Search Results - "Bae, Mungyu"
-
1
Future of IoT Networks: A Survey
Published in Applied sciences (16-10-2017)“…The introduction of mobile devices has changed our daily lives. They enable users to obtain information even in a nomadic environment and provide information…”
Get full text
Journal Article -
2
Authentication and Delegation for Operating a Multi-Drone System
Published in Sensors (Basel, Switzerland) (03-05-2019)“…As the era of IoT comes, drones are in the spotlight as a mobile medium of Internet of Things (IoT) devices and services. However, drones appear to be…”
Get full text
Journal Article -
3
AVSS: Airborne Video Surveillance System
Published in Sensors (Basel, Switzerland) (14-06-2018)“…Most surveillance systems only contain CCTVs. CCTVs, however, provide only limited maneuverability against dynamic targets and are inefficient for short term…”
Get full text
Journal Article -
4
Devising Mobile Sensing and Actuation Infrastructure with Drones
Published in Sensors (Basel, Switzerland) (19-02-2018)“…Vast applications and services have been enabled as the number of mobile or sensing devices with communication capabilities has grown. However, managing the…”
Get full text
Journal Article -
5
CEPP: Perceiving the Emotional State of the User Based on Body Posture
Published in Applied sciences (22-09-2017)“…Much research has been conducted in the area of face and gesture recognition in order to classify one’s emotional state. Surprisingly, utilizing computerized…”
Get full text
Journal Article -
6
MACoD: Mobile Device-Centric Approach for Identifying Access Point Congestion
Published in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (01-03-2015)“…These days, since many mobile devices support Wi-Fi, the number of Wi-Fi hotspots are increasing. At the same time, the number of places where users can use…”
Get full text
Conference Proceeding Journal Article -
7
Link-aware AP selection for improving Wi-Fi quality
Published in 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS) (01-05-2014)“…The demand of mobile traffic increases tremendously as various Internet services are provided to mobile phones and computing devices, making mobile carriers to…”
Get full text
Conference Proceeding -
8
Preserving privacy and efficiency in data communication and aggregation for AMI network
Published in Journal of network and computer applications (01-01-2016)“…Due to the evolution of smart grid technologies, the number of smart meters deployed in a consumer area is rapidly increasing. As a consequence, network…”
Get full text
Journal Article -
9
Self-Encrypting Drive Evolving Toward Multitenant Cloud Computing
Published in Computer (Long Beach, Calif.) (01-02-2024)“…In a multitenant cloud computing environment, user data resides in remote servers where multiple users share hardware and software components. Therefore, it is…”
Get full text
Journal Article -
10
Toward electricity retail competition: Survey and case study on technical infrastructure for advanced electricity market system
Published in Applied energy (15-11-2014)Get full text
Journal Article -
11
Alarm system for elder patients medication with IoT-enabled pill bottle
Published in 2015 International Conference on Information and Communication Technology Convergence (ICTC) (01-10-2015)“…Nowadays, Internet of Things (IoT) is deeply involved in human lives. Particularly, when IoT is applied to medical service, it can greatly benefit people. This…”
Get full text
Conference Proceeding -
12
Mobile device‐centric access point monitoring scheme for handover decision triggering in heterogeneous networks
Published in International journal of communication systems (01-12-2017)“…Summary Because of the low throughput and the high packet error rate in wireless communications, the network traffic often converges at access points (APs),…”
Get full text
Journal Article -
13
A simulation study on Map/Reduce framework in wireless data center environment
Published in 2013 International Conference on ICT Convergence (ICTC) (01-10-2013)“…Big data has different characteristics from the traditional data. It has large volume and various type and requires real-time processing. To process the big…”
Get full text
Conference Proceeding -
14
D-mago: A novel visual entity for storing emotional feeling with visual imprint
Published in 2014 IEEE Visual Communications and Image Processing Conference (01-12-2014)“…Many users want to preserve their visual record of the moment that they want to commemorate. Nonetheless, it is still challenging to remember the actual…”
Get full text
Conference Proceeding -
15
FASE: Fast authentication system for e-health
Published in 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN) (01-07-2013)“…For the past few decades, it is common to observe the patient's paper work at the local hospital. Even though the same personal information is used, a novel…”
Get full text
Conference Proceeding -
16
Self-configuring topology switch in smart home network
Published in 2013 International Conference on ICT Convergence (ICTC) (01-10-2013)“…Smart home technology frees us from all the hard work in the home and enables us to live in an efficient and convenient residential environment. To fully take…”
Get full text
Conference Proceeding -
17
RSSI localization with DB-Assisted Least Error algorithm
Published in 2015 Seventh International Conference on Ubiquitous and Future Networks (01-07-2015)“…RSSI (Received Signal Strength Indication) localization techniques using Wi-Fi presents substantial advantages compared to others. They are light weight both…”
Get full text
Conference Proceeding -
18
Securing mobile access with interactive image code and image key encryption
Published in Security and communication networks (10-11-2016)“…In this paper, we propose a novel anti‐phishing scheme, image code‐based anti‐phishing scheme (ICAP), for securing mobile access through an image code. The…”
Get full text
Journal Article -
19
Securing mobile access with interactive image code and image key encryption: Securing mobile access with interactive image code
Published in Security and communication networks (10-11-2016)Get full text
Journal Article -
20
Disabling Misbehavior with Traffic Constraints in WLANs
Published in Computer journal (01-12-2014)“…In this paper, we deal with vulnerabilities in IEEE 802.11 DCF protocol itself and its interaction with transmission control protocol (TCP) protocol. Selfish…”
Get full text
Journal Article