Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 14, Issue 6 - Dec 2013
Volume 14, Issue 5 - Oct 2013
Volume 14, Issue 4 - Aug 2013
Volume 14, Issue 3 - Jun 2013
Volume 14, Issue 2 - Apr 2013
Volume 14, Issue 1 - Feb 2013
Selecting the target year
User-driven Context-aware Service
Park, Jeongkyu ; Lee, Keung Hae ;
Journal of Internet Computing and Services, volume 14, issue 4, 2013, Pages 1~12
DOI : 10.7472/jksii.2013.14.4.01
Context-awareness is a computing technology that automatically delivers useful services to users based on their situation. Most previous studies on context-awareness adopted the view that the user simply is a consumer of what the developer creates. Few studies addressed catering to the need of personalized services for the user. They are either too complex for the user to grasp or unable to express many useful services due to their weak expressive power. To address these issues, we propose Dobby as a new model and architecture for user-driven context-aware service development. Dobby enables the user to create services that are more suited to his personal preferences. We argue that Dobby offers an enhanced method for defining personalized context-aware services over existing methods.
A Detection Method of Interference from WiFi Network in IEEE 802.15.4 Network
Song, Myong Lyol ;
Journal of Internet Computing and Services, volume 14, issue 4, 2013, Pages 13~24
DOI : 10.7472/jksii.2013.14.4.13
IEEE 802.15.4 network and WiFi network are installed to overlap each other and configured to use adjacent frequency bands in which case the communication service required by applications can not be guaranteed because of randomly increased frame transmission delay and frequent frame transmission failures at nodes in IEEE 802.15.4 network. In this paper, transmission delay model at IEEE 802.15.4 nodes and an experimental system to evaluate the interference from WiFi traffic are described, then elements for the evaluation of interference are measured with the analysis of their characteristics. A sequential method of using medium access layer and physical layer elements of IEEE 802.15.4 protocols is proposed to decide interference from WiFi network. With the proposed method, if an evaluation function having frame transmission failures and transmission delay as variables returns a value greater than a threshold, intensive measurements of wireless channel power are carried out subsequently and the final decision of interference is made by the calculated average channel power. Experimental results of the method show that the decision time is reduced with increased frequency of decision in comparison to an other similar method.
A RFID Tag Anti-Collision Algorithm Using 4-Bit Pattern Slot Allocation Method
Kim, Young Back ; Kim, Sung Soo ; Chung, Kyung Ho ; Ahn, Kwang Seon ;
Journal of Internet Computing and Services, volume 14, issue 4, 2013, Pages 25~33
DOI : 10.7472/jksii.2013.14.4.25
The procedure of the arbitration which is the tag collision is essential because the multiple tags response simultaneously in the same frequency to the request of the Reader. This procedure is known as Anti-collision and it is a key technology in the RFID system. In this paper, we propose the 4-Bit Pattern Slot Allocation(4-BPSA) algorithm for the high-speed identification of the multiple tags. The proposed algorithm is based on the tree algorithm using the time slot and identify the tag quickly and efficiently through accurate prediction using the a slot as a 4-bit pattern according to the slot allocation scheme. Through mathematical performance analysis, We proved that the 4-BPSA is an O(n) algorithm by analyzing the worst-case time complexity and the performance of the 4-BPSA is improved compared to existing algorithms. In addition, we verified that the 4-BPSA is performed the average 0.7 times the query per the Tag through MATLAB simulation experiments with performance evaluation of the algorithm and the 4-BPSA ensure stable performance regardless of the number of the tags.
An Object-Oriented Analysis and Design Methodology for Security of Web Applications
Joo, Kyung-Soo ; Woo, Jung-Woong ;
Journal of Internet Computing and Services, volume 14, issue 4, 2013, Pages 35~42
DOI : 10.7472/jksii.2013.14.4.35
Nowadays many tasks are performed using the Web. Accordingly, many web-based application systems with various and complicated functions are being requested. In order to develop such web-based application systems efficiently, object-oriented analysis and design methodology is used, and Java EE(Java Platform, Enterprise Edition) technologies are used for its implementation. The security issues have become increasingly important. For such reasons, Java EE provides mechanism related to security but it does not provide interconnections with object-oriented analysis and design methodology for developing web application system. Consequently, since the security method by Java EE mechanism is implemented at the last step only, it is difficult to apply constant security during the whole process of system development from the requirement analysis to implementation. Therefore, this paper suggests an object-oriented analysis and design methodology emphasized in the security for secure web application systems from the requirement analysis to implementation. The object-oriented analysis and design methodology adopts UMLsec, the modeling language with an emphasis on security for the requirement analysis and system analysis & design with regard to security. And for its implementation, RBAC (Role Based Access Control) of servlet from Java EE technologies is used. Also, the object-oriented analysis and design methodology for the secure web application is applied to online banking system in order to prove its effectiveness.
A Verifier-free Scheme for User Authentication and Access Control Using Smart Cards: Improvement of Chen-Yeh's Method
Kim, Yong ; Chung, Min Gyo ;
Journal of Internet Computing and Services, volume 14, issue 4, 2013, Pages 43~51
DOI : 10.7472/jksii.2013.14.4.43
User authentication and access control are two important components in high security applications. Recently, Chen and Yeh proposed a method to integrate both of them seamlessly. However, Chen-Yeh's scheme is vulnerable to a stolen verifier attack, since it maintains a smart card identifier table in a remote server. Therefore, this paper modifies Chen-Yeh's scheme and propose a new integrated authentication and access control scheme that is resilient to the stolen verifier attack while inheriting all the merits of Chen-Yeh's scheme. Security analysis shows that the proposed scheme withstands well-known security attacks and exhibits many good features.
Information Sharing Model based on Adaptive Group Communication for Cloud-Enabled Robots
Mateo, Romeo Mark ; Lee, Jaewan ;
Journal of Internet Computing and Services, volume 14, issue 4, 2013, Pages 53~62
DOI : 10.7472/jksii.2013.14.4.53
In cloud robotics, the model to share information efficiently is still a research challenge. This paper presents an information sharing model for cloud-enabled robots to collaborate and share intelligence. To provide the efficient message dissemination, an adaptive group communication based on multi-agent is proposed. The proposed algorithm uses a weight function for the link nodes to determine the significant links. The performance evaluation showed that the proposed algorithm produced minimal message overhead and was faster to answer queries because of the significant links compared to traditional group communication methods.
A BPM Activity-Performer Correspondence Analysis Method
Ahn, Hyun ; Park, Chungun ; Kim, Kwanghoon ;
Journal of Internet Computing and Services, volume 14, issue 4, 2013, Pages 63~72
DOI : 10.7472/jksii.2013.14.4.63
Business Process Intelligence (BPI) is one of the emerging technologies in the knowledge discovery and analysis area. BPI deals with a series of techniques from discovering knowledge to analyzing the discovered knowledge in BPM-supported organizations. By means of the BPI technology, we are able to provide the full functionality of control, monitoring, prediction, and optimization of process-supported organizational knowledge. Particularly, we focus on the focal organizational knowledge, which is so-called the BPM activity-performer affiliation networking knowledge that represents the affiliated relationships between performers and activities in enacting a specific business process model. That is, in this paper we devise a statistical analysis method to be applied to the BPM activity-performer affiliation networking knowledge, and dubbed it the activity-performer correspondence analysis method. The devised method consists of a series of pipelined phases from the generation of a bipartite matrix to the visualization of the analysis result, and through the method we are eventually able to analyze the degree of correspondences between a group of performers and a group of activities involved in a business process model or a package of business process models. Conclusively, we strongly expect the effectiveness and efficiency of the human resources allotments, and the improvement of the correlational degree between business activities and performers, in planning and designing business process models and packages for the BPM-supported organization, through the activity-performer correspondence analysis method.
A study on Factors that Influence the Usage of Mobile Apps - Based on Flow Theory and Unified Theory of Acceptance and Use of Technology -
Kim, Young-Chae ; Jeong, Seung Ryul ;
Journal of Internet Computing and Services, volume 14, issue 4, 2013, Pages 73~84
DOI : 10.7472/jksii.2013.14.4.73
This study, based on flow theory and unified theory of acceptance and use of technology (UTAUT), examines various factors that influence the continuous use of mobile applications, particularly those providing users with satisfaction and pleasure as well as useful information. This study extends the previous studies that have been based on technology acceptance model, in which usefulness and ease of use are key determinants of use of new technology, by introducing flow theory in explaining the use of various technologies in mobile environment. For this purpose, this study employes a survey based field study and collects data from individuals who use fashion mobile apps since these are considered to provide fun and pleasures. This study finds that flow theory is a proper framework to understand the use of mobile technology, indicating flow experience is an important variable to determine the usage of fashion apps. In addition, performance expectation, effort expectation, social influence, and facilitation condition are found to be significant in influencing use of mobile apps, suggesting UTAUT still plays an important role in understanding the use of mobile technology.
A Study on Development of App-Based Electric Fire Prediction System
Choi, Young-Kwan ; Kim, Eung-Kwon ;
Journal of Internet Computing and Services, volume 14, issue 4, 2013, Pages 85~90
DOI : 10.7472/jksii.2013.14.4.85
Currently, the electric fire prediction system uses PIC(Peripheral Interface Controller) for controller microprocessor. PIC has a slower computing speed than DSP does, so its real-time computing ability is inadequate. So with the basic characteristics waveform during arc generation as the standard reference, the comparison to this reference is used to predict and alarm electric fire from arc. While such alarm can be detected and taken care of from a remote central server, that prediction error rate is high and remote control in mobile environment is not available. In this article, the arc detection of time domain and frequency domain and wavelet-based adaptation algorithm executing the adaptation algorithm in conversion domain were applied to develop an electric fire prediction system loaded with new real-time arc detection algorithm using DSP. Also, remote control was made available through iPhone environment-based app development which enabled remote monitoring for arc's electric signal and power quality, and its utility was verified.
The Influence of Negative Emotions on Customer Contribution to Organizational Innovation in an Online Brand Community
Jung, Suyeon ; Lee, Hanjun ; Suh, Yongmoo ;
Journal of Internet Computing and Services, volume 14, issue 4, 2013, Pages 91~100
DOI : 10.7472/jksii.2013.14.4.91
In recent years, online brand communities, whereby firms and customers interact freely, are emerging trend, because customers' opinions collected in these communities can help firms to achieve their innovation effectively. In this study, we examined whether customer opinions containing negative emotions have influence on their adoption for organizational innovation. To that end, we firstly classified negative emotions into five categories of detailed negative emotions such as Fear, Anger, Shame, Sadness, and Frustration. Then, we developed a lexicon for each category of negative emotions, using WordNet and SentiWordNet. From 81,543 customer opinions collected from MyStarbucksIdea.com which is Starbucks' brand community, we extracted terms that belong to each lexicon. We conducted an experiment to examine whether the existence, frequency and strength of terms with negative emotions in each category affect the adoption of customer opinions for organizational innovation. In the experiment, we statistically verified that there is a positive relationship between customer ideas containing negative emotions and their adoption for innovation. Especially, Frustration and Sadness out of the five emotions are significantly influential to organizational innovation.