Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 16, Issue 6 - Dec 2015
Volume 16, Issue 5 - Oct 2015
Volume 16, Issue 4 - Aug 2015
Volume 16, Issue 3 - Jun 2015
Volume 16, Issue 2 - Apr 2015
Volume 16, Issue 1 - Feb 2015
Selecting the target year
Adaptive Multi-Layer Security Approach for Cyber Defense
Lee, Seong-kee ; Kang, Tae-in ;
Journal of Internet Computing and Services, volume 16, issue 5, 2015, Pages 1~9
DOI : 10.7472/jksii.2015.16.5.01
As attacks in cyber space become advanced and complex, monotonous defense approach of one-one matching manner between attack and defense may be limited to defend them. More efficient defense method is required. This paper proposes multi layers security scheme that can support to defend assets against diverse cyber attacks in systematical and adaptive. We model multi layers security scheme based on Defense Zone including several defense layers and also discuss essential technical elements necessary to realize multi layers security scheme such as cyber threats analysis and automated assignment of defense techniques. Also effects of multi layers security scheme and its applicability are explained. In future, for embodiment of multi layers security scheme, researches about detailed architecture design for Defense Zone, automated method to select the best defense technique against attack and modeling normal state of asset for attack detection are needed.
Control Packet Transmission Decision Method for Wearable Sensor Systems
Yu, Daeun ; Kim, Namgi ;
Journal of Internet Computing and Services, volume 16, issue 5, 2015, Pages 11~17
DOI : 10.7472/jksii.2015.16.5.11
In the general transmission power control model that is used for wearable sensor systems, if RSSI value gets out of the Target RSSI Margin, then the sink node finds new transmission power by using TPC(Transmission Power Control) Algorithm. At this time, the sink node sends the control packet to the sensor node for delivering the newly calculated transmission power. However, when the wireless network channel condition is poor, even it is consuming a lot of control packets, the sink node could not find an appropriate transmission power so it only waste of energy. Therefore, we proposed a new control packet transmission decision method that the sink node changes the transmission power when the wireless network channel condition is stabilized. It makes waste of energy decline. In this paper, we apply control packet transmission decision method to Binary TPC algorithms and analyze the results to evaluate the proposed method. We propose three methods that judge the state of wireless network channel. We experiment that methods and analysis the results.
Block Replacement Scheme based on Reuse Interval for Hybrid SSD System
Yoo, Sanghyun ; Kim, Kyung Tae ; Youn, Hee Yong ;
Journal of Internet Computing and Services, volume 16, issue 5, 2015, Pages 19~27
DOI : 10.7472/jksii.2015.16.5.19
Due to the advantages of fast read/write operation and low power consumption, SSD(Solid State Drive) is now widely adopted as storage device of smart phone, laptop computer, server, etc. However, the shortcomings of SSD such as limited number of write operations and asymmetric read/write operation lead to the problem of shortened life span of SSD. Therefore, the block replacement policy of SSD used as cache for HDD is very important. The existing solutions for improving the lifespan of SSD including the LARC scheme typically employ the LRU algorithm to manage the SSD blocks, which may increase the miss rate in SSD due to the replacement of frequently used block instead of rarely used block. In this paper we propose a novel block replacement scheme which considers the block reuse interval to effectively handle various data read/write patterns. The proposed scheme replaces the block in SSD based on the recency decided by reuse interval and age along with hit ratio. Computer simulation using workload trace files reveals that the proposed scheme consistently improves the performance and lifespan of SSD by increasing the hit ratio and decreasing the number of write operations compared to the existing schemes including LARC.
Analysis and Design of Profiling Adaptor for XML based Energy Storage System
Woo, Yongje ; Park, Jaehong ; Kang, Mingoo ; Kwon, Kiwon ;
Journal of Internet Computing and Services, volume 16, issue 5, 2015, Pages 29~38
DOI : 10.7472/jksii.2015.16.5.29
The Energy Storage System stores electricity for later use. This system can store electricity from legacy electric power systems or renewable energy systems into a battery device when demand is low. When there is high electricity demand, it uses the electricity previously stored and enables efficient energy usage and stable operation of the electric power system. It increases the energy usage efficiency, stabilizes the power supply system, and increases the utilization of renewable energy. The recent increase in the global interest for efficient energy consumption has increased the need for an energy storage system that can satisfy both the consumers' demand for stable power supply and the suppliers' demand for power demand normalization. In general, an energy storage system consists of a Power Conditioning System, a Battery Management System, a battery cell and peripheral devices. The specifications of the subsystems that form the energy storage system are manufacturer dependent. Since the core component interfaces are not standardized, there are difficulties in forming and operating the energy storage system. In this paper, the design of the profile structure for energy storage system and realization of private profiling system for energy storage system is presented. The profiling system accommodates diverse component settings that are manufacturer dependent and information needed for effective operation. The settings and operation information of various PCSs, BMSs, battery cells, and other peripheral device are analyzed to define profile specification and structure. A profile adapter software that can be applied to energy storage system is designed and implemented. The profiles for energy storage system generated by the profile authoring tool consist of a settings profile and operation profile. Setting profile consists of configuration information for energy device what composes energy saving system. To be more specific, setting profile has three parts of category as information for electric control module, sub system, and interface for communication between electric devices. Operation profile includes information in relation to the method in which controls Energy Storage system. The profiles are based on standard XML specification to accommodate future extensions. The profile system has been verified by applying it to an energy storage system and testing charge and discharge operations.
Effect Analysis of an Additional Edge on Centrality and Ranking of Graph Using Computational Experiments
Han, Chi-Geun ; Lee, Sang-Hoon ;
Journal of Internet Computing and Services, volume 16, issue 5, 2015, Pages 39~47
DOI : 10.7472/jksii.2015.16.5.39
The centrality is calculated to describe the importance of a node in a graph and ranking is given according to the centrality for each node. There are many centrality measures and we use degree centrality, closeness centrality, eigenvector centrality, and betweenness centrality. In this paper, we analyze the effect of an additional edge of a graph on centrality and ranking through experimental computations. It is found that the effect of an additional edge on centrality and ranking of the nodes in the graph is different according to the graph structure using PCA. The results can be used for define the graph characteristics.
An Efficient On-line Software Service based on Application Customized Graphic Offloading Library
Choi, WonHyuk ; Kim, Won-Young ;
Journal of Internet Computing and Services, volume 16, issue 5, 2015, Pages 49~57
DOI : 10.7472/jksii.2015.16.5.49
In this Paper, we introduce an efficient on-line software service using an application customized graphic offloading library. The software service based on graphic offloading provides high-end software, like a 3D graphic design tool, as an on-line software service through using a client graphic rendering. When software is executed on server, its graphic works are handled by a client's GPU, while its data works are handled by a server's CPU. To improve the performance, we apply an asynchronous transmission channel scheme to our developed basic graphic offloading engine. Also, we add optimized common module and application specific module to our engine. To do that, we introduce how to implement the application specific module using analyzing patterns of graphic related APIs and messages that are generated by an executed software process. Also, we propose how to design the optimized common module using server side information caching. Finally, through the performance comparison experiment, we show that improved offloading engine has the better performance than old basic offloading engine.
A Stochastic Work-Handover Relationship Model in Workflow-supported Social Networks
Ahn, Hyun ; Kim, Kwanghoon ;
Journal of Internet Computing and Services, volume 16, issue 5, 2015, Pages 59~66
DOI : 10.7472/jksii.2015.16.5.59
A stochastic modeling approach as a mathematical method for workflow intelligence is widely used for analyzing and simulating workflow models in the literature. In particular, as a resource-centric modeling approach, this paper proposes a stochastic model to represent work-handover relationships between performers in a workflow-supported social network. Calculating probabilities for the work-handover relationships are determined by two types of probabilities. One is the work-transition probability between activities, and the other is the task assignment probability between activities and performers. In this paper, we describe formal definitions of stochastic workflow models and stochastic work-handover relationship models, as well. Then, we propose an algorithm for extracting a stochastic work-handover relationship model from a stochastic workflow model. As a consequence, the proposed model ought to be useful in performing resource-centric workflow simulations and model-log comparison analyses.
A Disconnectedness Determination Algorithm on Workflow-supported Enterprise Social Networks
Kim, Mee-sun ; Kim, Kwang-hoon ;
Journal of Internet Computing and Services, volume 16, issue 5, 2015, Pages 67~73
DOI : 10.7472/jksii.2015.16.5.67
In this paper, we propose a disconnectedness determination algorithm for workflow-supported enterprise social networks. this networks can be discovered from the work-allocation relationships between activities and performers in workflow procedures and It networks are useful to analyze, evaluate and numerically explain the work-performance of performers. But there could be the disconnectedness due to the characteristics of workflow, and therefore analysis result of performers can be inappropriate logically as well as mathematically. So, we have to decide whether or not this network is disconnectedness before we analyze workflow-supported enterprise social networks. Conclusively, we try to carry out a thorough investigation into the formation reasons of the disconnectedness, and propose a determination algorithm of the disconnectedness for workflow-supported enterprise social networks.
Practical Methods for Managing Faults in IoT Computing
Park, Chun Woo ; Kim, Soo Dong ;
Journal of Internet Computing and Services, volume 16, issue 5, 2015, Pages 75~86
DOI : 10.7472/jksii.2015.16.5.75
Internet of Thing (IoT) computing is an environment where various devices with sensors and actuators are connect, and interact together to acquire contexts and provide useful services. With the advances of IoT technologies, its usability becomes an in important issue. However, there exist various types of faults in IoT computing which are not conventionally addressed in software research community. Providing reliable IoT services is challenging. In this paper, we present a hierarchy of IoT faults and analyze causes and symptoms of the faults. Based on the analysis, we define effective methods for managing IoT faults. We believe that our proposed framework for managing IoT faults can be utilized in reducing the development cost of IoT applications and enhancing the quality of the applications.
A Survey-based Analysis of Agile Adoption on Performances of IT Organizations
Ghani, Imran ; Bello, Mannir ; Bagiwa, Idris Lawal ;
Journal of Internet Computing and Services, volume 16, issue 5, 2015, Pages 87~92
DOI : 10.7472/jksii.2015.16.5.87
Numerous IT organizations and companies around the world aspire to improve the efficiency and general standard of their software development. The IT organizations want to seize the opportunities and take advantages of new development processes and methodologies. These advantages include higher customers' satisfaction and better software quality among many. In order to achieve them, different agile software methodologies such as scrum, Feature driven development, eXtremeProgramming (XP), Dynamic system development method, Kanban and others have been frequently adopted by IT organizations across the world. Several studies have shown that agile software development methods are effective in a lot of settings. This study, in which 40 agile practitioners from Malaysia participated, additionally confirms the effectiveness of agile development methods. Furthermore, this paper presents some of the critical barriers not well-known by IT-organizations. The results of this analysis can be used to guide IT organization from the obstacles they may face while adopting agile in their environments.
An Explorative Study on the Features of Activity Trackers as IoT based Wearable Devices
Hong, Suk-Ki ;
Journal of Internet Computing and Services, volume 16, issue 5, 2015, Pages 93~98
DOI : 10.7472/jksii.2015.16.5.93
IoT (Internet of Things) is recently burgeoning as business applications as well as ICT itself. Among the business applications of IoT, wearable devices are recognized as a leading area of customer devices. This research first identifies customer needs of activity trackers (fitness trackers), as one of representative wearable devices, and mapping the identified needs with the well-known marketing model of marketing mix (4 P's: Product, Price, Promotion, and Place). Survey was applied to university students for identifying current and potential needs for activity trackers. The needs were classified by 4 P's, and according to the results, different from other IT devices, activity trackers has more potential needs. Moreover, reliable distribution channels, offline and company owned shops were preferred, rather than online shopping mall by third parties. The results would provide some valuable implications to not only designers of activity trackers but also business management.
A Study on Development of Robot - based Teaching-Learning Model for Improving Creativity
Jun, Woochun ;
Journal of Internet Computing and Services, volume 16, issue 5, 2015, Pages 99~105
DOI : 10.7472/jksii.2015.16.5.99
Currently robots are widely used in schools for educational purpose. With wide spread of robot-based education, it is known that major advantage of robot-based education is to enhance creativity and logical thinking of students. Although robots can be very useful tools for assisting students' study activities, there have not been lots of teaching-learning models for robot-based education.In this paper, a teaching-learning model is presented for robot-based education. The proposed model is designed based on constructivism. The proposed model consists of 6 stages: preparation, design, assembling, demonstration run, evaluation, and application & extension. The proposed model has the following characteristics. First, the proposed model is designed to enhance creativity and logical thinking ability of learners. Learners are supposed to be involved in self-directed activities and required to provide results based on their own ideas. Teachers are supposed to mediate students only if necessary. Second, learners are encouraged to participate in activity via diverse interaction. The interaction in this model includes learner-to-learner interaction, learner-to-teacher interaction, and learner-to-expert interaction. The proposed model encourages learners to solve the problem with cooperating each other. Also, teachers are supposed to guide students if necessary and observe and monitor behavior of students all the time. Third, motivation is provided in the beginning stage of the instruction. Fourth, in the proposed model, both study results and study process are equally important. In the model, study process is reviewed at the final stage.