Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 11, Issue 6 - Dec 2010
Volume 11, Issue 5 - Oct 2010
Volume 11, Issue 4 - Aug 2010
Volume 11, Issue 3 - Jun 2010
Volume 11, Issue 2 - Apr 2010
Volume 11, Issue 1 - Feb 2010
Selecting the target year
A Smart Mobile Mail System Based on MPEG21-DIDL for Any Mobile Device
Zhao, Mei-Hua ; Seo, Chang-Wo ; Lim, Young-Hwan ;
Journal of Internet Computing and Services, volume 11, issue 3, 2010, Pages 1~13
As the computing power of the mobile devices is improving rapidly, many kinds of web services are also available in mobile devices just as Email service. Mobile Mail Service began early, but this service is mostly limited in some specified mobile devices such as Smart Phone. That is a limitation that users have to purchase specified phone to be benefited from Mobile Mail Service. In this thesis, it developed new kind of Mobile Mail System named Smart Mobile Mail System based MPEG21-DIDL Markup, and solved above problem. DIDL could be converted to other Markup types which are displayed in mobile devices by Mobile Gate Server. By transforming PC Web Mail contents including attachment document to DIDL Markup through Mobile Gate Server, the Mobile Mail Service could be available for all kinds of mobile device. The Smart Mobile Mail System also performs real time alarming service for new Email using Callback URL SMS. When there is new Email arriving, the Mail System sends a Call back URL SMS to user. User could directly check Email through Callback URL SMS in real time.
Web Image Classification using Semantically Related Tags and Image Content
Cho, Soo-Sun ;
Journal of Internet Computing and Services, volume 11, issue 3, 2010, Pages 15~24
In this paper, we propose an image classification which combines semantic relations of tags with contents of images to improve the satisfaction of image retrieval on application domains as huge image sharing sites. To make good use of image retrieval or classification algorithms on huge image sharing sites as Flickr, they are applicable to real tagged Web images. To classify the Web images by 'bag of visual word' based image content, our algorithm includes training the category model by utilizing the preliminary retrieved images with semantically related tags as training data and classifying the test images based on PLSA. In the experimental results on the Flickr Web images, the proposed method produced the better precision and recall rates than those from the existing method using tag information.
Improvement of Sequential Prediction Algorithm for Player's Action Prediction
Shin, Yong-Woo ; Chung, Tae-Choong ;
Journal of Internet Computing and Services, volume 11, issue 3, 2010, Pages 25~32
It takes quite amount of time to study a game because there are many game characters and different stages are exist for games. This paper used reinforcement learning algorithm for characters to learn, and so they can move intelligently. On learning early, the learning speed becomes slow. Improved sequential prediction method was used to improve the speed of learning. To compare a normal learning to an improved one, a game was created. As a result, improved character‘s ability was improved 30% on learning speed.
Analysis of Low Power and Channel Interferences for Zigbee
Kang, Min-Goo ; Shin, Ho-Jin ;
Journal of Internet Computing and Services, volume 11, issue 3, 2010, Pages 33~41
The battery consumption and the wireless communication pattern were analyzed for the low power and the improvement of channel interferences between of Zigbee networks and WPAN(Wireless Personal Area Network). The communication patterns considering end device's battery saving during channel searching period were analyzed for low power consumption topology of Zigbee dynamic ad-hoc characteristics. And, the communication patterns were analyzed due to channel interferences between WLAN and Random Back off of Zigbee, too. As a result, the communication patterns of Zigbee's coordinator and end devices is alleviated for the longer battery life time of Zigbee's end device due to Zigbee's end device setting techniques.
A Study on the Optimal Wireless Resource Allocation for the Access and Relay Zones of Downlink in a 2-hop Cellular Relay System based on IEEE802.16j
Lee, In-Hwan ; Kim, Se-Jin ; Cho, Sung-Ho ;
Journal of Internet Computing and Services, volume 11, issue 3, 2010, Pages 43~51
In this paper, we evaluate the system throughput and the method of optimal wireless resource allocation for the access zone (AZ) and relay zone (RZ) in downlink when the cell coverage is extended using the non-transparent Relay Station (RS) in a 2-hop cellular relay system based on IEEE802.16j, which uses the OFDMA-TDD structure. For the analyses, we first introduce the MAC (Media Access Control) frame structure in the non-transparent mode, then we investigate the interfering elements in both AZ and RZ for the network devices such as the Mobile Station (MS) and RS. Through computer simulation, we analyze the cell coverage extension and system throughput in terms of the distance between Base Station (BS) and RS, then we present the amount of the optimal allocation of wireless resource for the AZ and RZ in downlink using our results.
Design and Implementation of Location Based Silver Town u-Service System
Choi, Yeon-Suk ; Park, Byoung-Tae ; Choi, Yong-Ju ;
Journal of Internet Computing and Services, volume 11, issue 3, 2010, Pages 53~63
In this paper, the u-Service system that is based on location-aware technology is designed and implemented for a silver town. On the real silver town the developed system has been employed and tested to provide convenient and secure living for residents. It provides services such as emergency call, intelligent elevator operation, and hands-free door access based on the location of the residents with personal device as called smart tag. It can also be applied to other service areas such as the location-aware u-Service for hospital, high-rising complex building, APT, etc.
Balanced Clustering based on Mobile Agents for the Ubiquitous Healthcare Systems
Mateo, Romeo Mark A. ; Lee, Jae-Wan ; Lee, Mal-Rey ;
Journal of Internet Computing and Services, volume 11, issue 3, 2010, Pages 65~74
In the ubiquitous healthcare, automated diagnosis is commonly achieved by an agent system to provide intelligent decision support and fast diagnosis result. Mobile agent technology is used for efficient load distribution by migrating processes to a less loaded node which is considered in our design of a ubiquitous healthcare system. This paper presents a framework for ubiquitous healthcare technologies which mainly focuses on mobile agents that serve the on-demand processes of an automated diagnosis support system. Considering the efficient utilization of resources, a balanced clustering for the load distribution of processes within nodes is proposed. The proposed algorithm selects overloaded nodes to migrate processes to near nodes until the load variance of the system is minimized. Our proposed balanced clustering efficiently distributes processes to all nodes considering message overheads by performing the migration to the near nodes.
Weight-based Wellbeing Food Retrieval System
Pyun, Gwang-Bum ; Yun, Un-Il ; Ryu, Keun-Ho ;
Journal of Internet Computing and Services, volume 11, issue 3, 2010, Pages 75~86
As the interests in health grow higher, necessity of Well-being relation informations get more importance. We get the information of well-being, tinternet retrieval system or blog, homepage and media. Although, it is not easy to find informations of well-being food. So, retrieval system has been requiring information about well-being food. In this paper, Weight-based Wellbeing Food Retrieval System is designed and implemention. Finding numerous pages and if well-being keywords includes page, it was identified and add weight. User searching for keywords, it implement, well-being food pages comes at the first. Keywords for discrimination makes type of dictionary, so it can insert, delete, modify. Inverted files saves hasing(direct-based file). Retrieval System in this paper is experimental result, at keywords of well-being food show 5~15% imprement than another Retrieval System. In this paper, Weight-based Wellbeing Food Retrieval System's designed and proposed way to raking for well-being food.
A Study on Current State of Web Content Accessibility on General Hospital Websites in Korea
Kim, Yong-Seob ; Oh, Kun-Seok ;
Journal of Internet Computing and Services, volume 11, issue 3, 2010, Pages 87~103
In the study, we introduce the trend in domestic and foreign web accessibility, as well as the legal system that ensures web accessibility. Based on Korean Web Content Accessibility Guidelines (KWCAG)1.0, we investigated the web content accessibility of 80 tertiary health-care hospitals and general hospitals in Korea. We evaluated accessibility by combining accessibility-based criteria (ABC) with usability-based criteria (UBC). ABC was limited to an alternative text for Guideline 1, using a small number of frames and keyboard accessibility for Guideline 2. UBC checked the voice service (TTS), resizing text, providing multi-lingual websites, and disclosing web accessibility policy. KADO-WAH2.0 was used for representing the compliance rate. The evaluation result was a considerable improvement from previous results, even though the rate of compliance with web accessibility was generally insufficient. There was a significant difference between those medical centers which did and did not comply with web accessibility. Incidentally, many hospitals were found to have attempted to confront and come to terms with web accessibility. In future, the following factors are advisable for medical centers with publicity or public interest: they must employ active and aggressive promotion of establishment of independent accessibility guidelines to secure web accessibility, they should effect an improvement of the realization of web accessibility, there can be constant education and promotion, and there can be an institutional supplementation, as well as others.
Investigating the Adoption of IPTV Services Influenced by Socio-cultural Factor, Flow Experience and Perceived Behavioral Control
Lee, Bong-Gyou ; Lee, Sung-Joon ; Seoh, Hyun-Sik ; Kim, Jun-Ho ;
Journal of Internet Computing and Services, volume 11, issue 3, 2010, Pages 105~119
The purpose of this study is to examine diverse factors influencing the adoption of IPTV services and relationships among them. To achieve the purpose, this study modified and applied the established theory of the Extended Technology Acceptance Model(ETAM) incorporating socio-cultural factor, flow experience and perceived behavioral control as related constructs. The suggested model was empirically tested through the structural equation modeling approach. The results are as follows: First, the socio-cultural factor and the perceived behavioral control have significant direct influences on the adoption of IPTV services. Second, the flow experience does not have a significant indirect influence mediated by the attitude toward IPTV services. Third, the socio-cultural factor has the significant relationships with the perceived usefulness and the perceived ease of use. Finally, the flow experience was influenced by the perceived usefulness and the perceived ease of use.
Efficient Resource Recommendation System for Cloud Market Computing
Han, Seung-Min ; Huh, Eui-Nam ; Youn, Chang-Woo ;
Journal of Internet Computing and Services, volume 11, issue 3, 2010, Pages 121~129
In recent years, Cloud computing is gaining much popularity as it can efficiently utilize the computing resources and hence can contribute to the issue of green IT. So to make the Cloud services commercialized, Cloud markets are necessary and are being developed. As the increasing numbers of various Cloud services are rapidly evolving in the Cloud market, how to select the best and optimal services will be a great challenge. In this paper we present a Cloud service selection framework in the Cloud market that uses a recommender system (RS) which helps a user to select the best services from different Cloud providers (CP) that matches his/her requirements. The RS recommends a service based on the QoS and Virtual Machine (VM) factors of difference CPs. The experimental results show that our Cloud service recommender system (CSRS) can effectively recommend a good combination of Cloud services to consumers.
Viewing Path Search and Congestion Control Algorithms For Comfortable Museum Viewing
Seo, Yoon-Deuk ; Ahn, Jin-Ho ;
Journal of Internet Computing and Services, volume 11, issue 3, 2010, Pages 131~137
Today, many museums are changing their forms with ubiquitous environment. Unlike traditional museums providing only static text-based information attached to its corresponding artifacts to visitors, those ubiquitous museums provide not only artifacts' text information, but also many different forms of information such as sound or media through personal digital assistance or cell phones. However, these existing ubiquitous museums still provide each visitor only with artifact-centric information in very simple ways. Also this disadvantageous feature causes high gallery congestion problem resulting from providing a uniform path for every visitor. These limitations may be the biggest barrier to providing more various and useful information about artifacts to visitors through considering each visitor's preference. This paper propose a new optimal viewing path search algorithm to provide comfortable museum viewing for each visitor according to its preference. Also, a new congestion control method is developed to protect visitors from being put in some hot spots on their museum viewing, improving its comfort to a maximum.
A Strong Anonymity Scheme for Wireless Sensor Networks
Lee, Jung-Hyun ; Kim, Tae-Yeon ; Cho, Gi-Hwan ;
Journal of Internet Computing and Services, volume 11, issue 3, 2010, Pages 139~148
In the sensor network security area, previous works were mainly concentrated on achieving authentication, confidentiality, integrity and availability. But the ID exposure issue is recently an increasing concern in research community. To protect the ID exposure from various attacks, the most common approach is to make use of a dynamic pseudonym rather than the real ID. However, if a node's secret key (or hash key) and the current pseudonym (such as a random number) are exposed, the attacker can easily generate the previous/next pseudonyms. In this paper, we propose a security infra-structure scheme for enabling strong anonymity of sensor nodes. Our scheme ensures that the probability being able to generate a pseudonym is very low even if a sensor node has been compromised with an attacker. Security analyses have proven that our scheme is suitable for sensor network environments in terms of preserving of forward anonymity as well as backward anonymity.