Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 15, Issue 6 - Dec 2014
Volume 15, Issue 5 - Oct 2014
Volume 15, Issue 4 - Aug 2014
Volume 15, Issue 3 - Jun 2014
Volume 15, Issue 2 - Apr 2014
Volume 15, Issue 1 - Feb 2014
Selecting the target year
An Analysis of Optimum Transmission Range in MANETs under various Propagation Models
Choi, Hyungseok ; Lee, JaeYong ; Kim, ByungChul ;
Journal of Internet Computing and Services, volume 15, issue 2, 2014, Pages 1~7
DOI : 10.7472/jksii.2014.15.2.01
This paper presents an analytical method for finding the optimum transmission range in mobile ad hoc networks(MANETs). The results are particularly useful for the operation of military networks, as the transmission range affects the throughput, delay, and battery consumption. Plus, the proposed method allows the optimum transmission range to be determined in advance when deploying combatants with mobile terminals. And we analyze the battery life-time and the optimum transmission range under various propagation scenarios based on Hata propagation model. The proposed method obtains the optimum transmission range in a MANET based on the operational conditions.
Topology-aware Packet Size and Forward Rate for Energy Efficiency and Reliability in Dynamic Wireless Body Area Networks
Nguyen-Xuan, Sam ; Kim, Dongwan ; An, Sunshin ;
Journal of Internet Computing and Services, volume 15, issue 2, 2014, Pages 9~18
DOI : 10.7472/jksii.2014.15.2.09
The sensors attached on/in a person are moved since human body frequency changes their activity, therefore in wireless body area networks, nodal mobility and non-line-of-sight condition will impact on performance of networks such as energy efficiency and reliable communication. We then proposed schemes which study on forwarding decisions against frequent change of topology and channel conditions to increase reliable connections and improve energy efficiency. In this work, we control the size of packets, forwarding rate based on ratio of input links and output links at each node. We also robust the network topology by extending the peer to peer IEEE 802.15.4-based. The adaptive topology from chain-based to grid-based can optimal our schemes. The simulation shows that these approaches are not only extending network lifetime to 48.2 percent but also increase around 6.08 percent the packet delivery ratio. The "hot spots" problem is also resolved with this approach.
Channel Searching Method of IEEE 802.15.4 Nodes for Avoiding WiFi Traffic Interference
Song, Myong Lyol ;
Journal of Internet Computing and Services, volume 15, issue 2, 2014, Pages 19~31
DOI : 10.7472/jksii.2014.15.2.19
In this paper, a parallel backoff delay procedure on multiple IEEE 802.15.4 channels and a channel searching method considering the frequency spectrum of WiFi traffic are studied for IEEE 802.15.4 nodes to avoid the interference from WiFi traffic. In order to search the channels being occupied by WiFi traffic, we analyzed the methods measuring the powers of adjacent channels simultaneously, checking the duration of measured power levels greater than a threshold, and finding the same periodicity of sampled RSSI data as the beacon frame by signal processing. In an wireless channel overlapped with IEEE 802.11 network, the operation of CSMA-CA algorithm for IEEE 802.15.4 nodes is explained. A method to execute a parallel backoff procedure on multiples IEEE 802.15.4 channels by an IEEE 802.15.4 device is proposed with the description of its algorithm. When we analyze the data measured by the experimental system implemented with the proposed method, it is observed that medium access delay times increase at the same time in the associated IEEE 802.15.4 channels that are adjacent each other during the generation of WiFi traffic. A channel evaluation function to decide the interference from other traffic on an IEEE 802.15.4 channel is defined. A channel searching method considering the channel evaluations on the adjacent channels together is proposed in order to search the IEEE 802.15.4 channels interfered by WiFi, and the experimental results show that it correctly finds the channels interfered by WiFi traffic.
Efficient Data Scheduling considering number of Spatial query of Client in Wireless Broadcast Environments
Song, Doohee ; Park, Kwangjin ;
Journal of Internet Computing and Services, volume 15, issue 2, 2014, Pages 33~39
DOI : 10.7472/jksii.2014.15.2.33
How to transfer spatial data from server to client in wireless broadcasting environment is shown as following: A server arranges data information that client wants and transfers data by one-dimensional array for broadcasting cycle. Client listens data transferred by the server and returns resulted value only to server. Recently number of users using location-based services is increasing alongside number of objects, and data volume is changing into large amount. Large volume of data in wireless broadcasting environment may increase query time of client. Therefore, we propose Client based Data Scheduling (CDS) for efficient data scheduling in wireless broadcasting environment. CDS divides map and then calculates total sum of objects for each grid by considering number of objects and data size within divided grids. It carries out data scheduling by applying hot-cold method considering total data size of objects for each grid and number of client. It's proved that CDS reduces average query processing time for client compared to existing method.
GP-GPU based Parallelization for Urban Terrain Atmospheric Model CFD_NIMR
Kim, Youngtae ; Park, Hyeja ; Choi, Young-Jeen ;
Journal of Internet Computing and Services, volume 15, issue 2, 2014, Pages 41~47
DOI : 10.7472/jksii.2014.15.2.41
In this paper, we implemented a CUDA Fortran parallel program to run the CFD_NIMR model on GP-GPU's, which simulates air diffusion on urban terrains. A GP-GPU is graphic processing unit in the form of a PCI card, and a general calculation accelerator to perform a large amount of high speed calculations with low cost and electric power. The GP-GPU gives performance enhancement of speed by 15 times to compare the Nvidia Tesla C1060 GPU with Intel XEON 2.0 GHz CPU. In addition, the program on a GP-GPU shows efficient performance compared to an MPI parallel program on multiple CPU's. It is expected that a proposed programming method on the GP-GPU parallel program can be used for numerical models with a similar structure.
An Efficient and Secure Data Storage Scheme using ECC in Cloud Computing
Yin, XiaoChun ; Thiranant, Non ; Lee, HoonJae ;
Journal of Internet Computing and Services, volume 15, issue 2, 2014, Pages 49~58
DOI : 10.7472/jksii.2014.15.2.49
With the fast development of internet, cloud computing has become the most demanded technology used all over the world. Cloud computing facilitates its consumers by providing virtual resources via internet. One of the prominent services offered in cloud computing is cloud storage. The rapid growth of cloud computing also increases severe security concerns to cloud storage. In this paper, we propose a scheme which allows users not only securely store and access data in the cloud, but also share data with multiple users in a secured way via unsecured internet. We use ECC for cryptography and authentication operation which makes the scheme work in a more efficient way.
A study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory
Park, Chanouk ; Lee, Sang-Woo ;
Journal of Internet Computing and Services, volume 15, issue 2, 2014, Pages 59~71
DOI : 10.7472/jksii.2014.15.2.59
This study applied customer perspective to find out ways how to protect customers' privacy by themselves. It does so by examining the factors which affect customer privacy protection behaviors. Based on the Privacy Act, this study developed the construct of Privacy Rights awareness and finds the law's effect on privacy awareness and behavioral change. The study finds that there exists a significant difference in privacy protection behavior according to privacy rights awareness. Independent variables are as follows: Five variables (Perceived vulnerability, Perceived severity, Perceived response effectiveness, Perceived barriers, Privacy Rights awareness) were tested as critical variables influencing Behavioral Intention in PMT model. Privacy awareness had a moderating effect on the relationship between perceived severity and privacy protection behavior. This study would contribute on theoretical expansion of Protection Motivation Theory and also provide practical implications for effective ways to promote behavioral changes.
Analysis of the Facebook Profiles for Korean Users: Description and Determinants
Lee, Mina ; Lee, Seungah ; Choi, Inhye ;
Journal of Internet Computing and Services, volume 15, issue 2, 2014, Pages 73~85
DOI : 10.7472/jksii.2014.15.2.73
This study analyzed the profile of a Facebook account to examine how personal information is revealed and what kinds of factors influence personal information revelation. Categories of user's profile on Facebook were analyzed and two dimensions were developed; the degree that how much personal information is revealed and the network limits that personal information is accessed. Main variables to determine personal information revelation are Facebook privacy concern and uses for social relationships along with gender, the duration of Facebook use, and average time of use. Data were collected from college students. Factor analysis produced two factors of Facebook privacy concern, Facebook privacy concern with users and Facebook privacy concern with the Facebook system. Regression analyses were performed to identify significant determinants of the degree of information revelation and the network limits of personal information. The results found out that the degree of personal information revelation is explained by gender, the duration of use, and use for social relationships while the network limit is explained by the duration of use and Facebook privacy concern with users. Worthy of notice is that use for social relationships and Facebook privacy concern with the Facebook system offset each other. The implications of the results are discussed. Additionally and finally the categories of profiles are graphically re-grouped to show how personal information revelation is associated with social relationship generation and maintenance.
An Exploratory Study on Social Media Users' Ambivalent Attitudes
Seol, Jinah ;
Journal of Internet Computing and Services, volume 15, issue 2, 2014, Pages 87~94
DOI : 10.7472/jksii.2014.15.2.87
Social media which includes Facebook enable users to construct relationships and networks as well as sharing of information. By enlisting Facebook users as proxy, this paper attempted to analyze the different emotional states experienced by social media users, specifically to gauge what effect their usage motivation and usage pattern had on the ambivalence level of the users. The quantitative survey result revealed that usage duration or the time of day when Facebook was accessed had no relevant impact on one's ambivalence level. However, there was a direct correlation between frequency of Facebook usage and the ambivalence level. The more the user logged onto Facebook the more suppressed his or her expression became due to fear of giving negative impressions to others and also receiving their negative feedbacks, which then subsequently added to the user's ambivalence. People's main reasons for using Facebook were identified as "chatting," "communicating," "maintaining relationships," "relationship building," "networking," and "finding information about friends," but only "maintaining relationships," "communicating," and "networking" had observable effect on ambivalence. There were no noticeable differences among genders with regards to ambivalence and usage levels, but there was a marked difference based on the user's age. For example, people in their forties showed higher levels of ambivalence than those in their twenties. This may be attributed to anxiety they face as they use Facebook primarily to expand their networks and to maintain relationships. As such, it is surmised that their fatigue level from using social media will only increase. Meanwhile, Korean Facebook user's emotional manifestation tended to skew toward relation-involved ambivalence rather than the self-defensive type. This relation-involved ambivalence might be something that can actually help prevent damage to relationships by limiting excessive emotional expressions. In other words, such ambivalence by Facebook users may be a positive element in a user's social media interaction.
Examining the Influence of Fit between Project Radicalness and Organizational Innovativeness on the Supply Chain Integration
Min, Dae Hong ; Jeong, Seung Ryul ;
Journal of Internet Computing and Services, volume 15, issue 2, 2014, Pages 95~107
DOI : 10.7472/jksii.2014.15.2.95
This study was conducted to empirically examine the impact of fit between project radicalness and innovativeness of the supply chain on the degree of supply chain integration. In order to test the research hypotheses, a survey was employed. The results show that the degree of supply chain integration varies on the fit between project radicalness and innovativeness of the supply chain. Specifically, when a supply chain consists of two morphogenetic organizations and the supply chain integration project is radical, we see very highly integrated supply chain. We also find high-level integration of supply chain when project is radical even though both a morphogenetic and a homeostatic organization compose a supply chain. However, we find opposite result, which is low integration, if a project is incremental rather than radical and a supply chain is composed of same types of the organizations mentioned above. Interestingly, degree of integration seems to be always low when a supply chain is composed of two homeostatic organizations, regardless of project radicalness. With these findings, this study concludes that a project whose radicalness is match with the supply chain's innovativeness should be chosen for successful supply chain integration.
A Study on the Interactions between the Actors of the 3D Broadcasting Standardization Process
Song, Kyung Hee ; Kwak, Kyu Tae ; Park, Soo Kyung ; Lee, Bong Gyou ;
Journal of Internet Computing and Services, volume 15, issue 2, 2014, Pages 109~127
DOI : 10.7472/jksii.2014.15.2.109
This study is devised out of the recognition that the existing standardization-related research has not sufficiently examined the overall social environment where a standard is actually made and diffused and the roles of the actors and the changes in them in the complex social system where multiple stakeholders exist. Against this backdrop, this study purports to reconstruct the dynamic process of developing and standardizing an innovative technology through a socio-technical approach involved by multiple stakeholders with different interests in the context of a socio-technical institutional environment. The specific goals to achieve the purpose include first, inspecting the characteristics of the interactions between the human actors and between the human and non-human actors in the socio-technical network surrounding a standardization process. Second, the study aimed to observe the activities of the focal actor who led the standardization process and its changing role. To that end, it analyzed the dynamic features of the process of standardizing a HD 3DTV broadcasting technology that took place in South Korea based on the actor network theory. As for the analysis method, the researchers personally took part in the actor network involving the new technology to analyze the dynamic characteristics of the network, applying the qualitative research method of survey and in-depth interviews and exploring the overall dynamics of environment, behavior and technology observed over the course of the entire standardization process.
A Study on Smart card-based Security Mechanisms of upgrades Smart Meter SW for secure deployment in Smart Grid
Yang, Inseok ; Hong, Seokhie ;
Journal of Internet Computing and Services, volume 15, issue 2, 2014, Pages 129~142
DOI : 10.7472/jksii.2014.15.2.129
Latest in Smart Grid projects are emerging as the biggest issue that smart meter should meet the security goal and the SW upgrade for compliance with future standard. However, unlike regular equipment, Smart meters should be designed in accordance with the regulation of legal metrology instrument in order to establish a fair trade-based business and unauthorized changes, it is not allowed and it is strictly limited by law. Therefore, this paper propose a new scheme of certification regarding type approval and verification for legal smart meter as analyzing the requirements of a smart meter regarding upgrade and security. This analysis shows that the proposed scheme comply with the regulation and the specification of smart meter by applying it to smart meter with smart card.
Multiplex Distribution Interface Analyzer Using Memory Sharing Techniqyes on Ethernet Mode for DRM/DRM+ Systems
Woo, Yongje ; Kang, Mingoo ; Seo, Jeongwook ;
Journal of Internet Computing and Services, volume 15, issue 2, 2014, Pages 143~147
DOI : 10.7472/jksii.2014.15.2.143
In this paper, a novel MDI(Multiplex Distribution Interface) analyzer is designed in Ethernet-mode for DRM(Digital Radio Mondiale), and DRM+(Digital Radio Mondiale Plus) systems. The proposed MDI analyzer can reduce the overload of MDI packets by using memory sharing techniques into a common module block. In consequence, it verifies the received MDI packets by composition information of IP(Internet Protocol) and FAC(Fast Access Channel)/SDC(Service Description Channel) in DRM/DRM+ systems for the next generation digital radio broadcasting systems.