2016 (468)
2015 (468)
2014 (462)
2013 (200)
2012 (118)
2011 (22)
2010 (16)
2009 (33)
2008 (37)
2007 (19)
2006 (5)
Design and Implementation of Binary File Similarity Evaluation System
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.1-10
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In cloud storage system, when we search similar documentation files, keyword-based similarity evaluation scheme is well performed. However, if we want to find similar binary files then it is very difficult to satisfy user request. Because there is no widely used binary file search system that supports similarity evaluation among files. File similarity evaluation is essential for digital forensic and data deduplication field. In the file similarity processing time, the CPU consumption and resource overhead of memory are increased as the number of files increase. Moreover, as the file size is getting bigger, the overhead of metadata management is critical. In this paper, we suggest the similarity evaluation scheme using a hybrid chunking which reduce overall processing time of similarity evaluation. Experiment result shows that the proposed system can reduce processing time and data storage capacity effectively.
QSPM and 7C’s Strategy for e-SCM Implementation Strategy (Case Study: XYZ Plastic Corporation)
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.11-18
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Competition in the industrial world in the era of globalization is increasingly tight line with advances in information technology. Advances in information technology companies make every attempt to improve its internal business processes. To optimize its business processes, companies should not only be oriented to internal processes, but rather an external process that involves a relationship with the companies involved as a business. XYZ Corporation is a company engaged in manufacturing plastic household goods. The resulting products include a variety of bottles (which are used for soap, lotion, shampoo, and ink), bottle caps, cans, mannequin body fit, and others. XYZ is facing problems of a delay in arrival of raw materials, stock-checking errors, and delays in delivery of goods to the customer. Based on the problems that arise, the authors propose to use the e-SCM applications to XYZ because the e-SCM can help coordinate all the activities of the supply chain from raw material procurement to distribution to the customer, especially considering the number of suppliers that work with XYZ.
Formulation of Decimation N Algorithm Expressions for Digital Signal Processor
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.19-28
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this article, expression of algorithm of Decimation N of Multi-rate running convolution algorithms operating filter output fast by processing Running Convolution filter with filter bank is reviewed according to each value of n(n>= 3) and then the part which is changed in regularly with value of n is expressed as an algorithm.
State-Based Gauss-Seidel Framework for Real-time 2D Ultrasound Image Sequence Denoising on GPUs
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.29-48
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The ultrasound image sequences are not only majorly contaminated by multiplicative noises but they are also usually contaminated with additive noises. As in the past few decades, there were some works, which had focused on removing the noises from ultrasound images, such as in the JY model [1] and in the variational model, which were able to remove both types of noises. However, denoising these noises from the ultrasound image sequence is a time-consuming process that occurred from using fixed-point iterative method. From our investigation, the most time-consuming process part of the denoising process is the Gauss-Seidel. By parallelizing these processes with modern multi-core and many-core processor, the denoising ultrasound image in real-time is possible. In this study, we propose the modified strategy from [2] for managing threads and propose the modified state-based Gauss-Seidel method from [16] for GPUs. Our proposed model can retain the frame order, and get the satisfactory frame rate (about 23.33 fps). The proposed strategy boosts the speedup of the frame denoising to 13.80 times compare to the sequential computation.
Noise Reduction & Gate Plug-ins in Audio Mixing Process
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.49-56
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Early gates were based on an electronic switch that was only turned on or off according to the input signal level. Variety digital noise reductions are in both hardware and software form and these are far more detailed than gates or expanders and generally work by first separating the incoming signal into a large number of split frequency bands. Noise has been usually added to an electrical signal there is no perfect way to remove it, although there are digital process that are effective at significantly reducing the level of random noise. However, it can be good practice to assume that any noise engineer collect along the way is going to be a permanent part of the recording and that all possible ways should be taken to minimize it. This means that engineer should always optimize gain structure, un-route unused mix channels and take all other practical measures to reduce noise at the source. Even though engineers try to do the best efforts, some noise can be remaining in signal. It is physical matter but the best way is to less unwanted noise.
Service Self-Organization Based on SON in LTE-Advanced Heterogeneous Networks
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.57-66
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Since global service providers consider seamless interworking with existing networks as the most important factor, it is most likely that LTE-Advanced of 3GPP is selected as international standard for 4G wireless communication. As such, we suggest SON based service self-organization which provides users with service continuity even when mobile users have terminal mobility and session mobility, and enable service providers to implement “heterogeneous multi-network of integrated” which guarantees better service in terms of wireless communication access, transmission speed, and Quality of Service (QoS). It is also expected to allow fast handover service such as VOD, and streaming in LTE-Advanced system. Moreover, this study could be conducted with various research institutions and manufacturers, leading joint research and technology transfer in the future.
Hardware and Software Design of Mine Environmental Monitoring System
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.67-76
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A mine environmental monitoring system which is composed of hardware and user software is developed. The functions of the hardware are monitoring the complex coal mine environmental factors, uploading monitoring data and controlling the designed environmental equipment. The user software is programmed by Java and it stores the uploaded data in a database, draws curves, makes predictions and so on. Through analyzing and processing the uploaded data, the user software can makes decisions and sends control commands to the hardware, thus the designed environmental equipments change the environment. Additionally, an improved multi-sensor information fusion algorithm is proposed to improve the stability and accuracy of this system. Finally, an experiment is carried out to test our system.
Automatic Landmark Selection Using Clustering for Robot SLAM
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.77-88
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
We discuss the current technology behind automatic selection of landmarks by simultaneous localization and mapping (SLAM), using a single camera in an unfamiliar indoor environment, and we propose an improved method. As currently implemented, automatic landmark selection by vision-based SLAM results in many useless landmarks, because features of the image are distinguished from the surrounding environment and are detected repeatedly. These useless landmarks create a serious problem for the SLAM system because they complicate data association. To solve this problem, we propose a method in which a robot initially collects landmarks through automatic detection while traversing the entire area where the robot performs SLAM and then, through clustering, selects only those landmarks that exhibit high rarity. This enhances system performance. Experimental results showed that this method of automatic landmark selection results in a high-rarity landmark being selected. Our method improves the performance of SLAM compared to conventional methods, an increases the accuracy of data associations.
A Design of Linear Task Set Model for Multimedia Services in IP Network
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.89-100
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The purpose of this article is to design a multimedia streaming system with a complex structure as the one with a simple and basic work structure and realize system design that can enhance both expandability and portability based on that structure. To solve the problem that it is too complex and has low expandability, this study suggests a system design structure based on the LTS (Linear Task Set) model. Based on the simple, basic structure grounded on LTS structure, the study defines a consistent process and allows free structure alteration in the simple system structure according to the service purpose and demand. To secure independence and simplicity among components, the study defines a port channel object of a singleton structure and realizes design that can allow stream transmission and overall stream monitoring on the system for all ports with the port channel based on the mapping information of a component port. And based on this model, the paper suggests a component system model that can realize multimedia streaming service.
Research and Design for AHP Module based on Android System
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.101-110
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Our lives have been more and more abundance after the creation of Android intelligence cell phone and the applications based on Android system have taken an important role in people’s working and lives. This paper will state detailedly about the frame and application structure of Android system based a mass of material. Then AHP arithmetic based on Android will be particularly designed and analysed and put it into practice to test its performance. The result shows that AHP module based on Android is feasible and efficacious.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.111-122
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
People usually collect information and solve problems under smart environments nowadays. The abilities of individuals required in this smart time are creative and active thinking. In that point, the concept of coaching which can draw the potentials of receivers and help to internalize their problems has been magnified in various fields. If you have looked at researches of coaching until now, researches about the contents of coaching course, learning, and management coaching has been done a lot. However, studies of the environments in which coaching is performed are not sufficient except the sports field. In order to maximize the success rate of coaching, elaboration of the contents is also important, but the discussions about the environments where coaching are carried out are also necessary. As smart devices and various digital equipment are activated, studies are required on what technical and environmental aspects of these have an impact on coaching. Therefore, this study proposes an ADIR(Analysis, Design, Implementation, Reflection) smart coaching system where teaching is carried out in smart environments, by combining with the smart and coaching which are new paradigm concepts of future society. This study has designed a coaching system that is composed of four modules, ‘Analysis, Design, Implementation, and Reflection’ and 8 stages by each module. Especially, smart coaching will be able to maximize the efficiency of coaching by overcoming the limitations of time and space and distinguishing computer programs and coaches do. In addition, within the smart coaching system, there are various coaching systems such as personal coaching, group coaching, and professional coaching, and so on. And, it will make multidimensional approach possible which cannot be done in face-to-face instruction. Furthermore, in the future researches, individualized and professional smart coaching system studies should be continued by constructing systems corresponding to various contents.
Exploiting Adaptive Background Image and Dynamic Search Window for Fast Object Tracking
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.123-132
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Recently, due to the interest for personal safety, intelligent image recognition technology using the CCTV has received a lot of attention in many areas. Real-time video or image tracking technology is the technology to continuously track the movement of the target object and maintain the specified information of the object. However, the problem is that unnecessary noise or environmental changes of the input video from CCTV make it difficult to accurately detect and track the target object. In this paper, we propose a fast object tracking algorithm, which is divided into two parts: i) object detection process and ii) object tracking process. In the background image replacement technique, we compute the difference between the initial input image and input video image. Then, it replaces N×M blocks based on the changed pixels, finally leading to replacing the background images. If it changes over the pre-defined threshold value, we set the block size and generate the variable search window for object tracking. Since the variable search window only generates the minimum search area for object tracking, our proposed method is quickly able to compute the variable region for object tracking. Through various experiments, our proposed scheme outperforms the other object detection and tracking methods in terms of object tracking counts and tracking error counts.
A Framework for Wireless Sensor Network Fault Rectification
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.133-142
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Wireless sensor networks (WSNs) have gained worldwide attention in recent years. These are of great significance in resolving many real-world problems, and have attracted increasing research interests in recent years. In this paper, we consider a hybrid sensor network with fifty sensor nodes, where a subset of the nodes has movement capability, possibly at high energy expense. A static sensor node can check its energy status and seek for replacement when its current energy falls below a certain threshold. If a redundant static sensor is located close to a dying sensor and can fulfill the coverage requirement, it can be used for substitution. One way to repair the fault is to find redundant nodes to replace faulty nodes. Redundant nodes are placed in the position where the average distance to each sensor node is the shortest. Simulation results show that our algorithm can find the proper redundant node in the minimum time and reduce the relocation time with low message complexity. We investigate the dynamics on random geometric networks. Fixed threshold policy is considered that enables the sensor node to vary and continue its service so that data loss can be minimized. This policy is also considered for energy measure of the node. Work has been carried out for faulty node among intermediate nodes. The rectification is done by replacing the faulty node and to continue the network data transfer.
MDDI Protocol Packet Generation Method of Mobile System
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.143-152
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this study, it is proposed to use software to create MDDI protocol packet which is required for the display device. The previously proposed method to create MDDI protocol packet was implemented in FPGA. In the previous MDDI interface design method, data and synchronization signal were created inside of the FPGA chip. FPGA chip creates data received from CPU into serial data and creates packets and then controls signals. This design method is intended to reduce CPU load. In this paper, the method of creating data in software, which was notpresent in the previous FPGA is proposed for design of data transmitter using the MDDI interface method.
Adaptive Video-Data Quality Control for Solar-Energy-Harvesting Wireless Sensor Networks
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.153-162
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Since solar energy can be harvested periodically, using solar power in wireless sensor networks (WSNs) requires a different approach to energy consumption from typical battery-based WSNs. Meanwhile, it is also challenging to supply enough energy required for heavy operations such as video data encoding and transferring in battery-based WSNs. Therefore, we address the problem of determining the quality of encoding sensory data on the solar-powered sensor node. Based on a simple energy model of the solar-powered node, proposed scheme controls the quality of encoding data adaptively in the way of using the harvested energy maximally. Experimental results demonstrate the efficiency of our scheme.
The Description and Analysis of Remote Network Virtual Laboratory
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.163-170
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The fast development and improvement of remote network education provides a higher demand for the large construction of education resource, and experiments teaching are the most important method of practice teaching. In this paper, it talks about the model, the key technology and the solution method of the remote distributed virtual laboratory. Meantime, it proves that this project can’t only provide a software environment for remote network virtual experiments, but also can improve the condition of experiment and provide a learning, practice and innovation technology platform.
An IPv4/IPv6 Traversal Scheme with Seamless Mobility Support over Heterogeneous Wireless Networks
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.171-188
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper proposes a new IPv4/IPv6 traversal scheme based on a scalable network-based IP mobility management system, called Access Independent Mobile Service (AIMS), which can provide MNs with high-quality mobility services over various wireless access networks. The proposed AIMS with IPv4/IPv6 Dual Stack Support (AIMS-DS) scheme can support an MN moving continuously across the IPv4/IPv6 coexisting networks by IPv4/IPv6 address binding and dynamic transport control based on the IP-in-IP tunnel method. It inherits the novel features of the AIMS system including complete separation control and data planes in the core network and cross-layer (layer2 and 3) interworking method for handover control optimization. The performance evaluation results from our simulation study show that the proposed scheme properly handles a dual stack MN’s handovers across IPv4/IPv6 coexisting networks. It is also shown that the proposed scheme outperforms the existing approach in some performance factors including packet delivery latency and handover latency.
Dispersion Managed Optical Links with Optical Phase Conjugator Placed at the Various Positions
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.189-198
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The needs of ultra-high optical backbone systems are currently increased to transmit the high-quality multimedia services. For transmitting the ultra-high speed optical signals with better performance, the techniques to suppress or mitigate the optical signal distortion due to group velocity dispersion and optical Kerr effects are required. Dispersion management (DM), optical phase conjugation, and the combination of these two are promising techniques to compensate for the signal distortion. The goal of this paper is to investigate the possibility of the flexible configurations of the ultra-high and long-haul optical backbone systems using optical links with the random distribution of residual dispersion per span (RDPS) and optical phase conjugator (OPC) placed at the various positions. We confirm that the proposed link configurations should be one of the methods suitable for implementing the flexible optical backbone systems, also, the possibility is more available to longer backbone.
Fast 3D Graphics Rendering Technique with CUDA Parallel Processing
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.199-208
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
3D Graphic Rendering has been used to express realistic, 3-dimensional, and emphasized effects in the graphics. As 3D Graphic Rendering developed and became more prevalent, the need for acceleration in data processing grew as well, leading to a development of GPU (Graphic Processing Unit) and shading language used for GPU such as GLSL (OpenGL Shading Language) and HLSL (Higher Language Shading Language). 3D Graphic Rendering based on GPU, however, clearly has its limitation in processing complicated calculations such as calculating curvatures of the surface or ray tracing method, especially as the greater magnitude of the 3D polygonal model data is being used. The following paper will discuss the new method of 3D graphic rendering that is based on faster GPU parallel processing system called CUDA (Compute Unified Device Architecture) to administer 3D polygonal model data and process calculations. In the paper, we will discuss about the characteristics of CUDA and test for graphic rendering of 3D polygonal model according to those characteristics. We will also examine whether it is possible to accelerate the graphic rendering process using CUDA for 3D graphic rendering.
The Characteristics of Rail-Integrated Urban Regeneration focused on Japan’s Local Cities
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.209-218
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This research is to analyze the method and features of urban regeneration and understand small and medium-sized local city’s urban regeneration strategy in Japan, especially in regard to its six local cities, which are recently planning railway station redevelopment and urban regeneration. The objective of this research is to examine the city planning methods that can be applicable to the development of station influence area in small and medium-sized local cities, which are being excluded from the domestic urban regeneration business. The locations of the following six railway stations are the most representing local cities in Japan that are actively participating in the urban regeneration business regarding the station influence area: Hakata station, Kumamoto station, Kagoshima central station, Oita station, Toyama station, and Iwamijawa station. It was verified that the area’s restructuring was being pushed ahead based on the railway, which is internally Japan’s core means of public transportation. Such restructuring was to overcome the decline of cities caused by the recent movement of the local city population to the suburb area. The characteristics of a railway integrated urban regeneration in each area can be shown as the construction of transfer system central to the railway station, active connection with the tourist attractions within the area, and high density and complex commercialization of the railway station.
Applying Variable Precision Rough Set for Clustering Diabetics Dataset
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.219-230
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Computational models of the artificial intelligence such as rough set theory have several applications. Rough set-based data clustering can be considered further as a technique for medical decision making. This paper presents the results of an experimental study of a rough-set based clustering technique using Variable Precision Rough Set (VPRS). Here, we employ our proposed clustering technique [12] through a medical dataset of patients suspected diabetic. Our results indicate that the VPRS-based technique is better than that the standard rough set-based techniques in the process of selecting a clustering attribute.
Multi-level Metadata Management Scheme for Cloud Storage System
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.231-240
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Data deduplication is widely used to reduce storage space requirement in cloud storage system. Especially chunking based deduplication scheme is very useful for handling data storage system that contains duplicated blocks of file stream. In this paper, we introduce a novel data deduplication scheme that manages metadata of cloud storage system in a rapid time. The key points of this paper are using tree map searching and classifying data as global and local metadata. The two-level metadata management scheme is the main aspects to influencing fast performance of the data deduplication.
Mining Least Association Rules of Degree Level Programs Selected by Students
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.241-254
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
One of the most popular and important studies in data mining is association rules mining. Generally, association rules can be divided into two categories called frequent and least. However, finding the least association rules is more complex and time consuming as compared to the frequent one. These rules are very useful in certain application domain such as determining the exceptional association between university’s programs being selected by students. Therefore in this paper, we apply our novel measure called Definite Factors (DF) to determine the significant least association rules from undergraduate’s program selection database. The dataset of computer science student for July 2008/2009 intake from Universiti Malaysia Terengganu was employed in the experiment. The result shows that our measurement can mine these rules and it is at par with the existing benchmarked Relative Support Apriori (RSA) measurement.
Development of a Disaster Information Extraction System based on Social Network Services
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.255-264
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The increased use of Social Network Services has led to an increase of availability of information. In addition, information found within SNS posts can be useful for victims in disaster-affected areas. However, a method for retrieving disaster-related information has not yet been created, thus making it difficult to find disaster-related information in SNS posts. Accordingly, this paper suggests a system which can provide efficient information when disasters occur. This system calculates three attributes of disasters. First, the Filtering module can search disaster related tweets. Moreover, it can extract the attributes of disasters systematically. Second, a manager can determine the attributes of a disaster manually by using the Decision module. In this module, disaster type, location and risk level attributes are determined. Once all of the attributes are determined, the Display module shows the attributes of the disaster. This system will provide citizens with more up-to-date disaster information.
Effective Indexed Data for Mobile Service Management
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.265-276
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Metadata is defined as data about data. In large scale distributed and heterogeneous software systems, metadata is considered as one of the most important components for the architecture and construction of information systems. Metadata is utilized to improve communication between heterogeneous information systems – for the purposes of obtaining and providing information, for communication between user client workstations and information servers, and for electronic business between information systems. Metadata management is much challenging and is a hot topic for research at present. In this paper, we review work that deals with effective indexed data for mobile service management metadata in three different points of view. Firstly, we survey some proposals about applying model management to classical metadata problems. Then we inspect how metadata can help managing multimedia data. Finally, we review some mobile service specific metadata management issues. We survey approaches that are of foundational nature as well as those that are application-oriented. We believe that combining both foundational and practical aspects is important to achieve the goal of managing metadata with the same ease as, for example, database management systems have achieved in the management of classical relational data.
A Study on the Sleep Analysis Using H-MOTE2420 Sensor and Scene Change Detection
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.277-288
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Sleep is an essentially physiologic phenomenon that compels humans to spend one-third of their lives sleeping. This paper deals with the correlation between sleep and condition data acquired from the data concerning bedroom sleep environments. The first thing we did in order to measure sleep environments was to install and run TinyOS, a compact operating system. Then we collected environmental data using the humidity sensor (SHT11) and the ambient light sensor (GL5507) in the H-MOTE2420 sensor. In this paper, the microphone sensor (WM62A) is not dealt with. Next, the subjects were asked to enter the information about levels of fatigue, levels of drinking, and levels of stomach emptiness as the weighting information affecting sleep. Finally, the difference image, the color histogram, and the χ2 histogram, all of which are scene change detection methods, were used to detect scene transitions. The scenes obtained through scene change detection mean the number of the subjects' tossing and turning under different situations for different weights. In this paper, we used tables and figures, in particular, to make it easier to understand how frequently different levels of drinking left the subjects tossing and turning during sleep.
A New Approach to Specification of the Behavior of Embedded Systems
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.289-304
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Embedded systems involve a coupling of hardware and software. Modeling of an embedded system is a key step in the requirements phase, when a product’s specifications are gathered and modeled. This paper focuses on the specification and modeling phase (the requirements phase) in systems that have been modeled using the FSM approach. The concept of state has been a central notion in this development. While FSM has many diverse and unique properties, the notion is not rich enough to capture complex systems, especially embedded systems with software and hardware parts. The concept of state raises misconceptions, especially in education. To provide an alternative to FSM for system description, this paper introduces a new model as the foundation for a new approach to modeling applications that need state-like methodology. The methodology is based on identifying “things that flow” (e.g., data, numbers, signals) and specifies their streams of flow in terms of no more than six generic stages. The resulting conceptual picture provides a map of diverse flow systems that trigger each other. In this paper, study cases that originally used FSM are re-diagrammed using the new methodology to compare the semantics reflected in each method. Such semantics can be used to understand the behavior of a given system in design and educational contexts. The results point to the viability of the flow-based method for capturing the specification and modeling of systems.
Video Browsing Service for U-health Care Systems Environments
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.305-314
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Recently, Digital video is one of the important information media delivered on the Internet and playing an increasingly important role in multimedia. This paper proposes a Video Browsing Service(VBS) that provides both the video content retrieval and the video browsing by the real-time user interface on Web. For the scene segmentation and key frame extraction of video sequence, we proposes an efficient scene change detection method that combines the RGB color histogram with the χ2(Chi Square) histogram. Resulting key frames are linked by both physical and logical indexing. This system involves the video editing and retrieval func-tion of a VCR's. Three elements that are the date, the field and the subject are used for video browsing. A Video Browsing Service is implemented with MySQL, PHP and JMF under Apache Web Server.
The Typology of Carriers by Partnership Intensity and Role in SCM
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.315-324
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study classifies types of carrier in SCM according to partnership intensity and the role of carrier. The authors designate the partnership of low intensity as transactional partnership and that of high intensity as integrated partnership. The level of carrier’s role is two types. The one of them is routinized carrier and the other is partnership carrier. By the combination of these, four types of carrier have categorized as transactional, reactive and integrative, proactive, and totally integrated carrier. Then hypotheses on differences in partnership satisfaction and logistics service quality by types of carrier are proposed and tested. This research use survey data acquired from Korean manufactures for analysis. The results show that partnership satisfaction and logistics service quality are highest in the totally integrated carrier group where carriers actively participate in partnership and have lots of roles to perform.
Detecting Image Forgery Based on Noise Estimation
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.9 No.1 2014.01 pp.325-336
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the advent of the Internet and low-price digital cameras, as well as powerful image editing software, the authenticity of digital images can no longer be taken for granted. Image noises are often introduced into the tampered region during image manipulation process. In this paper, we propose a detection method to locate image forgeries based on noise estimation on HSV color space and hybrid clustering method combined with unsupervised clustering and supervised clustering. A suspicious image is first converted into HSV color space and segmented into non-overlapping image blocks. Then the noise variance at each local image block is estimated as input of unsupervised clustering. Finally, a supervised clustering method based on SVM is used to further improve the detection accuracy. Our experimental results demonstrate that the proposed method can effectively expose tampered regions from tampered images.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.