Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 6, Issue 7 - Dec 2003
Volume 6, Issue 6 - Oct 2003
Volume 6, Issue 5 - Aug 2003
Volume 6, Issue 4 - Jul 2003
Volume 6, Issue 3 - Jun 2003
Volume 6, Issue 2 - Apr 2003
Volume 6, Issue 1 - Feb 2003
Selecting the target year
Density Based Spatial Clustering Method Considering Obstruction
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 375~383
Clustering in spatial mining is to group similar objects based on their distance, connectivity or their relative density in space. In the real world. there exist many physical objects such as rivers, lakes and highways, and their presence may affect the result of clustering. In this paper, we define distance to handle obstacles, and using that we propose the density based clustering algorithm called DBSCAN-O to handle obstacles. We show that DBSCAN-O produce different clustering results from previous density based clustering algorithm DBSCAN by our experiment result.
Design and Implementation of Load Balancing Method for Efficient Spatial Query Processing in Clustering Environment
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 384~396
Hybrid query processing method is used for preventing server overload that is created by heavy user connection in Web GIS. In Hybrid query processing method, both server and client participate in spatial query processing. But, Hybrid query processing method is restricted in scalability of server and it can't be fundamentally solution for server overload. So, it is necessary for Web GIS to be brought in web clustering technique. In this thesis, we propose load-balancing method that uses proximity of query region. In this paper, we create tile groups that have relation each tile in same group is very close, and forward client request to the server that can have maximum rate of buffer reuse with considering characteristic of spatial query. With out load balancing method, buffet in server is optimized for exploring spatial index tree and increase rate of buffer reuse, so it can be reduced amount of disk access and increase system performance.
Indexing Methods of Splitting XML Documents
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 397~408
Existing indexing mechanisms of XML data using numbering scheme have a drawback of rebuilding the entire index structure when insertion, deletion, and update occurs on the data. We propose a new indexing mechanism based on split blocks to cope with this problem. The XML data are split into blocks, where there exists at most a relationship between two blocks, and numbering scheme is applied to each block. This mechanism reduces the overhead of rebuilding index structures when insertion, deletion, and update occurs on the data. We also propose two algorithms, Parent-Child Block Merge Algorithm and Ancestor-Descendent Algorithm which retrieve the relationship between two entities in the XML hierarchy using this indexing mechanism. We also propose a mechanism in which the identifier of a block has the information of its Parents' block to expedite retrieval process of the ancestor-descendent relationship and also propose two algorithms. Parent-Child Block Merge Algorithm and Ancestor-Descendent Algorithm using this indexing mechanism.
Real-time Object Tracking using Adaptive Background Image in Video
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 409~418
Object tracking in video is one of subject that computer vision and several practical application field have interest in several years. This paper proposes real time object tracking and face region extraction method that can be applied to security and supervisory system field. For this, in limited environment that camera is fixed and there is seldom change of background image, proposed method detects position of object and traces motion using difference between input image and background image. The system creates adaptive background image and extracts pixels in object using line scan method for more stable object extraction. The real time object tracking is possible through establishment of MBR(Minimum Bounding Rectangle) using extracted pixels. Also, effectiveness for security and supervisory system is improved due to extract face region in established MBR. And through an experiment, the system shows fast real time object tracking under limited environment.
An Enhancement of Removing Noise Branches by Detecting Noise Blobs
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 419~428
Several methods have been studied to prune the parasitic branches that cause unfortunately from thinning a shape to get its skeleton. We found that the symmetric path finding method was most efficient because it followed the boundary pixels of the shape just once. In this paper, its extended method is proposed to apply to removing the noise branches that protrude out of the boundary of a segmented or extracted shape in a given image. The proposed method can remove a noise branch with one-pixel width and also remove the noise branch that includes a round shape called a noise blob. The method uses a 4-8-directional boundary-following technique to determine symmetric paths and finds noise branches with noise blobs by detecting quasi-symmetric paths. Its time complexity is a linear function of the number of boundary pixels. Interactively selectable parameters are used to define various types of noise branches flexibly, which are the branch - size parameter and the blob-size parameter. Experimental results for a practical shape and various artificial shapes showed that the proposed method was very useful for simplifying the shapes.
The Binary Tree Vector Quantization Using Human Visual Properties
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 429~435
In this paper, we propose improved binary tree vector quantization with consideration of spatial sensitivity which is one of the human visual properties. We combine weights in consideration with the responsibility of human visual system according to changes of three primary color in blocks of images with the process of splitting nodes using eigenvector in binary tree vector quantization. Also we propose the novel quality measure of the quantization images that applies MTF(modulation transfer function) to luminance value of quantization error of color image. The test results show that the proposed method generates the quantized images with fine color and performs better than the conventional method in terms of clustering the similar regions. Also the proposed method can get less quantized level images and can reduce the resource occupied by the quantized image.
Video Watermarking Using Human Visual System and Wavelet Transform
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 436~443
A digital video watermarking algorithm is proposed that uses HVS and DWT. In this algorithm, each video frame is decomposed into four-level by DWT which reveals the characteristics of the human eyes and watermark is embedded into DWT coefficients using HVS. For robustness, the lowest level subbands which represent the highest frequency component are excluded in watermark embedding step and watermark is embedded into the perceptually significant coefficients (PSCs) of the rest subbands. PSCs of the baseband are selected according to the amplitude of the coefficients and PSCs of the high frequency subbands are selected by successive subband quantization (SSQ). Watermark is embedded into the PSCs of the baseband and high frequency subbands by Weber's law and spatial masking effect, respectively, for the invisibility and robustness. We tested the performance of the proposed algorithm compared with the conventional watermarking algorithm by computer simulation. Experimental results show that the proposed watermarking algorithm produces a better invisibility and robustness than the conventional algorithm.
Motility Analysis of Gate Myocardium SPECT Image Using Left Ventricle Myocardium Model
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 444~454
An analysis of heart movement is to estimate a role which supplies blood in human body. We have constructed a left ventricle myocardium model and mathematically evaluated the motion of myocardium. The myocardial motility was visualized using some parameters about cardiac motion. We applied the myocardium model in the gated myocardium SPECT image that showed a cardiac biochemical reaction, and analyzed a motility between the gated myocardium SPECT image and the myocardium model. The myocardium model was created of the based on three dimensional super-ellipsoidal model that was using the sinusoidal function. To express a similar form and motion of the left ventricle myocardium, we calculated parameter functions that gave the changing of motion and form. The LSF algorithm was applied to the myocardium gated SPECT image data and the myocardium model, and finally created a fitting model. Then we analyzed a regional motility direction and size of the gated myocardium SPECT image that was constructed on a fitting model. Furthermore, we implemented the Bull's Eye map that had evaluated the heart function for presentation of regional motility. Using myocardium's motion the evaluation of cardiac function of SPECT was estimated by a contraction ability, perfusion etc. However, it is not any estimation about motility. So, We analyzed the myocardium SPECT's motility of utilizing the myocardium model. We expect that the proposed algorithm should be a useful guideline in the heart functional estimation.
Real-time 3D Calibration for Pose Computation in Extended Environments
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 455~461
In Computer Vision-based pose computation systems, markers are often used as reference points: artificially-designed (to maximize the efficiency in detection) markers are installed in the environment and their positions are measured using probing devices such as mechanical digitizers and laser range finders. The camera (or the user) pose is computed based on three or more markers 3D positions and the 2D positions in the image. However, in extended environments, it is impractical to install enough number of markers to be detected by the camera. Instead, natural features, if detected and tracked efficiently, can be used as reference points. These natural features 3D positions need to be measured before they can be used as reference points. In this paper, technologies of utilizing natural features are introduced for pose computation or refinement in extended environments.
A Study on TSIUVC Approximate-Synthesis Method using Least Mean Square and Frequency Division
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 462~468
In a speech coding system using excitation source of voiced and unvoiced, it would be involved a distortion of speech quality in case coexist with a voiced and an unvoiced consonants in a frame. So, I propose TSIUVC(Transition Segment Including Unvoiced Consonant) searching and extraction method in order to uncoexistent with a voiced and unvoiced consonants in a frame. This paper present a new method of TSIUVC approximate-synthesis by using Least Mean Square and frequency band division. As a result, this method obtain a high quality approximation-synthesis waveforms within TSIUVC by using frequency information of 0.547KHz below and 2.813KHz above. The important thing is that the maximum error signal can be made with low distortion approximation-synthesis waveform within TSIUVC. This method has the capability of being applied to a new speech coding of Voiced/Silence/TSIUVC, speech analysis and speech synthesis.
Design and Implementation of e-Commerce User Authentication Interface using the Mouse Gesture
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 469~480
The accurate user- authentication technology is being raised as one of the most important in this current society, which is, so called, information society. Most authentication technology is used to identify users by using the special characteristics of users. This paper has established an e-commerce shopping mall based on conventional e-commerce systems. It also suggested and established the user authentication interface that uses the mouse gesture, which is the new authentication of what users have. The user authentication interface using the mouse gesture generates the status of recognition directly on the screen by comparing the stored pattern values with the unique pattern values that users entered. When users purchase products through the shopping mall and enter their another signature information together with payment information, security can be more increased. Experimental results show that our mouse gesture interface may be useful to provide more security to e-commerce server.
Design and Implementation XML Messaging System Based on TCP/IP
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 481~487
Because XML is a W3C standard and has characteristics like platform-independent, it has a critical role in e-commerce. Business rules and Procedures should be standardized for efficient B2B integration. But a lot of companies are its own XML documents instead of standard documents. Therefore many organizations try to make standards for e-commerce based on framework. In this paper, we designed and implemented XML Messaging System based on TCP/IP protocols. This system are designed by module. Because, it is easy to extensibility of system. So we can more easily and efficiently build e-commerce system based on this XML messaging system.
A Study on the Flow Control Based Estimated Receiving Capacity on the Video Conference System
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 488~495
With the development of networks, multimedia communication has expanded its application field. From the remote control for household electric appliances to medicine, games, video conferencing and multimedia chatting, multimedia communication is being used in all parts of our lives. This multimedia communication requires the transmission of a lot of data at high speed. But if the transmission rate of the communication network exceeds the processing speed of being used in the high speed network environment, a bottleneck occurs in each node and deteriorates the performance of the network. This is the main reason for the slow speed of data transmission and packet loss. In this paper, considering the client's processing performance, reception performance was predicted and the way of flow control was shown. The computing performance of relevant Processor and its performance was estimated through the actual implementation
A Study on Network Architecture for Next Generation Optical Internet based DWDM
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 496~507
Rapidly increasing Internet traffic demands require IP protocol based on high quality networking technology. Accordingy, our Internet has evolved from best-effort service toward differentiated service framework so as to implement QoS as prerequisite to a series of new applications. In addition, it is forecasted that existing transport network will be reorganized into DWDM-based optical Internet sooner or later under the influence of Internet demands for higher bandwidth based on QoS. This study shows a way to an effective implementation in some aspects: QoS implementation on DWDM-based optical Internet network, control protocol, backbone network architecture and switching technology for the Next Generation Internet (NGI).
Adaptive Digital Watermarking using Stochastic Image Modeling Based on Wavelet Transform Domain
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 508~517
This paper presents perceptual model with a stochastic multiresolution characteristic that can be applied with watermark embedding in the biorthogonal wavelet domain. The perceptual model with adaptive watermarking algorithm embeds at the texture and edge region for more strongly embedded watermark by the SSQ. The watermark embedding is based on the computation of a NVF that has local image properties. This method uses non- stationary Gaussian and stationary Generalized Gaussian models because watermark has noise properties. The particularities of embedding in the stationary GG model use shape parameter and variance of each subband regions in multiresolution. To estimate the shape parameter, we use a moment matching method. Non-stationary Gaussian model uses the local mean and variance of each subband. The experiment results of simulation were found to be excellent invisibility and robustness. Experiments of such distortion are executed by Stirmark 3.1 benchmark test.
An Efficient Proxy-Signcryption Scheme for Mobile Communications
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 518~526
According to the development of mobile communications, the future mobile communication systems are expected to provide high quality multimedia service to users. Therefore, many technical factors we needed in these systems. Especially the confidentiality and the security would be obtained through the introduction of the security for mobile communications. In this paper, we propose an efficient Proxy-Signcryption scheme, which can be performed digital signature and encryption by using the proxy agent who has more computational power under mobile communications environment. The proposed scheme provides non-repudiation and prevents creating illegal signature by the origin and proxy agent in a phase of proxy signature processing. This scheme also keeps the confidentiality and the security in mobile communication by means of confirming the signature by right receiver.
SMIL Extensions for Representation and Streaming of Lecture Contents
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 527~538
The contents of remote lectures are written by authoring tools or animation tools. Written contents then integrate existing medias, and are stored in a file type, which is added to the lecturing activities of lecturers. These files are stored according to the kinds of each authoring tool. So, there is no interchangeability and the efficiency of each media is not so good. Due to these structural features, it is not possible to do streaming lectures in on-line environments. In this study, a technique was suggested, which guarantees the interchangeability of remote lecturing contents using SMIL which is a synchronizing multimedia language. The suggested technique is an extended type of SMIL, and includes tags to represent the lectures of tutors which are the specific feature of remote lectures. Additionally, a model, which does streaming SMIL remote lecture contents through on-line, and which transfers control techniques are suggested. The remote lecture contents established by the proposed method can be applied to all authoring tools for remote lectures just by installing conversion modules, and can be a kind of expression model of the synchronizing model for streaming service in on-line environment.
A Study of Design Strategies for Multimedia Content on Domestic Brand Sites
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 539~548
Recently, the reconsideration of the worth of Brand marketing asked marketers and designers alike to deal with the reappearance of Brand marketing on the web environment. The most significant changes are the appearing numerous Brand Sites and the efforts of Brand marketing on the internet. For this paper, I first study about the concept of Brand Sites, and then research the sites from various industrial fields which are selected as a leading Brand by consumers. Through this research, I inspect the realities of applying multimedia contents on domestic Brand web sites, and consider the effects they might have in the building of Brand Images on web sites. In Conclusion, I suggest that the design strategies for applying multimedia contents in the Brand Sites. The purpose of this study is for extending the design opportunities for multimedia contents in the internet. Furthermore, I am continuing my research through studying the interrelationship between Brand recognition and multimedia content usage that are appearing on Brand Sites.
Analysis of the Behavior of Complemented TPNCA Derived from a Linear TPNCA
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 549~555
CA is cost-effective to generate pseudorandom patterns than LFSR. Based on the effectiveness of a CA based pseudorandom pattern generator, CA have been employed successfully in several applications. Especially Nongroup CA is applied to efficient hash function generation, cryptography and image compression. In this paper we analyze the properties of TPNCA and by using basic paths in the 0-tree of a linear TPNCA we analyze the structure of the state-transition graph. Also by showing the structure of the complemented CA which have the acyclic state of the 0-tree as the complement vector is isomorphic to the structure of the original TPNCA, we reduce the time in analyzing the CA-states.
Embedding Mechanism between Pancake and Star, Macro-star Graph
Journal of Korea Multimedia Society, volume 6, issue 3, 2003, Pages 556~564
A Star and Pancake graph also have such a good property of a hypercube and have a low network cost than the hypercube. A Macro-star graph which has the star graph as a basic module has the node symmetry, the maximum fault tolerance, and the hierarchical decomposition property. And, it is an interconnection network which improves the network cost against the Star graph. In this paper, we propose a method to embed between Star graph, Pancake graph, and Macro-star graph using the edge definition of graphs. We prove that the Star graph
can be embedded into Pancake graph
with dilation 4, and Macro-star graph MS(2,n) can be embedded into Pancake graph
with dilation 4. Also, we have a result that the embedding cost, a Pancake graph can be embedded into Star and Macro-star graph, is O(n).