Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 3, Issue 6 - Dec 2002
Volume 3, Issue 5 - Oct 2002
Volume 3, Issue 4 - Aug 2002
Volume 3, Issue 3 - Jun 2002
Volume 3, Issue 2 - Apr 2002
Volume 3, Issue 1 - Feb 2002
Selecting the target year
Developing XML Messaging System for Supply Chain Management
Journal of Internet Computing and Services, volume 3, issue 5, 2002, Pages 1~8
Because XML is a W3C standard and has characteristics like platform-independent, it has a critical role in e-commerce. Business rules and procedures should be standardized for efficient B2B integration, But a lot of companies are its own XML documents instead of standard document, Therefore many organizations try to make standards for e-commerce based on framework. Also, in case use supply chain administration system, because document transmit between corporation use on-line, need messaging system that can transfer XML message In this paper, XML messaging system is designed and implemented. Client requests service in XML and server returns response in XML in this system, So we con more easily and efficiently to exchange document between company this XML messaging system,
EPGA Implementation and Verification of CSIX Module
Journal of Internet Computing and Services, volume 3, issue 5, 2002, Pages 9~17
CSIX-L1 is the Common Switch Interface that defines a physical interface for transferring information between a traffic manager (Network Processor) and a switching fabric in ATM, IP, MPLS, Ethernet and data communication areas. In Tx, data to be transmitted is generated in Cframe which is the base information unit and in Rx, original data is extracted from the received Cframe. CSIX-L1 suppots the 32, 64, 96, and 123-bit interface and generates a variable length CFrame and Idle Cframe. Also CSIX-L1 appends Padding byte and supports 16-bit Vertical parity, CSIX-L1 is designed using Xilinx 4,1i. After functional and timing simulations are completed. CSIX-L1 module is downloaded in Xilinx FPGA XCV1000EHQ240C and verified. The synthesized CSIX module operates at 27MHz.
The Design and Implementation of a Real-Time Database Engine For Embedded Systems
Journal of Internet Computing and Services, volume 3, issue 5, 2002, Pages 19~29
With the progress of information-oriented society, many device with advanced technologies invented by many companies. However, the current firmware technologies have many problems to meet such high level of new Technologies, Recently it become necessary new manufactures of information-oriented society to require such embedded operating system as their system-level platform. Embedded linux, which could be on alternative proposal of existing high-cost embedded operating system, become available commercially by many companies Linux has many programs, But, embedded databases require very high cost. In this paper, we suggest ERT DE which has a small size and is suitable for embedded real-time technologies.
A Fault Tolerance Mechanism with Dynamic Detection Period in Multiple Gigabit Server NICs
Journal of Internet Computing and Services, volume 3, issue 5, 2002, Pages 31~39
A rapid growth of internet and sudden increase of multimedia data demands for high-speed transfer media and if optimizec usage from the interface system. To achieve this level of network bandwidth, multiple NICs for support of high-speed network bandwidth have been developed and studied. Furthermore, the use of multiple NICs can provide high-speed LAN environment without large network environment modification, supports backward compatibility of current system and reduce overhead. However. if system failure is caused by SPOF(Single Point of Failure) fault of large-capacity multiple NICs, incredible loss will be met because it services large capacity of multimedia data, Therefore, to prevent loss coming from faults, we describe 'Fault tolerance of multiple NICs', which use the fault prevention mechanism. Considering inefficiency of availability and serviceability that is occurred with existing TMR, Primary-Standby approach and Watchdog time mechanism, we propose and design the efficient fault tolerance mechanism, which minimize down time as changing of detection period dynamically. Consequently, the fault tolerance mechanism proposed for reducing overhead time when the fault is occurred, should minimize system downtime overall.
Design AND IMPLEMENTATION of A News letter system using fuzzy association rules
Journal of Internet Computing and Services, volume 3, issue 5, 2002, Pages 41~49
Web mining can be broadly defined as the discovery and analysis of useful information from the World Wide Web. In this paper. we tried to analyze a user access pattern and designed a system which can supply useful information to users through the web mining, The proposed system can search the information of users pattern through the web site and news letters, and pass through classification of category through filtering, The fuzzy association rules are applied to the users who access recently, to each category that generated though these processes, and compares the generated sets to each users-access pages set, and it can send appropriate news letter to each user.
The Cut Detection System using Sum of Square Difference of Color between frames of Video Image Data
Journal of Internet Computing and Services, volume 3, issue 5, 2002, Pages 51~62
The development of computer technology and the advancement of the technology of information and communications spread the technology of multimedia and increased the use of multimedia data with large capacity, Users can grasp the overall video data and they are able to play wanted video back. To grasp the overall video data it is necessary to offer the list of summarized video data information, In order to search video efficiently on index process of video data is essential and it is also indispensable skill, Therefore, this thesis suggested the effective method about the cut detection of frames which will become a basis of an index based on contents of video image data. This suggested method was detected as the unchanging pixel color intelligence value, classified into diagonal direction. Pixel value of color detected in each frame of video data is stored as A(i, j) matrix-i is the number of frames. j is an image height of frame. By using the stored pixel value as the method of sum of squared difference of color two frames I calculated a specified value difference between frames and detected cut quickly and exactly in case it is bigger than threshold value set in advance, To carry out on experiment on the cut detection of frames comprehensively, I experimented on many kinds of video. analyzing and comparing efficiency of the cut detection system,
Contents Re-authoring Technologies for Mobile Web Sevices
Journal of Internet Computing and Services, volume 3, issue 5, 2002, Pages 63~72
Recently, construction of infrastructure for mobile internet has been progressed very rapidly including various mobile terminals. Therefore, many service models on mobile internet have been appeared and the methods to reuse the existing huge wired web contents have been studied with many-sided ways. In this paper we classify the related technologies published up to now and make a comparison among their strengths and weaknesses, For this purpose, Technologies are classified according to authoring time, authoring place, and processing level of contents. The automatic contents re-authoring technology is examined in particular and we propose a new contents re-authoring method in which the function of compressing selected information is added in order to complement the existing contents re-authoring methods.
An Efficient Logical Volume Manager for SAN
Journal of Internet Computing and Services, volume 3, issue 5, 2002, Pages 73~85
A new architecture coiled the Storage Area Network(SAN) was developed in response to the requirements of high availability of data, scalable growth, and system performance, In order to use SAN more efficiently, most SAN operating system support storage virtualization concepts that allow users to view physical storage devices attached to SAN as a large volume virtually. A logical volume manager plays a key role in storage virtualization. It realizes the storage virtualization by mapping logical addresses to physical addresses, In this paper, we design and implement an efficient and flexible mapping method for logical volume manager. Additionally, to aid flexible mapping, we also design and implement free space management method, The mapping method in this paper supports a snapshot that preserves a volume image at certain time and on-line reorganization to allow users to add or remove storage devices to SAN even while the system is running.
Design of Multicast Group Key Management Protocol for Information Security in PIM_SM
Journal of Internet Computing and Services, volume 3, issue 5, 2002, Pages 87~94
This paper proposes a group key management protocol for a secure of all the multcast user in PIM-SM multicast group communication. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager, Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel. after checking the user's validity through the secure channel, As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key, Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic,
Design and Performance Evaluation of Permanent Disk Error Recovery Schemes during Disk Mirroring
Journal of Internet Computing and Services, volume 3, issue 5, 2002, Pages 95~106
In current storage system environment, we use disk mirroring or Chained-declustering scheme to improve data availability and reliability. If disk error is occurred when these schemes are used. we need efficient recovery schemes for these situations. In this paper, it is proposed that a recovery method of disk mirroring that guarantees I/O performance similar to normal state during disk failure, Also, we execute performance evaluation for our recovery scheme and existing schemes in various environments. We show through the simulation that our algorithm outperforms the classic schemes in terms of I/O response time.