Hyuncheol Kim's research while affiliated with Namseoul University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (22)
The design, management, and operation of network infrastructure have evolved during the last few years, leveraging on innovative technologies and architectures. With such a huge trend, due to the flexibility and significant economic potential of these technologies, software-defined networking (SDN) and network functions virtualization (NFV) are eme...
A hardware tracer generates its enormous data into a log that is used for both performance analysis and debugging. Processor Trace (PT) is a new hardware-based tracing feature for Intel CPUs that traces branches executing on the CPU, which allows the reconstruction of the control flow of all executed code with minimal labor. Hardware tracer has bee...
To deliver the myriad of videos tailored to each user, so far, most of the video services have provided customization service by video recommendations. However, as the place, device, and application for consuming video become almost anywhere, customization not only for users’ taste but also for their video consuming environment is required. In this...
This is the second volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in the field. It explores how IT convergence and security issues are core to most current research, industrial and commercial activities and consist...
This paper presents the design and implementation of headend servers for a downloadable conditional access system (DCAS) that can securely transmit CA code via a broadband channel. To design DCAS headend server, we define core functions to be performed in the headend and categorize them into four sections such as authentication, provisioning, perso...
NFV enhancing the infrastructure agility, thus network operators and service providers are able to program their own network functions (e.g., gateways, routers, load balancers) on vendor-independent hardware substrate. One of the main challenges for the deployment of NFV is the efficient resource (e.g. virtual network function (VNF)) allocation of...
With the advent of cloud and virtualization technologies and the integration of various computer communication technologies, today’s computing environments can provide virtualized high quality services. The network traffic has also continuously increased with remarkable growth. Software defined networking/network function virtualization (SDN/NFV) e...
Belief propagation (BP) decoding has been widely used for decoding Luby transform (LT) codes which perform very well for a large number of input symbols. However, in reality, small numbers of input symbols are often encountered. In this paper, an efficient BP decoding assisted on-the-fly Gaussian elimination (OFG) decoding process is proposed. Our...
In recent years, cloud and virtualization technologies have received a lot of attention among network equipment vendors and service providers. Due to the flexibility and significant economic potential of these technologies, software defined networking and network functions virtualization are emerging as the most critical key enablers. SDN/NFV facil...
With the cloud computing, storage and computing resources are moving to remote resources such as virtual servers and storage systems in large datacenters, which raise many performance and management challenges. The distributed cloud networks must have an ability to maintain an acceptable level of service during network failures to provide high resi...
The explosive growth of Internet traffic has led to a dramatic increase in demand for data transmission capacity, which has spurred much research activities in real-time logical network construction methods. High-speed services and bulk transmission are now available, and various next-generation converged services are undergoing change as a result...
The Internet is replacing the traditional telephone network as the ubiquitous network infrastructure. Internet customers are increasing at an exponential rate and will continue to increase in the near future. Among the various Internet services, IPTV VoD (Video on Demand) service is expected to be one of the most popular services. In general, for d...
With the cloud computing, storage and computing resources are moving to remote resources such as virtual servers and storage systems in large datacenters, which raise many performance and management challenges. We consider distributed cloud systems, which deploy micro DC that are geographically distributed over a large number of locations in a wide...
Recently, the technology and services make progress in IT sector to facilitate the rehabilitation, as well as the exercise that aims to promote the health. In particular, the research has been conducted, using the game, in the new technology cultural contents which have shown noticeable fusion and convergence between IT and exercise rehabilitation...
The aim of this study is to suggest the fitness Avatar model for increasing physical activities in individuals with SCI (spinal cord injury). With the increasing of the disable, the ratio of individuals with SCI is also increasing. With the expansion of new technology, such as video games and virtual reality, there has been an increasing in the int...
The explosive growth of Internet traffic has led to a dramatic increase in demand for data transmission capacity, which requires
high transmission rates beyond the conventional transmission capability. This demand has spurred tremendous research activities
in new high-speed transmission and switching technologies. As optical transmission technology...
SCTP (stream control transmission protocol) is a general-purpose transport protocol for IP network data communications. This paper examines methods of guaranteeing multi-streaming management and fairness among streams within SCTP associations. We investigated an important aspect of fairness adjustment between streams of SCTP, the underlying congest...
In this study, we examine the stability assessment of the current network by using the number of trees generated when an articulation
node within the network becomes functional. As a consequence, we will be able to design networks with more stability using
the same amount of resources. Previous studies assessed the stability of a network by using t...
SCTP(Stream Control Transmission Protocol) is a new IETF transport protocol over the IP network. Transport protocol is responsible
for reliable delivery of a message form a host to another host. We implemented an efficient file transfer system using the
SCTP multiple file transfer and modified STCP congestion control mechanism for heterogeneous ubi...
Citations
... VIM synchronizes the virtual components with hardware components to dynamically deliver and manage network services. As a whole, NFV is a software virtualized platform, which is responsible for deploying network services over purpose-built hardware elements [4]. NFV eliminates various problems such as business expenditure and network complexity by reducing the processing and response time of the network [5]. ...
... It is a product of highly simultaneous interpreting of multimedia technology, network technology and storage technology. e information technology requirements for managers are relatively low [19]. After years of development, microtechnology organically integrates classroom teaching, video recording, network on-demand, mass storage and other functions, and has become a perfect solution for micro lesson video management [20,21]. ...
... On the other hand, (Bohuslava et al., 2017) enables communication of robots with a central unit by incorporating existing protocols like TCP/IP into the robot cells. Additionally, Lee et al. (D. Lee et al., 2017) describe how to implement a CPS and how to allow communication and information sharing among devices. Other works at this level are oriented to provide explicit or implicit communications of entities, using a variety of techniques like Multi-Agent Systems (MAS) (Romero et al., 2017), Industrial IoT (IIoT) (Molano et al., 2017;Wan et al., 2016), Big Data (Jirkovský et al., 2017), human-robot interaction (Huber & Weiss, 2017;Nelles et al., 2016), Augmented Reality (AR) (Longo et al., 2017;Pierdicca et al., 2017), etc. ...
... To solve the above two optimization problems, graph theory was used to analyze the backup scheme, and several algorithms were proposed to achieve efficient assignments via this analysis. In [48], to realize the new resource sharing and monitoring in the SDN/NFV, the authors presented an NFV monitoring architecture based on a practical measuring framework for network performance measurement. ...
... The network traffic has also continuously increased with remarkable growth. With such a huge trend, due to the flexibility and significant economic potential of these technologies, software defined networking (SDN) and network functions virtualization (NFV) are emerging as the most critical key enablers [1,2]. ...
... The idea merge between the high degree output packets with some low degree one to avoid decoding block. Belief propagation algorithm is modified to find a solution for an empty ripple size for short length blocks is presented in [19]- [25]. From these previous works, it is evident that the short length data files need an adjustment for the degrees of the encoded packets as well as the way of selection to the data packets required to form the encoded one. ...
Reference: A Simulink model for modified fountain codes
... Some studies have discussed video multicast. In [2,5,6,10,13,30], video multicast techniques were proposed. However, the studies were focused on monoscopic video. ...
... Penggunaan protokol UDP biasanya ditemukan pada aplikasi yang bersifat streaming. Penelitian sebelumnya, [6] juga memaparkan bahwa protokol TCP dengan menggunakan multiple TCP connection akan membutuhkan resource dalam membuka dan menutup koneksinya. Berbeda dengan SCTP yang merupakan protokol dengan kemampuan untuk melakukan transmisi data secara streaming dan memiliki pengendali kemacetan [5]. ...