Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hae-Seok Oh is active.

Publication


Featured researches published by Hae-Seok Oh.


international conference on knowledge based and intelligent information and engineering systems | 2005

Home network observation system using user's activate pattern and multimedia streaming

Kyung-Sang Sung; Dong Chun Lee; Hyunchul Kim; Hae-Seok Oh

We suggest a simplified application model that could apply the information to the automated processing system after studying users behavior patterns using authentication and access control for identity certification of users on ubiquitous computing environments. In addition, we compared captured video images in the fixed range by pixel unit through some time and checked disorder of them. According to experimental results, the proposed method is very reasonable to believe that we could extend various multimedia applications in our daily lives.


Journal of the Korea Academia-Industrial cooperation Society | 2009

A Study on the E-Document Encrypted using the Effective key Management Method

Tae-Wook Kim; Kyung-Sang Sung; Hae-Seok Oh

It also increases the competitive power of the nation. With all these merits of electronic documents, there exist threats to the security such as illegal outflow, destroying, loss, distortion, etc. Currently, the techniques to protect the electronic documents against illegal forgery, alteration or removal are not enough. Until now, various security technologies have been developed for electronic documents. However, most of them are limited to prevention of forgery or repudiation. Cryptography for electronic documents is quite heavy that direct cryptography is not in progress. Additionally, key management for encryption/decryption has many difficulties that security has many weak points. Security has inversely proportional to efficiency. It is strongly requested to adopt various cryptography technologies into the electronic document system to offer more efficient and safer services. Therefore, this paper presents some problems in cryptography technologies currently used in the existing electronic document systems, and offer efficient methods to adopt cryptography algorithms to improve and secure the electronic document systems. To validate performance of proposed method compare with the existing cryptographies, critical elements have been compared, and it has been proved that the proposed method gives better results both in security and efficiency.


The Kips Transactions:partc | 2009

Design of an Efficient Electrocardiogram Measurement System based on Bluetooth Network using Sensor Network

Sun-Jae Kim; Won-Wook Oh; Chang-Soo Lee; Byoung-Muk Min; Hae-Seok Oh

The convergence tendency accelerates the realization of the ubiquitous healthcare (u-Healthcare) between the technology including the power generaation and IT-BT-NT of the ubiquitous computing technology. By rapidly analyzing a large amount of collected from the sensor network with processing and delivering to the medical team an u-Healthcare can provide a patient for an inappropriate regardless of the time and place. As to the existing u-Healthcare, since the sensor node all transmitted collected data by using with the Zigbee protocol the processing burden of the base node was big and there was many communication frequency of the sensor node. In this paper, the u-Healthcare system in which it can efficiently apply to mobile apparatuses it provided the transfer rate in which it is superior to the bio-signal delivery where there are the life and direct relation which by using the Bluetooth instead of the Zigbee protocol and in which it is variously used in the ubiquitous environment was designed. Moreover, by applying the EEF(Embedded Event Filtering) technique in which data in which it includes in the event defined in advance selected and it transmits with the base node, the communication frequency and were reduced. We confirmed to be the system in which it is efficient through the simulation result than the existing Electrocardiogram Measurement system.


software engineering research and applications | 2006

Digital Watermark System based on improved security through Pre-Processing of watermarked data using Information of Image Discrete Frequency

Kyung-Sang Sung; Seung-Heon Lee; Bo-Hyun Wang; Hae-Seok Oh

Digital watermarking is an insertion technique where specific data that represents copyrights and ownership of multimedia contents such as audio, video, image and texts are inserted, which is a method to prevent illegal distribution, or copying of the product without proper authorization from maker or owner. In this research, unlike the existing image watermarking method wherein watermark is done to the frame itself, a model which extracts audio information within the moving picture, inserts image watermark into the extracted audio information which represents the owner, then combines original image together with digital audio watermark image. Also, suggests a model that improves security of watermark itself, by conducting pre-processing of watermark


software engineering research and applications | 2006

Recommends System using Re-extraction methods on the Groups with a similarity pattern such as Clustered User's preference tendency

Kyung-Sang Sung; Hae-Seok Oh

As the amount of information provided to the customer becomes larger, unnecessary information can lead to difficulty in finding the information customer wanted. This also may lead to a customer being dissatisfied with the service. However, the existing systems that apply a similar concept fail to address the individual users demands. In addition, in considering similarities between users, each items relative importance (weighted value) to each customer are not being taken into account. This leads to problems of scarcity if the common preference items are small and also the problems of expansion, where system slowdown occurs as number of users increase. These inefficiency problems are dealt with, in this paper, an adaptive e-commerce agent system is proposed to cater for individual users taste for products. This system includes a monitoring agent that monitors users intentions, a similarity referencing agent that learns users activities to reference a group with a similar pattern, and an interest extraction agent that creates and updates individual users activity database whenever change in activity is detected


The Kips Transactions:partd | 2004

Goods Recommendation Sysrem using a Customer’s Preference Features Information

Kyung-Sang Sung; Yeon-Chool Park; Jae-Myung Ahn; Hae-Seok Oh

As electronic commerce systems have been widely used, the necessity of adaptive e-commerce agent systems has been increased. These kinds of adaptive e-commerce agents can monitor customer`s behaviors and cluster thou in similar categories, and include user`s preference from each category. In order to implement our adaptive e-commerce agent system, in this paper, we propose an adaptive e-commerce agent systems consider customer`s information of interest and goodwill ratio about preference goods. Proposed system build user`s profile more accurately to get adaptability for user`s behavior of buying and provide useful product information without inefficient searching based on such user`s profile. The proposed system composed with three parts , Monitor Agent which grasps user`s intension using monitoring, similarity reference Agent which refers to similar group of behavior pattern after teamed behavior pattern of user, Interest Analyzing Agent which personalized behavior DB as a change of user`s behavior.


The Kips Transactions:partb | 2004

Evaluation of Digital Elevation Models by Interpreting Correlations

Seung-Woo Lee; Hae-Seok Oh

The ground positions and elevations information called DEMs(Digital Elevation Models) which are extracted from the stereo aerial photographs and/or satellite images using image matching method have the natural errors caused by variant environments. This study suggests the method to evaluate DEMs using correlation values between the reference and the target DEMs. This would be strongly helpful for experts to correct these errors. To evaluate the whole area of DEMs in the horizontal and vertical errors, the target cell is matched for each reference cell using the correlation values of these two cells. When the target cell is matched for each reference cell, horizontal and vertical error was calculated so as to help experts to recognize a certain area of DEMs which should be corrected and edited. If the correlation value is low and tile difference in height is high, the target cell will be candidated as changed or corrupted cell. When the area is clustered with those candidated cells, that area will be regarded as changed or corrupted area to be corrected and edited. Using this method, the evaluation for all DEM cells is practicable, the horizontal errors as well as vertical errors is calculable and the changed or corrupted area can be detected more efficiently.


embedded and real-time computing systems and applications | 1996

Sending, receiving and presenting multimedia data over network for tele-medical diagnosis (MediNet)

Yeong-Geon Seo; Moon-Ryul Jung; Hae-Seok Oh

In this paper, we describe a prototype tele-conference system that sends, receives and presents multimedia data over network for tele-medical diagnosis (MediNet). MediNet supports tele-conference in which doctors can share patient information and 3-D medical images reconstructed from 2-D medical images. Data shared among doctors also includes hand position (pointing), voice, motion images and still images from camera. The system can send and receive various kinds of data in full-duplex at the same time. To present a continuous stream without discontinuation, the receiver uses delay time to avoid trying to play frames that have not arrived. To determine the delay time, the sender sends the recipient dummy frames just after the sender and the recipient are connected. For each dummy frame, the recipient computes the deviation of the actual arrival time from the desired arrival time. The delay time is the maximum deviation time. Then the sender sends the recipient a header and actual data for each frame. The actual data is played at logical time + delay time. If the frame is larger than the maximally allowable size, then the sender segments the frame and the recipient reassembles the segments.


Journal of the Korea Academia-Industrial cooperation Society | 2017

A Study on the Analysis of Electric Energy Pattern Based on Improved Real Time NIALM

Han-Sang Jeong; Kyung-Sang Sung; Hae-Seok Oh

Since existing nonintrusive appliance load monitoring (NIALM) studies assume that voltage fluctuations are negligible for load identification, and do not affect the identification results, the power factor or harmonic signals associated with voltage are generally not considered parameters for load identification, which limits the application of NIALM in the Smart Home sector. Experiments in this paper indicate that the parameters related to voltage and the characteristics of harmonics should be used to improve the accuracy and reliability of the load monitoring system. Therefore, in this paper, we propose an improved NIALM method that can efficiently analyze the types of household appliances and electrical energy usage in a home network environment. The proposed method is able to analyze the energy usage pattern by analyzing operation characteristics inherent to household appliances using harmonic characteristics of some household appliances as recognition parameters. Through the proposed method, we expect to be able to provide services to the smart grid electric power demand management market and increase the energy efficiency of home appliances actually operating in a home network.


The Kips Transactions:partc | 2009

A Study on the Encrypted Scheme Using Key Management Method Based on the Random Number Rearrangement for the Effective E-Document Management

Tae-Wook Kim; Kyung-Sang Sung; Jung-Jae Kim; Byoung-Muk Min; Hae-Seok Oh

ABSTRACT With all merits of electronic documents, there exist threats to the security such as illegal outflow, destroying, loss, distortion, etc. The techniques to protect the electronic documents against illegal forgery, alteration, removal are strongly requested. Even though various security technologies have been developed for electronic documents, most of them are emphasized to prevention of forgery or repudiation. This paper presents some problems in cryptography technologies currently used in the existing electronic document systems, and offer efficient methods to adopt cryptography algorithms to improve and secure the electronic document systems. To validate performance of the proposed random rearrangement method comparing with the existing cryptographies, basic elements have been compared, and it has been proved that the proposed method gives better results both in security and efficiency. Keywords:Electronic Document, Cryptography Technology, Computations Execution, Key Management, Random Number Rearrangement

Collaboration


Dive into the Hae-Seok Oh's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hyunchul Kim

Seoul National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge