Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 8, Issue 12 - Dec 2005
Volume 8, Issue 11 - Nov 2005
Volume 8, Issue 10 - Oct 2005
Volume 8, Issue 9 - Sep 2005
Volume 8, Issue 8 - Aug 2005
Volume 8, Issue 7 - Jul 2005
Volume 8, Issue 6 - Jun 2005
Volume 8, Issue 5 - May 2005
Volume 8, Issue 4 - Apr 2005
Volume 8, Issue 3 - Mar 2005
Volume 8, Issue 2 - Feb 2005
Volume 8, Issue 1 - Jan 2005
Selecting the target year
Transcoding Web Documents Using CC/PP and Annotation
Kim Hwe-Mo ; Song Teuk-Seob ; Choy Yoon-Chul ; Lee Kyong-Ho ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 137~153
An Index Method for Storing and Extracting XML Documents
Kim Woosaeng ; Song Jungsuk ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 154~163
Because most researches that were studied so far on XML documents used an absolute coordinate system in most of the index techniques, the update operation makes a large burden. To express the structural relations between elements, attributes and text, we need to reconstruct the structure of the coordinates. As the reconstruction process proceeds through out the entire XML document in a cascade manner, which is not limited to the current changing node, a serious performance problem may be caused by the frequent update operations. In this paper, we propose an index technique based on extensible index that does not cause serious performance degradations. It can limit the number of node to participate in reconstruction process and improve lots of performance capacities on the whole. And extensible index performs the containment relationship query by the simple expression using SQL statement.
Edge Based Dynamic Brush Stroke Generation for Painterly Rendering
Park Youngsup ; Yoon Kyunghyun ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 164~173
Painterly rendering may bring various results through the parameters that determine the characteristics of brush strokes such as, color, orientation, size, and shape. In this paper, we propose the most adaptive brush stroke generation for source images, using reference data. Our algorithm used Colors formed by actual palette colors from artists. To create the palette, we have referred mostly to colors used in Van Gogh's works and determined the color of brush strokes by transferring it to the most similar one, through comparing colors used in source images and the palette colors. Also, In order to emulate a brush stroke with dynamic properties like Van Gogh styles we have applied a brush stroke orientation that surrounds the edges by referring to the edge orientation of source images. The sizes were determined depending on the different sizes of the objects from wide to narrow brushes. Finally, we applied spline curve shapes to simulate curves and swirls like Van Gogh styles. The brush strokes created in such method, were applied separately according to its segmented images, and composed after rendering.
Line-Edge Detection Using New 2-D Wavelet Function
Bae Sang-Bum ; Kim Nam-Ho ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 174~180
Points of sharp variations in image are the most important components when we analyze the features of image. And they include a variety of information about image's shape and location etc. So a lot of researches for detecting edges have been continued. Edge detection operators which were used at the early stage of the research were to utilize relations among neighboring pixels. These methods detect edge at all boundaries, therefore they perform edge detection twice about curves below some width such as line-edge. In the meantime, wavelet transform which is presented as a new technique of signal processing field provides multiscale edge detection and is being applied widely in many fields that analyze edge-like characteristic. Therefore, in this paper we detected line-edge with new 2-D wavelet function which is independent of line's width.
The Recognition of Grapheme 'ㅁ', 'ㅇ' Using Neighbor Angle Histogram and Modified Hausdorff Distance
Chang Won-Du ; Kim Ha-Young ; Cha Eui-Young ; Kim Do-Hyeon ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 181~191
The classification error of 'ㅁ', 'ㅇ' is one of the main causes of incorrect recognition in Korean characters, but there haven't been enough researches to solve this problem. In this paper, a new feature extraction method from Korean grapheme is proposed to recognize 'ㅁ', 'ㅇ'effectively. First, we defined an optimal neighbor-distance selection measure using modified Hausdorff distance, which we determined the optimal neighbor-distance by. And we extracted neighbor-angle feature which was used as the effective feature to classify the two graphemes 'ㅁ', 'ㅇ'. Experimental results show that the proposed feature extraction method worked efficiently with the small number of features and could recognize the untrained patterns better than the conventional methods. It proves that the proposed method has a generality and stability for pattern recognition.
Improved UPC Algorithm Adopting a Dynamic Spacer for Traffic Control in ATM Networks
Kim Wu Woan ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 192~200
In this paper, an improved User Parameter Control (UPC) algorithm is proposed for controlling traffic in ATM networks. The present algorithm consists of Cell Buffer, Red Token Pool, Green Token Pool, and Spacer. A token is generated at a certain time period, and the tokens are consumed one each time a cell arrives. At this time, if the delay element, named Spacer, is empty, the cell comes into the network. On the other hand, if Spacer is not empty, the cell cannot come into the network. In addition, in the case that tokens do not exist in Token Pool, the corresponding cell is thrown away The arbitrary function of the token used in this paper is removed. Instead, the token is used only to control network traffic. This research proposes new UPC Algorithm to improve the current cell delay rate and cell loss rate by dynamically adopting the delay element, named Spacer, with respect to the traffic condition, which is different from controlling that the cell comes into the network after a certain delay time period.
A Low-Power 2-D DCT/IDCT Architecture through Dynamic Control of Data Driven and Fine-Grain Partitioned Bit-Slices
Kim Kyeounsoo ; Ryu Dae-Hyun ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 201~210
This paper proposes a power efficient 2-dimensional DCT/IDCT architecture driven by input data to be processed. The architecture achieves low power by taking advantage of the typically large fraction of zero and small-valued input processing data in video and image data compression. In particular, it skips multiplication by zero and dynamically activates/deactivates required bit-slices of fine-grain bit partitioned adders within multipliers and accumulators using simple input ANDing and bit-slice MASKing. The processed results from 1-D DCT/IDCT do not have unnecessary sign extension bits (SEBs), which are used for further power reduction in matrix transposer. The results extracted by bit-level transition activity simulations indicate significant power reduction compared to conventional designs.
Extended GTRBAC Model for Access Control Enforcement in Enterprise Environments
Park Dong-Eue ; Hwang Yu-Dong ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 211~224
With the wide acceptance of the Internet and the Web, volumes of information and related users have increased and companies have become to need security mechanisms to effectively protect important information for business activities and security problems have become increasingly difficult. This paper proposes a improved access control model for access control enforcement in enterprise environments through the integration of the temporal constraint character of the GT-RBAC model and sub-role hierarchies concept. The proposed model, called Extended GT-RBAC(Extended Generalized Temporal Role Based Access Control) Model, supports characteristics of GTRBAC model such as of temporal constraint, various time-constrained cardinality, control now dependency and separation of duty constraints(SoDs). Also it supports unconditional inheritance based on the degree of inheritance and business characteristics by using sub-roles hierarchies in order to allow expressing access control policies at a finer granularity in corporate enterprise environments.
An Implementation of the Web Service for Authorization and Speech Recognition in the Mobile Environment
Oh Jee-Young ; Kim Yoon-Joong ; Ko You-Jung ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 225~232
A PDA has limitation of storage space and inconvenience of Pen-based equipment to input. To solve these problems, this paper implemented that previous Speech Recognition provides using XML(extensile Markup Language) Web Service and PDA Client is possible to use speech command by request Speech Recognition Web Service. This system consists of Mobile Client and Speech Recognition Web Service Provider. The Mobile Client transmits user information and speech data to the Speech Recognition Web Service Provider using DIME(Direct Internet Message Encapsulation). The Speech Recognition Web Service Provider returns recognition results and user name only to an authorized Mobile Client. So We are able to use speech service without installing Speech Recognition or Speech DB in PDA.
A Development Technique for Application Software Based on Intrusion Tolerant Requirements
Kim Chul Jin ; Lee Sook Hee ; Cho Eun Sook ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 233~248
An intrusion tolerant technology has been introduced as a solution to prevent intrusion accident for unknown fragility or attack. However, a systematic modeling technique is not applied into a system design and development based on intrusion tolerant technology. Especially, elements such as availability, integrity, reliability, confidentiality, and so on are important requirements in intrusion tolerant system. Nevertheless, current most of UML-based modeling techniques pass over or don't provide design techniques reflecting those requirements. Therefore, we know these weaknesses and propose both profile and design technique reflecting and applying intrusion tolerant requirements systematically in the development of application software based on intrusion tolerance. We expect that proposed technique can extend not only current UML's limitations but also can improve the quality of application software based on intrusion tolerance.
A Study on Shifted Multi-Z-Buffers Anti-Aliasing for 3D Implicit Surface Rendering
Park Hwa Jin ; Kim Hak Ran ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 249~257
This paper aims at reducing aliasing in pixel-based rendering for 3D implicit surfaces by shifted multi Z-buffers. The voxelized implicit surfaces with high resolution take so much time in generating high Quality image without aliasing. So in rendering a voxelized implicit surfaces, a new antialiasing method which can generate a high quality image at a lower resolution is required. Therefore, this paper suggests that a method which get various sampling values by shifting several z-buffers in each voxel and average them, The advantages are effective memory, simple calculation and easy convergence with various filters. But, the increase of number of z-buffer also increase the consuming time rapidly. Therefore, the research for representing the relation the degree of image quality with the consumption of time as a number is required
A Mobile Multicasting Mechanism Based on Mobility Information of Mobile Hosts
Baek DeukHwa ; Kim Jaesoo ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 258~268
The efficient provision of multicast service to moving hosts in mobile computing environments is not so easy task. Bi-directional tunneling scheme causes overhead about encapsulation and triangular routing. On the other hand, remote subscription scheme need freDuent tree reconstruction, which is inefficient for rapid moving hosts. In this paper we propose Mobility Based Mobile Multicast(MBMOM) scheme which is based on host's mobility information. Ultimately MBMOM try to find the strong points of remote subscription scheme and hi-directional tunneling scheme. If host's mobility speed is considered to be high, multicast packets are forwarded using hi-directional tunneling scheme from home agent continuously. If host's mobility speed is considered to be slow, remote subscription scheme is applied for foreign agent and it try to join multicast tree. We developed analytical models to analyze the performance of proposed scheme and simulated our scheme compared with MOM(Mobile Multicast), RBMOM(Range Based MOM), and TBMOM(Timer Based MOM) schemes. Simulation results show that our scheme has shorter transmission delay than above 3 schemes in the aspect of host's mobility speed and multicast group size.
Implementation of a Video Retrieval System Using Annotation and Comparison Area Learning of Key-Frames
Lee Keun-Wang ; Kim Hee-Sook ; Lee Jong-Hee ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 269~278
In order to process video data effectively, it is required that the content information of video data is loaded in database and semantics-based retrieval method can be available for various queries of users. In this paper, we propose a video retrieval system which support semantics retrieval of various users for massive video data by user's keywords and comparison area learning based on automatic agent. By user's fundamental query and selection of image for key frame that extracted from query, the agent gives the detail shape for annotation of extracted key frame. Also, key frame selected by user becomes a query image and searches the most similar key frame through color histogram comparison and comparison area learning method that proposed. From experiment, the designed and implemented system showed high precision ratio in performance assessment more than 93 percents.
Conflict Resolution for Data Synchronization in Multiple Devices
Oh Seman ; La Hwanggyun ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 279~286
As the mobile environment has been generalized, data synchronization with mobile devices or mobile device and PC/server is required. To deal with the problem, the consortium was established by the companies, such as Motorola, Ericsson, and Nokia, and released SyncML(Synchronization Markup Language) as a standard of industrial area for interoperating with data synchronization and various transmission protocol. But, in synchronization process, when more than two clients requested data synchronization, data conflict can be happened. This paper studies the various conflict reasons that can happen in data synchronization processes and groups them systematically Through the analyzed information, we compose the Change Log Information(CLI) that can keep track of the chased information about synchronization. And we suggest an operation policy using CLI. Finally, we design an algorithm and adapt the policy as a method for the safety and consistency of data.
Hangul Input Method for Small Electronic Networking Devices
Kang Seung-Shik ; Hahn Kwang-Soo ;
Journal of Korea Multimedia Society, volume 8, issue 2, 2005, Pages 287~295
For a quick and easy way of writing Hangul in hand-held devices, we analyzed the combination rules of Hangul alphabets that we constructed a small set of Hangul alphabets that combines a whole set of Hangul alphabets. Hangul consonants are generated from base set of consonants with function keys and vowels are constructed from eight base set of vowels by combination rules and stroke-adding rules. Especially, we adopted an easy error-correction method to resolve the inconvenience of using a delete key for vowel harmony errors. Futhermore, we diversified the input method of diphthongs for user-friendliness by minimizing the efforts of teaming vowel combination rules. We compared our method with previous methods of 'Chon-Ji-In' and 'Na-Rat-Keul' that the proposed method is better than the previous methods in input speed and error correction functionality.