http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Topological Map Building and Exploration Based on Concave Nodes
Howon Cheong,Soonyong Park,Sung-Kee Park 제어로봇시스템학회 2008 제어로봇시스템학회 국제학술대회 논문집 Vol.2008 No.10
This paper addresses the problem of topological mapping and exploration of unknown environments for mobile robot. The topological map is constructed by defining the spatial relationship between adjacent nodes and each node that has geometric information about its circumference. A laser range finder is used as the major sensing modality to collect the geometric data. The node point is extracted from the data in two stages: image-based skeletonization and node point decision. The geometric data are transformed into a skeleton image and the node point is determined among the branch points in the image. We adopt an image processing method to skeletonize the geometric data. The key problem of the topological exploration is to determine the target node among the current node’s neighboring nodes. We also propose an efficient target node decision algorithm based on a concept of concave node. An experiment shows that our approach can explore indoor environments more efficiently.
Park, Taehwan,Seo, Hwajeong,Kim, Junsub,Park, Haeryong,Kim, Howon Hindawi Limited 2018 Security and communication networks Vol.2018 No.-
<P>Recently, various types of postquantum cryptography algorithms have been proposed for the National Institute of Standards and Technology’s Postquantum Cryptography Standardization competition. Lattice-based cryptography, which is based on Learning with Errors, is based on matrix multiplication. A large-size matrix multiplication requires a long execution time for key generation, encryption, and decryption. In this paper, we propose an efficient parallel implementation of matrix multiplication and vector addition with matrix transpose using ARM NEON instructions on ARM Cortex-A platforms. The proposed method achieves performance enhancements of 36.93%, 6.95%, 32.92%, and 7.66%. The optimized method is applied to the Lizard. CCA key generation step enhances the performance by 7.04%, 3.66%, 7.57%, and 9.32% over previous state-of-the-art implementations.</P>
스테레오 비전센서를 이용한 이동로봇의 물체인식 기반 자기위치 추정
정호원(Howon Cheong),박순용(Soonyong Park),박민용(Mignon Park),박성기(Sung-Kee Park) 대한전자공학회 2007 대한전자공학회 학술대회 Vol.2007 No.7
This paper presents a new object entity based global localization method with the stereo camera. The map we use here is a hybrid map of global topological map and local object location map. The localization process is divided into two stages coarse pose estimation and refined pose estimation. The coarse pose is computed by using the object recognition and point cloud fitting. And the refined pose is estimated with particle filtering algorithm.
박찬희(Chanhui Park),윤영여(Youngyeo Yun),박해룡(Haeryong Park),최은영(Eunyoung Choi),김호원(Howon Kim) 한국정보보호학회 2020 情報保護學會誌 Vol.30 No.3
기술의 발전으로 이론으로만 존재하던 양자 알고리즘의 실현 가능성이 보이면서 기존 암호체계의 위협이 발생할 것으로 예측하고 있다. 미국 국립표준기술연구소에서는 양자컴퓨터 환경에서도 안전한 새로운 공개키 기반의 암호체계가 필요하다는 것을 강조하였고 양자내성암호 표준을 위한 공모전을 개최하였다. 암호는 네트워크 통신에서 중요한 역할을 하고 있고 네트워크 보안 프로토콜로 TLS가 많이 사용된다. 본 논문에서는 IoT와 같은 경량 환경에 적합한 TLS 라이브러리인 mbedTLS 상에서의 격자기반 양자내성 키 교환 알고리즘을 구현하고 성능을 평가하여 양자내성암호의 사용 가능성에 대해 제시한다.
Jang, Kuewhan,Park, Chanho,You, Juneseok,Choi, Jaeyeong,Park, Hyunjun,Park, Jinsung,Lee, Howon,Choi, Chang-Hwan,Na, Sungsoo IOP 2016 Nanotechnology Vol.27 No.47
<P>For several decades, silver nanomaterials (AgNMs) have been used in?various research areas?and commercial products. Among the?many AgNMs, silver nanowires (AgNWs) are one of the mostly?widely used nanomaterials due to their?high electrical and thermal conductivity. However, recent studies have investigated the toxicity of AgNWs. For this reason, it is necessary to develop a successful detection method of AgNWs for protecting human health. In this study, label-free, highly sensitive, direct, and real-time detection of AgNWs is performed for the first time. The detection mechanism is based on the resonance frequency shift upon the mass change from the hybridization between the probe DNA on the electrode and the linker DNA attached on AgNWs. The frequency shift is measured by using a quartz crystal microbalance. We are able to detect 1 ng ml<SUP>−1</SUP> of AgNWs in deionized water in real-time. Moreover, our detection method can selectively detect AgNWs among other types of one-dimensional nanomaterials and can also be applied to detection in drinking water.</P>
박성수(Seongsoo Park),이문규(Mun-Kyu Lee),김동규(Dong Kyue Kim),박근수(Kunsoo Park),김호원(Howon Kim),정교일(Kyoil Chung) 한국정보과학회 2005 한국정보과학회 학술발표논문집 Vol.32 No.2
최근 국제물류에서 화물 컨테이너의 운송을 보다 안전하고 효율적으로 관리하기 위하여 수출입절차 규제가 강화되고, 도난, 밀매, 테러 등의 범죄를 예방하기 위한 새로운 정책과 기술이 도입되고 있다. 특히, 빠르게 실용화가 진행되고 있는, RFID 기술을 사용한 무선인식 전자봉인(e-seal)은 기존의 기계적 봉인장치를 대체함으로써 컨테이너 운송의 안전성을 보장하고, 선적 및 하선 절차의 효율을 높인다. 수년간 e-seal의 ISO 국제표준화가 진행되어 왔으며, 최근 e-seal의 데이터 보호에 대한 표준화가 진행 중이다. 본 논문에서는 e-seal의 실질적인 사용 환경과 기존의 명령어 표준규격을 고려하여 안전한 e-seal을 위한 새로운 명령어들을 설계하고, EAP를 응용하여 e-seal과 리더기간의 상호 인증 프로토콜을 제시한다. 그리고 이를 다시 효율적으로 개선하여 e-seal에 적합한 상호 인증 프로토콜을 제시한다.
Jang, Kuewhan,You, Juneseok,Park, Chanhoo,Park, Hyunjun,Choi, Jaeyeong,Choi, Chang-Hwan,Park, Jinsung,Lee, Howon,Na, Sungsoo IOP 2016 Nanotechnology Vol.27 No.36
<P>Recent advancements of nanomaterials have inspired numerous scientific and industrial applications. Zinc oxide nanowires (ZnO NWs) is one of the most important nanomaterials due to their extraordinary properties. However, studies performed over the past decade have reported toxicity of ZnO NWs. Therefore, there has been increasing demand for effective detection of ZnO NWs. In this study, we propose a method for the detection of ZnO NW using a quartz crystal microbalance (QCM) and DNA probes. The detection method is based on the covalent interaction between ZnO NWs and the phosphoric acid group of single-stranded DNA (i.e., linker DNA), and DNA hybridization between the linker DNA and the probe DNA strand on the QCM electrode. Rapid, high sensitivity, <I>in situ</I> detection of ZnO NWs was demonstrated for the first time. The limit of detection was 10<SUP>−4</SUP> <I>μ</I>g ml<SUP>−1</SUP> in deionized water, which represents a sensitivity that is 100000 times higher than the toxic ZnO NW concentration level. Moreover, the selectivity of the ZnO NW detection method was demonstrated by comparison with other types of nanowires and the method was able to detect ZnO NWs in tap water sensitively even after stored for 14 d in a refrigerator. The performance of our proposed method was sufficient to achieve detection of ZnO NW in the ‘real-world’ environment.</P>
Secure Data Encryption for Cloud-Based Human Care Services
Park, Taehwan,Seo, Hwajeong,Lee, Sokjoon,Kim, Howon Hindawi Limited 2018 Journal of sensors Vol.2018 No.-
<P>Sensor network services utilize sensor data from low-end IoT devices of the types widely deployed over long distances. After the collection of sensor data, the data is delivered to the cloud server, which processes it to extract useful information. Given that the data may contain sensitive and private information, it should be encrypted and exchanged through the network to ensure integrity and confidentiality. Under these circumstances, a cloud server should provide high-speed data encryption without a loss of availability. In this paper, we propose efficient parallel implementations of Simeck family block ciphers on modern 64-bit Intel processors. In order to accelerate the performance, an adaptive encryption technique is also exploited for load balancing of the resulting big data. Finally, the proposed implementations achieved 3.5 cycles/byte and 4.6 cycles/byte for Simeck32/64 and Simeck64/128 encryption, respectively.</P>
Efficient Implementation of Simeck Family Block Cipher on 8-Bit Processor
Park, Taehwan,Seo, Hwajeong,Bae, Bongjin,Kim, Howon The Korea Institute of Information and Commucation 2016 Journal of information and communication convergen Vol.14 No.3
A lot of Internet of Things devices has resource-restricted environment, so it is difficult to implement the existing block ciphers such as AES, PRESENT. By this reason, there are lightweight block ciphers, such as SIMON, SPECK, and Simeck, support various block/key sizes. These lightweight block ciphers can support the security on the IoT devices. In this paper, we propose efficient implementation methods and performance results for the Simeck family block cipher proposed in CHES 2015 on an 8-bit ATmega128-based STK600 board. The proposed methods can be adapted in the 8-bit microprocessor environment such as Arduino series which are one of famous devices for IoT application. The optimized on-the-fly (OTF) speed is on average 14.42 times faster and the optimized OTF memory is 1.53 times smaller than those obtained in the previous research. The speed-optimized encryption and the memory-optimized encryption are on average 12.98 times faster and 1.3 times smaller than those obtained in the previous studies, respectively.
Secure Message Transmission against Remote Control System
Park, Taehwan,Seo, Hwajeong,Bae, Bongjin,Kim, Howon The Korea Institute of Information and Commucation 2016 Journal of information and communication convergen Vol.14 No.4
A remote control system (RCS) can monitor a user's confidential information by using the broadcast receivers in Android OS. However, the current RCS detection methods are based only on a virus vaccine. Therefore, if the user's smartphone is infected by a brand new RCS, these methods cannot detect this new RCS immediately. In this paper, we present a secure message transmission medium. This medium is completely isolated from networks and can communicate securely through a QR code channel by using symmetric key cryptography such as the AES block cipher and public key cryptography such as elliptic curve cryptography for providing security. Therefore, the RCS cannot detect any confidential information. This approach is completely immune to any RCS attacks. Furthermore, we present a secure QR code-based key exchange protocol by using the elliptic curve Diffie-Hellman method and message transmission protocols; the proposed protocol has high usability and is very secure.