Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 14, Issue 6 - Dec 2013
Volume 14, Issue 5 - Oct 2013
Volume 14, Issue 4 - Aug 2013
Volume 14, Issue 3 - Jun 2013
Volume 14, Issue 2 - Apr 2013
Volume 14, Issue 1 - Feb 2013
Selecting the target year
Adaptive RFID anti-collision scheme using collision information and m-bit identification
Lee, Je-Yul ; Shin, Jongmin ; Yang, Dongmin ;
Journal of Internet Computing and Services, volume 14, issue 5, 2013, Pages 1~10
DOI : 10.7472/jksii.2013.14.5.01
RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.
Study on WP-IBE compliant Mobile IPSec
Choi, Cheong Hyeon ;
Journal of Internet Computing and Services, volume 14, issue 5, 2013, Pages 11~26
DOI : 10.7472/jksii.2013.14.5.11
In the wireless Internet, it is so restrictive to use the IPSec. The MIPv4 IPSec's path cannot include wireless links. That is, the IPSec of the wireless Internet cannot protect an entire path of Host-to-Host connection. Also wireless circumstance keeps a path static during the shorter time, nevertheless, the IKE for IPSec SA agreement requires relatively long delay. The certificate management of IPSec PKI security needs too much burden. This means that IPSec of the wireless Internet is so disadvantageous. Our paper is to construct the Mobile IPSec proper to the wireless Internet which provides the host-to-host transport mode service to protect even wireless links as applying excellent WP-IBE scheme. For this, Mobile IPSec requires a dynamic routing over a path with wireless links. FA Forwarding is a routing method for FA to extend the path to a newly formed wireless link. The FA IPSec SA for FA Forwarding is updated to comply the dynamically extended path using Source Routing based Bind Update. To improve the performance of IPSec, we apply efficient and strong future Identity based Weil Pairing Bilinear Elliptic Curve Cryptography called as WP-IBE scheme. Our paper proposes the modified protocols to apply 6 security-related algorithms of WP-IBE into the Mobile IPSec. Particularly we focus on the protocols to be applied to construct ESP Datagram.
Development of Update Methods for Configuration Data of NETCONF Protocol considering Multiple Network Administrators
Lee, Yang-Min ; Cha, Mi-Yang ; Lee, Jae-Kee ;
Journal of Internet Computing and Services, volume 14, issue 5, 2013, Pages 27~38
DOI : 10.7472/jksii.2013.14.5.27
Currently a number of managers exist to manage heterogeneous networks, in this situation, the NETCONF protocol for efficient network management has been proposed as a new protocol. However, the standard NETCONF protocol stack continuous improvement since the establishment but in four layers still have some problems. Especially in situations where there are multiple administrators, problems are more highlighted in operation layer. In this paper, we focus on these issues and the Operation layer has improved the efficiency and flexibility of operations among NETCONF four layers. Additionally, for the inefficiency of updates improved the device settings based on improved operation techniques. In addition, standard protocol NETCONF did not proposed content layer data structure and we propose standard technique of content layer that can generate configuration structure of devices. Improved the three techniques are applied appropriately to the NETCONF, the proposed method and the existing NETCONF was performed experiment to compare with experimental four factors. Compare key factor are four kind as maintaining the probability of network function, the reaction performance about command, the number of control packets, performance of data creation in content layer. Such factors after performing the experiment, the proposed method in this paper is superior to the existing NETCONF and there was confirmed by analysis Experimental results.
Performance and Energy Oriented Resource Provisioning in Cloud Systems Based on Dynamic Thresholds and Host Reputation
Elijorde, Frank I. ; Lee, Jaewan ;
Journal of Internet Computing and Services, volume 14, issue 5, 2013, Pages 39~48
DOI : 10.7472/jksii.2013.14.5.39
A cloud system has to deal with highly variable workloads resulting from dynamic usage patterns in order to keep the QoS within the predefined SLA. Aside from the aspects regarding services, another emerging concern is to keep the energy consumption at a minimum. This requires the cloud providers to consider energy and performance trade-off when allocating virtualized resources in cloud data centers. In this paper, we propose a resource provisioning approach based on dynamic thresholds to detect the workload level of the host machines. The VM selection policy uses utilization data to choose a VM for migration, while the VM allocation policy designates VMs to a host based on its service reputation. We evaluated our work through simulations and results show that our work outperforms non-power aware methods that don't support migration as well as those based on static thresholds and random selection policy.
Combined Feature Set and Hybrid Feature Selection Method for Effective Document Classification
In, Joo-Ho ; Kim, Jung-Ho ; Chae, Soo-Hoan ;
Journal of Internet Computing and Services, volume 14, issue 5, 2013, Pages 49~57
DOI : 10.7472/jksii.2013.14.5.49
A novel approach for the feature selection is proposed, which is the important preprocessing task of on-line document classification. In previous researches, the features based on information from their single population for feature selection task have been selected. In this paper, a mixed feature set is constructed by selecting features from multi-population as well as single population based on various information. The mixed feature set consists of two feature sets: the original feature set that is made up of words on documents and the transformed feature set that is made up of features generated by LSA. The hybrid feature selection method using both filter and wrapper method is used to obtain optimal features set from the mixed feature set. We performed classification experiments using the obtained optimal feature sets. As a result of the experiments, our expectation that our approach makes better performance of classification is verified, which is over 90% accuracy. In particular, it is confirmed that our approach has over 90% recall and precision that have a low deviation between categories.
Method to Improve Data Sparsity Problem of Collaborative Filtering Using Latent Attribute Preference
Kwon, Hyeong-Joon ; Hong, Kwang-Seok ;
Journal of Internet Computing and Services, volume 14, issue 5, 2013, Pages 59~67
DOI : 10.7472/jksii.2013.14.5.59
In this paper, we propose the LAR_CF, latent attribute rating-based collaborative filtering, that is robust to data sparsity problem which is one of traditional problems caused of decreasing rating prediction accuracy. As compared with that existing collaborative filtering method uses a preference rating rated by users as feature vector to calculate similarity between objects, the proposed method improves data sparsity problem using unique attributes of two target objects with existing explicit preference. We consider MovieLens 100k dataset and its item attributes to evaluate the LAR_CF. As a result of artificial data sparsity and full-rating experiments, we confirmed that rating prediction accuracy can be improved rating prediction accuracy in data sparsity condition by the LAR_CF.
Implementation of integrated monitoring system for trace and path prediction of infectious disease
Kim, Eungyeong ; Lee, Seok ; Byun, Young Tae ; Lee, Hyuk-Jae ; Lee, Taikjin ;
Journal of Internet Computing and Services, volume 14, issue 5, 2013, Pages 69~76
DOI : 10.7472/jksii.2013.14.5.69
The incidence of globally infectious and pathogenic diseases such as H1N1 (swine flu) and Avian Influenza (AI) has recently increased. An infectious disease is a pathogen-caused disease, which can be passed from the infected person to the susceptible host. Pathogens of infectious diseases, which are bacillus, spirochaeta, rickettsia, virus, fungus, and parasite, etc., cause various symptoms such as respiratory disease, gastrointestinal disease, liver disease, and acute febrile illness. They can be spread through various means such as food, water, insect, breathing and contact with other persons. Recently, most countries around the world use a mathematical model to predict and prepare for the spread of infectious diseases. In a modern society, however, infectious diseases are spread in a fast and complicated manner because of rapid development of transportation (both ground and underground). Therefore, we do not have enough time to predict the fast spreading and complicated infectious diseases. Therefore, new system, which can prevent the spread of infectious diseases by predicting its pathway, needs to be developed. In this study, to solve this kind of problem, an integrated monitoring system, which can track and predict the pathway of infectious diseases for its realtime monitoring and control, is developed. This system is implemented based on the conventional mathematical model called by 'Susceptible-Infectious-Recovered (SIR) Model.' The proposed model has characteristics that both inter- and intra-city modes of transportation to express interpersonal contact (i.e., migration flow) are considered. They include the means of transportation such as bus, train, car and airplane. Also, modified real data according to the geographical characteristics of Korea are employed to reflect realistic circumstances of possible disease spreading in Korea. We can predict where and when vaccination needs to be performed by parameters control in this model. The simulation includes several assumptions and scenarios. Using the data of Statistics Korea, five major cities, which are assumed to have the most population migration have been chosen; Seoul, Incheon (Incheon International Airport), Gangneung, Pyeongchang and Wonju. It was assumed that the cities were connected in one network, and infectious disease was spread through denoted transportation methods only. In terms of traffic volume, daily traffic volume was obtained from Korean Statistical Information Service (KOSIS). In addition, the population of each city was acquired from Statistics Korea. Moreover, data on H1N1 (swine flu) were provided by Korea Centers for Disease Control and Prevention, and air transport statistics were obtained from Aeronautical Information Portal System. As mentioned above, daily traffic volume, population statistics, H1N1 (swine flu) and air transport statistics data have been adjusted in consideration of the current conditions in Korea and several realistic assumptions and scenarios. Three scenarios (occurrence of H1N1 in Incheon International Airport, not-vaccinated in all cities and vaccinated in Seoul and Pyeongchang respectively) were simulated, and the number of days taken for the number of the infected to reach its peak and proportion of Infectious (I) were compared. According to the simulation, the number of days was the fastest in Seoul with 37 days and the slowest in Pyeongchang with 43 days when vaccination was not considered. In terms of the proportion of I, Seoul was the highest while Pyeongchang was the lowest. When they were vaccinated in Seoul, the number of days taken for the number of the infected to reach at its peak was the fastest in Seoul with 37 days and the slowest in Pyeongchang with 43 days. In terms of the proportion of I, Gangneung was the highest while Pyeongchang was the lowest. When they were vaccinated in Pyeongchang, the number of days was the fastest in Seoul with 37 days and the slowest in Pyeongchang with 43 days. In terms of the proportion of I, Gangneung was the highest while Pyeongchang was the lowest. Based on the results above, it has been confirmed that H1N1, upon the first occurrence, is proportionally spread by the traffic volume in each city. Because the infection pathway is different by the traffic volume in each city, therefore, it is possible to come up with a preventive measurement against infectious disease by tracking and predicting its pathway through the analysis of traffic volume.
A Closeness Centrality Analysis Algorithm for Workflow-supported Social Networks
Park, Sungjoo ; Kim, Kwanghoon Pio ;
Journal of Internet Computing and Services, volume 14, issue 5, 2013, Pages 77~85
DOI : 10.7472/jksii.2013.14.5.77
This paper proposes a closeness centrality analysis algorithm for workflow-supported social networks that represent the collaborative relationships among the performers who are involved in a specific workflow model. The proposed algorithm uses the social network analysis techniques, particularly closeness centrality equations, to analyze the closeness centrality of the workflow-supported social network. Additionally, through an example we try to verify the accuracy and appropriateness of the proposed algorithm.
A Web Accessability Compliance Framework for Website Development: A Case of W Bank Internet Banking Project -
Kim, Yoosin ; Jeong, Seung Ryul ;
Journal of Internet Computing and Services, volume 14, issue 5, 2013, Pages 87~99
DOI : 10.7472/jksii.2013.14.5.87
As Internet advances, websites with simpel HTML pages are changing to complex web application systems with enormous contents and various services. With this trend, it is noted that situations where Web accessibility of the old and the handicapped is inhibited are growing. To solve this problem, The Disability Discrimination Act has been enacted since April 2013. This act triggers massive website reorganization efforts. However, in order for the huge and sophisticated web applications and web sites to ensure a web accessibility, a framework is required to throughout the web site development. Based on thorough review of website development methodologies, web accessibility compliance standards, and various web accessibility issues related to website characteristics, this study proposes a practice oriented "Web Accessibility Compliance Framework". The current study also examines the usefulness and value of this framework by applying it to the internet banking development project of W bank and receiving a certificate for high quality website complying web accessibility standards.
A study on the impact of online contents characteristics on customer loyalty - Mediated effect of flow perspective -
Shin, Young-Chul ; Jeong, Seung-Ryul ;
Journal of Internet Computing and Services, volume 14, issue 5, 2013, Pages 101~117
DOI : 10.7472/jksii.2013.14.5.101
As the number of online game user has been rapidly increased thanks to the recent vitalization of online contents market, not only new business opportunity but also the opportunity to create high profits have been provided as well. However, the increase of the number of online game user and the rapid expansion of the market evoke a cutthroat completion among online game service providers, and also high barriers to entry to online game market have been erected. Thus, what kinds of efforts need for the business success and sales increase in online game market? In lots of researches regarding online contents business, the deepening of loyalty was considered as a critical factor for the business success. According to the study on user's behavior in online environment, users would experience the Flow while using online service, and then, if they were in state of the Flow, they would use the service constantly. High customer loyalty to online game means high will to use the online game too. The purpose of this research was i) to examine what factors enable users to be naturally immersed in online game while playing it, ii) to examine what properties of online game can make game more interesting and exciting, iii) to verify that such factors are critical in deepening customer loyalty, and iv) to suggest some essential factors to be fun and exciting games, on where the focus should be put, and the directionality for the development for sales expansion of online game developer or online game service provider. The research results are as below: First, the involvement and the perceived quality which were characteristics of brand appeared to be factors most affecting Flow. This shows that once game user get interested in online game that user has played frequently, even though new games are released, user will continuously flow the game not moving to new games, and also shows that users not only get more interested but also put more trust in games in the site to where users are frequently going than games in other sites, and consequently user can increasingly flow the game. Second, the compensation and graphics which are the characteristics of contents appeared to be factors affecting Flow. Proper compensation which is given to game users triggers fun and interests in game and makes them flow more and more. And graphics make users to feel game space as if real space and let them flow in game with more reality. Third, challenges, support, and the stability which are technical characteristics appeared to be factors affecting Flow. Challenges enable users to not only experience new virtual world but also solve various difficulties and obstacles. Once users feel fun and interests through this challenge, they can naturally flow games. In addition, the stability of network provides reliability in security and hacking. By doing so, it can induce users to flow more and more. Lastly, when aforementioned characteristics including contents characteristics, technical characteristics, and brand characteristics are organically combined each other, game users feel fun and total minutes are naturally increased, so that game users experience Flow, and consequently the customer loyalty will be deepened as well.
An Analysis of the Economic Effects for the IoT Industry
Jeong, Woo-Soo ; Kim, Sa-Hyuk ; Min, Kyoung-Sik ;
Journal of Internet Computing and Services, volume 14, issue 5, 2013, Pages 119~128
DOI : 10.7472/jksii.2013.14.5.119
As ICT technology becomes advanced, the importance of future internet is emphasized and in part of that, M2M (Machine-to Machine communications) is magnified in terms of importance and usage in public and private sector. M2M is emerging as a next generation strategic industry but there is no existing analyzed data or market classification, so it disrupts establishing policies on the M2M industry. As the technology is progressing, the evolution from M2M to IoT (Internet of Things) has started and many countries actively try to find technological trend through market analysis in order to develop new growth engine. Therefore, in order to strengthen competitiveness, we should secure differentiated capabilities in industry and service. This article examines Korea's domestic market and international market trends in IoT and analyses the economic impact of the IoT industry using quantitative methodology and evaluates relations between the IoT industry and other relevant industries. As a result, the effect of IoT industry on production inducement is KRW474.6 billion; the effect on value-added inducement is KRW314.7 billion; and it is measured that 3,628 jobs will be created by the IoT industry.