Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tai-hoon Kim is active.

Publication


Featured researches published by Tai-hoon Kim.


international conference on conceptual structures | 2007

Hybrid Tag Anti-collision Algorithms in RFID Systems

Jae-Dong Shin; Sang-Soo Yeo; Tai-hoon Kim; Sung Kwon Kim

RFID, Radio Frequency Identification, technology is a contactless automatic identification technology about which a lot of researches and developments are recently progressing. For this RFID technology to be widely spread, the problem of multiple tag identification, which a reader identifies a multiple number of tags in a very short time, has to be solved. So far, several anti-collision algorithms are developed. And those can be largely divided into ALOHA based algorithm and tree based algorithm. In this paper, two new anti-collision algorithms combining the characteristics of these two categories are presented. And the performances of the two algorithms are simulated.


Archive | 2012

Computer Applications for Security, Control and System Engineering

Tai-hoon Kim; Adrian Stoica; Wai-chi Fang; Thanos Vasilakos; Javier Garcia Villalba; Kirk P. Arnett; Muhammad Khurram Khan; Byeong Ho Kang

This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology, and control and automation, and circuits, control, communication, electricity, electronics, energy, system, signal and simulation.


Archive | 2012

Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity

Tai-hoon Kim; Carlos Ramos; Haeng-Kon Kim; Akingbehin Kiumi; Sabah Mohammed; Dominik Ślęzak

This book comprises the refereed proceedings of the International Conferences, ASEA and DRBC 2012, held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of advanced software engineering and its applications, and disaster recovery and business continuity.


Archive | 2012

Computer Applications for Bio-technology, Multimedia, and Ubiquitous City

Tai-hoon Kim; Jeong-Jin Kang; William I. Grosky; Tughrul Arslan; Niki Pissinou

This volume constitutes the refereed proceedings of the International Conferences, BSBT, MulGraB and IUrC 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Gangneung, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of multimedia, computer graphics and broadcasting, bio-science and bio-technology, and intelligent urban computing.


Archive | 2012

Computer applications for communication, networking, and digital contents

Tai-hoon Kim; Dae-sik Ko; Thanos Vasilakos; Adrian Stoica; Jemal H. Abawajy

This volume constitutes the refereed proceedings of the International Conferences, FGCN and DCA 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Kangwondo, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of future generation communication and networking, and digital contents and applications.


Archive | 2012

Computer Applications for Database, Education, and Ubiquitous Computing

Tai-hoon Kim; Jianhua Ma; Wai-chi Fang; Yanchun Zhang; Alfredo Cuzzocrea

This volume constitutes the refereed proceedings of the International Conferences, EL, DTA and UNESST 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Kangwondo, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of education and learning, database theory and application and u- and e-service, science and technology.


Archive | 2012

Computer applications for modeling, simulation, and automobile : International Conferences, MAS and ASNT 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings

Tai-hoon Kim; Sabah Mohammed; Carlos Ramos; Jemal H. Abawajy; Byeong Ho Kang; Dominik Slezak

This book comprises the refereed proceedings of the International Conferences, MAS and ASNT 2012, held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of modeling and simulation, and automotive science and technology.This book comprises the refereed proceedings of the International Conferences, SIP, WSE, and ICHCI 2012, held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of signal processing, image processing, and pattern recognition, and Web science and engineering, and human computer interaction.


international symposium on neural networks | 2007

A Study on Digital Media Security by Hopfield Neural Network

Minseong Ju; Seoksoo Kim; Tai-hoon Kim

Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a technique which supports copyright protection to track redistributors of electronic information using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before re-contributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the average linear collusion attack, and the Hopfield neural network using (n,k) code designing for the error bits correction confirmed that can correct error within 2bits.


Archive | 2012

Green and Smart Technology with Sensor Applications

Hyun-Seob Cho; Tai-hoon Kim; Sabah Mohammed; Hojjat Adeli; Myoung-Kwan Oh; Keun-Wang Lee

This paper reviews the trends of income inequality in Korea from 2000 to 2011. The income inequality in Korea has increased consistently until 2009, and somewhat decreased in 2010. There are reasons to believe that this decrease is more likely to be temporary rather than structural. The decrease in income inequality in 2010 is due to expanded social welfare benefits, such as transfer income to the poor. In order to improve overall economic status and reduce income inequality, policy efforts should be exerted to create more stable employment opportunities with better compensation. Also called for is more active policy intervention to increase the transfer payment. The nature of tax policy is also important. Despite the government’s claim that the recent tax cuts are not for the rich, to the extent that the tax cuts are implemented in favor of the rich, the income inequality will continue to persist.


international conference on knowledge based and intelligent information and engineering systems | 2006

Security requirements for ubiquitous software development site

Tai-hoon Kim

A PP (protection profile) defines an implementation-independent set of security requirements for a category of Target of Evaluations. Consumers or owners can therefore construct or cite a PP to express their security needs without reference to any specific IT products. Generally, PP contains security assurance requirements about the security of development environment for IT product or system and PP can applied to ubiquitous software development site. This paper proposes some security environments for ubiquitous software development site by analyzing the ALC_DVS.1 of the ISO/IEC 15408 and Base Practices (BPs) of the ISO/IEC 21827.

Collaboration


Dive into the Tai-hoon Kim's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wai-chi Fang

National Chiao Tung University

View shared research outputs
Researchain Logo
Decentralizing Knowledge