Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 2, Issue 5 - Dec 2001
Volume 2, Issue 4 - Oct 2001
Volume 2, Issue 3 - Aug 2001
Volume 2, Issue 2 - Jun 2001
Volume 2, Issue 1 - Feb 2001
Selecting the target year
A Study on the School Record System using the Mobile Agent
Journal of Internet Computing and Services, volume 2, issue 3, 2001, Pages 1~8
A school record system by mobile phones is developed using the mobile agent. This developed system support all the wireless protocols by o combined wire and wireless internet Sever for WAP, ME. As a result, it is possible for a student to check his result of achievement and bulletin board by his mobile terminal anywhere, anytime.
Performance Analysis of TCP Traffic over AODV Routing Protocol in Ad-Hoc Wireless Network
Journal of Internet Computing and Services, volume 2, issue 3, 2001, Pages 9~17
Ad-Hoc networks consist of a set of mobile hosts that communicate using wireless links, without the use of other communicate support facilities (such as base stations). The topology of an Ad-Hoc network changes due to the movement of mobile host. which may lead to sudden packet loss. Recently, a large amount of research has focused on the routing protocols needed in such an environment. but researches about Internet traffic performance analysis were unexhausted. Accordingly, we have simulated Ad-Hoc mobile network that using AODV routing protocol and Ad-Hoc mobile network topology size and node speed as simulation estimation-factor to analysis traffic performance. As the result of the simulation, we identify that TCP /Reno was more sensitive than TCP/Sack about node speed and a number of the node.
A Study on the Push-based Distance Education System and Leveling Estimation Algorithm
Journal of Internet Computing and Services, volume 2, issue 3, 2001, Pages 19~25
An educational system using computers was first conceptualized by Dr. Donald Bitzer in the University of Illinois in the late 1950s. Since the PLATO system was developed in 1961, multilateral research were made for the last 30 years. Especially, the development of Internet and Information Technology has contributed to the advancement of the distance education system. This system has greatly changed the existing educational paradigm, As the result, new education system is being realized, This study suggests a distance education system based on ‘push’ technique, which is a means of active information transmission, In this system, the ‘push’ technique is combined with the existing distance education system. Through the combination, learning contents can be provided for learners without connecting the DB on the Internet. In addition, the process of getting new information is real-timed operation. Also, the treatment of item; and the algorithm of level-based item evaluation are devised in consideration of various levels of learners, so that evaluation of items appropriate to the levels of learners can be accomplished.
Narrow Band Interference Suppression In Multiuser CDMA System By Linear Prediction In Subband
Yoon-Gi Yang ;
Journal of Internet Computing and Services, volume 2, issue 3, 2001, Pages 27~36
Recently much attention has been paid for interference mitigation technique for the COMA system, since more capacity is available with same bandwidth. In this paper, we introduces a novel adaptive interference suppression techniques for the CDMA system with narrow band interference. The proposed interference rejection scheme employs the adaptive linear prediction techniques in the subband. In each subband, we can more easily find and cancel the narrow band signal as compared to the full band. Thus, the proposed interference rejection can be classified as another time-frequency techniques for the narrow band interference rejection(10). Computer simulation is conducted for the 3-G COMA system with IF band sampling techniques, yielding better interference rejection and bit error rate performance as compared to conventional one. Also, optimum filter is analyzed and from the analysis, it can be shown the subband prediction techniques can suppress narrow band interference more efficiently.
The Recognition of Korean Auxiliary Verb and its Description Based on Conceptual Graph
Journal of Internet Computing and Services, volume 2, issue 3, 2001, Pages 37~49
Korean auxiliary verbs are often used in Korean sentences in spite of the small number of the auxiliary verbs, However. the incorrect processing of the verbs concept leads to the poor translation quality. To solve the problems of the auxiliary verb processing. the paper proposes a description of the auxiliary verbs based on Conceptual Graph (CG), For the description of the auxiliary verbs within CG. we first collect 40 Korean auxiliary verbs and example sentences from papers and a Korean dictionary, Next, we perform the analysis of the Korean auxiliary verbs through a classification: perfective, progressive, benefactive, attemptive, emphatic, desirable, retentive, and presumptive. Then we depict the eight meanings based on CG. In the experiment. the paper implements the program that translates sentences included in the auxiliary verbs into CG and explains the experimental results.
Implementation of Secure E-Mail System based on lava
Journal of Internet Computing and Services, volume 2, issue 3, 2001, Pages 51~62
Recently, as computers and networks become popular, distributing information on the Internet is common In our daily life. also, the explosion of the Internet. of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. The e-mail has been commonly used by users as well recognizing It as the standard of manners among users on the Internet. In the past, e-mail has been the primary choice of exchanging Information, but secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. most of existing e-mail system don't have any security on the transmitted information. Thus. security mail system need to provide security including message encryption, content Integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mail system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services. API.
Design and implementation of VRML Authoring Tool based on the web
Journal of Internet Computing and Services, volume 2, issue 3, 2001, Pages 63~70
As, the web technology and the computer hardware have been rapidly evolving, the convenient interface and reality are more important than the transmission time and the execution time. For satisfying these requirements, VRML is the most suitable language to implement virtual reality on the Web. However, it is too difficult for non-expert to use. It is also complicated to reconstruct VRML whenever it changes. In order to resolve these problems, this paper implements VRML Authoring Tool based on the web. Also, this paper analyzes the problem of the existing the cooperating VRML and database system, implements the extended VRML supporting system, and evaluates it with the existing system.
Effective incremental attribute evaluation for a hierarchical attribute grammar
Journal of Internet Computing and Services, volume 2, issue 3, 2001, Pages 71~79
In Incremental attribute evaluation algorithm, a new input attribute is exact1y compared with a previous input attribute tree, and then determine which subtrees from the old should be used in constructing the new one. In this paper incremental attribute evaluation algorithm was used to make incremental evlauation of hierarchical attribute grammar more efficient1y, and reconstructing the incremental attribute evaluation algorithm by analyzing that of Carle and Pollock, finally the incremental attribute evaluation algorithm for optimalized attribute tree d' copy was constructed by applying element of attribute !ree dcopy to a new attribute tree d' copy. Also proving that how the reused nod and type of defined parameter in input program carried out the incremental attribute evaluation by using that algorithm.
Efficient Task Distribution Method for Load Balancing on Clusters of Heterogeneous Workstations
Journal of Internet Computing and Services, volume 2, issue 3, 2001, Pages 81~92
The clustering environment with heterogeneous workstations provides the cost effectiveness and usability for executing applications in parallel. The load balancing is considered as a necessary feature for the clustering of heterogeneous workstations to minimize the turnaround time. Since each workstation may have different users, groups. requests for different tasks, and different processing power, the capability of each processing unit is relative to the others' unit in the clustering environment Previous works is a static approach which assign a predetermined weight for the processing capability of each workstation or a dynamic approach which executes a benchmark program to get relative processing capability of each workstation. The execution of the benchmark program, which has nothing to do with the application being executed, consumes the computation time and the overall turnaround time is delayed. In this paper, we present an efficient task distribution method and implementation of load balancing system for the clustering environment with heterogeneous workstations. Turnaround time of the methods presented in this paper is compared with the method without load balancing as well as with the method load balancing with performance evaluation program. The experimental results show that our methods outperform all the other methods that we compared.
Design and Implementation of a Stock Market Management System using CORBA
Journal of Internet Computing and Services, volume 2, issue 3, 2001, Pages 93~98
It is difficult to develop Electronic Commerce System due to expansion, maintenance and repair of the system. In this paper, the author proposes 3-Tier structure Stock Market Management System using JAVA and CORBA. The event service of CORBA supports the interactive environment. For improvement of expansion, performance, security, maintenance, repair. and efficiency, the 3-Tier structure Stock Market Management System is implemented using CORBA and JDBC middle ware in this environment.