Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange

    Various studies have been conducted on secret key exchange using IPI (Inter Pulse Interval) extracted from a pulse wave. The IPI-based key exchange method uses a point where the body can measure IPI of similar...

    Juyoung Kim, Kwantae Cho, Yong-Kyun Kim in Advanced Multimedia and Ubiquitous Enginee… (2019)

  2. No Access

    Chapter and Conference Paper

    An Implementation of Unidirectional Security Gateway to Guarantees Inter-VTS Exchange Service Security

    The IVEF service developed by IALA provides a common framework for the exchange of vessel traffic information. But, it does not have a secure transmission function. When one VTS center is hacked, other VTS cen...

    Yong-Kyun Kim, Seoung-Hyeon Lee in Advances in Computer Science and Ubiquitous Computing (2018)

  3. No Access

    Chapter and Conference Paper

    Trajectory Prediction for Using Real Data and Real Meteorological Data

    Trajectory prediction is basic work for 4D-trajectory modeling, conflict detection and air traffic flow management. This paper proposes a novel algorithm based distance calculation formula (vincenty formula) f...

    Yong Kyun Kim, Jong Wook Han, Hyodal Park in Ubiquitous Computing Application and Wirel… (2015)

  4. No Access

    Chapter and Conference Paper

    Trajectory Calculation Based on Position and Speed for Effective Air Traffic Flow Management

    Trajectory modeling is basic work for 4D-Route modeling, conflict detection and air traffic flow management. This paper proposes a novel algorithm based on coordinate prediction for trajectory calculation. We ...

    Yong-Kyun Kim, Deok Gyu Lee, Jong Wook Han in Multimedia and Ubiquitous Engineering (2013)