Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 8, Issue 6 - Dec 2007
Volume 8, Issue 5 - Oct 2007
Volume 8, Issue 4 - Aug 2007
Volume 8, Issue 3 - Jun 2007
Volume 8, Issue 2 - Apr 2007
Volume 8, Issue 1 - Feb 2007
Selecting the target year
Direction Prediction Based Resource Reservation in Mobile Communication Networks for Telematics
Lee, Jong-Chan ; Park, Ki-Hong ; Lee, Yang-Weon ;
Journal of Internet Computing and Services, volume 8, issue 1, 2007, Pages 1~14
IF handoff events are occurred during the transmission of multimedia traffic, the efficient resource allocation and handoff procedures are necessary to maintain the same QoS of transmitted multimedia traffic because the QoS may be defected by some delay and information loss, This paper proposes a handoff scheme to accommodate multimedia traffic based on the resource reservation procedure using direction estimation, This scheme uses a novel mobile tracking method based on Fuzzy Multi Criteria Decision Making, in which uncertain parameters such as PSS (Pilot Signal Strength), the distance between the mobile and the base station, the moving direction, and the previous location are used in the decision process using the aggregation function in fuzzy set theory, With the position information, the moving direction is determined, The handoff requests for real time sessions are handled based on the direction prediction and the resource reservation scheme, The resources in the estimated adjacent cells should be reserved and allocated to guarantee the continuity of the real time sessions, Through simulation results, we show that our proposed resource reservation method provides a better performance than that of the conventional method.
TCP Buffer Tuning based on MBT for High-Speed Transmissions in Wireless LAN
Mun, Sung-Gon ; Lee, Hong-Seok ; Choo, Hyun-Seung ; Kong, Won-Young ;
Journal of Internet Computing and Services, volume 8, issue 1, 2007, Pages 15~23
Wireless LAN (IEEE 802.11) uses traditional TCP for reliable data transmission, But it brings the unintentional packet loss which is not congestion loss caused by handoff, interference, and fading in wireless LAN. In wireless LAN, TCP experiences performance degradation because it consumes that the cause of packet loss is congestion, and it decrease the sending rate by activating congestion control algorithm. This paper analyzes that correlation of throughput and buffer size for wireless buffer tuning. We find MBT (Maximum Buffer Threshold) which does not increase the throughput through the analysis, For calculation of MBT, we experiment the throughput by using high volume music data which is creased by real-time performance of piano. The experiment results is shown that buffer tuing based on MBT shows 20.3%, 21.4%, and 45.4% throughput improvement under 5ms RTT, 10ms RTT, and 20ms RTT, respectively, comparing with the throughput of operation system default buffer size, In addition, we describe that The setting of TCP buffer size by exceeding MBT does not have an effect on the performance of TCP.
On Unicast Routing Algorithm Based on Estimated Path for Delay Constrained Least Cost
Kim, Moon-Seong ; Bang, Young-Cheol ; Choo, Hyun-Seung ;
Journal of Internet Computing and Services, volume 8, issue 1, 2007, Pages 25~31
The development of efficient Quality of Service (QoS) routing algorithms in high speed networks is very difficult since divergent services require various quality conditions, If the QoS parameter we concern is to measure the delay on that link, then the routing algorithm obtains the Least Delay (LD) path, Meanwhile, if the parameter is to measure of the link cast, then it calculates the Least Cost (LC) path. The Delay Constrained Least Cast (DCLC) path problem of the mixed issues on LD and LC has been shown to be NP-hard. The path cost of LD path is relatively mere expensive than that of LC path, and the path delay of LC path is relatively higher than that of LD path in DCLC problem. In this paper. we propose the algorithm based on estimated path for the DCLC problem and investigate its performance, It employs a new parameter which is probabilistic combination of cost and delay, We have performed empirical evaluation that compares our proposed algorithm with the DCUR in various network situations.
U-healthcare Based System for Sleeping Control and Remote Monitoring
Kim, Dong-Ho ; Jeong, Chang-Won ; Joo, Su-Chong ;
Journal of Internet Computing and Services, volume 8, issue 1, 2007, Pages 33~45
Using switches and sensors informing the current on or off state, this paper suggests a sleeping control and remote monitoring system that not only can recognize the sleeping situations but also can control for keeping an appropriate sleeping situation remotely, And we show an example that this system is applied to the healthcare sleeping mat, Our system comprises the following 3 parts: a part for detecting the sleeping situations, a part for extracting sensing data and sending/receiving the relating situated data, and a part controlling and monitoring the all of sleeping situations. In details, in order to develop our system, we used the touch and pressure-sensitive sensors with On/Off functions for a purpose of the first part, The second part consists of the self-developed embedded board with the socket based communication as well as extracting real-time sensing data. And the third part is implemented by service modules for providing controlling and monitoring functions previously described. Finally, these service modules are implemented by the TMO scheme, one of real-time object-oriented programming models and the communications among them is supported using the TMOSM of distributed real-time middleware.
Performance Improvement of the Combined AMC-MIMO Systems with Independent MCS Level Selection Method
Hwang, In-Tae ; Choi, Kwang-Wook ; Ryoo, Sang-Jin ; Lee, Kyung-Hwan ; You, Cheol-Woo ; Hong, Dae-Ki ; Kang, Min-Goo ; Kim, Cheol-Sung ;
Journal of Internet Computing and Services, volume 8, issue 1, 2007, Pages 47~55
In this paper, we propose and observe a system that adopts Common-MCS (Modulation and Coding Scheme) level over all layer and Independent-MCS level for each layer in the combined AMC-V-BLAST (Adaptive Modulation and Coding-Vertical-Bell-lab Layered Space-Time) system. Also, comparing with the combined system using Common-MCS level, we observe throughput performance improvement in case of Independent-MCS level. As a result of simulation, Independent-MCS level case adapts modulation and coding scheme for maximum throughput to each channel condition in separate layer, resulting in improved throughput compared to Common-MCS level case. Especially, the results show that the combined AMC-V-BLAST system with Independent-MCS level achieves a gain of 700kbps in
SNR (Signal-to-Noise Ratio) range against using Common-MCS level. In addition, the combined AMC-V-BLAST system using MMSEnulling method with receive diversity is verified that the difference of throughput between Independent MCS level system and common MCS level system in
SNR is about 350kbps more or less.
Design and Implementation of Process Management Model applying Agent Technology
Lee, Chung-Sub ; Jeong, Chang-Won ; Joo, Su-Chong ;
Journal of Internet Computing and Services, volume 8, issue 1, 2007, Pages 57~70
This paper is to construct a healthcare database using information obtained from healthcare home environments, and use this one for healthcare home services, Especially, our researching focus in this paper is how to design healthcare database scheme and how to use this constructed database on the Framework for Supporting Healthcare Integrated Service(FSHIS) we developed previously. Healthcare information is designed to database schemes in accordance to the specific save types of the data collected from various typed-sensors. The healthcare database constructed by using this information for the purpose of healthcare home services is divided into the base information with real schemes and the context based information with view schemes. Firstly, the base information includes low data obtained from physical sensors relevant to locations, healths, environments, and the personnel healthy profiles. The other is the context based information that is produced and fused by using the based information. This context based information might be got via various view schemes according to healthcare application services. Finally, for verifying the practical use of healthcare database constructed in this paper, Via interconnecting this database to our FSHIS, we show an example of healthcare home monitoring service using information (basic and context based information), emergency call, home appliance control, and so on needed from living activity area for elderly living alone.
Peformance Analysis of Scheduler Selection based Real-time Linux Systems
Kang, Min-Goo ;
Journal of Internet Computing and Services, volume 8, issue 1, 2007, Pages 71~78
In this paper, an effective task scheduling scheme was proposed for the flexible real time LINUX systems with the selection between EDF(earliest deadline first) and RMS(rate monotonic scheduling). It was known that many task scheduling schemes were analyzed according to the characteristics of scheduling schemes and the guarantee of an earliest deadline scheduler for process utilities.
XML Document Encrypt Implementation using Elliptic Curve Cryptosystem
Ko, Hoon ;
Journal of Internet Computing and Services, volume 8, issue 1, 2007, Pages 79~85
As the use of the computer and networks generalized, the various tasks which are requested secrets can be processed such os the banking transaction. And because of increasing of data exchange, Internet, and mobile networks, the method which is not connected only but also used with many users has been changed. Especially because of the structural problem of the Internet, a lot of information is leaked out when we use the Internet banking. If we check the Internet banking by using an existing cypher method which is either simple of slow, a credit card number, an account number or password will be leaked out. Because the security of information doesn't meet our expectation, we need more powerful cryptography. But, the wasted space-time which is required shouldn,t be ignored when the whole transferred data are encrypted. So, by using both the Elliptic Curve algorithm which is based on mobile networks and the partial encryption of the DTD of XML in this essay, we will implement more faster cypher method of the partial XML.
A Design and Implementation of Business Outlook Survey System for Compensating the Information Security Industry Survey
Jun, Yong-Joon ; Yang, Byung-Woo ; Cho, Gi-Hwan ; Oh, Min-Kwon ;
Journal of Internet Computing and Services, volume 8, issue 1, 2007, Pages 87~98
Recently, some reliability problems are notified on the information security industry survey due to the differences of survey purpose, criteria and methodology among the pursuing organizations. This paper firstly identifies the issues of survey methodologies which are currently applied in the information security industry, and then proposes a business outlook survey system which can be adapted in various domain, even in effectively. The proposed system may be applied in surveys of the business outlook, supply and demand, and difficulty factor, with a co-operative database, Especially, it would be utilized as a great tool when the survey is conducted in repeatedly.
Trusted Information Sharing Model in Collaborative Systems
Hong, Seng-Phil ; Kim, Jae-Hyoun ;
Journal of Internet Computing and Services, volume 8, issue 1, 2007, Pages 99~113
In the rapidly changing e-business environment, organizations need to share information, process business transactions, and enhance collaborations with relevant entities by taking advantage of the various technologies. However, there are always the security issues that need to be handled in order for the e-business operations to be run efficiently. In this research, we suggest the new security authorization model for safety flexible supporting the needs of e-business (e-marketplace) in an organization. This proposed model provides the scalable of access control policy among multi-domains, and preservation of flexible authorization management in distributed system environments. For servers to take the access control policy and enforcement decisions, we also describe the feasible authorization architecture is concerned with how they might seek advice and guideline from formal access control model.
Research on a Logical Agent Communication Language for Multi-Agent Systems Negotiation (I)
Lee, Myung-Jin ; Han, Hyun-Kwan ;
Journal of Internet Computing and Services, volume 8, issue 1, 2007, Pages 115~123
Agents in Multi-Agent System; (MAS) should make use of a common Agent Communication Language (ACL) in order to negotiate with others, and conform to negotiation protocols thatare designed to reach agreements. Therefore, agents must have suitable architectures that could cover above requirements. In this paper, we define an instructive ACL and compare it with other ACLs such as Foundation for Intelligent Physical Agents (FIPA) ACL and Knowledge Query Manipulation Language(KQML), In particular, we represent agents as logic programs with knowledge base and negotiation library. Finally, we show how the planner, which is in the negotiation library, provides the plan of actions and updates agent's knowledge base.
Minimum Fuzzy Membership Function Extraction for Automatic Premature Ventricular Contraction Detection
Lim, Joon-Shik ;
Journal of Internet Computing and Services, volume 8, issue 1, 2007, Pages 125~132
This paper presents an approach to detect premature ventricular contractions(PVC) using the neural network with weighted fuzzy membership functions(NEWFM), NEWFM classifies normal and PVC beats by the trained weighted fuzzy membership functions using wavelet transformed coefficients extracted from the MIT-BIH PVC database. The eight most important coefficients of d3 and d4 are selected by the non-overlap area distribution measurement method. The selected 8 coefficients are used for 3 data sets showing reliable accuracy rates 99,80%, 99,21%, and 98.78%, respectively, which means the selected input features are less dependent to the data sets. The ECG signal segments and fuzzy membership functions of the 8 coefficients enable input features to interpret explicitly.
A Method for Distributed Database Processing with Optimized Communication Cost in Dataflow model
Jun, Byung-Uk ;
Journal of Internet Computing and Services, volume 8, issue 1, 2007, Pages 133~142
Large database processing is one of the most important technique in the information society, Since most large database is regionally distributed, the distributed database processing has been brought into relief. Communications and data compressions are the basic technologies for large database processing. In order to maximize those technologies, the execution time for the task, the size of data, and communication time between processors should be considered. In this paper, the dataflow scheme and vertically layered allocation algorithm have been used to optimize the distributed large database processing. The basic concept of this method is rearrangement of processes considering the communication time between processors. The paper also introduces measurement model of the execution time, the size of output data, and the communication time in order to implement the proposed scheme.