities between basic units of protocol description such as computation and communication unit and inter processors in H/W. Then we describe transformation model, and suggest example of transformation from ESTELLE to VHDL with Inres protocol.
The Characteristics of
-shaped Filter for Full Screen Display on the FPD
Journal of Korea Multimedia Society, volume 3, issue 2, 2000, Pages 184~191
In thid paper, we have analized the characteristics of
-shaped filter based on preceeding study. The algorithm of
-shaped filter for full screen display has been discussed including their edge-preserving characteristics and computaion complexity compared with the conventional algorithms. PSNR has been employed to compare the proposed method to the conventional algorithms. The proposed algorithm has been implemented using Synopsys VHDL tool. In addition, the features and trade off of the
-shaped filter have been discussed.
A Study on 16 bit EISC Microprocessor
Journal of Korea Multimedia Society, volume 3, issue 2, 2000, Pages 192~200
8 bit and 16 bit microprocessors are widely used in the small sited control machine. The embedded microprocessors which is integrated on a single chip with the memory and I/O circuit must have simple hardware circuit and high code density. This paper proposes a 16 bit high code density EISC(Extendable Instruction Set Computer) microprocessor. SE1608 has 8 general purpose registers and 16 bit fixed length instruction set which has the short length offset and small immediate operand. By using an extend register and extend flag, the offset and immediate operand in instruction could be extended. SE1608 is implemented with 12,000 gate FPGA and all of its functions have been tested and verified at 8MHz. And the cross assembler, the cross C/C++compiler and the instruction simulator of the SE1608 have been designed and verified. This paper also proves that the code density
of SE1608 shows 140% and 115% higher code density than 16 bit microprocessor H-8300 and MN10200 respectively, which is much higher than traditional microprocessors. As a consequence, the SE1608 is suitable for the embedded microprocessor since it requires less program memory to any other ones, and simple hardware circuit.
Fuzzy Neural System Modeling using Fuzzy Entropy
Journal of Korea Multimedia Society, volume 3, issue 2, 2000, Pages 201~208
In this paper We describe an algorithm which is devised for 4he partition o# the input space and the generation of fuzzy rules by the fuzzy entropy and tested with the time series prediction problem using Mackey-Glass chaotic time series. This method divides the input space into several fuzzy regions and assigns a degree of each of the generated rules for the partitioned subspaces from the given data using the Shannon function and fuzzy entropy function generating the optimal knowledge base without the irrelevant rules. In this scheme the basic idea of the fuzzy neural network is to realize the fuzzy rules base and the process of reasoning by neural network and to make the corresponding parameters of the fuzzy control rules be adapted by the steepest descent algorithm. The Proposed algorithm has been naturally derived by means of the synergistic combination of the approximative approach and the descriptive approach. Each output of the rule's consequences has expressed with its connection weights in order to minimize the system parameters and reduce its complexities