Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 8, Issue 6 - Dec 2007
Volume 8, Issue 5 - Oct 2007
Volume 8, Issue 4 - Aug 2007
Volume 8, Issue 3 - Jun 2007
Volume 8, Issue 2 - Apr 2007
Volume 8, Issue 1 - Feb 2007
Selecting the target year
The Design and Implementation of a Security Management Server for Pre-Distributed Key Exchange Method and Lightweight Key Distribution Protocol for Mobile Ad-hoc Node
Yang, Jong-Won ; Seo, Chang-Ho ; Lee, Tae-Hoon ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 1~8
The Mobile Ad-hoc network does environmental information which an individual collects in nodes which are many as the kernel of the USN technology based on the radio communication. And it is the latest network description delivering critical data to the destination location desiring through a multi-hop. Recently, the Ad-hoc network relative technique development and service are activated. But the security function implementation including an authentication and encoding about the transmitted packets, and etc, is wirelessly the insufficient situation on the Ad-hoc network. This paper provides the security service of key exchange, key management. entity authentication, data enciphering, and etc on the Mobile Ad-hoc network. It implements with the Ad-hoc network security management server system design which processes the security protocol specialized in the Ad-hoc network and which it manages.
License Management Method supporting secure contents distribution in Family Domain
Wang, Bo-Hyun ; Lee, Byung-Wook ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 9~19
Superdistribution service of DRM system is an essential part for revitalization of digital contents distribution. However, it limits superdistribution range to superdistribution between consumers. Recently, as the demands of the consumer increase, the consumers want to use the contents in their multiple devices, In this paper, we propose a license management method supporting superdistribution between devices owned by a consumer, The proposed method creates domain key for device authentication by using identification informations of devices owned by a consumer and stores it in license, If devices are changed, domain key and license are updated, Through this method, contents distribution between devices can be achieved securely and efficiently, Also, this license management method can apply to superdistribution between consumers.
Authentication of Hierarchical Mobile IPv6 Handover Using Modified Return Rotability
Kim, Jung-Hwan ; Yu, Ki-Sung ; Park, Byung-Yeon ; Noh, Min-Ki ; Mun, Young-Song ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 21~28
Hierarchical Mobile IPv6 improves performance of Mobile IPv6 by managing Binding Update in terms of location, With improved handover delay, realization of delay-sensitive services (e,g, VoIP or video streaming) has become more persuadable, Comparing with Mobile IPv6, however, Hierarchical Mobile IPv6 brings security threats related to Local Binding Update to mobile network, In the RFC 4140, specific methods to authenticate Local Binding Update message are not explicitly presented. It is essential that design secure architecture to address problems related to authenticating Local Binding Update, Many secure suggestions for Local Binding Update, however, concentrate on infrastructure-based solutions such as AAA PKI. These approaches may cause scalability problem when the suggested solutions are applied to real network. Therefore we suggest authentication method that doesn't require infrastructure, In addition to authentication of Local Binding Update, our method also provides mobile node with power saving ability.
A Dynamic Security Service using Access Control Model in Distributed Framework Support for u-Healthcare
Jeong, Chang-Won ; Kim, Dong-Ho ; Kim, Myung-Hee ; Joo, Su-Chong ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 29~42
This paper describes a security object designed to support a dynamic security service for application services in u-healthcare computing environments in which domains are used to object groups for specifying security policies, In particular, we focus on security object for distributed framework support for u-healthcare including policy, role for security and operations use to access control. And then, by using the DPD-Tool. we showed the access right grant procedure of objects which are server programs, the developing process of client program. Also, we verified the executablility of security service supporting by distributed framework support for u-healthcare use to the mobile monitoring application developing procedure implemented through DPD-Tools.
An Outlier Cluster Detection Technique for Real-time Network Intrusion Detection Systems
Chang, Jae-Young ; Park, Jong-Myoung ; Kim, Han-Joon ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 43~53
Intrusion detection system(IDS) has recently evolved while combining signature-based detection approach with anomaly detection approach. Although signature-based IDS tools have been commonly used by utilizing machine learning algorithms, they only detect network intrusions with already known patterns, Ideal IDS tools should always keep the signature database of your detection system up-to-date. The system needs to generate the signatures to detect new possible attacks while monitoring and analyzing incoming network data. In this paper, we propose a new outlier cluster detection algorithm with density (or influence) function, Our method assumes that an outlier is a kind of cluster with similar instances instead of a single object in the context of network intrusion, Through extensive experiments using KDD 1999 Cup Intrusion Detection dataset. we show that the proposed method outperform the conventional outlier detection method using Euclidean distance function, specially when attacks occurs frequently.
The Protocol on WS-ECA Framework
Lee, Won-Suk ; Park, Jong-Hun ; Lee, Kyu-Chul ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 55~73
Importance of coordination among heterogeneous devices is significantly increasing to meet the challenges presented by the evolvement of the ubiquitous computing environment. The web services technology is going up as a promising solution to support the inter-operability between such heterogeneous devices via well-defined protocol. Currently, ECA(Event-Condition-Action) rule based framework for coordinating devices is proposed, it is called as WS-ECA(Web Services-ECA) framework. This framework was basically based on the web services and proposed the ECA based rule language, And this also proposed the framework that could enable the device coordination based on proposed rule language. In this paper, we propose the protocol among the components of WS-ECA framework to support dynamic feature for ubiquitous environment, and we also propose WSDL extension to support service and event descriptions these are provided in components of this framework.
Design and Implementation of an Automatic Grading System for Programming Assignments
Kim, Mi-Hye ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 75~85
One of important factors for improving the learning achievement of students in computer programming education is to provide plenty of opportunities of problem-solving experiences through variety forms of assignments, However, for the most cases, evaluation of programming assignments is performed manually by instructors and automated tools for the accurate evaluation are not equipped at the present time. Under this restricted environment instructors need much work and time to grade assignments so that instructors could not deliver sufficient programming assignments to students, In order to overcome this problem. au automated programming assignment evaluation system is needed that would enable instructors to evaluate assignments easily in an effective and consistent way and also to detect any plagiarism activities among students in program source codes readily, Accordingly, in this paper we design and implement a Web-based programming assignment grading system that allows instructors to evaluate program performance automatically as well as to evaluate program styles and piagiarism easily with appropriate feedback.
The Message Scheduling Algorithm of Connector in the Software Composition
Jeong, Hwa-Young ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 87~93
In the component based software development, it is very important to interface between modules of component. Almost of existing method, Connectors are deal with all communication channels between two or more components/interfaces by RPC(Remote procedure call) and event call. But these process has limits when component send a lot of request call to other component through connector. That is, we need more efficient interface method that connector can process multi request call. In this paper, I propose interaction scheduling algorithm using message queue in the connector. For this purpose, I use message buffer which operate to save and load message temporarily.
The Effect of Data Sparsity on Prediction Accuracy in Recommender System
Kim, Sun-Ok ; Lee, Seok-Jun ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 95~102
Recommender System based on the Collaborative Filtering has a problem of trust of the prediction accuracy because of its problem of sparsity. If the sparsity of a preference value is large, it causes a problem on a process of a choice of neighbors and also lowers the prediction accuracy. In this article, a change of MAE based on the sparsity is studied, groups are classified by sparsity and then, the significant difference among MAEs of classified groups is analyzed. To improve the accuracy of prediction among groups by the problem of sparsity, We studied the improvement of an accurate prediction for recommending system through reducing sparsity by sorting sparsity items, and replacing the average preference among them that has a lot of respondents with the preference evaluation value.
The Game Optimization using the Action Patterns of Monster in Mobile Arcade Game
Kim, Young-Back ; Chung, Kyung-Ho ; Ahn, Kwang-Seon ; Kim, Jae-Joon ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 103~114
In an arcade game, the users can easily predict the monster's action because most of the game monster's action patterns are acted only in the predefined patterns, This paper attempts how to increase the player's satisfaction while making the unpredictable action patterns easily, This research defines and realizes the monster's action patterns through the FSM algorithm. In addition, this paper added the predictable factors of monsters in an action patterns of a game monster to optimize the game, On analyzing the result of game play, the game monster's action was evenly used in the whole playing map and the game monster showed that it operated without the recursion of certain action properly.
An Evaluation Model of Game Software
Jung, Hye-Jung ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 115~125
Game software is tremendous popularity in inside and outside of the country, so it rises market value. Therefore, it is important to study for the evaluation models of game software. In a general way, I think that ISO/IEC 9126 is the international standard of the software quality testing. Especially, game software quality has been more important on users and developers, so we need the compliance testing model of the game software. In this paper, we evaluate the game software quality objectively and quantitatively, we propose the software quality metrics of testing. Also, we propose the evaluation model of game software on the basis of international standard ISO/IEC 9126, six quality characteristic point of view. That is functionality, reliability, usability, efficiency, portability, and maintainability.
The Component based U-Learning System using Item Response Theory
Jeong, Hwa-Young ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 127~133
The u-learning environment has been developed through a number of iterations, and has now been formally evaluated, through analysis of student learning results and the use of quantitative and qualitative measures, Generally, for advance learning effect and analysis of student learning results, the most learning system be use to the item analysis method. But, nowadays, it has using the IRT(Item Response Theory) instead of the item analysis method, The IRT adopts explicit models for the probability of each possible response to a test. Therefore, I proposed the lightweight component based u-learning system using the IRT. Applied device of u-learning is PDA which is in Windows mobile 5.0 environments.
Feature Configuration Verification Using JESS Rule-based System
Choi, Seung-Hoon ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 135~144
Feature models are widely used in domain engineering phase of software product lines development to model the common and variable concepts among products. From the feature model, the feature configurations are generated by selecting the features to be included in target product. The feature configuration represents the requirements for the specific product to be implemented. Although there are a lot of researches on how to build and use the feature models and feature configurations, the researches on the formal semantics and reasoning of them are rather inactive. This paper proposes the feature configuration verification approach based on JESS, java-based rule-base system. The Graph Product Line, a standard problem for evaluating the software product line technologies, is used throughout the paper to illustrate this approach. The approach in this paper has advantage of presenting the exact reason causing inconsistency in the feature configuration. In addition, this approach should be easily applied into other software product lines development environments because JESS system can be easily integrated with Java language.
Stroke based Multilingual Input System for Embedded System
Lee, Jin-Yeong ; Hong, Sung-Ryrong ; Lee, Si-Jin ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 145~153
Recently, development in information technology is mainly focused on mobile service, and most of mobile users are using various services based on wireless network. So the importance of system software or middleware, which enables such mobile services, is growing bigger and bigger, and one of those is character input/output system. This paper will introduce an alphabet input system, which decomposes a character to a series of strokes, by its formation principal. It is designed to make a person, who knows the character, to input characters in the way that he/she is actually writing down the character.
Side Face Features' Biometrics for Sasang Constitution
Zhang, Qian ; Lee, Ki-Jung ; WhangBo, Taeg-Keun ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 155~167
There are four types of human beings according to the Sasang Typology, Oriental medical doctors frequently prescribe healthcare information and treatment depending on one's type, The feature ratios (Table 1) on the human face are the most important criterions to decide which type a patient is. In this paper, we proposed a system to extract these feature ratios from the people's side face, There are two challenges in acquiring the feature ratio: one that selecting representative features; the other, that detecting region of interest from human profile facial image effectively and calculating the feature ratio accurately. In our system, an adaptive color model is used to separate human side face from background, and the method based on geometrical model is designed for region of interest detection. Then we present the error analysis caused by image variation in terms of image size and head pose, To verify the efficiency of the system proposed in this paper, several experiments are conducted using about 173 korean's left side facial photographs. Experiment results shows that the accuracy of our system is increased 17,99% after we combine the front face features with the side face features, instead of using the front face features only.
The Identification of Blur Extent from Space-variant Motion Blurred Image
Yang, Hong-Taek ; Hwang, Joo-Youn ; Paik, Doo-Won ;
Journal of Internet Computing and Services, volume 8, issue 6, 2007, Pages 169~180
When an image is captured, motion blurs are caused by relative motion between the camera and the scene, In the case of the camera is moving, the extents of the motion blur are spatially variant according to distances from the camera to the objects. Although the camera is fixed, the extents of the motion blur are spatially variant according to various speeds of the moving objects. Unexpected blur effect very often degrades the quality of the image and it needs to be restored, To restore the spatially variant blurred image, each of the point spread function (PSF) should be identified, In this paper, we propose a new method for the identification of blur extent locally from the image in which the spatially variant motion blur is caused. Experiment shows that the proposed method identifies blur extent well.