Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Information Processing Systems
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Young-Sik Jeong / Mohammad S. Obaidat
Volume & Issues
Volume 9, Issue 4 - Dec 2013
Volume 9, Issue 3 - Sep 2013
Volume 9, Issue 2 - Jun 2013
Volume 9, Issue 1 - Mar 2013
Selecting the target year
The Confinement Problem: 40 Years Later
Crowell, Alex ; Ng, Beng Heng ; Fernandes, Earlence ; Prakash, Atul ;
Journal of Information Processing Systems, volume 9, issue 2, 2013, Pages 189~204
DOI : 10.3745/JIPS.2013.9.2.189
The confinement problem was first noted four decades ago. Since then, a huge amount of efforts have been spent on defining and mitigating the problem. The evolution of technologies from traditional operating systems to mobile and cloud computing brings about new security challenges. It is perhaps timely that we review the work that has been done. We discuss the foundational principles from classical works, as well as the efforts towards solving the confinement problem in three domains: operating systems, mobile computing, and cloud computing. While common issues exist across all three domains, unique challenges arise for each of them, which we discuss.
An Analysis of Replication Enhancement for a High Availability Cluster
Park, Sehoon ; Jung, Im Y. ; Eom, Heonsang ; Yeom, Heon Y. ;
Journal of Information Processing Systems, volume 9, issue 2, 2013, Pages 205~216
DOI : 10.3745/JIPS.2013.9.2.205
In this paper, we analyze a technique for building a high-availability (HA) cluster system. We propose what we have termed the `Selective Replication Manager (SRM),` which improves the throughput performance and reduces the latency of disk devices by means of a Distributed Replicated Block Device (DRBD), which is integrated in the recent Linux Kernel (version 2.6.33 or higher) and that still provides HA and failover capabilities. The proposed technique can be applied to any disk replication and database system with little customization and with a reasonably low performance overhead. We demonstrate that this approach using SRM increases the disk replication speed and reduces latency by 17% and 7%, respectively, as compared to the existing DRBD solution. This approach represents a good effort to increase HA with a minimum amount of risk and cost in terms of commodity hardware.
An Improved Approach to Ranking Web Documents
Gupta, Pooja ; Singh, Sandeep K. ; Yadav, Divakar ; Sharma, A.K. ;
Journal of Information Processing Systems, volume 9, issue 2, 2013, Pages 217~236
DOI : 10.3745/JIPS.2013.9.2.217
Ranking thousands of web documents so that they are matched in response to a user query is really a challenging task. For this purpose, search engines use different ranking mechanisms on apparently related resultant web documents to decide the order in which documents should be displayed. Existing ranking mechanisms decide on the order of a web page based on the amount and popularity of the links pointed to and emerging from it. Sometime search engines result in placing less relevant documents in the top positions in response to a user query. There is a strong need to improve the ranking strategy. In this paper, a novel ranking mechanism is being proposed to rank the web documents that consider both the HTML structure of a page and the contextual senses of keywords that are present within it and its back-links. The approach has been tested on data sets of URLs and on their back-links in relation to different topics. The experimental result shows that the overall search results, in response to user queries, are improved. The ordering of the links that have been obtained is compared with the ordering that has been done by using the page rank score. The results obtained thereafter shows that the proposed mechanism contextually puts more related web pages in the top order, as compared to the page rank score.
A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance
Lee, Hoo-Rock ; Chung, Kyung-Yul ; Jhang, Kyoung-Son ;
Journal of Information Processing Systems, volume 9, issue 2, 2013, Pages 237~246
DOI : 10.3745/JIPS.2013.9.2.237
Maintenance Access Hatches are used to ensure urban safety and aesthetics while facilitating the management of power lines, telecommunication lines, and gas pipes. Such facilities necessitate affordable and effective surveillance. In this paper, we propose a FiCHS (Fixed Cluster head centralized Hierarchical Static clustering) routing protocol that is suitable for underground maintenance hatches using WSN (Wireless Sensor Network) technology. FiCHS is compared with three other protocols, LEACH, LEACH-C, and a simplified LEACH, based on an ns-2 simulation. FiCHS was observed to exhibit the highest levels of power and data transfer efficiency.
A Secure Network for Mobile Wireless Service
Peng, Kun ;
Journal of Information Processing Systems, volume 9, issue 2, 2013, Pages 247~258
DOI : 10.3745/JIPS.2013.9.2.247
A new secure network communication technique that has been designed for mobile wireless services, is presented in this paper. Its network services are mobile, distributed, seamless, and secure. We focus on the security of the scheme and achieve anonymity and reliability by using cryptographic techniques like blind signature and the electronic coin. The question we address in this paper is, "What is the best way to protect the privacy and anonymity of users of mobile wireless networks, especially in practical applications like e-commerce?" The new scheme is a flexible solution that answers this question. It efficiently protects user`s privacy and anonymity in mobile wireless networks and supports various applications. It is employed to implement a secure e-auction as an example, in order to show its advantages in practical network applications.
An Integrated Neural Network Model for Domain Action Determination in Goal-Oriented Dialogues
Lee, Hyunjung ; Kim, Harksoo ; Seo, Jungyun ;
Journal of Information Processing Systems, volume 9, issue 2, 2013, Pages 259~270
DOI : 10.3745/JIPS.2013.9.2.259
A speaker`s intentions can be represented by domain actions (domain-independent speech act and domain-dependent concept sequence pairs). Therefore, it is essential that domain actions be determined when implementing dialogue systems because a dialogue system should determine users` intentions from their utterances and should create counterpart intentions to the users` intentions. In this paper, a neural network model is proposed for classifying a user`s domain actions and planning a system`s domain actions. An integrated neural network model is proposed for simultaneously determining user and system domain actions using the same framework. The proposed model performed better than previous non-integrated models in an experiment using a goal-oriented dialogue corpus. This result shows that the proposed integration method contributes to improving domain action determination performance.
Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption
Verma, Om Prakash ; Nizam, Munazza ; Ahmad, Musheer ;
Journal of Information Processing Systems, volume 9, issue 2, 2013, Pages 271~286
DOI : 10.3745/JIPS.2013.9.2.271
Recently, a pixel-chaotic-shuffling (PCS) method has been proposed by Huang et al. for encrypting color images using multiple chaotic systems like the Henon, the Lorenz, the Chua, and the Rossler systems. All of which have great encryption performance. The authors claimed that their pixel-chaotic-shuffle (PCS) encryption method has high confidential security. However, the security analysis of the PCS method against the chosen-plaintext attack (CPA) and known-plaintext attack (KPA) performed by Solak et al. successfully breaks the PCS encryption scheme without knowing the secret key. In this paper we present an improved shuffling pattern for the plaintext image bits to make the cryptosystem proposed by Huang et al. resistant to chosen-plaintext attack and known-plaintext attack. The modifications in the existing PCS encryption method are proposed to improve its security performance against the potential attacks described above. The Number of Pixel Change Rate (NPCR), Unified Average Changed Intensity (UACI), information entropy, and correlation coefficient analysis are performed to evaluate the statistical performance of the modified PCS method. The simulation analysis reveals that the modified PCS method has better statistical features and is more resistant to attacks than Huang et al.`s PCS method.
A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage
Lee, Sun-Ho ; Lee, Im-Yeong ;
Journal of Information Processing Systems, volume 9, issue 2, 2013, Pages 287~300
DOI : 10.3745/JIPS.2013.9.2.287
Cloud storage is provided as a service in order to keep pace with the increasing use of digital information. It can be used to store data via networks and various devices and is easy to access. Unlike existing removable storage, many users can use cloud storage because it has no storage capacity limit and does not require a storage medium. Cloud storage reliability has become a topic of importance, as many users employ it for saving great volumes of data. For protection against unethical administrators and attackers, a variety of cryptography systems, such as searchable encryption and proxy re-encryption, are being applied to cloud storage systems. However, the existing searchable encryption technology is inconvenient to use in a cloud storage environment where users upload their data. This is because this data is shared with others, as necessary, and the users with whom the data is shared change frequently. In this paper, we propose a searchable re-encryption scheme in which a user can safely share data with others by generating a searchable encryption index and then re-encrypt it.
On the Minimization of Crosstalk Conflicts in a Destination Based Modified Omega Network
Bhardwaj, Ved Prakash ; Nitin, Nitin ;
Journal of Information Processing Systems, volume 9, issue 2, 2013, Pages 301~314
DOI : 10.3745/JIPS.2013.9.2.301
In a parallel processing system, Multi-stage Interconnection Networks (MINs) play a vital role in making the network reliable and cost effective. The MIN is an important piece of architecture for a multiprocessor system, and it has a good impact in the field of communication. Optical Multi-stage Interconnection Networks (OMINs) are the advanced version of MINs. The main problem with OMINs is crosstalk. This paper, presents the (1) Destination Based Modified Omega Network (DBMON) and the (2) Destination Based Scheduling Algorithm (DBSA). DBSA does the scheduling for a source and their corresponding destination address for messages transmission and these scheduled addresses are passed through DBMON. Furthermore, the performance of DBMON is compared with the Crosstalk-Free Modified Omega Network (CFMON). CFMON also minimizes the crosstalk in a minimum number of passes. Results show that DBMON is better than CFMON in terms of the average number of passes and execution time. DBSA can transmit all the messages in only two passes from any source to any destination, through DBMON and without crosstalk. This network is the modified form of the original omega network. Crosstalk minimization is the main objective of the proposed algorithm and proposed network.
An Improvement Video Search Method for VP-Tree by using a Trigonometric Inequality
Lee, Samuel Sangkon ; Shishibori, Masami ; Han, Chia Y. ;
Journal of Information Processing Systems, volume 9, issue 2, 2013, Pages 315~332
DOI : 10.3745/JIPS.2013.9.2.315
This paper presents an approach for improving the use of VP-tree in video indexing and searching. A vantage-point tree or VP-tree is one of the metric space-based indexing methods used in multimedia database searches and data retrieval. Instead of relying on the Euclidean distance as a measure of search space, the proposed approach focuses on the trigonometric inequality for compressing the search range, which thus, improves the search performance. A test result of using 10,000 video files shows that this method reduced the search time by 5-12%, as compared to the existing method that uses the AESA algorithm.
Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer
Hoang, Thang ; Nguyen, Thuc ; Luong, Chuyen ; Do, Son ; Choi, Deokjai ;
Journal of Information Processing Systems, volume 9, issue 2, 2013, Pages 333~348
DOI : 10.3745/JIPS.2013.9.2.333
Mobile authentication/identification has grown into a priority issue nowadays because of its existing outdated mechanisms, such as PINs or passwords. In this paper, we introduce gait recognition by using a mobile accelerometer as not only effective but also as an implicit identification model. Unlike previous works, the gait recognition only performs well with a particular mobile specification (e.g., a fixed sampling rate). Our work focuses on constructing a unique adaptive mechanism that could be independently deployed with the specification of mobile devices. To do this, the impact of the sampling rate on the preprocessing steps, such as noise elimination, data segmentation, and feature extraction, is examined in depth. Moreover, the degrees of agreement between the gait features that were extracted from two different mobiles, including both the Average Error Rate (AER) and Intra-class Correlation Coefficients (ICC), are assessed to evaluate the possibility of constructing a device-independent mechanism. We achieved the classification accuracy approximately
for both devices, which showed that it is feasible and reliable to construct adaptive cross-device gait recognition on a mobile phone.