• Title/Summary/Keyword: Extended Multimedia

Search Result 237, Processing Time 0.025 seconds

Design and Implementation of Storage Structure in XML using Extended Path Expression (확장된 경로 표현을 이용한 XML 문서의 저장 구조 설계 및 구현)

  • 백주현;최윤철
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.11a
    • /
    • pp.463-466
    • /
    • 2001
  • 최근 인터넷상에서 정보 교환의 표준으로 XML이 자리잡고 있다. XML은 웹 문서뿐만 아니라 전자 도서관, 전자 상거래, EC/EDI를 포함한 다양한 분야에서 사용하기 위하여 폭 넓은 연구를 진행하고 있다. 따라서 이들 문서에 대한 저장 및 검색에 대한 연구가 활발히 진행되고 있다. 그러나 이들 기법들은 주로 관계형 데이터베이스 시스템만 지원하거나, 주로 검색만 다루어 문서 정보 갱신이 발생할 경우 인덱스 변환에 따른 비용이 증가하는 문제점이 있다. 본 연구에서는 기존의 기법과 달리 객체 관계 및 관계형 데이터베이스 환경 둘 다 지원할 수 있도록 하였으며, 검색 정보 표현과 정보 갱신에 따른 인덱스 갱신 비용을 최소화하기 위해 화장 경로 표현 기법을 제안하였다. 그리고 제안된 기법을 Window 2000에서 PHP와 SQL Server 2000 데이터베이스 시스템을 이용해서 구현하였다.

  • PDF

Car Driving Simulation Game using 3-axis Gyroscope Sensor (3축 자이로스코프 센서를 이용한 자동차 주행 시뮬레이션)

  • Han, Kwangbae;Ko, Kwangman
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.6
    • /
    • pp.1089-1094
    • /
    • 2016
  • A simulation game represented the real world and situation as a video games, In the first time, this simulation game primarily applied to military practice areas and then it's applied areas were extended to strategy, flighting, racing, life areas. In this paper, we developed the driving simulator that operate the 3-axis sensor attached driver's handle which could forward/backward moving, control of direction, and transmit of gear in the virtual space. For more the realities of the situation and accuracy of the location and speed, we adopted the 3-axis sensing informations, Unreal engine4' and Blueprint.

Design of Edge Detection Algorithm Based on Adaptive Directional Derivative (적응성 방향 미분에 의한 에지 검출기의 설계 및 평가)

  • Kim, Eun-Mi
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.10
    • /
    • pp.1329-1336
    • /
    • 2005
  • We propose an optimal edge detection algorithm adaptive to the various widths of edges. In order to construct this algorithm, we introduce an alternative definition of edge point and generalize the directional derivatives in the pixel space to obtain an extended directional derivatives beyond scaling. The result from applying our algorithm to a 2D image is analyzed comparing to that from the other algorithm.

  • PDF

Design Space Exploration Environment for Hybrid Systems based on Extended Y-chart (Hybrid 시스템을 위한 확장된 Y-chart를 이용한 설계 공간 탐색 환경)

  • 안성용;이정아
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.1146-1150
    • /
    • 2002
  • 멀티미디어 데이터 처리나 암호화 알고리즘같은 계산량이 많고 마른 시간안에 처리되어야하는 어플리케이션들을 처리하기 위하여 최근의 컴퓨팅 환경은 재구성가능한 시스템과 일반적인 마이크로 프로세서가 결합된 시스템을 폭넓게 활용하고 있다. 이러한 시스템의 시장적응성을 높이기 위해서는 프로토타입을 제작하기 전에 설계변수에 따른 성능수치를 이미 예측하여 최소의 비용으로 시스템의 수행시간 및 자원제약사향을 만족할 수 있는 구조를 찾아내는 것이 필수적이다. 본 논문에서는 Y-chart 설계방법의 기본 개념을 Hybrid 시스템에 적용가능하도록 확장하여, 재구성 가능한 시뮬레이터를 개발하였고, 이를 기반으로 H.263 인코더 모델을 어플리케이션모델로 하고 FPGA와 일반적인 프로세서를 사용하는 가상의 시스템을 하드웨어 모델로하여 설계공간탐색을 진행하였다. 설계공간 탐색을 통한 시뮬레이션 결과는 시스템 설계자들에게 실제 포로토타입을 구축하지 않고 최적의 설계변수를 결정할 수 있게 하여 설계시간과 설계비용을 현저하게 줄여줄 것으로 기대된다.

  • PDF

Automatic Segmentation of Vertebral Arteries in Head and Neck CT Angiography Images

  • Lee, Min Jin;Hong, Helen
    • Journal of International Society for Simulation Surgery
    • /
    • v.2 no.2
    • /
    • pp.67-70
    • /
    • 2015
  • We propose an automatic vessel segmentation method of vertebral arteries in CT angiography using combined circular and cylindrical model fitting. First, to generate multi-segmented volumes, whole volume is automatically divided into four segments by anatomical properties of bone structures along z-axis of head and neck. To define an optimal volume circumscribing vertebral arteries, anterior-posterior bounding and side boundaries are defined as initial extracted vessel region. Second, the initial vessel candidates are tracked using circular model fitting. Since boundaries of the vertebral arteries are ambiguous in case the arteries pass through the transverse foramen in the cervical vertebra, the circle model is extended along z-axis to cylinder model for considering additional vessel information of neighboring slices. Finally, the boundaries of the vertebral arteries are detected using graph-cut optimization. From the experiments, the proposed method provides accurate results without bone artifacts and eroded vessels in the cervical vertebra.

Implementation of a Flexible Peer-to-Peer Internet Telephony Service Using an Underlying DHT (유연성을 갖는 분산 해쉬 테이블 기반의 피어 투 피어 인터넷 텔레포니 서비스의 구현)

  • Lee, Ju-Ho;Kim, Jae-Bong;Jeong, Choong-Kyo
    • Journal of Industrial Technology
    • /
    • v.26 no.B
    • /
    • pp.199-206
    • /
    • 2006
  • Internet telephony provides voice communication services with added flexibility for multimedia extension at a lower cost compared to traditional telephone systems. We implemented an internet telephony system as an overlay network without a centralized server, using a distributed hash table (DHT). Compared to the current server-based internet telephony system, our system is fault-tolerant, scalable, and can be flexible extended to various services and advanced to integrated service. To demonstrate the high flexibility of our DHT-based internet telephony system, we made our system cooperate with web servers. Web users can check up others' online stales and establish voice communication sessions to online users at a mouse click. This technology can be applied to more complex services such as multimedia messaging or video conference service.

  • PDF

Digital Watermarking using a Quadratic Equation Embedding Method in Wavelet Transform Domain (웨이블릿 변환영역에서 이차방정식 삽입 방법을 이용한 디지털 워터마킹)

  • 신용달
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.870-875
    • /
    • 2003
  • We Present digital watermarking using a quadratic equation embedding method in wavelet transform domain in order to improve the invisibility. Generally, embedding watermark used a simple equation form, but we extended a quadratic equation form in this paper. We performed a computer simulation in order to compare proposed method to other methods using LENA, GOLDHILL, BARBARA, and MAN images By computer experiments, invisibility of the proposed method better than the conventional methods at 100 % normalized similarity.

  • PDF

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • v.4 no.2
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

Fault Tree Analysis and Failure Mode Effects and Criticality Analysis for Security Improvement of Smart Learning System (스마트 러닝 시스템의 보안성 개선을 위한 고장 트리 분석과 고장 유형 영향 및 치명도 분석)

  • Cheon, Hoe-Young;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.11
    • /
    • pp.1793-1802
    • /
    • 2017
  • In the recent years, IT and Network Technology has rapidly advanced environment in accordance with the needs of the times, the usage of the smart learning service is increasing. Smart learning is extended from e-learning which is limited concept of space and place. This system can be easily exposed to the various security threats due to characteristic of wireless service system. Therefore, this paper proposes the improvement methods of smart learning system security by use of faults analysis methods such as the FTA(Fault Tree Analysis) and FMECA(Failure Mode Effects and Criticality Analysis) utilizing the consolidated analysis method which maximized advantage and minimized disadvantage of each technique.

A Multimedia Contents Recommendation for Mobile Web Users

  • Kang, Mee;Cho, Yoon-Ho;Kim, Jae-Kyeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2004.11a
    • /
    • pp.323-330
    • /
    • 2004
  • As mobile market grows more and more fast, the mobile contents market, especially music contents for mobile phones have recorded remarkable growth. In spite of this rapid growth, mobile web users experience high levels of frustration to search the desired music. New musics are very profitable to the content providers, but the existing collaborative filtering (CF) system can't recommend them. To solve these problems, we propose an extended CF system to reflect the user's real preference by representing the characteristics of users and musics in the feature space. We represent the musics using the music contents based acoustic features in multi-dimensional feature space, and then select a neighborhood with the distance based function. Furthermore, this paper suggests a recommendation for procedure for new music by matching new music with other users' preference. The suggested procedure is explained step by step with an illustration example.

  • PDF