Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 7, Issue 6 - Dec 2006
Volume 7, Issue 5 - Oct 2006
Volume 7, Issue 4 - Aug 2006
Volume 7, Issue 3 - Jun 2006
Volume 7, Issue 2 - Apr 2006
Volume 7, Issue 1 - Feb 2006
Selecting the target year
An Efficient Authentication Mechanism for Fast Mobility Services in MIPv6
Lee Seung-Yeon ; Huh Eui-Nam ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 1~11
If a mobile node out of home domain asks to provide mobility service, the mobile should be permitted by the home domain. This can be accomplished by the usage of AAA but the recent studies have shown its weakness to fail the ability of mobile node. This study suggests Fast Handoff model which will shorten permission time by AAA and allow the mobility service to be more efficient. Our suggestion with Assertion function is a new approach to assist authentication capability through mutual authentication of each V_AAA when the distance between HA and itself gets far or its delay time becomes longer. Our suggestion verifies its efficiency by cost analysis.
A Design and Implementation of Service Platform for Telematics Terminals
Kim Ki-Young ; Kim Dong-Kyun ; Lee Sang-Jeong ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 13~30
In this paper, a telematics service platform, which supports the management and diagnosis of automobile and controls the automobile's convenience equipment is designed and implemented. Using the service platform, telematics software can be developed independent of the lower part of automobiles's network devices, each hardware devices, and wireless network devices. The platform classifies each device's service and provides it with the fixed form of API(Application Programming Interface). This API consists of the wireless connection for a mobile device, the CAN network for controlling an automobile, the receiving part of GPS data for location base service, and the message parser for different data formats of different network.
A Method to Reduce Interference in Sensor Network Location Awareness System
Lee Hyung-Su ; Song Byung-Hun ; Ham Kyung-Sun ; Youn Hee-Yong ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 31~39
Ubiquitous and pervasive environment presents opportunities for a rich set of location aware applications such as car navigation and intelligent robots, interactive virtual games, logistics service, asset tracking etc. Typical indoor location systems require better accuracy than what current outdoor location systems provide, Outdoor location technologies such as GPS have poor indoor performance because of the harsh nature of indoor environments, In this paper we present a novel reducing interference location system that is particularly well suited to support context aware computing. The system, called EEM (Enhance Envelop Method) alms to combine the advantages of real time tracking systems that implement distributed environment with the suitability of infrastructure sensor network.
A Joint Power Allocation and Scheduling Algorithm for CDMA-based High-rate Packet Data Systems
Koo In-Soo ; Kim Ki-Seon ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 41~51
In the case of CDMA-based packet data systems such as 1xEV-DO which are designed to support high rate services, BSs transmit data packets with a maximum power based on time multiplexing mode such that only one user can be serviced at a time. In this paper, we propose a joint power allocation and scheduling algorithm for 1xEV-DO-like systems in which we adopt a code division multiplexing (CDM) transmission method in the downlink common channel in order to utilize channel orthogonality such that we can serve more than one user at a time slot especially when there exist remaining resources after serving the firstly selected user by the scheduler. Simulation results demonstrate that the proposed scheme can improve the performances of conventional schemes such as the maximum rate and the proportional fair algorithms.
Network Traffic Monitoring System Applied Load Shedder to Analyze Traffic at the Application Layer
Son Sei-Il ; Kim Heung-Jun ; Lee Jin-Young ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 53~60
As it has been continuously increased the volume of traffic over Internet, it is hard for a network traffic monitoring system to analysis every packet in a real-time manner. While it is increased usage of applications which are dynamically allocated port number such as peer-to-peer(P2P), steaming media, messengers, users want to analyze traffic data generated from them. This high level analysis of each packet needs more processing time. This paper proposes to introduce load shedder for limiting the number of packets. After it determines what application generates a selected packet, the packet is analyzed with a defined application protocol.
Data-Synchronization Gateway based on SyncML for an ActiveSync Data Transformation
Jang Dae-Jin ; Park Kee-Hyun ; Ju Hong-Taek ; Woo Jong-Jung ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 61~69
Data synchronization between data stored in mobile communication terminals and a central server is one of essential tasks for efficient mobile communication environments. Since, however, manufacturers of mobile terminals have their proprietary data synchronization mechanisms, data interoperability can hardly be achieved. Therefore, SyncML data synchronization mechanism in mobile communication environments was proposed as an open standard by OMA(Open Mobile Alliance). In this paper, a SyncML-based data synchronization gateway is designed and implemented which can process ActiveSync data also. In other words, by constructing a combined data synchronization gateway which can transform ActiveSync data into SyncML data, data interoperability between mobile terminals which use two different data synchronization mechanisms can be achieved, In addition, mobile communication experiments between ActiveSync-based terminals and a SyncML-based central server show that the data synchronization gateway constructed in this paper, works correctly.
A Design of Indoor Location Tracking System for Ubiquitous Computing Environment
Woo Sung-Hyun ; Jeon Hyeon-Sig ; Kim Ki-Hwan ; Park Hyun-Ju ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 71~82
This paper propose a realtime tracking algorithm of mobile object in indoor environment. this proposed system selects location data closer to mobile objects in real time that are results of Triangulation method and DCM(Database Correlation Method)method. Also, this system applies adjusted location data selected by using Kalman filter, and in result it improved location accuracy of transfer object. Be studied in existing the Kalman filter have unstable location data until its settlement because of it extracts current values by using the past the information. However, proposed location tracking system don't apply existent Kalman filter to this system and it permits precisional tracking location by uses more effective methods.
A Study on Public Key Cryptographic Authentication System Providing Key Distribution and Recovery in the Initial Authentication
Shin Kwang-Cheul ; Cho Sung-Je ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 83~91
In this paper, we improved a cryptography system model based on the secure initial authentication public key with PKINIT of authentication and key recovery protocol. It is applied to all fields of cryptography system using certificate. This study presents two mechanisms to authenticate between member users. The first mechanism is initial authentication and distribution of session key by public key cryptography based on certificate between entity and server, and the second mechanism is a key recovery support protocol considering loss of session key in the secure communication between application servers.
A Study on the Security Management of Instant Messengers
Kim Sang-Kyun ; Lee Hong-Joo ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 93~105
The instant messenger is not only a wonderful tool for individuals. It is also a great tool which provides real-time dialogue and file transfers for individuals via the Internet and improves an enterprise productivity. However, it has many security risks that may have significant impact in corprate environments. This paper provides an overview of the security risks of the instant messenger with a risk analysis method and the controls that can be used to make it secure. It's hard to eliminate the instant messenger from enterprise environments because of its benefits. If we cannot avoid using it, we must make it secure and reap the full benefits of it.
A Design and Implementation of JPEG Streamer for Real Time Image Surveillance System
Kim Kyung-Hwan ; Yoo Hae-Young ; Lee Jin-Young ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 107~118
Recently, network infra grows rapidly and the digital image compression technique have made remarkable progress, and therefore the demand of the real-time image surveillance system which uses a network camera server is increasing. Network Camera Server has emerged as an attractive alternative to the CCTV for the real-time image surveillance. From this reason, the demand regarding the development of the real-time image surveillance system which uses a network camera server is increasing as well. In this paper, we will provide a model for JPEG Streamer which is used in real-time image surveillance system. And we will design and implement this model. For the stability and efficiency of the JPEG Streamer, we'll use the thread pool and shared memory. We will also introduce the concept of double buffering for increasing the quality of real-time image, Using the JPEG Streamer, a raising of the productivity, reliability and stability will be able to secure to development of real-time image surveillance system.
False Alarm Minimization Technology using SVM in Intrusion Prevention System
Kim Gill-Han ; Lee Hyung-Woo ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 119~132
The network based security techniques well-known until now have week points to be passive in attacks and susceptible to roundabout attacks so that the misuse detection based intrusion prevention system which enables positive correspondence to the attacks of inline mode are used widely. But because the Misuse detection based Intrusion prevention system is proportional to the detection rules, it causes excessive false alarm and is linked to wrong correspondence which prevents the regular network flow and is insufficient to detect transformed attacks, This study suggests an Intrusion prevention system which uses Support Vector machines(hereinafter referred to as SVM) as one of rule based Intrusion prevention system and Anomaly System in order to supplement these problems, When this compared with existing intrusion prevention system, show performance result that improve about 20% and could through intrusion prevention system that propose false positive minimize and know that can detect effectively about new variant attack.
ID-based Tripartite Multiple Key Agreement Protocol Combined with Key Derivation Function
Lee Sang-Gon ; Lee Hoon-Jae ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 133~142
The purpose of the multiple key agreement protocol is to get efficiency in computational and communicational aspects compared to multiple executions of single key agreement protocol. However ID based tripartite multiple key agreement protocols have been proposed, it is reported that they can not resist unknown key-share attack or impersonation attack. How to design a secure and efficient ID-based authenticated tripartite multiple key agreement scheme to prevent all kinds of attacks remains an open problem. This paper proposes a multiple key agreement scheme combing the existing single key agreement protocol with a key derivation function. The proposed scheme can not only increase computational efficiency compared to the existing multiple key agreement protocol, but can ensure security of the proposed schemes by using a security proofed single key agreement protocol and key derivation function.
A Facial Feature Detection using Light Compensation and Appearance-based Features
Kim Jin-Ok ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 143~153
Facial feature detection is a basic technology in applications such as human computer interface, face recognition, face tracking and image database management. The speed of feature detection algorithm is one of the main issues for facial feature detection in real-time environment. Primary factors like a variation by lighting effect, location, rotation and complex background give an effect to decrease a detection ratio. A facial feature detection algorithm is proposed to improve the detection ratio and the detection speed. The proposed algorithm detects skin regions over the entire image improved by CLAHE, an algorithm for light compensation against varying lighting conditions. To extract facial feature points on detected skin regions, it uses appearance-based geometrical characteristics of a face. Since the method shows fast detection speed as well as efficient face-detection ratio, it can be applied in real-time application to face tracking and face recognition.
An Automated Topic Specific Web Crawler Calculating Degree of Relevance
Seo Hae-Sung ; Choi Young-Soo ; Choi Kyung-Hee ; Jung Gi-Hyun ; Noh Sang-Uk ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 155~167
It is desirable if users surfing on the Internet could find Web pages related to their interests as closely as possible. Toward this ends, this paper presents a topic specific Web crawler computing the degree of relevance. collecting a cluster of pages given a specific topic, and refining the preliminary set of related web pages using term frequency/document frequency, entropy, and compiled rules. In the experiments, we tested our topic specific crawler in terms of the accuracy of its classification, crawling efficiency, and crawling consistency. First, the classification accuracy using the set of rules compiled by CN2 was the best, among those of C4.5 and back propagation learning algorithms. Second, we measured the classification efficiency to determine the best threshold value affecting the degree of relevance. In the third experiment, the consistency of our topic specific crawler was measured in terms of the number of the resulting URLs overlapped with different starting URLs. The experimental results imply that our topic specific crawler was fairly consistent, regardless of the starting URLs randomly chosen.
An Improvement of Accuracy for NaiveBayes by Using Large Word Sets
Lee Jae-Moon ;
Journal of Internet Computing and Services, volume 7, issue 3, 2006, Pages 169~178
In this paper, we define the large word sets which are noble variations the large item sets in mining association rules, and improve the accuracy for NaiveBayes based on the defined large word sets. In order to use them, a document is divided into the several paragraphs, and then each paragraph can be transformed as the transaction by extracting words in it. The proposed method was implemented by using Al:Categorizer framework and its accuracies were measured by the experiments for reuter-21578 data set. The results of the experiments show that the proposed method improves the accuracy of the conventional NaiveBayes.