2016 (468)
2015 (468)
2014 (462)
2013 (200)
2012 (118)
2011 (22)
2010 (16)
2009 (33)
2008 (37)
2007 (19)
2006 (5)
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.1-10
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Service discovery has become more complicated than it was just a few years ago, because lots of service discovery platforms are introduced for their own purpose. As a result, the devices concurrently existed in such platforms must be equipped with corresponding modules which enable the devices to communicate with other devices. A great deal of papers dealing with service discovery has recently been published, and many efficient and fast searching schemes are proposed, they, however, do not consider the problem of interoperability between discovery protocols, and scalability as well as user's accommodation needs. Therefore, we propose a Web-based multi-purpose discovery middleware to support discovering in heterogeneous ubiquitous environments, and show that proposed system outperforms in terms of path length and hitting probability.
A Framework of a Personalized Location-based Traveler Recommendation System in Mobile Application
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.11-18
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this era of evolving technology, there are various channels and platforms through which travelers can find tour information and share their tour experience. These include tourism websites, social network sites, blogs, forums, and various search engines such as Google, Yahoo, etc. However, information found in this way is not filtered based on travelers’ preferences. Hence, travelers face an information overflow problem.. There is also increasing demand for more information on local area attractions, such as local food, shopping spots, places of interest and so on during the tour. The goal of this research is to propose a suitable recommendation method for use in a Personalized Location-based Traveler Recommender System (PLTRS) to provide personalized tourism information to its users. A comparative study of available recommender systems and location-based services (LBS) is conducted to explore the different approaches to recommender systems and LBS technology. The effectiveness of the system based on the proposed framework is tested using various scenarios which might be faced by users.
Implementation of Mobile Application about Poly Context USN Data Mining and Display
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.19-26
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Based on Smart Phone, this study added and implemented the mobile App to the existing IT agriculture system, which system automatically controlled green house’s growth environment. The mobile App was developed by referring to the guideline to establish the mobile e-government service for ‘Ministry of Public Administration And Security’ in Korea, based on which environment the study developed the hybrid-App by referring to advanced technologies and how to design them related to the mobile App development. Because the mobile App characterfully possesses high portability, limited resource, mobile wireless network support, enterprise mobile computing support, etc., the hybrid-App should be inevitably adopted. The hybrid App can minimize resource consumption for performing related duties and also, in spite of the mobile device’s limits, it can derive high performance, in which facts the system can ensure the service-based architecture’s reliance and also, implements the highly sophisticated functionality as well. Through the proposed system, the study expects to contribute to improve quality of life as well as to increase farmer’s income through IT-based agriculture system development..
The Analysis of R/S Estimation Algorithm with Applications to WiMAX Network Traffic
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.27-34
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
One of the most popular scale exponent estimation algorithms is the Rescaled Range (R/S) analysis. The algorithm estimates the ratio of a range and standard deviation statistics in a window with increasing length. Firstly, through simulations with generated noise we analyze estimation precision of the algorithm and find that the algorithm overestimates and underestimates at lower and higher bounds of the estimation range correspondingly. Secondly, we analytically analyze the reasons for estimation errors. Based on spectral model of self-similar processes we find that the root of incorrect estimation is in the bias that persists in variance calculated for self-similar processes of limited length. Thirdly, we apply R/S algorithm to estimate scale exponents in WiMAX traffic, finally we compare the estimated exponent with the exponent obtained based on standard deviation statistics.
A Performance Comparison of Information Sharing Protocols in VANET
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.35-42
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the advancement of VANET Different algorithms and architectures has been proposed for sharing information among each other in VANET environment. This paper presents the performance comparison study of information sharing in vehicular ad-hoc network using Hovering Information, Floating Content, AutoCast and Position Based Gossiping based on one performance matrix. The performance was analyzed based on memory usage, delivery cost, bandwidth usage and number of irrelevant packets received by each node. To achieve the best results all protocols have been simulated using the similar simulation settings. We have performed experiments on different traffic model in order to observe the behavior of protocols in different traffic situations.
A Ubiquitous Web Services Framework for Interoperability in Pervasive Environments
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.43-50
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Advances in the areas of pervasive environments, computing, and networking are leading to an infrastructure composed of a large number of heterogeneous services/devices. Although some network protocols accommodate heterogeneity of services and/or devices, existing protocols have various design goals and solutions. This paper outlines a Ubiquitous Web Services Framework which aims to hide the heterogeneity of hardware, software, data formats and communication protocols that is present in today’s pervasive environments. The proposed our framework enables user applications to interact with data from a wide range of networked services/devices using a high-level, abstract interface that features Web Services standards. The work presented here proposes the extended framework in an earlier work for an effective integration of heterogeneous services/devices in pervasive environments. The prototype of our framework have been implemented and evaluated. This paper also concludes with general remarks and a discussion of future works.
A Vision-based 3D Hand Interaction for Marker-based AR
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.51-58
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The hand interaction between a virtual object and human on Augmented Reality is a major issue to manipulate a rendered object in a convenient way. Conventional 2D image-based recognition and interaction technique in AR has a limitation to perform a natural interaction between the user and the virtual object. In this paper, we present a natural 3D hand interaction with the augmented object by the use of stereo-vision technique. The proposed 3D hand interaction technique can obtain 3D hand position and finger direction while hand is approaching to the virtual object. 3D hand interaction can manipulate the virtual object in a feasible fashion. In addition, it can provide various interactions by detecting the collision between the 3D hand and the virtual 3D object on AR.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.59-68
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
As internet businesses are expanding in diverse areas, studies related to web sites are also being performed actively. Especially in the area of e-commerce, web sites trust factors have been treated as a major research issue. However, these studies are mostly on demographic differences among site visitors including cultural differences, regional differences, sex, etc. There exist a few longitudinal studies that compare web site trust factors according to time differences. In this study, we test longitudinal differences of web sites trust factors by comparing questionnaires in year 2001 and year 2011. Based on the study, it is concluded that trust factors web sites of web sites of year 2011 are not same as those of year 2001. Further, the changes show different behavior according to website types.
Caricature System using Moving Least Squares based on Justin
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.69-78
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we propose a new automatically generation system of caricature which emphasizes the unique characteristics of the input images. This system can create the cartoon character similar to user’s features by using set rules adopted a particular artist's technique. Input image is transformed by using MLS(Moving Least Squares) approximation[1] based on a predefined cartoon character’s image. The unique characteristics of user can be detected by comparing the information between the mean face feature and the input face feature extracted by AAM(Active Appearance Model) [2]. In this paper, to exaggerate the detected unique characteristics, we set-up the exaggeration rules using the technique of Justin[10] who is caricature artist. In addition, during the cartooning process, user's hairs and accessories are applied to the deformed image to make a close resemblance. Reliable and matured caricature can be represented through the exaggeration rules of the actual caricature artist's techniques. From this study, we can easily create a cartoon caricature appearing user's feature by combining a caricature with existing cartoon researches.
Planning Methodology for Mapping between Network Bandwidth Capacity and Physical Traffic
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.79-86
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Optimal resources allocation should be done in first establishment stage. But, optimal capacity allocation in consideration of practical standards such as current traffic volume has a significant impact on performance. In this paper, we've attempted to model an appropriate mapping method based on network traffic as the basis for early allocation policy.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.87-96
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Banking transactions using smartphones or more commonly known as “smartphone banking” are increasingly becoming popular as a way for financial transactions given the growing number of smartphone users. The smartphone banking is considered to be different from mobile banking because of the unique and innovative features of smartphones - a combination of a computer and mobile phone that can easily access the Internet. This study based on the Technology Acceptance Model(TAM), examines the factors that influence the intention to use smartphone banking by surveys and analyzing the findings gathered from previous mobile banking related researches. Furthermore, this research identifies the issues of security risk and trust in using smartphone banking in addition to its perceived ease of use and perceived usefulness as key factors suggested under TAM. Statistics on the usage frequency of smartphone banking in Korea shows that the proportion of account transfer transactions are much smaller than the account check transactions, compared with the Internet banking in general. This study explains such less common usage of smartphones for account checking transactions than account transfer transactions, by showing that the key factors (i.e. perceived ease of use and perceived usefulness) have greater impact in account check than in account transfer, and trust has greater impact on account transfer transactions than account check transactions in smartphone banking.
Analyzing Technical Characteristics of Internet-Based Convergent Media and Regulation Determinant
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.97-104
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The purpose of this study is to suggest a regulation determinant applicable for Internet- based convergent media. The adaptation of Internet in the media industry has dismissed the role of scarcity and pervasiveness which used to justify regulating media. A basic question is how technical feature of convergent media affects diversity, one of the essential goals of media regulation. The Structuration theory suggests that media technology doesn’t change the level of diversity directly, but it changes participant’s actions, consequently affecting the level of diversity in a society. Broadcaster as a gatekeeper has a strong incentive to have more power in screening and provisioning information in the process of delivering information to users whereas information owner and user also do so for their sakes. Diversity is promoted when information flows from its origins to final uses without constraints. Considering that the degrees of broadcaster’ s control of information flow are varied depending on architecture of convergent media and it affects the level of diversity it, the study concludes that the level of control over information flow by broadcaster can serve as a regulation determinant of upcoming convergent media. The study is the first to extend structuration theory to the media regulation study and is expected to make a practical contribution as it proposes a unified concept as a guiding rule for convergent media regulation.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.105-112
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study empirically investigates the flow experiences of different feeling levels when using SNS and how this has impact on the interpersonal communication. Using a survey of Facebook users, this study examines how the flow factors of intrinsic motivation impacts the self-disclosure of SNS and the post-hoc interpersonal relation change when people use SNS. Also, we study how the self-disclosure of SNS has an impact on the post-hoc interpersonal relation change. As a result, enjoyment and curiosity of the flow experience has an impact on the self-disclosure of SNS and telepresence has an impact on the post-hoc interpersonal relation change. In addition, the results show the positive effect between the self-disclosure of SNS and the post-hoc interpersonal relation change. This result demonstrates the relationship between the flow experience and the self-disclosure of SNS and supports the logic that self-disclosure on the SNS has impact on the interpersonal relation.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.113-122
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the Korean movie industry, ancillary markets such as online VOD and DVD as opposed to the theater market have continuously decreased since 2005. A major reason for this, according to the researches on ancillary market, is the increase in online movie piracy. The focus of this research is to analyze the influences of utilitarian value and hedonic experiential value consumers feel when they select the movie media and identify its implications and contributing ideas to the effort to convert the demand for illegitimate media to legitimate media. An offline survey on 248 respondents in their 10s’ to 50s’ was used to analyze the movie consumer behaviors. This empirical analysis of consumer behaviors related to media selection demonstrates that hedonic experiential value from the media environment has a greater influence on consumers’ media selection than the utilitarian value in the case of theaters while both the hedonic experiential value and utilitarian value have equally significant influence on consumers’ media selection in the case of online media. The result suggests that, in order to effectively convert the demand for illegitimate movie media to legitimate online media, adjustments in the online media fee as well as the enhancement of consumers’ experiential value of the online media environment need to be pursued.
Optimal Feature Matching Method using Bayesian Graph Theory
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.123-132
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Local feature matching is an essential component of many image and object retrieval algorithms. Feature similarities between object model and scene graph are complemented with a regularization term that measures differences of the relational structure. In this paper, we present a novel approach to the optimal feature matching using new Bayesian graph theory. First, we will discuss properties of various local invariant feature detectors and descriptors for scale, affine transformation and illumination changes. Second, we propose an efficient features corresponding method using local invariant features and new graph matching algorithm. Main theoretical background of our algorithm is that it can be based on the Bayes theorem and an iterative convex successive projection algorithm used to obtain the global optimum solution for feature matching problem. Finally, we have conducted the comparative experiments between proposed method and existing method on various real images. Experimental results show that our method outperforms clearly rather than the existing algorithms about feature correspondence in two images with rotation or scale transformation and illumination changes.
Method to Reliable Interactive Broadcasting Architecture in Convergence Environment
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.133-142
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Owing to the convergence of broadcasting and communication, spread of smart devices, and formation of environments for new media channels, we now face a new paradigm in which wired- and wireless-network-centered content is shared openly. With increasing services that enable the use of real-time broadcasting and content via PCs, smart TVs, and smart phones, users are demanding one-source multi-use (OSMU) services that allow them to use the same content anywhere at any time regardless of device. However, there are difficulties in resolving technical and compatibility issues of smart devices based on different platforms. In addition, there are limitations to developing a reliable certification system for using content freely with heterogeneous devices. This paper suggests a reliable interactive contents delivery system (RICDS) architecture for effectively transmitting and managing OSMU services by using heterogeneous devices in a convergence environment. We also devise a prototype RICDS that is feasible in real system environments.
A Study on Policy-based Access Control Model in SNS
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.143-150
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Security and privacy have emerged as important issues owing to the proliferation of social networking site. Sharing and distribution of relationship-based information on social network sites can have a serious impact on an individual’s activity; moreover, it can exert a negative influence on the overall information society. To solve security and privacy issues of social networking, we introduce a policy-based access control model to support access control based on privacy policies. Our system helps to protect users from potential dangers in social network environments. This work examines the practical applicability of the model by prototyping the system implementation method in the web environment. We also compare our research with other studies on privacy protection for social networks.
A Consolidated Authentication Model in Cloud Computing Environments
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.151-160
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Due to increasing needs of Internet access through smart phones and smart pads, it is essential to have service provider systems, which allows to access services through a variety of devices. In particular, this system is required to protect credential and personal information saved in each device, is need a more efficient and secure consolidated authentication model (CAM) in order to authenticate a user and devices. This paper analyzes the current user authentication model for both user and device authentication and securely available credential (SACRED) standards. Furthermore, it is also our intention to design N-screen based consolidated user authentication model that meets framework and protocol requirement of credentials and privacy protection requirements in a cloud computing environments.
Intelligent Detecting Risk based on Privacy in Cloud Computing Environments
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No3 2012.07 pp.161-168
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Cloud computing has been activated as a means of reducing costs and the effective utilization of IT infrastructure. Despite these changes, Service providers focus almost exclusively on the issues offering service availability without ensuring data privacy. The purpose of this paper is to analyze privacy threats in cloud computing and protect mobile user’s personal information against from increasing privacy infringement attacks. So we suggested that privacy risk detection mechanism is the most appropriate means of protecting data privacy in cloud computing. The IDRP(Intelligent Detecting Risk based on Privacy) model is composed of these five mechanisms: 1) Information Verified Mechanism, 2) Path Checked Mechanism, 3) Malicious Coding Detecting Mechanism, 4) Semantic Analyzing Mechanism, and 5) Notice and Alert. With these security functions, the IDRP model will be an essential system to detect privacy-related threats and minimize them in cloud computing.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.