2016 (468)
2015 (468)
2014 (462)
2013 (200)
2012 (118)
2011 (22)
2010 (16)
2009 (33)
2008 (37)
2007 (19)
2006 (5)
Residual Defect Prediction using Multiple Technologies
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.1-12
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Finding defects in a software system is not easy. Effective detection of software defects is an important activity of software development process. In this paper, we propose an approach to predict residual defects, which applies machine learning algorithms (classifiers) and defect distribution model. This approach includes two steps. Firstly, use machine learning Algorithms and Association Rules to get defect classification table, then confirm the defect distribution trend referring to several distribution models. Experiment results on a GUI project show that the approach can effectively improve the accuracy of defect prediction and be used for test planning and implementation.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.13-22
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we present a novel face recognition method called Multi-scale block Center-Symmetric Local Binary Pattern (MCS-LBP). The face recognition process mainly consists of three phase: face representation, feature extraction, and classification. However, the most important phase is extraction, in which unique features of the face image are extracted. The Center-Symmetric Local Binary Pattern (CS-LBP) feature can be viewed as a combination of texture-based features and gradient-based features. However, it has less dimensional area; the bit-wise comparison made between two single pixel values is significantly affected by noise and sensitive to image translation and rotation. To address this problem, we present a modified feature called MCS-LBP. Instead of individual pixels, in the modified CS-LBP, the comparison is performed based on average gray values of sub-regions. Hence, it provides more complete representation than the Local Binary Pattern (LBP) and CS-LBP operator. Experiments demonstrate the proposed method.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.23-34
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Localization systems have been identified as key issues in the development and operation of wireless sensor networks. The global positioning system (GPS) solves the problem about localization, but it is not suitable for wireless sensor networks. Due to range-free localization approaches requiring low equipped hardware and easy to implement, it is widely used in WSNs localization system. When the node communication radius increases, the accuracy of area-based localization is reduced. It is important to improve the localization accuracy in this situation. In this paper, to improve the accuracy of the node localization, we propose a new range-free localization using Voronoi diagrams based approximate point-in-triangulation test (APIT) algorithm. We compare our algorithm with APIT. Simulation results show that the VPIT improved the precision of localization by narrowing the node's geometry region.
A Novel Intelligent Fault Diagnosis Method and Its Application
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.35-44
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In order to improve fault diagnosis precision and decrease misinformation diagnosis, rough set theory(RST) and RBF neural network (RBFNN) are introduced to overcome respective deficiency in order to propose a novel intelligence fault diagnosis(NCIRRFD) model and method in this paper. In this NCIRRFD method, the RST as a new mathematical tool is used to process inexact and uncertain knowledge in order to reduce decision tables for obtaining the minimum fault characteristic subset. At the same time, RST is used to serve for pretreatment data so that RBFNN structure is simplified and learning efficiency is improved in order to get an optimized NCIRRFD model for solving the inference complexity. An actual application case is selected to test and verify the proposed NCIRRFD method. The applied results show that the proposed NCIRRFD method can effectively eliminate false and improve the diagnostic accuracy.
Glassy Effects for General Images
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.45-54
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper proposes a new grassy effect generation method. The grassy effect changes original image as the one behind the grass. Random number generation function is used to decide block size and the pixel location. Various block size and pixel location give unexpected grassy effect to the original image. Objective and visual performance comparison reveals that the proposed method successfully generates glassy effected images.
An Efficient Sparse Code Fusion Method for Image Enhancement
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.55-64
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Image enhancement can improve the perception of information for human viewers, which is also a basic and pretty significant role in image processing. However, there also exist some limitations in most image enhancement algorithms. In this paper discuss the limitations of existing techniques of image enhancement. In order to solve the limitations well, a novel sparse code fusion (SCF) method is proposed, in which combine piecewise dictionaries strategy. The proposed method firstly is that color space conversion from RGB to Ycbcr color space, secondly enhanced Y component using piecewise sparse code fusion strategy, finally color image reconstruction. Experimental results show that our method can
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.65-72
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Public service is a basic need that should be fulfilled by the government, particularly in legal services. The purpose of this research is to analyze the service strategy management information system at the State Attorney of ABC, also to give suggestion for system improvement, in order to achieve a good service quality. The method used in this research is the Enterprise Architecture framework, which is by analyzed current system design, and then being compared to the problems that have become obstacles in organizational process, and finally suggestion made to improve the service quality. The conclusions are current system at the State Attorney of ABC is not yet integrated, nor it has any control over the duration of each case processing, so it still common cause the delays and lack of service quality to the community are not uncommon. The result of this research is the proposed service strategy and process which is indicates that by using the integrated management information systems, the service at State Attorney of ABC would be better, so as to improve the quality of services that provided.
Shortening the Turbo Codes Based on Unequal Error Protection
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.73-82
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Shortened turbo product codes (TPCs) have already been adopted in many standards, especially in multimedia field. Generally, the realizations of shortening turbo codes are based on designing specific interleavers with variable interleaving span; or using shortened–extended Hamming codes as the component to obtain different encoding block sizes. In this paper, we propose a very simple method to realize the shortening. This method is based on a parallel concatenated convolutional code (PCCC) and their inherent characteristic of unequal error protection. Sample simulation results are presented confirming the efficiency of the proposed scheme.
Video Background Subtraction Algorithm for a Moving Camera
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.83-96
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.97-106
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A new era has begun where almost every daily transaction is done by smart media from diverse work procedures, data search, learning, to relationship building, communication, entertainment and killing-time activities, etc. Actually, it is not that there is ‘nothing’ smart phone cannot do but the kind of ‘things possible only via smart phones’ have surrounded every modern day people just as air. M, Serres called the smart generation of today as the ‘thumb generation’ and said they thought with ‘two different brains’, rightfully recognizing the situation where smart devices already functioned as if a body part of the smart generation. For smart people living in a digitized daily environment, reading/writing is just natural and accustomed routine just as breathing. ‘Digital texts’ are brief articles containing daily thoughts on contemporary, practical issues in the form of letter writing for oratory, discussion or answer to others. Digital texts are actions of diverse conversations and joining others, similar to Socratic dialogues and Menippean satire. Serres viewed them as the ‘chatting of the thumb generation’, that is, the beauty of rumbling. This will be a key to the era of ‘reading 2.0’ where all of the books are connected to a single giant book. This is where the Renaissance of new reading/writing would begin, which we will explore from the perspective of humanities.
Two-Dimensional Boundary Recovery Procedure for Non-Manifold and Intersecting Boundaries
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.107-114
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To ensure all boundary edges of each region are retained in the final mesh during mesh generation, a procedure suitable for non-manifold with intersecting boundaries is proposed to recover the non-manifold and intersecting boundaries. In the procedure, Steiner points are inserted directly on the interFigure of missing boundaries and mesh edges from a triangulation. Based on the boundary recovery procedure, Delaunay triangulation algorithms for the domain with interior constraints and for the non-manifold are proposed, and the latter can be used as a new effective polygon Boolean operations algorithm.
Intercultural Dialogue in the Media : focused on <Welcome to South>
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.115-124
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Today, interculturalism has been raised to overcome conflicts and confrontations between races by respecting each other and enhancing the value of cultural diversity. This article searches for strategy of intercultural dialogue through analyzing media contents. Italian film Welcome to South effectively demonstrates transformation process in which cultural prejudice is overcome and communication between distinct culture is promoted. Preconceived images surrounding aliens work as stereotypes that cause misunderstanding and disbelief. The main character overcomes this obstacle and realizes mutual understanding and respect with open-mindedness, through encouraging cultural communication. Such media literacy can be well utilized for intercultural education, an indispensable component of this multicultural society. A Movie which delivers message through stor
A Dynamic Interactive Pooling Based Human-Computer Interaction
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.125-138
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Human-computer interaction (HCI) has great potential for applications in many fields. A HCI method has been developed based on audio-visual perceptive features and dynamic interactive pooling. A mode analysis based fusion strategy is proposed to fuse the interactive responses from audio-visual modalities especially for the case there are deviations from the modalities at the same time. The developed approach can be applied with a better performance even in single modal with multiple interactive users in the scenario. The users in the scenario are endowed with a fair chance to perform HCI by their interactive priorities no matter how many modalities used, and the interactive authority and priority are updated dynamically according to the variation of HCI content. The scenario and multiple users altogether are regarded as a dynamic HCI pooling. The diversity of interactive habits among multiple users is considered in an ordinary hardware from a crowded scene without any hypothesis for the scenario contents in advance. The pooling is updated dynamically to meet the user demands with the most intentions preferentially. Comparative study with state-of-the-arts has indicated the superior performance of the proposed method.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.139-148
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Since the 1990s, along with the progress of information technology, the development of electronic commerce is growing rapidly. With the aid of tourism e-commerce information platform, it can provide modern tourist services and tourist products in the short term. In this paper, we made empirical analysis of how the electronic commerce and network platform will effect on tourism consumption. The results shows that enterprise network level and travel website will both have positive influence to online travel ticket sales, LnNE at lag 1 period increased one percentage will lead LnOTS increased by 0.018, and LnWE at lag 1 period increased one percentage will lead LnOTS increased by 0.209. So that, e-commerce application has posi
Design of the Touchscreen Kiosk-Based Local Area Tour Guide System
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.149-160
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Touchscreen kiosks are widely used to automate various services. Automatic teller machines, certificate-issuing machines found on university campuses, and ticket machines found in airport terminals and bus terminals are examples of such kiosks. Since localized real-time information, interactive touch-control services, and value-added integrated marketing services are extremely important services to tourists, this paper introduces the design of a tourist guide system running on touch screen kiosks. A kiosk is connected to the bus information system, an Internet broadcast system, online shopping and a web portal, and allows users to select one of the services.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.161-170
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Wit the rapidly development of internet and electronic commerce, all kinds of enterprises are experiencing profound changes. In this paper, we make empirical analysis about insurance decision-making in financial institutions, and analyze influential factors based on customer experience .The result shows that speed and quality is the most important factor that will affect consumption decision-making, the coefficient is 0.152 and 0.144; at the same time, consultation and complaint handling speed is also the significant variable, the coefficient is 0.156 and 0.197, however, these factors are often been ignored. So that, the insurance company should enhance customer service consciousness, optimize customer claims experience and provide convenient, fast claims service.
Detail-Enhanced Medical Image Fusion in NSCT Domain
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.171-180
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Multimodal medical image fusion technique plays an important role in clinical applications, such as pathologic diagnosis and surgical options. However, many traditional fusion methods cannot well preserve details of source images in the fused image. To address this problem, a detail-enhanced image fusion scheme based on non-subsampled contourlet transform (NSCT) and gain control (i.e., NCGC) is developed in this paper, which can effectively combine the spectral information and the spatial features of source images. The proposed method applies power law transformation to tune coefficients of each decomposed subband, and adjusts the strength of subband signals by smooth gain control. Eventually, the fused image with more anatomical details and functional information is constructed by the inverse NSCT. Three pairs of medical images with different modalities and three fusion metrics are applied to validate the feasibility of this algorithm. Experimental results demonstrate that the proposed method can achieve superior performance in both visual perception and objective assessment.
Detection of Smoking in Elevator Using Average Intensity Measure
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.181-186
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Smoking in elevators would give children and weak women a deadly blow. Latest no-smoking laws and increasing the price of cigarettes decreased smoking rate drastically. However, since this phenomenon is a transient one, the smoking rate seems to be increasing again to the previous level. In our research, we above all chose people who smoked in elevators. The method of sampling key frame is Average Intensity Measure. This method uses average intensity of whole image for each RGB color channel in order to detect scene change. If white color (255) occurs by a certain pixel after reducing the subject domain of sampled key frame to face domain, it is considered as smoking. These extracted scenes could be provided as a evidence of forensics in police stations or courts.
A Hybrid Polybius-Playfair Music Cipher
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.187-198
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Music has a versatile dimensionality; it can be used to express feelings, emotions and can also be used as a communicable language. Music and its attributes have been used in cryptography and steganography from a long time. Musical symbols and notes are used as replacement/substitution cipher. Using music as a cipher or cover media not only enhances the security of the message but also reduces its chance to be detected as an encoded or ciphered message. This paper proposes a hybrid Polybius and Playfair cipher which encodes the message into sequence of musical notes. The Playfair key matrix is generated using the Blum-Blum Shub generator. The bigrams of plain text message is first encrypted using Playfair cipher then individual character of the encrypted message is re-encrypted using Polybius cipher. The Playfair cipher enhances the security of the encrypted message over the simple substitution technique. The Polybius cipher then reduces the character set by appropriate number of symbols (here musical notes) for replacement. The basic 5X5 structure of key matrix in Polybius and Playfair is extended to 10X10 to hold the 95 prinTable characters of ASCII character set.
Quantum Authentication of Classical Messages without Entangled State as Authentication Key
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.199-206
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Classical messages can be authenticated by traditional authentication protocols based on hash functions. The security of these protocols depends on long authentication keys, the selection of appropriate hash functions and some assumptions concerning the computational complexity of some algorithms. In this paper, by encoding the classical binary messages and binary keys as nonorthogonal quantum messages and nonorthogonal sets of states, respectively, and using quantum encrypting scheme, a new quantum authentication protocol is proposed. In our protocol, instead of entangled quantum states, the traditional binary bits, which can be easily saved, are encoded as quantum keys. Because the quantum messages are nonorthogonal, any forgery or measurement on the quantum messages will be detected with a certain probability. Our protocol allows the authentication of binary classical messages in a secure manner.
Detecting the Hierarchical Community Structure Based on Advanced LPA
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.207-214
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
LPA is a classical community detection algorithm with linear time complexity. It can be applied to networks whose community structure is known. However, the randomness of it's initial nodes causes a poor stability. In this paper, we proposed a new method to improve the algorithm by reordering the initial nodes. The advanced algorithm uses ascending order instead of descending order based on degree. It can improve the stability of the original algorithm and detect the hierarchical community structure of the complex network. We tested the algorithm on Zachary's karate network, Dolphins social network and American football network. The experiments confirmed that compared to the classical algorithm the improved algorithm has better performance in terms of rationality and accuracy.
Color Overlapping Method for Projection Systems Based on Light-Emitting Diodes
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.215-220
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A color overlapping method for increasing the brightness of projection systems using light-emitting diodes (LEDs) is proposed. The proposed approach drives the pulse width modulated signals of red, green, and blue LEDs. This color overlapping method synthesizes secondary colors of yellow and cyan from primary colors of red, green, and blue. By the proposed method, the brightness of the projected image is improved by about 30% compared to the conventional non-color-overlapping method in a projection system with LEDs.
An Optimized Motion Estimation Algorithm and Application in the FRUC System
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.221-230
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Based on the optimized three-step search algorithm. Combining threshold judgment as well as local full search, a more efficient motion estimation algorithm is proposed. The algorithm not only inherited the traditional three-step algorithm’s quick speed but also kept the advantages of a relatively small amount of calculation, besides it can avoid the local optimum problem in the three-step search algorithm (TSS). In addition, the algorithm combined with the threshold judgment and local full search algorithm, so it also maintains satisfactory visual quality. Comparing the algorithm with TSS and local full search algorithm (LFS). The algorithm has great performance in search points and peak signal-to-noise ratio. Experimental results show that compared with LFS, search points drop by 34.61% ~ 54.47% .While compared with the TSS, the search points only rise by 6.15% ~ 12.21%. The average PSNR of proposed Algorithm is 0.24dB higher than LFS and 3.30dB higher than TSS.
A Study of the LED Module Heat Dissipation Structure Suitable
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.231-242
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, reduces the absolute temperature of the LED module, results of the experiments have been derived a method to improve the suitability heat dissipation structure and properties are as follows. First, FR-4 PCB size in consideration of the PCB LED module air-hole 3mm radius of the LED module area 10%, 20%, 30% ratio after a process of simulation to generate the air-hole on the PCB and the surrounding, 30%, 50×30mm intervals, when generating a fifty-two, applying the air-hole 3mm 10% of the radius of the area LED module obtained the results of temperature reduction than max. about 3.5℃ and min. about 3.1℃. Second, LED array interval and to be suitable experimental structure through the PCB air-hole generation plate type heat-sink for LED module to support the air-hole radius 40mm size to create a two and six and four, as a result of the simulation in progress, when air-hole number pairs of the increase, max. and min. temperature was reduced to obtain a formal conclusion by about 1~1.5℃. the air-hole 3mm 10% of the radius of the area applied LED module than max. about 4.5℃, min. about 4.2℃ results was confirmed reduction. As a result, to the suitable of the heat dissipation even if the LED module PCB material no matter how good, if the heat sink is not well designed structural cannot obtain a large effect.
A Novel Hybrid Optimization Algorithm Based on GA and ACO for Solving Complex Problem
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.243-252
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In allusion to the deficiencies of the ant colony optimization algorithm for solving the complex problem, the genetic algorithm is introduced into the ant colony optimization algorithm in order to propose a novel hybrid optimization (NHGACO) algorithm in this paper. In the NHGACO algorithm, the genetic algorithm is used to update the global optimal solution and the ant colony optimization algorithm is used to dynamically balance the global search ability and local search ability in order to improve the convergence speed. Finally, some complex benchmark functions are selected to prove the validity of the proposed NHGACO algorithm. The experiment results show that the proposed NHGACO algorithm can obtain the global optimal solution and avoid the phenomena of the stagnation, and take on the fast convergence and the better robustness.
Image Nonlinear Resizing Algorithm Based on Salient Region
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.253-264
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.265-276
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To locate an RF device or to enable target oriented communication services in wireless indoor environment, RF properties as RSSI and CSI have been widely adopted in the research and commercial societies. However, the complex indoor scenario makes the task to locate an RF device with fine-grained accuracy more difficult. This paper deals with a virtual triangulation utilization to estimate the length of Line of Sight (LoS) signal out of non LoS on receiving multipath signals from any dimension. Thus, it forms a virtual right angled triangle of the received signals. From the angles ratio, the propose method estimates the side corresponding to the reference LoS length. Eventually, it estimates the distance error between the measured reference LoS of the virtual triangle and the approximated LoS from the CSI. The error is utilized to provide a basement for more precise localization of an RF device.
Highly Reliable Product Code for Error Correction
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.277-286
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In storage and communication systems, the product and concatenation codes, which consist of Reed–Solomon (RS) codes and other error-correction codes, can be utilized to effectively correct burst errors by performing erasures-and-errors decoding. However, the RS codes have two drawbacks: 1) the RS decoders may not detect received erroneous codewords, and 2) the RS decoders may generate valid codewords which are not equal to the transmitted codewords. In the implementation of the product and concatenation codes, such decoding drawbacks can cause the RS code to provide incorrect error-detection information or erasure information to other error-correction codes, resulting in unreliable error-correction performance of the systems. In this study, we propose a new product code to overcome these drawbacks by studying the RS product code (RSPC). The new code combines CRC code with RSPC which is called as CRSPC. In addition, the results of experiments show that the new CRSPC can significantly reduce the probabilities of these drawbacks, thereby improving the performance of erasures-and-errors decoding. With minor modifications, the CRSPC algorithm can be applied to Blue-ray disc systems which have powerful recording functions in multimedia.
A Real-Time Hand Detection System during Hand over Face Occlusion
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.287-302
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Enhancement of JPEG Compression for GPS Images
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.8 2015.08 pp.303-312
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
GPS devices typically make use of images that are excessively large to be stored as a Bit Map, so the images are always compressed. The widespread compression technique is JPEG; however JPEG has a disadvantage – JPEG assumes that the average color of beginning of each blocks line is commonly similar to the average color of end of its preceding blocks line. Almost always this assumption is wrong for GPS images. This paper proposes a method to adjust JPEG order of compression to an improved order that is more suitable for GPS images.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.