Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 11, Issue 6 - Dec 2010
Volume 11, Issue 5 - Oct 2010
Volume 11, Issue 4 - Aug 2010
Volume 11, Issue 3 - Jun 2010
Volume 11, Issue 2 - Apr 2010
Volume 11, Issue 1 - Feb 2010
Selecting the target year
Personalization of LBS using Recommender Systems Based on Collaborative Filtering
Kwon, Hyeong-Joon ; Hong, Kwang-Seok ;
Journal of Internet Computing and Services, volume 11, issue 6, 2010, Pages 1~11
While a supply of GPS-enabled smartphone is increased, LBS which is studied and developed for special function is changed to personal solution. In this paper, we propose and implement on personalized method of individual LBS using collaborative filtering-based recommend system. Proposed personalized LBS system recommends contents which is expected to be interest for individual user, by predicting location-based contents within a user's setting radius. To evaluate performance of proposed system, we observed prediction accuracy with various experimental condition using our prototype. As a result, we confirmed that the convergence of collaborative filtering and LBS is effective for personalized LBS.
Features Extraction for Classifying Parkinson's Disease Based on Gait Analysis
Lee, Sang-Hong ; Lim, Joon-S. ; Shin, Dong-Kun ;
Journal of Internet Computing and Services, volume 11, issue 6, 2010, Pages 13~20
This paper presents a measure to classify healthy persons and Parkinson disease patients from the foot pressure of healthy persons and that of Parkinson disease patients using gait analysis based characteristics extraction and Neural Network with Weighted Fuzzy Membership Functions (NEWFM). To extract the inputs to be used in NEWFM, in the first step, the foot pressure data provided by the PhysioBank and changes in foot pressure over time were used to extract four characteristics respectively. In the second step, wavelet coefficients were extracted from the eight characteristics extracted from the previous stage using the wavelet transform (WT). In the final step, 40 inputs were extracted from the extracted wavelet coefficients using statistical methods including the frequency distribution of signals and the amount of variability in the frequency distribution. NEWFM showed high accuracy in the case of the characteristics obtained using differences between the left foot pressure and the right food pressure and in the case of the characteristics obtained using differences in changes in foot pressure over time when healthy persons and Parkinson disease patients were classified by extracting eight characteristics from foot pressure data. Based on these results, the fact that differences between the left and right foot pressures of Parkinson disease patients who show a characteristic of dragging their feet in gaits were relatively smaller than those of healthy persons could be identified through this experiment.
A Speaker Detection System based on Stereo Vision and Audio
An, Jun-Ho ; Hong, Kwang-Seok ;
Journal of Internet Computing and Services, volume 11, issue 6, 2010, Pages 21~29
In this paper, we propose the system which detects the speaker, who is speaking currently, among a number of users. A proposed speaker detection system based on stereo vision and audio is mainly composed of the followings: a position estimation of speaker candidates using stereo camara and microphone, a current speaker detection, and a speaker information acquisition based on a mobile device. We use the haar-like features and the adaboost algorithm to detect the faces of speaker candidates with stereo camera, and the position of speaker candidates is estimated by a triangulation method. Next, the Time Delay Of Arrival (TDOA) is estimated by the Cross Power Spectrum Phase (CPSP) analysis to find the direction of source with two microphone. Finally we acquire the information of the speaker including his position, voice, and face by comparing the information of the stereo camera with that of two microphone. Furthermore, the proposed system includes a TCP client/server connection method for mobile service.
Fast Hough circle detection using motion in video frames
Won, Hye-Min ; Lee, Kyoung-Mi ;
Journal of Internet Computing and Services, volume 11, issue 6, 2010, Pages 31~39
The Generalized Hough Transform(GHT) is the most used algorithm for circle detection with high accuracy. However, it requires many computation time, because many different templates are applied in order to find circles of various size. In the case of circle detection and tracking in video, the classical approach applies GHT for each frame in video and thus needs much high processing time for all frames. This paper proposes the fast GHT algorithm in video, using two consecutive frames are similar. In the proposed algorithm, a change-driven method conducts GHT only when two consecutive frames have many changes, and trajectory-based method does GHT in candidate areas and with candidate radius using circles detected in a previous frame. The algorithm can reduce computation time by reducing the number of frames, the edge count, and the number of searching circles, as factors which affects the speed of GHT. Our experimental results show that the algorithm successfully detects circles with less processing time and no loss of accuracy in video acquisited by a fixed camera and a moving camera.
An Augmented Memory System using Associated Words and Social Network Service
Kim, Tai-Wan ; Park, Bum-Jun ; Park, Tae-Keun ;
Journal of Internet Computing and Services, volume 11, issue 6, 2010, Pages 41~50
As time goes by, most of information escapes human being's memory even though he/she tries hard to remember the information. On the other hand, when a human being takes a look at an image, he/she recollects once forgotten past memories and relates a specific object in the photo with associated words, which trigger new memories. Beside, he/she feels the affection of that time by the recalled memory. Therefore, this paper proposes an augmented memory system that assists recollection of user's past memories by using the images in social network services and user's dictionary for associated words. In the proposed system, if a user selects an object in an image, words associated with the object is provided to the user. If the user selects one of the associated words, the proposed system offers the list of other images containing the object of the selected word. The repetition of the aforementioned process can make the user recollect his/her memory and stimulate his/her affection. It is expected that the proposed system will be useful for revitalizing social network services.
A Method to improve DMB program list generation time by extending UAI of the FIC
Choi, In-Hwa ; Hwang, Jun ;
Journal of Internet Computing and Services, volume 11, issue 6, 2010, Pages 51~59
As more and more people are interest in mobile broadcasting, they want to use many kinds of mobile contents. On that account, DMB standard has been developed in Korea. Users can use various contents, because DMB System based on DAB System can provide not only audio service but also media service. However, as more contents increase, users will have to wait more to select Program List, which is why DMB System transports MPEG-2 TS contents by MSC. To solve this problem we propose that first we find major fields needed for generating program list, and then these fiends insert to FIC by extending UAI. We conduct some experiments to verify our proposed method is efficient. The results implies that our proposed method generate program list faster than that of previous method by 36.78%.
Enhanced Reputation-based Fusion Mechanism for Secure Distributed Spectrum Sensing in Cognitive Radio Networks
Kim, Mi-Hui ; Choo, Hyun-Seung ;
Journal of Internet Computing and Services, volume 11, issue 6, 2010, Pages 61~72
Spectrum scarcity problem and increasing spectrum demand for new wireless applications have embossed the importance of cognitive radio technology; the technology enables the sharing of channels among secondary (unlicensed) and primary (licensed) users on a non-interference basis after sensing the vacant channel. To enhance the accuracy of sensing, distributed spectrum sensing is proposed. However, it is necessary to provide the robustness against the compromised sensing nodes in the distributed spectrum sensing. RDSS, a fusion mechanism based on the reputation of sensing nodes and WSPRT (weighted sequential probability ratio test), was proposed. However, in RDSS, the execution number of WSPRT could increase according to the order of inputted sensing values, and the fast defense against the forged values is difficult. In this paper, we propose an enhanced fusion mechanism to input the sensing values in reputation order and exclude the sensing values with the high possibility to be compromised, using the trend of reputation variation. We evaluate our mechanism through simulation. The results show that our mechanism improves the robustness against attack with the smaller number of sensing values and more accurate detection ratio than RDSS.
Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data
Lee, Hyung-Woo ;
Journal of Internet Computing and Services, volume 11, issue 6, 2010, Pages 73~86
In proportion to the rapid increase in the number of Web users, web attack techniques are also getting more sophisticated. Therefore, we need not only to detect Web attack based on the log analysis but also to extract web attack events from audit information such as Web firewall, Web IDS and system logs for detecting abnormal Web behaviors. In this paper, web attack detection system was designed and implemented based on integrated web audit data for detecting diverse web attack by generating integrated log information generated from W3C form of IIS log and web firewall/IDS log. The proposed system analyzes multiple web sessions and determines its correlation between the sessions and web attack efficiently. Therefore, proposed system has advantages on extracting the latest web attack events efficiently by designing and implementing the multiple web session and log correlation analysis actively.
The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution
Choi, Cheong-Hyeon ;
Journal of Internet Computing and Services, volume 11, issue 6, 2010, Pages 87~110
Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.
Digital Convergence Teaching Strategy System using Spearman Correlation Coefficients
Lee, Byung-Wook ;
Journal of Internet Computing and Services, volume 11, issue 6, 2010, Pages 111~122
Since educating digital convergence is to unite various sciences and technologies with computer as the central figure, it has different range and methods of education. Therefore, it has problems with recommending limited conceptual information because of difficulties to standardize education plan and teaching strategies. In this paper, I propose education plan and teaching strategy system by using Spearman correlation coefficients. This system is to find a solution against disadvantage of recommending limited conceptual information by ranking relations of teaching strategies from the information based on the demand of industrial and academic fields, and then provides lists of teaching strategy information suitable for user's atmosphere and characteristics. Performance test is to compare effects of precision and recall with existing service systems. The test shows 90.4% of precision and 77.6% of recall.
An Efficient Transformation Technique from Relational Schema to Redundancy Free XML Schema
Cho, Jung-Gil ;
Journal of Internet Computing and Services, volume 11, issue 6, 2010, Pages 123~133
XML has been become the new standard for publishing and exchanging data on the Web. However, most business data is still stored and maintained in relational database management systems. As such, there is an increasing need to efficiently publish relational data as XML data for Internet-based applications. The most important issue in the transformation is to reflect structural and semantic relations of RDB to XML schema exactly. Most transformation approaches have been done to resolve the issue, but those methods have several problems. In this paper, we discuss algorithm in transforming a relational database schema into corresponding XML schema in XML Schema. We aim to achieve not only explicit/implicit referential integrity relation information but also high level of nested structure while introducing no data redundancy for the transformed XML schema. To achieve these goals, we propose a transformation model which is redundancy free and then we improve the XML Schema structure by exploring more nested structure.
Apple eases up on SDK policy: Avoiding antitrust? or strategic decision?
Kim, Joon-Young ; Park, Jin-Kyung ; Lee, Bong-Gyou ;
Journal of Internet Computing and Services, volume 11, issue 6, 2010, Pages 135~144
Apple recently announced a new policy about software development kit that banned the use of tools that convert apps built on other platforms into iPhone apps. Therefore, Adobe cannot develop their software to AppStore that inquire to the Department of Justice and the Federal Trade Commission about antitrust actions. Someone argue that Apple try to exclusive smartphone market such as the Microsoft antitrust lawsuit in 1998, but this case is essentially different. First, it need to define Apple's software development kit for iPhone and iPad is whether antitrust or not. Because of the characteristics of two-sided market in Smartphone Apple's iPhone cannot monopoly in cellphone or smartphone market, but it can be an antitrust in application store market. However, Apple re-announced new software development kit policy that shows positive results. Instead of hastily intervened regulatory agencies, the DOJ or the FTC, it is quite desirable that watching the interaction between companies that whether market failures or not and if it's harmful for consumer's benefit. Adobe attack Apple to advocate consumers and developers freedom of choice, but the most important thing is conclusion based on a comprehensive analysis need to objective point of view that Apple do whether antitrust act or not and damage to developers and consumers who are both side of platform.
An XPDL-based Workflow Model Analyzer
Song, Ji-Hye ; Kim, Kwang-Hoon ;
Journal of Internet Computing and Services, volume 11, issue 6, 2010, Pages 145~157
In this paper, we describe the design details and their implementation of a workflow model (or business process model) analysis system to be used for enhancing resource allocation efficiency and operational performance of enterprise workflows. In other word, the analysis works, proposed in this paper, on XPDL-based workflow models aim to verify the static aspects of the workflow models. Also, the system implemented in the paper is able to not only analyze structural patterns and resource allocation plans' efficiency of enterprise workflows modeled by the XPDL process definition language developed by the international standardization organization, WfMC, but also provide various forms of analytical reports. Conclusively, we strongly believe that the workflow analysis system developed in the paper enables workflow modelers to not only analyze and scrutinize structural patterns of their workflow models but also estimate their process resources assigning and planning measurements in order to improve accuracy, reliability and efficiency of enterprise workflows.