Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Information Processing Systems
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 1, Issue 1 - Dec 2005
Selecting the target year
A Study on the Design of the Monitoring Architecture for Embedded Kernels based on LTT
Bae, Ji-Hye ; Park, Yoon-Young ; Park, Jung-Ho ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 1~8
DOI : 10.3745/JIPS.2005.1.1.001
Embedded systems are used in many fields such as home appliances, terminals, controls, communications, etc. So, to manage, control, and test these embedded systems, monitoring programs have been developed variously. In this paper, to overcome the characteristic faults of embedded systems which have resource restrictions, we implemented a development environment based on NFS and designed a monitoring tool that can evaluate and analyze kernel performance in embedded equipment by using LTT(Linux Trace Toolkit). Also, we designed a method to show monitoring data collected by using a monitoring tool, called MONETA 2.0, through the web-page.
Robust Real-time Intrusion Detection System
Kim, Byung-Joo ; Kim, Il-Kon ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 9~13
DOI : 10.3745/JIPS.2005.1.1.009
Computer security has become a critical issue with the rapid development of business and other transaction systems over the Internet. The application of artificial intelligence, machine learning and data mining techniques to intrusion detection systems has been increasing recently. But most research is focused on improving the classification performance of a classifier. Selecting important features from input data leads to simplification of the problem, and faster and more accurate detection rates. Thus selecting important features is an important issue in intrusion detection. Another issue in intrusion detection is that most of the intrusion detection systems are performed by off-line and it is not a suitable method for a real-time intrusion detection system. In this paper, we develop the real-time intrusion detection system, which combines an on-line feature extraction method with the Least Squares Support Vector Machine classifier. Applying the proposed system to KDD CUP 99 data, experimental results show that it has a remarkable feature extraction and classification performance compared to existing off-line intrusion detection systems.
A Multiple Instance Learning Problem Approach Model to Anomaly Network Intrusion Detection
Weon, Ill-Young ; Song, Doo-Heon ; Ko, Sung-Bum ; Lee, Chang-Hoon ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 14~21
DOI : 10.3745/JIPS.2005.1.1.014
Even though mainly statistical methods have been used in anomaly network intrusion detection, to detect various attack types, machine learning based anomaly detection was introduced. Machine learning based anomaly detection started from research applying traditional learning algorithms of artificial intelligence to intrusion detection. However, detection rates of these methods are not satisfactory. Especially, high false positive and repeated alarms about the same attack are problems. The main reason for this is that one packet is used as a basic learning unit. Most attacks consist of more than one packet. In addition, an attack does not lead to a consecutive packet stream. Therefore, with grouping of related packets, a new approach of group-based learning and detection is needed. This type of approach is similar to that of multiple-instance problems in the artificial intelligence community, which cannot clearly classify one instance, but classification of a group is possible. We suggest group generation algorithm grouping related packets, and a learning algorithm based on a unit of such group. To verify the usefulness of the suggested algorithm, 1998 DARPA data was used and the results show that our approach is quite useful.
A Hierarchical Text Rating System for Objectionable Documents
Jeong, Chi-Yoon ; Han, Seung-Wan ; Nam, Taek-Yong ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 22~26
DOI : 10.3745/JIPS.2005.1.1.022
In this paper, we classified the objectionable texts into four rates according to their harmfulness and proposed the hierarchical text rating system for objectionable documents. Since the documents in the same category have similarities in used words, expressions and structure of the document, the text rating system, which uses a single classification model, has low accuracy. To solve this problem, we separate objectionable documents into several subsets by using their properties, and then classify the subsets hierarchically. The proposed system consists of three layers. In each layer, we select features using the chi-square statistics, and then the weight of the features, which is calculated by using the TF-IDF weighting scheme, is used as an input of the non-linear SVM classifier. By means of a hierarchical scheme using the different features and the different number of features in each layer, we can characterize the objectionability of documents more effectively and expect to improve the performance of the rating system. We compared the performance of the proposed system and performance of several text rating systems and experimental results show that the proposed system can archive an excellent classification performance.
A Hardware/Software Codesign for Image Processing in a Processor Based Embedded System for Vehicle Detection
Moon, Ho-Sun ; Moon, Sung-Hwan ; Seo, Young-Bin ; Kim, Yong-Deak ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 27~31
DOI : 10.3745/JIPS.2005.1.1.027
Vehicle detector system based on image processing technology is a significant domain of ITS (Intelligent Transportation System) applications due to its advantages such as low installation cost and it does not obstruct traffic during the installation of vehicle detection systems on the road. In this paper, we propose architecture for vehicle detection by using image processing. The architecture consists of two main parts such as an image processing part, using high speed FPGA, decision and calculation part using CPU. The CPU part takes care of total system control and synthetic decision of vehicle detection. The FPGA part assumes charge of input and output image using video encoder and decoder, image classification and image memory control.
Wavelet-based Image Denoising with Optimal Filter
Lee, Yong-Hwan ; Rhee, Sang-Burm ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 32~35
DOI : 10.3745/JIPS.2005.1.1.032
Image denoising is basic work for image processing, analysis and computer vision. This paper proposes a novel algorithm based on wavelet threshold for image denoising, which is combined with the linear CLS (Constrained Least Squares) filtering and thresholding methods in the transform domain. We demonstrated through simulations with images contaminated by white Gaussian noise that our scheme exhibits better performance in both PSNR (Peak Signal-to-Noise Ratio) and visual effect.
Simulation of the Digital Image Processing Algorithm for the Coating Thickness Automatic Measurement of the TRISO-coated Fuel Particle
Kim, Woong-Ki ; Lee, Young-Woo ; Ra, Sung-Woong ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 36~40
DOI : 10.3745/JIPS.2005.1.1.036
TRISO (Tri-Isotropic)-coated fuel particle is widely applied due to its higher stability at high temperature and its efficient retention capability for fission products in the HTGR (high temperature gas-cooled reactor), one of the highly efficient Generation IV reactors. The typical ball-type TRISO-coated fuel particle with a diameter of about 1 mm is composed of a nuclear fuel particle as a kernel and of outer coating layers. The coating layers consist of a buffer PyC, inner PyC, SiC, and outer PyC layer. In this study, a digital image processing algorithm is proposed to automatically measure the thickness of the coating layers. An FBP (filtered backprojection) algorithm was applied to reconstruct the CT image using virtual X-ray radiographic images for a simulated TRISO-coated fuel particle. The automatic measurement algorithm was developed to measure the coating thickness for the reconstructed image with noises. The boundary lines were automatically detected, then the coating thickness was circularly by the algorithm. The simulation result showed that the measurement error rate was less than 1.4%.
PC-KIMMO-based Description of Mongolian Morphology
Jaimai, Purev ; Zundui, Tsolmon ; Chagnaa, Altangerel ; Ock, Cheol-Young ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 41~48
DOI : 10.3745/JIPS.2005.1.1.041
This paper presents the development of a morphological processor for the Mongolian language, based on the two-level morphological model which was introduced by Koskenniemi. The aim of the study is to provide Mongolian syntactic parsers with more effective information on word structure of Mongolian words. First hand written rules that are the core of this model are compiled into finite-state transducers by a rule tool. Output of the compiler was edited to clarity by hand whenever necessary. The rules file and lexicon presented in the paper describe the morphology of Mongolian nouns, adjectives and verbs. Although the rules illustrated are not sufficient for accounting all the processes of Mongolian lexical phonology, other necessary rules can be easily added when new words are supplemented to the lexicon file. The theoretical consideration of the paper is concluded in representation of the morphological phenomena of Mongolian by the general, language-independent framework of the two-level morphological model.
A Cluster-Based Energy-Efficient Routing Protocol without Location Information for Sensor Networks
Lee, Gil-Jae ; Kong, Jong-Uk ; Lee, Min-Sun ; Byeon, Ok-Hwan ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 49~54
DOI : 10.3745/JIPS.2005.1.1.049
With the recent advances in Micro Electro Mechanical System (MEMS) technology, low cost and low power consumption wireless micro sensor nodes have become available. However, energy-efficient routing is one of the most important key technologies in wireless sensor networks as sensor nodes are highly energy-constrained. Therefore, many researchers have proposed routing protocols for sensor networks, especially cluster-based routing protocols, which have many advantages such as reduced control messages, bandwidth re-usability, and improved power control. Some protocols use information on the locations of sensor nodes to construct clusters efficiently. However, it is rare that all sensor nodes know their positions. In this article, we propose another cluster-based routing protocol for sensor networks. This protocol does not use information concerning the locations of sensor nodes, but uses the remaining energy of sensor networks and the desirable number of cluster heads according to the circumstances of the sensor networks. From performance simulation, we found that the proposed protocol shows better performance than the low-energy adaptive clustering hierarchy (LEACH).
Performance Analysis of the Distributed Location Management Scheme in Large Mobile Networks
Lee, Dong-Chun ; Kim, Hong-Jin ; Lee, Jong-Chan ; Lin, Yi-Bing ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 55~61
DOI : 10.3745/JIPS.2005.1.1.055
In this paper we propose a distributed location management scheme to reduce the bottleneck problem of HLR in Large Mobile Networks (LMN). Using analytical modeling and numerical simulation, we show that replicating location information is both appropriate and efficient for small mobile networks. Then, we extend the scheme in a hierarchical environment to reduce the overhead traffic and scale to LMN. In numerical results, we show the superiority of our scheme compared to the current IS-95 standard scheme in IMT-2000 networks.
A Performance Analysis Model of PC-based Software Router Supporting IPv6-IPv4 Translation for Residential Gateway
Seo, Ssang-Hee ; Kong, In-Yeup ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 62~69
DOI : 10.3745/JIPS.2005.1.1.062
This paper presents a queuing analysis model of a PC-based software router supporting IPv6-IPv4 translation for residential gateway. The proposed models are M/G/1/K or MMPP-2/G/1/K by arrival process of the software PC router. M/G/1/K is a model of normal traffic and MMPP-2/G/1/K is a model of burst traffic. In M/G/1/K, the arriving process is assumed to be a Poisson process, which is independent and identically distributed. In MMPP-2/G/1/K, the arriving process is assumed to be two-state Markov Modulated Poisson Process (MMPP) which is changed from one state to another state with intensity. The service time distribution is general distribution and the service discipline of the server is processor sharing. Also, the total number of packets that can be processed at one time is limited to K. We obtain performance metrics of PC-based software router for residential gateway such as system sojourn time blocking probability and throughput based on the proposed model. Compared to other models, our model is simpler and it is easier to estimate model parameters. Validation results show that the model estimates the performance of the target system.
The Comparison of RBS and TDP for the Sensor Networks Synchronization
Lee, Hyo-Jung ; Kim, Byung-Chul ; Kwon, Young-Mi ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 70~74
DOI : 10.3745/JIPS.2005.1.1.070
Sensor networks have emerged as an interesting and important research area in the last few years. These networks require that time be synchronized more precisely than in traditional Internet applications. In this paper, we compared and analyzed the performance of the RBS and TDP mechanisms in the view of the number of generated messages and the synchronization accuracy. The reason that we chose be RBS ad the TDP mechanism to be compared is because the RES is an innovative method to achieve the high accurate synchronization. And TDP is a new method taking over the NTP method which has been used widely in the Internet. We simulated the performance of two methods assuming the IEEE 802.11 CSMA/CA MAC. As for the number of nodes in the sensor networks, two situations of 25 (for the small size network) and 100 (for the large size network) nodes are used. In the aspect of the number of messages generated for the synchronization, TDP is far better than RBS. But, the synchronization accuracy of RBS is far higher than that of TDP. We cm conclude that in a small size sensor networks requiring very high accuracy, such as an application of very high speed objects tracking in a confined space, the RBS is more proper than TDP even though the RBS may generate more traffic than TDP. But, in a wide range sensor networks with a large number of nodes, TDP is more realistic though the accuracy is somewhat worse than RBS because RBS may make so many synchronization messages, and then consume more energies at each node. So, two mechanisms may be used selectively according to the required environments, without saying that the one method is always better than the other.
The Plan and Tools for Vulnerability Testing in Information Software-Based System
Kim, In-Jung ; Lee, Young-Gyo ; Won, Dong-Ho ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 75~78
DOI : 10.3745/JIPS.2005.1.1.075
Although many tests for stabilization of the software have been done, vulnerability test for a system run by combination of the software of various products has not been conducted enough. This has led to increased threats and vulnerability of system. Especially, web-based software system, which is public, has inherent possibility of exposure to attacks and is likely to be seriously damaged by an accident. Consequently, comprehensive and systematic test plans and techniques are required. Moreover, it is necessary to establish a procedure for managing and handling the results of vulnerability test. This paper proposes vulnerability test plans and designs for implementing automated tools, both of which can be complied with on web-based software systems.
Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation
Eom, Jung-Ho ; Park, Seon-Ho ; Kim, Tae-Kyung ; Chung, Tai-Myoung ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 79~85
DOI : 10.3745/JIPS.2005.1.1.079
In this paper, we dealt with substantial asset analysis methodology applied to two-dimensional asset classification and qualitative evaluation method according to the business process. Most of the existent risk analysis methodology and tools presented classification by asset type and physical evaluation by a quantitative method. We focused our research on qualitative evaluation with 2-dimensional asset classification. It converts from quantitative asset value with purchase cost, recovery and exchange cost, etc. to qualitative evaluation considering specific factors related to the business process. In the first phase, we classified the IT assets into tangible and intangible assets, including human and information data asset, and evaluated their value. Then, we converted the quantitative asset value to the qualitative asset value using a conversion standard table. In the second phase, we reclassified the assets using 2-dimensional classification factors reflecting the business process, and applied weight to the first evaluation results. This method is to consider the organization characteristics, IT asset structure scheme and business process. Therefore, we can evaluate the concrete and substantial asset value corresponding to the organization business process, even if they are the same asset type.
Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services
Moon, Ki-Young ; Park, Nam-Je ; Chung, Kyo-Il ; Sohn, Sung-Won ; Ryou, Jae-Cheol ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 86~95
DOI : 10.3745/JIPS.2005.1.1.086
Location-based services or LBS refer to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless Internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless Internet, the LBS have reconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. However, there are fears that this new wealth of personal location information will lead to new security risks, to the invasion of the privacy of people and organizations. This paper describes a novel security approach on open LBS service to validate certificate based on current LBS platform environment using XKMS (XML Key Management Specification) and SAML (Security Assertion Markup Language), XACML (extensible Access Control Markup Language) in XML security mechanism.
A Study on RFID System with Secure Service Availability for Ubiquitous Computing
Seo, Dae-Hee ; Lee, Im-Yeong ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 96~101
DOI : 10.3745/JIPS.2005.1.1.096
Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper`s suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.
A Statistic Correlation Analysis Algorithm Between Land Surface Temperature and Vegetation Index
Kim, Hyung-Moo ; Kim, Beob-Kyun ; You, Kang-Soo ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 102~106
DOI : 10.3745/JIPS.2005.1.1.102
As long as the effective contributions of satellite images in the continuous monitoring of the wide area and long range of time period, Landsat TM and Landsat ETM+ satellite images are surveyed. After quantization and classification of the deviations between TM and ETM+ images based on approved thresholds such as gains and biases or offsets, a correlation analysis method for the compared calibration is suggested in this paper. Four time points of raster data for 15 years of the highest group of land surface temperature and the lowest group of vegetation of the Kunsan city Chollabuk_do Korea located beneath the Yellow sea coast, are observed and analyzed their correlations for the change detection of urban land cover. This experiment based on proposed algorithm detected strong and proportional correlation relationship between the highest group of land surface temperature and the lowest group of vegetation index which exceeded R
Prototyping a Student Model for Educational Games
Choi, Young-Mee ; Choo, Moon-Won ; Chin, Seong-Ah ;
Journal of Information Processing Systems, volume 1, issue 1, 2005, Pages 107~111
DOI : 10.3745/JIPS.2005.1.1.107
When a pedagogical agent system aims to provide students with interactive help, it needs to know what knowledge the student has and what goals the student is currently trying to achieve. That is, it must do both assessment and plan recognition. These modeling tasks involve a high level of uncertainty when students are allowed to follow various lines of reasoning and are not required to show all their reasoning explicitly. In this paper, the student model for interactive edutainment applications is proposed. This model is based on Bayesian Networks to expose constructs and parameters of rules and propositions pertaining to game and problem solving activities. This student model could be utilized as the emotion generation model for student and agent as well.