Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Industrial Information Systems Research
Journal Basic Information
Journal DOI :
The Korea Society for Industrial Systems
Editor in Chief :
Volume & Issues
Volume 17, Issue 7 - Dec 2012
Volume 17, Issue 6 - Dec 2012
Volume 17, Issue 5 - Oct 2012
Volume 17, Issue 4 - Aug 2012
Volume 17, Issue 3 - Jun 2012
Volume 17, Issue 2 - Apr 2012
Volume 17, Issue 1 - Feb 2012
Selecting the target year
Cryptanalysis and Improvement of a New Ultralightweight RFID Authentication Protocol with Permutation
Jeon, Il-Soo ; Yoon, Eun-Jun ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 6, 2012, Pages 1~9
DOI : 10.9723/jksiis.2012.17.6.001
Low-cost RFID tags are used in many applications. However, since it has very limited power of computation and storage, it's not easy to make a RFID mutual authentication protocol which can resist from the various security attacks. Quite recently, Tian et al. proposed a new ultralightweight authentication protocol (RAPP) for low-cost RFID tags using the low computation cost operations; XOR, rotation, and permutation operations, which is able to resist from the various security attacks. In this paper, we show that RAPP is vulnerable to the de-synchronization attack and present an improved RAPP which overcomes the vulnerability of RAPP.
Side-Channel Cryptanalysis on Stream Cipher HC-128 for Mobile Ad-Hoc Network Environments
Bae, KiSeok ; Park, YoungHo ; Moon, SangJae ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 6, 2012, Pages 11~17
DOI : 10.9723/jksiis.2012.17.6.011
The HC-128 stram cipher which selected for the final eSTREAM portfolio is suitable for mobile Ad-Hoc network environments because of the ability of high-speed encryption in restricted memory space. In this paper, we analyzed the vulnerability of side channel analysis attack on HC-128 stream cipher. At the first, we explain a flaw of previous theoretical analysis result which defined the complexity of side-channel attack of HC-128 stream cipher as 'low' and then re-evaluate the security against side-channel attack by estimating the concrete complexity for recovering the secret key. As a result, HC-128 stream cipher is relatively secure against side-channel attack since recovering the secret key have
computation complexity which is higher than other stream cipher's one.
Implementation of Commercial IWB Interface using Image Processing
Ko, Eunsang ; Rhee, Yang Won ; Lee, Chang Woo ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 6, 2012, Pages 19~24
DOI : 10.9723/jksiis.2012.17.6.019
In this paper we introduce a commercial interactive whiteboard (IWB) system named ImSensorTouch by ImSensor Inc. Using this interface system, we can control our computer through the interactive whiteboard screen just by touching it with your finger or a pen. The interface interacts with Windows operating system (OS) and is adaptable to changes of surroundings especially temperature, and illumination condition. The proposed system calculates the difference between a reference image and a current image captured by a camera in the optical receptive field. And the position making the difference is used to generate the position on Windows screen. Then, we send a mouse event on the position to Windows OS. We have implemented the system using a critical section(CS) with two threads for the reference frame update process in which an adaptive thresholding technique is periodically exploited to get reliable result. We expect the system is competitive and promises a bright future in the IWB market.
The Improved-Scheme of Two Factor Authentication using SMS
Ji, Seon-Su ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 6, 2012, Pages 25~30
DOI : 10.9723/jksiis.2012.17.6.025
Passwords are a common method of identifying and authenticating a user who wishes to log on to a secure system. Password-based authentication techniques, however, do not provide strong security and recognized as being an poor form of protection. It is not all the responsibility of the user to control password and to protect its confidentiality. In this paper, confirm an appropriate response time and I propose a new and improved method of implementing two factor authentication using SMS via receiving apparatus(mobile and email).
Food Ontology Model for a Healthcare Service
Lee, Byung Mun ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 6, 2012, Pages 31~40
DOI : 10.9723/jksiis.2012.17.6.031
Ubiquitous technology influences on various firms of contents needed for self-healthcare, as it fuses into medical services. Particularly, rapid changes in the web and mobile environment, requiring various sorts of healthcare and its related contents, make efficiency of search more important. Personalized contents needs to be more refined as well as the existing simple keyword-centered searching method needs to be more effective in order to meet both requirements and characteristics of each patient or each user. A precise semantic searching method is required for a system to understand promptly the meaning of a contents. In this respect, to build a healthcare ontology has its own significance. This study builds up a system model that can be utilized practically in existing systems by setting up the Food Class and its sub-class among the healthcare contents with Protege tool and then materializing constraints and its relationships between each class. The healthcare contents ontology provides patients or users with a platform which can search the needed information promptly and precisely.
Effective Biological Sequence Alignment Method using Divide Approach
Choi, Hae-Won ; Kim, Sang-Jin ; Pi, Su-Young ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 6, 2012, Pages 41~50
DOI : 10.9723/jksiis.2012.17.6.041
This paper presents a new sequence alignment method using the divide approach, which solves the problem by decomposing sequence alignment into several sub-alignments with respect to exact matching subsequences. Exact matching subsequences in the proposed method are bounded on the generalized suffix tree of two sequences, such as protein domain length more than 7 and less than 7. Experiment results show that protein sequence pairs chosen in PFAM database can be aligned using this method. In addition, this method reduces the time about 15% and space of the conventional dynamic programming approach. And the sequences were classified with 94% of accuracy.
Detection of Candidate Areas for Automatic Identification of Scirtothrips Dorsalis
Moon, Chang Bae ; Kim, Byeong Man ; Yi, Jong Yeol ; Hyun, Jae Wook ; Yi, Pyoung Ho ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 6, 2012, Pages 51~58
DOI : 10.9723/jksiis.2012.17.6.051
Scirtothrips Dorsalis (Thysanoptera: Thripidae) recently has been recognized as a major source of the pest damage in the citrus fruit orchards. So its arrival has been predicted periodically but it is difficult to identify adults of the pest with the naked eyes because of their size smaller than the 0.8mm. In this paper, we propose a method to detect candidate areas for automatic identification of Scirtothrips Dorsalis on forecasting traps. The proposed method uses a histogram-based template matching where the composite image synthesized with the gray-scale image and the gradient image is used. In our experiments, images are acquired by the optical microscopy with 50 magnifications. To show the usefulness of the proposed method, it is compared with the method we previously suggested. Also, the performances when the proposed method is applied to noise-reduced images and gradient images are examined. The experimental results show that the proposed method is approximately 14.42% better than our previous method, 41.63% higher than the case that the noise-reduced image is used, and 21.17% higher than the case that the gradient image is used.
Protein Disorder/Order Region Classification Using EPs-TFP Mining Method
Lee, Heon Gyu ; Shin, Yong Ho ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 6, 2012, Pages 59~72
DOI : 10.9723/jksiis.2012.17.6.059
Since a protein displays its specific functions when disorder region of protein sequence transits to order region with provoking a biological reaction, the separation of disorder region and order region from the sequence data is urgently necessary for predicting three dimensional structure and characteristics of the protein. To classify the disorder and order region efficiently, this paper proposes a classification/prediction method using sequence data while acquiring a non-biased result on a specific characteristics of protein and improving the classification speed. The emerging patterns based EPs-TFP methods utilizes only the essential emerging pattern in which the redundant emerging patterns are removed. This classification method finds the sequence patterns of disorder region, such sequence patterns are frequently shown in disorder region but relatively not frequently in the order region. We expand P-tree and T-tree conceptualized TFP method into a classification/prediction method in order to improve the performance of the proposed algorithm. We used Disprot 4.9 and CASP 7 data to evaluate EPs-TFP technique, the results of order/disorder classification show sensitivity 73.6, specificity 69.51 and accuracy 74.2.
A case study of Privacy Impact Assessment for C-Shopping Mall
Jeon, Dong-Jin ; Jeong, Jin-Hong ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 6, 2012, Pages 73~82
DOI : 10.9723/jksiis.2012.17.6.073
This paper reviews Privacy Impact Assessments in order to perform preventing and diagnosis against potential threats focused on the C-Shopping mall case. The quality of protection in C-shopping mall shows that the corporations itself is 29.2, the system is 68.8, the life cycle of the privacy is 25.5 and CCTV is 60.0. The lowest levels are the corporation's management 16.7, the life-cycle's saving and keeping 12.5, usage and offer 11.5 and destruction 16.7 among the life cycle of the privacy. The result of risk analysis shows that the highest levels are saving and keeping 13.3 and destruction 13.0. From the result, dangerous duplications are saving and keeping and destructions.
Developing the assessment model for technology selection: Based on the BSC and ANP
Hong, Jongyi ; Shin, Kyungchul ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 6, 2012, Pages 83~93
DOI : 10.9723/jksiis.2012.17.6.083
Technology assessment is one of the most challenging decision making areas that companies face nowadays. According to increase the importance of technology selection, it has been a main issue for the decision makers whether an appropriate technology selection will be successful or not. Therefore, in this study, a technology assessment model using BSC and ANP method was proposed. The technology assessment model consist of three phase. In first phase, various factors, that have an influence on technology assessment, were taken into consideration. Based on the extracted BSC process, the strategies and critical success factors and performance measures were extracted for selecting the technology. And in second phase, the ANP method used to integrate opinions of experts' and evaluate technology alternatives controls tangible and intangible criteria, allows for more complex inter-relationship among decision levels and deals with ambiguity involved in the assessment process. In the lase phase, according to the result of before phase, decision makers select the appropriate technology. Furthermore, the proposed model was applied in the public service for validating the feasibility of the assessment model. The criteria and proposed performance measures informs the method and focus areas for developing the technology. Furthermore, the assessment model can be applied to the other area, and give the objectivity and rationality.