Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Seung S. Yang is active.

Publication


Featured researches published by Seung S. Yang.


Journal of Networks | 2008

Vehicle Identification using Discrete Spectrums in Wireless Sensor Networks

Seung S. Yang; Yoon G. Kim; Hongsik Choi

We studied the possibility of using wireless sensor networks for vehicle identification in a large open field. This is exciting research in that it not only presents a challenge but has practicality. The challenge here is to develop algorithms and/or protocols for sensor nodes to execute a given task. Since each sensor node has limited computation and communication capabilities, these limitations prohibit the use of algorithms and/or protocols developed for conventional computers and networks. Each sensor is dispensable and easily deployable, it can do meaningful work when it is collaborated as a networked cluster; therefore it is very practical in application. Our goal is to identify vehicles in real time using acoustic signal sensors and wireless networks. Our contribution in this paper is three fold. First, we developed a simple vehicle sound identification algorithm enough to be implemented for capacity limited sensor nodes. Second, we proposed architecture and protocols of wireless sensor networks for vehicle identification using this developed sound classification algorithm. Third, we proposed a cooperation model among sensors to expedite the classification process. Our preliminary results show the proposed architecture and protocols are promising.


southeastcon | 2007

Vehicle identification using wireless sensor networks

Seung S. Yang; Yoon G. Kim; Hongsik Choi

We studied the possibility of using wireless sensor networks for vehicle identification. It is interesting because it is not only challenging but also practical. It is challenging to develop algorithms and/or protocols for sensor nodes to execute since each sensor node has limited computation and communication capabilities, and these limitations prohibit the use of algorithms and/or protocols developed for conventional computer and networks. It is practical since each sensor is dispensable and easily deployable, yet it can do meaningful works when it is collaborated as a networked cluster. Our goal is to identify vehicles in real time using acoustic signal sensors and wireless networks. Our contribution in this paper is two fold. First, we develop a simple vehicle sound identification algorithm enough to be implemented on capacity limited sensor nodes. Second, we propose architecture and protocols of wireless sensor networks for vehicle identification using this developed sound classification algorithm. Our preliminary results show the proposed architecture and protocols are promising.


Information Management & Computer Security | 2010

Vulnerability analysis and the practical implications of a server‐challenge‐based one‐time password system

Seung S. Yang; Hongsik Choi

Purpose – One‐time password systems provide great strengths over conventional password systems: protection against over‐the‐shoulder, eavesdropping, replay, etc. The Grid Data Security authentication system is a server‐challenge‐based system. It has advantages over other one‐time password systems since it does not require pre‐installed software nor special devices to carry on. However, there are some weaknesses. The purpose of this paper is to analyze the weaknesses of the one‐time password system and provide practical guidelines for using the one‐time password system.Design/methodology/approach – This paper statistically analyzes the weakness of the Grid Data Security authentication system and simulates attacks to the system to confirm the discovered weakness. The paper also suggests ways to reduce the discovered vulnerability using mathematical formula and offers practical guideline for using the system. It also identifies the systems strength on access authentication on mobile communication.Findings –...


Information Security Journal: A Global Perspective | 2010

Vulnerability Analysis of the Grid Data Security Authentication System

Seung S. Yang; Hongsik Choi; Hankyu Joo

ABSTRACT A password-based authentication is still the most prevalent authentication method because of its convenience and easy implementations. Since a password is transmitted via network, it has an inherent vulnerability of password exposure to an attacker. A one-time password system reduces the risk of a security breach even when a password is exposed to an attacker, because the password is only meaningful at a given time. A grid data security system uses a technology, GridOne™, which allows the use of a one-time password without requiring preinstalled hardware or software infrastructures, and it provides strong security over conventional password-based authentication systems. We analyzed the weakness of the grid data security authentication system and provide a suggestion to compensate for its vulnerability.


Network Security archive | 2009

GridOne: A complement to the GridOne authentication method

Seung S. Yang; Hongsik Choi

Authentication is the process of confirming that something claimed is true, and an authentication method is the way of proving the claim. As more and more people use networked computer systems in their everyday lives - for example, in online banking, email, and online shopping - the importance of authentication is increasing.


2008 IEEE International Workshop on Semantic Computing and Applications | 2008

A Study on the Methods to Establish Construction Project Information Metadata Using UN/CEFACT Standard

Seong Y. Jeong; Jin U. Kim; Seung S. Yang

Since the existing metadata define the structure of information using non-unified semantics, syntax, and representation methods, they set a limit in the search for exact information. To address this problem, metadata for construction project information that are frequently used in the construction industry were developed in this study, for the first time in Korea, by referring to the information standard development guidelines of UN/CEFACT. In addition, to establish reciprocal compatibility with the metadata which will be developed in the future, metadata development guidelines were formulated. The results of this study can be used in accurately expressing the semantic relationship between the essential meanings and their representations, such as RDF (resource description framework), in the establishment of an information system for the asset management of public facilities.


The 25th International Symposium on Automation and Robotics in Construction | 2008

A Study on the Development of Highway Facility Information Library System

Seong Y. Jeong; Jin U. Kim; Seung S. Yang


Archive | 2015

Teaching IT system track courses using train emulation kit

Hongsik Choi; Seung S. Yang


Archive | 2015

High-performance Empirical Learning platform with Inexpensive Off-the-shelf Systems (HELIOS)

Seung S. Yang; Hongsik Choi


Society for Information Technology & Teacher Education International Conference | 2010

Games, Sims and Virtual Worlds in K-20 STEM education

Youwen Ouyang; Seung S. Yang; Theresa Franklin; Karen Michaelson; Shelby P. Morge; Ehsan Sheybani; Katherine Hayden; Sridhar Narayan; Gene Tagliarini; Manorama Talaiver

Collaboration


Dive into the Seung S. Yang's collaboration.

Top Co-Authors

Avatar

Hongsik Choi

Virginia Commonwealth University

View shared research outputs
Top Co-Authors

Avatar

Ehsan Sheybani

University of Southern Mississippi

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yoon G. Kim

Virginia State University

View shared research outputs
Top Co-Authors

Avatar

Gene Tagliarini

University of North Carolina at Wilmington

View shared research outputs
Top Co-Authors

Avatar

Giti Javidi

Virginia State University

View shared research outputs
Top Co-Authors

Avatar

Hankyu Joo

Virginia Commonwealth University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Katherine Hayden

California State University San Marcos

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge