Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kihyun Kim is active.

Publication


Featured researches published by Kihyun Kim.


international conference on networks and communications | 2009

An Efficient Routing Protocol Based on Position Information in Mobile Wireless Body Area Sensor Networks

Kihyun Kim; Icksoo Lee; Mahnsuk Yoon; Junhyung Kim; Honggil Lee; Kijun Han

In recent years, interests in the application of Wireless Body Area Network (WBAN) have grown considerably. Wireless Body Area Sensor networks consist of fixed sensor nodes. Sometimes, creating such a fixed sensor networks could be a daunting task. Wireless Body Area Sensor nodes assume deploying a stationary sensor network over a human body area. Even if an advanced method to make the deployment safer is used, diverse element will cause a coverage holes. Even though perfect coverage can be achieved initially, various factors such as body movements will certainly degrade network coverage as time goes on. However, mobile wireless body area sensor networks can solve some of the problems. Some node of mobile wireless body area sensor network has mobility. Mobility reinforces fault-tolerance and the scalability of the network. But conventional sensor routing protocols find it hard to deal with the mobile wireless body area sensor networks. Therefore, this study suggests an energy efficient routing scheme by using the location information of a global positioning system (GPS) and the energy levels of sensor nodes.


international conference on advanced communication technology | 2006

Implementation of 10 Giga VPN accelerator board

Kihyun Kim; Jang-Hee Yoo; Kyo Il Chung

This paper proposes a VPN accelerator board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). The TCSS supports safety communication channel between security nodes in Internet. It furnishes authentication, confidentiality, integrity, and access control to the security node to transmit data packets with IPsec protocol. TCSS consists of Internet key exchange block, and security association block, IPsec engine block. The Internet key exchange block negotiates crypto algorithm and key used in IPsec engine block. Security association blocks setting-up and manages security association information. IPsec engine block treats IPsec packets and consists of networking functions for communication. The IPsec engine block should be embodied by HAV and in-line mode transaction for high speed IPsec processing. Our VPN-AB is implemented with high speed security processor that supports many cryptographic algorithms and in-line mode. We evaluate a small TCSS communication environment, and measure a performance of VPN-AB in the environment. The experiment results show that VPN-AB gets a performance throughput of maximum 15.645 Gbps when we set the IPsec protocol with 3DES-HMAC-MD5 tunnel mode


International Journal of Phytomedicine | 2016

Spraying of swine buildings with lemon grass ( Cymbopogon citratus ) essential oil does not produce blood absorption in swine

Seung-Jin Lee; Kihyun Kim; Abraham Fikru Mechesso; Na-Hye Park; Seung-Chun Park

Cymbopogon citratus (Lemon grass) essential oils have been used in swine buildings to reduce the offensive odor emanating from swine buildings. The present study was designed to investigate plasma residues of citral which is a major constituent of the essential oils of Cymbopogon citratus. An HPLC method was established, validated and used for the determination of citral in swine plasma harvested from blood samples taken at the 14 th , 21 st and 28 th day after spraying swine buildings with the 3% Lemon grass essential oil. Thereafter, analysis of the sample was conducted using HP ODS Hypersil column (200 × 4.6 mm, 5 µm) with a mobile phase consisting of methanol and 0.5% acetic acid; and a flow rate of 1mL/ min. The method was validated for parameters such as accuracy, precision, linearity and detection limits. Plasma spiked with standard citral (95%) revealed two chromatograms with retention times of about 10.7 and 12.2 minutes. The calibration curves for the citral isomers were found to be linear in the tested concentration ranges and mean recoveries wre 101% and 99.17%. This method was used to determine the residues of citral in swine plasma pretreated with methanol. Surprisingly, there was no any detectable level of citral in swine plasma within the 28 days of exposure. spraying of swine buildings with essential oils of lemon grass oil does not cause plasma residues of citral.


international multi-symposiums on computer and computational sciences | 2008

The Path Recovery Method for Wireless Mesh Networks

Keuchul Cho; Jeongbae Yun; Youngmi Baek; Kihyun Kim; Kijun Han

The hybrid wireless mesh protocol is a mesh routing protocol that combines the flexibility of on-demand routing with proactive topology tree extensions. The wireless mesh network is consisted with mesh points and stations. Even if mesh points or stations have mobility, the path should be kept continuously. Direction of present mobility research is achieved research in mobility of stations. In case the mesh access point moves, this research is very weak. Proposal scheme is emphasizing in the MAP (mesh access point) mobility. After the mesh access point moves, it re-establish existing full path by using RRER message. However, our scheme is available existing path that is changed locally by using the MR (message registration)-message which accomplish locally re-establish path technique. In this paper, we analyze problem in existent HWMPpsilas path establishment technique. We propose New Path Selection Scheme by using MR-message. Simulation results show that proposal scheme is to reduce packet loss.


international conference on multimedia and information technology | 2008

A Location Based Energy Efficient Intersection Routing Protocol in Mobile Sensor Networks

Kihyun Kim; Honggil Lee; Byeongjik Lee; Youngmi Baek; Kijun Han

Typically, sensor networks consist of fixed sensor nodes. Sometimes, creating such a fixed sensor networks could be a daunting task. Sensor nodes assume deploying a stationary sensor network over a dangerous area such as a battlefield. Even if an advanced method to make the deployment safer is used, diverse element will cause a coverage holes. Even though perfect coverage can be achieved initially, various factors such as malicious attacks will certainly degrade network coverage as time goes on. However, mobile sensor networks can solve some of the problems. Each node of mobile sensor network is mounted on various unmanned vehicles as a result the sensor nodes have mobility. Mobility reinforces fault-tolerance and the scalability of the network. But conventional sensor routing protocols find it hard to deal with the mobile sensor networks. Therefore, this study suggests an energy efficient routing scheme by using the location information of a Global Positioning System (GPS) and the energy levels of sensor nodes.


Archive | 2005

Method and system for integrated authentication using biometrics

Youn Hee Gil; Yun Su Chung; Kihyun Kim; Jang Hee Yoo; Kyo Il Chung; Dosung Ahn; Sung Bum Pan


international conference on advanced communication technology | 2009

A location based routing protocol in mobile sensor networks

Kihyun Kim; Jeongbae Yun; Jangkyu Yun; Byeongjik Lee; Kijun Han


Journal of KIISE:Computing Practices and Letters | 2010

Computerized Psychological Test System for Art Therapy

Inho Jeon; Song-I Kim; Kihyun Kim; Eun-Ji Lim; Young-Ok Kim


World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering | 2007

A 10 Giga VPN Accelerator Board for Trust Channel Security System

Kihyun Kim; Jang-Hee Yoo; Kyo Il Chung


EC'07 Proceedings of the 8th Conference on 8th WSEAS International Conference on Evolutionary Computing - Volume 8 | 2007

A polling scheme of TXOP using knapsack algorithm in wireless LAN

Jinhyo Park; Keuchul Cho; Minho Choi; Byeongjik Lee; Byunghwa Lee; Kihyun Kim; Kijun Han

Collaboration


Dive into the Kihyun Kim's collaboration.

Top Co-Authors

Avatar

Kijun Han

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Byeongjik Lee

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Kyo Il Chung

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Honggil Lee

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Jang-Hee Yoo

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jeongbae Yun

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Keuchul Cho

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Youngmi Baek

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Byunghwa Lee

Kyungpook National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge