Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 10, Issue 6 - Dec 2009
Volume 10, Issue 5 - Oct 2009
Volume 10, Issue 4 - Aug 2009
Volume 10, Issue 3 - Jun 2009
Volume 10, Issue 2 - Apr 2009
Volume 10, Issue 1 - Feb 2009
Selecting the target year
Energy-Efficient Index Scheme in Mobile P2P Environments
Park, Kwang-Jin ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 1~6
In this paper, we propose an energy efficient index scheme for Nearest Neighbor queries, specially designed for mobile P2P environments. we propose a PMBR (P2P Minimum Boundary Rectangle) index that provides the client with the ability of selective contacting and tuning from other nodes. The mobile client is able to identify whether or not the neighbor nodes have the desired information by accessing PMBR. Thus, the client immediately switches to change to another node's broadcast channel if the index does not contain the desired information. Furthermore, the client is able to predict the arrival time of the desired data items and only needs to tune into the broadcast channel when the requested data items arrives, by first accessing PMBR. Thus, the mobile client can stay in power save mode most of time, and tune into the broadcast channel only when the requested data items arrive. Experiments are conducted to evaluate the performance of the proposed scheme. Comprehensive experiments illustrate that the proposed scheme is more efficient than the previous techniques in terms of energy consumption.
Design and Implementation of a Virtual MCU Based on SystemC to Provide the Implementation Environment of MAC Layer Software
Jeong, Yoo-Jin ; Park, Soo-Jin ; Lee, Ho-Eung ; Park, Hyun-Ju ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 7~17
The development of wireless communication MAC layer is usually released as SoC which is a combination in hardware and software. In this system development environment, an environment for software development and verification is necessary because the hardware development takes a lot of time priori to completion. In integrated development of hardware and software, simulation environment of hardware and software provided by hardware modeling using HDL at RTL and ISS respectively. By increasing the development complexity of system, ESL design modeling systems at higher abstraction level than RTL has already prompted. The ESL design is divided untime model and time model. This paper present design and implementation of MCU for untime model simulation, not time model. Proposed MCU can optimize the system at early step of system development and move up the development completion time by verifying the system function easily and rapidly than part required exact time in untime model. In this paper, we present an MCU module based on SystemC and UC/OS-II Module providing real-time operate system.
A New Constant Modulus Algorithm based on Minimum Euclidian Distance Criterion for Blind Channel Equalization
Kim, Nam-Yong ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 19~26
In this paper, a minimum Euclidian distance criterion between error PDF and Dirac delta function is introduced and a constant modulus type blind equalizer algorithm based on the criterion is proposed. The proposed algorithm using constant modulus error in place of actual error term of the criterion has superior convergence and steady state MSE performance, and the error signal of the proposed algorithm exhibits more concentrated density function in blind equalization environments. Simulation results indicate that the proposed method can be a reliable candidate for blind equalizer algorithms for multipoint communications.
Design and Implementation of Visual/Control Communication Protocol for Home Automated Robot Interaction and Control
Cho, Myung-Ji ; Kim, Seong-Whan ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 27~36
PSTN (public switched telephone network) provides voice communication service, whereas IP network provides data oriented service, and we can use IP network for multimedia transport service (e.g. voice over IP service) with economic price. In this paper, we propose RoIP (robot on IP) service scenario, signaling call flow, and implementation to provide home automation and monitoring service for remote site users. In our scheme, we used a extended SIP (session initiation protocol) for signaling protocol between remote site users and home robots. For our bearer transport control, we implemented H.263 video codec over RTP (real-time transport protocol) and additionally DTMF (dual tone multi-frequency) transport for robot actuator control. We implemented our scheme on home robots and experimented with KTF operator network, and it shows good communication quality (average MOS = 9.15) and flexible robot controls.
Design and Implementation of Global State Management for Sensor Networks
Lee, Keun-Soo ; Kim, Jun-Yeong ; Cho, Ki-Ho ; Kim, Doo-Hyun ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 37~50
In this paper, we proposed a mechanism for effective cooperation in sensor network. There are a few mechanism like RBS, TPSN, FPSN for sensor network. However these are supporting synchronization among nodes without global state. Therefore, we proposed SGSM(Simple Global State Management) to maintain global state among sensor nodes. As experimental results, we confirmed loss rate is within 1% as maintaining global state with SGSM mechanism. In this paper, we defined global state in sensor network and introduced SGSM for improving timming accuracy in sensor environment.
The Sequential Effects of WebCam Wireless Moritoring Service on Customer Loyalty
Ryu, In-Soo ; Chae, Myung-Sin ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 51~79
Today the service industry is growing, and differentiated services for marketing and service quality is emerging as a serious problem. Until now, the WebCam is used for observation, and the negative aspects, such as from a human rights issue has become. Discipline and Punish is not to use a webcam to customer satisfaction research is needed. Therefore, wireless monitoring in WebCam service quality of the service reconfiguration and service quality factors for the configuration of the customer's preference regarding how research was recognized. Configuration of the service quality factors WebCam service customer satisfaction and customer loyalty was to identify factors that affect. These services to study the correlation between the quality variables WebCam provides wireless monitoring services for the preschool and children, a survey of the house. Configuring a wireless monitoring service quality in order to research the factors WebCam video quality and transmission speed, mobility and portability, convenience, visibility, reliability, and the interaction of the castle set. Severely and video quality and transmission speed, visibility, reliability, customer satisfaction, the interaction factors are said. Inclination to participate in social issues, innovation, digital devices that use a skilled, depending on the difference in the service quality has been confirmed. However, the age and quality of service awareness and job types showed a low correlation, and the marketing of these results will be discussed and how that can be used.
A Robust Collaborative Filtering against Manipulated Ratings
Kim, Heung-Nam ; Ha, In-Ay ; Jo, Geun-Sik ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 81~98
Collaborative filtering, one of the most successful technologies among recommender systems, is a system assisting users in easily finding the useful information and supporting the decision making. However, despite of its success and popularity, one notable issue is incredibility of recommendations by unreliable users called shilling attacks. To deal with this problem, in this paper, we analyze the type of shilling attacks and propose a unique method of building a model for protecting the recommender system against manipulated ratings. In addition, we present a method of applying the model to collaborative filtering which is highly robust and stable to shilling attacks.
Image Segmentation Algorithm Based on Geometric Information of Circular Shape Object
Eun, Sung-Jong ; WhangBo, Taeg-Keun ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 99~111
The result of Image segmentation, an indispensable process in image processing, significantly affects the analysis of an image. Despite the significance of image segmentation, it produces some problems when the variation of pixel values is large, or the boundary between background and an object is not clear. Also, these problems occur frequently when many objects in an image are placed very close by. In this paper, when the shape of objects in an image is circular, we proposed an algorithm which segment an each object in an image using the geometric characteristic of circular shape. The proposed algorithm is composed of 4 steps. First is the boundary edge extraction of whole object. Second step is to find the candidate points for further segmentation using the boundary edge in the first step. Calculating the representative circles using the candidate points is the third step. Final step is to draw the line connecting the overlapped points produced by the several erosions and dilations of the representative circles. To verify the efficiency of the proposed algorithm, the algorithm is compared with the three well-known cell segmentation algorithms. Comparison is conducted by the number of segmented region and the correctness of the inner segment line. As the result, the proposed algorithm is better than the well-known algorithms in both the number of segmented region and the correctness of the inner segment line by 16.7% and 21.8%, respectively.
Query-by-emotion sketch for local emotion-based image retrieval
Lee, Kyoung-Mi ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 113~121
In order to retrieve images with different emotions in regions of the images, this paper proposes the image retrieval system using emotion sketch. The proposed retrieval system divides an image into
sub-regions and extracts emotion features in each sub-region. In order to extract the emotion features, this paper uses emotion colors on 160 emotion words from H. Nagumo's color scheme imaging chart. We calculate a histogram of each sub-region and consider one emotion word having the maximal value as a representative emotion word of the sub-region. The system demonstrates the effectiveness of the proposed emotion sketch and our experimental results show that the system successfully retrieves on the Corel image database.
A Study on the Presence Classified by Dimensions through Character Agents on E-Learning
Kweon, Sang-Hee ; Cho, Eun-Joung ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 123~143
This study examined factors of presence using the experimental method. The design of this study was to analyze presence through the dimensions of character agents(text, voice, 2D, 3D, reality character dimension and gender) for e-learning platforms that used new technology-based content. There were 232 experimental participants in the study. This study was designed to measure their cognitive awareness of presence by agent dimensions in the first level to measure the presence level in the types of users. The results showed that there were significant correlation between types of users and presence. However there were no statistically significant results on dimensions. In addition, there were significant differences on character gender, voice or non-voice, text or non-text and character dimensions.
The Design of a Context-Aware Workflow Language for Supporting Multiple Workflows
Choi, Jong-Sun ; Cho, Yong-Yun ; Choi, Jae-Young ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 145~157
In recent years, there have been several researches applying workflow technologies for service automation on ubiquitous computing environments. However, most context-aware workflow languages have difficulties in supporting composite workflows composed of single workflows, because these languages are still in its early stage and they only provide single workflow services to their users. This paper introduces CAWL, which is a context-aware workflow language. CAWL is for describing individual service workflows to make integrated service workflows. By using CAWL, service developers are able to reuse existing workflows to develop new context-aware workflow services. Therefore, development efforts and time can be saved and workflow resusability also increased. CAWL is expected to make it easy to develop applications related to context-aware workflow services on ubiquitous computing environments.
A Study on the Design and Development of Robot Game-based Project for Teaching Children to Program Computers
Shin, Seung-Young ; You, Sang-Mi ; Kim, Mi-Ryang ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 159~171
The objective of this research is to explore a method to utilize a programmable robot, as a potential learning tool in the elementary school's curricula. Due to their programmability and operational ease of use, programmable robots are among digital toys that today offer specially instructive features. In this research, we developed the robot game-based project contents as a tool for teaching the elementary school children to learn the algorithm, the essential part of computer programming. The LEGO material, selected as the construction kit for robot, consists of a mechanical assembly system, a set of sensors and actuators, a central control unit, a programming environment. The project requires the children to complete 3 separate tasks, each of which is developed based on the principles of algorithm. The classroom feedback supports that the robotic experiences provided the children with fun and absorption. It is likely that implementing learning with robot in regular classroom in elementary school can bring new possibilities to the educational system, provided that a thorough preparation backs up the plan.
Design and Performance Analysis of Signature-Based Hybrid Spill-Tree for Indexing High Dimensional Vector Data
Lee, Hyun-Jo ; Hong, Seung-Tae ; Na, So-Ra ; Jang, You-Jin ; Chang, Jae-Woo ; Shim, Choon-Bo ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 173~189
Recently, video data has attracted many interest. That is the reason why efficient indexing schemes are required to support the content-based retrieval of video data. But most indexing schemes are not suitable for indexing a high-dimensional data except Hybrid Spill-Tree. In this paper, we propose an efficient high-dimensional indexing scheme to support the content-based retrieval of video data. For this, we extend Hybrid Spill-Tree by using a newly designed clustering technique and by adopting a signature method. Finally, we show that proposed signature-based high dimensional indexing scheme achieves better retrieval performance than existing M-Tree and Hybrid Spill-Tree.
A Test Framework for Dynamically Supporting the Simulation Works of the Global Navigation Satellite Systems
Kuk, Seung-Hak ; Kim, Hyeon-Soo ; Lee, Sang-Uk ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 191~203
Simulation is the work that identifies the characteristics of some problem through the simulated experiments. During the experiments it is frequently required to change or replace the simulation models, algorithms, or input/output data. Especially, in the case of the simulation works performed by replacing algorithms, if a replaceable component that implements a specific algorithm is not correct with respect to its functionality it is very difficult to carry out the simulation works successfully. In this paper, we suggest a test framework that verifies functional correctness of the replaceable component in the software-based GNSS (Global Navigation Satellite System) simulation environments. When a component is replaced, this framework enables us to properly execute the functional test for the component according to its context.
Design and Implementation of a Very Large-Scale Workflow Management System
Ahn, Hyung-Jin ; Kim, Kwang-Hoon ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 205~217
Recently, many organizations such as companies or institutions have demanded induction of very large-scale workflow management system in order to process a large number of business-instances. Workflow vendors have focused on physical extension of workflow engines based on device-level clustering, so as to provide very large-scale workflow services. Performance improvement of workflow engine by simple physical-connection among computer systems which don't consider logical-level software architecture leads to wastes of time or cost for construction of very large-scale workflow service environment. In this paper, we propose workcase-based workflow architecture and implement a very large-scale workflow management system based on the architecture. We prove that software architectures to be applied on a workflow engine have an effect on scalability and performance through workcase response-time evaluation of our proposed system.
A Study of Selective Encryption for Images using Tree Structures
Han, Myung-Mook ; Kim, Geum-Sil ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 219~228
The increased popularity of multimedia applications places a great demand on efficient data storage and transmission techniques. Some methods have been proposed to combine compression and encryption together to reduce the overall processing time, but they are either insecure or intensive computationally. specially, they are unsuitable to wireless communication of mobile device. We propose a novel solution called partial encryption, We introduce quadtree and zerotree wavelet image compression in this paper, it reduces computation for date transmission in mobile device, and does not reduce the compression rate. In conclusion, the proposed partial encryption schemes are fast, secure, and do not reduce the compression performance of underlying compression algorithm.
A Remote Authentication Protocol Using Smartcard to Guarantee User Anonymity
Baek, Yi-Roo ; Gil, Kwang-Eun ; Ha, Jae-Cheol ;
Journal of Internet Computing and Services, volume 10, issue 6, 2009, Pages 229~239
To solve user authentication problem, many remote user authentication schemes using password and smart card at the same time have been proposed. Due to the increasing of interest in personal privacy, there were some recent researches to provide user anonymity. In 2004, Das et al. firstly proposed an authentication scheme that guarantees user anonymity using a dynamic ID. In 2005, Chien et al. pointed out that Das et al.'s scheme has a vulnerability for guaranteing user anonymity and proposed an improved scheme. However their authentication scheme was found some weaknesses about insider attack, DoS attack, and restricted replay attack. In this paper, we propose an enhanced scheme which can remove vulnerabilities of Chien et al.'s scheme. The proposed authentication protocol prevented insider attack by using user's Nonce value and removed the restricted replay attack by replacing time stamp with random number. Furthermore, we improved computational efficiency by eliminating the exponentiation operation.