• Title/Summary/Keyword: multimedia tools

Search Result 301, Processing Time 0.026 seconds

A Development of Multimedia Software for STatistical Education using Authoring Tool-Dice and Card Game- (저작도구를 이용한 통계교육용 멀티미디어 소프트웨어 개발 연구 - 주사위 게임과 카드 게임 -)

  • 한경수;안정용
    • The Korean Journal of Applied Statistics
    • /
    • v.9 no.2
    • /
    • pp.73-82
    • /
    • 1996
  • A multimedia software for introductory education is developed based on computer simulation. Developing tools for educational software are discussed. A developed software can be used interactively in teaching of statistical basic concepts.

  • PDF

Ramdomg Hash for Integrity Verification Method of Multimedia Data in Surveillance System (비디오 감시 장치 무결성 검증을 위한 랜덤 해시 방법)

  • Ghimire, Sarala;Lee, Bumshik
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.11a
    • /
    • pp.165-168
    • /
    • 2019
  • The advancement in technology has led to the enormous use of multimedia applications. The video/image recorded by such applications provides critical information that can be used as a visual evidence. However, owing to the adequacy in using different editing tools, it is susceptible to malicious alterations. Thus, the reliability or the integrity of the visual information should be verified before using it as an evidence. In this paper, we propose an integrity verification method for the surveillance system using randomized hashing. The integrity value of the surveillance data is generated using the randomized hashing and elliptic curve cryptography (ECC), which is used later for the validation. The experimental results obtained from the embedded accident data recorder (ADR) system shows that the proposed method is very efficient and provides a high level of security.

  • PDF

Fuzzy Inference Network and Search Strategy using Neural Logic Network (신경논리망을 이용한 퍼지추론 네트워크와 탐색전략)

  • 이말례
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.2
    • /
    • pp.189-196
    • /
    • 2001
  • Fuzzy logic ignores some information in the reasoning process. Neural networks are powerful tools for the pattern processing, but, not appropriate for the logical reasoning. To model human knowledge, besides pattern processing capability, the logical reasoning capability is equally important. Another new neural network called neural logic network is able to do the logical reasoning. Because the fuzzy inference is a fuzzy logical reasoning, we construct fuzzy inference network based on the neural logic network, extending the existing rule - inference network. and the traditional propagation rule is modified.

  • PDF

Security Model for Intranet Environment (안전한 인트라넷을 위한 보안 모델)

  • Shin, Weon;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.2
    • /
    • pp.166-175
    • /
    • 1999
  • Since the intranet is a combination of open internet technologies and private information systems, various technologies for information security are essentially needed. On recent, a lot of firewall systems are being constructed to be secure the informations from external networks such as Internet in many private companies. Even though internal attacks are more frequently happened than external ones in the intranet environments, there are quite few researches on secure intranet and the internal threats are underestimated so far. In this paper, we study the security threats for each service in the intranet and propose the security models appropriate to the intranet environments by using several cryptographic tools and protocols. Furthermore, we implement the proposed security models in Java applications through computer simulation.

  • PDF

Simulation-based Design Verification for High-performance Computing System

  • Jeong Taikyeong T.
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.12
    • /
    • pp.1605-1612
    • /
    • 2005
  • This paper presents the knowledge and experience we obtained by employing multiprocessor systems as a computer simulation design verification to study high-performance computing system. This paper also describes a case study of symmetric multiprocessors (SMP) kernel on a 32 CPUs CC-NUMA architecture using an actual architecture. A small group of CPUs of CC-NUMA, high-performance computer system, is clustered into a processing node or cluster. By simulating the system design verification tools; we discussed SMP OS kernel on a CC-NUMA multiprocessor architecture performance which is $32\%$ of the total execution time and remote memory access latency is occupied $43\%$ of the OS time. In this paper, we demonstrated our simulation results for multiprocessor, high-performance computing system performance, using simulation-based design verification.

  • PDF

Development of an Authoring Tool for Producing 3D Games (3D 게임 제작을 지원하는 저작도구의 개발)

  • Lee Hunjoo;Kim Hyunbin
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.10
    • /
    • pp.1464-1477
    • /
    • 2004
  • Recently, there is a growing consideration that game authoring tools can play an important role in producing 3D games. In this paper, we introduce our 3D game authoring tool. The tool consists of a map editor, a sound editor, a game data exporter/previewer, and a special effect editor. This tool can help a game designer Produce game data such as game maps, sound effects, and special effects, and so on. In this paper, we implemented a prototype game content to verify the effectiveness of the developed authoring tool.

  • PDF

Dynamic Optimization of Active Queue Management Routers to Improve Queue Stability

  • Radwan, Amr
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1375-1382
    • /
    • 2015
  • This paper aims to introduce the numerical methods for solving the optimal control theory to model bufferbloat problem. Mathematical tools are useful to provide insight for system engineers and users to understand better about what we are facing right now while experiment in a large-scale testbed can encourage us to implement in realistic scenario. In this paper, we introduce a survey of the numerical methods for solving the optimal control problem. We propose the dynamic optimization sweeping algorithm for optimal control of the active queue management. Simulation results in network simulator ns2 demonstrate that our proposed algorithm can obtain the stability faster than the others while still maintain a short queue length (≈10 packets) and low delay experience for arriving packets (0.4 seconds).

Standardization Study of Font Shape Classification for Hangul Font Registration System (한글 글꼴 등록 시스템을 위한 글꼴 모양 분류체계 표준화 연구)

  • Kim, Hyun-Young;Lim, Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.3
    • /
    • pp.571-580
    • /
    • 2017
  • Recently, there are many communication softwares based on text on various smart devices. Unlike traditional print publishing, mobile publishing and SNS tools tends to utilize more decorative or more emotional fonts so that users can pass some feelings from contents. So font providers have released new fonts which deal with the requirements of the market. Nevertheless being released lots of new fonts, general users have not used them because they searched only by font name or font provider's name. It means that there is no way for users to know and find new things. In this study, we suggest font shape classification rules for font registration system based on font design features. We proved the validity of classification standard study through some experiments with 50 commercial fonts. Also the result of this study was provided for Korea Telecommunication Technology Association and adopted by the Korea industrial standard.

An Attack-based Filtering Scheme for Slow Rate Denial-of-Service Attack Detection in Cloud Environment

  • Gutierrez, Janitza Nicole Punto;Lee, Kilhung
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.125-136
    • /
    • 2020
  • Nowadays, cloud computing is becoming more popular among companies. However, the characteristics of cloud computing such as a virtualized environment, constantly changing, possible to modify easily and multi-tenancy with a distributed nature, it is difficult to perform attack detection with traditional tools. This work proposes a solution which aims to collect traffic packets data by using Flume and filter them with Spark Streaming so it is possible to only consider suspicious data related to HTTP Slow Rate Denial-of-Service attacks and reduce the data that will be stored in Hadoop Distributed File System for analysis with the FP-Growth algorithm. With the proposed system, we also aim to address the difficulties in attack detection in cloud environment, facilitating the data collection, reducing detection time and enabling an almost real-time attack detection.

An Implementation of Traffic Management System for Internet QoS Guarantee (인터넷 품질 수준 측정을 위한 품질 관리시스템 구현)

  • 김진규;이순흠
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.3
    • /
    • pp.399-407
    • /
    • 2004
  • As the number of IP-users are increasing, it is getting so important for service providers to check the state of the current Internet and their service quality by measuring the traffic quality. We describe a general concept of measurement architecture and internet QoS (Quality of Service) parameters, and we review measurement tools. To meet these requirements, we design and implement the Internet traffic management system.

  • PDF