Earticle

현재 위치 Home

International Journal of Multimedia and Ubiquitous Engineering

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJMUE) [Science & Engineering Research Support Center, Republic of Korea(IJMUE)]
  • pISSN
    1975-0080
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.8 No.6 (39건)
No
1

An Adaptive Pointing and Correction Algorithm Using Genetic Approach

Jung Jae Jo, Young Chul Kim

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.1-10

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we propose a new user-adaptive pointing and correction algorithm applied in the field of smart sensing. The error from the accelerometer sensor’s output must be carefully managed as the sensor is more sensitive to data change compared to that of the gyroscope sensor. Thus, we minimize noise by applying the Kalman filtering to data for each axis from the accelerometer. In addition, we can also obtain effect compensating hand tremor by applying the Kalman filter to the data variation for x and y. In this study, we extract data through the Quaternion mapping process on data from the accelerometer and gyroscope. In turn, we can obtain a tilt compensation by applying the compensation algorithm with acceleration of the gravity of the extracted data. Moreover, in order to correct the inaccuracy on smart sensors due to the rapid movement of a device, we propose and integrate a genetic approach.

2

XML Map Metadata Format for Open Map Sources : A Survey and Overview

SeungGwan Lee, SangHyeok An, Sungwon Lee

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.11-18

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the field of Geographic Information Systems, Volunteered Geographic Information (VGI) are achieving through the open source map database (DB) construction approach. Multiple map DB providers employ open source technologies in attempting to reduce unknown map information in their proprietary maps. In this paper, we survey and overview an eXtensible Markup Language (XML) metadata format for open source maps based on cloud computing and a mash-up between navigation systems and users. New road information is extracted by onboard navigation systems during travel over such roads by drivers or voluntary participants. Metadata recording the road information is generated in an XML map format that is then made available to heterogeneous navigation systems through a cloud computing environment. Specifically, map metadata is provided to various map DB providers through open source network interfaces, after which map DB providers can efficiently relay the updated map information in their proprietary map DB formats.

3

Intrusion Tolerant-based Lightweight CA Model for Wireless Mesh Networks

Ping Guo, Jin Wang, JieZhong Zhu, YaPing Cheng, Jeong-Uk Kim

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.19-30

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In a Wireless Mesh Network (WMN), we cannot assume the existence of a trusted certificate authority that is used in regular Public-Key Infrastructure (PKI). Hence a cooperative approach in which a cluster of some nodes can issue certificates to other nodes in a self-organizing manner is considered to be more suitable to the Ad-hoc nature of WMNs. In this paper, we propose a new trust establishment scheme providing an efficient and lightweight public key authentication without the presence of any trusted third party neither in bootstrapping network phase nor during network life time. Combined threshold mechanism and lightweight Certificate Authority idea, A lightweight and tolerate CA (LTCA) model has been put forwarded. LTCA is not only reformed to realize lightweight structure, but also equipped with intrusion tolerant ability which has been realized by dividing CA’s private key into n shares and distributing them into n servers. Simulation results show that the threshold mechanism does not significantly increase the computational cost of communication, but the security of LTCA’s private key is improved extremely.

5

Super-Resolution for Surveillance Facial Images via Shape Prior and Residue Compensation

Tao Lu, Ruimin Hu, Junjun Jiang, Yanduo Zhang, Wei He

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.47-58

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Super-resolution (SR) methods are widely used to enhance the resolution of input images such as low-resolution (LR) remote or surveillance images. The key problem of SR algorithm is to introduce a proper prior for high-resolution (HR) image reconstruction. Usually pixel feature based similarity measure is used as prior. While in real surveillance applications, images are often disturbed by noise so that it is not enough to only use the prior from pixel domain to achieve satisfied high-resolution. In this paper, a two-phase based face hallucination approach via shape prior (SP) is proposed. Firstly, the Active Appearance Model (AAM) is used as shape prior to reconstruct the global face. Then the high frequency information as detailed inartificial facial features of HR face image is compensated to the global face. Experiments show that the proposed algorithm improves the subjective and objective quality of the input LR facial images and outperform many states-of-the- art super-resolution methods.

6

An Evaluation Method of Event Information for Efficient Data Fusion

Donghyok Suh, Juhye Yook

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.59-66

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Multi-sensors data fusion takes center stage in wireless sensor network system for acquiring more precise information. The event information detected and reported by sensors is often not reliable to infer contexts. The study presents that the data are evaluated before the data fusion on all event information acquired is occurred in the aggregate. The evaluation of event information is to estimate if context inference is possible and to reduce the processes of unnecessary multi-sensors data fusion. The study shows the frequency of event occurrences and the average variation rates of the data reported by the sensors for evaluating event information as the evaluation criteria. As a result of evaluating event information based on the suggested evaluation criteria and processing data fusion selectively, unnecessary data fusion processes were reduced, the data processes for context inference were decreased, and eventually the efficiency of context inference was improved.

7

The Korean Media in Los Angeles : Their Role in the Multicultural Society

Jin-Young Kim

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.67-74

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The Korean media in LA have come a long way to help Koreans adapt to American society and at the same time, to provide them with necessary information to understand current issues in Korea almost simultaneously. Also, as LA Koreatown is the largest Korean community overseas, the Korean media in LA play a crucial role to bridge the gap between the generations and between Korea and America. Even though, many Korean media tend to work in poor condition and lack of experienced employees compared to the mainstream media, they take responsibilities for immigrants who were usually exempted from the white-predominant media by customizing the news and information for the Korean community. As of 2010, the Overseas Korean Foundation Support Act was enacted in Korea. Accordingly, the Act insures that the government supports overseas Korean media in a variety of fields with technical as well as financial support. In this context, despite of growing concerns about possible constriction of freedom of speech, the Korean media in LA definitely enter a new epoch.

8

Correlation-Based Watermarking Scheme Using Complete Complementary Code

De Li, WenJi Quan, JongWeon Kim

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.75-86

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Digital watermarking technologies with spread spectrum sequences (SS) have previously proposed. However, the SS sequences used in previous studies do not necessarily have good correlation properties. The previous studies also have proposed the complete complementary codes (CCC), which have an ideal auto-correlation and cross-correlation properties and methods for the construction and extension of the complete complementary codes. However, some methods in the studies do not have good auto-correlation or cross-correlation properties. In this paper, we used the latest complete complementary code constructor to detect the embedded secret information from the watermarked images. In the experimental results, we successfully detected the secret information from the watermark against various attacks.

9

An Adaptive Algorithm to Recommend Favorable Digital Music

Taek Lee, Hoh Peter In

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.87-96

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Many people enjoy digital music (e.g., MP3 songs), usually with random play mode, or their own favorable play list that they have composed. However, such play modes do not consider and support listener preferences of feeling or mood changing with time. Usually listeners have dynamic, not static, demands on music based on their arbitrary situation or mood (e.g., when studying, exercising, being sorrowful, being happy, etc.), so an adaptive algorithm to meet the momentary demand is required. This paper proposes an adaptive algorithm to recommend favorable songs successively, and enable people to seamlessly keep listening to favorable songs, without the action of skipping disliked ones. The algorithm monitors if a listener likes or dislikes a song currently being played. Once the algorithm detects that a listener likes the song, the algorithm recommends the next song that is most similar to the current song. Otherwise, the algorithm recommends quite a different style of a song as the next one, by recognizing that the listener now has a different demand. In our experiment, the proposed algorithm showed better performance, in terms of reducing the action of frequently skipping songs, than random play mode, with statistical significance.

10

Context-Aware Information-Based Access Restriction Scheme for Cloud Data

Seul-Ki Choi, Jin Kwak

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.97-104

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

To provide secure and efficient access control methods in cloud computing environments, many system models have been proposed that employ attribute-based encryption and proxy re-encryption schemes. Most of these access control schemes are based on the user’s authentication information and access privileges. However, when users request access privileges through non-secure environments such as mobile devices and wireless networks, we need to be able to restrict access requests, depending on the user’s context-aware information. To achieve this, in this paper we propose an access restriction scheme for access to cloud data that is based on context-aware information.

11

RMF: Rough Set Membership Function-based for Clustering Web Transactions

Tutut Herawan, Wan Maseri Wan Mohd

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.105-118

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

One of the most important techniques to improve information management on the web in order to obtain better understanding of user's behaviour is clustering web data. Currently, the rough approximation-based clustering technique has been used to group web transactions into clusters. It is based on the similarity of upper approximations of transactions to merge between two or more clusters. However, in reviewing the technique, it has a weakness in terms of processing time in obtaining web clusters. In this paper, an alternative technique for grouping web transactions using rough set theory, named RMF is proposed. It is based on the rough membership function of a transaction similarity class with respect to the other classes. The two UCI benchmarks datasets are opted in the experimental processes. The experimental results reveal that the proposed technique has an benefit of low time complexity as compared to the baseline technique up to 67 %.

12

An Efficient Implementation of Context-aware Saliency Using a Stochastic Approach

Geurim Yun, Heekyung Yang, Kyungha Min

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.119-126

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The computation of saliency from an image and a video is an interesting challenge in image processing and computer vision. Context-aware saliency, which addresses the saliency based on the geometric structure of an image, is known as one of the most powerful schemes for computing saliency. An obstacle of the context-aware scheme is the heavy computation load. We reduce computational loads in a great scale by applying the dart throwing algorithm.

13

Optimal Point Correspondence for Image Registration in 2D Images

Kitae Bae, Hyoungjin Kim

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.127-140

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The conventional search methods have computational complexity problem and imprecision problem in correspondence matching process. To resolve these problems, we propose how to effectively make feature space (distance map) and how to rapidly search the optimal point correspondence. The proposed distance map named Voronoi distance map is a 2-Dimensional surface that contains the distance information between each element(x-y coordinates) of image and the nearest feature point. The proposed distance map is efficiently created based on the priority-based calculation algorithm. The general distance calculation algorithm has a time complexity of O(w*h*n). (w = width, h = height, n = the number of feature points) whereas the priority-based distance calculation algorithm is a effective method with a computational cost of O(w*h*logn). Also, The partition search algorithm is a efficient method that can detect corresponding points very rapidly because this method can reduce the search range by a quarter at a time. Experimental results show that the proposed method outperforms conventional methods in reducing computation time and detecting the optimal correspondence.

14

Development of a Portable Embedded Patient Monitoring System

Jungmuk Kang, Sungil Yoo, Dongik Oh

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.141-150

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

One of the first medical devices we encounter when we visit a hospital care unit is the patient monitoring (PM) system. This system informs doctors and nurses about the patient’s vital signs. However, typical PMs do not have a remote monitoring capability, which necessitates constant onsite attendance by support personnel. Further, PMs are generally too large to carry. Thus, we have developed a Wireless Patient Monitoring System (WIPAMS), which is a portable PM that monitors the biomedical signs of patients in real time and sends them to remote stations for display, with alerts when necessary. WIPAMS differs from conventional PMs in two aspects: first, its wireless communication capability allows vital signs to be monitored remotely so it obviates the requirement for onsite support personnel; and second, it is portable so patients can move around while their biomedical signs are being monitored. WIPAMS is also notable because of its implementation: it uses Android as the underlying OS, while a pulse oximeter, thermometer, and electrocardiogram reader are integrated into the system. Monitoring and communication applications are implemented on the OS using threads, which facilitates the stable and timely manipulation of signals and the appropriate sharing of resources. Based on the graphic display of the biomedical data collected, we verified that the multitasking implementation used in the system was suitable for PMs and for other u-Healthcare applications.

15

Implementation of a Wireless Controlled Device with RGB Driving Based on FFT

Zhang Hong, Tian Chunwei, Lin Gaoya, Wang Hongbin

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.151-158

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A novel device which can play audio files with LED lights whose RGB effects are based on frequency spectrum analysis to the audio signal while it is playing is introduced in this paper. Not only can the device bring us with songs, but also it presents colorful lights while we appreciate music. RGB light mixed principle and the relations between music and light colors which are through LED lights driven by PWM are investigated. The device is composed of SD card, U disk to store medium files, the audio decoder to produce audio signals, speakers etc., and the all components are under the control of a microprocessor. The proper sampling rate is chosen for frequency analysis, and the Fast Fourier Transform (FFT) method is optimized to suite for the application. File system is implanted to the microprocessor system which possesses wireless communication Xbee, whose functions such as medium file selection can be controlled remotely.

16

In this paper, we present thermal characteristics of temperature sensor using fiber Bragg grating(FBG), including peak reflectivity, FWHM bandwidth and various normalized refractive index change along temperature variation. The temperature stability of FBG temperature sensor can be changed by varying the refractive index change and grating length. The proposed FBG temperature sensor can measure up to about 600℃ and heating time from 1000 hours. We can easily expect that various numerical results can be utilized as important ones when a sensor for measuring a temperature is implemented using a FBG technique.

17

Fast Generation Algorithm of Digital Hologram based Depth Difference Temporal Filtering

Hyun-Jun Choi

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.171-180

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A CGH (Computer-Generated Hologram) is produced by calculating the interference pattern between the object wave and the reference wave. Thus it has been developed to get some ideal characteristics of CGH that are not possible in reality or to test the characteristics of a hologram. To generate a CGH with the hologram resolution of (M×N) for a 3D object having K light source, basically (N×N×K) calculational iterations are necessary. This paper proposes an algorithm that increases the speed of generating a digital hologram using a depth different temporal filtering (DDTF) of a depth video sequence. The proposed algorithm is a technique that performs CGH operation with only calculation the different depth values between the depth video frames. The experimental results showed that the proposed algorithm increased operation speed by 65% over the technique using the conventional CGH equation.

18

A Study on the Communication Methods of Designing On-Air Promotion System

Hyun Hahm

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.181-188

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Designing on-air promotion is very important role of communicate with target audiences within television network system. As competiton within the different television network as the role and importance of marketing plan in order to have a fixed the viewers. Moreover, it become more complex and need a variety of method of frameworks need to access toward of target audiences. Beside, on-air ptomotion change in broadcasting network system in order to keep rating of watching television program. It also directly influences not only television network positiong themselvesm, but also keep the target audiences. Therefore, this paper will focus on how on-air promotion works for tool of promotion in television netwokr system, and look at the structure of frameworks as design of communication methods.

19

The Application of MAS towards Simulation of Forest Fire Spreading

Zuowei Huang, Fang Liu

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.189-200

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

20

Audio Analysis & Creating Reverberation Plug-ins In Digital Audio Engineering

Yoemun Yun

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.201-208

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In audio engineering, early reflection patterns are not usually variable, such as the user makes a selection from a handful of stored patterns simulating various rooms, halls, chambers and plates, or small room ambience, reflections is variable. To create digital reverb is much more complicated than combining a few digital relay units. The greater the spacing the larger the room sounds. Some difficult problems happened in recording situation is that every acoustic instrument engineers record sounds small or dry because their recording room does not have the same degree and circumstances of acoustic ambience as good as concert halls or venues. As a matter of fact that the same situation is also true of the most professional studios, apart from those with large, live rooms, and most pop music is recorded dry enough, either in a dry environment. In that case, people use close miking technique to get right sound source. Electronic effects units are used to recreate the desired ambience, and by far the most important effects unit of them all is reverberation.

21

Speech Sobriety Test Based on Formant Energy Distribution

Chan-Joong Jung, Seong-Geon Bae, Myung-Sook Kim, Myung-Jin Bae

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.209-216

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

When a person is drunk, lung capacity, lung movement velocity and air pulse change. Drunken people show unique characteristics especially in their speeches with respect to the spectrum area because they tend to speak more forcefully. In other words, the spectrum in the low frequency band area and high frequency band area become relatively flat. This paper suggests that it is possible to develop a sobriety test using speech analysis based on formant energy distribution. The test utilizes the errors in forming the formant envelope between high order linear prediction coding and low order linear prediction coding. About 65% accuracy was obtained in determining whether or not a person is sober by this method.

22

Computer Simulation on Fuzzy Control of Semi-active Suspension System Based on the Whole Vehicle

Jianfeng Wang, Chuanxue Song

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.217-228

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the development of technology, new materials have been invented, which have been applied to improve the performance of structures. Recently, researchers pay their attention to controllable fluids and its applications. Magneto rheological (MR) damper is a kind of devices that uses rheological fluids to modify their mechanical properties. Their mechanical simplicity, large dynamic range, low power requirements, large force capacity, robustness and safe manner operation in case of failure have made them attractive devices to semi-active control in civil, aerospace and automotive fields. The characteristics of the MR damper will change when the rheological fluid is exposed to a magnetic field changing its stiffness and damping coefficients. In this paper, the mathematical models of a seven-degree-of-freedom suspension system based on the whole vehicle are established and the fuzzy controller of vehicle semi-active suspension system is designed. Using Matlab/Simulink software package, the simulation results show that the performance of MR semi-active suspension system with fuzzy controller is better than that of passive suspension system. It is a successful reference for the application of MR semi-active suspension in the vehicle.

23

Hi-pass Pink Noise: Its Acoustic Features and Standard Volume

Doo-Heon Kyon, Won-Hee Lee, Myung-Sook Kim, Myung-Jin Bae

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.229-236

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper reviews the irregular acoustic properties of pink noise and its improper use as a common reference sound source, and proposes hi-pass pink noise as a new reference sound source. Hi-pass pink noise can be identified as a sound source created by eliminating unnecessary energy below the audible pitch range in pink noise. Compared to regular pink noise, hi-pass pink noise of 20 Hz had a minimum of 20% reduction in energy and a marginal increase of 0.7dBFS amplitude, while hi-pass pink noise of 40 Hz had 30% reduction in energy and 1.6dBFS marginal increase in amplitude. In spite of such changes in physical features, hi-pass pink noise does not produce any audible difference. The paper also suggests that Comfortable Maximum Level (CML) can be utilized as a standard volume when comparing multiple sound sources.

24

The purpose of this study is to understand how the Digital Textbook interface developed in the leading researches affects learner’s motivation. As a result, four out of seven interest factor of Digital textbook interface affect learning motivation. These interest factors are emphatic factor, esthetic factor, explorative factor, and cognitive factor. Experimental factor also is proven to be a potential influential factor. The leading researches proved that most of interest factors have a meaningful effect on learning motivation. Therefore, the interest factors supplied in the Digital Textbook user interface confirmed its education value.

25

Publish/subscribe systems based on gossip protocols are elastically to scale in and out and provides suitable consistency guarantees for data safety and high availability but, does not deal with end-to-end message delay and message order-based consistency. Especially in real-time collaborative applications, it is possible for the messages to take each a different time to arrive at end users. So, these applications should be based on P/S infrastructure including dealing with message deadlines and message ordering consistencies. Gossip communication is becoming one of the promising solutions for addressing P/S scalability problems in providing information propagation functionality by exploiting a mixture of diverse consistency options. In this paper, we present a new causal order protocol based on scalable P/S architecture for real-time collaborative applications in social web platforms to guarantee causally ordered message delivery, respecting deadline-constraints from brokers to subscribers. In the proposed protocol, every broker manages a 2-dimensional vector, representing its knowledge of the last message sent by each broker at a certain time. But, every broker disseminates a multicast message with a 1-dimensional vector, the time-stamped information that represents the maximum number of gossip rounds to subscribers because all messages disseminated by brokers have the same deadline as the maximum number of gossip rounds. Therefore, the proposed protocol for P/S based on gossiping results in very low communication overhead from brokers to subscribers in the context of respecting deadline-constraints.

26

The Design and Research of the Sliding Mode Control of a New Chaotic System

Xuexiang Li

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.257-268

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This thesis makes a research about the Sliding Mode Control of a new chaotic system. Taking advantage of PI switching manifold method, it projects a kind of sliding mode controller and fuzzy the switching function of sliding mode surface with membership function, then finally adopts the output of fuzzy controller. What’s more, this method simultaneously makes full use of PI control as well as SMC based on the new area control error, choosing the integral sliding surface equation which makes the system enter into the state of sliding mode from the beginning. Then it turns into the PI control on the basis of new area control error. Making the system output track a given goal until the elimination of tracking error in the main theoretically proves the global stability of this sliding mode controller, and the numerical simulation experiment further shows its simplicity as well as availability, besides, makes sure the steady availability of the whole system.

27

Painterly Rendering Based on Piano Interface

Kyeong A Kwon, Hae Won Byun

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.269-278

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we propose a new painterly rendering technique for visualizing sound, based on correlation between sight and auditory. We analyze the sound feature to create a painterly image which is dependent upon the input music that is playing by user using the piano interface. We analyze the tempo, the frequency, and the octave which are the basic characteristics of sound features. Sound features are used to determine strokes shapes, colors, and brightness which are the crucial elements to complete the pictorial rendering. In addition, during the rendering process, we use a multiple layer system to overlap the layers. From this study, we can create a non-photorealistic image which is suitable for the mood of the music that is playing by user.

28

In this era of globalization, English communication ability for engineers whose native language is not English has become as important as their major related abilities. As Korea has been implementing export-oriented economy policy, industries should be equipped with global communication tool, English. In engineering fields, the accreditation system for engineering education has been adopted to meet the global standard for engineers. Engineering majors provide more English courses in addition to the general English courses. The purpose of this paper is to provide detailed description of the needs analysis to develop an ESP course for engineering students in Korea. A needs analysis through survey questionnaire was done on three different groups: students group, engineering professors group, and industry workers group. With the triangulated source the data could get credibility and is expected to serve for ESP course development.

29

Design and Development of Module Coding System Oriented on CNC Machine Tools

Zhongqi Sheng, Shujian Zhang, Junyou Song

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.289-302

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Modular design is one of the modern design methods used for the development of CNC machine tools, which can shorten the product design and manufacturing cycle, and improve the product quality and reliability. Module coding is one of the important steps in carrying out the modular design. Aiming at the effective application and management of the module codes in the enterprise informatization, this paper studied and developed the module coding system oriented on CNC machine tools. First, this paper analyzed the purpose of the module coding and put forward the basic rules of the module coding. Then, considering the characteristics of the modular design for CNC machine tools, this paper determined the coding scheme fit to the requirements of the machine tools enterprise. Next, based on the popular B/S structure and J2EE platform, this paper completed the function design and software development of the module coding system. At last, the development environment and example interface were introduced. The application of this module coding system in one machine tools enterprise proved that it was powerful to promote the application of modular design and the realization of the enterprise informatization.

30

Design of Almost Perfect Complementary Sequence Pairs

Young Joon Song

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.8 No.6 2013.11 pp.303-312

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Sequences with very low out-of-phase auto-correlation and cross-correlation function are widely used for synchronization in mobile communication and multimedia systems where reliable data transmissions are required. For optimum detection, synchronization sequences usually have out-of-phase correlation values that are very low or zero. However sequences with ideal correlation function are very rare. Thus, this paper presents a new algorithm to generate almost perfect complementary sequence pairs with ideal bipolar correlation. Using the auto-correlation properties of these synchronization sequences, we can obtain a correlation circuit whose output contains two peak values equal in magnitude and opposite in polarity at zero and middle shifts. This correlation circuit can be used to double-check the synchronization timing and thus reduce the synchronization search time.

 
1 2
페이지 저장