Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 16, Issue 6 - Dec 2015
Volume 16, Issue 5 - Oct 2015
Volume 16, Issue 4 - Aug 2015
Volume 16, Issue 3 - Jun 2015
Volume 16, Issue 2 - Apr 2015
Volume 16, Issue 1 - Feb 2015
Selecting the target year
Design of UWB/WiFi Module based Wireless Transmission for Endoscopic Camera
Shim, Dongha ; Lee, Jaegon ; Yi, Jaeson ; Cha, Jaesang ; Kang, Mingoo ;
Journal of Internet Computing and Services, volume 16, issue 1, 2015, Pages 1~8
DOI : 10.7472/jksii.2015.16.1.01
Ultra-wide-angle wireless endoscopes are demonstrated in this paper. The endoscope is composed of an ultra-wide-angle camera module and wireless transmission module. A lens unit with the ultra-wide FOV of 162 degrees is designed and manufactured. The lens, image sensor, and camera processor unit are packaged together in a
case. The wireless transmission modules are implemented based on UWB- and WiFi-based platform, respectively. The UWB-based module can transmit HD video to a computer in resolution of
(QXGA) and the frame rate of 15 fps in MJPEG compression mode. The maximum data transfer rate reaches 41.2 Mbps. The FOV and the resolution of the endoscope is comparable to a medical-grade endoscope. The FOV and resolution is ~3X and 16X higher than that of a commercial high-performance WiFi endoscope, respectively. The WiFi-based module streams out video to a smart device with th maximum date transfer rate of 1.5 Mbps at the resolution of
(VGA) and the frame rate of 30 fps in MJPEG compression mode. The implemented components show the feasibility of cheap medical-grade wireless electronic endoscopes, which can be effectively used in u-healthcare, emergency treatment, home-healthcare, remote diagnosis, etc.
The secured mobile wallet system using by integrated ID
Nam, Choon-Sung ; Jeon, Min-Kyung ; Shin, Dong-Ryeol ;
Journal of Internet Computing and Services, volume 16, issue 1, 2015, Pages 9~20
DOI : 10.7472/jksii.2015.16.1.09
Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.
The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
Chae, Cheol-Joo ; Choi, Kwang-Nam ; Choi, Kiseok ; Yae, Yong-Hee ; Shin, YounJu ;
Journal of Internet Computing and Services, volume 16, issue 1, 2015, Pages 21~28
DOI : 10.7472/jksii.2015.16.1.21
Currently there are wide variety of web services and applications available for users. Such services restrict access to only authorized users, and therefore its users often need to go through the inconvenience of getting an authentication from each service every time. To resolve of such inconvenience, a third party application with OAuth(Open Authorization) protocol that can provide restricted access to different web services has appeared. OAuth protocol provides applicable and flexible services to its users, but is exposed to reply attack, phishing attack, impersonation attack. Therefore we propose method that after authentication Access Token can be issued by using the E-mail authentication. In proposed method, regular user authentication success rate is high when value is 5 minutes. However, in the case of the attacker, the probability which can be gotten certificated is not more than the user contrast 0.3% within 5 minutes.
A Robust Staff Line Height and Staff Line Space Estimation for the Preprocessing of Music Score Recognition
Na, In-Seop ; Kim, Soo-Hyung ; Nquyen, Trung Quy ;
Journal of Internet Computing and Services, volume 16, issue 1, 2015, Pages 29~37
DOI : 10.7472/jksii.2015.16.1.29
In this paper, we propose a robust pre-processing module for camera-based Optical Music Score Recognition (OMR) on mobile device. The captured images likely suffer for recognition from many distortions such as illumination, blur, low resolution, etc. Especially, the complex background music sheets recognition are difficult. Through any symbol recognition system, the staff line height and staff line space are used many times and have a big impact on recognition module. A robust and accurate staff line height and staff line space are essential. Some staff line height and staff line space are proposed for binary image. But in case of complex background music sheet image, the binarization results from common binarization algorithm are not satisfactory. It can cause incorrect staff line height and staff line space estimation. We propose a robust staff line height and staff line space estimation by using run-length encoding technique on edge image. Proposed method is composed of two steps, first step, we conducted the staff line height and staff line space estimation based on edge image using by Sobel operator on image blocks. Each column of edge image is encoded by run-length encoding algorithm Second step, we detect the staff line using by Stable Path algorithm and removal the staff line using by adaptive Line Track Height algorithm which is to track the staff lines positions. The result has shown that robust and accurate estimation is possible even in complex background cases.
An Automatic Mobile Cell Counting System for the Analysis of Biological Image
Seo, Jaejoon ; Chun, Junchul ; Lee, Jin-Sung ;
Journal of Internet Computing and Services, volume 16, issue 1, 2015, Pages 39~46
DOI : 10.7472/jksii.2015.16.1.39
This paper presents an automatic method to detect and count the cells from microorganism images based on mobile environments. Cell counting is an important process in the field of biological and pathological image analysis. In the past, cell counting is done manually, which is known as tedious and time consuming process. Moreover, the manual cell counting can lead inconsistent and imprecise results. Therefore, it is necessary to make an automatic method to detect and count cells from biological images to obtain accurate and consistent results. The proposed multi-step cell counting method automatically segments the cells from the image of cultivated microorganism and labels the cells by utilizing topological analysis of the segmented cells. To improve the accuracy of the cell counting, we adopt watershed algorithm in separating agglomerated cells from each other and morphological operation in enhancing the individual cell object from the image. The system is developed by considering the availability in mobile environments. Therefore, the cell images can be obtained by a mobile phone and the processed statistical data of microorganism can be delivered by mobile devices in ubiquitous smart space. From the experiments, by comparing the results between manual and the proposed automatic cell counting we can prove the efficiency of the developed system.
Medical Information Dynamic Access System in Smart Mobile Environments
Jeong, Chang Won ; Kim, Woo Hong ; Yoon, Kwon Ha ; Joo, Su Chong ;
Journal of Internet Computing and Services, volume 16, issue 1, 2015, Pages 47~55
DOI : 10.7472/jksii.2015.16.1.47
Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.
Improvement of Energy Efficiency of Plants Factory by Arranging Air Circulation Fan and Air Flow Control Based on CFD
Moon, Seung-Mi ; Kwon, Sook-Youn ; Lim, Jae-Hyun ;
Journal of Internet Computing and Services, volume 16, issue 1, 2015, Pages 57~65
DOI : 10.7472/jksii.2015.16.1.57
As information technology fusion is accelerated, the researches to improve the quality and productivity of crops inside a plant factory actively progress. Advanced growth environment management technology that can provide thermal environment and air flow suited to the growth of crops and considering the characteristics inside a facility is necessary to maximize productivity inside a plant factory. Currently running plant factories are designed to rely on experience or personal judgment; hence, design and operation technology specific to plant factories are not established, inherently producing problems such as uneven crop production due to the deviation of temperature and air flow and additional increases in energy consumption after prolonged cultivation. The optimization process has to be set up in advance for the arrangement of air flow devices and operation technology using computational fluid dynamics (CFD) during the design stage of a facility for plant factories to resolve the problems. In this study, the optimum arrangement and air flow of air circulation fans were investigated to save energy while minimizing temperature deviation at each point inside a plant factory using CFD. The condition for simulation was categorized into a total of 12 types according to installation location, quantity, and air flow changes in air circulation fans. Also, the variables of boundary conditions for simulation were set in the same level. The analysis results for each case showed that an average temperature of 296.33K matching with a set temperature and average air flow velocity of 0.51m/s suiting plant growth were well-maintained under Case 4 condition wherein two sets of air circulation fans were installed at the upper part of plant cultivation beds. Further, control of air circulation fan set under Case D yielded the most excellent results from Case D-3 conditions wherein air velocity at the outlet was adjusted to 2.9m/s.
Performance analysis of Frequent Itemset Mining Technique based on Transaction Weight Constraints
Yun, Unil ; Pyun, Gwangbum ;
Journal of Internet Computing and Services, volume 16, issue 1, 2015, Pages 67~74
DOI : 10.7472/jksii.2015.16.1.67
In recent years, frequent itemset mining for considering the importance of each item has been intensively studied as one of important issues in the data mining field. According to strategies utilizing the item importance, itemset mining approaches for discovering itemsets based on the item importance are classified as follows: weighted frequent itemset mining, frequent itemset mining using transactional weights, and utility itemset mining. In this paper, we perform empirical analysis with respect to frequent itemset mining algorithms based on transactional weights. The mining algorithms compute transactional weights by utilizing the weight for each item in large databases. In addition, these algorithms discover weighted frequent itemsets on the basis of the item frequency and weight of each transaction. Consequently, we can see the importance of a certain transaction through the database analysis because the weight for the transaction has higher value if it contains many items with high values. We not only analyze the advantages and disadvantages but also compare the performance of the most famous algorithms in the frequent itemset mining field based on the transactional weights. As a representative of the frequent itemset mining using transactional weights, WIS introduces the concept and strategies of transactional weights. In addition, there are various other state-of-the-art algorithms, WIT-FWIs, WIT-FWIs-MODIFY, and WIT-FWIs-DIFF, for extracting itemsets with the weight information. To efficiently conduct processes for mining weighted frequent itemsets, three algorithms use the special Lattice-like data structure, called WIT-tree. The algorithms do not need to an additional database scanning operation after the construction of WIT-tree is finished since each node of WIT-tree has item information such as item and transaction IDs. In particular, the traditional algorithms conduct a number of database scanning operations to mine weighted itemsets, whereas the algorithms based on WIT-tree solve the overhead problem that can occur in the mining processes by reading databases only one time. Additionally, the algorithms use the technique for generating each new itemset of length N+1 on the basis of two different itemsets of length N. To discover new weighted itemsets, WIT-FWIs performs the itemset combination processes by using the information of transactions that contain all the itemsets. WIT-FWIs-MODIFY has a unique feature decreasing operations for calculating the frequency of the new itemset. WIT-FWIs-DIFF utilizes a technique using the difference of two itemsets. To compare and analyze the performance of the algorithms in various environments, we use real datasets of two types (i.e., dense and sparse) in terms of the runtime and maximum memory usage. Moreover, a scalability test is conducted to evaluate the stability for each algorithm when the size of a database is changed. As a result, WIT-FWIs and WIT-FWIs-MODIFY show the best performance in the dense dataset, and in sparse dataset, WIT-FWI-DIFF has mining efficiency better than the other algorithms. Compared to the algorithms using WIT-tree, WIS based on the Apriori technique has the worst efficiency because it requires a large number of computations more than the others on average.
A Study on the Link Server Development Using B-Tree Structure in the Big Data Environment
Park, Sungbum ; Hwang, Jong Sung ; Lee, Sangwon ;
Journal of Internet Computing and Services, volume 16, issue 1, 2015, Pages 75~82
DOI : 10.7472/jksii.2015.16.1.75
Major corporations and portals have implemented a link server that connects Content Management Systems (CMS) to the physical address of content in a database (DB) to support efficient content use in web-based environments. In particular, a link server automatically connects the physical address of content in a DB to the content URL shown through a web browser screen, and re-connects the URL and the physical address when either is modified. In recent years, the number of users of digital content over the web has increased significantly because of the advent of the Big Data environment, which has also increased the number of link validity checks that should be performed in a CMS and a link server. If the link validity check is performed through an existing URL-based sequential method instead of petabyte or even etabyte environments, the identification rate of dead links decreases because of the degradation of validity check performance; moreover, frequent link checks add a large amount of workload to the DB. Hence, this study is aimed at providing a link server that can recognize URL link deletion or addition through analysis on the B-tree-based Information Identifier count per interval based on a large amount of URLs in order to resolve the existing problems. Through this study, the dead link check that is faster and adds lower loads than the existing method can be performed.
Emergence of Social Networked Journalism Model: A Case Study of Social News Site, "wikitree"
Seol, Jinah ;
Journal of Internet Computing and Services, volume 16, issue 1, 2015, Pages 83~90
DOI : 10.7472/jksii.2015.16.1.83
This paper examines the rising value of social networked journalism and analyzes the case of a social news site based on the theory of networked journalism. Social networked journalism allows the public to be involved in every aspect of journalism production through crowd-sourcing and interactivity. The networking effect with the public is driving journalism to transform into a more open, more networked and more responsive venue. "wikitree" is a social networking news service on which anybody can write news and disseminate it via Facebook and Twitter. It is operated as an open sourced program which incorporates "Google Translate" to automatically convert all its content, enabling any global citizen with an Internet access to contribute news production and share either their own creative contents or generated contents from other sources. Since its inception, "wikitree global" site has been expanding its coverage rapidly with access points arising from 160 countries. Analyzing its international coverage by country and by news category as well as by the unique visit numbers via SNS, the results of the case study imply that networking with the global public can enhance news traffic to the social news site as well as to specific news items. The results also suggest that the utilization of Twitter and Facebook in social networked journalism can break the boundary between local and global public by extending news-gathering ability while growing audience's interest in the site, and engender a feasible business model for a local online journalism.
Sensitivity Analysis of Quasi-Governmental Agencies' Decisions for Cloud Computing Service
Song, In Kuk ;
Journal of Internet Computing and Services, volume 16, issue 1, 2015, Pages 91~100
DOI : 10.7472/jksii.2015.16.1.91
Recently many companies began to feel the pressures of cost savings due to the global recession, so they have been interested in the Cloud Computing. Cloud Computing is one of using method of IT resources through the network. Users can borrow softwares or hardwares instead of buying them. Many people expect remarkable growth in Cloud Computing industry because of it's effectiveness. But Cloud Computing industry is still at an early stage. Especially, people who in the public sector hesitate to adopt Cloud Computing Services due to security issues and their conservative views. Also, they just have limited understanding, so we need to investigate what they really know and understand. Researches about the Cloud Computing generally focus on technical issues, so we can hardly find researches reference for decision making in considering the services. The study aims to investigate diverse factors for agencies' adoption decisions, such as benefits, costs, and risk in developing the most ideal type of cloud computing service for them, and performs priority analyses by applying ANP (Analytic Network Process). The results identify that features pertaining to the risk properties were considered the most significant factors. According to this research, the usage of private cloud computing services may prove to be appropriate for public environment in Korea. The study will hopefully provide the guideline to many governmental agencies and service providers, and assist the related authorities with cloud computing policy in coming up with the relevant regulations.
Factors of Leading the Adoption of Diet/Exercise Apps on Smartphones: Application of Channel Expansion Theory
Cho, Jaehee ; Kim, Sun Jin ;
Journal of Internet Computing and Services, volume 16, issue 1, 2015, Pages 101~108
DOI : 10.7472/jksii.2015.16.1.101
This study paid attention to the notable increase of the use of diet/exercise apps on smartphones. Based on channel expansion theory and technology acceptance model (TAM), this study investigated how three predictors-Internet information use efficacy, Internet information credibility, smartphone use efficacy-affected one's attitude toward and intention to use diet/exercise apps. Results from a path analysis indicated that Internet information use efficacy and smartphone use efficacy positively predict the perceived ease of use of diet/exercise apps. Internet information credibility positively predicts the perceived usefulness of such apps. Moreover, there were gender differences in the effects of both Internet information use efficacy and Internet information credibility on the perceived usefulness of diet/exercise apps.