Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Geuk Lee is active.

Publication


Featured researches published by Geuk Lee.


Archive | 2007

Advances in Hybrid Information Technology

Marcin S. Szczuka; Daniel Howard; Dominik Ślȩzak; Haeng-Kon Kim; Tai-hoon Kim; Il-seok Ko; Geuk Lee; Peter M. A. Sloot

Data Analysis, Modelling, and Learning.- Taking Class Importance into Account.- Tolerance Based Templates for Information Systems: Foundations and Perspectives.- Reduction Based Symbolic Value Partition.- Investigative Data Mining for Counterterrorism.- Data Integration Using Lazy Types.- Data Generalization Algorithm for the Extraction of Road Horizontal Alignment Design Elements Using the GPS/INS Data.- Personalized E-Learning Process Using Effective Assessment and Feedback.- Optimally Pricing European Options with Real Distributions.- Applying Stated Preference Methods to Investigate Effects of Traffic Information on Route Choice.- A Study on Determining the Priorities of ITS Services Using Analytic Hierarchy and Network Processes.- An Introduction of Indicator Variables and Their Application to the Characteristics of Congested Traffic Flow at the Merge Area.- Imaging, Speech, and Complex Data.- Image Resize Application of Novel Stochastic Methods of Function Recovery.- Automatic Face Analysis System Based on Face Recognition and Facial Physiognomy.- Moving Cast Shadow Elimination Algorithm Using Principal Component Analysis in Vehicle Surveillance Video.- Automatic Marker-Driven Three Dimensional Watershed Transform for Tumor Volume Measurement.- A Study on the Medical Image Transmission Service Based on IEEE 802.15.4a.- Detecting Image Based Spam Email.- Efficient Fixed Codebook Search Method for ACELP Speech Codecs.- Conventional Beamformer Using Post-filter for Speech Enhancement.- Bandwidth Extension of a Narrowband Speech Coder for Music Delivery over IP.- A User-Oriented GIS Search Service Using Ontology in Location-Based Services.- A Filtered Retrieval Technique for Structural Information.- Applications of Artificial Intelligence.- An Analysis of a Lymphoma/Leukaemia Dataset Using Rough Sets and Neural Networks.- A Frequency Adaptive Packet Wavelet Coder for Still Images Using CNN.- Reduced RBF Centers Based Multi-user Detection in DS-CDMA Systems.- Approximate Life Cycle Assessment of Product Concepts Using a Hybrid Genetic Algorithm and Neural Network Approach.- A Solution for Bi-level Network Design Problem Through Nash Genetic Algorithm.- An Alternative Measure of Public Transport Accessibility Based on Space Syntax.- Adaptive Routing Algorithm Using Evolution Program for Multiple Shortest Paths in DRGS.- Particle Swarm Optimization for a Multi-UCAV Cooperative Task Scheduling.- Expert System Using Fuzzy Petri Nets in Computer Forensics.- MMORPG Map Evaluation Using Pedestrian Agents.- The Analysis of Game Playing Experiences: Focusing on Massively Multiplayer Online Role-Playing Game.- Hybrid, Smart, and Ubiquitous Systems.- How to Overcome Main Obstacles to Building a Virtual Telematics Center.- Real-Time Travel Time Estimation Using Automatic Vehicle Identification Data in Hong Kong.- A Context-Aware Elevator Scheduling System for Smart Apartment Buildings.- A MOM-Based Home Automation Platform.- An Error Sharing Agent for Multimedia Collaboration Environment Running on Pervasive Networks.- A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment.- Integration of Artificial Market Simulation and Text Mining for Market Analysis.- Agent-Based Intelligent Decision Support for the Home Healthcare Environment.- An Aware-Environment Enhanced Group Home: AwareRium.- The Situation Dependent Application Areas of EPC Sensor Network in u-Healthcare.- Ubiquitous Healthcare System Using Context Information Based on the DOGF.- Hardware and Software Engineering.- Load Balancing Using Dynamic Replication Scheme for the Distributed Object Group.- Design and Implementation of a Performance Analysis and Visualization Toolkit for Cluster Environments.- Enterprise Application Framework for Constructing Secure RFID Application.- A GDB-Based Real-Time Tracing Tool for Remote Debugging of SoC Programs.- A Novel Buffer Cache Scheme Using Java Card Object with High Locality for Efficient Java Card Applications.- Design and Implementation of the Decompiler for Virtual Machine Code of the C++ Compiler in the Ubiquitous Game Platform.- Mobile Pharmacology.- Wireless Control System for Pet Dogs in a Residential Environment.- Intelligent Embedded Real-Time Software Architecture for Dynamic Skill Selection and Identification in Multi-shaped Robots.- Networking and Telecommunications.- The Accurate Performance Evaluation of Time Hopping UWB Systems with Pulse Based Polarity.- Improvement of Adaptive Modulation System with Optimal Turbo Coded V-BLAST Technique.- Header Compression of RTP/UDP/IP Packets for Real Time High-Speed IP Networks.- Repetition Coding Aided Time-Domain Cancellation for Inter-Carrier Interference Reduction in OFDM Systems.- On Scheduling Transmissions for Hidden Terminal Problems in Dynamic RFID Systems.- Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation.- Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x.- A Sophisticated Base Station Centralized Simple Clustering Protocol for Sensor Networks.- Plus-Tree: A Routing Protocol for Wireless Sensor Networks.- Optimization and Routing Discovery for Ad Hoc Wireless Networks: A Cross Layer Approach.- Analysis of the Characteristics of Rain Attenuation in the 12.25GHz Band for Wireless Networking.


Future Generation Computer Systems | 2009

Structure design and test of enterprise security management system with advanced internal security

Seoksoo Kim; Soongohn Kim; Geuk Lee

A security system for a company network is progressing as a ESM (Enterprise Security Management) in an existing security solution foundation. The establishment of the security policy is occupying a very important area in ESM of the security system. We tried to analyze the existing ESM system for this and designed a security solution structure for enhancing the internal security. We applied implementing directly IDS system and tested it. This study examined the structure of security solutions in order to build an enterprise security management system. For this purpose, we analyzed existing enterprise security management systems and, based on the results, proposed a enterprise security management system with reinforced internal security and tested the system. For the test, we used a firewall through log analysis and designed an intra-network using virtual IP system.


Future Generation Computer Systems | 2009

Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment

Soongohn Kim; Seoksoo Kim; Geuk Lee

In this paper, we have discussed the issues concerning the basic concept and classification of OT (Oblivious Transfer). We have proposed secure verifiable non-interactive oblivious transfer protocols for the exchange of secrets on distributed environments. One is a new secure verifiable non-interactive oblivious transfer protocol using RSA, the other is that with bit commitment using one-way functions. The structure of the protocols is similar to that of the original protocols proposed by Bellare and Micali. Their protocols are based on the difficulty of the discrete logarithm problem. Our protocols are also based on the difficulty of the discrete logarithm problem. The secret in their protocol could be chosen as a random number. The security in our protocols also can be chosen as a random number. These methods have the additional functions that enable us to authenticate the sender and to protect ones denial of what he/she has sent the messages to the other. The traffic amount of transfer of the proposed methods is less than or equal to that of the conventional interactive method.


international conference on hybrid information technology | 2008

A Safe AODV (Ad Hoc On-Demand Distance Vector) Security Routing Protocol

Jin Taek Kim; Jeong-Ho Kho; Chang-Young Lee; Do-Won Lee; Cheol-Soo Bang; Geuk Lee

The field that is the key issue of wire, wireless environment is security and many routing protocols are studied also at the ad-hoc network. In the mobile ad-hoc network which has no fixed base structure, the weakest point is security. This paper analyzed AODV protocol, which is a routing protocol, the important routing protocol in ad-hoc network, so that it can overcome the problem in security threats. It used the lightest and fastest message authentication code, so was able to design rather safer AODV routing protocol.


network and parallel computing | 2004

A Vulnerability Assessment Tool Based on OVAL in Linux System

Youngmi Kwon; Hui Jae Lee; Geuk Lee

Open Vulnerability Assessment Language (OVAL) is a standard language which is used to detect the vulnerability of local system based on the system characteristics and configurations. It is suggested by MITRE. OVAL consists of XML schema and SQL query statements. XML schema defines the vulnarable points and SQL query detects the vulnerable and weak points. This pa-per designed and implemented the vulnerability assesment tool with OVAL to detect the weak points in Linux System. It has more readability, reliability, scalability and simplicity than traditional tools.


international conference on hybrid information technology | 2008

Personal Color Decision System Using Fuzzy Logic

Jung-Min Oh; Cheol-Soo Bang; Geuk Lee

This paper, which is based on the research in the personal color decision system, uses the fuzzy logic and fuzzy ratiocination rule to improve the personal color decision method of the existing personal color system and to get more objective and reliable result for personal color. We propose the method which constructs more systematic color selection system using personal color database and fuzzy logic.


agent and multi agent systems technologies and applications | 2007

Traffic Signal Planning Using a Smart Agent System

You-Sik Hong; Geuk Lee; Cheonshik Kim; Jong Won Kim

The multi-agent systems approach can provide a new desirable solution to the problems of traffic congestion and traffic accidents. Currently, a traffic simulator is needed to understand and explore the difficulties in agent-oriented traffic control. Therefore, in this paper, we propose an electro-sensitive traffic light using a smart agent algorithm to reduce traffic congestion and traffic accidents. Specifically, we designed and implemented a system to create optimum traffic signals in congested conditions using smart agent algorithms. In order to solve these problems, our approach antecedently creates an optimal traffic cycle of passenger car units at the bottom traffic intersection. Mistakes are possible due to different car lengths, car speeds, and the length of the intersection. Therefore, our approach consequently reduces car waiting time and start-up delay time using fuzzy control of feedback data. Urban traffic situations are extremely complex and highly interactive. The proposed method adaptively controls the cycle of traffic signals even though the traffic volume varies. The effectiveness of this method was shown through the simulation of multiple intersections.


granular computing | 2005

A development of intrusion detection and protection system using netfilter framework

Min Wook Kil; Seung Kyeom Kim; Geuk Lee; Youngmi Kwon

Information can be leaked, changed, damaged and illegally used regardless of the intension of the information owner. Intrusion Detection Systems and Firewalls are used to protect the illegal accesses in the network. But these are the passive protection method, not the active protection method. They only react based on the predefined protection rules or only report to the administrator. In this paper, we develop the intrusion detection and protection system using Netfilter framework. The system makes the administrators management easy and simple. Furthermore, it offers active protection mechanism against the intrusions.


international conference on hybrid information technology | 2011

Implementation of Smart Car Using Fuzzy Rules

You-Sik Hong; Myeong-Bok Choi; June-Hyung Lee; Cheolsoo Bae; Jang Mook Kang; Jae Sang Cha; Geuk Lee; Seong Jin Cho; Hyun-Soo Jin; Chun-Myoung Park; Baek ki Kim; Kwang-Deok Han; Su Kyun Sun; Chul Jang; Seung-Hee Yu

We proposed an algorithm to automatically control the seat, and notify dangerous traffic conditions for smart car system. The system is needed to adapt to both the driver and the circumstance for maximum convenience and safety. In order to solve these problems, we proposed an algorithm for developing smart vehicles.


international conference on hybrid information technology | 2011

Smart pulse wave detection system using intelligence

You-Sik Hong; Sang-Suk Lee; Dong-Hyun Nam; Hongkyun Kim; Young Jun Song; Kwang-Baek Kim; Geuk Lee; Jeong Jin Kang; Rethina Kumar; Hyun-Soo Jin; Chanwoo Moon; Young Dae Lee; ChangDuk Chung

The pulse rate in the human species is a significant factor in oriental medicine. Pulse wave is a potential energy which has been generated by main artery expansion from the left ventricle, transforms into kinetic energy and passes through the vessel wall to the peripheral nervous system. In this paper, observations of patterns will be used to determine the blood circulation pulse wave which has been differentiated twice through the process of APG (Accelerated Photoplethysmo Graph). Moreover in this paper, it proposed the algorithm which diagnoses the patients health condition using intelligence method.

Collaboration


Dive into the Geuk Lee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Youngmi Kwon

Chungnam National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hongkyun Kim

Hanbat National University

View shared research outputs
Top Co-Authors

Avatar

Jeong Jin Kang

Seoul National University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge