Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Joo-Man Kim.
The Journal of the Institute of Webcasting, Internet and Telecommunication | 2014
Chin-Hoon Kim; Joo-Man Kim; Byoung Chul Kim
Abstract The ballast water may be discharged into another sea area with marine organisms, it caused problems to disturb the marine ecosystem. So, in order to remove these environmental risk factors, the IMO has mandated the installation of BWTS to the all ships. Our monitoring system diagnose and predict a failure of BWTS by analyzing the sensor information of BWTS collected from which the ships scattered in the ocean of several. This paper presents the design and implementation of communication modules for BWTS remote monitoring considering the satellite communication charge fee. In the our study, we implemented the safety and cost-saving communication modules by LabVIEW program. The collected sensor informations is encrypted and compressed by LabVIEW modules running on RIO. Then they will be transfer to the land server and will be decrypt to enable monitoring in the land server. For the verification, we build the test modules which can verify from collecting the sensor data to consuming them in the monitoring server. We carried out 20 times for the data pattern in all of case. So, we verified the excellent functionality and reliability through the experimental result.
디지털융복합연구 = Journal of digital convergence | 2014
Hwi-Min Choi; Changbok Jang; Joo-Man Kim
** Abstract Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). todays mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.
The Journal of the Institute of Webcasting, Internet and Telecommunication | 2015
Yongho Kang; Changbok Jang; Joo-Man Kim
Recently, with smart device proliferation and providing the various services using this, they have interested in mobile and Smart TV security. Smartphone users are enjoying various service, such as cloud, game, banking. But today`s mobile security solutions and Study of Smart TV Security simply stays at the level of malicious code detection, mobile device management, security system itself. Accordingly, there is a need for technology for preventing hacking and leakage of sensitive information, such as certificates, legal documents, individual credit card number. To solve this problem, a variety of security technologies(mobile virtualization, ARM TrustZone, GlobalPlatform, MDM) in mobile devices have been studied. In this paper, we propose an efficient method to implement security technology based on TYPE-I virtualization using ARM TrustZone technology.
The Journal of the Institute of Webcasting, Internet and Telecommunication | 2015
Hwi-Min Choi; Ji-No Seo; Kwang-Seob Lee; Seon-Jong Kim; Joo-Man Kim
In this paper, I describe a system for remote monitoring of devices Android-based sensor data recorded during the operation of the ballast water treatment system. The proposed remote monitoring system is Designed and implemented when a problem occurs in the ballast water treatment system installed in the vessel, provide information if you are unable to determine the cause in the field or engineer dispatch request of external. System developed is composed of a server holding the sensor data information collected from the vessel and a mobile device that is not bound to time and place. The transmission of sensor data between mobile devices and server, and is implemented by TCP/IP to transmit information securely. System is composed of request to the server from the mobile device after the user inputs the input values, to transmit the sensor data. The device provides the information of the sensor with a high level of importance to the user. Through the remote monitoring sensor information of the ballast water treatment system, the system is made to predict the failure of the sensor.
The Journal of the Institute of Webcasting, Internet and Telecommunication | 2014
Seon-Jong Kim; Joo-Man Kim
Abstract This paper proposes a novel procedure that uses a combination of overlapped basic convex shapes to decompose 2D silhouette image. A basic convex shape is used here as a structuring element to give a meaningful interpretation to 2D images. Poisson equation is utilized to obtain the basic shapes for either the whole image or a partial region or segment of an image. The reconstruction procedure is used to combine the basic convex shapes to generate the original shape. The decomposition process involves a merging stage, filtering stage and finalized by compromising stage. The merging procedure is based on solving Poisson’s equation for two regions satisfying the same symmetrical conditions which leads to finding equivalencies between basic shapes that need to be merged.We implemented and tested our novel algorithm using 2D silhouette images. The test results showed that the proposed algorithm lead to an efficient shape decomposition procedure that transforms any shape into a simpler basic convex shapes.
Journal of Digital Convergence | 2014
Yongho Kang; Changbok Jang; Wan-Jik Lee; Seok-Yeol Heo; Joo-Man Kim
Abstract Recently, various cloud service has been being provided on mobile devices as well as desktop pc and server computer. Also, Smartphone users are very rapidly increasing, and they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). So, research to utilize resources on mobile device has been conducted. In this paper, We have suggested efficient method of cloud resource management by using information of available physical resources(CPU, memory, storage, etc.) between mobile devices, and information of physical resource in mobile device. Suggested technology is possible to guarantee real-time process and efficiently manage resources. Key Words : Mobile Virtualization, Mobile Cloud Computing, Cloud Resource Management Received 2 January 2014, Revised 7 February 2014Accepted 20 February 2014Corresponding Author: Jooman Kim(Pusan National University) Email: [email protected]Ⓒ The Society of Digital Policy & Management. All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.otg/licenses/by-nc/3.0), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is ISSN:1738-1916 properly cited.
The Journal of Digital Policy and Management | 2013
Wook-Jin Choi; Yongho Kang; Seon-Jong Kim; Hyeog-Soong Kwon; Joo-Man Kim
Disk Cache Manager(DCM), a functional server of microkernel based, to improve the I/O power of shared disks is designed and implemented in this work. DCM interfaces other different servers with message passing through ports by serving as a system actor the multi-thread mode on the Minix3 micro-kernel. DCM proposed in this paper uses the shared disk logically as a Seven Disk and Sodd Disk to enable parallel I/O. DCM enables the efficient placement of disk data because it raises disk cache hit-ratio by increasing the cache size when the utilization of the particular disk is high. Through experimental results, we show that DCM is quite efficient for a shared disk with higher utilization.
IEMEK Journal of Embedded Systems and Applications | 2014
Wook-Jin Choi; Chin-Hoon Kim; Hwi-Min Choi; Kwang-Seob Lee; Woo-Jin Choi; Joo-Man Kim
The Journal of the Institute of Webcasting, Internet and Telecommunication | 2017
Ji-No Seo; Seon-Jong Kim; Hyeog-Soong Kwon; Joo-Man Kim
Journal of Korean Institute of Information Technology | 2016
Ji-Hoon Kang; Hyeog-Soong Kwon; Joo-Man Kim; Seon-Jong Kim