Search For:

Displaying 1-11 out of 11 total
Lite-IDE Based Hierarchical Node Authentication Protocol for Energy Efficient in WSN
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Youngbok Cho,Sangho Lee
Issue Date:December 2013
pp. 644-647
This paper describe the design of a Lite-IDE based hierarchical node authentication protocol. The proposed protocol is to solve problem of energy imbalance. The proposed method is Lite-IDE based authentication scheme is proposed for node authentication, wh...
 
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream
Found in: IEEE Transactions on Dependable and Secure Computing
By Sangho Lee,Jong Kim
Issue Date:May 2013
pp. 183-195
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. Conventional Twitter spam detection schemes utilize account features such as the ratio of tweets containing URLs and the account creation date, or relation f...
 
3D Underwater Localization with Hybrid Ranging Method for Near-Sea Marine Monitoring
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Chungsan Kim,Sangho Lee,Kiseon Kim
Issue Date:October 2011
pp. 438-441
Location information is fundamental and essential for UWSNs monitoring underwater environment. Underwater environment requires three dimensional localization algorithm. Several localization protocols and system architectures have been proposed for underwat...
 
Path Planning of a Mobile Beacon for Localization in Underwater Sensor Networks
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Sangho Lee,Chungsan Kim,Kiseon Kim
Issue Date:October 2011
pp. 424-427
In underwater sensor networks, localization is one of the most important issues because sensor nodes are considerably difficult to be deployed at determined locations. Localization schemes using a mobile beacon have fine-grained localization accuracy becau...
 
Bearings-only Tracking Systems with Distributed Floating Beacons in Underwater Sensor Networks
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Eunchan Kim, Sangho Lee, Chungsan Kim, Kiseon Kim
Issue Date:December 2010
pp. 311-315
This paper presents a bearings-only tracking (BOT) scheme based on distributed floating beacons in underwater sensor networks (UWSNs). Conventional BOT systems extract target-originated bearings in noisy measurements, locate and track targets based on the ...
 
Localization with a Mobile Beacon in Underwater Sensor Networks
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Sangho Lee, Kiseon Kim
Issue Date:December 2010
pp. 316-319
In underwater sensor networks, localization is one of the most important issues because sensor nodes are considerably difficult to be deployed at determined locations. Since range-based schemes require additional device and precise time synchronization for...
 
A secure and mutual-profitable DRM interoperability scheme
Found in: Computers and Communications, IEEE Symposium on
By Sangho Lee, Heejin Park, Jong Kim
Issue Date:June 2010
pp. 75-80
In most cases, the use of digital contents on several devices is blocked by digital rights management (DRM) technology to protect the rights of digital content owners, which is called as the DRM's walled garden strategy. This strategy has raised many legal...
 
Long-Range Beacons on Sea Surface Based 3D-Localization for Underwater Sensor Networks
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Eunchan Kim, Sangho Lee, Chungsan Kim, Kiseon Kim
Issue Date:December 2009
pp. 102-107
In underwater sensor networks (UWSNs), localization is an important issue and a challenging task due to harsh environments for people to access. In this paper, we propose a distributed algorithm to locate nodes deployed in 3-D space using long-range beacon...
 
Cell motion analysis without explicit tracking
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Richard Souvenir, Jerrod Kraftchick, Sangho Lee, Mark G. Clemens, Min C. Shin
Issue Date:June 2008
pp. 1-7
Automated cell tracking using in vivo imagery is difficult, in general, due to the noise inherent in the imaging process, occlusions, varied cell appearance over time, motion of other tissue (distractors), and cells traveling in and out of the image plane....
 
The Impact of IT Investment on Firm Performance in Korean Insurance Industry
Found in: Information Science and Engineering, International Conference on
By Jun Yong Xiang, Jae Kyeong Kim, Sangho Lee, Zhen He
Issue Date:December 2009
pp. 3124-3127
Over the past three decades, the impact of information technology (IT) investments on firm performance has been the subject of active research. Despite increasing importance of research into the productivity of IT in developing countries, almost all findin...
 
Design of the Farmer's Experience Based Greenhouse Operating Systems
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Aekyung Moon, Sangho Lee
Issue Date:July 2013
pp. 1407-1411
In this study, we introduce convergence technologies of agriculture and USN (Ubiquitous Sensor Network) technologies for collecting and controlling plant growing status according to microclimate around plants. In order to optimize the greenhouse cultivatio...
 
 1