Young-Hyuk Kim’s research while affiliated with Hannam University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (23)


Design of Disaster Collection and Analysis System Using Crowd Sensing and Beacon Based on Hadoop Framework
  • Conference Paper

June 2015

·

25 Reads

·

2 Citations

Lecture Notes in Computer Science

Eun-Su Mo

·

Jae-Pil Lee

·

Jae-Gwang Lee

·

[...]

·

Jae-Kwang Lee

Currently, disaster data is collected by using site-based, limited regional collection. In this study, a system that collects location information of users that have a mobile device is proposed. The proposed system collects real-time disaster data by using crowd sensing, a user-involved sensing technology. In order to quickly and accurately determine a large amount of unstructured data, among big data frameworks, the Hadoop framework is applied as it efficiently sorts a large amount of data. Also, to enable fast local evacuation alert for users, a beacon-based ad-hoc routing interface was designed As an integrated interface of the proposed systems, a hybrid app based on HTML5, which uses JSON syntax.


Hybrid app security protocol for high speed mobile communication

November 2014

·

96 Reads

·

4 Citations

The Journal of Supercomputing

In this paper, security vulnerabilities that can be found in hybrid apps, by which important data are downloaded from a web server, were analyzed and HIGHT algorithm based on OTP delimiter modification and bit slicing was proposed to enhance security of hybrid apps. The hybrid app, to which the proposed method was applied before analysis, is a medical app for research and monitors biometric data of patients in the healthcare field. This app is monitoring patient’s biometric data continuously. Thus, this app generates considerable mobile traffic and transmission delay. After installing the app in a mobile device, reverse engineering was used to check the address from which the app requests important data, and a web server analysis tool was used to obtain important data that enables security attacks including the sitemap, type and version of application, and open source. To solve these problems, the security protocol proposed in this paper was applied, as a result important data were protected without transmission delay and it shows that proposed protocol can adopt high speed mobile communications.


Lecture Notes in Computer Science

June 2014

·

10 Reads

·

16 Citations

Lecture Notes in Computer Science

Due to the strength of bitcoin including the convenient payment and transfer, exchange into legal tender, low transfer fee, and others, its usage is increasing dramatically. Bitcoin is an e-money and virtual currency currently used as a means of payment in about 20,000 online companies and 1,000 offline stores as of Feb. 2014. Different from previous e-money, there is no issuing institution and it has trait of no regulation by countries or companies. However, as there is an increase in value of bitcoin followed by Cyprus financial crisis in past March, issues regarding the security breach on the rise. Since the exchange between legal tender and virtual currency is free in case of bitcoin, direct damage caused by security breach is very large. Also, as there is no governing institution, the user is responsible for all loss in case of damage occurrence. Therefore, the purpose of this study is to look into transaction method and security breach trend of bitcoin and its countermeasures.


Performance Evaluation of WDS-Based Mobile ITS Video Control System for Smart APT Traffic Control

January 2014

·

18 Reads

Lecture Notes in Electrical Engineering

This paper is to represent web-accessible and network-compatible Mobile ITS Video Control System for Smart APT Traffic Control for where Wi-Fi is avaliable. WLAN for IEEE 802.11a has adopted 5GHz frequency in light of the fact that consumer mobile devices work on 2GHz. For test purpose IEEE 802.11p, being a PHY/MAC standard for WAVE, a V2V/V21 Next-gen Network, replaced IEEE 802.11a. Plus, the test practically established WDS in an apartment complex in Daejeon City in confirmation of compatibility of Mobile ITS Video Control System while handling Wi-Fi handover issues.


Assessment of Compatibility between Standard Medical Systems of u-RPMS and HL7

January 2014

·

8 Reads

Lecture Notes in Electrical Engineering

To provide improved environment for medical information service, mobile devices can be used for delivering personal information to HIS (Hospital Information System). MII (Medical Integration Interface) of u-RPMS (ubiquitous Sensor Network Remote Patient Monitoring System) in the previous study plays such role as an interface. However, information may not be delivered due to difference in version of the medical data processing standard HL7(Health Level 7). In this paper, the compatibility according to the HL7 version of HIS was assessed when sending personal information via u-RPMS to HIS. As a result, it was found that it is compatible when the syntax of v2.x is sent to v3.0 by using XML(Extensible Markup Language)Parsing.


Study on Encryption of Wireless Network-Based Mobility Energy-Enterprise Security Management

January 2014

·

9 Reads

Lecture Notes in Electrical Engineering

The objective of this study is to propose the encrypted mobility Energy-Enterprise Security Management (E-EMS) for a green race environment currently widely adopted througout the global. E-EMS is a system which can actively monitor and control energy consumption. Unlike wired network, there are certain weakness in terms of surveillance and security for wireless network so it is critical to have information exchange between modules, and administrators for the management of each security module. To overcome the aforementioned limitation of wireless network, this study proposes an integrated security control system equipped with Smart Rack and AES, SEED encryption protocol.


The traffic performance evaluation between remote server and mobile for applying to encryption protocol in the Wellness environment

November 2013

·

10 Reads

·

1 Citation

Journal of Digital Convergence

U-WHS refers to a means of remote health monitoring service to combine fitness with wellbing. U-WHS is a system which can measure and manage biometric information of patients without any limitation on time and space. In this paper, we performed in order to look into the influence that the encryption module influences on the communication evaluation in the biometric information transmission gone to the smart mobile device and Hospital Information System.In the case of the U-WHS model, the client used the Objective-c programming language for software development of iOS Xcode environment and SEED and HIGHT encryption module was applied. In the case of HIS, the MySQL which is the Websocket API of the HTML5 and relational database management system for the client and inter-server communication was applied. Therefore, in WIFI communication environment, by using wireshark, data transfer rate of the biometric information, delay and loss rate was checked for the evaluation.


Study on Low-Power Transmission Protocols for ZigBee Wireless Network-Based Remote Biosignal Monitoring Systems

November 2013

·

8 Reads

·

2 Citations

Lecture Notes in Electrical Engineering

This study uses low-power, low-speed ZigBee sensors with defined network and application layers based on the media access and physical layers of Wireless Personal Area Networks (WPAN). ZigBee sensor nodes were connected to Personal Health Devices (PHD), which measure the biosignals of patients, to form a wireless network. We do not apply generalized ad-hoc routing protocols or tree structures but instead are proposing modified hop-count routing protocols using the WBSS characteristic of IEEE 802.11p. This is because sensor nodes operate from fixed positions and smartphones, which play the gateway role, has the characteristic of constantly shifting location, from the patient’s hand and ears to neraby desks. We used 3 PHDs (ECG, pulse and blood pressure) and connected ZigBee modules using external batteries to confirm whether normal service was being performed.


The SAR Chart Viewer design and Implementation in mobile web
  • Article
  • Full-text available

September 2013

·

100 Reads

·

1 Citation

The Journal of the Korean Institute of Information and Communication Engineering

Scientific and technological research data is increasing exponentially and, Kisti(Korea Institute of Science and Technology Information) built and supported GSDC(Global Science experimental Data hub Center) depending on the needs processing large data computing and storage devices. Mobile web standards-based the MUPS was built for global community and services of gsdc to spreading mobile devices rapidly. And for analyze Operational status and system resources of GSDC at n this paper researched and implemented system resource monitor method of gsdc to mobile web environment, in this paper researched and implemented system resource monitor method of gsdc to mobile web environment. Research support system of GSDC operated by scientific linux. Sysstat resource monitoring tools create a daily report through sar(system analysis report), after sadc(system activity data collector) collected system resource utilization information. In this paper, sar reports designed and implemented in mobile web to can visualize in a mobile environment. We do not depend specific OS by implementation of the mobile web. So we are available in variety mobile OS. And through provided visual graph, this system can monitor easily and more conveniently then the existing system.

Download

Comparison & Analysis of HIGHT and SEED for the Protection of Biometric Information at U-Wellness Healthcare System

June 2013

·

12 Reads

This paper is for patients with chronic conditions who use a patient monitoring service with a smart mobile at the U-WHS(Ubiquitous-Wellness Healthcare System). This system is for collecting and transmitting of biometric information in a wireless environment. Also, in order to protect biometric information at the U-WHS in a safe manner, a model applied with SEED algorithm including HIGHT, which has been designed based on previous studies [3] applying of the existing HIGHT algorithm, has been compared and analyzed.


Citations (9)


... Research [33 -36] provides the implementation of Hadoop architecture for the disaster data collection and surveillance system for disaster response and prevention. Efforts are not only made for big data processing and storage but also on reducing the execution time to query disaster data for fast decision making [34]. In addition, research [37] envisions creating large-scale events venue 3D simulation scenarios for simulating emergency situations such as fire and blasts. ...

Reference:

A Review on Applications of Big Data for Disaster Management
Design of Disaster Collection and Analysis System Using Crowd Sensing and Beacon Based on Hadoop Framework
  • Citing Conference Paper
  • June 2015

Lecture Notes in Computer Science

... In [10], simulation of star and tree topology and analysis of hidden node has been performed. In [11] authors proposed a study on modified hop-count routing protocol with multiple broadcasting scheme. In this method battery drainage is an issue as the mobile nodes are broadcasting to calculate to minimize the hop count. ...

Study on Low-Power Transmission Protocols for ZigBee Wireless Network-Based Remote Biosignal Monitoring Systems
  • Citing Chapter
  • November 2013

Lecture Notes in Electrical Engineering

... Through the above analysis, it can be seen that when CPMM performs sub-block matrix multiplication, only K b tasks are executed concurrently, in other words, the concurrency is only K b , the concurrency of RMM can reach M b × N b . For the same matrix size, since the computational cost of accumulating the intermediate result sub-matrix is much less than performing sub-matrix multiplication, higher concurrency, when the cluster resources are met, tends to bring better performance [16][17][18]. So inspired by this, an additional step of accumulating sub-matrices is introduced to greatly increase the concurrency of sub-matrix multiplication. ...

Hybrid app security protocol for high speed mobile communication
  • Citing Article
  • November 2014

The Journal of Supercomputing

... Data privacy and security concerns have been widely discussed in the literature, and this study confirms that these issues remain significant obstacles in the implementation of big data technologies in healthcare. Studies such as Kim et al. (2012) and Colantonio et al. (2015) previously highlighted the vulnerabilities in data transmission and storage, particularly in RPM and telemedicine platforms. This study corroborates these findings, emphasizing the need for enhanced encryption protocols, secure data storage, and strict access controls. ...

Sensor Based Real-Time Remote Patient Monitoring System: A Study on Mobile DB Construction of Minimum Network Traffic in Use of HTML5 WebSQL

Procedia Engineering

... Real-Time Transport Protocol (RTP) [4] and Real-Time Transport Control Protocol (RTCP) [5]are real-time video streaming protocols defined in IETF (Internet Engineering Task Force) RFC3550 [5,6]. RTP is a protocol for audio, video, and real-time data and supports multicast and unicast data transmission. ...

Study on Efficient Telemedicine System Design for Ambulance Emergency Situation

Journal of information and communication convergence engineering

... Data originating from various sources in data visualization can maintain the sustainability of the data presented in an up to date, real-time manner, facilitate data analysis, and decision making [1]. Research on data visualization has been widely studied, including being implemented in monitoring and evaluating patient health [7]. This study presents a variety of charts that provide information about patient health which is implemented in a mobile application. ...

Implementation of u-RPMS Using Google Chart in Hybrid Application for Visualization of Patient's Biometric Information
  • Citing Conference Paper
  • June 2013

... (2) distance between two sensor nodes are always within the arm span of a person (<2 m), making them less power consuming to synchronization [9,10]; (3) sensor nodes must be equipped with batteries in small dimension that offer continuous power for a couple of months or even several years [11,12]. (4) The burst sensing events like emergency alerts, critical physiological data, and multimedia streams, are often happened and trigger traffics [13,14]. Considering the aforementioned factors, how to minimize the power consumption of the sensor nodes and how to manage the burst data services effectively become two important issues, which are controlled and handled by MAC protocol [15]. ...

Study on Medical Emergency Alert Algorithm Based on Acceleration Algorithm
  • Citing Conference Paper
  • June 2013

... In one, the standard H.264/AVC has been applied to telemedicine support situations of ambulance transferring emergency patients, where Ubiquitous Health (U-Health) is currently utilized without breaking medical law. Remote Medical Support System (RMSS) used in ambulances enables a doctor at a remote place to identify the patient status through video, and supply remote support to the emergency [53]. Another application is a mobile tele-care system installed in moving vehicles to support emergency cases, which provides videoconference and vital sign transmission services in real time [54]. ...

Efficient Remote Medical Support System Design on Using H.264/AVC
  • Citing Article
  • December 2010

... Previous studies of m-Gov cloud focus on the benefits and challenges analysis [20,21] and architecture and framework of design, implementation, and deployment [23,24]. However, few studies have explored the determinants and mechanisms of m-Gov cloud adoption from innovation adoption perspectives. ...

Mobile Cloud e-Gov Design and Implementation Using WebSockets API
  • Citing Article
  • January 2011

Communications in Computer and Information Science