Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 16, Issue 6 - Dec 2015
Volume 16, Issue 5 - Oct 2015
Volume 16, Issue 4 - Aug 2015
Volume 16, Issue 3 - Jun 2015
Volume 16, Issue 2 - Apr 2015
Volume 16, Issue 1 - Feb 2015
Selecting the target year
A Coexistence Mitigation Scheme in IEEE 802.15.4-based WBAN
Choi, Jong-hyeon ; Kim, Byoung-seon ; Cho, Jin-sung ;
Journal of Internet Computing and Services, volume 16, issue 3, 2015, Pages 1~11
DOI : 10.7472/jksii.2015.16.3.01
WBAN(Wireless Body Area Network) operating around the human body aims at medical and non-medical service at the same time. and it is the short-range communication technology requiring low-power, various data rate and high reliability. Various studies is performing for IEEE 802.15.4, because IEEE 802.15.4 can provide high compatibility for operate WBAN among communication standard satisfiable these requirements. Meanwhile, in the case of coexisting many IEEE 802.15.4-based WBAN, signal interference and collision are the main cause that is decreasing data reliability. but IEEE 802.15.4 Standard does not consider about coexistence of many networks. so it needs improvement. In this paper, To solve about this problem, identify coexistence problem of IEEE 802.15.4-based WBAN by preliminary experiments. and propose a scheme to mitigate the reliability decrease at multiple coexistence WBAN. The proposed scheme can be classified in two steps. The first step is avoidance to collision on the CFP through improving data transmission. The second step is mitigation collision through converting channel access method. Proposed scheme is verified the performance by performing comparison experiment with Standard-based WBAN.
A NFC-based Business Card Management System for Secure Many-to-many Communication
Ko, Kyoung-ah ; Seo, Hee-eun ; Nam, Yunyoung ;
Journal of Internet Computing and Services, volume 16, issue 3, 2015, Pages 13~20
DOI : 10.7472/jksii.2015.16.3.13
This paper proposes a Near Field Communication (NFC) communication system that exchanges information of digital business cards efficiently for many to many communication to solve inconvenience of one-to-one communication when people exchanges business cards each other in meetings such as conference, forum, seminar. The proposed system can provide people to exchange contact information one-to-one as well as multiple members at once using a digital business card system that consists a server and a database based on NFC communication. The system has been developed to collect business card information from a NFC reader and to transfer it directly to a smartphone application effectively. The system can manage business card information with the application effectively and provide security in order to prevent from leakage of private information when transferring contact data.
BoF based Action Recognition using Spatio-Temporal 2D Descriptor
KIM, JinOk ;
Journal of Internet Computing and Services, volume 16, issue 3, 2015, Pages 21~32
DOI : 10.7472/jksii.2015.16.3.21
Since spatio-temporal local features for video representation have become an important issue of modeless bottom-up approaches in action recognition, various methods for feature extraction and description have been proposed in many papers. In particular, BoF(bag of features) has been promised coherent recognition results. The most important part for BoF is how to represent dynamic information of actions in videos. Most of existing BoF methods consider the video as a spatio-temporal volume and describe neighboring 3D interest points as complex volumetric patches. To simplify these complex 3D methods, this paper proposes a novel method that builds BoF representation as a way to learn 2D interest points directly from video data. The basic idea of proposed method is to gather feature points not only from 2D xy spatial planes of traditional frames, but from the 2D time axis called spatio-temporal frame as well. Such spatial-temporal features are able to capture dynamic information from the action videos and are well-suited to recognize human actions without need of 3D extensions for the feature descriptors. The spatio-temporal BoF approach using SIFT and SURF feature descriptors obtains good recognition rates on a well-known actions recognition dataset. Compared with more sophisticated scheme of 3D based HoG/HoF descriptors, proposed method is easier to compute and simpler to understand.
Design and Analysis of Educational Java Applets for Learning Simplification Procedure Using Karnaugh Map
Kim, Dong-Sik ; Jeong, Hye-Kyung ;
Journal of Internet Computing and Services, volume 16, issue 3, 2015, Pages 33~41
DOI : 10.7472/jksii.2015.16.3.33
In this paper, the simplification procedure of Karnaugh Map, which is essential to design digital logic circuits, was implemented as web-based educational Java applets. The learners will be able to experience interesting learning process by executing the proposed Java applets. In addition, since the proposed Java applets were designed to contain educational technologies by step-by-step procedure, the maximization of learning efficiency can be obtained. The learners can make virtual experiments on the simplification of digital logic circuits by clicking on some buttons or filling out some text fields. Furthermore, the Boolean expression and its schematic diagram occurred in the simplification process will be displayed on the separate frame so that the learners can learn effectively. The schematic diagram enables them to check out if the logic circuit is correctly connected or not. Finally, since the simplification algorithm used in the proposed Java applet is based on the modified Quine-McCluskey minimization technique, the proposed Java applets will show more encouraging result in view of learning efficiency if it is used as assistants of the on-campus offline class.
Design of an Efficient Keyword-based Retrieval System Using Concept lattice
Ma, Jin ; Jeon, In ho ; Choi, Young keun ;
Journal of Internet Computing and Services, volume 16, issue 3, 2015, Pages 43~57
DOI : 10.7472/jksii.2015.16.3.43
In this thesis was conducted to propose a method for efficient information retrieval using concept lattices. Since this thesis designed a new system based on ordinary concept lattices, it has the same approach method as ontology, but this thesis proposes new concept lattices to be used by establishing collaborative relations between objects and concepts that users are likely to search information more efficiently. The system suggested by this thesis can be summarized as below. Firstly, this system leads to a collaborative search by using Three kinds of concepts, such as keyword concept lattices, which focus on input key words, expert concept lattices recommended by experts and theme concept lattices, and based on these 3 concept lattices, it will help users search information they want more efficiently. Besides, as the expert concept and the keyword concept become combined, further providing users with the frequency of keyword and the frequency of category, this system can function to recommend key words related to search words entered by users. Another function of this system is to inform users of key words and categories used in users' interested themes by using the theme concept lattices. Secondly, when there is not keyword entered by a user, it is possible for users to achieve the goal of search through the secondary search when this system provides them with key words related to the input keyword. Thirdly, since most of the information is managed while being dispersed, such dispersed and managed information not only has different expression methods but changes as time goes. Accordingly, By using XMDR for efficient data access and integration of distributed information, this thesis proposes a new technique and retrieval system to integrate dispersed data.
User Perspective Website Clustering for Site Portfolio Construction
Kim, Mingyu ; Kim, Namgyu ;
Journal of Internet Computing and Services, volume 16, issue 3, 2015, Pages 59~69
DOI : 10.7472/jksii.2015.16.3.59
Many users visit websites every day to perform information retrieval, shopping, and community activities. On the other hand, there is intense competition among sites which attempt to profit from the Internet users. Thus, the owners or marketing officers of each site try to design a variety of marketing strategies including cooperation with other sites. Through such cooperation, a site can share customers' information, mileage points, and hyperlinks with other sites. To create effective cooperation, it is crucial to choose an appropriate partner site that may have many potential customers. Unfortunately, it is exceedingly difficult to identify such an appropriate partner among the vast number of sites. In this paper, therefore, we devise a new methodology for recommending appropriate partner sites to each site. For this purpose, we perform site clustering from the perspective of visitors' similarities, and then identify a group of sites that has a number of common customers. We then analyze the potential for the practical use of the proposed methodology through its application to approximately 140 million actual site browsing histories.
Performance Analysis of an Estimated Closeness Centrality Ranking Algorithm in Large-Scale Workflow-supported Social Networks
Kim, Jawon ; Ahn, Hyun ; Kim, Kwanghoon ;
Journal of Internet Computing and Services, volume 16, issue 3, 2015, Pages 71~77
DOI : 10.7472/jksii.2015.16.3.71
This paper implements an estimated closeness centrality ranking algorithm in large-scale workflow-supported social networks and performance analyzes of the algorithm. Existing algorithm has a time complexity problem which is increasing performance time by network size. This problem also causes ranking process in large-scale workflow-supported social networks. To solve such problems, this paper conducts comparison analysis on the existing algorithm and estimated results by applying estimated-driven RankCCWSSN(Rank Closeness Centrality Workflow-supported Social Network). The RankCCWSSN algorithm proved its time-efficiency in a procedure about 50% decrease.
An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service
Yu, Hexin ; Sura, Suaini ; Ahn, Jong-chang ;
Journal of Internet Computing and Services, volume 16, issue 3, 2015, Pages 79~93
DOI : 10.7472/jksii.2015.16.3.79
With the rapid development of information technology, the ways of usage have changed drastically. The ways and efficiency of traditional service application to data processing already could not satisfy the requirements of modern users. Nowadays, users have already understood the importance of data. Therefore, the processing and saving of big data have become the main research of the Internet service company. In China, with the rise and explosion of 115 Cloud leads to other technology companies have began to join the battle of cloud services market. Although currently Chinese cloud services are still mainly dominated by cloud storage service, the series of service contents based on cloud storage service have been affirmed by users, and users willing to try these new ways of services. Thus, how to let users to keep using cloud services has become a topic that worth for exploring and researching. The academia often uses the TAM model with statistical analysis to analyze and check the attitude of users in using the system. However, the basic TAM model obviously already could not satisfy the increasing scale of system. Therefore, the appropriate expansion and adjustment to the TAM model (i. e. TAM2 or TAM3) are very necessary. This study has used the status of Chinese internet users and the related researches in other areas in order to expand and improve the TAM model by adding the brand influence, hardware environment and external environments to fulfill the purpose of this study. Based on the research model, the questionnaires were developed and online survey was conducted targeting the cloud services users of four Chinese main cities. Data were obtained from 210 respondents were used for analysis to validate the research model. The analysis results show that the external factors which are service contents, and brand influence have a positive influence to perceived usefulness and perceived ease of use. However, the external factor hardware environment only has a positive influence to the factor of perceived ease of use. Furthermore, the perceived security factor that is influenced by brand influence has a positive influence persistent intention to use. Persistent intention to use also was influenced by the perceived usefulness and persistent intention to use was influenced by the perceived ease of use. Finally, this research analyzed external variables' attributes using other perspective and tried to explain the attributes. It presents Chinese cloud service users are more interested in fundamental cloud services than extended services. In private cloud services, both of increased user size and cooperation among companies are important in the study. This study presents useful opinions for the purpose of strengthening attitude for private cloud service users can use this service persistently. Overall, it can be summarized by considering the all three external factors could make Chinese users keep using the personal could services. In addition, the results of this study can provide strong references to technology companies including cloud service provider, internet service provider, and smart phone service provider which are main clients are Chinese users.
A Smartphone Addiction and Disease Prevention System Through the Collection and Analysis of Smartphone Usage Patterns
Ryu, Myeong-Un ; Ryu, Yo-Han ; Hyun, WooSeok ; Lim, Jiyoung ; You, Ilsun ; Jeong, Hae-Duck ;
Journal of Internet Computing and Services, volume 16, issue 3, 2015, Pages 95~104
DOI : 10.7472/jksii.2015.16.3.95
In recent years, in accordance with the rapidly increasing number of smartphone users, various social problems have started to occur. Examples of these problems are the overuse of smartphones and bad usage habits of smartphone users that can cause new social problems such as smartphone addiction and other smartphone related diseases. With the aim of preventing these social problems, this paper proposes a new smartphone addiction and disease prevention system. This system was developed by collecting and analyzing smartphone usage patterns. This proposed system analyzes the usage patterns and working hours of smartphone users in real time. If the detected smartphone usage patterns reach a dangerous level, the system will send warning messages to the user. This will enable users to recognize the unhealthy situation in advance by themselves. In addition, this solution could possibly prevent smartphone addiction and other smartphone related illness by preventing overuse and encouraging abstinence from using smartphones to the extent that it becomes harmful to the user.
A Study on the Agenda Rank-Order Correlation between Twitter and Portal News about Sewol Ferry Catastrophe
Kim, Shin-Ku ; Choi, Eun-Kyoung ;
Journal of Internet Computing and Services, volume 16, issue 3, 2015, Pages 105~116
DOI : 10.7472/jksii.2015.16.3.105
The Sewol ferry catastrophe that took place on April 16 2014 was unprecedented in terms of its sociopolitical implications, which had reverberated throughout the Korean nation. Mindful of such distinct characteristics of the Sewol ferry catastrophe, this thesis looks into the salience of the agendas portrayed in Twitter and Portal News coverage on the disaster and the correlation between the attribute-specific agendas of the foregoing mediums by making use of the agenda rank order correlation method. Extraction and analysis of big data revealed that first, while the hypothesis that there were little difference in terms of salience among the main agendas between Twitter and Portal News was dismissed, the rank order correlation proved to be high as regards the main agendas on Twitter and Portal News. This signifies that Twitter agendas exert influence over those on Portal News. Next, and regarding the five main agendas on the incident, there existed differences in salience between the attribute-specific agendas of the two mediums, with low figures for corresponding rank order correlations. Such results signify that Twitter and Portal News have little influence over each other as regards their agenda rank order correlation.
Measuring CSV Performance: An Explorative Study on Strategic Activities in Converged Home Appliance Industry
Lee, Hye Sun ; Park, Soo Kyung ; Cho, Ji Yeon ; Kim, Taisiya ; Lee, Bong Gyou ;
Journal of Internet Computing and Services, volume 16, issue 3, 2015, Pages 117~126
DOI : 10.7472/jksii.2015.16.3.117
The concept of Creating Shared Value (CSV) has emerged as a solution for companies' sustainable growth and social problems through collaboration of business activities and social demand. Therefore, studies on shared value creativity and measurement of companies' performances are required. However, most recent studies have applied the CSV concept to existing business models or measure shared value considering only economic value. Few studies have considered the appropriateness of applying the CSV or discussed performance measurement with respect to industry characteristics. This study selects the industry expected to have the greatest created value with applying the CSV, and then suggests measurement of performance in this industry. First, through the expert interview, the study selects one from among South Korea's 10 main industries, which is expected to solve social demand through convergence with the IT industry, and to create new value for a traditional industry. The Home Appliance industry was selected as appropriate, because it has industrial growth stagnation under the smart environment. Moreover, it is facing problems such as energy savings and environmental issues. The study goes on to suggest, based on Michael Porter's three strategic levels, measurement variables of the value creation process and performance. This study has limitations from an empirical perspective. However, as the interest of applying CSV to business is growing, it is meaningful to explore the CSV strategies activities and measurement performance based on industry-specific characteristics.