Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 13, Issue 6 - Dec 2012
Volume 13, Issue 5 - Oct 2012
Volume 13, Issue 4 - Aug 2012
Volume 13, Issue 3 - Jun 2012
Volume 13, Issue 2 - Apr 2012
Volume 13, Issue 1 - Feb 2012
Selecting the target year
Cost Analysis of Mobility Management Schemes for IP-based Next Generation Mobile Networks
Kim, Kyung-Tae ; Jeong, Jong-Pil ;
Journal of Internet Computing and Services, volume 13, issue 3, 2012, Pages 1~16
DOI : 10.7472/jksii.2012.13.3.1
Cost-effective mobility management for the roaming mobile users is very important in the seamless services on next-generation wireless network (NGWN). MIPv6 (Mobile IPv6) is one of the mobility management schemes proposed by the IETF (The Internet Engineering Task Force) and various IPv6-based mobility management schemes have been developed. They are directly involved with data transfer from MN (Mobile Node). In this paper, two kinds of schemes in analyzing of mobility management schemes are proposed. The signaling transfer and packet delivery procedures for each mobility management schemes are analyzed, respectively. The signaling cost for mobility management schemes are calculated, and the cost of each protocol are analyzed numerically. In other word, applying the sum of signaling cost and packet delivery cost to each mobility management scheme, their costs are analyzed. Finally, our performance evaluation results that the network-based mobility management scheme shows better performance in terms of overall cost.
Image Detecting System for Pinhole with Photoelectric Sensors
Kang, Min-Goo ; Zo, Moon-Shin ; Jeon, Jong-Suh ;
Journal of Internet Computing and Services, volume 13, issue 3, 2012, Pages 17~22
DOI : 10.7472/jksii.2012.13.3.17
In this paper, a photoelectric image detection system is proposed using an APD(Avalanche Photodiode) sensor, a LED illuminator, and fiberoptic waveguides. This proposed pinhole detection system can detect the pinholes of 100 micron with the speed rate of 1,000mpm(meter per minute). And detecting performance of image system is improved by the SQL based DB analysis of classifying pinhole`s detected location and size using image detection algorithms.
An Energy-Efficient and Practical Duty-Cycling Mechanism on Building Automation and Home Sensor Networks
Kim, Mi-Hui ; Hong, June-S. ;
Journal of Internet Computing and Services, volume 13, issue 3, 2012, Pages 23~30
DOI : 10.7472/jksii.2012.13.3.23
In order to show the gap between theory and practice, this paper first gives some experimental results for theoretical and real neighbor sets on a test-bed sensor network. The results prove that existing management protocols (e.g., duty-cycling, routing or aggregation) based on the theoretical communication radius cannot achieve their original goal, efficiency. In this paper, we present a practical duty-cycling mechanism based on the real neighbor set, allowing for energy-efficiency. It also guarantees to suppress duplicated transmissions of sensing values with similarity within a specific threshold in each zone (i.e., a portion of intended divided network). Simulation results performed with a set of real sensor data show that our mechanism increases the network life time while guaranteeing the transmission of necessary sensing values.
CR-SeMMS: Cost-Reduced Secure Mobility Management Scheme Based on SIP in NEMO Environments
Cho, Chul-Hee ; Jong, Jong-Pil ;
Journal of Internet Computing and Services, volume 13, issue 3, 2012, Pages 31~47
DOI : 10.7472/jksii.2012.13.3.31
The mobile Virtual Private Network (MVPN) of Internet Engineering Task Force (IETF) is not designed to support NEwork MObility (NEMO) and is not suitable for real-time applications. Therefore, an architecture and protocol which supports VPN in NEMO are needed. In this paper, we proposed the cost-reduced secure mobility management scheme (CR-SeMMS) which is designed for real-time applications in conjunction with VPN and also which is based on the session initiation protocol (SIP). Our scheme is to support MVPN in NEMO, so that the session is well maintained while the entire network is moved. Further, in order to reduce the authentication delay time which considers as a delaying factor in hands-off operations, the signaling time which occurs to maintain the session is shortened through proposing the hands-off scheme adopting an authentication method based on HMAC based One Time Password (HOTP). Finally, our simulation results show the improvement of the average hands-off performance time between our proposed scheme and the existing schemes.
Digital Camera Identification Based on Interpolation Pattern Used Lens Distortion Correction
Hwang, Min-Gu ; Kim, Dong-Min ; Har, Dong-Hwan ;
Journal of Internet Computing and Services, volume 13, issue 3, 2012, Pages 49~59
DOI : 10.7472/jksii.2012.13.3.49
Throughout developing digital technology, reproduction of image is growing better day by day. And at the same time, diverse image editing softwares are developed to manage images easily. In the process of editing images, those programs could delete or modify EXIF files which have the original image information; therefore images without the origin source are widely spread on the web site after editing. This matter could affect analysis of images due to the distortion of originality. Especially in the court of law, the source of evidence should be expressed clearly; therefore digital image EXIF file without deletion or distortion could not be the objective evidence. In this research, we try to trace the identification of a digital camera in order to solve digital images originality, and also we focus on lens distortion correction algorism which is used in digital image processing. Lens distortion correction uses mapping algorism, and at this moment it also uses interpolation algorism to prevent aliasing artifact and reconstruction artifact. At this point interpolation shows the similar mapping pattern; therefore we want to find out the interpolation evidence. We propose a minimum filter algorism in order to detect interpolation pattern and adjust the same minimum filter coefficient in two areas; one has interpolation and the second has no interpolation. Throughout DFT, we confirm frequency character between each area. Based on this result, we make the final detection map by using differences between two areas. In other words, thereby the area which has the interpolation caused by mapping is adjusted using minimum filter for detection algorism; the second area which has no interpolation tends to different frequency character.
Maximum-Entropy Image Enhancement Using Brightness Mean and Variance
Yoo, Ji-Hyun ; Ohm, Seong-Yong ; Chung, Min-Gyo ;
Journal of Internet Computing and Services, volume 13, issue 3, 2012, Pages 61~73
DOI : 10.7472/jksii.2012.13.3.61
This paper proposes a histogram specification based image enhancement method, which uses the brightness mean and variance of an image to maximize the entropy of the image. In our histogram specification step, the Gaussian distribution is used to fit the input histogram as well as produce the target histogram. Specifically, the input histogram is fitted with the Gaussian distribution whose mean and variance are equal to the brightness mean(
) and variance(
) of the input image, respectively; and the target Gaussian distribution also has the mean of the value
, but takes as the variance the value which is determined such that the output image has the maximum entropy. Experimental results show that compared to the existing methods, the proposed method preserves the mean brightness well and generates more natural looking images.
An Enhanced Community Detection Algorithm Using Modularity in Large Networks
Han, Chi-Geun ; Jo, Moo-Hyoung ;
Journal of Internet Computing and Services, volume 13, issue 3, 2012, Pages 75~82
DOI : 10.7472/jksii.2012.13.3.75
In this paper, an improved community detection algorithm based on the modularity is proposed. The existing algorithm does not consider the information that the nodes have in checking the possible modularity increase, hence the computation may be inefficient. The proposed algorithm computes the node degree (weight) and sorts them in non-increasing order. By checking the possible modularity value increase for the nodes in the nonincreasing order of node weights, the algorithm finds the final solution more quickly than the existing algorithm does. Through the computational experiments, it is shown that the proposed algorithm finds a modularity as good as the existing algorithm obtains.
Column-aware Polarization Scheme for High-Speed Database Systems
Byun, Si-Woo ;
Journal of Internet Computing and Services, volume 13, issue 3, 2012, Pages 83~91
DOI : 10.7472/jksii.2012.13.3.83
Recently, column-oriented storage has become a progressive model for high-speed database systems because of its superior I/O performance. In this paper, we analysis traditional raw-oriented storage model and then propose a new column-aware storage management model using flash memory drive and assist drive to improve the effective performance of the high-speed column-oriented database system. Our storage management scheme called column-aware polarization improves the performance of update operation by dividing and compressing table columns into active-columns or inactive-columns, and balancing congested update operations using a assist drive in high workload periods. The results obtained from experimental tests show that our scheme improves the update throughput of column-oriented storage by 19 percent, and the response time by up to 49 percent.
Preprocessing Method for Handling Multi-Way Join Continuous Queries over Data Streams
Seo, Ki-Yeon ; Lee, Joo-Il ; Lee, Won-Suk ;
Journal of Internet Computing and Services, volume 13, issue 3, 2012, Pages 93~105
DOI : 10.7472/jksii.2012.13.3.93
A data stream is a series of tuples which are generated in real-time, incessant, immense, and volatile manner. As new information technologies are actively emerging, stream processing methods are being needed to efficiently handle data streams. Especially, finding out an efficient evaluation for a multi-way join would make outstanding contributions toward improving the performance of a data stream management system because a join operation is one of the most resource-consuming operators for evaluating queries. In this paper, in order to evaluate efficiently a multi-way join continuous query, we propose a novel method to decrease the cost of a query by eliminating unsuccessful intermediate results. For this, we propose a matrix-based structure for monitoring data streams and estimate the number of final result tuples of the query and find out unsuccessful tuples by matrix multiplication operations. And then using these information, we process efficiently a multi-way join continuous query by filtering out the unsuccessful tuples in advance before actual evaluation of the query.
A Study on the Automatic Monitoring System for the Contact Center Using Emotion Recognition and Keyword Spotting Method
Yoon, Won-Jung ; Kim, Tae-Hong ; Park, Kyu-Sik ;
Journal of Internet Computing and Services, volume 13, issue 3, 2012, Pages 107~114
DOI : 10.7472/jksii.2012.13.3.107
In this paper, we proposed an automatic monitoring system for contact center in order to manage customer`s complaint and agent`s quality. The proposed system allows more accurate monitoring using emotion recognition and keyword spotting method for neutral/anger voice emotion. The system can provide professional consultation and management for the customer with language violence, such as abuse and sexual harassment. We developed a method of building robust algorithm on heterogeneous speech DB of many unspecified customers. Experimental results confirm the stable and improved performance using real contact center speech data.
A Semantic-Based Mashup Development Tool Supporting Various Open API Types
Lee, Yong-Ju ;
Journal of Internet Computing and Services, volume 13, issue 3, 2012, Pages 115~126
DOI : 10.7472/jksii.2012.13.3.115
Mashups have become very popular over the last few years, and their use also varies for IT convergency services. In spite of their popularity, there are several challenging issues when combining Open APIs into mashups, First, since portal sites may have a large number of APIs available for mashups, manually searching and finding compatible APIs can be a tedious and time-consuming task. Second, none of the existing portal sites provides a way to leverage semantic techniques that have been developed to assist users in locating and integrating APIs like those seen in traditional SOAP-based web services. Third, although suitable APIs have been discovered, the integration of these APIs is required for in-depth programming knowledge. To solve these issues, we first show that existing techniques and algorithms used for finding and matching SOAP-based web services can be reused, with only minor changes. Next, we show how the characteristics of APIs can be syntactically defined and semantically described, and how to use the syntactic and semantic descriptions to aid the easy discovery and composition of Open APIs. Finally, we propose a goal-directed interactive approach for the dynamic composition of APIs, where the final mashup is gradually generated by a forward chaining of APIs. At each step, a new API is added to the composition.
Development of Framework for Trusted Financial Service in N-Screen Environment
Kim, Kyong-Jin ; Seo, Dong-Su ; Hong, Seng-Phil ;
Journal of Internet Computing and Services, volume 13, issue 3, 2012, Pages 127~137
DOI : 10.7472/jksii.2012.13.3.127
With the spread of the new technologies like a smart phone, a smart pad, N-Screen service for financial transaction quickly became commonplace through the Internet. Although it has been developed related technologies and policies since the N-Screen has been provided in Korea, infrastructure for financial services is still lacking. It also has many potential problems including phishing or malware attacks, privacy information exposure & breaches, etc. This work suggests the financial security framework in the side of information protection through threat vulnerability analysis. Further, we examine the possibility of effective application methods based on political technical design.