Tai-hoon Kim
Ewha Womans University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Tai-hoon Kim.
international conference on conceptual structures | 2007
Jae-Dong Shin; Sang-Soo Yeo; Tai-hoon Kim; Sung Kwon Kim
RFID, Radio Frequency Identification, technology is a contactless automatic identification technology about which a lot of researches and developments are recently progressing. For this RFID technology to be widely spread, the problem of multiple tag identification, which a reader identifies a multiple number of tags in a very short time, has to be solved. So far, several anti-collision algorithms are developed. And those can be largely divided into ALOHA based algorithm and tree based algorithm. In this paper, two new anti-collision algorithms combining the characteristics of these two categories are presented. And the performances of the two algorithms are simulated.
Archive | 2012
Tai-hoon Kim; Adrian Stoica; Wai-chi Fang; Thanos Vasilakos; Javier Garcia Villalba; Kirk P. Arnett; Muhammad Khurram Khan; Byeong Ho Kang
This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology, and control and automation, and circuits, control, communication, electricity, electronics, energy, system, signal and simulation.
Archive | 2012
Tai-hoon Kim; Carlos Ramos; Haeng-Kon Kim; Akingbehin Kiumi; Sabah Mohammed; Dominik Ślęzak
This book comprises the refereed proceedings of the International Conferences, ASEA and DRBC 2012, held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of advanced software engineering and its applications, and disaster recovery and business continuity.
Archive | 2012
Tai-hoon Kim; Jeong-Jin Kang; William I. Grosky; Tughrul Arslan; Niki Pissinou
This volume constitutes the refereed proceedings of the International Conferences, BSBT, MulGraB and IUrC 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Gangneung, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of multimedia, computer graphics and broadcasting, bio-science and bio-technology, and intelligent urban computing.
Archive | 2012
Tai-hoon Kim; Dae-sik Ko; Thanos Vasilakos; Adrian Stoica; Jemal H. Abawajy
This volume constitutes the refereed proceedings of the International Conferences, FGCN and DCA 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Kangwondo, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of future generation communication and networking, and digital contents and applications.
Archive | 2012
Tai-hoon Kim; Jianhua Ma; Wai-chi Fang; Yanchun Zhang; Alfredo Cuzzocrea
This volume constitutes the refereed proceedings of the International Conferences, EL, DTA and UNESST 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Kangwondo, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of education and learning, database theory and application and u- and e-service, science and technology.
Archive | 2012
Tai-hoon Kim; Sabah Mohammed; Carlos Ramos; Jemal H. Abawajy; Byeong Ho Kang; Dominik Slezak
This book comprises the refereed proceedings of the International Conferences, MAS and ASNT 2012, held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of modeling and simulation, and automotive science and technology.This book comprises the refereed proceedings of the International Conferences, SIP, WSE, and ICHCI 2012, held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of signal processing, image processing, and pattern recognition, and Web science and engineering, and human computer interaction.
international symposium on neural networks | 2007
Minseong Ju; Seoksoo Kim; Tai-hoon Kim
Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a technique which supports copyright protection to track redistributors of electronic information using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before re-contributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the average linear collusion attack, and the Hopfield neural network using (n,k) code designing for the error bits correction confirmed that can correct error within 2bits.
Archive | 2012
Hyun-Seob Cho; Tai-hoon Kim; Sabah Mohammed; Hojjat Adeli; Myoung-Kwan Oh; Keun-Wang Lee
This paper reviews the trends of income inequality in Korea from 2000 to 2011. The income inequality in Korea has increased consistently until 2009, and somewhat decreased in 2010. There are reasons to believe that this decrease is more likely to be temporary rather than structural. The decrease in income inequality in 2010 is due to expanded social welfare benefits, such as transfer income to the poor. In order to improve overall economic status and reduce income inequality, policy efforts should be exerted to create more stable employment opportunities with better compensation. Also called for is more active policy intervention to increase the transfer payment. The nature of tax policy is also important. Despite the government’s claim that the recent tax cuts are not for the rich, to the extent that the tax cuts are implemented in favor of the rich, the income inequality will continue to persist.
international conference on knowledge based and intelligent information and engineering systems | 2006
Tai-hoon Kim
A PP (protection profile) defines an implementation-independent set of security requirements for a category of Target of Evaluations. Consumers or owners can therefore construct or cite a PP to express their security needs without reference to any specific IT products. Generally, PP contains security assurance requirements about the security of development environment for IT product or system and PP can applied to ubiquitous software development site. This paper proposes some security environments for ubiquitous software development site by analyzing the ALC_DVS.1 of the ISO/IEC 15408 and Base Practices (BPs) of the ISO/IEC 21827.