Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Information Processing Systems
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Young-Sik Jeong / Mohammad S. Obaidat
Volume & Issues
Volume 6, Issue 4 - Dec 2010
Volume 6, Issue 3 - Sep 2010
Volume 6, Issue 2 - Jun 2010
Volume 6, Issue 1 - Mar 2010
Selecting the target year
Challenges to Next Generation Services in IP Multimedia Subsystem
Chang, Kai-Di ; Chen, Chi-Yuan ; Chen, Jiann-Liang ; Chao, Han-Chieh ;
Journal of Information Processing Systems, volume 6, issue 2, 2010, Pages 129~146
DOI : 10.3745/JIPS.2010.6.2.129
The trend of Next Generation Networks' (NGN) evolution is towards providing multiple and multimedia services to users through ubiquitous networks. The aim of IP Multimedia Subsystem (IMS) is to integrate mobile communication networks and computer networks. The IMS plays an important role in NGN services, which can be achieved by heterogeneous networks and different access technologies. IMS can be used to manage all service related issues such as Quality of Service (QoS), Charging, Access Control, User and Services Management. Nowadays, internet technology is changing with each passing day. New technologies yield new impact to IMS. In this paper, we perform a survey of IMS and discuss the different impacts of new technologies on IMS such as P2P, SCIM, Web Service and its security issues.
A Fine-grained Localization Scheme Using A Mobile Beacon Node for Wireless Sensor Networks
Liu, Kezhong ; Xiong, Ji ;
Journal of Information Processing Systems, volume 6, issue 2, 2010, Pages 147~162
DOI : 10.3745/JIPS.2010.6.2.147
In this paper, we present a fine-grained localization algorithm for wireless sensor networks using a mobile beacon node. The algorithm is based on distance measurement using RSSI. The beacon node is equipped with a GPS sender and RF (radio frequency) transmitter. Each stationary sensor node is equipped with a RF. The beacon node periodically broadcasts its location information, and stationary sensor nodes perceive their positions as beacon points. A sensor node's location is computed by measuring the distance to the beacon point using RSSI. Our proposed localization scheme is evaluated using OPNET 8.1 and compared with Ssu's and Yu's localization schemes. The results show that our localization scheme outperforms the other two schemes in terms of energy efficiency (overhead) and accuracy.
IMTAR: Incremental Mining of General Temporal Association Rules
Dafa-Alla, Anour F.A. ; Shon, Ho-Sun ; Saeed, Khalid E.K. ; Piao, Minghao ; Yun, Un-Il ; Cheoi, Kyung-Joo ; Ryu, Keun-Ho ;
Journal of Information Processing Systems, volume 6, issue 2, 2010, Pages 163~176
DOI : 10.3745/JIPS.2010.6.2.163
Nowadays due to the rapid advances in the field of information systems, transactional databases are being updated regularly and/or periodically. The knowledge discovered from these databases has to be maintained, and an incremental updating technique needs to be developed for maintaining the discovered association rules from these databases. The concept of Temporal Association Rules has been introduced to solve the problem of handling time series by including time expressions into association rules. In this paper we introduce a novel algorithm for Incremental Mining of General Temporal Association Rules (IMTAR) using an extended TFP-tree. The main benefits introduced by our algorithm are that it offers significant advantages in terms of storage and running time and it can handle the problem of mining general temporal association rules in incremental databases by building TFP-trees incrementally. It can be utilized and applied to real life application domains. We demonstrate our algorithm and its advantages in this paper.
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Sharif, Lukman ; Ahmed, Munir ;
Journal of Information Processing Systems, volume 6, issue 2, 2010, Pages 177~184
DOI : 10.3745/JIPS.2010.6.2.177
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs and present a major challenge when designing robust security mechanisms for WSNs. In this paper, we examine some of the most common routing attacks in WSNs. In particular, we focus on the wormhole routing attack in some detail. A variety of countermeasures have been proposed in the literature for such attacks. However, most of these countermeasures suffer from flaws that essentially render them ineffective for use in large scale WSN deployments. Due to the inherent constraints found in WSNs, there is a need for lightweight and robust security mechanisms. The examination of the wormhole routing attack and some of the proposed countermeasures makes it evident that it is extremely difficult to retrofit existing protocols with defenses against routing attacks. It is suggested that one of the ways to approach this rich field of research problems in WSNs could be to carefully design new routing protocols in which attacks such as wormholes can be rendered meaningless.
Development of Personal Information Protection Model using a Mobile Agent
Bae, Seong-Hee ; Kim, Jae-Joon ;
Journal of Information Processing Systems, volume 6, issue 2, 2010, Pages 185~196
DOI : 10.3745/JIPS.2010.6.2.185
This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.
Incremental Model-based Test Suite Reduction with Formal Concept Analysis
Ng, Pin ; Fung, Richard Y.K. ; Kong, Ray W.M. ;
Journal of Information Processing Systems, volume 6, issue 2, 2010, Pages 197~208
DOI : 10.3745/JIPS.2010.6.2.197
Test scenarios can be derived based on some system models for requirements validation purposes. Model-based test suite reduction aims to provide a smaller set of test scenarios which can preserve the original test coverage with respect to some testing criteria. We are proposing to apply Formal Concept Analysis (FCA) in analyzing the association between a set of test scenarios and a set of transitions specified in a state machine model. By utilizing the properties of concept lattice, we are able to determine incrementally a minimal set of test scenarios with adequate test coverage.
Fast Fuzzy Control of Warranty Claims System
Lee, Sang-Hyun ; Cho, Sung-Eui ; Moon, Kyung-Li ;
Journal of Information Processing Systems, volume 6, issue 2, 2010, Pages 209~218
DOI : 10.3745/JIPS.2010.6.2.209
Classical warranty plans require crisp data obtained from strictly controlled reliability tests. However, in a real situation these requirements might not be fulfilled. In an extreme case, the warranty claims data come from users whose reports are expressed in a vague way. Furthermore, there are special situations where several characteristics are used together as criteria for judging the warranty eligibility of a failed product. This paper suggests a fast reasoning model based on fuzzy logic to handle multi-attribute and vague warranty data.
Developing Digital Games through Software Reuse
Neto, Beatriz ; Fernandes, Lucia ; Werner, Claudia ; De Souza, Jano Moreira ;
Journal of Information Processing Systems, volume 6, issue 2, 2010, Pages 219~234
DOI : 10.3745/JIPS.2010.6.2.219
Gaming is an old humans' habit. Games help in logical development and encourage learning of theoretical and practical concepts. Besides they offer entertainment and challenge. The advent of the personal computer changed this tradition. Every year new challenges arise in a digital format, which lead the young and adults to spend hours in front of a computer or TV screen in an attempt to overcome hurdles and reach an objective. Quality, sophistication, and constant innovation are attained through complex computer software that almost has an obligation to improve as each new title is released, due to this game development becomes a challenge. Considering that a game title is software and thus faces the same restrictions of business applications, this article intends to analyze, under the optics of reuse, if game development resorts to reuse, and where and how this happens.
A Regression Test Selection and Prioritization Technique
Malhotra, Ruchika ; Kaur, Arvinder ; Singh, Yogesh ;
Journal of Information Processing Systems, volume 6, issue 2, 2010, Pages 235~252
DOI : 10.3745/JIPS.2010.6.2.235
Regression testing is a very costly process performed primarily as a software maintenance activity. It is the process of retesting the modified parts of the software and ensuring that no new errors have been introduced into previously tested source code due to these modifications. A regression test selection technique selects an appropriate number of test cases from a test suite that might expose a fault in the modified program. In this paper, we propose both a regression test selection and prioritization technique. We implemented our regression test selection technique and demonstrated in two case studies that our technique is effective regarding selecting and prioritizing test cases. The results show that our technique may significantly reduce the number of test cases and thus the cost and resources for performing regression testing on modified software.
A License Audit Model for Secure DRM Systems in IP-based Environments
Jang, Ui-Jin ; Lim, Hyung-Min ; Shin, Yong-Tae ;
Journal of Information Processing Systems, volume 6, issue 2, 2010, Pages 253~260
DOI : 10.3745/JIPS.2010.6.2.253
Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by consumers who legally buy content, and damages provider contents through the indiscriminate distribution and use of illegal contents. The DRM system that emerged to solve this problem cannot protect licenses stored on communication devices, and manage licenses by redistribution. This paper proposes a license audit model, which checks for illegal access, modification and redistribution, and reports alert logs to the server.
Recognition of Human Facial Expression in a Video Image using the Active Appearance Model
Jo, Gyeong-Sic ; Kim, Yong-Guk ;
Journal of Information Processing Systems, volume 6, issue 2, 2010, Pages 261~268
DOI : 10.3745/JIPS.2010.6.2.261
Tracking human facial expression within a video image has many useful applications, such as surveillance and teleconferencing, etc. Initially, the Active Appearance Model (AAM) was proposed for facial recognition; however, it turns out that the AAM has many advantages as regards continuous facial expression recognition. We have implemented a continuous facial expression recognition system using the AAM. In this study, we adopt an independent AAM using the Inverse Compositional Image Alignment method. The system was evaluated using the standard Cohn-Kanade facial expression database, the results of which show that it could have numerous potential applications.