Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 11, Issue 6 - Dec 2010
Volume 11, Issue 5 - Oct 2010
Volume 11, Issue 4 - Aug 2010
Volume 11, Issue 3 - Jun 2010
Volume 11, Issue 2 - Apr 2010
Volume 11, Issue 1 - Feb 2010
Selecting the target year
Design of a Context-aware System for Safety at Smart Home and Analysis of Network Traffics
Sung, Yoon-Young ; Woo, Hyun-Je ; Lee, Mee-Jeong ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 1~15
The damage of safety accidents at home can be minimized by preventing accidents in advance as well as by coping with the accidents promptly through the help of safety management system. In this paper, we identify several services to prevent and cope with the accidents that may occur at home by leveraging sensors and wireless network technology available at home network environments. In order to provide these services, we propose a context-aware system for safety management at home. The proposed system awares the dangerous situations through the information collected by the sensors in home network environment. The proposed system tries to not only prevent the accidents but also to cope with the situations using the information of rescue targets and the location where the accident occurs. We evaluate the appropriateness of sensors by implementing the proposed environments. Through OPNET simulation experiments, we also measure the amount of network traffic in order to confirm that the bandwidth of IEEE 802.15.4 is enough for the proposed system. Finally, we determine more appropriate wireless data transmission mechanism with respect to the end-to-end delay and battery consumption for the proposed system.
Reliable Data Transfer using Path-Reliability and Implicit ACK on Wireless Sensor Network
Lee, Ga-Won ; Lee, Jun-Hyuk ; Huh, Eui-Nam ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 17~30
Many applications in Wireless Sensor Networks require collecting all data without loss from nodes. End-to-End data retransmission, which is used in the Internet for reliable transport, becomes very inefficient in Wireless Sensor Networks, since wireless communication, and constrained resources pose new challenges. We look at factors affecting reliability, and search for efficient combinations of the possible options. This paper proposes an efficient Overhearing based reliable transfer protocol in Wireless Sensor Networks by introducing Selective and implicit Acknowledgement. Finally, it is clarified that the proposed scheme is efficient for reliable data transfer in WSN.
A study of Service Component Based on Active Model Support Healthcare Application Service in u-Environment
Jeong, Chang-Won ; Joo, Su-Chong ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 31~40
In this paper, we propose a service component based on active model for supporting a variety of u-healthcare application services. It implemented that component as a classification of function for developing healthcare application services. Especially we focus on the adaptive information service in integrated environment using a distributed object technologies of the various healthcare home service based on distributed object group framework. And we shows the service component applying to Healthcare application services such as healthcare home monitoring, mobile monitoring and web based monitoring. Also, we show the performance evaluation results such as response time, system load and network load.
Device Adapter Model based on Dynamic Management Module for u-Health gateway
Kim, Jong-Tak ; Song, Si-Yun ; Hwang, Hee-Jeong ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 41~48
It is essential to guarantee a smooth communication and data exchange in a PHD(Personal Healthcare Device) network for applications providing U-health services. In spite of that, most of PHDs are heterogeneous, so the heterogeneity of their protocols makes it difficult to develop an integrated gateway sending sensed healthcare data to U-health service providers. To solve this problem, we suggest the design and implementation of a device adapter model based on dynamic managed module in this paper. Our model were implemented to work on the OSGi-based gateway middleware and to have interoperability in connection with the HL7 system that is the standard of the Healthcare Information systems. In addition, our model has an architecture supporting a communication based on the object serialization in order to provide extensibility in the functional aspect of applications. Through the experiment on a test-bed which is an implementation of the device adapter module for electrocardiogram and blood-pressure/blood-sugar device having one channel, we have confirmed the accuracy of sensing and sending data.
A Diamond Web-grid Search Algorithm Combined with Efficient Stationary Block Skip Method for H.264/AVC Motion Estimation
Jeong, Chang-Uk ; Choi, Jin-Ku ; Ikenaga, Takeshi ; Goto, Satoshi ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 49~60
H.264/AVC offers a better encoding efficiency than conventional video standards by adopting many new encoding techniques. However, the advanced coding techniques also add to the overall complexity for H.264/AVC encoder. Accordingly, it is necessary to perform optimization to alleviate the level of complexity for the video encoder. The amount of computation for motion estimation is of particular importance. In this paper, we propose a diamond web-grid search algorithm combined with efficient stationary block skip method which employs full diamond and dodecagon search patterns, and the variable thresholds are used for performing an effective skip of stationary blocks. The experimental results indicate that the proposed technique reduces the computations of the unsymmetrical-cross multi-hexagon-grid search algorithm by up to 12% while maintaining a similar PSNR performance.
An Improvement for Location Accuracy Algorithm of Moving Indoor Objects
Kim, Mi-Kyeong ; Jeon, Hyeon-Sig ; Yeom, Jin-Young ; Park, Hyun-Ju ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 61~72
This paper addresses the problem of moving object localization using Ultra-Wide-Band(UWB) range measurement and the method of location accuracy improvement of the indoor moving object. Unlike outdoor environment, it is difficult to track moving object position due to various noises in indoor. UWB is a radio technology that has attention for localization applications recently. UWB's ranging technique offer the cm accuracy. Its capabilities for data transmission, range accurate estimation and material penetration are suitable technology for indoor positioning application. This paper propose a positioning algorithm of an moving object using UWB ranging technique and particle filter. Existing positioning algorithms eliminate estimation errors and bias after location estimation of mobile object. But in this paper, the proposed algorithm is that eliminate predictable UWB range distance error first and then estimate the moving object's position. This paper shows that the proposed positioning algorithm is more accurate than existing location algorithms through experiments. In this study, the position of moving object is estimated after the triangulation and eliminating the bias and the ranging error from estimation range between three fixed known anchors and a mobile object using UWB. Finally, a particle filter is used to improve on accuracy of mobile object positioning. The results of experiment show that the proposed localization scheme is more precise under the indoor.
Secure Knowledge Management for Prevent illegal data leakage by Internal users
Seo, Dae-Hee ; Baek, Jang-Mi ; Lee, Min-Kyung ; Yoon, Mi-Yeon ; Cho, Dong-Sub ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 73~84
Rapid development of Internet has increased users' desire for more information, and as a result, it created 'deluge of information', generating so much information. Especially, profit-pursuing corporations have done a lot of research to secure its own technological power. However, damages caused by illegal copy of information by illegal outside users or insiders are coming to the fore as social problem. Therefore, this paper is to propose secure knowledge management system to prevent illegal copy of data by insiders. The proposed scheme is a secure knowledge management system that carries out explicit authentication for internal users using 2MAC and provides data based on the authentication, thereby preventing illegal copy of data by insiders.
Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks
Lee, Hyung-Woo ; Kim, Tae-Su ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 85~98
An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhancing its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. Therefore, advanced traceback and network management mechanism also should be necessary on All-IP network environments against DDoS attacks. In this study, we studied and proposed a new IP traceback mechanism on All-IP network environments based on existing SPIE and Sinkhole routing model when diverse DDoS attacks would be happen. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Proposed mechanism uses simplified and optimized memory for storing and memorizing the packet's hash value on bloom filter, with which we can find and determine the attacker's real location on open network. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the traceback performance also can be enhanced compared with previously suggested mechanism.
A Study on Blind Watermarking Technique of Digital Image using 2-Dimensional Empirical Mode Decomposition in Wavelet Domain
Lee, Young-Seock ; Kim, Jong-Weon ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 99~107
In this paper a blind watermarking algorithm for digital image is presented. The proposed method operates in wavelet domain. The watermark is decomposed into 2D-IMFs using BEMD which is the 2-dimensional extension of 1 dimensional empirical mode decomposition. The CDMA based on SS technique is applied to watermark embedding and detection process. In the watermark embedding process, each IMF of watermark is embedded into middle frequency subimages in wavelet domain, so subimages just include partial information about embedded watermark. By characteristics of BEMD, when the partial information of watermark is synthesized, the original watermark is reconstructed. The experimental results show that the proposed watermarking algorithm is imperceptible and moreover is robust against JPEG compression, common image processing distortions.
Influence Factors of Effectively Executing NCW by User's Point of View
Ou, Won-Suk ; Chae, Myung-Sin ; Yeum, Dae-Sung ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 109~127
The Network Centric Warfare(NCW) is based on the linkage of forces by network to employ them as they are centralized, even though they are scattered. Also it can be used to overcome spatiotemporal obstacles. Under the concept of NCW, cognitive and social areas are getting more weight than information technology and physical ones. In this study we tried to investigate the affecting factors to execute NCW effectively by user's point of view to place the focus on cognitive and social aspects. We obtained some affirmative results that affect to conduct NCW in Korea. The advanced western NCW can be applicable in theoretically in Korea, however to employ NCW more effectively we need Korean style NCW which portrays the Korean realities and circumstances.
Symptom Pattern Classification using Neural Networks in the Ubiquitous Healthcare Environment with Missing Values
Salvo, Michael Angelo G. ; Lee, Jae-Wan ; Lee, Mal-Rey ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 129~142
The ubiquitous healthcare environment is one of the systems that benefit from wireless sensor network. But one of the challenges with wireless sensor network is its high loss rates when transmitting data. Data from the biosensors may not reach the base stations which can result in missing values. This paper proposes the Health Monitor Agent (HMA) to gather data from the base stations, predict missing values, classify symptom patterns into medical conditions, and take appropriate action in case of emergency. This agent is applied in the Ubiquitous Healthcare Environment and uses data from the biosensors and from the patient’s medical history as symptom patterns to recognize medical conditions. In the event of missing data, the HMA uses a predictive algorithm to fill missing values in the symptom patterns before classification. Simulation results show that the predictive algorithm using the HMA makes classification of the symptom patterns more accurate than other methods.
Performance improvement for Streaming of High Capacity Panoramic Video
Kim, Young-Back ; Kim, Tae-Ho ; Lee, Dae-Gyu ; Kim, Jae-Joon ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 143~153
When providing high quality panoramic video across the Internet, mobile communications, and broadcasting areas, it requires a suitable video codec that satisfies both high-compression efficiency and random access functionality. The users must have high-compression efficiency in order to enable video streaming of high-volume panoramic data. Random access allows the user to move the viewpoint and direction freely. In this paper, we propose the parallel processing scheme under cell units in order to improve the performance of streaming service for large screen panoramic video in 10Mbps bandwidths based on H.264/AVC with high compression rate. This improved algorithm divides a screen composed of cells less than
in size, encodes it, and decodes it with the cells in the present view. At this point, encoding/decoding is parallel processed by the present cell units. Also, since the cells only included in the present view are packed and transmitted, the possible processing of not extricating blocks is proven by experiment.
Effects of Formal and Informal Control Combination on Information Systems Outsourcing Consequence: Based on IT Governance Perspectives
Lee, Jong-Man ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 155~164
The purpose of this paper is to propose critical success factors for effectively managing information systems(IS) outsourcing. The survey method was used for this paper, and data from a total 106 companies that were listed greater than $10 million were used for the analysis. To analyze the data, structural equation model was used. The results of this empirical study is summarized as follows. First, both formal control based on contract and informal control based on trust have a positive effect on control level which is a determinant indicator of IS outsourcing performance. Second, management capability such as preparedness capability and relationship capability have a positive effect on formal and informal control mechanism. The findings have important implications for the role of trust and management capability in formal management control.
Construction of Tailored Learning Contents by Learner's Level using LCMS
Jeong, Hwa-Young ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 165~172
In Web-based learning systems, the techniques, as self-regulated learning, self-directed learning, are used to improve the effect of learner's study. These techniques are methods considering learner's study level but to consider the learner's study ability properly, the tailored course for learner should be applied. In this research, the learning system considering learner's study ability was proposed. To decide a learner's study ability, IRT(Item Response Theory) was applied and learning contents and question items were developed and applied by the degree of difficulty.
Applying the Identical Content to Various Types of Mobile Devices Using the Image Map Method
Zhao, Mei-Hua ; Seo, Chang-Woo ; Ko, Hee-Ae ; Lim, Young-Hwan ;
Journal of Internet Computing and Services, volume 11, issue 2, 2010, Pages 173~184
The advancement of ubiquitous networks facilitates and increases access to the Internet via mobile devices, which offers the advantages of enhanced mobility and accessibility. While Mobile Internet is largely free of temporal and spatial restrictions, producing content for mobile websites is a challenging work due to the existence of multiple device types and markup languages. This paper proposes a technique that makes use of image maps to improve the visual consistency of mobile web content displayed on a variety of mobile devices. The proposed image map method captures several objects comprising the webpage into a single image, and provides the image in Mobile Web services. Mobile devices employing the proposed method can reorganize webpages with multiple objects more easily and obtain the visually identical content on their screen.