Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 8, Issue 6 - Dec 2007
Volume 8, Issue 5 - Oct 2007
Volume 8, Issue 4 - Aug 2007
Volume 8, Issue 3 - Jun 2007
Volume 8, Issue 2 - Apr 2007
Volume 8, Issue 1 - Feb 2007
Selecting the target year
A Calculus of Real-Time Distribution, Mobility and Interaction for Tracing Mobile Agents with Transporting Objects
Choi, Jung-Rhan ; Lee, Moon-Kun ;
Journal of Internet Computing and Services, volume 8, issue 2, 2007, Pages 1~13
GPS/GIS and RFID technologies have been changing the paradigm af our society toward ubiquitous era. Especially, geographically distributed mobile agents with transporting objects need to be automatically recognizable and traceable under certain conditions. To do this, fundamental theories and technologies are required to specify and verify spatial and temporal behaviors of agents on geographical space. This paper presents a new formal method, called Calculus of Real-Time Distribution, Mobility, and Interaction (CaRDMI), for this purpose. For specification, CaRDMI defines a map, mobile agents with transporting objects. The movement of on agent is represented by a path on the map, consisting of a list of nodes and a list of edges with spatial and temporal constraints. Interactive constraints among agents are represented by synchronization modes on objects at nodes. These constraints are distinguishable features of CaRDMI from other methods. Especially, many-to-many timed synchronization constraints are noticeable. For verification, CaRDMI presents the spatial, temporal and interactive deduction rules and the spatial and temporal equivalence relations.
Development of a defect analysis and control system based on CMMI
Cho, Sung-Min ; Han, Hyuk-Soo ;
Journal of Internet Computing and Services, volume 8, issue 2, 2007, Pages 15~22
As we detect defects and eliminate them in early stages, we can make better quality software. For doing this task, we need to use a defect tracking system which con effectively track and manage defects that give severe effects on software quality. Those existing defect tracking systems have some weaknesses as we apply them to organizations that use CMMI for process improvements. Major problems of those systems are that they require the organizations to collect many types of defect data at a time without providing the proper explanation and even without the support of defect management process. The organizations at CMMI maturity level 2 and 3 have problems for analyzing those defects because there is no specific process area at CMMI maturity level 2 and 3 which directly handles defect managing activites. This paper resolves those problems by developing a defect tracking system which offers methods of managing defects. And the system provides guidelines of which defects should be gathered for each CMMI mathurity levels. The system also has functions to generate various status and statistic information on defects, and to assign defect data to the person in charge so that he or she track the defect to the closure
A Model for Software Development Manpower Allocation
Park, Seok-Gyu ;
Journal of Internet Computing and Services, volume 8, issue 2, 2007, Pages 23~31
If the effort(manpower) and schedule are estimated, there is very difficult to allocate the manpower according to the schedule time units efficiently. Generally, the Putnam's Rayleigh Model has been applied popularly. This distribution model is expressing topology that manpower is consumed concentrically in first-half point. But actual manpower of projects are consumed concentrically at middle or second half point. Therefore, this model cannot be applied in software project planning area. This paper suggests a model to distribute manpower efficiently. Fist of all, we investigate a typical type presenting in software development field and manpower profile type of actuality development projects. Next, we suggested a method to present the model by a drawing a contour about manpower profile for the efficient manpower distribution. The proposed model shows better performance than Rayleigh and Gomma model. By applying proposed model, we will properly distribute manpower to schedule in software development planning phase, and finally we may manage project successfully.
The Algorithm of Efficient Core Selection Estimation for the Multicast Delay Variation Problem and Minimum Delay Variation
Ahn, Youn-Gjin ; Kim, Moon-Seong ; Choo, Hyun-Seung ;
Journal of Internet Computing and Services, volume 8, issue 2, 2007, Pages 33~41
With the development of the multicast technology, the realtime strategy among the group applications using the multicast routing is getting more important. An essential factor of these real-time application is to optimize the Delay- and delay Variation-Bounded Multicast Tree(DVBMT) problem. This problem is to satisfy the minimum delay variation and the end-to-end delay within an upper bound. The DVBMT problem is known as NP-complete problem. The representative algorithms for the problem are DVMA, DDVCA, and so on. In this paper, we show that the proposed algorithm outperforms any other algorithm. The efficiency of our algorithm is verified through the prerformance evaluation and the enhancement is up to about 9% to 29% in terms of the multicast delay variation. The time complexity of our algorithm is
An MAC Protocol Design in Minimizing of Data Transmission Delay for Wireless Sensor Networks
Kim, Man-Seok ; Kim, Sang-Soo ; Koh, Kwang-Shin ; Cho, Gi-Hwan ; Lee, Moon-Ho ;
Journal of Internet Computing and Services, volume 8, issue 2, 2007, Pages 43~54
The effective power consumption is the primary issue in a sensor network which consists of the sensor nodes with limited battery power. So, most of the MAC protocols in sensor networks have been designed with the consideration of energy efficiency. Generally, these protocols make use of the listen and sleep mode periodically. However, this approach inevitably causes a long transmission delay on the data forwarding path, which is mainly resulted from the sleep time of the receiver node. This paper deals with a design of DT-MAC(Data Transmission centric MAC) protocol, with minimizes the data transmission delay while it forces each node to consume its energy efficiently. Thus, a node received a packet converts its remained sleep time to the pseudo_listen time, in which the node is able to transmit a packet. With benefit of the pseudo_listen period, the data transmission delay along with the data forwarding path will be shortened as much as it possible. Therefore, DT-MAC protocol is very suitable to the various applications which require a real time sensing data such as disaster and fire alarm.
Anomaly Detection Mechanism against DDoS on BcN
Song, Byung-Hak ; Lee, Seung-Yeon ; Hong, Choong-Seon ; Huh, Eui-Nam ; Sohn, Seong-Won ;
Journal of Internet Computing and Services, volume 8, issue 2, 2007, Pages 55~65
BcN is a high-quality broadband network for multimedia services integrating telecommunication, broadcasting, and Internet seamlessly at anywhere, anytime, and using any device. BcN is Particularly vulnerable to intrusion because it merges various traditional networks, wired, wireless and data networks. Because of this, one of the most important aspects in BcN is security in terms of reliability. So, in this paper, we suggest the sharing mechanism of security data among various service networks on the BcN. This distributed, hierarchical architecture enables BcN to be robust of attacks and failures, controls data traffic going in and out the backbone core through IP edge routers integrated with IDRS. Our proposed anomaly detection scheme on IDRS for BcN service also improves detection rate compared to the previous conventional approaches.
Design and Implementation of Auto Set-up Program for SFP Module by using VEE
Choi, Jeoung-Hoon ; Jun, Byung-Uk ; Koo, Yong-Wan ;
Journal of Internet Computing and Services, volume 8, issue 2, 2007, Pages 67~76
Data used for the SFP module are stored in A0 and A2 memory area based on the SFP-MSA standard. In this paper the auto set-up program for SFP module has been designed and implemented. In order to make the Digital Diagnostic Monitoring Interface, the specific value has been written into the designated register via RS232 communication channel in the LD Driver IC. The Agilent VEE is used as a programming language for factory automation, and optical characteristics of SFP module and SFP-MSA standard are main structure of the implementation. The implemented program has been applied to the manufacturing field and the system gains a higher effect than the result of 6-Sigma.
P2Prefix : Efficient Broadcasting Streaming Scheme Based on P2P Caching
Lee, Chi-Hun ; Choi, Young ; Choi, Hwang-Kyu ;
Journal of Internet Computing and Services, volume 8, issue 2, 2007, Pages 77~87
A typical VOD service allows that a number of remote clients playback a desired video from a large collection of videos stored in one or more video servers. The main bottleneck for a VOD service is the network bandwidth connecting to the VOD server to the client due to the high bandwidth requirements. Many previous researches have shown that VOD server can be greatly improved through the use of multicast, broadcast, or P2P scheme. Broadcast is one of the most efficient techniques because it can transmit a stream to many users without additional network bandwidth. But the broadcast has long latency time. In order to overcome the drawback, in this paper, we propose P2Prefix broadcast scheme that can solve the service latency time, which is the problem of broadcast scheme, by using P2P caching as well as minimizing the client buffer requirement.
A Development of the SMBC platform for supporting advanced performance of blocking spam-mails
Sso, Sang-Jin ; Jin, Hyun-Joon ; Park, Noh-Kyung ;
Journal of Internet Computing and Services, volume 8, issue 2, 2007, Pages 89~94
Even though lots of research have been doing about spam mail blocking technologies and their systems, the emergence of spam mails of new types causes the spam mail filtering rate to decrease and the occurrences of false-positive mails to increase. Therefore, existing spam mail filtering algorithms suffer from increasing load to be processed and decreasing reliability in spam mail blocking systems due to the shortage of newly developed algorithms and their research. This paper presents the Fit-FA Finder which is able to select appropriate algorithms to be applied and their procedures, and the development of the SMBC platform. The Fit-FA Finder is developed and implemented in the SMBC platform in which recovering process based on privacy information is employed for false-positive mails
A Mapping Technique of XML Documents into Relational Schema based on the functional dependencies
Cho, Jung-Gil ;
Journal of Internet Computing and Services, volume 8, issue 2, 2007, Pages 95~103
Many techniques have been proposed for mapping from XML to relations, but most techniques did not negotiate the semantics of XML data. The semantics is important to validate storage, query optimization, modification anomaly in process of schema design. Specially, functional dependencies are an important part of database theory, also it is basis of normalization for relational table in BCNF. This paper propose a new technique that reflect functional dependencies to store relation mapped from XML based on XML Schema. The technique can reduce storage redundancy and can keep up content and structure with constraint described by functional dependencies.
Mining the Up-to-Moment Preference Model based on Partitioned Datasets for Real Time Recommendation
Han, Jeong-Hye ; Byon, Lu-Na ;
Journal of Internet Computing and Services, volume 8, issue 2, 2007, Pages 105~115
The up-to-moment dataset is built by combining the past dataset and the recent dataset. The proposal is to compute association rules in real time. This study proposed the model,
and algorithm that is sensitive to time. It can be utilized in real time by applying partitioned combination law after dividing the past dataset into(k-1). Also, we suggested
applying the exponential smoothing method to
When the association rules of
were compared, The simulation results showed that
is most accurate for testing dataset than
in huge dataset.
Perception of Students with disabilities and their WBI personnel about Web accessibility and its effective instructional design strategies
Roh, Seak-Zoon ;
Journal of Internet Computing and Services, volume 8, issue 2, 2007, Pages 117~135
There are two purposes of this study; 1) to identify the perception about Web accessibility of students with disabilities and their Web-based Instructional personnel (WBI personnel) in higher education, and 2) to find out effective WBI design strategies actually used by WBI personnel to design and develop accessible Web-Based instruction for students with disabilites. Sixteen students with disabilites and their WBI personnel at a mid-western university in US were recruited for individual interviews. The results showed that WBI personnel did not know about Web accessibility and were not well prepared to make their WBI accessible. They have to provide the equality and quality of life to students with disabilites by making their instruction accessible. They felt that they could not guarantee whether their WBI was accessible even after meeting current standards and guidelines. WBI personnel also suggested that they had to provide students with disabilites with various methods and use appropriate instructional design strategies in order to address their needs. Finally, some effective instructional design used by WBI personnel in order to make WBI accessible were listed.
Integrating Task Planner with Plan Exective to Control Intelligent Robots
Kim, In-Cheol ; Kim, Ha-Bin ; Shin, Hang-Cheol ;
Journal of Internet Computing and Services, volume 8, issue 2, 2007, Pages 137~146
This paper presents a way to integrate a task planner with a plan executive for efficient control of intelligent robots. For this purpose, it first surveys several types of the existing task planners and plan executives. And then it introduces a new approach that combines a BDI-based executive with an on-demand task planner, and it explains a control architecture of intelligent robots based upon this integrating paradigm. Finally it analyzes the flexibility and robustness of both the proposed integrating paradigm and the control architecture through implementation of a demo system using AIBO robots.