• Title/Summary/Keyword: Multimedia devices

Search Result 956, Processing Time 0.025 seconds

Development of an Augmented Reality Puzzle Game Detecting Hand Posture Using HSV Color Space in Real Time (HSV 컬러 영역을 이용한 실시간 손동작 검출 증강현실 퍼즐 게임 개발)

  • Kim, Minhyuk;Kim, Youngsik
    • Journal of Korea Game Society
    • /
    • v.14 no.5
    • /
    • pp.79-86
    • /
    • 2014
  • There have been many trials for development of games using augmented reality. This paper presents a 2D puzzle game system using HSV color space to detect hand posture from an input image by smart device's cameras in real time. The developed game in this paper brings smart devices and the computer vision closer. Also this game can be a new interactive technology utilizing both the mobility of smart devices and the tangible interactivity of virtual reality in education and entertainment environments.

Design and Implementation of Hadoop-based Big-data processing Platform for IoT Environment (사물인터넷 환경을 위한 하둡 기반 빅데이터 처리 플랫폼 설계 및 구현)

  • Heo, Seok-Yeol;Lee, Ho-Young;Lee, Wan-Jik
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.2
    • /
    • pp.194-202
    • /
    • 2019
  • In the information society represented by the Fourth Industrial Revolution, various types of data and information that are difficult to see are produced, processed, and processed and circulated to enhance the value of existing goods. The IoT(Internet of Things) paradigm will change the appearance of individual life, industry, disaster, safety and public service fields. In order to implement the IoT paradigm, several elements of technology are required. It is necessary that these various elements are efficiently connected to constitute one system as a whole. It is also necessary to collect, provide, transmit, store and analyze IoT data for implementation of IoT platform. We designed and implemented a big data processing IoT platform for IoT service implementation. Proposed platform system is consist of IoT sensing/control device, IoT message protocol, unstructured data server and big data analysis components. For platform testing, fixed IoT devices were implemented as solar power generation modules and mobile IoT devices as modules for table tennis stroke data measurement. The transmission part uses the HTTP and the CoAP, which are based on the Internet. The data server is composed of Hadoop and the big data is analyzed using R. Through the emprical test using fixed and mobile IoT devices we confirmed that proposed IoT platform system normally process and operate big data.

Influence of Nasometer Structure on Nasalance for Speech Therapy (언어치료환자를 위한 비음측정기 모듈의 구조가 비음치 산출에 미치는 영향)

  • Woo, Seong Tak;Park, Y.B.;Kim, J.Y.;Oh, D.H.;Ha, J.W.;Na, S.D.;Kim, M.N.
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.2
    • /
    • pp.157-166
    • /
    • 2019
  • With the development of medical technology, interest in rehabilitation devices is increasing and various devices are being studied. In particular, devices for speech disorders such as hearing impairment and cleft palate are attracting attention. In general, the nasometer is used for patients with flaccid dysarthria and velopharyngeal incompetence(VPI). However, in the case of the conventional separator type nasometer, that has an acoustic feedback problem between the oral and nasal sounds. In recent, the mask type nasometer has been developed which is insensitive to acoustic feedback. But, still not popularized. In this paper, the nasometer characteristics of the conventional separation type and mask type are analyzed. Also, We were obtained clinical acoustic data from the 6 subjects and examined the significant differences in the structure of the separation type and mask type nasometer. Through experiments, it was confirmed that the measurement was about 3~15% higher in the mask type nasometer than the conventional nasometer having a separator type. Also, We was considered the necessity of nasometer signal processing for acoustic feedback reduction and nasalance calculation optimization.

Countermeasure against MITM attack Integrity Violation in a BLE Network (BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법)

  • Han, Hyegyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.221-236
    • /
    • 2022
  • BLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed.

Design and Its Applications of a Hypercube Grid Quorum for Distributed Pub/Sub Architectures in IoTs (사물인터넷에서 분산 발행/구독 구조를 위한 하이퍼큐브 격자 쿼럼의 설계 및 응용)

  • Bae, Ihnhan
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.8
    • /
    • pp.1075-1084
    • /
    • 2022
  • Internet of Things(IoT) has become a key available technology for efficiently implementing device to device(D2D) services in various domains such as smart home, healthcare, smart city, agriculture, energy, logistics, and transportation. A lightweight publish/subscribe(Pub/Sub) messaging protocol not only establishes data dissemination pattern but also supports connectivity between IoT devices and their applications. Also, a Pub/Sub broker is deployed to facilitate data exchange among IoT devices. A scalable edge-based publish/subscribe (Pub/Sub) broker overlay networks support latency-sensitive IoT applications. In this paper, we design a hypercube grid quorum(HGQ) for distributed Pub/Sub systems based IoT applications. In designing HGQ, the network of hypercube structures suitable for the publish/subscribe model is built in the edge layer, and the proposed HGQ is designed by embedding a mesh overlay network in the hypercube. As their applications, we propose an HGQ-based mechansim for dissemination of the data of sensors or the message/event of IoT devices in IoT environments. The performance of HGQ is evaluated by analytical models. As the results, the latency and load balancing of applications based on the distributed Pub/Sub system using HGQ are improved.

A new IP-based Multi-Channel Elevator Video Surveillance System (IP 기반의 다채널 엘리베이터 영상감시 시스템)

  • Shin, Jea-Hung;Kim, Hong-Ryul
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.62 no.4
    • /
    • pp.164-168
    • /
    • 2013
  • Recently, in the elevator of the buildings, such as apartment and office building, the visitor monitoring cameras for surveillance, advertising LCD to provide a variety of information, emergency call devices, and safe driving information sensors are installed. A variety of multimedia data from these devices to the central control office, management office, or to guard room are transmitted in real-time. Each sub-systems in the elevator are installed with a separate lines and operated independently and use different management principals, so integrated management for each sub-systems are very difficult. In this study, we develop a new IP-based multi-channel video surveillance system which is integrated surveillance camera, emergency call devices, communications devices, various sensors in the elevator, DVR, ODM, and can manage all devices by two-way communication and integrated interface. And we evaluated the performance of the developed system.

Design and Evaluation Method of Linux Based Soft Real-Time Kernel for Information Devices (정보기기들을 위한 리눅스 기반 연성 실시간 커널의 설계 및 평가 방법)

  • Jung, YungJoon;Lim, Donghyouk;Lim, Chaedeok;Choi, Hoon
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.6
    • /
    • pp.393-400
    • /
    • 2011
  • Recently, demands of information devices are increasing as we can find so many information devices around us such as smartphone, MID(Mobile Internet Device), Tablet. These characteristics of information devices services should support soft real-time based time guaranteed multimedia services and control internet appliances. In this situation, soft real-time supported system should be developed to consider as a total aspect of hardware, kernel, middleware, application. But this paper will describe soft real-time supporting and evaluation methods for information device as an aspect of only kernel.

A Framework for Electroencephalogram Process at Real-Time using Brainwave

  • Sung, Yun-Sick;Cho, Kyung-Eun;Um, Ky-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.9
    • /
    • pp.1202-1209
    • /
    • 2011
  • Neuro feedback training using ElectroEncephalo Grams (EEGs) is commonly utilized in the treatment of Alzheimer's disease, and Attention Deficit Hyperactivity Disorder (ADHD). Recently, BCI (Brain-computer Interface) contents have developed, not for the purpose of treatment, but for concentration improvement or brain relaxation training. However, as each user has different wave forms, it is hard to develop contents controlled by such different wave. Therefore, an EEG process that allows the ability to transform the variety of wave forms into one standard signal and use it without taking a user's characteristic of EEG into account, is required. In this paper, a framework that can reduce users' characteristics by normalizing and converting measured EEGs is proposed for contents. This framework also contains the process that controls different brainwave measuring devices. In experiment a handling process applying the proposed framework to the developed BCI contents is introduced.

Imaging Device Identification using Sensor Pattern Noise Based on Wiener Filtering (Wiener 필터링에 기반하는 센서 패턴 노이즈를 활용한 영상 장치 식별 기술 연구)

  • Lee, Hae-Yeoun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2153-2158
    • /
    • 2016
  • Multimedia such as image, audio, and video is easy to create and distribute with the advance of IT. Since novice uses them for illegal purposes, multimedia forensics are required to protect contents and block illegal usage. This paper presents a multimedia forensic algorithm for video to identify the device used for acquiring unknown video files. First, the way to calculate a sensor pattern noise using Wiener filter (W-SPN) is presented, which comes from the imperfection of photon detectors against light. Then, the way to identify the device is explained after estimating W-SPNs from the reference device and the unknown video. For the experiment, 30 devices including DSLR, compact camera, smartphone, and camcorder are tested and analyzed quantitatively. Based on the results, the presented algorithm can achieve the 96.0% identification accuracy.

Securing RTP Packets Using Per-Packet Key Exchange for Real-Time Multimedia

  • Jung, Younchan;Festijo, Enrique;Atwood, J. William
    • ETRI Journal
    • /
    • v.35 no.4
    • /
    • pp.726-729
    • /
    • 2013
  • For secure multimedia communications, existing encryption techniques use an online session key for the key exchange, for which key size is limited to less than 10 digits to accommodate the latency condition caused by user devices only being able to handle low computational loads. This condition results in poor security of recorded encrypted data. In this letter, we propose a packet key scheme that encrypts real-time packets using a different key per packet for multimedia applications. Therefore, a key of a relatively small size can provide after-transmission confidentiality to data of a real-time session.