Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 5, Issue 6 - Dec 2004
Volume 5, Issue 5 - Oct 2004
Volume 5, Issue 4 - Oct 2004
Volume 5, Issue 3 - Jun 2004
Volume 5, Issue 2 - Apr 2004
Volume 5, Issue 1 - Feb 2004
Selecting the target year
A Connection of Information in the Ubiquitous Space
Ko Sung-Bum ;
Journal of Internet Computing and Services, volume 5, issue 2, 2004, Pages 1~15
The current Internet space is evolving to the so called Ubiquitous space. Unlike the Internet space, the information in the Ubiquitous space is distributed evenly in the places like computer's memory, human's brain and physical machine. The 'hypertext', the connection model of the information, which is originally designed for the Internet space doesn't suit well to the Ubiquitous space. From this point of view, we proposed the CPM model in this paper. The CPM model is designed for comprising the such three computing mechanism as analog computing, digital computing and human computing. In this paper, we showed that the characteristics of the CPM model might answer the such purpose as the connection of information in the Ubiquitous space.
A Assumptions Statement Generation Method for Security Environment of Protection Profile
Ko Jeong-Ho ; Lee Gang-Soo ;
Journal of Internet Computing and Services, volume 5, issue 2, 2004, Pages 17~31
This paper presents a new assumptions statement generation method for developing TOE security environment section of PP. We surveyed on guides on the assumption statement in CC scheme, and collected and analyzed hundred of assumption statements which are in 26 certified and published real PPs and CC Toolbox/PKB. The CC Toolbox/PKB is included a class of pre-defined assumption statements. From the result of the survey, we developed a new generic assumption statement list, and proposed a assumption derivation method by using the list.
A Proposal for Transmission Method of Safety CRL to Distributed OCSP Group
Ko Hoon ; Jang Uijin ; Shin Yongtae ;
Journal of Internet Computing and Services, volume 5, issue 2, 2004, Pages 33~40
PKI(Public Key Infrastructure) issues a certificate for providing Integrity of public key. and it Inspects the validity by downloading CRL(Certificate Revocation List) for checking the validity of certificate. But. it imposes a burden on processing of certificate due to Increase of user and the size of CRL, Lately, OCSP(Online Certificate Status Protocol), which examines the validity on online, is published as an alternative plan. But, it makes a problem due to concentration of just one certificate repository, Accordingly we propose the scheme that OCSP server is arranged in distributed area and then the information is safely transmitted to OCSP server.
On Natural Motion Editing by a Geometric Mean Filter
Kim Jin-Ok ;
Journal of Internet Computing and Services, volume 5, issue 2, 2004, Pages 41~47
Recently, motion capture has become one of the most promising technologies in animation. Realistic motion data can be captured by recording the movement of a real actor with an optical or magnetic motion capture system. This paper deals with motion editing by a geometric mean filter. Since the captured motion has some noises that cause a jerky motion, it needs a smoothing process to make it natural. A geometric mean filter is proposed to produce natural motions without jerky motions. Experimental results show that the geometric mean filter can effectively remove noises that cause a jerky motion and it can guarantee the most natural motions among various spatial filters. This method could be applied to the various fields such as real time animation, virtual reality applications, 3D applications, and etc.
E-mail system for displaying real name of receiver
Kim Tai-Dal ; Kim Min-Su ;
Journal of Internet Computing and Services, volume 5, issue 2, 2004, Pages 49~55
This paper studies supplementing the points at issue bye-mail system for displaying real name of the addressee about the e-mail transmission failure that could be occurred by misspelled or mistyped e-mail address using e-mail system. E-mail system for displaying real name of the addressee is the system that increase the transmission probability by displaying searched for real name of the addressee on database. This is the study with intent to minimizes the economy loss of transmission success probability, outflow of data, and the server's over-tasking from the inaccuracy transmission of e-mail system.
Intrusion Detection System Using the Correlation of Intrusion Signature
Na Guen-Sik ;
Journal of Internet Computing and Services, volume 5, issue 2, 2004, Pages 57~67
In this paper we present the architecture of intrusion detection system that enhances the performance of system and the correctness of intrusion detection. A network intrusion is usually composed of several steps of action taken by the attackers. Each action in the steps can be characterized by its signature. But normal and non-intrusive action can also include the same signature, It can result in incorrect detection. The presented system uses the correlation of series of signatures that consist of an intrusion. So Its decision on an intrusion is highly reliable. And variations of known intrusions can easily be detected without any knowledge of the variations.
Safety Robust Speaker Recognition Against Utterance Variationsed
Lee Ki-Yong ;
Journal of Internet Computing and Services, volume 5, issue 2, 2004, Pages 69~73
A speaker model In speaker recognition system is to be trained from a large data set gathered in multiple sessions. Large data set requires large amount of memory and computation, and moreover it's practically hard to make users utter the data inseveral sessions. Recently the incremental adaptation methods are proposed to cover the problems, However, the data set gathered from multiple sessions is vulnerable to the outliers from the irregular utterance variations and the presence of noise, which result in inaccurate speaker model. In this paper, we propose an incremental robust adaptation method to minimize the influence of outliers on Gaussian Mixture Madel based speaker model. The robust adaptation is obtained from an incremental version of M-estimation. Speaker model is initially trained from small amount of data and it is adapted recursively with the data available in each session, Experimental results from the data set gathered over seven months show that the proposed method is robust against outliers.
Geographic and Energy Aware Geocasting in Ad-Hoc Networks
Lee Ju-Young ;
Journal of Internet Computing and Services, volume 5, issue 2, 2004, Pages 75~84
Geocasting, a variant of the conventional multicasting problem, is one of communication type in which the data packets are delivered to a group of all nodes within a specified geographical region (i.e., the geocasting region) and is called location-based multicasting(LBM)(l). An Ad-hoc network is a dynamically reconfigurable and temporary wireless network where all mobile devices using batteries as energy resources cooperatively maintain network connectivity without central administration or the assistance of base stations. Consequently, the technique to efficiently consume the limited amounts of energy resources is an important problem so that the system lifetime is maximized. In this paper, we propose a LBPA(Location-Based Power Aware) geocasting algorithm that selects energy-aware neighbor to route a packet towards the target region In Ad-hoc network environments. The method Is such that the energy consumption is balanced among the nodes in proportion to their energy reserves. Through the simulations, the proposed LBPA algorithm shows better results, that is, as good as 40% on the average over the conventional LBM algorithm in terms of the network lifetime.
Design and implemention of ProDesigner System to separate Design from Program on Web Project
Jung Gang-Yong ;
Journal of Internet Computing and Services, volume 5, issue 2, 2004, Pages 85~95
The web-based project is seriously not efficient area at software engineering. In order to develop a web-based system, UI(User Interface) designers usually first design display layout and then business logic developers bring to complete the coding of the display layout source. In the case of maintenance, it goes through the same process, This kinds of web-based software development method were proposed by the various methods same as the tag library of JSP, But there are many problems to apply them and they are low productive comparing to the CIS based software development method, WFS(Neb Form System), which is suggested on this thesis, separates UI design from business logic on a web project and offers the better environment to develop web based software, Eventually WFS will improve the productivity to develop web based software.
Cognitive Approach for Building Intelligent Agent
Tae Kang-Soo ;
Journal of Internet Computing and Services, volume 5, issue 2, 2004, Pages 97~105
The reason that an intelligent agent cannot understand the representation of its own perception or activity is caused by the traditional syntactic approach that translates a semantic feature into a simulated string, To implement an autonomously learning intelligent agent, Cohen introduces a experimentally semantic approach that the system learns a contentful representation of physical schema from physically interacting with environment using its own sensors and effectors. We propose that negation is a meta-level schema that enables an agent to recognize its own physical schema, To improve the planner's efficiency, Graphplan introduces the control rule that manipulates the inconsistency between planning operators, but it cannot cognitively understand negation and suffers from redundancy problem. By introducing a negative function not, IPP solves the problem, but its approach is still syntactic and is inefficient in terms of time and space. In this paper, we propose that, to represent a negative fact, a positive atom, which is called opposite concept, is a very efficient technique for implementing an cognitive agent, and demonstrate some empirical results supporting the hypothesis.