Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 4, Issue 6 - Dec 2003
Volume 4, Issue 5 - Oct 2003
Volume 4, Issue 4 - Aug 2003
Volume 4, Issue 3 - Jun 2003
Volume 4, Issue 2 - Apr 2003
Volume 4, Issue 1 - Feb 2003
Selecting the target year
Adaptive Modulation and Coding of MIMO in Next Generation Mobile Systems
Kang Sung-Jin ; Jang Tae-Won ; You Young-Whan ; Whang In-Tae ; Kang Min-Goo ; Kang Chang-Eon ;
Journal of Internet Computing and Services, volume 4, issue 5, 2003, Pages 1~9
In this paper, we combine AMC (Adaptive Modulation and Coding) with MIMO (Multiple Input Multiple Output) multiplexing to improve the throughput performance of AMC in Next Generation Communication Mobile Systems. In addition, we propose a system that adopts STD (Selection Transmit Diversity) in the combined system. The received SNR (Signal to Noise Ratio) is improved by adopting STD techniques and an improved SNR increases a probability of selecting MCS (Modulation and Coding Scheme) level that supports higher data rate. The computer simulation is performed in flat Rayleigh fading channel. The results show that higher throughput is achieved by AMC-TD schemes. AMC-STTD scheme shows about 250kbps increase in throughput. And AMC-STD with 2 transmit antennas achieves about 420 kbps throughput improvement over the conventional AMC at 9dB SNR.
The development of the procurement process system for e-Biz of the plant business
Kim Hoi-Sub ; Lee Joo-Pyo ; Han Sang-hoon ; Cho Se-hyoung ; Park Chang-Hyun ; Han Jae-Bum ; Kim Sung-Ho ; Kim Gyu-Tae ;
Journal of Internet Computing and Services, volume 4, issue 5, 2003, Pages 11~19
Since B2C(Business to Customer) from which e-commerce had originated was replaced by B2B, e-Business has shown fast growth so fa., Recently, e-Procurement by l:n concept is on the development as self-purchase system associated with their own ERP In many conglomerates in the Korean market. However, in order to vitalize e-Biz in the plant industry, we need to set up e-marketplaces where many sellers and buyers can meet each other at the same time, which has become the essential part for success as an expanded business model. In this paper, we expect that the foundation for e-transformation in the plant industry is set up by developing Purchase Process System and related modules as the prerequisite for e-Biz in the plant industry, and this report will provide an exemplary model for e-commerce. The Purchase Process System consists of 1) e-Purchasing Module that manages bidding and contract information based on quotation inquiry, 2) e-Expediting Module that manages information to guarantee the on-time delivery, 3) e-Certification Module that controls user authentification, 4) e-Basic Module that manages the bulletin boards, Q&A, etc.
The Design and Analysis of Secure DRM Systems using Steganography
Do Kyoung-Hwa ; Jun Moon-Seog ;
Journal of Internet Computing and Services, volume 4, issue 5, 2003, Pages 21~29
Transferring the contents for multimedia shows recently very activity, So this fact ailows the contents for multimedia to be commercialized. These contents, however, included much vulnerability that it is difficult to be commercialized because attackers easily reproduce that. Many developers want to use watermarking method as the technique to protect the contents for multimedia, but it is very vulnerable to use only one method, This paper proposes the Secure DRM system which protects the contents for multimedia steganography methods. The DRM system is more powerful than general DRM systems in that it has the special feature of watermarking and steganography techniques, We can prevent the attackers from reproducing and stealing the contents illegally, and authenticating users through DRM systems.
A Basic Contents Item for the User Interface in the Internet Shopping Mall
Moon Byung-Koo ;
Journal of Internet Computing and Services, volume 4, issue 5, 2003, Pages 31~41
At present, the market size of electronic commerce has increased and also the construction of internet shopping mall has expended. But it raises question about issue that the manpower who develope user interface lack of the comprehensive and systematic approach. For that reason this study identified the main factor of the user interface contents in internet shopping mall and suggested the contents item based on the reliability, safety and ease of uses for the customer. Eventually, the developed basic contents items are company information, the protection policy of private information, user agreement. product information, settlement information, order process, delivery process and customer support.
Performance Evaluation of Multistage Interconnection Networks under Nonuniform Traffic Pattern
Mun Young-song ;
Journal of Internet Computing and Services, volume 4, issue 5, 2003, Pages 43~49
Analytical performance evaluation is crucial for justifying the merit of the design in different operational conditions. While several analytical models have been proposed for the performance evaluation of Multistage Interconnection Networks(MINs), they are mainly for uniform traffics. Even models for nonuniform traffics have several shortcomings such as they only consider output buffered structure or do not consider blocking conditions. In this paper the mere accurate models than any other ones so far have been proposed for the performance evaluation of banyan-type MIN's under nonuniform traffic condition is obtained. The accuracy of proposed model is conformed by comparing with the results from simulation.
Implementation Of Asymmetric Communication For Asynchronous Iteration By the MPMD Method On Distributed Memory Systems
Park Pil-Seong ;
Journal of Internet Computing and Services, volume 4, issue 5, 2003, Pages 51~60
Asynchronous iteration is a way to reduce performance degradation of some parallel algorithms due to load imbalance or transmission delay between computing nodes, which requires asymmetric communication between the nodes of different speeds. To implement such asynchronous communication on distributed memory systems, we suggest an MPMD method that creates an additional separate server process on each computing node, and compare it with an SPMD method that creates a single process per node.
Design of Dynamic Slot Assignment Protocol for Wireless Multimedia Communication
Yoe Hyun ; Kang Sang-Wook ; Koh Jin-Gwang ;
Journal of Internet Computing and Services, volume 4, issue 5, 2003, Pages 61~68
In this paper, we propose a wireless MAC protocol named APRMA, which is capable of supporting the ABR type data service and Maximizing channel utilization. Data terminals with random data packets are not provided slot reservation with PRMA protocol. That is, slot reservation is applicable to the time constraint voice packet exclusively. But the reservation scheme have to be performed for loss sensitive data packet, and contended their quality of service, Therefore, in wireless MAC, reservation technique has to be used for both voice and data services. So the terminal which wants to request for ABR type service, is allocated a minimum bandwidth from system for the first time, If the system have some extra available bandwidth, ABR terminals would acquire additional bandwidth slot by slot, As a result, APRMA protocol can support the data service with loss sensitivity and maintain their channel utilization high.
An Learning Algorithm to find the Optimized Network Structure in an Incremental Model
Lee Jong-Chan ; Cho Sang-Yeop ;
Journal of Internet Computing and Services, volume 4, issue 5, 2003, Pages 69~76
In this paper we show a new learning algorithm for pattern classification. This algorithm considered a scheme to find a solution to a problem of incremental learning algorithm when the structure becomes too complex by noise patterns included in learning data set. Our approach for this problem uses a pruning method which terminates the learning process with a predefined criterion. In this process, an iterative model with 3 layer feedforward structure is derived from the incremental model by an appropriate manipulations. Notice that this network structure is not full-connected between upper and lower layers. To verify the effectiveness of pruning method, this network is retrained by EBP. From this results, we can find out that the proposed algorithm is effective, as an aspect of a system performence and the node number included in network structure.
Design Call Control of Mechanism for Multiparty Conference in SIP and Case Study
Jeong Dong-Youl ; Min Jun-Sik ; Cheon Suh-Hyun ;
Journal of Internet Computing and Services, volume 4, issue 5, 2003, Pages 77~86
This paper introduces the extension of SIP protocol for Multiparty Conference and the implementation of IP-based Multi-Conference. SIP protocol is a signaling protocol for initiating, modifying and terminating interactive sessions (voice, video, text, application). Multiparty conference system is implemented by RTP protocol for real time transmission and by H.323 for call setup. As H.323 fits into PSTN, it has some problems (call setup delay, hard implementation) for IP applications. IETF developed SIP protocol used for signaling in IP networks. However this SIP protocol doesn't explain signal protocol about multimedia conference, which is different from the existing H.323. So this paper describes the extension of SIP according to SIP Specification and case study for the multimedia conference.
Design and Implementation of a Secure Communication API Using OpenSSL
Jung In-sung ; Shin Yong-tae ;
Journal of Internet Computing and Services, volume 4, issue 5, 2003, Pages 87~96
The additional mechanism is required to set up a secure connection among the communication subjects in the internet environment. Each entity should transfer and receive the encrypted and hashed data to guarantee the data integrity. Also, the mutual authentication procedure should be processed using a secure communication protocol. Although the OpenSSL which implements the TLS is using by many developers and its stability and performance are proved, it has a difficulty in using because of its large size. So, this paper designs and implements the secure communication which the users can use easily by modification works of OpenSSL library API. We proved the real application results using the client/server case which supports a secure communication using the implemented API.