Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 9, Issue 6 - Dec 2008
Volume 9, Issue 5 - Oct 2008
Volume 9, Issue 4 - Aug 2008
Volume 9, Issue 3 - Jun 2008
Volume 9, Issue 2 - Apr 2008
Volume 9, Issue 1 - Feb 2008
Selecting the target year
Authentication of Fast Handovers for Mobile IPv6 using Return Routability
Shin, Tea-Il ; Mun, Young-Song ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 1~8
IETF has proposed Fast Handovers for Mobile IPv6 (FMIPv6) for efficient mobility management, FMIPv6 has no solutions to protect binding updates. Previous researches have mainly concentrated on using AAA, public cerificates or cryptographic algorithms to secure binding updates. However the approaches need a particular infrastructure or a heavy processing cost to setup secure associations for handovers. Proposed scheem provides authentication for FMIPv6 without infrasturcture and costly cryptographic algorithms by extending Return Routability Protocol. Also proposed scheme is oble to be used for various existing handover mechanisms in IPv6 network.
Tree based Route Optimization in Nested NEMO Environment
Lim, Hyung-Jin ; Chung, Tai-Myoung ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 9~19
This paper propose the issue of connecting nested NEMO (Network Nobility) networks to global IPv6 networks, while supporting IPv6 mobility. Specifically, we consider a self-addressing including topology information IPv6-enabled NEMO infrastructure. The proposed self-organization addressing protocol automatically organized mobile routers into free architecture and configuration their global IPv6 addresses. BU(binding update) to MR own HA and internal rouging, hosed on longest prefix matching and soft state routing cache, are specially designed for IPv6-based NEMO. In conclusion, numeric analysis ore conducted to show more efficiency of the proposed routing protocols than other RO (Route Optimization) approaches.
AM Modulation for High Bandwidth Efficiency and Constant Amplitude Signal Transmission
Hong, Dae-Ki ; Kang, Sung-Jin ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 21~32
In this paper, we propose new modulation schemes using the conventional CACB (Constant Amplitude Coded Multicode Biorthogonal) modulation with constant amplitude property. Also the proposed modulation schemes supports high transmission data rate by increasing the spectral efficiency, In order to obtain the high spectral efficiency, the
AM (Quadrature-Quadrature Amplitude Modulation) and CA-
AM (Constant Amplitude-
AM) are used. We explain the simplest combining modulation scheme of CACB and
AM (i.e., CACB-
AM). However, this modulation scheme cannot support the constant amplitude property. Hence the first CACB-CA-
AM (or CACB-CA-
AM I) modulation scheme is proposed for the constant amplitude property. In the modulation scheme, the redundant constant amplitude encoding (spectral efficiency decrease) is required. Therefore, the second CACB-CA-
AM (or CACB-CA-
AM II) modulation scheme is proposed retaining the constant amplitude and the spectral efficiency. Computer simulations show that the proposed CACB-CA-
AM II is the efficient modulation scheme.
A Wavelet Based Robust Logo Watermarking Algorithm for Digital Content Protection
Kim, Tae-Jung ; Hwang, Jae-Ho ; Hong, Choong-Seon ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 33~41
Due to the advantage of wavelet transform such as the compatibility with JPEG2000, multi-resolution decomposition, and application of HVS(Human Visual System), watermarking algorithm based on wavelet transform (DWT) is recently mast interesting research subject. However, mast of researches are focused on theoretical aspects for the robustness rather than practical usage, and. may be not suitable too much complicated to use in practice. In this paper, robust logo watermarking algorithm based on DWT is proposed for large and huge data processing. The proposed method embeds the logo watermark by mapping of
blocks in order of the number of '1' of the original image and the randomized watermark image with LFSR. The original image is transformed by 2 level wavelet. The experimental results shows that the watermark is embedded successfully, and the proposed algorithm has the valuable robustness from the image processing like JPEG compression, low pass filter, high pass filter and changes in brightness and contrast.
RFID-based Automatic Entity Information Management System for Smart Refrigerator
Lee, Ju-Dong ; Kim, Hyung-Suk ; Kim, Tae-Hyoun ; Suh, Hyo-Joong ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 43~54
In this paper, we implement an automatic entity information management system for smart refrigerator using RFID technology in which objects containing electronic tags are automatically identified using radio wave. Unlike current "smart" refrigerators, the system presented in this paper implements smart tag information acquisition mechanism and real-time information management system to provide various information on entities in refrigerators to local and remote users. As the first step, this paper analyzes the requirements for smart refrigerator system based on the RFID and suggests design considerations. Based on the analysis, we propose and implement an efficient tag location tracking method based on antenna transfer method and an intelligent tag information management system based on embedded database and web server. We also provide a wide range of experimental results on the number of tags identified at a time and the tag recognition ratio according to the RFID antenna transfer speed and the angle between tag reader and tags.
An Assignment Motion to Suppress the Unnecessary Code Motion
Shin, Hyun-Deok ; Lee, Dae-Sik ; Ahn, Heui-Hak ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 55~67
This paper presents the assignment motion algorithm unrestricted for code optimization computationally. So, this algorithm is suppressed the unnecessary code motion in order to avoid the superfluous register pressure, we propose the assignment motion algorithm added to the final optimization phase. This paper improves an ambiguous meaning of the predicate. For mixing the basic block level analysis with the instruction level analysis, an ambiguity occurred in Knoop's algorithm. Also, we eliminate an ambiguity of it. Our proposal algorithm improves the runtime efficiency of a program by avoiding the unnecessary recomputations and reexecutions of expressions and assignment statements.
Design and Implementation of Real-time monitoring for Distributed Server Management
Lee, Jong-Dae ; Koo, Yong-Wan ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 69~78
Finance, Securities, banking system provides information through Internet, DM SMS, IVR, E-mail and FAX for customer. Customers can use multi channel. Enterprise requires Host transaction and transparency for DB processing, This paper provides two contributions to the study. First, we discuss Server of Fire insurance (finance, securities and capital, bank system) in Enterprise. Second, we present Real time monitoring system for customer transparency. Finally, we design and implement the proposed system. These techniques can be efficiently supported in CRM(Customer Relationship Management).
An efficient matching mechanism for real-time sensor data dissemination
Seok, Bo-Hyun ; Lee, Pill-Woo ; Huh, Eui-Nam ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 79~90
In the ubiquitous environment sensor network technologies have advanced for collecting information of the environment. With the rapid growth of sensor network technology, it is necessary and important to share the collected sensor data with a large base of diverse users. In order to provide dissemination of sensor data, we design an information dissemination system using an independent disseminator between provider and consumer. This paper describes how we designed the information dissemination system using one of the possible dissemination patterns for sensor networks, and an efficient matching algorithm called CGIM (Classed Grouping Index Matching) which employs a dynamic re-grouping scheme.
H-DISS: Development of Integrated Management System for Healthcare Documents using Web Services and HL7
Yoo, Jae-Kyu ; Song, Eun-Ha ; Jeong, Young-Sik ; Han, Sung-Kook ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 91~101
Recently, as the technology has been blended with IT, BT or NT and technology in each field has been developed progressively with the people's needs for a healthy and abundance life. In the medical service field as well, related technologies such as medical equipment, medical information system, or medical business application have come to be diversified and advanced. However, most of these medical technologies are being developed independently without an interaction with other medical institutions or related companies, which causes many problems in the integration or interchangeability of them. This paper is intended to solve the problems generated during a direct information sharing between the functional interfaces of the present healthcare information sharing system. This paper develops a repository between the interfaces, which can save all the healthcare information from the institutions, and convert and publish it in various forms of document. In other words, recently HL7 protocol has been used for sharing the healthcare information in order to save the information in XML format, and develops the H-DISS(Healthcare-Documents Integrated Sharing System), a repository to manage and publish the saved document.
Service-centric Object Fragmentation Model for Efficient Retrieval and Management of Huge XML Documents
Jeong, Chang-Hoo ; Choi, Yun-Soo ; Jin, Du-Seok ; Kim, Jin-Suk ; Yoon, Hwa-Mook ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 103~113
Vast amount of XML documents raise interests in how they will be used and how far their usage can be expanded, This paper has two central goals: 1) easy and fast retrieval of XML documents or relevant elements; and 2) efficient and stable management of large-size XML documents, The keys to develop such a practical system are how to segment a large XML document to smaller fragments and how to store them. In order to achieve these goals, we designed SCOF(Service-centric Object Fragmentation) model, which is a semi-decomposition method based on conversion rules provided by XML database managers. Keyword-based search using SCOF model then retrieves the specific elements or attributes of XML documents, just as typical XML query language does. Even though this approach needs the wisdom of managers in XML document collection, SCOF model makes it efficient both retrieval and management of massive XML documents.
A Variability Design and Customization Technique of Message Flow for Improving Generality
Cho, Eun-Sook ; Kim, Chul-Jin ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 115~127
The component for satisfying several domain requirements must be developed to support variety. But, when the application is developed using the component, it happens other requirements. So, it is difficult to design component to satisfy severaldomain requirements. Also, it is impossible to support the special business logic. As this problem, the component must provide to the white-box component, it is not the black-box component. So, in this paper, we propose the variability design technique and the customization technique using the design technique that can support the various requirements. This technique is not focus on designing the component to analyze various domains. The variability of the component is designed to the initial variability in the component development phase and we use the customization technique for applying the variability to developing application. The variability can be re-designed during developing the application to use the component applying the variability. The variability of the component is evolved and the generation of the component is increased via the iteration Generally, the range of the component variability is classified the function modification within the component and the component internal structure modification as requirements in the component outside. As the range of the variability, we propose the variability design technique of the behavior and the message flow. This paper proposes a message flow design technique for modifying function call.
Extracting Input Features and Fuzzy Rules for forecasting KOSPI Stock Index Based on NEWFM
Lee, Sang-Hong ; Lim, Joon-S. ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 129~135
This paper presents a methodology to forecast KOSPI index by extracting fuzzy rules based on the neural network with weighted fuzzy membership functions (NEWFM) and the minimized number of input features using the distributed non-overlap area measurement method. NEWFM classifies upward and downward cases of KOSPI using the recent 32 days of CPPn,m (Current Price Position of day n for n-1 to n-m days) of KOSPI. The five most important input features among CPPn,m and 38 wavelet transformed coefficients produced by the recent 32 days of CPPn,m are selected by the non-overlap area distribution measurement method. For the data sets, from 1991 to 1998, the proposed method shows that the average of forecast rate is 67.62%.
Priority-based Message Scheduling for Multi-agent System in Ubiquitous Environment
Yoon, Yang-Seok ; Youn, Hee-Yong ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 137~143
In ubiquitous environment the multi-agent system is effective for providing intelligent services. In this paper we introduce a new scheduling service model for improving the communication performance in the multi-agent system. It is achieved by assigning a priority to the message according to the weight of formalized ACL message and the number of messages exchanged between the agents. An experiment reveals that the proposed approach allows smaller processing time per message and turnaround time than the scheduling with the existing JADE platform. Moreover, the proposed scheme allows a scalable messaging system.
Segmentation of Arcs and Line Segments in Planar Curve Using CI Method
Lyu, Sung-Pil ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 145~158
The detected arcs by the cone intersection(CI) method exist within a tolerant error from the original curve. But the position of breakpoint by the CI method is sensitive to the tolerant error. The deviation of breakpoint position makes ill effects to the detection of arc center or radius. In this paper a improved CI method for center detection and arc segmentation is proposed. The detected arcs from curves by the proposed method have very stable mean of deviations from the original curves. The experimental results show that the position of breakpoint by the proposed method is closer to real position than the one by other methods.
A Study on Scalable Bluetooth Network for Secure Ubiquitous Environment
Baek, Jang-Mi ; Seo, Dae-Hee ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 159~170
The ubiquitous network revolution is beginning with the onset of digital convergence, whereby computers, horne appliances, and communications and broadcast media are being unified into digital media with the founding of the information super high speed. This technical advancement is creating a new culture and a new space and accelerating society's transition to the new and unique social paradigm of a 'ubiquitous society'. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, the scalable Bluetooth piconet scheme with independent slave device is proposed. It follows from work by Sea et al. But extended scatternet is not considered is Kiisc05 paper. Therefore, we propose secure bridge connection scheme for scalable Bluetooth scatternet.
Performance Evaluations of the Interpolation Methods Under the various illumination intensities and its Application to the Adaptive Interpolation for Image Sensors
Kim, Byung-Su ; Paik, Doo-Won ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 171~177
In this paper we compared the performance of interpolation algorithms for Bayer patterned image sensors under the various illumination intensities. As the interpolation algorithms, we used bilinear color interpolation and adaptive fuzzy color interpolation and our experimentation shows that performance of interpolation algorithms depend on the lighting conditions; in low intensity of illumination, bilinear color interpolation with median filter performs best, in high intensity of illumination, adaptive fuzzy color interpolation performs best, and in between bilinear color interpolation performs best. This study suggested an interpolation scheme which applies different interpolation algorithm according to the intensity of the input image, resuting in the better image quality.
A Derivation of Resource Level Domain Names
Han, Young-S. ;
Journal of Internet Computing and Services, volume 9, issue 1, 2008, Pages 179~186
The access to web applications has continuously evolved toward the adoption of content centric interfaces. Services and information items are much of user's concern than web sites. For an efficient accommodation of increasing needs of content oriented operations, the scope of domain names is extended in two directions. A naming scheme is derived that is suitable for resource level access units and the semantics of domain names is conceived as very flexible functions. First extension regards the removal of unnecessary TLD's of domain names for resource level binding. Second extension makes the resource level domain names rich in functional binding and consequently various applications can be directly triggered by the invocation of domain names without intervening medium. These extensions may lay a certain direction for the future internet evolution.