Mun Kee Choi
Information and Communications University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mun Kee Choi.
international conference on signal processing | 2005
Sae Sol Choi; Mun Kee Choi; Won Jay Song; Sang Hyuk Son
In this paper, we have studied ubiquitous personal healthcare systems using radio frequency identification (RFID) tag, wearable electrocardiogram (ECG) sensor, smart card, PQRM grid computing, PhysioNet, wired/wireless network, and public-key infrastructure (PKI) technologies. For research and development of these systems, we have also designed and modeled the system architecture and framework workflow, which are described by six classified core players or subsystems. They are consisting of the patient area network and wearable sensor provider, network service provider, healthcare service provider, emergency service provider, and PKI service providers, whose individual private and public keys should be stored on their smart card and be used to enhance security level control for the patients medical privacy. All ECG measured data in wearable ECG sensor and analyzed data in grid computing with PhysioNet should be encrypted by using an individually generated one-time secure key with expire-time by the patients and healthcare service providers private keys, respectively. These encrypted medical data and encrypted secure keys should be also transferred to the network service provider via secured communication channels in wired/wireless networks. In addition, these encrypted data and keys should be stored on the secured database directory of network service provider. Therefore, all of the patient and providers need suitable secure private and public keys in order to access to ECG medical raw data, diagnosis results and tracking information for emergency service. By enforcing the requirements of necessary keys among the patient and providers, the patients ECG data can be successfully protected and be effectively controlled over the open medical directory service. Consequently, the proposed architecture for ubiquitous RFID healthcare system is appropriate to build up medical privacy policies. Further, the system architecture workflow is modeled and verified using Petri nets
Applied Intelligence | 2007
Sun Jin Kim; Mun Kee Choi
In multirate multicasting, different users (receivers) in the same multicast group can receive service at different rates, depending on the user requirements and the network congestion level. Compared with unirate multicasting, this provides more flexibility to the users and allows more efficient usage of the network resources. In this paper, we simultaneously address the route selection and rate allocation problem in multirate multicast networks; that is, the problem of constructing multiple multicast trees and simultaneously allocating the rate of receivers for maximizing the sum of utilities over all receivers, subject to link capacity and delay constraints for high-bandwidth delay-sensitive applications in point-to-point communication networks. We propose a genetic algorithm for this problem and elaborate on many of the elements in order to improve solution quality and computational efficiency in applying the proposed methods to the problem. These include the genetic representation, evaluation function, genetic operators, and procedure. Additionally, a new method using an artificial intelligent search technique, called the coevolutionary algorithm, is proposed to achieve better solutions, and methods of selecting environmental individuals and evaluating fitness are developed. The results of extensive computational simulations show that the proposed algorithms provide high-quality solutions and outperform existing approach.
international conference on mobile business | 2005
Sang-Yeal Han; Moon Kyo Cho; Mun Kee Choi
Mobile game and advertising are evolving rapidly and becoming the key of mobile contents market. More powerful mobile devices have enabled the creation of better and richer mobile games and advertising. This paper proposes a framework, called Ubitem, which addresses many of the issues that are characteristic of mobile gaming and advertising. Ubitem facilitates time and location-sensitive, interactive marketing by enabling users with the location-aware technology capability to collect nearby items such as m-coupons and redeem the items in the close participating stores. We believe that mobile advertising within location-based gaming will most likely enable much richer entertaining experiences as well as the advertisers get superior responses from the users by linking a virtual game play and real-life action.
international conference on consumer electronics | 2003
Won Jay Song; Won Hee Kim; Bo Gwan Kim; Minho Kang; Mun Kee Choi
In this paper, we have proposed the merging of the OpenCable reference model with the smart card interface defined by ISO/IEC 7816-3 and have implemented a new conditional access system (CAS) using this interface along with a Personal Computer Memory Card International Association (PCMCIA) interface. In addition, we have also designed the hardware architecture of the point-of-deployment (POD) security module, designed with the Verilog HDL, using the above two interfaces. The designed POD security module has an embedded 32-bit reduced instruction set computer (RISC) microprocessor that manages applications, such as an MPEG-2 filter, descrambler, and Data Encryption Standard (DES).
international conference on computer safety reliability and security | 2006
Won Jay Song; Moon Kyo Cho; Im Sook Ha; Mun Kee Choi
In this paper, we have designed and modeled the ubiquitous RFID healthcare system architecture and framework workflow, which are described by six classified core players or subsystems, and have also analyzed by an economic value-chain model. They consist of the patient and wearable ECG sensor, network service, healthcare service, emergency service, and PKI service providers. To enhance the security level control for the patients medical privacy, individual private and public keys should be stored on smart cards. All the patient and service providers in the proposed security control architecture should have suitable secure private and public keys to access medical data and diagnosis results with RFID/GPS tracking information for emergency service. By enforcing the requirements of necessary keys among the patient and service providers, the patients ECG data can be protected and effectively controlled over the open medical directory service. Consequently, the proposed architecture for ubiquitous RFID healthcare system using the smart card terminal is appropriate to build up medical privacy policies in future ubiquitous sensor networking and home networking environments. In addition, we have analyzed an economic value-chain model based on the proposed architecture consisting of RFID, GPS, PDA, ECG sensor, and smart card systems in large-scale wireless sensor networks and have also analyzed two market derivers – customer demands and technology – in the proposed service architecture using the value-chain model. Finally, policy modeling for privacy and security protection for customers, service providers, and regulatory agency is considered to promote beneficial utilization of the collected healthcare data and derived new business of healthcare applications.
color imaging conference | 2002
Won Jay Song; Sun Jin Kim; Byung Ha Ahn; Mun Kee Choi
This paper has proposed the distributed power control (PC) algorithms that employ two evolutionary computation (EC) or genetic algorithm (GA) techniques in order to solve linear systems of equations for power update in CDMA cellular radio systems. The proposed algorithms are modeled on applying evolutionary computation algorithms with the phenotypic and genotypic views to the CDMA power control problem. The major gain from the applied evolutionary computation algorithms is more rapid optimization on linear systems of equations compared with the simple genetic algorithm (SGA). Employing the distributed constrained power control (DCPC) and bang-bang (BB) algorithms as the basic reference algorithms, we have designed and implemented computational experiments on the DS-CDMA system. The proposed EC-DCPC phenotypic algorithm is compared with the DCPC algorithm. The GA-DCPC genotypic algorithm is also compared with the BB algorithm used in the IS-95 and the W-CDMA systems. The simulation results indicate that the proposed EC-DCPC phenotypic and GA-DCPC genotypic algorithms significantly decrease the mobile terminal power consumption compared with the DCPC and BB algorithms, respectively. The calculation results show that our proposed EC-DCPC phenotypic and GA-DCPC genotypic algorithms also have a high potential advantage for increasing the CDMA cellular radio network capacity.
mexican international conference on artificial intelligence | 2006
Sun Jin Kim; Mun Kee Choi
In this paper, we simultaneously address the route selection and rate allocation problem in multirate multicast networks. We propose the evolutionary computation algorithm based on a genetic algorithm for this problem and elaborate upon many of the elements in order to improve solution quality and computational efficiency in applying the proposed methods to the problem. These include: the genetic representation, evaluation function, genetic operators and procedure. Additionally, a new method using an artificial intelligent search technique, called the coevolutionary algorithm, is proposed to achieve better solutions. The results of extensive computational simulations show that the proposed algorithms provide high quality solutions and outperform existing approach.
ip operations and management | 2005
Sang Ki Kim; Mun Kee Choi
In order to manage congestion problems and allocate network resources, many researchers have studied Internet pricing over the last decade. However, much of their research results have been limited by their reliance on the over-simplified demand model, and are not intended for adaptation to emerging multiple class environments such as the Diffserv network. For example, user utility is generally represented by a logarithmic form that is related to unit elasticity demand, but is not effective in representing user demand in the real Internet service market. We extend a dynamic pricing scheme by generalizing a demand model and applying it to the multi-class Diffserv network; and develop a simulation framework to compare the engineering and economic performance of our dynamic pricing model to those of static pricing.
Lecture Notes in Computer Science | 2006
Won Jay Song; Im Sook Ha; Mun Kee Choi
ITC-CSCC :International Technical Conference on Circuits Systems, Computers and Communications | 2006
Sae Sol Choi; Won Jay Song; Mun Kee Choi