scispace - formally typeset
Search or ask a question
JournalISSN: 1229-7771

Journal of Korea Multimedia Society 

Korea Multimedia Society
About: Journal of Korea Multimedia Society is an academic journal published by Korea Multimedia Society. The journal publishes majorly in the area(s): Computer science & Feature (computer vision). It has an ISSN identifier of 1229-7771. It is also open access. Over the lifetime, 1918 publications have been published receiving 3696 citations. The journal is also known as: Journal of Korea Multimedia Society & Journal of Korea multimedia society.


Papers
More filters
Journal Article
TL;DR: The result shows that empirical analysis of preprocessing, feature extraction, and matching performance is extremely important in order to produce optimized performance.
Abstract: Principal component analysis (PCA) based algorithms form the basis of numerous algorithms and studies in the face recognition literature. PCA is a statistical technique and its incorporation into a face recognition system requires numerous design decisions. We explicitly take the design decisions by in-troducing a generic modular PCA-algorithm since some of these decision ate not documented in the literature We experiment with different implementations of each module, and evaluate the different im-plementations using the September 1996 FERET evaluation protocol (the do facto standard method for evaluating face recognition algorithms). We experiment with (1) changing the illumination normalization procedure; (2) studying effects on algorithm performance of compressing images using JPEG and wavelet compression algorithms; (3) varying the number of eigenvectors in the representation; and (4) changing the similarity measure in classification process. We perform two experiments. In the first experiment, we report performance results on the standard September 1996 FERET large gallery image sets. The result shows that empirical analysis of preprocessing, feature extraction, and matching performance is extremely important in order to produce optimized performance. In the second experiment, we examine variations in algorithm performance based on 100 randomly generated image sets (galleries) of the same size. The result shows that a reasonable threshold for measuring significant difference in performance for the classifiers is 0.10.

39 citations

Journal ArticleDOI
TL;DR: In this paper, "In-home Headcount" checking algorithm using Wi-Fi and taking above mentioned advantages is proposed, and the basic Technology for such Solitary Senior Citizen"s Lonely Death monitoring system has been designed and implemented.
Abstract: The communications through the power lines are called as the PLC and this is a common name for the communication modes for the information delivery. This technology transmits the data through the power lines on which the information is stored with the form of high frequency signal. The characteristic of the frequency signal is that the signal can be separated from the power line through exclusive power line modem and transmitted to the terminal devices. In this paper, "In-home Headcount" checking algorithm using Wi-Fi and taking above mentioned advantages is proposed, and the basic Technology for such Solitary Senior Citizen"s Lonely Death monitoring system has been designed and implemented. The comparative analysis has been conducted in this paper with the test-operated and test bed-completed "Hyosimi 119 Safety-Welfare System" which is still being tested since 2008. With the "In-home Headcount Checking Algorithm", Wi-Fi connection/disconnection status and SSIDs of relevant Wi-Fis will be checked. We expect that our proposed method will become as the basic Technology which can prevent lonely deaths of elderly people living alone. Since the PLC technology can be normally implement all the functions used on internet anticipate that the technology could be applied to many areas to construct a new form of communication network.

35 citations

Journal ArticleDOI
TL;DR: IoT will change status of agriculture industry and appearance of various agriculture business model, and construction of IoT platform through open API in agriculture industry is suggested.
Abstract: Korea has high quality level of ICT Technologies, however it still have a long way to go before invigoration of ICT in agriculture industry The government of Korea supply to agriculture ICT systems, however these are the enclosed type and insufficient the level of connectivity, compatibility, and integrity between ICT systems Farmers can not share crop information and one system can not use with others in combination Recently, IoT(Internet of Things) become popular to emphasize the vision of a global internet and ICT industry The IoT is a critical technology that leads future internet generation We believe that IoT will change status of agriculture industry and appearance of various agriculture business model Using IoT technology is provided a platform of opportunities to optimize work processes and efficient use of energy, time and labour in farm It can automatically control temperature, humidity, sunshine system and so on for optimal growth conditions at greenhouse and plant factory Growth setting can even be controlled and monitored crop condition and disease by a smartphone app or PC It is possible to improve quality of farming and farm product We suggest that construction of IoT platform through open API in agriculture industry

31 citations

Journal ArticleDOI
TL;DR: By combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow, the authors can detect and mitigate SYN flooding attack quickly and cheaply and improve performance of DDOS mitigation.
Abstract: Software Defined Network (SDN) is a new technology in computer network area which enables user to centralize control plane. The security issue is important in computer network to protect system from attackers. SYN flooding attack is one of Distributed Denial of Service attack methods which are popular to degrade availability of targeted service on Internet. There are many methods to protect system from attackers, i.e. firewall and IDS. Even though firewall is designed to protect network system, but it cannot mitigate DDoS attack well because it is not designed to do so. To improve performance of DDOS mitigation we utilize another mechanism by using SDN technology such as OpenFlow and sFlow. The methodology of sFlow to detect attacker is by capturing and sum cumulative traffic from each agent to send to sFlow collector to analyze. When sFlow collector detect some traffics as attacker, OpenFlow controller will modify the rule in OpenFlow table to mitigate attacks by blocking attack traffic. Hence, by combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow we can detect and mitigate SYN flooding attack quickly and cheaply.

26 citations

Journal Article
TL;DR: The goal of this research is to improve the performance of single pass algorithm for text clustering by modifying it into the specialized version where documents are encoded into not numerical vectors but other forms.
Abstract: This research proposes a modified version of single pass algorithm specialized for text clustering Encoding documents into numerical vectors for using the traditional version of single pass algorithm causes the two main problems: huge dimensionality and sparse distribution Therefore, in order to address the two problems, this research modifies the single pass algorithm into its version where documents are encoded into not numerical vectors but other forms in the proposed version, documents are mapped into tables and the operation on two tables is defined for using the single pass algorithm The goal of this research is to improve the performance of single pass algorithm for text clustering by modifying it into the specialized version

19 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
202381
202215
202135
2020114
201952
201837