Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 12, Issue 6 - Dec 2007
Volume 12, Issue 5 - Nov 2007
Volume 12, Issue 4 - Sep 2007
Volume 12, Issue 3 - Jul 2007
Volume 12, Issue 2 - May 2007
Volume 12, Issue 1 - Mar 2007
Selecting the target year
Synchronization of the Train PIS using the reference clock and development of a subtitle authoring tool
Kim, Jung-Hoon ; Jang, Dong-Wook ; Han, Kwang-Rok ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 1~10
This paper describes the development of a network-based passenger information system(PIS) which provides the convenience of the passenger of the train and heightens the effect of the subtitle service, the advertising and the shelter guidance broadcasting against the urgent event. The existing system uses VGA signal distributor in order to broadcast information with image and subtitle and voice guidance. In this paper we improve the existing system by applying the UDP and TCP/IP protocol and use a reference clock to solve a data loss and synchronization problem which occurs in this case. We also developed an XML-based subtitle authoring tool which can edit and play the subtitles with various 3D to improve the automatic guidance broadcasting and advertisement effect according to the operation schedule of the train. The system performance was evaluated through a simulation.
A Study on Small-sized Index Structure and Fast Retrieval Method Using The RCB trio
Jung, Kyu-Cheol ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 11~19
This paper proposes RCB(Reduced Compact Binary) tie to correct faults of both CB(Compact Binary) tie and HCB(Hierarchical Compact Binary) trie. First, in the case of CB trie, a compact structure was tried for the first time, but as the amount of data was increasing, that of inputted data gained and much difficulty was experienced in insertion due to the dummy nods used in balancing trees. On the other hand, if the HCB trie realized hierarchically, given certain depth to prevent the map from increasing on the right, reached the depth, the method for making new trees and connecting to them was used. Eventually, fast progress could be made in the inputting and searching speed, but this had a disadvantage of the storage space becoming bigger because of the use of dummy nods like CB trie and of many tree links. In the case of RCB trie in this thesis, the tree-map could be reduced by about 35% by completely cutting down dummy nods and the whole size by half, compared with the HCB trie.
Implementation of a Service Oriented Architecture based on JXTA - an SOA framework involving users -
Kim, Tae-Ho ; Cheon, Hyeon-Jae ; Kim, Jun-Ryong ; Lee, Hong-Chul ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 21~31
This Paper presents an SOA framework that enables smooth provision of service to ordinary users while also replacing the current B2B environment-oriented SOA framework. To that end, the proposed SOA will be reviewed for its concept, characteristics, and components. Key to its design is that it will be implemented using the prospective next-generation P2P platform known as JXTA. The proposed framework includes all the basic functions of other SOA frameworks, and will make Provision and use of services more easy compared with other frameworks. Under this service, data and applications controlling these data are provided in an enabling format, thereby addressing security problems. Another advantage of this proposed framework is that each peer is able to play all roles of a service provider, service client, and service registry.
The Study for ENHPP Software Reliability Growth Model based on Burr Coverage Function
Kim, Hee-Cheul ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 33~42
Accurate predictions of software release times, and estimation of the reliability and availability of a software product require quantification of a critical element of the software testing process : test coverage. This model called Enhanced non-homogeneous poission process(ENHPP). In this paper, exponential coverage and S-shaped model was reviewed, proposes the Kappa coverage model, which maked out efficiency application for software reliability. Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on SSE statistics and Kolmogorov distance, for the sake of efficient model, was employed. From the analysis of mission time, the result of this comparative study shows the excellent performance of Burr coverage model rather than exponential coverage and S-shaped model using NTDS data. This analysis of failure data compared with the Kappa coverage model and the existing model(using arithmetic and Laplace trend tests, bias tests) is presented.
Performance Evaluation of QoS-based Web Services Selection Models
Seo, Sang-Koo ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 43~52
As the number of public Web Services increases, there will be many services with the same functionality. These services. however, will vary in their QoS properties, such as price, response time and availability, and it is very important to choose a best service while satisfying given QoS constraints. This paper brings parallel branching and response time constraint of business processes into focus and investigates several service selection plans based on multidimensional multiple choice Knapsack model. Specifically. proposed in the paper are a plan with response time constraints for each execution flow, a plan with a single constraint over the whole service types and a plan with a constraint on a particular execution path of a composite Web Services. Experiments are conducted to observe the performance of each plan with varying the number of services, the number of branches and the values of response time constraint. Experimental results show that reducing the number of candidate services using Pareto Dominance is very effective and the plan with a constraint over the whole service types is efficient in time and solution quality for small to medium size problems.
A Real-time Color Quantization Method for Virtual Environments Navigation System
Lim, Hun-Gyu ; Park, Doo-Won ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 53~59
A navigation system for virtual environments using low-qualify HMD(head mounted display) must quantize images when the system presents true-color image with restricted number of colors. Such navigation system quantizes an image by using fixed palette. If the system represents an image by using a variable palette which is made considering a region around the viewpoint then user can perceive a virtual environments more vividly because human visual system is sensitive to the colors variation in the region around the viewpoint. In this paper we propose a color quantization algorithm that quantize a region around the viewpoint more finely than other regions at each variation of viewpoint for virtual environments navigation system and compose virtual environments navigation system using proposed algorithm. The system quantizes an image at each variation of viewpoint and shows a quantized image to user through HMD. We tested user preferences for our proposed system and the results show that users preferred our system.
Boundary Contraction for Wide-Angle Images on Monitor Screen: An Effect of Retention Interval
Jang, Phil-Sik ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 61~68
Two experiments examined the visual memory distortion by presenting 170 subjects with wide-angle views of four scenes on monitor screen. Retention interval of 0, 1 and 48 hours tested in reproduction and recognition experiment. The results of reproduction showed that the subjects tend to magnify the foreground and background of scenes compared to the real input (scene) for all retention intervals. The viewers recognized mure wide-angle views for the same scenes at the retention interval of 1 and 48 hours. These results demonstrated boundary extension is not a robust and unidirectional phenomenon but boundary contraction can be occurred with wide-angle views. The results also suggested that boundary contraction is the product of the activation of a memory schema hypothesis: In memory the representation moves toward a prototypical view and prototypical object size.
RFID Security Authentication Protocol for the Ubiquitous Environment
Bae, Woo-Sik ; Choi, Shin-Hyeong ; Han, Kun-Hee ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 69~75
On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.
The Secure Hybrid Authentication message protocol
Yang, Hyung-Kyu ; Choi, Jong-Ho ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 77~85
Asecure channel provides protection against interception, while an authentication system is created to protect the client and the server from fabrication attacks. This paper proposes a hybrid authentication algorithm, which fixes the lapses problem encountered in the SSL authentication. Also, the Proposed hybrid authentication system has been created to protect the client and the server from modification and fabrication attacks. By using a modified three-way authentication there is no need for a timeserver. thus timestamps are not needed.
A Balancing Method to improve efficiency of Stereo Coding
Kim, Jong-Su ; Choi, Jong-Ho ; Lee, Kang-Ho ; Kim, Tae-Yong ; Choi, Jong-Soo ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 87~94
Imbalances in focus, luminance and color between stereo Pairs could cause disparity vector estimation error and increment of transmission data. If the distribution of errors in residual image is large, it may influence to lowering of compression performance. Therefore, in this paper, we propose an efficient balancing method between stereo pairs to reduce the effect. For this, we registrated stereo images using a FFT based method to consider the pixels in the occluded region, we eliminated the pixels of blocks which has large error of disparity vector estimation in balancing function estimation. The balancing function has estimated using histogram specification, local information of target image and residual image between stereo images. Experiments show that the proposed method is effective in error distribution, PSNR and disparity vector estimation. We expect that our method can be improving compression efficiency in stereo coding system.
An Attribute-Based Naming Architecture for Wireless Sensor Networks
Jung, Eui-Hyun ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 95~102
Recently, a lot of researchers focus on the sensor middleware that hide the complexity of application developments and provide the abstraction of functions to upper application layer. Although there we several factors to design sensor middleware, the attribute-based naming is considered to be an essential factor among them. However, most existing researches were not designed to reflect the characteristics of sensor networks and have the limitation of attribute-based query extension. This study adopts the concept of Virtual Counterpart to suggest the structure there attribute-based naming is supported by virtual sensor nodes of the middleware on the sink node. Unlike traditional data-centric middleware in which individual sensor nodes process attribute-based query, virtual sensor nodes mapped to physical sensor nodes are running on the middleware of the sink node and process attribute-based query as a proxy of the physical sensor. This approach enables attribute-based naming independent of physical infrastructure and easy extensibility.
A Study on the Demand for Ubiquitous Computing Services
KIm, Ji-Soo ; Kim, Jong-Myoung ; Lee, Tae-Soo ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 103~110
Ubiquitous computing is a vogue word, and its service is very popular in Korea. However, present ubiquitous service(u-Service) is thought to be more oriented to the provider's point of view, not the consumer's. To complement this problem, an online survey was performed for internet users, which consists of 24 single choice questions on six fields such as transportation, healthcare, environment/city-management, culture/education, administration, and industry. 2463 people joined the survey, who were grouped according to their age, resident region, level of education, and sex. Each group's demand for specific field of u-Service was examined. General level of demand was higher in case of the elderly and male than the younger and female for overall u-Service.
Efficient Huffman Decoding using Canonical Huffman Tree
Park, Sang-Ho ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 111~117
We present an efficient decoding scheme for Huffman codes in which we use a properties of canonical prefix tree. After Huffman tree is converted to canonical Huffman tree, we represent Huffman tree with minimum information using rules associated with values of nodes in canonical tree. The proposed scheme can reduce memory to store Huffman tree information while maintains the same Processing time. The memory size in order to represent tree information is 2h + 2klogn which is less than those of previous methods. But the number of search is similar to previously proposed techniques.
A Policy-Based Active Framework for the Management of QoS in MANET
Kim, Kyu-Ho ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 119~125
On account of limited resources and diverse topology change. it is difficult to manage MANET and guarantee QoS. In current MANET, QoS grantee is exceedingly significant. However, today's MANET are being concentrately worked on MAC protocols and routing protocols. Thus we proposed a framework for effective management of MANET and supporting QoS using policy based network management paradigm and active network technology. Since this framework employs the policy-based management approach in active network environment, it provides an abstract and autonomous management method to network managers.
A study of service control strategies against infringement accidents
Shin, Young-Sun ; Park, Jin-Sub ; Park, Jung-Jin ; Lee, Hee-Sung ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 127~136
With the construction of vast networks, Internet based services such as online games and Internet banking are steadily increasing. As dysfunctions of the trend, various threats from worms/viruses to hacking are proliferating and new types and variations of worms/viruses are emerging. In response to the problems, telecommunication carriers and the government we establishing systems to cope with infringement accidents and resultant damages. However, in case of nationwide emergencies like the 1.25 Accident, infringement may spread rapidly while analyzing what kind of infringement it is and that may result in enormous losses. Thus, the paper purposed to analyze the states of infringement accidents occurring at each network and coping methods and checklist, based on the results. and to propose strategies for controlling services in case of large scale infringement accidents.
The study on efficient conversion Radio media into digital - Focusing on the analysis results of radio audience's attitude -
Kang, Dong-Gu ; Park, Jun-Seon ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 137~148
Due to the advance of technology, the technology of various media is rapidly converged into digital technology. However, the conversion into digital radio is not achieved in korea yet. This paper is to suggest the best method of digital conversion of radio in korea by examining some conversion examples in foreign countries. In addition, the survey results on radio audience attitude is analysed by 2,000 audience samples in Korea based on the literature analysis. Radio is the unique media which have the strengths such as mobility, individuality, presence, broad coverage and instant. Most of all, radio cannot help keeping continuously the public broadcasting service in the future. So, the conversion into digital radio is crucial to sustain the competitiveness in digital media environment. This paper suggested that the digital conversion of radio broadcasting needs DRM transmission and should pursuit the policy which is distinguished between a AM and a standard FM, and between domestic broadcast and an international broadcast. Additionally, this paper proposed that we need to develop the multiple device for receiving of signal and the setting of standard technology.
A study on broadcasting service model of medium wave digital radio
Han, Hak-Soo ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 149~158
A In the rapidly changing media environment, radio needs to be digitized in order to provide regular compatible service. Especially, most medium high frequency Medias have program contents thar are similar to the standard FM bandwidth, so digitizing radio will bring less effect than it is expected. However, the characteristics of radio medias are mobility, individuality, site-to-site, wide service coverage, immediate delivery and publicity, so it is necessary to study the future of radio media to provide continuous services, moreover, the main discussion regarding balanced development between medias will be the trend of the digitization of radio. Also it is easy and will cost less to change compared to other medias. AM was the first media to broadcast in Korea, and its network is spread all over Korea, also the receivers are the most widely distributed which means the signal reaches everywhere in Korea. In this study, the proper service model for AM digital radio is provided in this environment in which all Medias are rapidly digitizing due to the advancement of digital technology. The results of experimental are based on library study and KBS data of sound wave.
A study on mobile phone addiction of college students (D-College)
Lee, Jae-Do ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 159~167
This study executed questionnaire surveys on 482 undergraduates of D-college to review the extents of spam letter messages received through the mobile phones of college students and the extents of their addiction to mobile phones. It was revealed that each college student received one or two spam letter messages on average a day. Among the received spam messages were the messages containing the contents of commodity advertisements most frequent and the surveys indicated that spam messages are hardly read. As for the addiction to mobile phones, the average score of addiction of the respondents was indicated to be 38.73 based on the full score of 100 and the number of the ones with the scores of 60 or more was 47 which is 9.75% and the ones with the scores of 70 or more was 13 which is 2.70%. Also the younger the students were, the higher were the numbers of the students included in the addictive group and the number of students from other areas included in the addictive group was high and the number of the students in 2years system included in the addictive group was higher than the number of the students in 3years system included in the addictive group.
An Empirical Study on the Evaluation of Supplier Selection Factors Using the AHP - Focused on the Stationery and Office Machine Suppliers -
Kim, Shin-Joong ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 169~177
Competitive international business environment has forced many firms to focus on supply chain management to cope with highly increasing competition. Hence the supplier selection is the most important decision of a company. Because it has a direct effect on cost reduction and quality, profitability and flexibility improvement of a company, so the right supplier selection significantly affect on the organization's efficiency and effectiveness and competitiveness. The primary research objects of this study is to evaluate an importance of supplier selection factors as an index and to present the evaluation model for supplier selection. For this purpose, this study adopts the AHP method to calculate the importance of supplier selection factors. In this study, 16 factors which affect on the supplier selection decision making are classified into three factors-product supply related factor, product related factor, management ability related factor.
Designing OLAP Cube Structures for Market Basket Analysis
Yu, Han-Ju ; Choi, In-Soo ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 179~189
Every purchase a customer makes builds patterns about how products are purchased together. The process of finding these patterns, called market basket analysis, is composed of two steps in the Microsoft Association Algorithm. The first step is to find frequent item-sets. The second step which requires much less time than the first step does is to generate association rules based on frequent item-sets. Even though the first step, finding frequent item-sets, is the core part of market basket analysis, when applied to Online Analytical Processing(OLAP) cubes it always raises several points such as longitudinal analysis becomes impossible and many unpractical transactions are built up. In this paper, a new OLAP cube structures designing method which makes longitudinal analysis be possible and also makes only real customers' purchase patterns be identified is proposed for market basket analysis.
A Study of Universal Web USER INTERFACE Design for a Disabled
Lee, Joong-Yeub ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 191~200
This study was identify web interface design factors for increasing information processing and attention for mentally disabled men. Gaining information via the internet is becoming pivotal in today"s society as the internet is becoming the center of knowledge and information. The goal of this study is to present the guideline of web interface design for the disabled men who are alienated in gaining information from the Internet. If the internet were more user friendly to the disabled men, they would be able to spend more time in doing what they enjoy and also in self development, with the information gained on the internet. This study investigated current portal sites to understand the present situation, surveyed and interviewed the disabled men, and researched literatures on how the disabled men perceive various stimulants and also researched documents for previous guidelines on interface design for them. This study investigated internet sites which the disabled men use to gather information about products and which entice their purchasing desires. The conclusion is that the usability can be improved by eliminating visual dizzy elements in the pages, simplifying the layout and the menu designs which represent the information architecture.
Establishing a Early Warning System using Multivariate Control Charts in Melting Process
Lee, Hoe-Sik ; Lee, Myung-Joo ; Han, Dae-Hee ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 201~207
In some manufacturing industries, there are many situation in which the simultaneous monitoring or control of two or more related quality characteristics is necessary. However, monitoring these two or more related quality characteristics independently can be very misleading. When several characteristics of manufactured component are to be monitored simultaneously, multivariate
control chart can be used. In this paper, establishing a early warning system(EWS) using multivariate control charts to analyze early out-of-control signals in melting process with many quality characteristics was presented. This module which we developed to control several characteristics improved efficiency and effectiveness of process control in the melting process.
A Study on Kano Model Based Global Sustainable Quality Innovation Index of Single PPM Quality Innovation Movement
Lee, Hoe-Sik ; Lee, Myung-Joo ; Jeong, Hae-Jun ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 209~219
Since 100PPM Quality Certification System has been established by the Industrial Advancement Administration in 1995, 100PPM duality Innovation movement has contributed much to the enhancement of qualify competitiveness of Korea's parts industry. And in 2000, raised to a higher level, Single PPM qualify Certification System has been established by the Small and Medium Business Adminstration. The quality target is below the 10ppm(parts per million) in outgoing qualify and delivered goods plus field claim. Recently 1.818 companies is received Single PPM Quality Certification from Government. Single PPM Quality Innovation movement is perfection movement which is suitable for 21C's social-economical criteria to pursuit of zero defect. The purpose of this study is to suggest the Kano Model based Global Sustainable duality Innovation(GSQI) Index to improve current problems of Single PPM Quality Innovation Movement.
A Study on Method for Realization of Cost-based Quality Function Deployment(QFCD)
Choi, Yong-Jung ; Lee, Phil-Jae ; Han, Woo-Chul ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 221~228
Qualify Function Deployment(QFD) is a technique which was born in Japan as a strategy for assuring that quality is built into new products. QFD was first used in 1972 by Kobe Shipyard of Mitsubish Heavy Industrials Ltd. and was then referred to as the quality tables. After QFD is proposed, it has been applied by both many large and small companies around the world. Many studies related QFD are performed till now but study related "cost-based QFD(QFCD)" hasn't been performed actively. If cost-based QFD is not performed. the produced results will be included possibility that is not significant as well as realistic. Therefore, the purpose of this study is to improve effectiveness and efficiency for product development's result through QFD by introducing QFCD's concept and execution procedure.
A Research of Spatial Metadata Model for Underground water Management System
Lee, Sang-Moon ; Seo, Jeong-Min ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 229~237
To solve of complex problems for access and management data stored in the very large spatial database system that need to constructed metadata for the physical and logical elements concerned with spatial and non-spatial data sets. Also, in the underground water management system which managed with spatial and non-spatial elements, need to spatial features metadata system based on feature-based. We, in this paper, proposed metadata model for the feature-based underground water management system using underground water meta-information inputted on the DXF formatted tile-based geological maps. Additional, we modeled metadata level of feature and data set and presented standard specification of underground water metadata.
Design and Control of Security Ticket Based CERT/CC System for Quantified Incident Management
Kim, Sun-Tae ; Park, Dea-Woo ; Jun, Moon-Seog ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 239~248
There's been a difficulty for general corporate to adopt recent incident response study because those studies focus on nation wide CERT Coordination Center or large organization aspect. This study is focus on study and design on security ticket based CERT system through analysis Security management's threat element, attack element, response element and it also help general corporate establish incident response process that is adjusted on IT operation. Confirmed CERT model's effectiveness and effect of quantitative Security incident management way that propose executing Security incident response experiment on the basis of this way. This study which provides general corporate oriented CERT model can be used to improve corporate's capability of responding incident by quantified management technique and select incident response SLA indicator. Already, formation which operate CERT can heighten corporation's information protection level by measure Security incident response result as metrical and analyze and improve problem continuously.
The design and FPGA implementation of a general-purpose LDI controller for the portable small-medium sized TFT-LCD
Lee, Si-Hyun ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 249~256
AIn this paper, a new desist of LDI controller IC for general purpose is proposed for driving the LDI(LCD Driver Interface) controller in
inches sized portable small-medium TFT-LCD(Thin Film Transistor addressed -Liquid Crystal Display) panel module. The designed LDI controller was verified on the FPGA(Reld Programmable Gate Array) test board, and was made the interactive operation with the commercial TFT-LCD panel successfully. The purpose of design is that it is standardized the LDI controller's operation by one LDI controller for driving all TFT-LCD panel without classifying the panel vendor, and size. The main advantage for new general-purpose LDI controller is the usage for the desist of all panel's SoG(System on a Glass) module because of the design for the standard operation. And in the previous method, it used each LDI controller for every LCD vendor, and panel size, but because a new one can drive all portable small-medium sized panel, it results in reduction of LDI controller supply price, and manufacturing cost of AV(Audio Video) board and panel. In the near future, the development of SoG IC(Integrated Circuit) for manufacturing more excellent functional TFT-LCD panel module is necessary. As a result of this research, the TFT-LCD panel can make more small size, and light weight, and it results in an upturn of domestic company's share in the world market. With the suggested theory in this paper, it expects to be made use of a basic data for developing and manufacturing for the SoG chip of TFT-LCD panel module.
System Architecture Design and Policy Implications on the e-Marketplace for Telecom Bandwidth Trading
Kim, Do-Hoon ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 257~267
Bandwidth Trading(BT) represents a potential market with over 1 trillion USD across the world and high growth potential. BT is also likely to accelerate globalization of the telecommunications industry and massive restructuring driven by unbundling rush. However, systematic researches on BT remain at an infant stage. This study starts with structure analysis of the Internet industry, and discusses significance of Internet interconnection with respect to BT issues. We also describe the bandwidth commoditization trends and review technical requirements for effective Internet interconnection with BT capability. Taking a step further, this study explores the possibility of improving efficiency of network providers and increasing user convenience by developing an architectural prototype of Hub-&-Spoke interconnection model required to facilitate BT. The BT market provides an innovative base to ease rigidity of two-party contract and increase service efficiency. However, as fair, efficient operation by third party is required, this research finally proposes an exchanging hub named NIBX(New Internet Business eXchange).
Sequential localization with Beacon Nodes along the Seashore for Marine Monitoring Sensor Network
Kim, Chung-San ; Kim, Eun-Chan ; Kim, Ki-Seon ; Choi, Young-Yoon ;
Journal of the Korea Society of Computer and Information, volume 12, issue 4, 2007, Pages 269~277
Wireless sensor network system is expected to get high attention in research for now and future owing to the advanced hardware development technology and its various applicabilities. Among variety of sensor network systems, the seashore and marine sensor network, which are extended to get sampling of marine resources, environmental monitoring to prevent disaster and to be applied to the area of sea route guidance. For these marine applications to be available, however, the provision of precise location information of every sensor nodes is essential. In this paper, the sequential localization algorithm for obtaining the location information of marine sensor nodes. The sequential localization is done with the utilization of a small number of beacon nodes along the seashore and gets the location of nodes by controling the sequences of localization and also minimizes the error accumulation. The key idea of this algorithm for localization is that the localization priority of each sensor nodes is determined by the number of reference nodes' information. This sequential algorithm shows the improved error performance and also provide the increased coverage of marine sensor network by enabling the maximum localization of sensor nodes as possible.