Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 16, Issue 6 - Dec 2015
Volume 16, Issue 5 - Oct 2015
Volume 16, Issue 4 - Aug 2015
Volume 16, Issue 3 - Jun 2015
Volume 16, Issue 2 - Apr 2015
Volume 16, Issue 1 - Feb 2015
Selecting the target year
Design and Implementation of an Embedded Audio Video Bridging Platform for Multichannel Multimedia Transmission
Wee, Jungwook ; Park, Kyoungwon ; Kwon, Kiwon ; Song, Byoungchul ; Kang, Mingoo ;
Journal of Internet Computing and Services, volume 16, issue 2, 2015, Pages 1~6
DOI : 10.7472/jksii.2015.16.2.01
In this paper, we designed an embedded audio video bridging (AVB) platform based on IEEE 802.1BA for real-time multimedia transmission in smart-car, smart-home, smart-theater, and then evaluated a performance of the implemented platform by analysis of IEEE 802.1AS (time synchronization protocol) and IEEE 802.1Qat (stream reservation protocol). Especially, the AVB Layer-2 protocol of MRP(Multiple Registration Protocol), MMAP(Multicast Address Acquisition Protocol), IEEE 1722, 1722.1 etc. was and implemented by linux based operating system. It is shown by interoperability tests with commercial products that the implemented platform transmits real-time multichannel AV data over AVB networks for Multichannel Multimedia Transmission.
Wireless Channel Selection Considering Network Characteristics in Cluster-based Sensor Networks
Kim, Dae-Young ; Kim, BeomSeok ; Cho, Jinsung ;
Journal of Internet Computing and Services, volume 16, issue 2, 2015, Pages 7~17
DOI : 10.7472/jksii.2015.16.2.07
To provide scalability, wireless sensor network has cluster-based architecture. Wireless sensor network can be implemented based on the IEEE 802.15.4 which is exploited in 2.4GHz ISM frequency band. Since this frequency band is used for various data communication, network status of wireless sensor networks frequently changes according to wireless environment. Thus, wireless channel selection to avoid reduction of transmission efficiency is required. This paper estimates network status using the information that a cluster-head collects in a cluster. Through objective function with throughput, RSSI level and reliability as input parameters, this paper proposes proper wireless channel selection. Simulation results show that the proposed method maintains transmission efficiency even though network status changes.
Implementation of EPCIS Capturing Application for Finished Goods Trace History in EPC Network
Kim, Jinsuk ; Shin, Yongtae ;
Journal of Internet Computing and Services, volume 16, issue 2, 2015, Pages 19~26
DOI : 10.7472/jksii.2015.16.2.19
Operating on its own to develop a system or based on the standard to setup and operating of RFID System. If you want to operate RFID system yourself then It is no problem to use its own to develop a system, but have to implementation RFID System based standard for the system integration and data linkage in multiple companies or base. In this paper, I propose an EPCIS Capturing Application of the element for applying an RFID-based EPC Network as an international civil standards organization EPCglobal. EPCIS Capturing Application generation is a message for transmission to EPCIS receives the data transmitted from the reader and middleware to serve to transfer the EPCIS. This paper also proposes Capture Interface capable of receiving the data of the equipment does not use the ALE Interface as a portable RFID reader ALE Interface, as well as used by the RFID reader to implement a fixed system for use in the field. In this paper, we propose a EPCIS Capturing Application for tracking the history RFID is applied to the finished product. It is possible to take advantage to be applied to all systems based on the EPCglobal standard through proposed the EPCIS Capturing Application.
An Inference Method of Stateless Firewall Policy Considering Attack Detection Threshold
Kim, Hyeonwoo ; Kwon, Dongwoo ; Ju, Hongtaek ;
Journal of Internet Computing and Services, volume 16, issue 2, 2015, Pages 27~40
DOI : 10.7472/jksii.2015.16.2.27
Inferring firewall policy is to discover firewall policy by analyzing response packets as results of active probing without any prior information. However, a brute-force approach for generating probing packets is unavailable because the probing packets may be regarded as attack traffic and blocked by attack detection threshold of a firewall. In this paper, we propose a firewall policy inference method using an efficient probing algorithm which considers the number of source IP addresses, maximum probing packets per second and interval size of adjacent sweep lines as inference parameters to avoid detection. We then verify whether the generated probing packets are classified as network attack patterns by a firewall, and present the result of evaluation of the correctness by comparing original firewall policy with inferred firewall policy.
Movie Rating Inference by Construction of Movie Sentiment Sentence using Movie comments and ratings
Oh, Yean-Ju ; Chae, Soo-Hoan ;
Journal of Internet Computing and Services, volume 16, issue 2, 2015, Pages 41~48
DOI : 10.7472/jksii.2015.16.2.41
On movie review sites, movie ratings are determined by netizens' subjective judgement. This means that inconsistency between ratings and opinions from netizens often occurs. To solve this problem, this paper proposes sentiment sentence sets which affect movie evaluation, and apply sets to comments to infer ratings. Creation of sentiment sentence sets is consisted of two stages, construction of sentiment word dictionary and creation of sentiment sentences for sentiment estimation. Sentiment word dictionary contains sentimental words and its polarities included in reviews. Elements of sentiment sentences are combined with movie related noun and predicate from words sentiment word dictionary. In this study, to make correspondence between polarity of sentiment sentence and sentiment word dictionary, sentiment sentences which have different polarity with sentiment word dictionary are removed. The scores of comments are calculated by applying averages of sentiment sentences elements. The result of experiment shows that sentence scores from sentiment sentence sets are closer to reflect real opinion of comments than ratings by netizens'.
A Road Luminance Measurement Application based on Android
Choi, Young-Hwan ; Kim, Hongrae ; Hong, Min ;
Journal of Internet Computing and Services, volume 16, issue 2, 2015, Pages 49~55
DOI : 10.7472/jksii.2015.16.2.49
According to the statistics of traffic accidents over recent 5 years, traffic accidents during the night times happened more than the day times. There are various causes to occur traffic accidents and the one of the major causes is inappropriate or missing street lights that make driver's sight confused and causes the traffic accidents. In this paper, with smartphones, we designed and implemented a lane luminance measurement application which stores the information of driver's location, driving, and lane luminance into database in real time to figure out the inappropriate street light facilities and the area that does not have any street lights. This application is implemented under Native C/C++ environment using android NDK and it improves the operation speed than code written in Java or other languages. To measure the luminance of road, the input image with RGB color space is converted to image with YCbCr color space and Y value returns the luminance of road. The application detects the road lane and calculates the road lane luminance into the database sever. Also this application receives the road video image using smart phone's camera and improves the computational cost by allocating the ROI(Region of interest) of input images. The ROI of image is converted to Grayscale image and then applied the canny edge detector to extract the outline of lanes. After that, we applied hough line transform method to achieve the candidated lane group. The both sides of lane is selected by lane detection algorithm that utilizes the gradient of candidated lanes. When the both lanes of road are detected, we set up a triangle area with a height 20 pixels down from intersection of lanes and the luminance of road is estimated from this triangle area. Y value is calculated from the extracted each R, G, B value of pixels in the triangle. The average Y value of pixels is ranged between from 0 to 100 value to inform a luminance of road and each pixel values are represented with color between black and green. We store car location using smartphone's GPS sensor into the database server after analyzing the road lane video image with luminance of road about 60 meters ahead by wireless communication every 10 minutes. We expect that those collected road luminance information can warn drivers about safe driving or effectively improve the renovation plans of road luminance management.
Methodology for Issue-related R&D Keywords Packaging Using Text Mining
Hyun, Yoonjin ; Shun, William Wong Xiu ; Kim, Namgyu ;
Journal of Internet Computing and Services, volume 16, issue 2, 2015, Pages 57~66
DOI : 10.7472/jksii.2015.16.2.57
Considerable research efforts are being directed towards analyzing unstructured data such as text files and log files using commercial and noncommercial analytical tools. In particular, researchers are trying to extract meaningful knowledge through text mining in not only business but also many other areas such as politics, economics, and cultural studies. For instance, several studies have examined national pending issues by analyzing large volumes of text on various social issues. However, it is difficult to provide successful information services that can identify R&D documents on specific national pending issues. While users may specify certain keywords relating to national pending issues, they usually fail to retrieve appropriate R&D information primarily due to discrepancies between these terms and the corresponding terms actually used in the R&D documents. Thus, we need an intermediate logic to overcome these discrepancies, also to identify and package appropriate R&D information on specific national pending issues. To address this requirement, three methodologies are proposed in this study-a hybrid methodology for extracting and integrating keywords pertaining to national pending issues, a methodology for packaging R&D information that corresponds to national pending issues, and a methodology for constructing an associative issue network based on relevant R&D information. Data analysis techniques such as text mining, social network analysis, and association rules mining are utilized for establishing these methodologies. As the experiment result, the keyword enhancement rate by the proposed integration methodology reveals to be about 42.8%. For the second objective, three key analyses were conducted and a number of association rules between national pending issue keywords and R&D keywords were derived. The experiment regarding to the third objective, which is issue clustering based on R&D keywords is still in progress and expected to give tangible results in the future.
An Illegally-copied App Detecting Method by Using Odex File in Android Platform
Cho, Dueckyoun ; Choi, Jaeyoung ; Kim, Eunhoe ; Gang, Gi-Du ;
Journal of Internet Computing and Services, volume 16, issue 2, 2015, Pages 67~75
DOI : 10.7472/jksii.2015.16.2.67
According to the changes of the mobile environments, the usage and interest of the Android apps have been increased. But the usage of illegally-copied apps has been also increased. And the transparency and dependability of the app markets has been decreased. Therefore there are many cases for the copyright infringement of app developers. Although several methods for preventing illegally-copied apps have been studied, there may exist possible ways to bypass the methods. Since it is difficult to find out the first distributors of the illegally-copied apps, it is not easy to punish them legally. This paper proposes the method of detecting illegally-copied apps. The proposed detector can detect the illegally-copied apps using odex file, which is created when the app is installed. The detector can also find out the information of the first distributors based on forensic watermark technique. Since the illegally-copied app detector is running as a service on the system server, it is granted that the detector hides from the users. As an experiment result, the illegally-copied app detector takes on average within 0.2 seconds to detect and delete an illegally-copied app.
Analysis and Performance Evaluation of Pattern Condensing Techniques used in Representative Pattern Mining
Lee, Gang-In ; Yun, Un-Il ;
Journal of Internet Computing and Services, volume 16, issue 2, 2015, Pages 77~83
DOI : 10.7472/jksii.2015.16.2.77
Frequent pattern mining, which is one of the major areas actively studied in data mining, is a method for extracting useful pattern information hidden from large data sets or databases. Moreover, frequent pattern mining approaches have been actively employed in a variety of application fields because the results obtained from them can allow us to analyze various, important characteristics within databases more easily and automatically. However, traditional frequent pattern mining methods, which simply extract all of the possible frequent patterns such that each of their support values is not smaller than a user-given minimum support threshold, have the following problems. First, traditional approaches have to generate a numerous number of patterns according to the features of a given database and the degree of threshold settings, and the number can also increase in geometrical progression. In addition, such works also cause waste of runtime and memory resources. Furthermore, the pattern results excessively generated from the methods also lead to troubles of pattern analysis for the mining results. In order to solve such issues of previous traditional frequent pattern mining approaches, the concept of representative pattern mining and its various related works have been proposed. In contrast to the traditional ones that find all the possible frequent patterns from databases, representative pattern mining approaches selectively extract a smaller number of patterns that represent general frequent patterns. In this paper, we describe details and characteristics of pattern condensing techniques that consider the maximality or closure property of generated frequent patterns, and conduct comparison and analysis for the techniques. Given a frequent pattern, satisfying the maximality for the pattern signifies that all of the possible super sets of the pattern must have smaller support values than a user-specific minimum support threshold; meanwhile, satisfying the closure property for the pattern means that there is no superset of which the support is equal to that of the pattern with respect to all the possible super sets. By mining maximal frequent patterns or closed frequent ones, we can achieve effective pattern compression and also perform mining operations with much smaller time and space resources. In addition, compressed patterns can be converted into the original frequent pattern forms again if necessary; especially, the closed frequent pattern notation has the ability to convert representative patterns into the original ones again without any information loss. That is, we can obtain a complete set of original frequent patterns from closed frequent ones. Although the maximal frequent pattern notation does not guarantee a complete recovery rate in the process of pattern conversion, it has an advantage that can extract a smaller number of representative patterns more quickly compared to the closed frequent pattern notation. In this paper, we show the performance results and characteristics of the aforementioned techniques in terms of pattern generation, runtime, and memory usage by conducting performance evaluation with respect to various real data sets collected from the real world. For more exact comparison, we also employ the algorithms implementing these techniques on the same platform and Implementation level.
An Automatic Testing Method for EJB Components based on In-Container Testing Strategy
Kuk, Seung-Hak ; Kim, Hyeon Soo ;
Journal of Internet Computing and Services, volume 16, issue 2, 2015, Pages 85~98
DOI : 10.7472/jksii.2015.16.2.85
Component technologies which enable quickly and effectively to develop software have begun to come into the spotlight since early 1990s. Currently, a number of software development works are performed on the J2EE/EJB environment. However component testing is a very complicated task, in addition it requires more efforts than the previous Java class testing. Thus many developers do not perform sufficiently testing works. In this paper we propose an automatic testing method for EJB components based on the in-container testing strategy and implement a testing tool. Since our method builds automatically the test environment for EJB components, it is possible for developers or testers to save their time and efforts at the test preparation phase. Therefore we are convinced that the reliability of EJB components can be increased through sufficient testings with our method.
Labor market forecasts for Information and communication construction business
Kwak, Jeong Ho ; Kwun, Tae Hee ; Oh, Dong-Suk ; Kim, Jung-Woo ;
Journal of Internet Computing and Services, volume 16, issue 2, 2015, Pages 99~107
DOI : 10.7472/jksii.2015.16.2.99
In this era of smart convergent environment wherein all industries are converged on ICT infrastructure and industries and cultures come together, the information and communication construction business is becoming more important. For the information and communication construction business to continue growing, it is very important to ensure that technical manpower is stably supplied. To date, however, there has been no theoretically methodical analysis of manpower supply and demand in the information and communications construction business. The need for the analysis of manpower supply and demand has become even more important after the government announced the road map for the development of construction business in December 2014 to seek measures to strengthen the human resources capacity based on the mid- to long-term manpower supply and demand analysis. As such, this study developed the manpower supply and demand forecast model for the information and communications construction business and presented the result of manpower supply and demand analysis. The analysis suggested that an overdemand situation would arise since the number of graduates of technical colleges decreased beginning 2007 because of fewer students entering technical colleges and due to the restructuring and reform of departments. In conclusion, it cited the need for the reeducation of existing manpower, continuous upgrading of professional development in the information and communications construction business, and provision of various policy incentives.
Design and Implementation of Medical Information System using QR Code
Lee, Sung-Gwon ; Jeong, Chang-Won ; Joo, Su-Chong ;
Journal of Internet Computing and Services, volume 16, issue 2, 2015, Pages 109~115
DOI : 10.7472/jksii.2015.16.2.109
The new medical device technologies for bio-signal information and medical information which developed in various forms have been increasing. Information gathering techniques and the increasing of the bio-signal information device are being used as the main information of the medical service in everyday life. Hence, there is increasing in utilization of the various bio-signals, but it has a problem that does not account for security reasons. Furthermore, the medical image information and bio-signal of the patient in medical field is generated by the individual device, that make the situation cannot be managed and integrated. In order to solve that problem, in this paper we integrated the QR code signal associated with the medial image information including the finding of the doctor and the bio-signal information. bio-signal. System implementation environment for medical imaging devices and bio-signal acquisition was configured through bio-signal measurement, smart device and PC. For the ROI extraction of bio-signal and the receiving of image information that transfer from the medical equipment or bio-signal measurement, .NET Framework was used to operate the QR server module on Window Server 2008 operating system. The main function of the QR server module is to parse the DICOM file generated from the medical imaging device and extract the identified ROI information to store and manage in the database. Additionally, EMR, patient health information such as OCS, extracted ROI information needed for basic information and emergency situation is managed by QR code. QR code and ROI management and the bio-signal information file also store and manage depending on the size of receiving the bio-singnal information case with a PID (patient identification) to be used by the bio-signal device. If the receiving of information is not less than the maximum size to be converted into a QR code, the QR code and the URL information can access the bio-signal information through the server. Likewise, .Net Framework is installed to provide the information in the form of the QR code, so the client can check and find the relevant information through PC and android-based smart device. Finally, the existing medical imaging information, bio-signal information and the health information of the patient are integrated over the result of executing the application service in order to provide a medical information service which is suitable in medical field.
Evaluation of Information Representation Goodness-of-fit According to Protein Visualization Pattern
Byeon, Jaehee ; Choi, Yoo-Joo ; Suh, Jung-Keun ;
Journal of Internet Computing and Services, volume 16, issue 2, 2015, Pages 117~125
DOI : 10.7472/jksii.2015.16.2.117
The information about protein structure gives the clues for the function of protein. It is needed for the improvement for the efficacy and fast development of protein drugs. So, the studies visualizing the structure of protein effectively increase. Most studies of visualization focus on the structural prediction for protein or the improvement on the rendering speed. However, studies of information delivery depending on the form of protein visualization are very limited. The major objective of this study is to analyze the information representation goodness-of-fit for the patterns of the hybrid visualization with primary and secondary structures of protein. Those hybrid visualizations included the patterns which updated current representative visualization services, Chimera, PDB and Cn3D. Information factor to analyze information representation goodness-of-fit is assorted by protein primary structure, secondary protein structure, the location of amino acid and ratio information about protein secondary structure, based on the result of subject-analysis. Subject is the group of experts who are involved in protein drug development over 5 years. The result of this study shows the meaningful difference in the information representation goodness-of-fit by the patterns of hybrid visualization and proves the difference in the information by the pattern of visualization.