Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Information Processing Systems
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 6, Issue 4 - Dec 2010
Volume 6, Issue 3 - Sep 2010
Volume 6, Issue 2 - Jun 2010
Volume 6, Issue 1 - Mar 2010
Selecting the target year
TOSS: Telecom Operations Support Systems for Broadband Services
Chen, Yuan-Kai ; Hsu, Chang-Ping ; Hu, Chung-Hua ; Lin, Rong-Syh ; Lin, Yi-Bing ; Lyu, Jian-Zhi ; Wu, Wudy ; Young, Hey-Chyi ;
Journal of Information Processing Systems, volume 6, issue 1, 2010, Pages 1~20
DOI : 10.3745/JIPS.2010.6.1.001
Due to the convergence of voice, data, and video, today`s telecom operators are facing the complexity of service and network management to offer differentiated value-added services that meet customer expectations. Without the operations support of well-developed Business Support System/Operations Support System (BSS/OSS), it is difficult to timely and effectively provide competitive services upon customer request. In this paper, a suite of NGOSS-based Telecom OSS (TOSS) is developed for the support of fulfillment and assurance operations of telecom services and IT services. Four OSS groups, TOSS-P (intelligent service provisioning), TOSS-N (integrated large-scale network management), TOSS-T (trouble handling and resolution), and TOSS-Q (end-to-end service quality management), are organized and integrated following the standard telecom operation processes (i.e., eTOM). We use IPTV and IP-VPN operation scenarios to show how these OSS groups co-work to support daily business operations with the benefits of cost reduction and revenue acceleration.
A Hybrid Approach for Regression Testing in Interprocedural Program
Singh, Yogesh ; Kaur, Arvinder ; Suri, Bharti ;
Journal of Information Processing Systems, volume 6, issue 1, 2010, Pages 21~32
DOI : 10.3745/JIPS.2010.6.1.021
Software maintenance is one of the major activities of the software development life cycle. Due to the time and cost constraint it is not possible to perform exhaustive regression testing. Thus, there is a need for a technique that selects and prioritizes the effective and important test cases so that the testing effort is reduced. In an analogous study we have proposed a new variable based algorithm that works on variables using the hybrid technique. However, in the real world the programs consist of multiple modules. Hence, in this work we propose a regression testing algorithm that works on interprocedural programs. In order to validate and analyze this technique we have used various programs. The result shows that the performance and accuracy of this technique is very high.
GML Map Visualization on Mobile Devices
Song, Eun-Ha ; Jeong, Young-Sik ;
Journal of Information Processing Systems, volume 6, issue 1, 2010, Pages 33~42
DOI : 10.3745/JIPS.2010.6.1.033
GIS can only be applied to certain areas by storing format. It is subordinate to a system when displaying geographic information data. It is therefore inevitable for GIS to use GML that supports efficient usage of various geographic information data and interoperability for integration and sharing. The paper constructs VisualGML that translates currently-used geographic information such as DXF (Drawing Exchange Format), DWG (DraWinG), or SHP (Shapefile) into GML format for visualization. VisualGML constructs an integrated map pre-process module, which filters geographic information data according to its tag and properties, to provide the flexibility of a mobile device. VisualGML also provides two major GIS services for the user and administrator. It can enable visualizing location search. This is applied with a 3-Layer POI structure for the user. It has trace monitoring visualization through moving information of mobile devices for the administrator.
Cryptanalysis on a Three Party Key Exchange Protocol-STPKE`
Tallapally, Shirisha ; Padmavathy, R. ;
Journal of Information Processing Systems, volume 6, issue 1, 2010, Pages 43~52
DOI : 10.3745/JIPS.2010.6.1.043
In the secure communication areas, three-party authenticated key exchange protocol is an important cryptographic technique. In this protocol, two clients will share a human-memorable password with a trusted server, in which two users can generate a secure session key. On the other hand the protocol should resist all types of password guessing attacks. Recently, STPKE` protocol has been proposed by Kim and Choi. An undetectable online password guessing attack on STPKE` protocol is presented in the current study. An alternative protocol to overcome undetectable online password guessing attacks is proposed. The results show that the proposed protocol can resist undetectable online password guessing attacks. Additionally, it achieves the same security level with reduced random numbers and without XOR operations. The computational efficiency is improved by
30% for problems of size
2048 bits. The proposed protocol is achieving better performance efficiency and withstands password guessing attacks. The results show that the proposed protocol is secure, efficient and practical.
A Hexagon Tessellation Approach for the Transmission Energy Efficiency in Underwater Wireless Sensor Networks
Kim, Sung-Un ; Cheon, Hyun-Soo ; Seo, Sang-Bo ; Song, Seung-Mi ; Park, Seon-Yeong ;
Journal of Information Processing Systems, volume 6, issue 1, 2010, Pages 53~66
DOI : 10.3745/JIPS.2010.6.1.053
The energy efficiency is a key design issue to improve the lifetime of the underwater sensor networks (UWSN) consisting of sensor nodes equipped with a small battery of limited energy resource. In this paper, we apply a hexagon tessellation with an ideal cell size to deploy the underwater sensor nodes for two-dimensional UWSN. Upon this setting, we propose an enhanced hybrid transmission method that forwards data packets in a mixed transmission way based on location dependent direct transmitting or uniform multi-hop forwarding. In order to select direct transmitting or uniform multi-hop forwarding, the proposed method applies the threshold annulus that is defined as the distance between the cluster head node and the base station (BS). Our simulation results show that the proposed method enhances the energy efficiency compared with the existing multi-hop forwarding methods and hybrid transmission methods
Approximate Clustering on Data Streams Using Discrete Cosine Transform
Yu, Feng ; Oyana, Damalie ; Hou, Wen-Chi ; Wainer, Michael ;
Journal of Information Processing Systems, volume 6, issue 1, 2010, Pages 67~78
DOI : 10.3745/JIPS.2010.6.1.067
In this study, a clustering algorithm that uses DCT transformed data is presented. The algorithm is a grid density-based clustering algorithm that can identify clusters of arbitrary shape. Streaming data are transformed and reconstructed as needed for clustering. Experimental results show that DCT is able to approximate a data distribution efficiently using only a small number of coefficients and preserve the clusters well. The grid based clustering algorithm works well with DCT transformed data, demonstrating the viability of DCT for data stream clustering applications.
Mining Frequent Itemsets with Normalized Weight in Continuous Data Streams
Kim, Young-Hee ; Kim, Won-Young ; Kim, Ung-Mo ;
Journal of Information Processing Systems, volume 6, issue 1, 2010, Pages 79~90
DOI : 10.3745/JIPS.2010.6.1.079
A data stream is a massive unbounded sequence of data elements continuously generated at a rapid rate. The continuous characteristic of streaming data necessitates the use of algorithms that require only one scan over the stream for knowledge discovery. Data mining over data streams should support the flexible trade-off between processing time and mining accuracy. In many application areas, mining frequent itemsets has been suggested to find important frequent itemsets by considering the weight of itemsets. In this paper, we present an efficient algorithm WSFI (Weighted Support Frequent Itemsets)-Mine with normalized weight over data streams. Moreover, we propose a novel tree structure, called the Weighted Support FP-Tree (WSFP-Tree), that stores compressed crucial information about frequent itemsets. Empirical results show that our algorithm outperforms comparative algorithms under the windowed streaming model.
The ISDF Framework: Towards Secure Software Development
Alkussayer, Abdulaziz ; Allen, William H. ;
Journal of Information Processing Systems, volume 6, issue 1, 2010, Pages 91~106
DOI : 10.3745/JIPS.2010.6.1.091
The rapid growth of communication and globalization has changed the software engineering process. Security has become a crucial component of any software system. However, software developers often lack the knowledge and skills needed to develop secure software. Clearly, the creation of secure software requires more than simply mandating the use of a secure software development lifecycle; the components produced by each stage of the lifecycle must be correctly implemented for the resulting system to achieve its intended goals. This study demonstrates that a more effective approach to the development of secure software can result from the integration of carefully selected security patterns into appropriate stages of the software development lifecycle to ensure that security designs are correctly implemented. The goal of this study is to provide developers with an Integrated Security Development Framework (ISDF) that can assist them in building more secure software.
IPv4 Address Trading Using Resource Certificate
Park, Cheol-Soon ; Ryou, Jae-Cheol ; Park, Yong-Tae ;
Journal of Information Processing Systems, volume 6, issue 1, 2010, Pages 107~120
DOI : 10.3745/JIPS.2010.6.1.107
The Internet has been growing at unprecedented rates. The problem of an address shortage could act as a barrier on this growth. In principle, a new Internet standard, IPv6 solves the problem of the address shortage because it has a very large address space. But IPv6 is not yet compatible with the IPv4 and during the IPv4-to-IPv6 transition period IPv4 address will continue to be in demand. Thus for quite some time, the problem of IP address shortage will persist. To solve the problem, we propose the mechanism of secure IP address trading. This mechanism is based on the Resource PKI (RPKI). The RPKI is the working item of IETF. This proposed mechanism maximizes the trust of IP address trading using RPKI.
Strategic Information Systems Alignment: Alignment of IS/IT with Business Strategy
Issa-Salwe, Abdisalam ; Ahmed, Munir ; Aloufi, Khalid ; Kabir, Muhammad ;
Journal of Information Processing Systems, volume 6, issue 1, 2010, Pages 121~128
DOI : 10.3745/JIPS.2010.6.1.121
Using information systems effectively requires an understanding of the organisation, management, and the technology shaping the systems. All information systems can be described as organisational and management solutions to challenges posed by the environment. The advances in information systems have affect on our day-to day lives. As the technology is evolving immensely so are the opportunities in a healthy way to prepare the organisation in the competitive advantage environment In order to manage the IS/IT based systems, it is important to have an appropriate strategy that defines the systems and provide means to manage them. Strategic Information Systems Alignment (SISA) is an effective way of developing and maintaining the IS/IT systems that support the business operations. Alignment of the IS/IT plans and the business plans is essential for improved business performance, this research looks at the key features of SISA in the changing business circumstances in Saudi Arabia.