Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dong-kyoo Kim is active.

Publication


Featured researches published by Dong-kyoo Kim.


intelligent information hiding and multimedia signal processing | 2009

Image Retrieval in Multimedia Databases: A Survey

Yihun Alemu; Jong-bin Koh; Muhammed Ikram; Dong-kyoo Kim

In the past decades the advancement in the area of database management systems shifts towards multimedia. Multimedia information is very expressive, self explanatory, narrative, etc. Now a day the development of digital media, advanced network infrastructure and the easily available consumer electronics makes the multimedia revolution to run in an alarming rate [4] Inline with the advancement of database technology that incorporates multimedia data, an open question that always rose in the technology is how to retrieve/search images in the multimedia databases. There are a huge number of research works focusing on the searching mechanisms in image databases for efficient retrieval and tried to give supplementary suggestions on the overall systems. The growing of digital medias (digital camera, digital video, digital TV, e-book, cell phones, etc.) gave rise to the revolution of very large multimedia databases, in which the need of efficient storage, organization and retrieval of multimedia contents came into question. Among the multimedia data, this survey paper focuses on the different methods (approaches) and their evaluation techniques used by many of recent research works on image retrieval system. Many researchers develop and use lots of approaches towards image retrieval. This paper, in general, classified image retrieval into text based and content based, including the newly growing ontology based image retrieval system as one focus. We address, in this paper, the challenges, techniques and evaluation methods used in image retrieval systems through a detailed look of most recent works


wireless communications and networking conference | 2008

RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks

Syed Rehan Afzal; Subir Biswas; Jong-bin Koh; Taqi Raza; Gunhee Lee; Dong-kyoo Kim

Routing scenario in ad hoc networks is different from infrastructure-based wireless networks; since in ad hoc networks each node acts as a router and is responsible for managing topological information and ensuring correct route learning. Although a number of secure routing protocols have been proposed so far, all of them have certain advantages and disadvantages. Hence, security in ad hoc networks is still a contentious area. In this paper we first explore the security problems and attacks in existing routing protocols and then we present the design and analysis of a new secure on-demand routing protocol, called RSRP which confiscates the problems mentioned in the existing protocols. Moreover, unlike Ariadne, RSRP uses a very efficient broadcast authentication mechanism which does not require any clock synchronization and facilitates instant authentication.


workshop on information security applications | 2005

Role-Based access control model for ubiquitous computing environment

Song-hwa Chae; Won-Il Kim; Dong-kyoo Kim

Ubiquitous computing is characterized by freedom of movement in both time and location, which means users expect to receive services anytime and anywhere. Therefore, the security service should consider the factor of location and time. As a basic authorization service mechanism, RBAC has been used in the security community for access control model. In order to apply RBAC to ubiquitous computing environment, it is necessary to add both location and time dimension. In this paper, we propose new access control model supporting time and location dimensions. The proposed access control model can effectively support various ubiquitous computing environments.


embedded and ubiquitous computing | 2005

An effective method for location privacy in ubiquitous computing

Gunhee Lee; Won-Il Kim; Dong-kyoo Kim

In ubiquitous computing environment, every service should have the characteristic of context-awareness. Since physical location is important information to grasp a user’s context, the service provider should maintain the location information of the user to provide necessary service. When a malicious user acquires the location information of any other user, it is possible that he/she deduces the context of the user. Although there have been many researches for the problem, previous methods impose complex computation and many subjects requires on the system in order to gain acceptable anonymity. In this paper, we propose an effective method that protects the location privacy in ubiquitous computing environment. This method prohibits the malicious user from hijacking the location information by diffusing the information. It also confuses the attacker with transmitting dummy messages as normal users do.


complex, intelligent and software intensive systems | 2010

A Hierarchical Multi-Parent Cluster-Based Data Aggregation Framework for WSNs

Yihun Alemu; Jong-bin Koh; Dong-kyoo Kim

One of the major issues in wireless sensor network applications is the way how to minimize energy consumption in the process of data transfer. Data in wireless sensor networks should be aggregated in order to save energy and bandwidth. There are lots of works on the area of fault-tolerant and efficient data aggregation for WSNs in different approach. In this paper an efficient fault tolerant data aggregation framework is proposed based on a hierarchical multiparent clustering fashion addressing how to determine faulty nodes, how to recover lost/corrupted data and how to minimize energy and bandwidth for longer network lifetime. The proposed approach uses a hierarchical clustering in which each cluster will have two heads /primary and secondary/ to aggregate sensed data and simultaneously maximize the communication efficiency with in the cluster. Moreover, the framework uses both the spatial and temporal characteristics of nodes with in and across clusters to substitute missed values based on regression analysis


international conference on wireless communications and mobile computing | 2009

A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs)

Muhammad Ikram; Aminul Haque Chowdhury; Bilal Zafar; Hyon-Soo Cha; Ki-Hyung Kim; Seung-Wha Yoo; Dong-kyoo Kim

Resource and power limited IPv6-based Low rate Wireless Personal Area Networks (6LoWPANs) requires energy efficient access control scheme for authentication, bootstrapping, and commissioning of prospective 6LoWPAN devices. In this paper, we propose an energy efficient lightweight mutual authentication scheme for 6LoWPANs which ensures secure network bootstrapping. The proposed scheme is independent of any key management infrastructure; keys or authentication secret data for mutual authentication is generated or transferred to 6LoWPAN device on-the-fly. Analysis of the proposed scheme have shown that the scheme is secure against various kinds of security and privacy attacks and is light-weight, adaptable, and scalable for 6LoWPANs.


advances in multimedia | 2004

RPS: an extension of reference monitor to prevent race-attacks

Jongwoon Park; Gunhee Lee; Sangha Lee; Dong-kyoo Kim

Most software involves some vulnerabilities because of various potential factors such as design flaw and program bug. Among them, a faulty assumption on file access results in a side-effect as known TOCTTOU vulnerability. Race–attack is an attack using this vunerability. In this paper, we propose a novel mechanism to prevent race–attack, each process maintains status of related object at check step operation and compares the status of the use step with that of the check step. Since every process must pass through the reference monitor to use an object, it is the most suitable point to detect the attack and response to the attack.


Journal of International Medical Research | 2011

Effect-site concentration of remifentanil for nasotracheal versus orotracheal intubation during target-controlled infusion of propofol.

Hyun-Jeong Kwak; S. K. Min; Dong-kyoo Kim; Min Kang; J. Y. Kim

The concentration of remifentanil required for acceptable nasotracheal intubation in adults after target-controlled infusion (TCI) of propofol without neuromuscular blockade was compared with that required for orotracheal intubation. Twenty-five patients undergoing oral and maxillofacial surgery received nasotracheal intubation and 25 undergoing ear, nose and throat surgery received orotracheal intubation. Anaesthesia was induced with propofol TCI at a target effect-site concentration of 5.0 μg/ml. The 50% and 95% effective concentrations (EC50 and EC95, respectively) for remifentanil, calculated using isotonic regression, were 5.40 and 6.85 ng/ml, respectively, in the orotracheal group and 5.75 and 7.43 ng/ml in the nasotracheal group. The EC50 (± SD) values for remifentanil, calculated using a modified Dixons up-and-down method, were 6.08 ± 0.75 and 5.58 ± 0.75 ng/ml for nasotracheal and orotracheal intubation, respectively. Effect-site remifentanil concentrations did not differ significantly between the two groups of patients. Coadministration of propofol and remifentanil can provide acceptable conditions for nasotracheal intubation without neuromuscular blockade.


Journal of International Medical Research | 2012

Comparison of the Optimal Effect-Site Concentrations of Remifentanil for Preventing Cough during Emergence from Desflurane or Sevoflurane Anaesthesia

Cho Hb; J. Y. Kim; Dong-kyoo Kim; Dong Wan Kim; Chae Yj

OBJECTIVE: To compare the effect-site concentrations of remifentanil target-controlled infusion (TCI) that produced 50% and 95% of the maximal effect (EC50 and EC95, respectively) for preventing cough during emergence from desflurane or sevoflurane anaesthesia, in patients undergoing elective thyroidectomy. METHODS: Adults undergoing elective thyroidectomy were randomized to receive anaesthesia with desflurane or sevoflurane. The EC50 and EC95 values for remifentanil TCI were determined using Dixons up-and-down method and probit analysis with sigmoid curve. RESULTS: In total, 48 patients aged 20 – 64 years were enrolled in the study. The EC50 ± SD of remifentanil TCI, determined by Dixons up-and-down method, were 1.54 ± 0.70 and 1.11 ± 0.24 ng/ml for desflurane and sevoflurane, respectively. The EC95 of remifentanil TCI, analysed by probit analysis, were 2.88 ng/ml and 2.29 ng/ml for desflurane and sevoflurane, respectively. The effect-site concentration of remifentanil TCI for preventing cough during emergence from desflurane anaesthesia was not significantly higher than that observed for sevoflurane. CONCLUSIONS: During emergence from anaesthesia, variations in effect-site concentrations of remifentanil for preventing cough are of limited importance as they do not generate significant differences in results.


international conference on computational science and its applications | 2004

A Novel Method to Support User’s Consent in Usage Control for Stable Trust in E-business

Gunhee Lee; Won-Il Kim; Dong-kyoo Kim

In the recent Web environment, the key issue is not who can use the resource, but how to control the usage of resources. Usage control (UCON) is a consolidate solution for this problem. UCON can be applied to solve existing authorization problems and support finer-grained control than any other methods. However, there are many situations in e-business and information systems in which the user consent is needed. For example, a contents provider should obtain the consent of the originator in order to modify digital contents. With this trend, the consent is suggested as a new issue that can establish trust in e-business. Unfortunately, the current UCON model does not support user consent. In this paper, we propose a novel method to control user consent in UCON model. We modify the authorization model of the UCON model to support consent handling and discuss the administration of proposed model. The proposed method extends the coverage of UCON model in security area. It also provides a solution for trust relationships on e-Business and individual privacy protection.

Collaboration


Dive into the Dong-kyoo Kim's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Choonsik Park

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge