Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 2, Issue 5 - Dec 2001
Volume 2, Issue 4 - Oct 2001
Volume 2, Issue 3 - Aug 2001
Volume 2, Issue 2 - Jun 2001
Volume 2, Issue 1 - Feb 2001
Selecting the target year
Methods for Call Distribution Service Feature of Service Control Logic in Intelligent Network
Tae-Gyu Kang ; Su-Ki Paik ;
Journal of Internet Computing and Services, volume 2, issue 4, 2001, Pages 1~10
In this paper, we define requirements for call distribution of service control logic in Intelligent Network, Also, we propose call distribution mechanism for every subscriber with different call distribution rates, The call distribution mechanism had been developed as a function of Premium-rate Service in Intelligent Network. Our call distribution mechanism applies to percentage distribution instead of circular or hierarchical distribution. The call distribution mechanism consists of call input. output. call distribution processing logic part, random number generator, and customers database. We propose the practical implementation of a call distribution mechanism and call distribution decision indicating number computation method. We show three methods, the rand() function in C language, microsecond by system clock, and proposed algorithm, to get call distribution decision indicating number. In order to optimal call distribution mechanism, we estimated the results of three methods on occurrence values and the number of occurrences.
The Schema Extraction Method using the frequency of Label Path in XML documents
Journal of Internet Computing and Services, volume 2, issue 4, 2001, Pages 11~24
XML documents found over internet are generally fairly irregular and hove no fixed schema, The SQL and OQL are not suitable for query processing in XML documents, So, there are many researches about schema extraction and query language for XML documents, We propose a schema extraction method using the frequency of label path in XML documents, Our proposed method produces multi-level schemas and those are useful for query processing.
Development of Integrated CAD framework for ASIC Design
Journal of Internet Computing and Services, volume 2, issue 4, 2001, Pages 25~32
The CAD tools for ASIC design, which are already developed or will be developed in the future, have their own functions and different working environments in many cases. Therefore, it would be more effective in achieving the final design goal, if we have a system called CAD framework in which these CAD tools are systematically integrated. In this paper, we introduce same novel techniques for integrating systematically such the CAD tools, which are usually developed under UNIX shell environments, into the CAD framework with the standard graphics interface such as X-windows. Some meta languages and script file formats are developed for flexible specification of the system MENU hierarchy and the data dependencies among executable programs. We integrated two existing CAD tools into our CAD framework using the techniques and find out the integrated protype system is working well under the new system environments.
The Development of Admin Tool System for Building Effective Web Mall
Journal of Internet Computing and Services, volume 2, issue 4, 2001, Pages 33~39
Nowadays, Internet shopping malls have been popularized since the broadening of users of Internet and the advantage of on-line purchasing, Small and medium-sized enterprises, however, are still having difficulties in building Internet shopping malls due to the lack of technical knowledge and burdensome expenses. In this paper, we present an implementation of the Web Mall Admin Tool System by the integration of admin menus based on a public program. The system has several advantages of (1) reducing expenses for building a mall site, (2) making possible to build an shopping mall well-suited for the work environment of companies (3) providing available maintenance. Therefore, this provides the solution to enterprises that have trouble with building their own web malls because of expenses and maintenance.
Distributed Intrusion Detection System for Safe E-Business Model
Journal of Internet Computing and Services, volume 2, issue 4, 2001, Pages 41~53
Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.
Design and Implementation of a Tense Helper for a Korean-to-English Machine Translation System
Journal of Internet Computing and Services, volume 2, issue 4, 2001, Pages 55~67
Commercial machine translation systems have been announcing recently, However, there are problems that the systems have shown mistranslations, yet. Among these mistranslations, this paper is interested in the mistakes of tense processing. The paper compares Korean tenses with 12 English ones: present. past, future, present perfect. past perfect, future perfect. present progressive, past progressive, future progressive, present perfect progressive, past perfect progressive. future perfect progressive. Next, we perform the meaning analysis of Korean tenses. Then we describe the structure of the tenses based on Conceptual Graph(CG). In the experiment. the paper implements the program that translates sentences included in the tenses into CG.
A Parallel Programming Environment using Graph Type Intermediate Representation Form
Journal of Internet Computing and Services, volume 2, issue 4, 2001, Pages 69~81
This paper describes a parallel programming environment to help programmer to write parallel programs. Parallel program must be write according to the character of the various hardware or program. So it is difficult for the programs to write the parallel programmer. In this paper, we propose and implement a parallel programming environment using graph type intermediate representation form, and graph user interface is provided for programmer to get parallel programs easily, This parallel environment supports special functions using graph type intermediate representation form. The special functions involve program editing. data dependence analysis, loop transformation. CFG, PDG, HTG. This parallel environment helps users make parallelism and optimization easy through showing the intermediate code with graph.
Development of E-Book Reader System for Q＋Platform
Journal of Internet Computing and Services, volume 2, issue 4, 2001, Pages 83~90
Q+-reader, an E-Book reader system for XML based contents is introduced, The system is developed for the embedded platform, called Q+, which targets for the digital home electronics systems, The system supports XML contents and CSS based styling as described in Open e-book standard. The system renders the e-book contents for users, sc the contents are secured for a proper use. This will found an essential part of business infra for electronic books with copyright protection, The system was developed in Java language to be used in various platform;, and has an open architecture to be reusable for other standards as well.
Interprocedural Transformations for Parallel Computing
Journal of Internet Computing and Services, volume 2, issue 4, 2001, Pages 91~99
Since roost of the program execution time is spent in the loop structure, the problem of extracting parallelism from sequential loop has been one of the most important research issues. However. roost programs have Implicit interprocedure parallelism. This paper presents a generalized method extracting parallelism in loops having the procedure calls. Most parallelization of loops having procedure calls focus on the uniform code where data dependency distance is constant. We present algorithms which can be applied to uniform code, nonuniform code, and complex code. The performance of the proposed algorithm, loop extraction, loop embedding and procedure cloning transformation methods have been evaluated using CRAY-T3E. The result shows the effective of the proposed algorithm.
Scaling Parameter Optimization On Watermarking Using Autostereogram
Journal of Internet Computing and Services, volume 2, issue 4, 2001, Pages 101~109
In recent year, the use of digital picture information and general picture information has been increased, However, numerous copyright infringement and pirate copy of picture information through Internet and CD-ROM happen very often, As a result, several methods of watermarking have been presented to solve and verify distortion of the original data, In addition, watermark data have been suggested to resolve the vastness of the original data, Watermarking methods are often used to protect the right of ownership of a copyright, However, these Watermarking methods have brought the obscurity of recognition caused by the complexity of verification procedure and the increase of magnitude computation occurrence, This paper mainly mentions about the local optimization of scaling parameter, the maximization of hiding of Watermark information and maximization of watermark information in case of restoration that determine the amount of inserted information which is used for preventing distortion and transformation of the original data caused by insertion and hiding of Watermark information on compounding Autostereogram into JPEG picture information.