• 제목/요약/키워드: 멀티미디어응용

Search Result 1,611, Processing Time 0.026 seconds

A Web-GIS based on Object Location Information Monitoring System for Ubiquitous Environment (유비쿼터스 환경을 위한 Web-GIS 기반의 객체위치정보 모니터링 시스템)

  • Kim, Taek-Cheon;Kim, Seok-Hun;Kim, Jin-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1755-1763
    • /
    • 2007
  • Specially, location information can say that is important information in this ubiquitous environment and solutions of new GIS system to utilize this are required. Examine method to improve web geography information service system because this paper uses XML and presented specific implementation result. Through internet. it planed various geography information that offer in form of service that do not receive restriction of heterogeneous system environment. Also, did thing that is easy when request service about geography information that user need and deliver fast by purpose. Supplement and to improve open-ended and XML of form normalized use and developed existent web geography information service. So that can use map service in web browser without setup of application program that buy expensive GIS software or offer in each company design and implement.

Implementation of R-language-based REST API and Solution for Security Issues (R 언어 기반의 REST API 구현 및 보안문제의 해결 방안)

  • Kang, DongHoon;Oh, Sejong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.1
    • /
    • pp.387-394
    • /
    • 2019
  • Recently, the importance of big data has been increased, and demand for data analysis for the big data is also increased. R language is developed for data analysis, and users are analyzing data by using algorithms of various statistics, machine learning and data mining packages in R language. However, it is difficult to develop an application using R. Early study proposed a method to call R script through another language such as PHP, Java, and so on. However, it is troublesome to write such a development method in addition to R in combination with other languages. In this study, we introduce how to write API using only R language without using another language by using Plumber package. We also propose a solution for security issues related with R API. If we use propose technology for developing web application, we can expect high productivity, easy of use, and easy of maintenance.

A Study on the Internet Broadcasting Image Processing based on Offloading Technique on the Mobile Environments (모바일 환경에서 오프로딩 기술 기반 인터넷 방송 영상 처리에 관한 연구)

  • Kang, Hong-gue
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.63-68
    • /
    • 2018
  • Offloading is a method of communicating, processing, and receiving results from some of the applications performed on local computers to overcome the limitations of computing resources and computational speed.Recently, it has been applied in mobile games, multimedia data, 360-degree video processing, and image processing for Internet broadcasting to speed up processing and reduce battery consumption in the mobile computing sector. This paper implements a viewer that enables users to convert various flat-panel images and view contents in a wireless Internet environment and presents actual results of an experiment so that users can easily understand the images. The 360 degree spherical image is successfully converted to a plane image with Double Panorama, Quad, Single Rectangle, 360 Overview + 3 Rectangle depending on the image acquisition position of the 360 degree camera through the interface. During the experiment, more than 100 360 degree spherical images were successfully converted into plane images through the interface below.

Contrast Enhancement Method using Color Components Analysis (컬러 성분 분석을 이용한 대비 개선 방법)

  • Park, Sang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.4
    • /
    • pp.707-714
    • /
    • 2019
  • Recently, as the sensor network technologies and camera technologies develops, there are increasing needs by combining two technologies to effectively observe or monitor the areas that are difficult for people to access by using the visual sensor network. Since the applications using visual sensors take pictures of the outdoor areas, the images may not be well contrasted due to cloudy weather or low-light time periods such as a sunset. In this paper, we first model the color characteristics according to illumination using the characteristics of visual sensors that continuously capture the same area. Using this model, a new method for improving low contrast images in real time is proposed. In order to make the model, the regions of interest consisting of the same color are set up and the changes of color according to the brightness of images are measured. The gamma function is used to model color characteristics using the measured data. It is shown by experimental results that the proposed method improves the contrast of an image by adjusting the color components of the low contrast image simply and accurately.

A Digital Nominative Proxy Signature Scheme for Mobile Communication (이동 통신에서 적용 가능한 수신자 지정 대리 서명 방식)

  • 박희운;이임영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.27-35
    • /
    • 2001
  • Based on the development of mobile communication, the future mobile communication systems are expected to provide higher quality of multimedia services for users than today\`s systems. Therefore, many technical factors are needed in this systems. Especially the secrecy and the safety would be obtained through the introduction of the security for mobile communication. In this paper, we presents a digital nominative proxy signature scheme that processes a user\`s digital signature and encryption using the proxy-agent who has more computational power than origins in mobile communication. The proposed scheme provides non-repudiation and prevents creating illegal signature by the origin and proxy-agent in a phase of proxy signature processing. Also this scheme satisfies the confidentiality and safety in the mobile communication through a confirming signature by the right receiver.

Implementation of a face detection algorithm for the identification of persons (동영상에서 인물식별을 위한 얼굴검출 알고리즘 구현)

  • Cho, Mi-Nam;Ji, Yoo-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.85-91
    • /
    • 2011
  • The technique, which is able to detect and recognize characters in videos such as a movie or TV drama, can be used for applications which are database management of a general user's facial images for the suppliers of PVR(personal video recorder), mobile phones, and multimedia, etc. In this paper, we propose a face detection algorithm. It searches the character through cast indexing when the scene is changed in video. It is consisted of three stages. The first step is the detection-step of the scene change after producing a paused image. The second step is the face detection-step using color information. The final step is the detection-step which detects its features by the facial boundary. According to the experimental result, it has detected faces in different conditions successfully and more advanced than the existing other one that are using only color information.

Competitive Algorithm of Set Cover Problem Using Inclusion-Exclusion Principle (포함-배제 원리를 적용한 집합피복 문제의 경쟁 알고리즘)

  • Sang-Un Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.165-170
    • /
    • 2023
  • This paper proposes an algorithm that can obtain a solution with linear time for a set cover problem(SCP) in which there is no polynomial time algorithm as an NP-complete problem so far. Until now, only heuristic greed algorithms are known to select sets that can be covered to the maximum. On the other hand, the proposed algorithm is a competitive algorithm that applies an inclusion-exclusion principle rule to N nodes up to 2nd or 3rd in the maximum number of elements to obtain a set covering all k nodes, and selects the minimum cover set among them. The proposed algorithm compensated for the disadvantage that the greedy algorithm does not obtain the optimal solution. As a result of applying the proposed algorithm to various application cases, an optimal solution was obtained with a polynomial time of O(kn2).

Application of Graphene Nanoribbon Trench for C60 Fullerene Shuttle Device: Molecular Dynamics Simulations (풀러렌 셔틀 소자로 그래핀 나노리본 트렌치 응용에 관한 분자동력학 시뮬레이션 연구)

  • Kwon, Oh-Kuem;Kang, Jeong Won
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.1
    • /
    • pp.887-894
    • /
    • 2018
  • We investigated the position controlling C60 fullerene encapsulated into a graphene-nanoribbon trench via classical molecular dynamics simulations. The graphene-nanoribbon trench can provide nanoscale empty spaces, and a C60 encapsulated therein can be considered as media for a nanoelectromechanical shuttle device. The classical molecular dynamics simulations presented here provide information on the potential application of a graphene-nanoribbon trench in a C60 shuttle device. Driving forces applied to C60 resulted in its motion toward the edges of the graphene-nanoribbon trench, the suction forces induced at both edges were balanced with the driving forces, and finally, the C60 fullerene gradually settled on the edges of the graphene-nanoribbon trench after several oscillations. The results of the present simulation suggest the importance of graphene-nanoribbon trenches encapsulating fullerenes in a wide range of applications in the field of nanotechnology.

Smart Centralized Remote Security Service Provisioning Framework for Open ICT Environment (개방형 ICT 환경을 위한 집중식 원격 보안 서비스 프로비저닝 프레임워크 구성 방안)

  • Park, Namje
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.2
    • /
    • pp.81-88
    • /
    • 2016
  • Machine-to-Machine (M2M) communication provides each component (machine) with access to Internet, evolving into the IoT technology. IoT is a trend where numbers of devices provide the communication service, using the Internet protocol. As spreading the concept of IoT(Internet of Things), various objects become home information sources. According to the wide spread of various devices, it is difficult to access data on the devices with unified manners. Under this environment, security is a critical element to create various types of application and service. In this paper propose the inter-device authentication and Centralized Remote Security Provisioning framework in Open M2M environment. The results of previous studies in this task is carried out by protecting it with the latest information on M2M / IoT and designed to provide the ultimate goal of future M2M / IoT optimized platform that can be integrated M2M / IoT service security and security model presents the information.

A Study of Aggressive Driver Detection Combining Machine Learning Model and Questionnaire Approaches (기계학습 모델과 설문결과를 융합한 공격적 성향 운전자 탐색 연구)

  • Park, Kwi Woo;Park, Chansik
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.3
    • /
    • pp.361-370
    • /
    • 2017
  • In this paper, correlation analysis was performed between questionnaire and machine learning based aggressive tendency measurements. this study is part of a aggressive driver detection using machine learning and questionnaire. To collect two types tendency from questionnaire and measurements system, we constructed experiments environments and acquired the data from 30 drivers. In experiment, the machine learning based aggressive tendency measurements system was designed using a driver behavior detection model. And the model was constructed using accelerate and brake position data and hidden markov model method through supervised learning. We performed a correlation analysis between two types tendency using Pearson method. The result was represented to high correlation. The results will be utilize for fusing questionnaire and machine learning. Furthermore, It is verified that the machine learning based aggressive tendency is unique to each driver. The aggressive tendency of driver will be utilized as measurements for advanced driver assistance system such as attention assist, driver identification and anti-theft system.