Entity

Time filter

Source Type

Pyeongtaek, South Korea

Shakhov V.,Russian Academy of Sciences | Nam S.,Kookje College | Choo H.,Sungkyunkwan University
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013 | Year: 2013

One of the most critical damaging effects on most wireless sensor networks is a flooding attack. Flooding threat occurs not only from spoofed packets generators launched by intruders but also from the inherent behavior of the network protocols. Flooding harm can be categorized into two types as follows. First, a sensor cannot provide required services when it receives a lot of packets. An essential part of packets are rejected and packets delay becomes inadmissible. And second, if a sensor transmits many packets then the sensor battery is quickly exhausted. Energy harvesting technologies offers the potential of reducing the second vulnerability. This paper explores the operation of wireless sensor networks with energy harvesting capability taking into account both flooding negative effects above. We consider the feasibility and threats of the attacks and their impacts. We then propose a theoretical analysis of the flooding attacks. The corresponding mathematical model is offered. Counteracting methods against such intrusions is discussed. Copyright © 2013 ACM. Source


Park J.,Sungkyunkwan University | Lee H.,Sungkyunkwan University | Lee K.,Sungkyunkwan University | Kim D.,Sungkyunkwan University | And 2 more authors.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014 | Year: 2014

The use of smartphones is growing rapidly in daily life, with various applications such as social network services, Internet access, games, and navigation. It is essential to develop customized services that are specifically designed for individual user characteristic in order to meet the demands of users. Effective interaction between individual personalities and mobile devices has been extensively studied. The majority of research has conducted various experiments with introverts and extroverts whose personality can be clearly identified. However, there is a lack of research on ambivert people, who have neither introverted nor extroverted personality traits. This paper examines an efficient method to present an advertisement on a smartphone for ambivert people. A 2 by 2 by 2 experiment regarding participant personality (more-introverted ambivert vs. moreextroverted ambivert), product personality (introvert vs. extrovert), and advertisement personality (introvert vs. extrovert) was carried out to investigate participants' attitude on smartphone advertisements. The results show that the similarity attraction effect between a participant and an advertisement personality is negated by ambiverts. However, the similarity attraction between a product and an advertisement is still found in ambiverts. This study implies that smartphone advertisements need a more sophisticated advertising strategy for ambiverts. Copyright 2014 ACM. Source


Joung W.-I.,Kookje College | Cho T.-S.,Chungwoon University
Communications in Computer and Information Science | Year: 2012

This essay bases on the semiological analysis on the lyrics of the 70's folk songs. For the analysis, it is essential to understand the contemporary social phenomenon. At the time, everything, from hair to ladies' skirts, was controlled by the military regime. It is not difficult to deduce that culture was another victim of it. I study about the youth's mind in the contemporary society and how the lyrics of the songs represented their mind. © 2012 Springer-Verlag Berlin Heidelberg. Source


Shakhov V.,Russian Academy of Sciences | Nam S.,Kookje College | Shin S.J.,Hansei University | Choo H.,Sungkyunkwan University
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12 | Year: 2012

In this paper, a novel type of potential attacks on wireless networks is considered. The means of intruder is unauthorized high power of a signal transmitted by wireless devices. A destructive effect of the attack depends on the type of network. In case of cellular networks an attacked mobile phone generates excessive electromagnetic emissions for a long period of time. Thus, objects of attack are mobile phone owners. In case of wireless sensor networks an illegal increase in the transmitting power exhausts a sensor battery. Thus, the lifetime of a sensor is depredated. Counteracting against such intrusions is discussed. © 2012 ACM. Source


Lee S.-H.,Semyung University | Lee K.-S.,Semyung University | Yoo J.-H.,Semyung University | Jeong Y.-H.,Korea University | Yoon H.-S.,Kookje College
Transactions on Electrical and Electronic Materials | Year: 2011

In this study, (K0.5Na 0.5)(Nb0.97Sb0.03)O3+0.9mol% K5.4Cu1.3Ta10O29+x mol%K4CuNb8O23 (x = 0, 0.2,0.6,0.8) ceramics were prepared by a conventional mixed oxide method. Their microstructure and electric properties were investigated. The secondary phase was made by virtue ofK4CuNb8O23 (KCN) addition in the (K0.5Na0.5)(Nb0.97Sb0.03)O3 system ceramics. However, the sinterability of the ceramics increased with increasing K4CuNb8O23 content. At the 0.6 mol% K4CuNb8O23 added composition ceramics sintered at 1,060° C kp and d33 showed the optimum values of 0.39 and 145 pC/N, respectively, suitable for piezoelectric actuator application. © 2011 KIEEME. Source

Discover hidden collaborations