Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Giovanni Cagalaban is active.

Publication


Featured researches published by Giovanni Cagalaban.


pacific rim knowledge acquisition workshop | 2010

Context-aware service framework for decision-support applications using ontology-based modeling

Giovanni Cagalaban; Seoksoo Kim

The technological advances in healthcare specifically in preventive healthcare can lead to longer life expectancy especially for the elders. To aid in preventing premature loss of lives as well as lengthening life span, this research aims to implement the use of mobile and sensor technology to improve the quality of life and lengthen life expectancy. In particular, we propose a context-aware service framework for decision-support applications in preventive healthcare. This research applies ontology to support context modeling and reasoning by applying the general application areas for ontologies to the domain of context in ubiquitous computing environments. This paper also demonstrates how context technologies and mobile web services can help enhance the quality of services in preventive healthcare to elders.


international conference on future generation communication and networking | 2010

Multiple Object Tracking in Unprepared Environments Using Combined Feature for Augmented Reality Applications

Giovanni Cagalaban; Seoksoo Kim

Existing augmented reality (AR) applications performs well in tracking objects in prepared environments. However, tracking multiple objects in unprepared environments involves considerable difficulty to achieve best results since users are not allowed to modify the real environment such as in outdoor applications. This research focuses on a multiple object tracking based on combined feature tracking and color tracking in an arbitrary scene to demonstrate superior performance. This approach is beneficial to tracking technologies since additional visual cues provide seamless real-synthetic world integration. The system requires accurate measurements of the six-degree of freedom (6DOF) camera pose, three-degree of freedom (3DOF) for position and three for orientation relative to the world coordinate system. Our framework aims to lead AR applications in unprepared environments with multiple tracking objects regardless of the movement of real objects, lights and cameras.


Archive | 2012

A Mobile Device-Based Virtualization Technique for M2M Communication in Cloud Computing Security

Giovanni Cagalaban; Seoksoo Kim; Minho Kim

Various computing technologies involving wireless sensors, Internet, personal computers, and mobile devices are coming together to create machine-to-machine (M2M) communications. As modern mobile devices continue to approach the capabilities and extensibility of standard desktop workstations and servers, mobile devices are also beginning to face many of the same security threats as desktops and servers experience. An enabler for security issues in mobile devices is virtualization, an established technology in the desktop and server domains. In this paper, we address the security challenges by presenting a virtualization technique in M2M communications for cloud computing security. Then virtualization technique serves as security control mechanism for mobile devices which provides strong protection against the identified mobile threats as well as performance efficiency. The mobile virtualization approach and its elements are discussed in detail taking into account the existing limitations of mobile devices. This paper aims to spend bandwidth resources to significantly reduce on-device CPU, memory, and power resources using extremely lightweight technology. Our result shows that the virtualization technique enhances mobile security and reduces on-device software complexity.


international conference on future generation communication and networking | 2010

Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring

Sungmo Jung; Jong Hyun Kim; Giovanni Cagalaban; Ji-hoon Lim; Seoksoo Kim

More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of ‘an executing environment aware attack’ by analyzing system behaviors and monitoring memory.


International Conference on Security-Enriched Urban Computing and Smart Grid | 2010

Projective Illumination Technique in Unprepared Environments for Augmented Reality Applications

Giovanni Cagalaban; Seoksoo Kim

Most augmented reality (AR) applications in prepared environments implement illumination mechanisms between real and synthetic objects to achieve best results. This approach is beneficial to tracking technologies since additional visual cues provide seamless real-synthetic world integration. This research focuses on providing a projective illumination technique to aid augmented reality tracking technologies that work in unprepared environments where users are not allowed to modify the real environment, such as in outdoor applications. Here, we address the specific aspects of the common illumination problems such as efficient update of illumination for moving objects and camera calibration, rendering, and modeling of the real scene. Our framework aims to lead AR applications in unprepared environments with projective illumination regardless of the movement of real objects, lights and cameras.


international conference on entertainment computing | 2010

Towards a service-oriented architecture for interactive ubiquitous entertainment systems

Giovanni Cagalaban; Seoksoo Kim

Ubiquitous computing is not only applied to doing daily activities and integrated into everyday objects but for entertainment, and gaming as well. In this research, we explore the relevance of ubiquitous computing to entertainment systems using devices such as mobile devices. We introduce a service-oriented architecture for ubiquitous entertainment systems to establish collaborative relationships between heterogeneous devices to provide users an interactive and ubiquitous entertainment and fun.


Archive | 2012

A Secure Machine to Machine-Based Framework for Service Provisioning in Cloud Computing Infrastructures

Giovanni Cagalaban; Jae Young Ahn; Seoksoo Kim

M2M pose unique security challenges as the automation and lack of human intervention makes the network vulnerable to a variety of potential attacks and inadaptable to current situation where conventional security solutions are infeasible. Our framework comprises of security components which achieve certain level of security that enables the M2M systems to interface with intelligent devices that are deployed in customer facilities to sense real-world conditions and control physical devices, relay data from the devices in the customer premises to a centralized data center, and analyze the data and trigger business events. We also present performance results of our framework and show that our framework is capable of scalably and reliably handling concurrent events generated by different types of M2M devices, such as RFID tags, Zigbee sensors, and location tracking tags to achieve a high degree of security.


Archive | 2012

A Multilevel Security Framework for Cloud-Based Ubiquitous Healthcare Application Service

Giovanni Cagalaban; Donghyun Kim; Seoksoo Kim; E-Jung Choi

In this paper, the need for security mechanisms for healthcare domains with appropriate levels of protection is addressed. Specifically, we design security framework for multiple level of security in a ubiquitous healthcare service provisioning based on cloud computing. The goal is to provide a localized and dynamic security structure of a typical cloud computing communication for patient data access, storage, transmission, and processing as well as provide security and privacy risk mitigation strategies in ubiquitous health serve provisioning.


ubiquitous computing | 2011

An Approach to Roust Control Management in Mobile IPv6 for Ubiquitous Integrate Systems

Giovanni Cagalaban; Byungjoo Park

Ubiquitous healthcare systems offer a dynamic collection of services for patient monitoring from a mobile and diverse range of sources such as huge volume of sensor data. This is enabled by the rapid advancement of Internet technologies such as mobile IPv6 protocol which integrates real-time monitoring of people with health illnesses and improves situation and location awareness even if people are on the move. This research proposes a patient control management with the support of mobile IPv6 networks. In particular, this paper integrates ubiquitous healthcare and wireless networks for efficient and reliable access and transmission of information to healthcare centers. Heterogeneous devices such a mobile devices and wireless sensors can continuously monitor patient status and location which have the capabilities of communicating remotely with healthcare centers, dedicated servers, physicians, and even family members to effectively deliver healthcare services.


ubiquitous computing | 2011

A SOA-Based Service Composition for Interactive Ubiquitous Entertainment Applications

Giovanni Cagalaban; Seoksoo Kim

As mobile and embedded computing devices become more ubiquitous, it is becoming obvious that the nature of interactions between users and computers have evolved. The capabilities of mobile and wireless devices to be seamlessly integrated into daily objects and tasks allow a plethora of services particularly in the field of entertainment and gaming. Particularly, this paper proposes a service composition for interactive ubiquitous entertainment applications based on service oriented architecture (SOA). It aims to establish collaborative relationships between heterogeneous devices to provide users an interactive and ubiquitous entertainment and fun. The robust approach is to create a seamless entertainment environment which can cope with highly dynamic environments in which resources such as network connectivity and services frequently vary over time.

Collaboration


Dive into the Giovanni Cagalaban's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dong-Joo Kang

Korea Electrotechnology Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jae Young Ahn

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jong Hyun Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge