Earticle

현재 위치 Home

JoC [Journal of Convergence]

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    한국정보기술융합학회 [Korea Information Technology Convergence Society]
  • pISSN
    2093-7741
  • eISSN
    2093-775X
  • 간기
    계간
  • 수록기간
    2010 ~ 2015
  • 주제분류
    공학 > 전자/정보통신공학
  • 십진분류
    KDC 004 DDC 004
Volume3 Number3 (8건)
No
1

Preface

James J. (Jong Hyuk) Park, Mohammad S. Obaidat

한국정보기술융합학회 JoC Volume3 Number3 2012.09 p.-1

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Computing and Communications

2

Processing and Analysing Large Log Data Files of a Virtual Campus

Fatos Xhafa

한국정보기술융합학회 JoC Volume3 Number3 2012.09 pp.1-8

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recording server log data files is nowadays commonplace practice. The server log data files capture useful information during the interaction of users with the online site, as well as the interaction among users during online sessions. Extracting such information can be helpful for many purposes, such as user modelling, user activity analysis, data analytics, security, monitoring, etc. However, there are two main issues with server log data files: (1) they tend to be of very large size due the considerable number of online users and (2) such data is not ready to be analysed due to log files needing to be pre-processed and cleaned from redundant and futile information to make it ready for data mining and analysis. In this work we consider a real case study of the massive processing and analysis of the log data files of the real Virtual Campus of the Open University of Catalonia. We demonstrate the need and feasibility of using massive processing through different distributed infrastructures. Then we show the analysis of the navigation patterns of users’ activity within the Virtual Campus. This work shows a real example of the convergence of different technologies and paradigms such as massive processing, data mining and online learning to study user behaviour and modelling in online sites.

3

Design for Accountability in Multi-core Networks

Jingcheng Gao, Yang Xiao

한국정보기술융합학회 JoC Volume3 Number3 2012.09 pp.9-16

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recent years have witnessed a dramatic rise in the popularity of integrating more CPU cores into one unit, and therefore giving more computing power to the new computer system. With multi-core architecture we can answer many security problems, especially regarding network level activities which are recorded in real-time with little performance loss. On the other hand, network level accountability is becoming more demanding in the area of network security research. People are trying to allow networks to easily locate corresponding network entities that are responsible for certain traffic flows over the Internet. These two areas have made our computer systems more powerful and secure. In this paper, we present a design for accountability in multi-core networks. Theoretically, with multi-core architecture implemented in routers, along with packet recording and later auditing, we can make the Internet of the future more secure and accountable.

4

Achieving Load Awareness in Position-based Wireless Ad Hoc Routing

Xu Li, Nathalie Mitton, Amiya Nayak, Ivan Stojmenovic

한국정보기술융합학회 JoC Volume3 Number3 2012.09 pp.17-22

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We propose applying the concept of Cost-to-Progress Ratio (CPR) in position-based greedy routing for load reduction and balancing. The load of a node is the percentage of time it is occupied by forwarding traffic or the inability to forward due to interference. The resultant routing protocol, named CPR-routing, is a localised parameter-less approach, optimising the ratio of nodal load and geographic progress. Through extensive simulation, we evaluate it in comparison with an existing parameter-based localised solution, a -routing. Our simulation results indicate that CPR-routing outperforms a-routing in per node load, success rate, and average hop count.

Security and Trust

5

Trusted M-banking Verification Scheme based on a combination of OTP and Biometrics

Chang-Lung Tsai, Chun-Jung Chen, Deng-Jie Zhuang

한국정보기술융합학회 JoC Volume3 Number3 2012.09 pp.23-30

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Due to the versatile and convenient functionality development of smart phones and tablet PCs, mobile e-commerce has dramatically increased. In particular, M-banking has become more convenient, effective and timely through the new mobile communication devices and systems. In order to provide a reliable and secure M-banking process without concurrently decreasing the convenience, a trusted M-banking verification scheme based on the combination of a one-time password (OTP) and personal biometric have been developed in this paper. As the client side initiates a request for M-banking to the server side of a bank that provides the M-banking service, the server side will generate an OTP with a limited period for registration to the M-banking system and transmit this to the client side. After receiving the OTP message, the client side must verify whether the OTP message is validated and provided by the desired real server side. After which, the client side will register to the on-line M-banking system with the OTP within the specified short period. After receiving the service request, the server side will then request that the client side immediately capture a personal biometric, such as a fingerprint, iris, photo, etc. for further verification with the existing data stored on the server side to prevent fraud. If the personal biometric is verified as an old one, the M-banking system will immediately be terminated by the server side. Once verification is confirmed by the server side, the client side can then smoothly perform transactions via M-banking. The proposed scheme can not only provide a secure M-banking system, but can also clearly define the process. Therefore if there are any disputes due to Internet hacking or the mobile phone having been stolen, the client side can protect their rights.

Web and Multimedia

6

Incorporating the Social Web Environment in Agile Requirements Engineering

Pankaj Kamthan

한국정보기술융합학회 JoC Volume3 Number3 2012.09 pp.31-38

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

For the past decade, agile methodologies have been part of a shift from a predictive to adaptive approach towards software development in many organisations. This paper views agile requirements engineering as a kind of social engineering, and explores the potential of the Social Web in facilitating it. In doing so, the interplay between stakeholders, the salient activities of the agile requirements engineering process, and Social Web Applications is illustrated by means of representative examples. The implications towards other agile project artefacts and agile requirements engineering education are highlighted.

7

Iconic Visual Queries for Face Image Retrieval

Chamin Morikawa, Kiyoharu Aizawa

한국정보기술융합학회 JoC Volume3 Number3 2012.09 pp.39-46

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We propose a user interaction technique for the fast and intuitive formation of visual queries for retrieving photos that have faces. A face icon is used to represent a face in a photo. A user forms an “iconic sketch” of the desired photo, by placing face icons on a canvas-like region and adjusting their sizes and locations. A search algorithm matches the properties of these icons with those of faces automatically detected in image collections. It retrieves the results ranked by the similarity of matching. We summarise a few example applications based on the proposed interaction technique.

IT Managements and Services

8

IT Convergence Index and Measurement Design in the Manufacturing Industry

Yanghoon Kim, Hangbae Chang

한국정보기술융합학회 JoC Volume3 Number3 2012.09 pp.47-50

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recently, IT has raised a new issue called convergence with other technologies or industries, which is located in the centre of changes and innovation. In addition, as demands on IT convergence have rapidly increased in every industry, a method is required to produce an IT convergence index, which can systematically and comprehensively understand the real condition of IT convergence between various industries, including IT and the manufacturing industry, in order to compare it objectively. This paper examined and analysed precedent studies and some nation’s definitions of convergence to redefine IT convergence. Furthermore, an IT convergence index system was developed for objectively analysing the extent of IT convergence. The IT convergence index was analysed in detail for the automobile and shipbuilding industries.

 
페이지 저장