Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 4, Issue 6 - Dec 2003
Volume 4, Issue 5 - Oct 2003
Volume 4, Issue 4 - Aug 2003
Volume 4, Issue 3 - Jun 2003
Volume 4, Issue 2 - Apr 2003
Volume 4, Issue 1 - Feb 2003
Selecting the target year
Differential Power Analysis Attack on Cryptosystem adopted NAF Algorithm as a Secret Key Recoding Method
Ahn Mahn-Ki ; Ha Jae-Cheol ; Lee Hoon-Jae ; Moon Sang-Jae ;
Journal of Internet Computing and Services, volume 4, issue 3, 2003, Pages 1~8
The power analysis attack is a physical attack which can be applied to the cryptosystems such as smartcard. We try to experimental attack to a smart card which implemented Elliptic Curve Cryptosystem adopting NAF algorithm as a secret key recording method. Our differential power analysis attack is a potential threat to that implementation. The attacker measures the power traces during the multiplication with secret key bits in a target smart card and the multiplication with the guessed bits in other experimental one. The comparison of these two traces gives a secret bit, which means that attacker can find all secret key bits successively.
An Amplitude Warping Approach to Intra-Speaker Normalization for Speech Recognition
Kim Dong-Hyun ; Hong Kwang-Seok ;
Journal of Internet Computing and Services, volume 4, issue 3, 2003, Pages 9~14
The method of vocal tract normalization is a successful method for improving the accuracy of inter-speaker normalization. In this paper, we present an intra-speaker warping factor estimation based on pitch alteration utterance. The feature space distributions of untransformed speech from the pitch alteration utterance of intra-speaker would vary due to the acoustic differences of speech produced by glottis and vocal tract. The variation of utterance is two types: frequency and amplitude variation. The vocal tract normalization is frequency normalization among inter-speaker normalization methods. Therefore, we have to consider amplitude variation, and it may be possible to determine the amplitude warping factor by calculating the inverse ratio of input to reference pitch. k, the recognition results, the error rate is reduced from 0.4% to 2.3% for digit and word decoding.
Semantic based Research-Paper Searching System
Kim Young-Min ; Lee Sang-Joon ;
Journal of Internet Computing and Services, volume 4, issue 3, 2003, Pages 15~22
Many information storage systems, such as database system, were needed to integrate much informations into one system and to provide mare voluminous lump of informations. But as the size of information system becomes larger, the responded result size of existing keyword based searching system might be too large and couldn't do the exact search which the user intends to. In this study, we proposed a paper searching method which uses RDF semantic. For this, we analyzed the structural forms of the tit1e of research papers and reconstructed them into RDF/XML. When we use these RDF descriptions of the titles to search papers, we could get more precise and accurate results than keyword based searching method.
Construction of a Game Site by the Component Base Design
Kim Chi-Su ; Kim Jae-Woong ;
Journal of Internet Computing and Services, volume 4, issue 3, 2003, Pages 23~30
A component base technology can maintain effectively and save time and expenses of development. In this thesis we found many components including the setup/execution component to construct game sites and analyzed and designed the components by the use of UML. If programmers develop the game site by using the component that distributes, setups and executes the game program by one click and other components, they can manage the game site easily, distribute the game program effectively and offer a convenient user interface. Also, by the reuse of these components, programmers can construct the game site easily and economically.
A Study on Insuring the Full Reliability of Finite State Machine
Yang Sun-Woong ; Kim Moon-Joon ; Park Jae-Heung ; Chang Hoon ;
Journal of Internet Computing and Services, volume 4, issue 3, 2003, Pages 31~37
In this paper, an efficient non-scan design-for-testability (DFT) method for finite state machine(FSM) is proposed. The proposed method always guarantees short test pattern generation time and complete fault efficiency. It has a lower area overhead than full-scan and other non-scan DFT methods and enables to apply test patterns at-speed. The efficiency of the proposed method is demonstrated using well-known MCNC'91 FSM benchmark circuits.
Incremental Watermarking using Complex Wavelet Transform
Lee Na-Young ; Kim Won ; Kim Kwan-Jung ; Kim Gye-Young ;
Journal of Internet Computing and Services, volume 4, issue 3, 2003, Pages 39~46
Generally, the existing watermarking techniques for copyright protection of a digital image are fragile in geometric distortion and all watermark extractions need the same time regardless of degree of distortion. In this paper, we propose the incremental watermarking technique that used a Complex Wavelet Transform(CWT) in order to solve these problems. The proposed incremental watermarking technique embeds a watermark in a phase component after a CWT with an original image, and a watermark is extracted from an watermarked image by stages. A watermark owner can insist on copyright of an image after comparing a correlation between the extracted watermark and the original watermark if it is larger than the threshold. Also, the incremental watermark extraction determines the extraction time of a watermark by the level of distortion. The proposed technique through performance evaluation displayed that it was robust in geometric distortion than the existing watermarking technique.
Design and Evaluation of NACK Based Reliable Multicast Protocol
Jung Sun-Hwa ; Park Seok-Cheon ;
Journal of Internet Computing and Services, volume 4, issue 3, 2003, Pages 47~55
Multicast protocols ore developed in order to support group communications efficiently, However. there still exist some issues to be solved for deploy multicast protocol in the public internet. This paper refers problem of existing Reliable Multicast Protocols and redesigns component function, and proposes enhanced reliable multicast transport protocol, This paper proposed a improved multicast transport scheme in NACK based reliable multicast. This scheme is much faster than by sender-initiated or receiver-initiated recovery and latency is smaller. Designed components are implemented in UNIX environment using C programming longuage. Then the protocol was evaluated performance through simulation. As the result, proposed protocol is better than existing protocols in both of transmission delay and packet loss. Especially, proposed protocol in this paper con be used in multicast services needed high reliability.
CompGenX: Component Code Generation System based on GenVoca and XML
Choi Seung-Hoon ;
Journal of Internet Computing and Services, volume 4, issue 3, 2003, Pages 57~67
Software product lines are to attain the rapid development of qualify applications by concretizing the general components populated in software assets and assembling them according to the predefined architectures. For supporting the construction of the software product lines, this paper proposes a component code generation techniques based on GenVoca architecture and XML/XSLT technologies, In addition, CompGenX(Component Generator using XML), a component code generation system, is proposed on the basis of this techniques. By providing reconfigurability of component at the time of code generation, CompGenX allows the reusers to create the component source code that is appropriate to their purpose, In this system, the process of the component development is divided into two tasks which are the component family construction task and the component reuse task, For the component family construction, CompGenX provides the feature modeling tool for domain analysis and the domain architecture definition tool. Also, it provides the tool for building the component configuration know1edge specification and the code templates, For the component reuse task, it offers the component family search tool. the component customizing tool and the component code generator. Component code generation techniques and system in this paper should be applicable as basic technology to build the component-based software product lines.