2016 (468)
2015 (468)
2014 (462)
2013 (200)
2012 (118)
2011 (22)
2010 (16)
2009 (33)
2008 (37)
2007 (19)
2006 (5)
A Design of Adaptive Virtual Camera View Modes Based on Optimized Virtual Assembly Relation Model
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.10 2016.10 pp.331-340
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper proposes an optimized virtual assembly relation model on the basis of deep analyses of traditional ones. Some typical adaptive virtual camera view modes are designed based on constraint conditions and dynamic data structure of optimized model mentioned above for a reversible virtual process of assembly and disassembly. These newly designed viewing modes are able to auto-adjust focus and field of view to follow and aid user operations by ensuring that camera view continuously focuses on virtual operating space currently in need, which lower the difficulty of user operations and heighten the efficiency of virtual operations.
Wavelet Transform Based Image Interpolation Using PBP Cubic and Hybrid Filter
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.10 2016.10 pp.341-248
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, a new wavelet based image interpolation algorithm using pixel-by-pixel (PBP) cubic image interpolation and hybrid filter is proposed for images which include many mid and high frequency elements. There is much important information in frequency bands. Because conventional interpolation techniques have blurring or blocking effects, the quality of interpolated remote sensing images is not good over that of standard test images. The proposed interpolation technique uses PBP, DWT and hybrid filter to address these problems preserving thin lines and edges information. Simulation result shows that the proposed technique outperforms the conventional techniques in terms of PSNR.
Pre-emphasis, Windowing and Spectral Estimation of Silent Speech Signals Using Embedded Systems
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.10 2016.10 pp.349-360
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The feature extraction process is the fundamental stage in the development of speech processing systems. In this paper is described the methodology and implementation of an embedded algorithm for extracting characteristic information from silent speech signals. The classical approach based on frequency representations of the signals is followed as methodology for this work. First, the acquisition stage of the silent speech signals is performed using a Non-Audible Murmur microphone and the STM32F4Discovery evaluation board. Then, the digitalized signal is filtered, segmented and normalized using the pre-emphasis and windowing steps. The magnitude spectrogram is calculated from the pre-processed signal using the Fast Fourier Transform (FFT), to finally estimate characteristic data from de silent speech signal. As result of this process, the signal characteristic parameters, defined in the frequency domain are obtained and used as elements at later stages of pattern recognition, in order to build systems of Automatic Speech Recognition (ASR), Speech Coding, Speaker Recognition, among other applications.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.10 2016.10 pp.361-370
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Based on the above defects and the superiority of HTMLS, the paper is aimed at realizing the process of graphics and image on Web by combining with graphics and image processing algorithm on computer at present. At the same time, the real-time graphics and image processing cooperatively by multiple personnel is also realized. Finally, a graphics and image processing platform on Web will be established which is easy to maintain, share, expand, being carried out in real time and iteratively. It is named as Web Photoshop. The platform is not only able to carry out graphics and image processing work on a single computer, but also used for graphics and image processing cooperatively by multiple personnel. At the same time, the subject also analyzes and discusses the possibility of graphics and image processing cooperatively by multiple personnel by comparing the effect of common graphics and image processing program on desktop. What is more, the HTMLS is used in trial in the subject to rapidly construct the graphics and image processing application based on mobile devices.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.10 2016.10 pp.371-380
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
21st century is the era of information technology, in this context, form and expression form of art also changed accordingly. The application of multimedia technology can enrich the morphological characteristics and color of different factors. In this paper, we research on the digital multimedia technology application in the urban landscape design, with the rapid development of computer technology, more technical conditions are provided for the multimedia interactive devices. In the design of urban landscape, the use of multimedia technology has also changed the past audio-visual experience, thus creating a novel landscape style. At the same time, we also analyze the computer assisted multimedia technology as CAD, 3D MAX and GIS, these soft wares can help the designer to complete the landscape design more effective, and under the condition of a virtual visualization .
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.10 2016.10 pp.381-396
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the development of power industry, communication security has become an important issue affecting the stability of power system. IEC 62351 standard provides security for substation communication system. However, different transmission protocols may lead to different manufacturers to produce different understanding, manufacturing is not compatible with the device. In order to avoid such a situation, the Finite State Machine (FSM) theory is used to model and analyze the transmission protocol of IEC 62351 standard. In this paper, the FSM model is simulated by the StateFlow tool, and it can be considered that the FSM theory is applicable to the analysis of compliance with IEC 62351 standard.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.10 2016.10 pp.397-406
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Multimedia services should be smoothly provided high quality service that satisfies the QoS (Quality of Service), QoE (Quality of Experience) focused on multimedia contents in an HD class and many of selected channels applying Multicast between the backbone and access. But now, there are several problems such as channel delay-time, network bandwidth limit, related traffic distribution control, and so on. So, as providing 2D, 3D multimedia data and using MPEG4 that realizes the optimized effect in a limited Bandwidth to boost safe synchronization and superior efficiency between the present video and network, we suggest an efficient network bandwidth control technique through HIASCR (Hierarchical Intelligent Access Control Router) which is a solution for network bandwidth control technique that may occur when many users access a high-definition service in a HD class at the same time as well as trend of video compression that can decrease cost for high-definition and network efficiency. This technique transmits floating high-definition data to many users depending on number of users and we offer a method to prevent the network load.
A Robust Approach for Overlay Text Localization and Extraction in Complex Video Scene
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.10 2016.10 pp.407-420
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Overlay text in video carries important semantic clues for video information retrieval and summarization. In this paper, we propose a robust method that is able to accurately locate text lines and extract text even in complex video scene. In the text localization stage, this paper adopts the method based on corner point. First, corner detection is used to extract corners as text features from video frames. Then multi-layer filtering mechanism (MLFM) is used to locate the text lines, which consists of corners clustering, corners horizontal projection, background filtering and heuristic rules. This MLFM can effectively remove the isolated corners, locate the text lines accurately and remove the background or pseudo text lines automatically. In the text extraction stage, this paper proposed a twice binarization method that combines with polarity judgment on image. The polarity judgment was used as a guide to adjust the first binarization threshold when we perform the first binarization. After the first binarization, a main proportion of the image has been processed, and the rest will be processed by the second binarization. Experimental results show that this approach can fast and robustly locate text lines and extract text in video even under complex background.
Designing the Puncturing Pattern for Turbo Codes with Strong Unequal Error Protection
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.10 2016.10 pp.421-430
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In multimedia transition systems, data usually is divided into levels according to their different importance. For these systems, unequal error protection (UEP) techniques are the powerful methods to guarantee lower BER for the more important classes. Puncturing patterns are very important for turbo codes to produce different code rates. Also, different puncturing patterns can give different BER distributions so that UEP can be obtained. In this paper we will study the affection of puncturing pattern to the BER distribution and present a new scheme of designing the puncturing patterns for turbo codes so that the strong unequal error protection is obtained. In this scheme the puncturing is only carried on the two parity check sequences and an idea of “gradually sparsing” is employed. Simulation results show that, compared with other puncturing schemes, this scheme can provide strong error protection for some bits without apparent degradation for other bits.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.