Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 15, Issue 6 - Dec 2014
Volume 15, Issue 5 - Oct 2014
Volume 15, Issue 4 - Aug 2014
Volume 15, Issue 3 - Jun 2014
Volume 15, Issue 2 - Apr 2014
Volume 15, Issue 1 - Feb 2014
Selecting the target year
Bio-inspired Node Selection and Multi-channel Transmission Algorithm in Wireless Sensor Networks
Son, Jae Hyun ; Yang, Yoon-Gi ; Byun, Hee-Jung ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 1~7
DOI : 10.7472/jksii.2014.15.5.01
WireWireless sensor networks(WSNs) are generally comprised of densely deployed sensor nodes, which causes highly redundant sensor data transmission and energy waste. Many studies have focused on energy saving in WSNs. However, delay problem also should be taken into consideration for mission-critical applications. In this paper, we propose a BISA (Bio-Inspired Scheduling Algorithm) to reduce the energy consumption and delay for WSNs inspired by biological systems. BISA investigates energy-efficient routing path and minimizes the energy consumption and delay using multi-channel for data transmission. Through simulations, we observe that the BISA archives energy efficiency and delay guarantees.
A Process-driven IoT-object Collaboration Model
Ahn, Hyun ; Lee, Yongjoon ; Kim, Kwanghoon Pio ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 9~16
DOI : 10.7472/jksii.2014.15.5.09
In recent years, the importance of IoT (Internet of Things) is emphasized by information communication technologies and the performance of various smart devices are rapidly developed and applied in the real world. In this paper, we propose a process-driven IoT-object collaboration model to specify and execute a IoT service based on processes. That is, the purpose of this paper is to suggest a formal method in order to describe a IoT service into a group of tasks having execution order and collaboration between IoT-objects in charge of the enactment of a task. Conclusively, through the proposed model, we expect that IoT services will be automatically executed, analyzed, monitored and reused in the process-driven IoT computing environment.
Estimation of Zero-Error Probability of Constant Modulus Errors for Blind Equalization
Kim, Namyong ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 17~24
DOI : 10.7472/jksii.2014.15.5.17
Blind algorithms designed to maximize the probability that constant modulus errors become zero carry out some summation operations for a set of constant modulus errors at an iteration time inducing heavy complexity. For the purpose of reducing this computational burden induced from the summation, a new approach to the estimation of the zero-error probability (ZEP) of constant modulus errors (CME) and its gradient is proposed in this paper. The ZEP of CME at the next iteration time is shown to be calculated recursively based on the currently calculated ZEP of CME. It also is shown that the gradient for the weight update of the algorithm can be obtained by differentiating the ZEP of CME estimated recursively. From the simulation results that the proposed estimation method of ZEP-CME and its gradient produces exactly the same estimation results with a significantly reduced computational complexity as the block-processing method does.
A Study on Grade Comparison Difference Analysis of the Gifted Children in IT
Jun, Woochun ; Hong, Suk-Ki ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 25~32
DOI : 10.7472/jksii.2014.15.5.25
In the current information and knowledge-based society, a nation`s economy power heavily depends on IT-related industry and technology. In this sense, most countries are trying to foster IT industry by developing new and innovative IT technologies. Traditionally, only a few talented persons have been leading the whole IT industry. Thus, it is very important and necessary to identify and support the gifted children in IT in early ages for development of IT industry. The purpose of this paper is to investigate study performance of the gifted children in IT for different grades. Our research is focused on especially 4th grade students, 5th grade students, and 6th grade students in elementary schools. Among various abilities of the gifted children in IT, in this paper, we are interested in programming ability and logical thinking ability. To our best knowledge, there is no research work on study performance depending on different grades of the gifted children in IT. For this purpose, the gifted students in gifted science education center attached in a university at Seoul Metropolitan Area are selected and their test scores for 8 years were collected and analyzed. The statistical analysis results show that there is no significant difference among 4th grade students, 5th grade students, and 6th grade students for programming ability and logical thinking ability. We hope that this result can help suggest and propose study contents, curriculum, principles and laws for the gifted education in IT.
An Analysis of the Awareness of Undergraduate Students Toward Educational Methods Utilizing SNS
Chung, Mihyun ; Gim, Yeongrok ; Kim, Jaehyoun ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 33~41
DOI : 10.7472/jksii.2014.15.5.33
The purpose of this study is to provide statistical analysis based suggestions on effective methods to take advantage of social network service (SNS) for educational purposes based on investigations of undergraduate students with high utilization of SNS. To achieve this, we conducted an open questionnaire survey and qualitatively analyzed the data using NVivo 10 program. Additionally, to visualize the analysis by education subject of the SNS educational methods, we have divided the data into 3 categories of teacher, student and common area. As a result, our analysis showed that the exchange opinions and discussions, information sharing and learning of contents of questions and answers, surveys, intimacy formation, counseling etc. were of the common area. Furthermore, teacher area included the notice announcement, teaching materials sharing, real-time assessment (quiz), attendance check, assignment grading and feedback, etc. Finally the student area was of project activities (group/individual), prepare and review the shared data, video self learning, peer review and feedback of projects, lecture evaluation, etc.
Factors Influencing the Transaction Satisfaction in B2B e-Marketplace: Lessons from School Food e-Procurement System
Um, Myoung-Yong ; Nam, Seo Woo ; Kim, Tae Ung ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 43~52
DOI : 10.7472/jksii.2014.15.5.43
The purpose of this study is to identify the factors influencing the satisfaction of schools using the school-food B2B e-Marketplace operated by Korea Agro-Fisheries Trade Corporation. This study proposes the social capital, communication, information sharing within the network and support by e-Marketplace as antecedents variables, and collected the survey responses from the schools participating in school-food e-Marketplace. The statistical results indicate that the social capital and support by e-Marketplace has significant impact on the satisfaction level of schools, and support strongly influences the social capital. It was also found that the communication and information sharing within the network influence the social capital and support. These findings may offer the significant implications leading to successful expansion of B2B e-Marketplace in the context of school-food area.
An Empirical Study on Concern for Information Privacy for Smart Phone Users
Lee, Jaejung ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 53~61
DOI : 10.7472/jksii.2014.15.5.53
This research analyzed the relationship between CFIP and Intention to purchase under M-Commerce circumstances. First of all, CFIP had a negative influence on intention to purchase similar to E-Commerce. Secondly, we found privacy fundamentalist groups to react most sensitive to the degree of CFIP. Finally, Mobile experience did not have influence on the relationship between CFIP and Intention to purchase. This result is different from that of the E-Commerce Study. As such, it requires a more comprehensive research.
HBase-based Automatic Summary System using Twitter Trending Topics
Lee, Sanghoon ; Moon, Seung-Jin ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 63~72
DOI : 10.7472/jksii.2014.15.5.63
Twitter has been a popular social media platform where people post short messages of 140 characters or less via the web. A hashtag is a word or acronym created by Twitter users to open a discussion about certain topics and issues that have a very high percentage of trending. Since the hashtag posts are sorted by time, not relevancy, people who firstly use Twitter have had difficulty understanding their context. In this paper, we propose a HBase-based automatic summary system in order to reduce the difficulty of understanding. The proposed system combines an automatic summary method with a fuzzy system after storing the streaming data provided by Twitter API to the HBase. Throughout this procedure, we have eliminated the duplicate of contents in the hashtag posts and have computed scores between posts so that the users can access to the trending topics with relevancy.
Social Category based Recommendation Method
Yoo, So-Yeop ; Jeong, Ok-Ran ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 73~82
DOI : 10.7472/jksii.2014.15.5.73
SNS becomes a recent issue, and many researches in various kinds of field are being done by taking advantage of it. Especially, there are many researches existed on the system that finds user`s interest and makes recommendation based on multiple social data generated on the SNS. User`s interest is not only revealed from the user`s writing but also from the user`s relationship with friends. This study proposes a recommendation method that extracts user`s interest by using social relationship and its categorization applies it to the recommendation. In this way, it can recommend user`s interest with category based on the writings by the user and furthermore it can apply the user`s relationship with his/her friends for more accurate recommendation. In addition, if necessary, the recommendation can be made by extracting any interest shared between the user and specific friends. Through experiments, we show that our method using social category can produce satisfactory result.
Proposal for a Responsive User Interface System based on MPEG-UD
Moon, Jaewon ; Lim, Tae-Beom ; Kum, Seungwoo ; Kim, Taeyang ; Shin, Dong-Hee ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 83~93
DOI : 10.7472/jksii.2014.15.5.83
Providing personalized services customized to users` needs and preferences becomes highlighted as a key area of user-context computing. It is essential for context-aware technology to be developed more intelligent and meaningful services by being widely applied to a variety of sectors and domains. SDO (Standard Development Organization) such as MPEG and W3C has been actively developed to be standardized services and to improve context-awareness services. Yet current standards related to context-aware technology, such as MPEG-7, MPEG-21, MPEG-V, and emotionML, are not capable enough to support various systems and diverse services. Against this backdrop, the MPEG User Description, referred to also as MPEG-UD Standard, is to ensure interoperability among recommendation services, which take into account user`s context when generating recommendations to users. In this light, we introduce standards related to the user context and propose the structure for RD-Engine and the Remote Responsive User Interface(RRUI) system in reference to MPEG-UD. This system collects unit resources matching specific condition according to the user`s contexts described by MPEG-UD. In so doing, it improves adaptive user interface considering device features in real-time. By automatically generating adaptive user interfaces tailored to an individual`s contexts, the proposed system aims to achieve high-quality user experience for a complex service.
Ant Colony Hierarchical Cluster Analysis
Kang, Mun-Su ; Choi, Young-Sik ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 95~105
DOI : 10.7472/jksii.2014.15.5.95
In this paper, we present a novel ant-based hierarchical clustering algorithm, where ants repeatedly hop from one node to another over a weighted directed graph of k-nearest neighborhood obtained from a given dataset. We introduce a notion of node pheromone, which is the summation of amount of pheromone on incoming arcs to a node. The node pheromone can be regarded as a relative density measure in a local region. After a finite number of ants` hopping, we remove nodes with a small amount of node pheromone from the directed graph, and obtain a group of strongly connected components as clusters. We iteratively do this removing process from a low value of threshold to a high value, yielding a hierarchy of clusters. We demonstrate the performance of the proposed algorithm with synthetic and real data sets, comparing with traditional clustering methods. Experimental results show the superiority of the proposed method to the traditional methods.
Development of a Test Framework for Functional and Non-functional Verification of Distributed Systems
Yun, Sangpil ; Seo, Yongjin ; Min, Bup-Ki ; Kim, Hyeon Soo ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 107~121
DOI : 10.7472/jksii.2014.15.5.107
Distributed systems are collection of physically distributed computers linked by a network. General use of wired/wireless Internet enables users to make use of distributed service anytime and anywhere. The explosive growth of distributed services strongly requires functional verification of services as well as verification of non-functional elements such as service quality. In order to verify distributed services it is necessary to build a test environment for distributed systems. Because, however, distributed systems are composed of physically distributed nodes, efforts to construct a test environment are required more than those in a test environment for a monolithic system. In this paper we propose a test framework to verify functional and non-functional features of distributed systems. The suggested framework automatically generates test cases through the message sequence charts, and includes a test driver composed of the virtual nodes which can simulate the physically distributed nodes. The test result can be checked easily through the various graphs and the graphical user interface (GUI). The test framework can reduce testing efforts for a distributed system and can enhance the reliability of the system.
Internet Interconnection settlement model under Asymmetric Network Value Environment
Lee, Sang Woo ; Ko, Chang Youl ; Choi, Sun Me ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 123~132
DOI : 10.7472/jksii.2014.15.5.123
Internet is composed of many independent networks referred to as Internet Service Providers (ISPs) and each provider is generally interconnected based on a commercial agreement. Though many countries are engaged in deregulation in internet interconnection, there is still debate whether the large ISPs are unwilling to peer with small providers, have incentives to lower the quality of data transmission of transit operators or set the interconnection charge regarding the actual costs incurred by the interconnection. Korean government introduced regulations in internet interconnection after observing noticeable anti-competitive behaviors from 2005. This paper analyzes whether there is margin squeeze problem/market concentration, and suggests political proposals in Korean regulation status.
A Protection Technique for Kernel Functions under the Windows Operating System
Back, Dusung ; Pyun, Kihyun ;
Journal of Internet Computing and Services, volume 15, issue 5, 2014, Pages 133~139
DOI : 10.7472/jksii.2014.15.5.133
Recently the Microsoft Windows OS(operating system) is widely used for the internet banking, games etc. The kernel functions provided by the Windows OS can perform memory accesses, keyboard input/output inspection, and graphics output of any processes. Thus, many hacking programs utilizes those for memory hacking, keyboard hacking, and making illegal automation tools for game programs. Existing protection mechanisms make decisions for existence of hacking programs by inspecting some kernel data structures and the initial parts of kernel functions. In this paper, we point out drawbacks of existing methods and propose a new solution. Our method can remedy those by modifying the system service dispatcher code. If the dispatcher code is utilized by a hacking program, existing protection methods cannot detect illegal operations. Thus, we suggest that protection methods should investigate the modification of the dispatcher code as well as kernel data structures and the initial parts of kernel functions.