http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
안드로이드 모바일 디바이스를 위한 Web-DAV 기반 가상 저장 시스템
임현수(Hyunsu Lim),임효택(Hyotaek Lim) 한국컴퓨터정보학회 2012 한국컴퓨터정보학회 학술발표논문집 Vol.20 No.2
스마트 모바일 장치는 HD 디지털 컨텐츠가 창조될 수 있도록 했고, 사용자가 어디있든간에 그것을 접하는 것이 가능할 수 있도록 하였다. 그러나 스마트 모바일 장치는 저장공간의 제약과 같은 필연적인 하드웨어 제약이 있다. 이 논문에서 우리는 사용자들이 그들의 집에있는 데이터에 매끄럽게 접근할 수 있는 이해하기 쉬운 WebDAV 기반 가상 저장 시스템(DAVSS)을 제안한다. 우리가 구현한 프로토타입 결과물은 저장공간이 한정된 장치에 제안된 해결책(DAVSS)이 실현가능함을 보여준다.
An Analysis of Security System for Intrusion in Smartphone Environment
Louk, Maya,Lim, Hyotaek,Lee, HoonJae Hindawi Publishing Corporation 2014 The Scientific World Journal Vol.2014 No.-
<P>There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user.</P>
The Design of an Efficient Proxy-Based Framework for Mobile Cloud Computing
Zhang, Zhijun,Lim, HyoTaek,Lee, Hoon Jae The Korea Institute of Information and Commucation 2015 Journal of information and communication convergen Vol.13 No.1
The limited battery power in the mobile environment, lack of sufficient wireless bandwidth, limited resources of mobile terminals, and frequent breakdowns of the wireless network have become major hurdles in the development of mobile cloud computing (MCC). In order to solve the abovementioned problems, This paper propose a proxy-based MCC framework by adding a proxy server between mobile devices and cloud services to optimize the access to cloud services by mobile devices on the network transmission, application support, and service mode levels. Finally, we verify the effectiveness of the developed framework through an experimental analysis. This framework can ensure that mobile users have efficient access to cloud services.
An Internet Based Data Storage Protocol for ATA devices
( Kulveer Singh ),( Hyotaek Lim ) 한국정보처리학회 2007 한국정보처리학회 학술대회논문집 Vol.14 No.1
This paper introduces a data storage transport protocol internet Advanced Technology Attachment (iATA) for ATA storage devices that can be accessed over (TCP/IP) networks. As the access speed of Advanced Technology Attachment (ATA) type storage is increasing, the importance of sharing the ATA type storages over internet is also increasing. We are proposing a protocol in which we have implemented the basic ATA command set to access the ATA type remote storage devices over the TCP/IP networks .In this paper, we give basic details of the protocol and discuss the existing storage protocols which are mainly used for accessing block storage like internet Small Computer System Interface (iSCSI) Hyper Small Computer System Interface (HyperSCSI) and ATA over Ethernet (AoE).
A Margin-based Face Liveness Detection with Behavioral Confirmation
Tolendiyev, Gabit,Lim, Hyotaek,Lee, Byung-Gook The Institute of Internet 2021 International Journal of Internet, Broadcasting an Vol.13 No.2
This paper presents a margin-based face liveness detection method with behavioral confirmation to prevent spoofing attacks using deep learning techniques. The proposed method provides a possibility to prevent biometric person authentication systems from replay and printed spoofing attacks. For this work, a set of real face images and fake face images was collected and a face liveness detection model is trained on the constructed dataset. Traditional face liveness detection methods exploit the face image covering only the face regions of the human head image. However, outside of this region of interest (ROI) might include useful features such as phone edges and fingers. The proposed face liveness detection method was experimentally tested on the author's own dataset. Collected databases are trained and experimental results show that the trained model distinguishes real face images and fake images correctly.
Voice Biometric Security on Multi Cloud Storage Using Deep Belief Network
Christofer Theodore,Hyotaek Lim 한국정보통신학회 2017 2016 INTERNATIONAL CONFERENCE Vol.9 No.1
Access Control is one of the most serious security factors in Cloud Computing. Leakage of one’s access control can lead attacker to be able to do anything with that access. Many research work has been done to improve the security in the access control. They add more security model such as token, biometric, phone number in addition to old username and password. However, to the best of our knowledge, there is still an improvement that can be done to improve the security, especially in biometric security. In this paper, we propose a solution that improves the voice biometric security method in addition to data splitting method from our previous work.