Dae-Joon Hwang
Sungkyunkwan University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dae-Joon Hwang.
Sensors | 2009
Hyeonjae Jeon; Kwangjin Park; Dae-Joon Hwang; Hyunseung Choo
Sensor nodes transmit the sensed information to the sink through wireless sensor networks (WSNs). They have limited power, computational capacities and memory. Portable wireless devices are increasing in popularity. Mechanisms that allow information to be efficiently obtained through mobile WSNs are of significant interest. However, a mobile sink introduces many challenges to data dissemination in large WSNs. For example, it is important to efficiently identify the locations of mobile sinks and disseminate information from multi-source nodes to the multi-mobile sinks. In particular, a stationary dissemination path may no longer be effective in mobile sink applications, due to sink mobility. In this paper, we propose a Sink-oriented Dynamic Location Service (SDLS) approach to handle sink mobility. In SDLS, we propose an Eight-Direction Anchor (EDA) system that acts as a location service server. EDA prevents intensive energy consumption at the border sensor nodes and thus provides energy balancing to all the sensor nodes. Then we propose a Location-based Shortest Relay (LSR) that efficiently forwards (or relays) data from a source node to a sink with minimal delay path. Our results demonstrate that SDLS not only provides an efficient and scalable location service, but also reduces the average data communication overhead in scenarios with multiple and moving sinks and sources.
International Journal of Distributed Sensor Networks | 2012
Sungmo Jung; Jae Young Ahn; Dae-Joon Hwang; Seoksoo Kim
In ubiquitous healthcare systems, machine-to-machine (M2M) communication promises large opportunities as it utilizes rapidly developing technologies of large-scale networking of devices for patient monitoring without dependence on human interaction. With the emergence of wireless multimedia sensor networks (WMSNs), M2M communications improve continuous monitoring and transmission and retrieval of multimedia content such as video and audio streams, images, and sensor data from the patient being monitored. This research deploys WMSN for continuous monitoring of target patients and reports tracking for preventive ubiquitous healthcare. This study performs optimization scheme movement coordination technique and data routing within the monitored area. A movement tracking algorithm is proposed for better patient tracking techniques and aids in optimal deployment of wireless sensor networks. Results show that our optimization scheme is capable of providing scalable and reliable patient monitoring results.
international conference on parallel processing | 1994
Eunha Rho; Sangho Ha; Sangyong Han; Heunghwan Kim; Dae-Joon Hwang
Multithreading has been much focused on as one of the strongest parallel instruction execution paradigms for massively parallel processing. In this paper, we describe the compilation processes of parallel programming language Id- for a multithreaded architecture DAVRID(DAtaflow Von Neumann RISC hybrlD). Two fundamental issues in parallel processing, tolerance to communication latency and inexpensive synchronization, are solved by a compiler-controlled multithreading. Our compiler features a simple mechanism for handling closures, and a loop unfolding technique for handling parallel and sequential loops in separate, which can greatly contribute to parallel execution of loops.
international conference on computer design | 1994
Sangho Ha; Junghwan Kim; Eunha Rho; Yoonhee Nah; Sangyong Han; Dae-Joon Hwang; Heunghwan Kim; Seung Ho Cho
MPAs (massively parallel architectures) should address two fundamental issues for scalability: synchronization and communication latency. Dataflow architectures cause problems of excessive synchronization costs and inefficient execution of sequential programs while they offer the ability to exploit massive parallelism inherent in programs. In contrast, MPAs based on the von Neumann computational model may suffer from inefficient synchronization mechanism and communication latencies. DAVRID (Dataflow von Neumann, RISC Hybrid) is a massively parallel multithreaded architecture. By combining the advantages of the von Neumann model and the dataflow model, DAVRID preserves good single thread performance and tolerates latency and synchronization costs. We describe the DAVRID architecture and evaluate it through simulation results over several benchmarks.<<ETX>>
international conference on parallel processing | 1993
Dae-Joon Hwang; Seung Ho Cho; Y. D. Kim; Sangyong Han
In most multithreaded node architectures moti¿ vated by the dataflow computational model, spatial parallelism could not be exploited at the thread level due to the resource deficit incurred by their inter nal organization. So we proposed a node architecture exploiting both spatial and temporal parallelism of a program. A multi-port non-blocking data cache is in corporated into our design to cope with the excessive data bandwidth required in parallel execution of mul tiple threads. The proposed node architecture may contribute to greatly reducing communication latency through the interconnection network. Simulation re sults show that parallel loops can be executed on this architecture more efficiently than on other competi tive ones.
international conference on advanced software engineering and its applications | 2010
Jae Young Ahn; Jae-gu Song; Dae-Joon Hwang; Seoksoo Kim
M2M, which stands for communications between machines, offers various services today thanks to advanced communication networks and sensor systems. Also, a powerful terminal such as a smart phone provides sufficient physical environments, not requiring a special device for the services. However, the smart phone M2M environment involves various complex technologies, and there have been no clear policies or standards for the technology. This study, therefore, analyzes the current status of M2M service introduction and the trends in M2M application services using a smart phone.
Sensors | 2010
Sungmo Jung; Jae-gu Song; Dae-Joon Hwang; Jae Young Ahn; Seoksoo Kim
Researches on Augmented Reality (AR) have recently received attention. With these, the Machine-to-Machine (M2M) market has started to be active and there are numerous efforts to apply this to real life in all sectors of society. To date, the M2M market has applied the existing marker-based AR technology in entertainment, business and other industries. With the existing marker-based AR technology, a designated object can only be loaded on the screen from one marker and a marker has to be added to load on the screen the same object again. This situation creates a problem where the relevant marker’should be extracted and printed in screen so that loading of the multiple objects is enabled. However, since the distance between markers will not be measured in the process of detecting and copying markers, the markers can be overlapped and thus the objects would not be augmented. To solve this problem, a circle having the longest radius needs to be created from a focal point of a marker to be copied, so that no object is copied within the confines of the circle. In this paper, software-based sensing technology for multiple object detection and loading using PPHT has been developed and overlapping marker control according to multiple object control has been studied using the Bresenham and Mean Shift algorithms.
Wireless Personal Communications | 2016
Donghyun Kim; Sungmo Jung; Dae-Joon Hwang; Seoksoo Kim
AbstractCloud computing emerges as a way to dynamically increase the capacity or capabilities in infrastructure architectures, software delivery, and development models. However, security is one of the major issues with mobile applications as they can be attacked by malicious users which reduces the growth of cloud computing and complications with data privacy and data protection. In this paper, a mobile-based security agent is presented which provides security mechanisms to security agents as well as hosts. This type of security agent is significant in providing security mechanism to security risks in cloud computing due to its ability to migrate from one host to another where it can resume its processing and service provisioning. Additionally, some of the current attacks are created that attackers may initiate. A fault tolerance at a high level was enabled for mobile-based distributed transaction processing in the cloud. The results show that most of the attack messages were detected and identified, and the type of attack was identified within a specific period of time.
Mitochondrial DNA | 2016
Pengcheng Chang; Yanping Li; Zhao Zhang; Dae-Joon Hwang
Abstract The sooty mangabey (Cercocebus atys atys) is an Old World monkey belonging to family Cercopithecidae. It has recently been widely used as an important animal model for researches related to human immunodeficiency virus (HIV) and AIDS. In this study, the mitochondrial genome sequence of this species is determined and described for the first time. It is 16,536 bp in length and consists of 13 protein-coding genes, 22 tRNA genes, 2 ribosomal RNA genes and 1 putative control region (CR). The genome organization, nucleotide composition and codon usage are similar to those reported from other monkey mitochondrial genomes. The descending order of the base composition on heavy strand is 32.5% A, 29.5% C, 25.8% T, and 12.2% G, with a relatively lower level of G and a slightly A+T bias of 58.3%. All genes are distributed on the H-strand except for the ND6 subunit gene and seven tRNA genes, which are encoded on the L-strand. This mitochondrial genome data are potentially important for the study of molecular evolution, conservation genetics and disease infection in C. a. atys.
Lecture Notes in Computer Science | 2001
Seoksoo Kim; Dae-Joon Hwang
The password for membership management is made by integrating the information on the paid site, the ID, and the expiration date for the paid period. First, a value of 100 is added to a unique letter from the paid site and to the ASCII code value of the first letter of the ID, and then the ending date is added. Using this method, the passwords for paid members are created and given to the members by mail. This method needs just another password field for paid members added to the previous membership management DB. Even if more sites are formed, it is not necessary to add another field again.