• 제목/요약/키워드: Multimedia software

검색결과 958건 처리시간 0.026초

Design of Input/Output Interface for ARM/AMBA based Board Using VHDL

  • Ryoo, Dong-Wan;Lee, Jeon-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.131.1-131
    • /
    • 2001
  • At the present time, multimedia chip, internet application, and network equipment is designed by using ARM core. Because it has a good debugging, software compiler and needed low power. We must process a data coding to send a multimedia data by real time. So need to connect software and hardware algorithm. In this research, We design interface for ARM9/AMBA based board using VHDL for these function implementation. The board is used the ARM company´s ARM940T for software function implementation and Xilinx company´s Virtex E2000 for hardware function algorithm. The various hardware algorithm (ME,ME,DCT) block for performance can be implemented on this system.

  • PDF

운송 안전 서비스를 위한 멀티미디어 공동 작업에서의 화이트보드 오류 제어 (A White Board Error Control Running on a Multimedia Collaboration Works for Transportation Safety Service)

  • 고응남
    • 한국정보전자통신기술학회논문지
    • /
    • 제3권1호
    • /
    • pp.53-56
    • /
    • 2010
  • 본 논문은 운송 안전 환경에서 멀티미디어 원격 제어를 위한 소프트웨어 오류를 감지하기에 적합한 에이전트이다. 이 시스템은 ED, ES로 구성되어 있다. ED는 IP-USN 게이트웨이 소프트웨어 스택 환경에서 멀티미디어 원격 제어를 위하여 훅 킹 기법으로 오류를 감지하는 에이전트이다. ES는 IP-USN 게이트웨이 소프트웨어 스택 환경에서 멀티미디어 원격 제어를 위하여 오류를 공유하는 에이전트이다. 멀티미디어 공동 작업 환경의 관점에서 오류 공유는 협동 작업에 참가하는 참가자에게 상호작용적으로 오류를 공유한다.

  • PDF

멀티미디어 저작도구의 비교.분석 (Comparative and analysis of multimedia author tools)

  • 권오탁;홍동헌
    • 경영과정보연구
    • /
    • 제2권
    • /
    • pp.23-46
    • /
    • 1998
  • In this paper, comparative and analysis of multimedia author tools for to proper compatible multimedia author tools on multimedia author tools function and usage, and which breach of contract each author tools specific property prepare to forecast future multimedia expansion trend on information technology expansion. Multimedia essential element is hardware(storage, digital video, CD), software, sound, hypertext and hypermedia etc. Analysis criteria of multimedia author tools is programming environment, which are card, script, icon, time method.

  • PDF

데이터베이스에 근거한 자동 키보드의 입력 방법 (Research on the Automatic Software Keyboard Based on Database)

  • 이계숙;용환승
    • 한국멀티미디어학회논문지
    • /
    • 제8권1호
    • /
    • pp.101-110
    • /
    • 2005
  • 최근 들어 하드웨어 키보드가 제한적인 모바일 단말기에서 소프트웨어 키보드가 광범위하게 사용되고 있다 본 연구에서는 데이터베이스 분석을 통해 최적의 키보드 공간을 생성하여 최소의 입력 단계로 원하는 입력이 가능한 새로운 소프트웨어 키보드 입력 방법을 제시하였다. 제안된 소프트웨어 키보드는 입력 가능한 모든 단어를 분석하여 각각의 입력 단계에 따라 동적으로 생성된다. 이때 최소한의 키 버튼만을 도시함으로써 키 버튼 선택 영역을 최소화하고 키 입력 실수를 방지한다. 또한 입력 가능한 단어들의 수가 제한적일 때 후입력 자동 완성 기능을 제공함으로써 키 버튼 선택 횟수를 최소화할 수 있다.

  • PDF

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • 제4권2호
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

Empirical Risk Assessment in Major Graphical Design Software Systems

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • 제8권4호
    • /
    • pp.259-266
    • /
    • 2021
  • Security vulnerabilities have been reported in major design software systems such as Adobe Photoshop and Illustrator, which are recognized as de facto standard design tools in most of the design industries. Companies need to evaluate and manage their risk levels posed by those vulnerabilities, so that they could mitigate the potential security bridges in advance. In general, security vulnerabilities are discovered throughout their life cycles repeatedly if software systems are continually used. Hence, in this study, we empirically analyze risk levels for the three major graphical design software systems, namely Photoshop, Illustrator and GIMP with respect to a software vulnerability discovery model. The analysis reveals that the Alhazmi-Malaiya Logistic model tends to describe the vulnerability discovery patterns significantly. This indicates that the vulnerability discovery model makes it possible to predict vulnerability discovery in advance for the software systems. Also, we found that none of the examined vulnerabilities requires even a single authentication step for successful attacks, which suggests that adding an authentication process in software systems dramatically reduce the probability of exploitations. The analysis also discloses that, for all the three software systems, the predictions with evenly distributed and daily based datasets perform better than the estimations with the datasets of vulnerability reporting dates only. The observed outcome from the analysis allows software development managers to prepare proactively for a hostile environment by deploying necessary resources before the expected time of vulnerability discovery. In addition, it can periodically remind designers who use the software systems to be aware of security risk, related to their digital work environments.

An Implementation of Web-based Stepwise Learning System for the Mathematical Problems

  • Kwon, Soon-Kak;Cho, Woo-Je;Kim, Tai-Suk
    • 한국멀티미디어학회논문지
    • /
    • 제6권4호
    • /
    • pp.630-637
    • /
    • 2003
  • This study is designed to use the stepwise learning system for solving learner-oriented problem on the Web, which can help learners probe studying targets and contents of mathematics as well as search for a study-related materials. The study provides a Web-based Courseware design model based on the general multimedia systematic professor design model. It develops a program for remote lecture that can solve problems through interaction among a professor and the other learners. It also implements a remote teaming system for real-time environment of mathematical problems oriented by the learner. The system designed either as a Web-based mathematical Courseware or as a text mode has the purpose of providing a Web-based stepwise learning system for solving mathematical problems oriented by the learner.

  • PDF

소프트웨어 비용-일정 타협을 위한 수정된 소프트웨어 공식 (Modified Software Equation for Software Cost-Schedule Tradeoff)

  • 이상운;최명복
    • 한국컴퓨터정보학회논문지
    • /
    • 제16권9호
    • /
    • pp.35-43
    • /
    • 2011
  • 하나의 소프트웨어를 개발하기 위해서는 개발조직의 생산성, 투입되는 노력, 개발일정, 소프트웨어 규모 간에 관계가 있다. 이들 관계를 유도한 식이 소프트웨어 공식이다. 소프트웨어 공식은 근본적으로 규모-노력, 규모-일정 관계가 적용되었다. 이 관계가 적절하지 않을 경우 소프트웨어 공식으로부터 유도되는 비용-일정 타협 공식, 투입인력 프로파일 등의 효용성이 없어진다. 본 논문에서는 이러한 문제점을 해결하고자 수정된 소프트웨어 공식을 유도하였으며, 수정된 소프트웨어 공식에 기반하여 소프트웨어 규모별로 비용-일정을 타협하는 모델들을 제안하였다. 소프트웨어 개발 성공률을 향상시키기 위해 제안된 모델을 적용하면 계약 협상이나 입찰에 도움이 될 것이다.

A Study on the Software Safety Assessment of Healthcare Systems

  • Olenski, Rafal;Park, Man-Gon
    • Journal of Multimedia Information System
    • /
    • 제2권2호
    • /
    • pp.241-248
    • /
    • 2015
  • The safety-critical software in healthcare systems needs more and more perceptive excess among human observation and computer support. It is a challenging conversion that we are fronting in confirming security in healthcare systems. Held in the center are the patients-the most important receivers of care. Patient injuries and fatalities connected to health information technologies commonly show up in the news, contrasted with tales of how health experts are being provided financial motivation to approve the products that may be generating damage. Those events are unbelievable and terrifying, however they emphasize on a crucial issue and understanding that we have to be more careful for the safety and protection of our patients.