Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    FIT: Design and Implementation of Fast ID Tracking System on Chip for Vehicular Ad-hoc Networks

    With the Internet of Things becoming mainstream, connectivity among cars has become mandatory. Although connectivity in a Vehicular Ad-hoc NETwork can improve users’ safety in transit, it creates an attack sur...

    Bongsoo Lee, Il-Gu Lee, Myungchul Kim in Wireless Personal Communications (2022)

  2. No Access

    Article

    Design and Implementation of Hardware-Based Remote Attestation for a Secure Internet of Things

    In general, Internet of Things (IoT) devices collect status information or operate according to control commands from other devices. If the safety and reliability of externally accessed devices are compromised...

    Jaehwan Ahn, Il-Gu Lee, Myungchul Kim in Wireless Personal Communications (2020)

  3. No Access

    Chapter and Conference Paper

    Estimation of Greenhouse Gas Emissions in Cement Manufacturing Process Through Blockchain and SSL Based IoT Data Analysis

    Recently, the Internet of Things (IoT) system, which supports human activities based on various types of real data, has attracted attention in various fields. However, the behavior of the system is determined ...

    Byeongseop Kim, Myungsoo Kim, Jongpil Jeong in Computational Science and Its Applications… (2020)

  4. No Access

    Article

    Visualization for internet of things: power system and financial network cases

    National critical infrastructure networks, such as banks and industrial control systems (ICSs), can be serious damaged in the event of a security incident. Therefore, in all these major infrastructures, closed...

    Myungjong Kim, Wooyeon Jo, Jaehoon Kim, Taeshik Shon in Multimedia Tools and Applications (2019)

  5. No Access

    Article

    The resource running time manager for integrated environment

    Latest scientific application and simulation are requiring powerful computing resources. To get the sufficient resources, more and more computer experts are constructing high-end supercomputer, cluster computi...

    Daeyong Jung, Heeseok Jeong, Jaesung Kim, Daewon Lee, Myungil Kim in Cluster Computing (2019)

  6. No Access

    Chapter and Conference Paper

    Design and Mobile Tracking Performance of a Retro-Directive Array (RDA) Antenna System

    Beamforming is one of the most important technologies for wireless communication systems. A beamforming antenna system can control the radiation beam pattern and thus can reduce power consumption, compared wi...

    Myunggi Kim, Taebum Gu, Heung-Gyoon Ryu in Ad Hoc Networks (2019)

  7. No Access

    Chapter and Conference Paper

    Open Source Based Industrial IoT Platforms for Smart Factory: Concept, Comparison and Challenges

    As Internet of Things (IoT) and Services are applied to manufacturing industries, Industry 4.0 is evolving. For Industry 4.0 to be realized in the factory, it is essential to implement horizontal integration o...

    Myungsoo Kim, Jaehyeong Lee, Jongpil Jeong in Computational Science and Its Applications… (2019)

  8. No Access

    Chapter and Conference Paper

    User Targeting SaaS Application Interworking Service Framework Using Complex Context and Rule-Matrix

    This paper presents complex contexts, rule-matrix and SaaS application inter-working service framework for user targeting service. They are key components in order to decide what SaaS service are needed and ho...

    Jong-** Jung, Yun Cui, Myung** Kim in Advances in Computer Science and Ubiquitou… (2018)

  9. No Access

    Article

    A systematic reallocation and prioritization scheme for error-resilient transmission of video packets

    This paper proposes a novel video transmission scheme that provides error-resilient transmission of encoded video on a per-packet basis over wireless networks. In conventional schemes, the error-resilient tran...

    Kyungmin Go, Myungchul Kim, Sungwon Kang, Yohaan Yoon in Multimedia Tools and Applications (2017)

  10. No Access

    Chapter and Conference Paper

    Proposal of a Resource-Monitoring Improvement System Using Amazon Web Service API

    Cloud computing uses virtualization technology to segment mass computing resources into various service types, such as Infrastructure as a Service, Platform as a Service, and Software as a Service. The system ...

    Kyu Ik Kim, Musa Ibrahim M. Ishag in Advances in Computer Science and Ubiquitou… (2017)

  11. No Access

    Chapter and Conference Paper

    Real-Time Dynamic Motion Capture Using Multiple Kinects

    The present paper proposes a method of capturing real-time motions without any inconvenient suit by using several inexpensive sensors vulnerable to joint occlusion and body rotation. Depth data and ICP algori...

    Seongmin Baek, Myunggyu Kim in Advances in Computer Science and Ubiquitous Computing (2017)

  12. No Access

    Article

    Construction of indoor floor plan and localization

    Indoor positioning and tracking services are garnering more attention. Recently, several state-of-the-art localization techniques have been proposed that use radio maps or the sensors readily available on smar...

    Ahmad Abadleh, Sangyup Han, Soon Joo Hyun, Ben Lee, Myungchul Kim in Wireless Networks (2016)

  13. No Access

    Chapter and Conference Paper

    Bubble Task: A Dynamic Execution Throttling Method for Multi-core Resource Management

    Memory bandwidth is a major resource which is shared among all CPU cores. The development speed of memory bandwidth cannot catch up with the increasing number of CPU cores. Thus, the contention for occupying m...

    Dongyou Seo, Myungsun Kim, Hyeonsang Eom in Job Scheduling Strategies for Parallel Pro… (2015)

  14. No Access

    Chapter and Conference Paper

    Run Away If You Can: Persistent Jamming Attacks against Channel Hop** Wi-Fi Devices in Dense Networks

    Wireless local area networks (WLANs) can adopt channel hop** technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though ...

    Il-Gu Lee, Hyunwoo Choi, Yongdae Kim in Research in Attacks, Intrusions and Defens… (2014)

  15. No Access

    Chapter and Conference Paper

    Mutual Private Set Intersection with Linear Complexity

    A private set intersection (PSI) protocol allows players to obtain the intersection of their inputs. While in its unilateral version only the client can obtain the intersection, the mutual PSI protocol enables...

    Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon in Information Security Applications (2012)

  16. No Access

    Article

    Behavior-based mobility prediction for seamless handoffs in mobile wireless networks

    The field of wireless networking has received unprecedented attention from the research community during the last decade due to its great potential to create new horizons for communicating beyond the Internet. Wi...

    Weetit Wanalertlak, Ben Lee, Chansu Yu, Myungchul Kim, Seung-Min Park in Wireless Networks (2011)

  17. No Access

    Chapter and Conference Paper

    Data Dissemination Protocol Based on Home Agent and Access Node for Mobile Sink in Mobile Wireless Sensor Networks

    Achieving efficient data dissemination to a mobile sink moving is one of the main challenges in wireless sensor networks. In this paper, we describe DHA, a data Dissemination protocol based on Home agent and A...

    Joa Hyoung Lee, Jae Myung Kim in Convergence and Hybrid Information Technol… (2011)

  18. No Access

    Chapter and Conference Paper

    The DecoyPort: Redirecting Hackers to Honeypots

    Most of computer security systems use the signatures of well-known attacks to detect hackers’ attacks. For these systems, it is very important to get the accurate signatures of new attacks as soon as possible....

    Iksu Kim, Myungho Kim in Network-Based Information Systems (2007)

  19. No Access

    Chapter and Conference Paper

    Consolidating with Media Streaming Server and Network Storage Card

    Recently there have been a large number of multimedia demands of IP-based applications in tremendous Internet world. However, Internet-based multimedia services typically do not offer any quality of service be...

    YongJu Lee, SongWoo Sok, HagYoung Kim, MyungJoon Kim in Network-Based Information Systems (2007)

  20. No Access

    Chapter and Conference Paper

    An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses

    Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provide enterprise level integrated...

    Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho Kun Moon in Information Security and Cryptology (2006)

previous disabled Page of 3