Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    iSCSI Protocol Parameter Optimization for Mobile Appliance Remote Storage System at Smart Home Environment Approach

    In Mobile appliance, users have a limited amount of storage availability to them due to their limited size and weight. To relieve problem we developed iSCSI remote storage system, which is an excellent solutio...

    Shaikh Muhammad Allayear, Sung Soon Park in Ubiquitous Convergence Technology (2007)

  2. No Access

    Chapter and Conference Paper

    Dynamic EPG Implementation for Ubiquitous Environment

    In this paper, we proposed EPG as a suitable method for digital broadcasting in a ubiquitous environment. As an application technique for user custom UI service in a Ubiquitous Environment, a dynamic EPG prese...

    In Jung Park, Duck Je Park, Cheonshik Kim in Ubiquitous Convergence Technology (2007)

  3. No Access

    Chapter and Conference Paper

    Product Control System Using RFID Tag Information and Data Mining

    In this paper, we suggest a method that applies RFID tag information and a data mining technology to a manufacturing execution system (MES) for efficient process control. The MES is an efficient process contro...

    Cheonshik Kim, San-Yep Nam, Duk-Je Park, Injung Park in Ubiquitous Convergence Technology (2007)

  4. No Access

    Chapter and Conference Paper

    Personalized E-Learning Process Using Effective Assessment and Feedback

    The amount and quality of feedback provided to the learner has an impact on the learning process. Personalized feedback is particularly important to the effective delivery of e-learning courses. E-learning del...

    Cheonshik Kim, Myunghee Jung in Advances in Hybrid Information Technology (2007)

  5. No Access

    Chapter and Conference Paper

    Traffic Signal Planning Using a Smart Agent System

    The multi-agent systems approach can provide a new desirable solution to the problems of traffic congestion and traffic accidents. Currently, a traffic simulator is needed to understand and explore the difficu...

    You-Sik Hong, Geuk Lee, Cheonshik Kim in Agent and Multi-Agent Systems: Technologie… (2007)

  6. No Access

    Chapter and Conference Paper

    Study of Optimal Traffic Information Using Agents Techniques

    Recently in Korea, DMB TPEG service showing the optimal road while esca** the jammed way is popular. Such latest service also provides the traffic information after average 5 minutes of the recent traffic si...

    You-Sik Hong, CheonShik Kim, Geuk Lee in Agent and Multi-Agent Systems: Technologie… (2008)

  7. No Access

    Chapter

    Data Hiding Based on Compressed Dithering Images

    In this paper, we proposed data hiding method for halftone compressed images based on Ordered dither BTC(block truncation coding) [7]. BTC[9] is a simple and efficient image compression technique. However, it ...

    Cheonshik Kim in Advances in Intelligent Information and Database Systems (2010)

  8. No Access

    Chapter and Conference Paper

    Data Hiding in a Halftone Image Using Hamming Code (15, 11)

    This paper presents a data hiding technique for a halftone image. Each block of halftone bitmaps is transformed into a sequence of binary bits, and then regarded as a codeword. From the codeword, we can get a ...

    Cheonshik Kim, Dongkyoo Shin, Dongil Shin in Intelligent Information and Database Systems (2011)

  9. No Access

    Chapter and Conference Paper

    Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications

    Steganography provides secure communications over the Internet with a cover image. However, it is difficult to transfer many messages with small-sized images. We have improved EMD (Exploiting Modification Dire...

    Cheonshik Kim, Dongkyoo Shin, Dongil Shin in Secure and Trust Computing, Data Managemen… (2011)

  10. No Access

    Article

    Certificateless message recovery signatures providing girault’s level-3 security

    A digital signature with message recovery is a signature that the message itself (or partial of the message) is not required to be transmitted together with the signature. It has the advantage of small data si...

    Ray-lin Tso 左瑞麟, Cheonshik Kim, Xun Yi 易 训 in Journal of Shanghai Jiaotong University (S… (2011)

  11. No Access

    Chapter and Conference Paper

    A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC

    We present a secret sharing scheme based on absolute moment block truncation coding (AMBTC) and Hamming code theory. AMBTC is composed of bit planes and two representative gray level pixel values, which are th...

    Cheonshik Kim, Dongkyoo Shin, Dongil Shin in Intelligent Information and Database Syste… (2012)

  12. Chapter and Conference Paper

    New Electronic Acupuncture System Using Intelligence

    In recent years, scientific studies of traditional oriental medicine are accelrating. Furthermore, researches of medical examinations and treatments through collaboration of oriental medicine and western medic...

    You-Sik Hong, Hongkyun Kim, Cheonshik Kim, Geuk Lee in Network and Parallel Computing (2012)

  13. Chapter and Conference Paper

    An Optimized Sub-texture Map** Technique for an Arbitrary Texture Considering Topology Relations

    In recent years, texture map** techniques have become more advanced as providing real-time rendering tasks. However, few methods have been conducted in optimizing a sub-texture map** for an arbitrary textu...

    Sangyong Lee, Cheonshik Kim, Seongah Chin in Network and Parallel Computing (2012)

  14. No Access

    Book and Conference Proceedings

    Grid and Pervasive Computing

    8th International Conference, GPC 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings

    James J. (Jong Hyuk) Park, Hamid R. Arabnia in Lecture Notes in Computer Science (2013)

  15. No Access

    Chapter and Conference Paper

    New ID-Based Proxy Signature Scheme with Message Recovery

    In 2012, Singh-Verma proposed an ID-based proxy signature scheme with message recovery. Unfortunately, by giving two concrete attacks, Tian et al. showed that Singh-Verma’s scheme is not secure. This paper pro...

    Eun-Jun Yoon, YongSoo Choi, Cheonshik Kim in Grid and Pervasive Computing (2013)

  16. No Access

    Chapter and Conference Paper

    Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules

    Many steganography schemes were invented for the purpose of safe communication. Such previous schemes often show good and reasonable performance, however, few have been based on paletted images; it is not easy...

    Phan Trung Huy, Cheonshik Kim, Nguyen Tuan Anh in Grid and Pervasive Computing (2013)

  17. No Access

    Chapter and Conference Paper

    Architecture of a Context Aware Framework for Automated Mobile Device Configuration

    In this paper an architecture for context aware framework for mobile phones has been represented. The main goal of this proposed architecture is to enable phones to configure themselves based on self-initiated...

    Md. Fazla Rabbi Opu, Emon Biswas, Mansura Habiba in Grid and Pervasive Computing (2013)

  18. No Access

    Article

    Aspect ratio invariant visual cryptography by image filtering and resizing

    In visual cryptographic scheme (VCS), each secret pixel is expanded to m subpixels in shadow images to encrypt a secret image. Apparently, we should put these m subpixels as a rectangle such that the blocks can b...

    Ching-Nung Yang, Pin-Wei Chen, Hsiang-Wen Shih in Personal and Ubiquitous Computing (2013)

  19. No Access

    Chapter and Conference Paper

    Improving Data Hiding Capacity Based on Hamming Code

    Matrix encoding proposed by Crandall can be used in steganography data hiding methods. Hamming codes are kinds of cover codes. “Hamming + 1” proposed by Zhang et al. is an improved version of Matrix encoding s...

    Cheonshik Kim, Ching-Nung Yang in Frontier and Innovation in Future Computin… (2014)

  20. No Access

    Chapter and Conference Paper

    Steganography Based on Low Density Parity Check(LDPC)

    We propose a data hiding scheme based on Low Density Parity Check(LDPC) codes. Our proposed theoretical point of view, the blind watermarking can be transmitted through a noisy channel. Matrix encoding propose...

    Cheonshik Kim, Ching-Nung Yang in Future Information Technology (2014)

previous disabled Page of 3