Journal of Information Processing Systems, Vol. 1., No.   1 , 2005

A Study on the Design of the Monitoring Architecture for Embedded Kernels based on LTT
Ji-Hye Bae, Yoon-Young Park and Jung-Ho Park
Page: 1~8, Vol. 1, No.1, 2005
Keywords: Monitoring tool, NFS, LTT, MONETA 2.0
Show / Hide Abstract

Robust Real-time Intrusion Detection System
Byung-Joo Kim and Il-Kon Kim
Page: 9~13, Vol. 1, No.1, 2005
Keywords: real-time IDS, kernel PCA. LS-SVM
Show / Hide Abstract

A Multiple Instance Learning Problem Approach Model to Anomaly Network Intrusion Detection
Ill-Young Weon, Doo-Heon Song, Sung-Bum Ko and Chang-Hoon Lee
Page: 14~21, Vol. 1, No.1, 2005
Keywords: Multiple Instance Learning Problem, Network Intrusion Detection, Anomaly Detection
Show / Hide Abstract

A Hierarchical Text Rating System for Objectionable Documents
Chi Yoon Jeong, Seung Wan Han and Taek Yong Nam
Page: 22~26, Vol. 1, No.1, 2005
Keywords: Objectionable documents, document analysis, text classification, hierarchical system, SVM
Show / Hide Abstract

A Hardware/Software Codesign for Image Processing in a Processor Based Embedded System for Vehicle Detection
Hosun Moon, Sunghwan Moon, Youngbin Seo and Yongdeak Kim
Page: 27~31, Vol. 1, No.1, 2005
Keywords: Embedded System, ITS, Image Processing, Vehicle Detect
Show / Hide Abstract

Wavelet-based Image Denoising with Optimal Filter
Yong-Hwan Lee and Sang-Burm Rhee
Page: 32~35, Vol. 1, No.1, 2005
Keywords: Image Denoising, Noise Reduction Wavelet
Show / Hide Abstract

Simulation of the Digital Image Processing Algorithm for the Coating Thickness Automatic Measurement of the TRISO-coated Fuel Particle
Woong-Ki Kim, Young-Woo Lee and Sung-Woong Ra
Page: 36~40, Vol. 1, No.1, 2005
Keywords: TRISO-coated Fuel Particle, Coating Thickness, X-ray CT, Computed Tomography, Filtered Backprojection, Automatic Measurement
Show / Hide Abstract

PC-KIMMO-based Description of Mongolian Morphology
Purev Jaimai, Tsolmon Zundui, Altangerel Chagnaa and Cheol-Young Ock
Page: 41~48, Vol. 1, No.1, 2005
Keywords: natural language processing, two-level morphological rule, Mongolian morphology, finite-state transducers, computational linguistics
Show / Hide Abstract

A Cluster-Based Energy-Efficient Routing Protocol without Location Information for Sensor Networks
Giljae Lee, Jonguk Kong, Minsun Lee and Okhwan Byeon
Page: 49~54, Vol. 1, No.1, 2005
Keywords: Wireless sensor networks, ubiquitous sensor networks, cluster-based routing protocol, energy-efficient routing
Show / Hide Abstract

Performance Analysis of the Distributed Location Management Scheme in Large Mobile Networks
Dong Chun Lee, Hong-Jin Kim, Jong Chan Lee and Yi Bing Lin
Page: 55~61, Vol. 1, No.1, 2005
Keywords: Distributed Location Management, LMN, Performance Analysis, IMT-2000
Show / Hide Abstract

A Performance Analysis Model of PC-based Software Router Supporting IPv6-IPv4 Translation for Residential Gateway
Ssang-Hee Seo and In-Yeup Kong
Page: 62~69, Vol. 1, No.1, 2005
Keywords: Performance analysis model, Software PC router, IPv6-IPv4 translator, M/G/1/K, MMPP-2/G/1/K, residential gateway
Show / Hide Abstract

The Comparison of RBS and TDP for the Sensor Networks Synchronization
Hyojung Lee, Byungchul Kim and Youngmi Kwon
Page: 70~74, Vol. 1, No.1, 2005
Keywords: Sensor Network, RBS, TDP, Time Synchronization
Show / Hide Abstract

The Plan and Tools for Vulnerability Testing in Information Software-Based System
Injung Kim, Younggyo Lee and Dongho Won
Page: 75~78, Vol. 1, No.1, 2005
Keywords: Risk Analysis, Vulnerability, Asset, Threat
Show / Hide Abstract

Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation
Jung-Ho Eom, Seon-Ho Park, Tae-Kyung Kim and Tai-Myoung Chung
Page: 79~85, Vol. 1, No.1, 2005
Keywords: Risk management, Risk Analysis, Asset analysis, 2-dimensional qualitative analysis
Show / Hide Abstract

Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services
Kiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn and Jaecheol Ryou
Page: 86~95, Vol. 1, No.1, 2005
Keywords: Location-based service, Open LBS security, XKMS, XML security, XML web services
Show / Hide Abstract

A Study on RFID System with Secure Service Availability for Ubiquitous Computing
Dae-Hee Seo and Im-Yeong Lee
Page: 96~101, Vol. 1, No.1, 2005
Keywords: RFID, Service Availability, Secure Communication, Network Management Ubiquitous Computing
Show / Hide Abstract

A Statistic Correlation Analysis Algorithm Between Land Surface Temperature and Vegetation Index
Hyung Moo Kim, Beob Kyun Kim and Kang Soo You
Page: 102~106, Vol. 1, No.1, 2005
Keywords: LST, NDVI, Correlation Analysis, Landsat ETM+
Show / Hide Abstract

Prototyping a Student Model for Educational Games
YoungMee Choi, MoonWon Choo and SeongAh Chin
Page: 107~111, Vol. 1, No.1, 2005
Keywords: edutainment, pedagogical agents, emotion generation, student modeling, Intelligent Tutoring Systems, dynamic Bayesian networks
Show / Hide Abstract

JIPS Awards 2016

Amine Dahane, Nasr-Eddine Berrached and Abdelhamid Loukil (University of Sciences and Technology of Oran, Algeria)

Publication (Author)
Deokjai Choi (Chonnam National University, Republic of Korea)

Publication (First Author)
Jayaprakash Kar (King Abdulaziz University, Saudi Arabia)

AE activity
Joon-Min Gil (Catholic University of Daegu, Republic of Korea)

Review activity
Seung-Won Jung (Dongguk University, Republic of Korea)


All publications of JIPS are indexed in ESCI (a new Web of Science index of Thomson Reuters), SCOPUS, DOI, DBLP, EI COMPENDEX, EBSCO, Google Scholar, and Crossref.










JIPS is also selected as the Journal for Accreditation by NRF (National Research Foundation of Korea).

This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License.