Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kwang Seon Ahn is active.

Publication


Featured researches published by Kwang Seon Ahn.


network computing and applications | 2008

An Improved Anti Collision Algorithm using Parity Bit in RFID System

Sung Soo Kim; Yonghwan Kim; Seong Joon Lee; Kwang Seon Ahn

The RFID (radio frequency identification) is a technology that automatically identifies objects containing the electronic tags by using radio frequency. In RFID system, the reader needs the anti collision algorithm for fast identifying all of the tags in the interrogation zone. This paper proposes the tree based anti collision algorithm using parity bit (ACPB) to arbitrate the tag collision. The proposed algorithm identifies tags without checking all the bits in the tags. The reader uses the parity bit which is added to the tag IDs. If there are two collided bits in tags, then reader identify tags by the parity concept. The reader can identify two tags using ACPB algorithm. ACPB can reduce the number of the requests from the reader, thus it shortens the time of identifying all of the tags in the interrogation zone.


embedded and real-time computing systems and applications | 2008

An Efficient Anti-collision Protocol Using Bit Change Sensing Unit in RFID System

Young Tae Kim; Seong Joon Lee; Kwang Seon Ahn

A tag collision problem, which is one of core issues when building the RFID system, reduces the efficiency of identifying tags. To solve the tag collision problem, various protocols have been proposed and studied. Almost all the tree-based algorithms aim at generating the unique prefix, and identifying tags as quickly as possible. However, the existing protocols, when many tags are placed on the same range, are increasing the number of query , and expending a great deal of time in identifying tags. In this paper, we proposed the QT-BSC protocol to reduce the number of query. The protocol creates a prefix by using bit change sensing unit and time slot. That is, the proposed protocol is designed so as to send the bits from the next bit of prefix to the bit which has the other value. Consequently, as sending bit group which can easily be tracking a new prefix, this method can reduce the number of query. As a result of a simulation, this paper shows that less time is needed for identifying tags by reducing the number of query-response more than query tree and 4-Ary query tree.


mobile wireless middleware, operating systems, and applications | 2008

A remote monitoring and control of home appliances on ubiquitous smart homes

Seong Joon Lee; Yonghwan Kim; Sung Soo Kim; Kwang Seon Ahn

The goal in this paper is to design and implementation the service agent society mechanism of home network community by using Jini platform. On Ubiquitous smart homes environment, this mechanism can make various services to be used among service agents. Based on the mobility of service agent on the Jini platform and instant messaging system (IMS), the mobile device can receive the real time notify from its federation leader in order to download the necessary service, to remove the unnecessary service, or to update the newly service without reconfiguring the system. Moreover, using the Natural Language Processing, the client is possible to express smoothly the order. Therefore, our proposed agent-based management system for ubiquitous smart homes provides a user-friendly interface, and can make use of add-on functionalities of the IMS such as voice chatting, SMS, and multimedia.


embedded and ubiquitous computing | 2006

Control of information appliances using instant messaging

Seong Joon Lee; Kwang Seon Ahn

Many of the systems developed to date for controlling home appliances remotely from outside have used a web server as the interface between the home network and the users. Although the user interface (UI) that uses a web server offers many advantages, this approach requires a fixed IP (Internet Protocol) address and does not have a push function. Moreover, until the user gets reconnected to the web server, he or she cannot know the result of a submitted order. In particular, internet-based applications using web browsers still require considerable time to execute the initialization process for acquiring state information on home appliances from the home server. To solve these problems, we propose an application for home automation that can efficiently control and monitor home appliances using an instant messaging system (IMS) with real time communication. The proposed system has not only the advantages of the web server method, but also with additional advantage that the homeowner does not need to continually reconnect to the home server, and that the home server does not need to have a fixed IP address. Our application can be applied using middleware technologies


The Kips Transactions:partc | 2009

An RFID Authentication Protocol based Symmetric Key using Hashed Tag ID

Yongsoo Park; Ju Seok Shin; Myung Sil Choi; Kyung Ho Chung; Kwang Seon Ahn

ABSTRACT By identifying the unique information of the objects using the RF, the RFID technique which will be able to manage the object is spot-lighted as the main technology in Ubiquitous era. On RFID systems, since the information of RFID may easily be unveiled in air, the secure and privacy problems always exist. In this paper, we propose mutual authentication protocol based on symmetric key. Proposed protocol has been able to minimize the tags H/W resource by using symmetric key. And we use tag ID which is encrypted with hash function and a shared symmetric key by Challenge-Response pair of PUF(Physically Unclonable Function), thus there is no key disclosure problem in our protocol.Keywords:RFID, Symmetric Key, Hash Function, Authentication protocol, PUF 1. 서 론 1) 무선을 이용하여 대상물의 고유정보를 인식함으로, 대상물을 관리할 수 있게 하는 RFID( Radio Frequency Identification)기술은 유비쿼터스 시대의 핵심기술로써 각광을 받고 있다. 이 기술은 공간을 통하여 임의의 반경 내의 사물에 동시에 접근할 수 있는 전자파의 특성을 이용하기 때문에 대상물의 정렬 불필요, 빠른 재고 조사, 아이템별 추적 가능 및 다시 쓰기 가능 등 기존의 바코드 인식기술에 비하여 많은 장점으로 인하여 바코드 기술의 대체기술로 알려져 있다. 하지만 공간을 매개로한 전자파의 전달 특성은


local computer networks | 2008

A Tag Prediction Algorithm using Upper Bit in RFID systems

Sung Soo Kim; Yonghwan Kim; Seong Joon Lee; Kyung Ho Chung; Kwang Seon Ahn

In RFID (Radio Frequency IDentification) system, the reader needs the anti collision algorithm for fast identifying all of the tags in the interrogation zone. This paper proposes the tree based Tag Prediction Algorithm using Upper Bit (TPAUB) to arbitrate the tag collision. A TPAUB can identify tags without identifying all the bits in the tag ID. The reader uses the upper bit which is added to the tag ID and if there are two collided bits or multiple collided bits, it checks the upper bit and grasps the number the number of identified dasia1psilas. A TPAUB can reduce the number of the requests transmitted from the reader, thus it shortens the time of identifying all of the tags in the interrogation zone.


network computing and applications | 2009

A Rapid Tag Identification Method with Two Slots in RFID Systems

Yonghwan Kim; Sung Soo Kim; Kwang Seon Ahn

RFID is core technology in the area of ubiquitous computing. Identify the objects begin with the readers query to the tag attached to the subject. When multiple tags exist in the readers interrogation zone, these tags simultaneously respond to the readers query, resulting in collision. In RFID system, the reader needs the anti-collision algorithm which can quickly identify all the tags in the interrogation zone. This paper proposes tree based Rapid Tag Identification Method with Two Slots(RTIMTS). The proposed algorithm rapidly identifies a tag with the information of Two Slots and MSB(Most Significant Bit). Two Slots resolve the tag collision by receiving the response from the tag to the Slot 0 and 1. The reader can identify two tags at once using MSB of information added to the tag ID. With RTIMTS algorithm, the total time of tag identification can be shortened by decreasing the number of query-responses from the reader.


local computer networks | 2008

An efficient anti-collision algorithm through division transfer of tag ID in RFID systems

Seong Joon Lee; Young Tae Kim; Sung Soo Kim; Yongsoo Park; Yonghwan Kim; Kwang Seon Ahn

With the wide adoption of radio frequency identification (RFID) system, one of important issues is the anti-collision problem. This means that the reader should be identified all tags within the same range, efficiently, fast. Generally, the tree-based protocols should make the unique ID from the request from the reader and the response from tags. In the result, the traditional methods need the number of considerable query. In this paper, we, on the environment making IDs from the rest of bits except the specified fields of EPC Class 1 Gen. 2 for the similar circumstances that we can easily look at real environment, propose the BSCTTA based method to reduce the number of query.


agent and multi agent systems technologies and applications | 2008

A user interface for a Jini-based appliances in ubiquitous smart homes

Seong Joon Lee; Won Tae Kim; Kwang Seon Ahn

The goal in this paper is to provide the uniform appliances interface. One of the problems with many of existing appliances may be not used the same interface for different devices, because the respective device have their heterogeneous characteristics and limitations, even among different versions made by the same manufacturer. Therefore, if end-users can have the remote controller meaning any device that is installed UI which provide the interaction between different providers and various versions, he or she is able to more efficiently control a device. In this paper, we present a system, called REMOCON, which approaches this problem by building natural language interfaces, and by using the instant messenger. In Ubiquitous smart homes environment, this mechanism can make various services to be used among service agents. Based on the mobility of service agent on the Jini platform and instant messaging system (IMS), the mobile device can receive the rapid notify from its federation leader in order to download the necessary service, to remove the unnecessary service, or to update the newly service without reconfiguring the system. Also, using the natural language processing, the client is possible to express smoothly the order. Therefore, our proposed agent-based management system for ubiquitous smart homes provides a user-friendly interface, and can make use of add-on functionalities of the IMS such as voice chatting, SMS, and multimedia.


agent and multi agent systems technologies and applications | 2007

Remote Control of Smart Homes Using Korean Natural Language Processing

Seong Joon Lee; Seung Woon Kim; Kwang Seon Ahn

Recently, with the rapid growth of digital and Internet technologies, the demand for using the Internet in the home have increased. Also, the development of various Internet-based remote controller for smart homes have been prompted, most of which adopt a web interface between people and machines. In this paper, we proposed new user interface (UI) for smart homes with natural language processing (NLP) agent. The aim in the proposed method is to provide the homeowner with the naturalness of the communication for the end-user. In the proposed method, the home server shows to be able to remotely control and monitor appliances, after analyze the plaintext, by using the natural language. Therefore, using the proposed method, almost all appliances of smart homes can be effectively managed through the integrated UI.

Collaboration


Dive into the Kwang Seon Ahn's collaboration.

Top Co-Authors

Avatar

Seong Joon Lee

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Sung Soo Kim

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Yonghwan Kim

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Kyung Ho Chung

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Seung Woon Kim

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Yongsoo Park

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Young Tae Kim

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Hwa Young Lim

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Hyun Jun Yeo

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Myung Sil Choi

Kyungpook National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge