Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 16, Issue 6 - Dec 2015
Volume 16, Issue 5 - Oct 2015
Volume 16, Issue 4 - Aug 2015
Volume 16, Issue 3 - Jun 2015
Volume 16, Issue 2 - Apr 2015
Volume 16, Issue 1 - Feb 2015
Selecting the target year
On Frequency Separation among Radio Access Technologies in Heterogeneous Networks
Lee, Kyoung-Jae ; Jo, Han-Shin ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 1~9
DOI : 10.7472/jksii.2015.16.6.01
In this paper, we study the coexistence of typical radio access technologies (WiMAX, CDMA, WLAN) in heterogeneous networks. Although the radio accesses employ different frequency band, they can interfere with each other due to out-of- band emission. We compute the minimum adjacent channel interference ratio (ACIR) to satisfy the allowable level of interference, and the resulting minimum frequency separation (guard band) between interfering and victim system. We observe that WiMAX-WLAN coexistence and WiMAX-CDMA coexistence are feasible with at least 20 MHz and 15 MHz guard bands, respectively.
NUI/NUX of the Virtual Monitor Concept using the Concentration Indicator and the User's Physical Features
Jeon, Chang-hyun ; Ahn, So-young ; Shin, Dong-il ; Shin, Dong-kyoo ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 11~21
DOI : 10.7472/jksii.2015.16.6.11
As growing interest in Human-Computer Interaction(HCI), research on HCI has been actively conducted. Also with that, research on Natural User Interface/Natural User eXperience(NUI/NUX) that uses user's gesture and voice has been actively conducted. In case of NUI/NUX, it needs recognition algorithm such as gesture recognition or voice recognition. However these recognition algorithms have weakness because their implementation is complex and a lot of time are needed in training because they have to go through steps including preprocessing, normalization, feature extraction. Recently, Kinect is launched by Microsoft as NUI/NUX development tool which attracts people's attention, and studies using Kinect has been conducted. The authors of this paper implemented hand-mouse interface with outstanding intuitiveness using the physical features of a user in a previous study. However, there are weaknesses such as unnatural movement of mouse and low accuracy of mouse functions. In this study, we designed and implemented a hand mouse interface which introduce a new concept called 'Virtual monitor' extracting user's physical features through Kinect in real-time. Virtual monitor means virtual space that can be controlled by hand mouse. It is possible that the coordinate on virtual monitor is accurately mapped onto the coordinate on real monitor. Hand-mouse interface based on virtual monitor concept maintains outstanding intuitiveness that is strength of the previous study and enhance accuracy of mouse functions. Further, we increased accuracy of the interface by recognizing user's unnecessary actions using his concentration indicator from his encephalogram(EEG) data. In order to evaluate intuitiveness and accuracy of the interface, we experimented it for 50 people from 10s to 50s. As the result of intuitiveness experiment, 84% of subjects learned how to use it within 1 minute. Also, as the result of accuracy experiment, accuracy of mouse functions (drag(80.4%), click(80%), double-click(76.7%)) is shown. The intuitiveness and accuracy of the proposed hand-mouse interface is checked through experiment, this is expected to be a good example of the interface for controlling the system by hand in the future.
Clustering Algorithm using the DFP-Tree based on the MapReduce
Seo, Young-Won ; Kim, Chang-soo ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 23~30
DOI : 10.7472/jksii.2015.16.6.23
As BigData is issued, many applications that operate based on the results of data analysis have been developed, typically applications are products recommend service of e-commerce application service system, search service on the search engine service and friend list recommend system of social network service. In this paper, we suggests a decision frequent pattern tree that is combined the origin frequent pattern tree that is mining similar pattern to appear in the data set of the existing data mining techniques and decision tree based on the theory of computer science. The decision frequent pattern tree algorithm improves about problem of frequent pattern tree that have to make some a lot's pattern so it is to hard to analyze about data. We also proposes to model for a Mapredue framework that is a programming model to help to operate in distributed environment.
Design and Implementation of Smart Gardening System Using Real-Time Visualization Algorithm Based on IoT
Son, Soo-A ; Park, Seok-Cheon ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 31~37
DOI : 10.7472/jksii.2015.16.6.31
Data generated from sensors are exploding with recent development of IoT. This paradigm shift requires various industry fields that demand instant actions to analyze the arising data on a real-time basis, along with the real-time visualization analysis. As the existing visualization systems, however, perform visualization after storing data, the response time of the server cannot guarantee the ms-level processing that is close to real-time. They also have a problem of destroying data that can be major resources as they do not possess the process resources. Therefore, a smart gardening system that applies a real-time visualization algorithm using IoT sensing data under a gardening environment was designed and implement in this study. The response time of the server was measured to evaluate the performance of the suggested system. As a result, the response speed of the suggested real-time visualization algorithm was guaranteeing the ms-level processing close to real-time.
Knowledge Structure Analysis System for Critical Learning Pathway
Lee, Sanghoon ; Moon, Seung-jin ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 39~46
DOI : 10.7472/jksii.2015.16.6.39
Knowledge space theory is a theory that provides a guidelines for human learners' possible education decisions and has been used in various educational environment. However, traditional methodologies using the knowledge space theory have always depended on handwork system and it is necessary to learn programming language such as Visual Basic and R, causing time consuming situations. In order to overcome those issues on the environment of education we propose a new Knowledge Structure Analysis System that not just analyzes learners' knowledge structures automatically but to provide critical learning path for the learners based on knowledge space theory. Proposed system is implemented by using rApache generating critical learning path computing Chi-square value. This provides an automatic way of analyzing knowledge structure in learners' knowledge space and shows systematic reviews for the knowledge space.
Dynamic Service Chaining Method Considering Performance of Middlebox Over SDN
Oh, Hyeongseok ; Kim, Namgi ; Choi, Yoon-Ho ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 47~55
DOI : 10.7472/jksii.2015.16.6.47
The conventional dynamic routing methods in Software Defined Networks (SDN) set the optimal routing path based on the minimum link cost, and thereby transmits the incoming or outgoing flows to the terminal. However, in this case, flows can bypass the middlebox that is responsible for security service and thus, thus the network can face a threat. That is, while determining the best route for each flow, it is necessary to consider a dynamic service chaining, which routes a flow via a security middlebox. Therefore, int this paper, we propose a new dynamic routing method that considers the dynamic flow routing method combined with the security service functions over the SDN.
An Fuzzy-based Risk Reasoning Driving Strategy on VANET
Lee, Byung-Kwan ; Jeong, Yi-Na ; Jeong, Eun-Hee ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 57~67
DOI : 10.7472/jksii.2015.16.6.57
This paper proposes an Fuzzy-based Risk Reasoning Driving Strategy on VANET. Its first reasoning phase consists of a WC_risk reasoning that reasons the risk by using limited road factors such as current weather, density, accident, and construction, a DR_risk reasoning that reasons the risk by combining the driving resistance with the weight value suitable for the environment of highways and national roads, a DS_risk reasoning that judges the collision risk by using the travel direction, speed. and distance of vehicles and pedestrians, and a Total_risk reasoning that computes a final risk by using the three above-mentioned reasoning. Its second speed reduction proposal phase decides the reduction ratio according to the result of Total_risk and the reduction ratio by comparing the regulation speed of road to current vehicle's speed. Its third risk notification phase works in case current driving speed exceeds regulation speed or in case the Total_risk is higher than AV(Average Value). The Risk Notification Phase informs rear vehicles or pedestrians around of a risk according to drivers's response. If drivers use a brake according to the proposed speed reduction, the precedent vehicles transfers Risk Notification Messages to rear vehicles. If they don't use a brake, a current driving vehicle transfers a Risk Message to pedestrians. Therefore, this paper not only prevents collision accident beforehand by reasoning the risk happening to pedestrians and vehicles but also decreases the loss of various resources by reducing traffic jam.
Development of Intelligent Multi-Agent in the Game Environment
Kim, DongMin ; Choi, JinWoo ; Woo, ChongWoo ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 69~78
DOI : 10.7472/jksii.2015.16.6.69
Recently, research on the multi-agent system is developed actively in the various fields, especially on the control of complex system and optimization. In this study, we develop a multi-agent system for NPC simulation in game environment. The purpose of the development is to support quick and precise decision by inferencing the situation of the dynamic discrete domain, and to support an optimization process of the agent system. Our approach employed Petri-net as a basic agent model to simplify structure of the system, and used fuzzy inference engine to support decision making in various situation. Our experimentation describes situation of the virtual battlefield between the NPCs, which are divided two groups, such as fuzzy rule based agent and automata based agent. We calculate the percentage of winning and survival rate from the several simulations, and the result describes that the fuzzy rule based agent showed better performance than the automata based agent.
An Improved Combined Content-similarity Approach for Optimizing Web Query Disambiguation
Kamal, Shahid ; Ibrahim, Roliana ; Ghani, Imran ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 79~88
DOI : 10.7472/jksii.2015.16.6.79
The web search engines are exposed to the issue of uncertainty because of ambiguous queries, being input for retrieving the accurate results. Ambiguous queries constitute a significant fraction of such instances and pose real challenges to web search engines. Moreover, web search has created an interest for the researchers to deal with search by considering context in terms of location perspective. Our proposed disambiguation approach is designed to improve user experience by using context in terms of location relevance with the document relevance. The aim is that providing the user a comprehensive location perspective of a topic is informative than retrieving a result that only contains temporal or context information. The capacity to use this information in a location manner can be, from a user perspective, potentially useful for several tasks, including user query understanding or clustering based on location. In order to carry out the approach, we developed a Java based prototype to derive the contextual information from the web results based on the queries from the well-known datasets. Among those results, queries are further classified in order to perform search in a broad way. After the result provision to users and the selection made by them, feedback is recorded implicitly to improve the web search based on contextual information. The experiment results demonstrate the outstanding performance of our approach in terms of precision 75%, accuracy 73%; recall 81% and f-measure 78% when compared with generic temporal evaluation approach and furthermore achieved precision 86%, accuracy 71%; recall 67% and f-measure 75% when compared with web document clustering approach.
Performance Analysis of Top-K High Utility Pattern Mining Methods
Ryang, Heungmo ; Yun, Unil ; Kim, Chulhong ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 89~95
DOI : 10.7472/jksii.2015.16.6.89
Traditional frequent pattern mining discovers valid patterns with no smaller frequency than a user-defined minimum threshold from databases. In this framework, an enormous number of patterns may be extracted by a too low threshold, which makes result analysis difficult, and a too high one may generate no valid pattern. Setting an appropriate threshold is not an easy task since it requires the prior knowledge for its domain. Therefore, a pattern mining approach that is not based on the domain knowledge became needed due to inability of the framework to predict and control mining results precisely according to the given threshold. Top-k frequent pattern mining was proposed to solve the problem, and it mines top-k important patterns without any threshold setting. Through this method, users can find patterns from ones with the highest frequency to ones with the k-th highest frequency regardless of databases. In this paper, we provide knowledge both on frequent and top-k pattern mining. Although top-k frequent pattern mining extracts top-k significant patterns without the setting, it cannot consider both item quantities in transactions and relative importance of items in databases, and this is why the method cannot meet requirements of many real-world applications. That is, patterns with low frequency can be meaningful, and vice versa, in the applications. High utility pattern mining was proposed to reflect the characteristics of non-binary databases and requires a minimum threshold. Recently, top-k high utility pattern mining has been developed, through which users can mine the desired number of high utility patterns without the prior knowledge. In this paper, we analyze two algorithms related to top-k high utility pattern mining in detail. We also conduct various experiments for the algorithms on real datasets and study improvement point and development direction of top-k high utility pattern mining through performance analysis with respect to the experimental results.
A Study on Mission Critical Factors for Software Test Enhancement in Information Technologies Development of Public Sector
Lee, Byung-hwa ; Lim, Sung-ryel ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 97~107
DOI : 10.7472/jksii.2015.16.6.97
Up until recently, Korea has ranked the first place in UN e-Government Survey for three consecutive years. In keeping with such accomplishment, the size of budget execution has been consistently growing in accordance with Korea's Government 3.0 policy and vision, leading to increase in big-sized informatization projects in the business. Especially in mission critical public sector's infrastructure where it affects many people, growing demand for establishing high-quality information system with new technologies being brought to attention in order to meet the complex needs of citizens. National defense information system, being one of representative domains examples in the concerned area, established high military competency by applying breakthrough technology. Network-oriented national defense knowledge informatization was set as the vision in order to implement core roles in making efficient national defense management; and effort has been made to materialize the vision by making advancement in national defense's information system and its informatization implementation system. This research studies new quality index relevant to test and evaluation (T&E)of informatization business in national defense which is the representative example of mission critical public sector's infrastructure. We studied international standards and guidelines, analyzed actual T&E cases, and applied them to the inspection items that are currently in use, complying with the e-government law (Act No. 12346, Official Announcement Date 2014. 1.28., Enforcement Date 2014. 7.29.) As a result of productivity analysis, based on hypothesis in which suggested model was applied to T&E of the national defense informatization business, we confirmed the possibility of enhancement in the T&E productivity by assessing reliability, expertise, and safety as evaluation factors.
Segmenting Korean Millennial Consumers of Sharing Economy Services on Social Networking: A Psychographic-based Approach
Lee, Jae Heon ; Choi, Jae Won ; Kim, Ki Youn ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 109~121
DOI : 10.7472/jksii.2015.16.6.109
The purpose of this qualitative study is to explore consumer behavioral trends, psychological characteristics and various cognitive types of Millennial Generation consumers, primarily in their 20s, who are familiar with sharing economy services based on the emerging social networking technology. Using Q methodology, this paper theoretically defines four and interprets via a social science perspective four different types of these young consumers who are skilled at state-of-the-art ICT equipment, devices or online networking services. Sharing economy services in Korea's academic and industrial services are influenced by government policy, and related research is relatively new. This study is focused on discovering unique psychographic characteristics called 'schemata' that include personal interest, preference, attitude, and opinion. On the basis of 40 Q-sorted data samples, the analysis examined 180 collected statements from meta-studies and interviews with 35 individuals born between 1997 and 1992. As a result, four consumer groups were identifies: Type 1 'Early majority', Type 2 'Laggard', Type 3 'Opinion leader', and Type 4 'Late majority'. The results of this research can be used to explore to study in greater detail the behavior and psychological aspects of Millennial General consumers'.
A Study on the Development Strategy of Smart Learning for Public Education
Kim, Taisiya ; Cho, Ji Yeon ; Lee, Bong Gyou ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 123~131
DOI : 10.7472/jksii.2015.16.6.123
Recently the development of ICT has a big impact on education field, and diffusion of smart devices has brought new education paradigm. Since people has an opportunity to use various contents anytime and communicate in an interactive way, the method of learning has changing. In 2011, Korean government has established the smart education promotion plan to be a first mover in the paradigm shift from e-learning to smart learning. Especially, government aimed to improve the quality of learning materials and method in public schools, and also to decrease the high expenditure on private education. However, the achievement of smart education policy has not emerged yet, and the refinement of smart learning policy and strategy is essential at this moment. Therefore, the purpose of this study is to propose the successful strategies for smart learning in public education. First, this study explores the status of public education and smart learning environment in Korea. Then, it derives the key success factors through SWOT(Strength, Weakness, Opportunity, Threat) analysis, and suggests strategic priorities through AHP(Analytic Hierarchy Priority) method. The interview and survey were conducted with total 20 teachers, who works in public schools. As a results, focusing on weakness-threat(WT) strategy is the most prior goal for public education, to activate the smart learning. As sub-factors, promoting the education programs for teachers(
), which is still a weakness, appeared as the most important factor to be improved. The second sub-factor with high priority was an efficient optimizing the capability of new learning method(
), which is a strength of systematic public education environment. The third sub-factor with high priority was the extension of limited government support(
), which could be a threat to other public schools with no financial support. In other words, the results implicate that government institution factors should be considered with high priority to make invisible achievement in smart learning. This study is significant as an initial approach with strategic perspective for public education. While the limitation of this study is that survey and interview were conducted with only teachers. Accordingly, the future study needs to be analyzed in effectiveness and feasibility, by considering perspectives from field experts and policy makers.
Social Network Based Music Recommendation System
Park, Taesoo ; Jeong, Ok-Ran ;
Journal of Internet Computing and Services, volume 16, issue 6, 2015, Pages 133~141
DOI : 10.7472/jksii.2015.16.6.133
Mass multimedia contents are shared through various social media servies including social network service. As social network reveals user's current situation and interest, highly satisfactory personalized recommendation can be made when such features are applied to the recommendation system. In addition, classifying the music by emotion and using analyzed information about user's recent emotion or current situation by analyzing user's social network, it will be useful upon recommending music to the user. In this paper, we propose a music recommendation method that makes an emotion model to classify the music, classifies the music according to the emotion model, and extracts user's current emotional state represented on the social network to recommend music, and evaluates the validity of our method through experiments.