• Title/Summary/Keyword: multimedia computing

Search Result 663, Processing Time 0.02 seconds

A Study on Stream Reactor for the event processing of multimedia streams in context-based (컨텍스트 기반에서의 멀티미디어 스트림의 사건처리를 위한 Stream Reactor연구)

  • Park, Yong-Hee;Kang, Tae-Sung;Lim, Young-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.1166-1171
    • /
    • 2000
  • 기존의 멀티미디어 연구의 실현에 있어 가장 큰 문제라 할 수 있던 성능의 문제가 하드웨어의 급속한 발달로 해결되어 감에 따라 멀티미디어 및 제반 관련기술도 함께 발전되었으며 이에 기반한 multimedia stream에서의 event를 검출하기 위한 다양한 연구들이 진행되어 왔다. 그러나 지금까지의 연구는 주로 전송 및 저장, 검색에 집중되어 연구되어 왔으며 영상인식 등의 Vision관련 연구에서는 멀티미디어 스트리밍 기술과의 연동을 고려하지 않은 연구를 수행함에 따라 검출 가능한 event가 있다고 하더라도 응용영역에 종속적인 인테페이스만을 고려함에 따라 사용자가 이를 기술(記述, description)하거나, 사용자에게 검출 가능한 event를 제시하기 위해 일반화된 방법이 제시되어 있지 않았다. 본 연구에서는 사용자가 검출을 원하는 event를 기술하는 방법과, 시스템에서 검출 가능한 event를 제시하기 위한 방법을 제안하고, 제시되는 방법이 응용영역에 독립적이기 위해 요구되는 사항들과 객체 단위인 이벤트/행위와 처리기 사이의 인터페이스에 관하여 정의한 후 기본적인 동작방식을 제안한다.

  • PDF

Secret Key and Tag Generation for IIoT Systems Based on Edge Computing

  • Koh, Giheon;Yu, Heungsik;Kim, Sungun
    • Journal of Multimedia Information System
    • /
    • v.8 no.1
    • /
    • pp.57-60
    • /
    • 2021
  • Industry 4.0 is continuous automation by applying the latest smart technologies to traditional manufacturing industries. It means that large-scale M2M (Machine-to-Machine) communication and IoT (Internet of Things) technologies are well integrated to build efficient production systems by analyzing and diagnosing various issues without human intervention. Edge computing is widely used for M2M services that handle real-time interactions between devices at industrial machinery tool sites. Here, secure data transmission is required while interacting. Thus, this paper focused on a method of creating and maintaining secret key and security tag used for message authentication between end-devices and edge-device.

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

A Digital Media Service System Supporting Multi-DRM in the Cloud (클라우드 환경에서 멀티 DRM을 지원하는 디지털 미디어 서비스 시스템)

  • Cho, Dueckyoun;Hwang, Seogchan;Jeong, Gunho;Lim, Hyeongmin
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.4
    • /
    • pp.765-773
    • /
    • 2016
  • As multimedia content technology developed, there are many cases that service contents are being provided in many different ways in the cloud-based media service system. A DRM is a technology that can enhance the copyright of the digital content by providing right information. It is available on a single platform and has a problem that the additional cost when the platform is changing. In this paper, we propose a media service system based on cloud computing. It can be used on multiple platforms at the same time by applying a number of DRM for digital contents, and allows use of a new authentication for another platform without any additional cost.

Distributed Multimedia Scheduling in the Cloud

  • Zheng, Mengting;Wang, Wei
    • Journal of Multimedia Information System
    • /
    • v.2 no.1
    • /
    • pp.143-152
    • /
    • 2015
  • Multimedia services in the cloud have become a popular trend in the big data environment. However, how to efficiently schedule a large number of multimedia services in the cloud is still an open and challengeable problem. Current cloud-based scheduling algorithms exist the following problems: 1) the content of the multimedia is ignored, and 2) the cloud platform is a known parameter, which makes current solutions are difficult to utilize practically. To resolve the above issues completely, in this work, we propose a novel distributed multimedia scheduling to satisfy the objectives: 1) Develop a general cloud-based multimedia scheduling model which is able to apply to different multimedia applications and service platforms; 2) Design a distributed scheduling algorithm in which each user makes a decision based on its local information without knowing the others' information; 3) The computational complexity of the proposed scheduling algorithm is low and it is asymptotically optimal in any case. Numerous simulations have demonstrated that the proposed scheduling can work well in all the cloud service environments.

Design and Implementation of a Mobile Runtime Library for Execution of Large-scale Application (대용량 소프트웨어 실행을 위한 모바일 런타임 라이브러리 설계 및 구현)

  • Lee, Ye-In;Lee, Jong-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.1-9
    • /
    • 2010
  • Today's growth of the mobile communication infrastructure made mobile computing systems like cellular phones came next to or surpassed the desktop PCs in popularity due to their mobility. Although the performance of mobile devices is now being improved continuously, it is a current common sense that compute intensive large-scale applications can hardly run on any kind of mobile handset devices. To clear up this problem, we decided to exploit the mobile cluster computing system and surveyed the existing ones first. We found out, however, that most of them are not the actual implementations but a mobile cluster infrastructure proposal or idea suggestions for reliable mobile clustering. To make cell phones participated in cluster computing nodes, in this paper, we propose a redesigned JPVM cluster computing engine and a set of WIPI mobile runtime functions interfacing with it. And we also show the performance evaluation results of real parallel applications running on our Mobile-JPVM cluster computing systems. We find out by the performance evaluation that large-scale applications can sufficiently run on mobile devices such as cellular phones when using our mobile cluster computing engine.

Study on the Job Execution Time of Mobile Cloud Computing (모바일 클라우드 컴퓨팅의 작업 실행 시간에 대한 연구)

  • Jung, Sung Min;Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.99-105
    • /
    • 2012
  • Given the numbers of smartphones, tablets and other mobile devices shipped every day, more and more users are relying on the cloud as the main driver for satisfying their computing needs, whether it is data storage, applications or infrastructure. Mobile cloud computing is simply cloud computing in which at least some of the devices involved are mobile. Each node is owned by a different user and is likely to be mobile. Using mobile hardware for cloud computing has advantages over using traditional hardware. These advantage include computational access to multimedia and sensor data without the need for large network transfer, more efficient access to data stored on other mobile devices and distributed ownership and maintenance of hardware. It is important to predict job execution time in mobile cloud computing because there are many mobile nodes with different capabilities. This paper analyzes the job execution time for mobile cloud computing in terms of network environment and heterogeneous mobile nodes using a mathematical model.

Issues in Next Generation Streaming Server Design

  • Won, Youjip
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2001.11a
    • /
    • pp.335-354
    • /
    • 2001
  • .Next Generation Multimedia Streaming Technology Massive Scale Support $\rightarrow$ Clustered Solution Adaptive to Heterogeneous Network daptive to Heterogeneous Terminal Capability Presentation Technique .SMART Server Architecture .HERMES File System .Clustered Solution . High Speed Storage Interconnect .' Content Partitioning . Load Management . Support for Heterogeniety . Adaptive End to End Streaming Transport: Unicast vs. Multicast '. Scalable Encoding

  • PDF

Secure NTRU-based Authentication and Key Distribution Protocol in Quantum Computing Environments (양자 컴퓨팅 환경에 안전한 NTRU 기반 인증 및 키 분배 프로토콜)

  • Jeong, SeongHa;Lee, KyungKeun;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1321-1329
    • /
    • 2017
  • A quantum computer, based on quantum mechanics, is a paradigm of information processing that can show remarkable possibilities of exponentially improved information processing. This paradigm can be solved in a short time by calculating factoring problem and discrete logarithm problem that are typically used in public key cryptosystems such as RSA(Rivest-Shamir-Adleman) and ECC(Elliptic Curve Cryptography). In 2013, Lei et al. proposed a secure NTRU-based key distribution protocol for quantum computing. However, Lei et al. protocol was vulnerable to man-in-the-middle attacks. In this paper, we propose a NTRU(N-the truncated polynomial ring) key distribution protocol with mutual authentication only using NTRU convolution multiplication operation in order to maintain the security for quantum computing. The proposed protocol is resistant to quantum computing attacks. It is also provided a secure key distribution from various attacks such as man-in-the middle attack and replay attack.

Proactive Retrieval Method Using Context Patterns in Ubiquitous Computing (유비쿼터스 컴퓨팅에서 컨텍스트 패턴을 이용한 프로액티브 검색 기법)

  • Kim, Sung-Rim;Kwon, Joon-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1017-1024
    • /
    • 2004
  • Ubiquitous system requires intelligent environment and system that perceives context in a proactive manner. This paper describes proactive retrieval method using context patterns in ubiquitous computing. And as the user's contexts change, new information is delivered proactively based on user's context patterns. For proactive retrieval, we extract context patterns based on sequential pattern discovery and association rule in data mining. By storing only information to be needed in near future using the context patterns, we solved the problem of speed and storage capacity of mobile devices in ubiquitous computing. We explain algorithms and an example. Several experiments are performed and the experimental results show that our method has a good information retrieval.

  • PDF