http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Grid based Enhanced Routing Scheme in MANET
( Kyoungsoo Bok ),( Sooyong Yoon ),( Jongtae Lim ),( Jaesoo Yoo ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.5
In this paper, we propose a hybrid routing scheme that utilizes location information to support reliable data transmission in mobile ad hoc networks. The proposed scheme determines and maintains routing path by considering the directionality and connectivity of nodes using grid zones and information on neighbor nodes. In addition, it generates alternative paths with consideration for node distance and reliability. To show the superiority of the proposed routing scheme, a performance evaluation was conducted using simulations. The performance evaluation results show that the proposed scheme offers faster and more reliable data transmission than the existing routing schemes, and the number of messages decreases by approximately 31% compared to the existing schemes on average.
User Reputation computation Method Based on Implicit Ratings on Social Media
( Kyoungsoo Bok ),( Jinkyung Yun ),( Yeonwoo Kim ),( Jongtae Lim ),( Jaesoo Yoo ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.3
Social network services have recently changed from environments for simply building connections among users to open platforms for generating and sharing various forms of information. Existing user reputation computation methods are inadequate for determining the trust in users on social media where explicit ratings are rare, because they determine the trust in users based on user profile, explicit relations, and explicit ratings. To solve this limitation of previous research, we propose a user reputation computation method suitable for the social media environment by incorporating implicit as well as explicit ratings. Reliable user reputation is estimated by identifying malicious information raters, modifying explicit ratings, and applying them to user reputation scores. The proposed method incorporates implicit ratings into user reputation estimation by differentiating positive and negative implicit ratings. Moreover, the method generates user reputation scores for individual categories to determine a given user`s expertise, and incorporates the number of users who participated in rating to determine a given user`s influence. This allows reputation scores to be generated also for users who have received no explicit ratings, and, thereby, is more suitable for social media. In addition, based on the user reputation scores, malicious information providers can be identified.
RFID Based Indoor Positioning System Using Event Filtering
Kyoungsoo Bok,Jaesoo Yoo 대한전기학회 2017 Journal of Electrical Engineering & Technology Vol.12 No.1
Recently, location systems using RFID technology have been studied in indoor environments. However, the existing techniques require high computational cost to compute the location of a moving object because they compare the location proximity of all reference tags and objects. In this paper, we propose an RFID based location positioning scheme using event filtering, which reduces the computation cost of calculating the locations of moving objects while maintaining the accuracy of location estimation. In addition, we propose an incremental location update policy to reduce the location update cost for moving objects. We also compare the proposed scheme with one of the localization schemes, LANDMARC using a performance evaluation. As a result, the proposed scheme outperforms LANDMARC in terms of the computational cost of location estimation. The proposed scheme also reduces the cost of location update by using the RFID-based update policy.
An Energy-Efficient Secure Scheme in Wireless Sensor Networks
Bok, Kyoungsoo,Lee, Yunjeong,Park, Junho,Yoo, Jaesoo Hindawi Limited 2016 Journal of sensors Vol.2016 No.-
<P>We propose an energy-efficient security scheme in wireless sensor networks. The proposed scheme converts sensing data using TinyMD5, which is a variation of MD5, a one-way hash function, and can solve the collision problem of hash value that occurs when MD5 is modified. In addition, it strengthens security capabilities by transmitting data through multiple paths after conversion with TinyMD5 and divides the data to make decryption of the original data difficult. To show the superiority of the proposed algorithm, we compare it with the existing schemes through simulations. The performance evaluation results show that the proposed scheme maintains security better than the existing scheme, improving the communication cost and the network lifetime.</P>
A Friend Recommendation Scheme in Social Network Environments
Bok, Kyoungsoo,Jeon, Hyeonwook,Lee, Chunghui,Yoo, Jaesoo The Korea Contents Association 2016 International Journal of Contents Vol.12 No.2
In this paper, we propose a friend recommendation scheme that takes into consideration the attribute information of a POI and a user's movement patterns. The proposed scheme broadly consists of a part that filters out other users who have different preferences by calculating preferences using the attribute information of users and a part that finds a moving trajectory close to that of a user with a pattern-matching scheme. To verify the superiority of the proposed scheme, we compare it with existing schemes through various performance evaluations.