Yangsun Lee's research while affiliated with Seokyeong University and other places

Publications (61)

Article
Korean education-related evaluation agencies utilize a centralized system that directly manages learner data. This leaves the intellectual property of the organizations and the personal information of the students vulnerable to leakage should the central server be attacked. In this study, the researchers propose a multilateral personal portfolio au...
Article
Full-text available
This paper presents an internet-of-things (IoT)-cloud converged virtual machine (VM) system for IoT devices with restricted computing resources. The VM is a software processor that has many advantages in terms of software development, release, maintenance, etc., owing to its platform independence. However, in low-performance devices it has a signif...
Article
Today, the Internet of Things (IoT) is used for convenience in everyday life in many areas. Because data collected from IoT are generated in large quantities, cloud computing is inevitably used to store and analyze the data. However, cloud storage is not owned by the user, so it is unreliable. Verifying the integrity of data collected in an IoT env...
Article
The JavaScript is a scripting language for web browser environments. It is used in various environments and fields besides web pages. To support the execution of these diverse JavaScript applications, we develop JavaScript compilers based on virtual machine code in the smart cross-platform. The smart cross platform is a platform that supports multi...
Article
Full-text available
A virtual machine with a conventional offloading scheme transmits and receives all context information to maintain program consistency during communication between local environments and the cloud server environment. Most overhead costs incurred during offloading are proportional to the size of the context information transmitted over the network....
Article
Due to increasing use of third-party libraries because of the increasing complexity of software development, the lack of management of legacy code and the nature of embedded software, the use of third-party libraries which have no source code is increasing. Without the source code, it is difficult to analyze these libraries for vulnerabilities. The...
Article
The Internet of Things (IoT) is a next-generation innovation technology that integrates embedded sensors and communication functions into devices and connects them to the Internet. These IoT devices are used in various fields such as business, medicine, artificial intelligence, and the like. As the service and the market of the IoT devices are incr...
Article
The JavaScript is a programming language for scripting the Web environment, and has become a major language for creating a variety of content, such as Web applications, as the Web environment evolves. The Smart cross platform is a platform that supports multiple programming languages and multiple platforms at the same time. It consists of a set of...
Article
Full-text available
Smartphones are resource constrained external battery operated devices. The resources of smartphone devices such as a battery, CPU, and RAM are very low compared to the desktop server. However, the requirements of smartphone users are growing tremendously. As a result, smartphone applications perform rich functionality to enrich user experience. Ho...
Article
The IoT-Cloud fusion virtual machine is a virtual machine for IoT appliances that employs offloading techniques that delegate tasks requiring high computing power to low-performance appliances to a high-performance cloud server environment. IoT devices embedded with IoT-Cloud fusion virtual machines can perform complex tasks using the computing pow...
Article
The VM (Virtual Machine) is a software processor that has many advantages on software development, release, maintenance and so on due to its platform independent features. But, in execution performance aspect, it has a significant disadvantage that restricted low performance by its execution overhead for the software level interpretation. Also, in...
Article
Internet of Things (IoT) refers to the technology that connects sensors to the Internet by incorporating sensors and communication functions into various objects. Recently, such IoT devices are used in various fields such as defense, finance, and manufacturing, and virtual machines that are operated in IoT devices are being developed in order to de...
Article
Full-text available
Several location-based services (LBSs) have been recently developed for smartphones. Among these are proactive LBSs, which provide services to smartphone users by periodically collecting background logs. However, because they consume considerable battery power, they are not widely used for various LBS-based services. Battery consumption, in particu...
Article
Full-text available
With the development of mobile computing, location-based services (LBSs) have been developed to provide services based on location information through communication networks or the global positioning system. In recent years, LBSs have evolved into smart LBSs, which provide many services using only location information. These include basic services...
Article
Recent years have seen the development of computing environments for IoT (Internet of Things) services, which exchange large amounts of information using various heterogeneous devices that are always connected to networks. Since the data communication and services occur on a variety of devices, which not only include traditional computing environme...
Article
The iOS platform developed by Apple is the world's most advanced mobile operating system, continually redefining what people can do with a mobile device. Tizen platform developed by Samsung is an open source smart phone platform, which is created for wide range of device. Due to the use of different smart phone platforms, mobile contents developers...
Conference Paper
In this paper, we will introduce the JavaScript compiler for the SCP (Smart Cross Platform) to expand the SCP's coverage. The SCP is the virtual machine based solution that supports various programming languages and platforms, and its aims are to support programming languages like ISO/IEC C++, Java and Objective C and smartphone platforms such as A...
Article
As a virtual machine is a software emulation to provide a logical environment without hardware dependency, it is a key technology for cloud, mobile and IoT computing and one of major technologies to offer better IT service in the information and knowledge-based society. Smart Virtual Machine (SVM) is a core module of a smart cross platform that pro...
Conference Paper
Although the executing program on virtual machine environment has an attribute of platform-independence in general, it shows low speed performance and it is unable to implement platform independency directly. Also it has a disadvantage that the library and program written in native language cannot be reused. This paper presents the research about p...
Conference Paper
This paper presents the priority scheduling for the thread model of Smart Virtual Machine (SVM). The existing SVM have assured the execution time to all created threads equally, so that it was not able to distribute time in accordance with the importance of threads. We designed scheduling technique which suits to the characteristics of SVM through...
Article
Mobile communication companies choose different smart phone platforms, so that game developers must create content designed specifically for each platform or use a conversion process to provide game content to consumers. In this paper, to resolve this problem, the Android-to-Ios smart game converter was designed to automatically convert game conten...
Conference Paper
SVM (Smart virtual machine) is a core module in Smart Cross Plat- form as a software processor that provides language & platform independent features to user for enhancement of contents reusability. SVM uses an abstract machine code named SIL (Smart Intermediate Language) and executes it by stack based interpretation. In this paper, we deal with mu...
Conference Paper
In this paper, we will deal with the reversing technique to verifying the symbol table in Objective C compiler. The proposed technique reconstructs inputted Objective C program segments - declarations part - by using infor- mation of the symbol table inserted during the process of declaration analysis phase of the Objective C compiler, and therefor...
Conference Paper
The Smart Cross Platform guarantees content compatibility on vari- ous smart devices and supports numerous programming languages which is a solution to increase development productivity. The SVM (Smart Virtual Ma- chine) is the core virtual machine of the smart cross platform. In this paper, a technique which allows previous SVM which operates on s...
Article
Mobile device environment has increased demand for educational resources that can be accessed on and off-campus. The resources such as digital textbooks provide various features, including multimedia, web-based application and annotation functionality, yet a number of usability issues remains for digital textbook to be a useful educational element....
Article
The previous development environments for smart phone contents are needed to generate specific target code depending on target devices or platforms, and each platform has its own developing language. Therefore, even if the same contents are to be used, it must be redeveloped depending on the target machine and a compiler for that specific machine i...
Article
The Smart Cross Platform is a virtual machine based solution that supports various programming languages and platforms, and its aims are to support programming languages like C++, Java and Objective-C and smart phone platforms such as Android and iOS. Various contents that developed by supported language on the Smart Cross Platform can be execute o...
Article
The iOS platform developed by Apple is the world's most advanced mobile operating system, continually redefining what people can do with a mobile device. Bada platform developed by Samsung is a smart phone platform, which is created for wide range of device. "Bada" is a Korean word that means "ocean" and "seashore". "bada" in itself embodies the op...
Article
Today's software allows data transfer with the use of internet. Therefore, there is always a threat of attack by hackers. These security weaknesses cause a critical economic loss which is a direct cause of software security invasion accidents. Recently in order to solve these security weaknesses, rather than strengthening the security system from t...
Article
General Purpose Graphic Processing Unit (GPGPU) computing with CUDA has been effectively used in scientific applications, where huge accelerations have been achieved. However, while today’s traditional GPGPU can reduce the execution time of parallel code by many times, it comes at the expense of significant power and energy consumption. In this pap...
Article
Full-text available
We propose an efficient resource reservation scheme for UWB (Ultrawideband) WPAN (Wireless Personal Area Network) with D-MAC (Distributed Medium Access Control). Since the WiMedia D-MAC supporting DRP (Distributed Reservation Protocol) scheme causes lots of conflicts due to failure of beacon detection in wireless channel environment, overall perfor...
Article
Full-text available
We propose a middleware platform built on wireless USB (WUSB) over wireless body area networks (WBAN) hierarchical protocol for wearable health-monitoring systems (WHMS). The proposed middleware platform is composed of time-synchronization and localization solutions. It is executed on the basis of WUSB over WBAN protocol at each wearable sensor nod...
Conference Paper
SVM(Smart Virtual Machine) is the virtual machine solution that supports various programming languages and platforms, and its aims are to support programming languages like ISO/IEC C++, Java and Objective-C and smart phone platforms such as Android and iOS. Various contents that developed by supported language on SVM can be execute on Android and i...
Conference Paper
In this Paper, we propose a Real-Time Localization Platform Built on WUSB (Wireless USB) over WBAN (Wireless Body Area Networks) protocol required for Wearable Computer systems. Proposed Real-Time Localization Platform Technique is executed on the basis of WUSB over WBAN protocol at each sensor node comprising peripherals of a wearable computer sys...
Article
The complexity of robot system for various tasks can be simplified by multi-robot cooperation system. But, it still reminds some problems such as multi-robot control, configuration of task scenarios, robot malfunction, and dynamically changing environments. In order to handle such a situation that may be changed dynamically, a technology that allow...
Article
SVM(Smart Virtual Machine) is the virtual machine solution that supports various programming languages and platforms, and its aims are to support programming languages like ISO/IEC C++, Java and Objective-C and smart phone platforms such as Android and iOS. Various contents that developed by supported language on SVM can be execute on Android and i...
Article
The spread of the smart device has led collaborative technologies to valuable applications in developing educational content. Many electronic textbooks provide basic annotation features like sharable bookmarks, notes, highlighting and underlining. These user activities contain important information in the view of education such as user knowledge an...
Conference Paper
Semantic Analysis is a process which analyzes the validity of a meaning created by combining a program's different constituents, and this process has become indispensable component for producing a compiler. It uses the attribute grammar method or the manual method however such methodology holds limitations in terms of efficiency or automation. In t...
Conference Paper
Mobile communication companies in Korea choose different mobile platforms from each other so that developers have to create contents for each of the platforms according to their different characteristics or undergo a converting process to provide the game contents to consumers. In this paper, in order to resolve such problems the game contents of t...
Conference Paper
For each platform, for smart phone contents, a unique development environment exists and thus suitable development methods and development languages must be used for each platform. A problem of this development environment is that when contents are created for a number of platforms, an increase in expenses occurs. SVM(Smart Virtual Machine) is a vi...

Citations

... Recently, [37] proposed a blockchain-based, multilateral personal portfolio authentication scheme that guarantees the reliability, integrity, and transparency of schooling history data. Alexander et al. in [38] investigated how blockchain-enabled smart badges could help learners advance their careers by providing them with personalized recommendation services based on their learning achievements. ...
... Similarly, Jinbo et al. [37] dealt with the MCS data privacy and proposed a BF-based user-union matching scheme to protect it, while Siddiqui et al. [38] proposed a BF-based secure data provenance mechanism suitable for resource-constrained devices in IoT networks. A secure cloud storage service for an IoT environment is presented in [39], where BF is used to verify the integrity of data saved in the cloud. The context-aware addressing and routing method described in [40] uses BFs along the routing protocol to express context information inside the IoT domain. ...
... In ITS scenarios, mobile devices with constraints on computational and energy resources are often used to cite an example. To circumvent this issue, we can employ a traditional approach that moves computational tasks to the cloud, allowing mobile devices to transfer the burden of running the DNN [5]. This solution, however, has challenges when considering network load and inference time. ...
... • The list of final studies is described in Table I. [20], [21], [22] [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39] [40], [41], [42], [43], [44], [45] [46] [47], [48], [49], [50], [51] [52], [53], [54], [55], [56], [ 2. Study quality assessment. The following quality criteria (see Table II) were defined for assessment: Steps for building the model with parameters are documented QC6. ...
... Although the offloading technique solves the problem that the performance of the virtual machine is dependent on the performance of the IoT device being operated, there is a network cost due to the communication between the cloud and the local device. Therefore, depending on the program complexity, the offloading performance may be lower than the performance of the local device [1][2][3][4][5]. ...
... This provides a high-level framework of the fog node computing, their communications and management and will help drive standardization across the various layers and interfaces specified by the consortium. Ref. [17] was to implement a distributed and concurrent offloading framework, DisCO. A DisCO is to offload the computation-intensive or data-intensive division of the IoT application executed or collected on the edge device to the resourceful edge server with high computing resources and processing capacity in real time and then returned the results of executing. ...
... In [5], the authors proposed an online cloud-based framework to estimate battery lifetime of a smartphone device that consists of two layers; one running on smartphone side, whereas the other residing on the cloud server offering two modes for the energy estimation of smartphone applications to ensure its high applicability. ...
... Yunsik Son et al. [4] provided a brief overview on symbol table. Symbol table is an essential module in compiler construction. ...
... The other classifications of computation offloading are (c) full and (d) partial offloading [47]. In partial offloading, some of the parts of computation task are offloaded to the server. ...
... This approach is to design a secure software where a secure coding rule checker and a static weakness analyzer are incorporated in the secure model. An example of the secure coding model for codes written in C/C++ is illustrated in Fig. 3 [17]. (b) Format source codes as libraries, executables, and obfuscation codes. ...