Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 15, Issue 6 - Dec 2014
Volume 15, Issue 5 - Oct 2014
Volume 15, Issue 4 - Aug 2014
Volume 15, Issue 3 - Jun 2014
Volume 15, Issue 2 - Apr 2014
Volume 15, Issue 1 - Feb 2014
Selecting the target year
IMA based Platform Architecture for Improving Portability of Flight Software
Seo, Yongjin ; Kim, Hyeon Soo ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 1~17
DOI : 10.7472/jksii.2014.15.1.1
Flight software operated on the on-board computers in the satellite has requirements such as real-time, high reliability. These requirements make dependency between the flight software and operating environments. Further, whenever a new system is built, such problem drives that all flight software are redeveloped. Thus, the dependency problem between them should be solved. And the problem can be resolved by improving the portability of the flight software. In order to improve the portability it is required to minimize the porting cost. In this paper, we classify the portability with the portability achieving methods. Using the classified portability, we propose a platform architecture that is based on the IMA concept and provides various portability capabilities. The proposed architecture enables us to solve the problem about the development of the flight software.
A Systematic Literature Review on Secure Software Development using Feature Driven Development (FDD) Agile Model
Arbain, Adila Firdaus ; Ghani, Imran ; Jeong, Seung Ryul ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 13~27
DOI : 10.7472/jksii.2014.15.1.13
Agile methodologies have gained recognition as efficient development processes through their quick delivery of software, even under time constraints. However, like other agile methods such as Scrum, Extreme Programming (XP) and The Dynamic Systems Development Method (DSDM), Feature Driven Development (FDD) has been criticized due to the unavailability of security elements in its twelve practices. In order to examine this matter more closely, we conducted a systematic literature review (SLR) and studied literature for the years 2001-2012. Our findings highlight that, in its current form, the FDD model partially supports the development of secure software. However, there is little research on this topic, as detailed information about the usage of secure software is rarely published. Thus, we have been able to conclude that the existing five phases of FDD have not been enough to develop secure software until recently. For this reason, security-based phase and practices in FDD need to be proposed.
A Framework of Intelligent Middleware for DNA Sequence Analysis in Cloud Computing Environment
Oh, Junseok ; Lee, Yoonjae ; Lee, Bong Gyou ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 29~43
DOI : 10.7472/jksii.2014.15.1.29
The development of NGS technologies, such as scientific workflows, has reduced the time required for decoding DNA sequences. Although the automated technologies change the genome sequence analysis environment, limited computing resources still pose problems for the analysis. Most scientific workflow systems are pre-built platforms and are highly complex because a lot of the functions are implemented into one system platform. It is also difficult to apply components of pre-built systems to a new system in the cloud environment. Cloud computing technologies can be applied to the systems to reduce analysis time and enable simultaneous analysis of massive DNA sequence data. Web service techniques are also introduced for improving the interoperability between DNA sequence analysis systems. The workflow-based middleware, which supports Web services, DBMS, and cloud computing, is proposed in this paper for expecting to reduceanalysis time and aiding lightweight virtual instances. It uses DBMS for managing the pipeline status and supporting the creation of lightweight virtual instances in the cloud environment. Also, the RESTful Web services with simple URI and XML contents are applied for improving the interoperability. The performance test of the system needs to be conducted by comparing results other developed DNA analysis services at the stabilization stage.
Design and Implementation of the Performance Driven UI-Mashup Architecture
Cho, Dong-Il ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 45~53
DOI : 10.7472/jksii.2014.15.1.45
UI-Mashup is widely used as a service method to add value, which is composed of distributed various contents on the internet and has turned out to be one of the latest trends in web application program development. Previous UI-Mashup-related studies have focused primarily on the dynamic service composition and have not been able to adapt to a rapidly changing Web Standard, thusthe end users conclude that UI-Mashups are slow, incompatible and poor security services. In this study, We propose an architecture for the performance improvements of UI-Mashup.In order to provide fast services and security enhancements, the proposed architecture collects UI fragments on the server in parallel, and sends layouts and contents of Mashups UI to the client through a special delivery channel supporting fast reaction and response time. In this study, the implementation and performance tests were proceeded to verify the proposed architecture experimentally. As a result of the performance testing, the proposed architecture has two to three times faster response time and more than four times throughput compared to the previous UI-Mashup technology.
A Study on Distributed Processing of Big Data and User Authentication for Human-friendly Robot Service on Smartphone
Choi, Okkyung ; Jung, Wooyeol ; Lee, Bong Gyou ; Moon, Seungbin ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 55~61
DOI : 10.7472/jksii.2014.15.1.55
Various human-friendly robot services have been developed and mobile cloud computing is a real time computing service that allows users to rent IT resources what they want over the internet and has become the new-generation computing paradigm of information society. The enterprises and nations are actively underway of the business process using mobile cloud computing and they are aware of need for implementing mobile cloud computing to their business practice, but it has some week points such as authentication services and distributed processing technologies of big data. Sometimes it is difficult to clarify the objective of cloud computing service. In this study, the vulnerability of authentication services on mobile cloud computing is analyzed and mobile cloud computing model is constructed for efficient and safe business process. We will also be able to study how to process and analyze unstructured data in parallel to this model, so that in the future, providing customized information for individuals may be possible using unstructured data.
Development of a Concurrency Control Technique for Multiple Inheritance in Object-Oriented Databases
Jun, Woochun ; Hong, Suk-Ki ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 63~71
DOI : 10.7472/jksii.2014.15.1.63
Currently many non-traditional application areas such as artificial intelligence and web databases require advanced modeling power than the existing relational data model. In those application areas, object-oriented database (OODB) is better data model since an OODB can providemodeling power as grouping similar objects into class, and organizing all classes into a hierarchy where a subclass inherits all definitions from its superclasses. The purpose of this paper is to develop an OODB concurrency control scheme dealing with multiple inheritance. The proposed scheme, called Multiple Inheritance Implicit Locking (MIIL), is based on so-called implicit locking. In the proposed scheme, we eliminate redundant locks that are necessary in the existing implicit locking scheme. Intention locks are required as the existing implicit locking scheme. In this paper, it is shown that MIIL has less locking overhead than implicit locking does. We use only OODB inheritance hierarchies, single inheritance and multiple inheritance so that no additional overhead is necessary for reducing locking overhead.
The Effect of Online Community, Members, and Personal Characteristics on Lurking Behavior: Why do people only consume rather than create contents?
Park, Do-Hyung ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 73~88
DOI : 10.7472/jksii.2014.15.1.73
Online communities are getting more popular with the development of information technology. It is essential that community members participate actively and share their contents or opinions continuously for the success and growth of online communities. However, it is revealed that most of members just take the role of passive observer. They are lurking community information and contents without any contribution. In this sense, this study focuses on explore lurking behavior of online community members. This study investigates the effect of the characteristics of online community, community members, and personal traits on user's lurking intention. Member familiarity and community identity have a strong positive effect on de-lurking intention, while the perception of usefulness and ease of use for communities and member expertise have a negative effect on de-lurking intention. Interestingly, users with a low level of self-esteem have higher level of motivation of participation than those with a high level of self-esteem. Finally, this study proposes several strategies to enhance information and contents sharing in online communities.
Understanding the Roles and Limitations of SNS for Network Social Movements: A Case Study of "Save Jeju Island" Movement in South Korea
Chae, Younggil ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 89~102
DOI : 10.7472/jksii.2014.15.1.89
Since the Arab spring in 2010, SNS prompted discussions about the roles to organize collective actions. First of all, mobile media and SNS help to mobilize both on and offline social movement, second, to create new forms of collective actions, third, to organize social movement organizations across the world, fourth, to empower movement participants to develop new collective identities. On the other hand, the same technologies also hinder social movements from developing continuity and dedication. In addition, the problems of digital divide might aggravate the divisive process to organize collective actions across the world. This research is built on these ongoing arguments about the potentials and limitations of new media technologies. In particular, this research tries to move beyond the confrontational approaches to the media through the case study of Save The Jeju Island social movements on Facebook. The movement SNS on Facebook aims to provide as well as organize international SMOs and activists that might help deeper understandings on the potentials and limitations of online communication strategies for global social movements.
Study on the Application Methods of Big Data at a Corporation -Cases of A and Y corporation Big Data System Projects-
Lee, Jae Sung ; Hong, Sung Chan ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 103~112
DOI : 10.7472/jksii.2014.15.1.103
In recent years, the rapid diffusion of smart devices and growth of internet usage and social media has led to a constant production of huge amount of valuable data set that includes personal information, buying patterns, location information and other things. IT and Production Infrastructure has also started to produce its own data with the vitalization of M2M (Machine-to-Machine) and IoT (Internet of Things). This analysis study researches the applicable effects of Structured and Unstructured Big Data in various business circumstances, and purposes to find out the value creation method for a corporation through the Structured and Unstructured Big Data case studies. The result demonstrates that corporations looking for the optimized big data utilization plan could maximize their creative values by utilizing Unstructured and Structured Big Data generated interior and exterior of corporations.
Subjectivity Study on Cloud-based Smart Work Service of a Quasi-Governmental Agency
Song, In Kuk ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 113~123
DOI : 10.7472/jksii.2014.15.1.113
Many people expect remarkable growth in Cloud Computing industry because of it's effectiveness. But Cloud Computing industry is still at an early stage. Especially, people who in the public sector hesitate to adopt Cloud Computing Services due to security issues and their conservative views. Also, they just have limited understanding, so we need to investigate what they really know and understand. The purpose of this study is to propose Improvement plans on cloud-based smart work service of a quasi-governmental agency based on the view point of preference and tendency. To discover three types of cloud-based smart work issues and interpret theoretical definitions of those, we conducted a subjectivity analysis through qualitative methodology. At the result, the study draws three elements of typology: convenience type, concentration type, and collaboration type, and provides directions to strategic-policy studies for future cloud-based smart work services of quasi-governmental agency.
Propagation Models for Structural Parameters in Online Social Networks
Kong, Jong-Hwan ; Kim, Ik Kyun ; Han, Myung-Mook ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 125~134
DOI : 10.7472/jksii.2014.15.1.125
As the social media which was simple communication media is activated on account of twitter and facebook, it's usability and importance are growing recently. Although many companies are making full use of its the capacity of information diffusion for marketing, the adverse effects of this capacity are growing. Because social network is formed and communicates based on friendships and relationships, the spreading speed of the spam and mal-ware is very swift. In this paper, we draw parameters affecting malicious data diffusion in social network environment, and compare and analyze the diffusion capacity of each parameters by propagation experiment with XSS Worm and Koobface Worm. In addition, we discuss the structural characteristics of social network environment and then proposed malicious data propagation model based on parameters affecting information diffusion. n this paper, we made up BA and HK models based on SI model, dynamic model, to conduct the experiments, and as a result of the experiments it was proved that parameters which effect on propagation of XSS Worm and Koobface Worm are clustering coefficient and closeness centrality.
Implementation and Performance Analysis of Web Service Adapter for Integrated SNS Gateway
Jung, Insik ; Kim, Hyeonwoo ; Kwon, Dongwoo ; Ju, Hongtaek ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 135~142
DOI : 10.7472/jksii.2014.15.1.135
In this paper, we present integrated SNS Gateway as way to reduce mobile SNS traffic. Integrated SNS gateway's role is communication broker that located between mobile clients and SNS server. In Integrated SNS gateway, web service adapter communicates with SNS Server. Experiment was performed in aspects of contents RTT and network traffic. We evaluate and propose performances of integrated SNS gateway using gateway.
A Study on Educational Application of Smart Devices for Enhancing the Effectiveness of Problem Solving Learning
Kim, Meeyong ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 143~156
DOI : 10.7472/jksii.2014.15.1.143
The smart education has the goal of enhancing the capability of learners in the 21st century and especially address the improvement of the problem solving capability. This smart education based on the growth of smart devices and the effect of dramatical spread requires the ability of problem solving using the smart technology in accordance with time change. As the problem solving learning is a model used mainly for improving the capability of problem solving, this study develops the problem solving learning model focusing on the teaching-learning activity using the smart devices and also applies this model to the school field. As a result, the favorable response that using the smart devices is effective to the problem solving can be obtained. This study can contribute to achieve the goal of the smart education, and later can be effective to the successful smart education in the school field.
Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern
Min, Hee Yeon ; Park, Jin Hyung ; Lee, Dong Hoon ; Kim, In Seok ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 157~170
DOI : 10.7472/jksii.2014.15.1.157
As the increase of transaction using mobile banking continues, threat to the mobile financial security is also increasing. Mobile banking service performs the financial transaction using the dedicate application which is made by financial corporation. It provides the same services as the internet banking service. Personal information such as credit card number, which is stored in the mobile banking application can be used to the additional attack caused by a malicious attack or the loss of the mobile devices. Therefore, in this paper, to cope with the mobile financial accident caused by personal information exposure, we suggest outlier detection method which can judge whether the transaction is conducted by the appropriate user or not. This detection method utilizes the user's input patterns and transaction patterns when a user uses the banking service on the mobile devices. User's input and transaction pattern data involves the information which can be used to discern a certain user. Thus, if these data are utilized appropriately, they can be the information to distinguish abnormal transaction from the transaction done by the appropriate user. In this paper, we collect the data of user's input patterns on a smart phone for the experiment. And we use the experiment data which domestic financial corporation uses to detect outlier as the data of transaction pattern. We verify that our proposal can detect the abnormal transaction efficiently, as a result of detection experiment based on the collected input and transaction pattern data.
Dynamic Behavior Modelling of Augmented Objects with Haptic Interaction
Lee, Seonho ; Chun, Junchul ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 171~178
DOI : 10.7472/jksii.2014.15.1.171
This paper presents dynamic modelling of a virtual object in augmented reality environments when external forces are applied to the object in real-time fashion. In order to simulate a natural behavior of the object we employ the theory of Newtonian physics to construct motion equation of the object according to the varying external forces applied to the AR object. In dynamic modelling process, the physical interaction is taken placed between the augmented object and the physical object such as a haptic input device and the external forces are transferred to the object. The intrinsic properties of the augmented object are either rigid or elastically deformable (non-rigid) model. In case of the rigid object, the dynamic motion of the object is simulated when the augmented object is collided with by the haptic stick by considering linear momentum or angular momentum. In the case of the non-rigid object, the physics-based simulation approach is adopted since the elastically deformable models respond in a natural way to the external or internal forces and constraints. Depending on the characteristics of force caused by a user through a haptic interface and model's intrinsic properties, the virtual elastic object in AR is deformed naturally. In the simulation, we exploit standard mass-spring damper differential equation so called Newton's second law of motion to model deformable objects. From the experiments, we can successfully visualize the behavior of a virtual objects in AR based on the theorem of physics when the haptic device interact with the rigid or non-rigid virtual object.
Frame Transmission and Channel Changing Methods of IEEE 802.15.4 Nodes in WiFi Traffic Interference Environment
Song, Myong Lyol ;
Journal of Internet Computing and Services, volume 15, issue 1, 2014, Pages 179~191
DOI : 10.7472/jksii.2014.15.1.179
In this paper, a frame transmission method to make IEEE 802.15.4 nodes run at a new channel and its characteristics are studied when they experience difficulties in transmission of frames due to WiFi traffic. The researches on evaluating the interference from WiFi traffic, searching for a new channel with little interference or not, and changing the operating channel are analyzed. In an wireless channel overlapped with IEEE 802.11 network, the transmission delay of IEEE 802.15.4 frames, the collision of frames in sending IEEE 802.15.4 frames without applying CSMA-CA algorithm, and the operation of IEEE 802.11 nodes are explained. A transmission method of frames including frame-formated code blocks in order to use the rest part of collided IEEE 802.15.4 frame is proposed. In the experiments of the proposed method, it is observed that frame-formated code blocks are synchronized and received by receivers in case of collision, and then the collided positions in IEEE 802.15.4 frame and the characteristics of frame reception rate are analyzed. The experimental results show that the performance of the proposed method is improved in comparison to an existing method when we measure the time taken to send a channel change command and get the response in order to avoid the interference from WiFi traffic.