Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Information Processing Systems
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 7, Issue 4 - Dec 2011
Volume 7, Issue 3 - Sep 2011
Volume 7, Issue 2 - Jun 2011
Volume 7, Issue 1 - Mar 2011
Selecting the target year
A Survey of RFID Deployment and Security Issues
Grover, Amit ; Berghel, Hal ;
Journal of Information Processing Systems, volume 7, issue 4, 2011, Pages 561~580
DOI : 10.3745/JIPS.2011.7.4.561
This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed specifications of RFID transponders and RFID interrogators respectively. Section 5 highlights different RFID standards and protocols and Section 6 enumerates the wide variety of applications where RFID systems are known to have made a positive improvement. Section 7 deals with privacy issues concerning the use of RFIDs and Section 8 describes common RFID system vulnerabilities. Section 9 covers a variety of RFID security issues, followed by a detailed listing of countermeasures and precautions in Section 10.
A Multi-Application Controller for SAGE-enabled Tiled Display Wall in Wide-area Distributed Computing Environments
Fujiwara, Yuki ; Date, Susumu ; Ichikawa, Kohei ; Takemura, Haruo ;
Journal of Information Processing Systems, volume 7, issue 4, 2011, Pages 581~594
DOI : 10.3745/JIPS.2011.7.4.581
Due to the recent advancement of networking and high-performance computing technologies, scientists can easily access large-scale data captured by scientific measurement devices through a network, and use huge computational power harnessed on the Internet for their analyses of scientific data. However, visualization technology, which plays a role of great importance for scientists to intuitively understand the analysis results of such scientific data, is not fully utilized so that it can seamlessly benefit from recent high-performance and networking technologies. One of such visualization technologies is SAGE (Scalable Adaptive Graphics Environment), which allows people to build an arbitrarily sized tiled display wall and is expected to be applied to scientific research. In this paper, we present a multi-application controller for SAGE, which we have developed, in the hope that it will help scientists efficiently perform scientific research requiring high-performance computing and visualization. The evaluation in this paper indicates that the efficiency of completing a comparison task among multiple data is increased by our system.
A Cascaded Fuzzy Inference System for University Non-Teaching Staff Performance Appraisal
Neogi, Amartya ; Mondal, Abhoy Chand ; Mandal, Soumitra Kumar ;
Journal of Information Processing Systems, volume 7, issue 4, 2011, Pages 595~612
DOI : 10.3745/JIPS.2011.7.4.595
Most organizations use performance appraisal system to evaluate the effectiveness and efficiency of their employees. In evaluating staff performance, performance appraisal usually involves awarding numerical values or linguistic labels to employees performance. These values and labels are used to represent each staff achievement by reasoning incorporated in the arithmetical or statistical methods. However, the staff performance appraisal may involve judgments which are based on imprecise data especially when a person (the superior) tries to interpret another person`s (his/her subordinate) performance. Thus, the scores awarded by the appraiser are only approximations. From fuzzy logic perspective, the performance of the appraisee involves the measurement of his/her ability, competence and skills, which are actually fuzzy concepts that can be captured in fuzzy terms. Accordingly, fuzzy approach can be used to handle these imprecision and uncertainty information. Therefore, the performance appraisal system can be examined using Fuzzy Logic Approach, which is carried out in the study. The study utilized a Cascaded fuzzy inference system to generate the performance qualities of some University non-teaching staff that are based on specific performance appraisal criteria.
An Efficient DVS Algorithm for Pinwheel Task Schedules
Chen, Da-Ren ; Chen, You-Shyang ;
Journal of Information Processing Systems, volume 7, issue 4, 2011, Pages 613~626
DOI : 10.3745/JIPS.2011.7.4.613
In this paper, we focus on the pinwheel task model with a variable voltage processor with d discrete voltage/speed levels. We propose an intra-task DVS algorithm, which constructs a minimum energy schedule for k tasks in O(d+k log k) time We also give an inter-task DVS algorithm with O(d+n log n) time, where n denotes the number of jobs. Previous approaches solve this problem by generating a canonical schedule beforehand and adjusting the tasks` speed in O(dn log n) or O(
) time. However, the length of a canonical schedule depends on the hyper period of those task periods and is of exponential length in general. In our approach, the tasks with arbitrary periods are first transformed into harmonic periods and then profile their key features. Afterward, an optimal discrete voltage schedule can be computed directly from those features.
Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks
Kim, Ji-In ; Koh, Seok-Joo ;
Journal of Information Processing Systems, volume 7, issue 4, 2011, Pages 627~634
DOI : 10.3745/JIPS.2011.7.4.627
This paper addresses the Proxy Mobile IPv6 (PMIP) handover using bicasting in mobile/wireless networks. The bicasting scheme can be used to support the PMIP handover, which tends to waste the network resources of wireless links and incurs data losses during handover. We propose an enhanced scheme of PMIP handover, called the partial bicasting with buffering for PMIP (PBB-PMIP). In the PBB-PMIP handover, the bicasting is performed in the "partial" region between the Local Mobility Anchor (LMA) and the Mobile Access Gateway (MAG), when a mobile node is in the handover area. The data packets are buffered at the new MAG during handover to reduce data losses and are then forwarded to mobile nodes after handover. By ns-2 simulations, the proposed PBB-PMIP scheme is compared with the existing schemes of PMIP and PMIP with bicasting. The proposed scheme can benefit from the reduction of handover delay and packet loss, and the effective use of the network resources of wireless links, as compared to the existing handover schemes.
A Model Comparison for Spatiotemporal Data in Ubiquitous Environments: A Case Study
Noh, Seo-Young ; Gadia, Shashi K. ;
Journal of Information Processing Systems, volume 7, issue 4, 2011, Pages 635~652
DOI : 10.3745/JIPS.2011.7.4.635
In ubiquitous environments, many applications need to process data with time and space dimensions. Because of this, there is growing attention not only on gathering spatiotemporal data in ubiquitous environments, but also on processing such data in databases. In order to obtain the full benefits from spatiotemporal data, we need a data model that naturally expresses the properties of spatiotemporal data. In this paper, we introduce three spatiotemporal data models extended from temporal data models. The main goal of this paper is to determine which data model is less complex in the spatiotemporal context. To this end, we compare their query languages in the complexity aspect because the complexity of a query language is tightly coupled with its underlying data model. Throughout our investigations, we show that it is important to intertwine space and time dimensions and keep one-to-one correspondence between an object in the real world and a tuple in a database in order to naturally express queries in ubiquitous applications.
Performance Evaluation of the WiMAX Network Based on Combining the 2D Markov Chain and MMPP Traffic Model
Saha, Tonmoy ; Shufean, Md. Abu ; Alam, Mahbubul ; Islam, Md. Imdadul ;
Journal of Information Processing Systems, volume 7, issue 4, 2011, Pages 653~678
DOI : 10.3745/JIPS.2011.7.4.653
WiMAX is intended for fourth generation wireless mobile communications where a group of users are provided with a connection and a fixed length queue. In present literature traffic of such network is analyzed based on the generator matrix of the Markov Arrival Process (MAP). In this paper a simple analytical technique of the two dimensional Markov chain is used to obtain the trajectory of the congestion of the network as a function of a traffic parameter. Finally, a two state phase dependent arrival process is considered to evaluate probability states. The entire analysis is kept independent of modulation and coding schemes.
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic
Islam, Md. Syeful ; Rahman, Md. Rezaur ; Roy, Anupam ; Islam, Md. Imdadul ; Amin, M.R. ;
Journal of Information Processing Systems, volume 7, issue 4, 2011, Pages 679~690
DOI : 10.3745/JIPS.2011.7.4.679
In this paper we consider a local area network (LAN) of dual mode service where one is a token bus and the other is a carrier sense multiple access with a collision detection (CSMA/CD) bus. The objective of the paper is to find the overall cell/packet dropping probability of a dual mode LAN for finite length queue M/G/1(m) traffic. Here, the offered traffic of the LAN is taken to be the equivalent carried traffic of a one-millisecond delay. The concept of a tabular solution for two-dimensional Poisson`s traffic of circuit switching is adapted here to find the cell dropping probability of the dual mode packet service. Although the work is done for the traffic of similar bandwidth, it can be extended for the case of a dissimilar bandwidth of a circuit switched network.
Gröbner Basis Attacks on Lightweight RFID Authentication Protocols
Han, Dae-Wan ;
Journal of Information Processing Systems, volume 7, issue 4, 2011, Pages 691~706
DOI : 10.3745/JIPS.2011.7.4.691
Since security and privacy problems in RFID systems have attracted much attention, numerous RFID authentication protocols have been suggested. One of the various design approaches is to use light-weight logics such as bitwise Boolean operations and addition modulo
between m-bits words. Because these operations can be implemented in a small chip area, that is the major requirement in RFID protocols, a series of protocols have been suggested conforming to this approach. In this paper, we present new attacks on these lightweight RFID authentication protocols by using the Gr
bner basis. Our attacks are superior to previous ones for the following reasons: since we do not use the specific characteristics of target protocols, they are generally applicable to various ones. Furthermore, they are so powerful that we can recover almost all secret information of the protocols. For concrete examples, we show that almost all secret variables of six RFID protocols, LMAP,
, EMAP, SASI, Lo et al.`s protocol, and Lee et al.`s protocol, can be recovered within a few seconds on a single PC.
A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource Group-based Task Scheduling
Gil, Joon-Min ; Kim, Mi-Hye ;
Journal of Information Processing Systems, volume 7, issue 4, 2011, Pages 707~716
DOI : 10.3745/JIPS.2011.7.4.707
It is important that desktop grids should be able to aggressively deal with the dynamic properties that arise from the volatility and heterogeneity of resources. Therefore, it is required that task scheduling be able to positively consider the execution behavior that is characterized by an individual resource. In this paper, we implement a log analysis system with REST web services, which can analyze the execution behavior by utilizing the actual log data of desktop grid systems. To verify the log analysis system, we conducted simulations and showed that the resource group-based task scheduling, based on the analysis of the execution behavior, offers a faster turnaround time than the existing one even if few resources are used.
Stream-based Biomedical Classification Algorithms for Analyzing Biosignals
Fong, Simon ; Hang, Yang ; Mohammed, Sabah ; Fiaidhi, Jinan ;
Journal of Information Processing Systems, volume 7, issue 4, 2011, Pages 717~732
DOI : 10.3745/JIPS.2011.7.4.717
Classification in biomedical applications is an important task that predicts or classifies an outcome based on a given set of input variables such as diagnostic tests or the symptoms of a patient. Traditionally the classification algorithms would have to digest a stationary set of historical data in order to train up a decision-tree model and the learned model could then be used for testing new samples. However, a new breed of classification called stream-based classification can handle continuous data streams, which are ever evolving, unbound, and unstructured, for instance--biosignal live feeds. These emerging algorithms can potentially be used for real-time classification over biosignal data streams like EEG and ECG, etc. This paper presents a pioneer effort that studies the feasibility of classification algorithms for analyzing biosignals in the forms of infinite data streams. First, a performance comparison is made between traditional and stream-based classification. The results show that accuracy declines intermittently for traditional classification due to the requirement of model re-learning as new data arrives. Second, we show by a simulation that biosignal data streams can be processed with a satisfactory level of performance in terms of accuracy, memory requirement, and speed, by using a collection of stream-mining algorithms called Optimized Very Fast Decision Trees. The algorithms can effectively serve as a corner-stone technology for real-time classification in future biomedical applications.