103 results on '"Keun-Woo Lim"'
Search Results
2. Multi-hop Data Fragmentation in Energy Harvesting Wireless Sensor Networks.
- Author
-
Keun Woo Lim, Katarzyna Kapusta, Gérard Memmi, and Woo-Sung Jung
- Published
- 2020
- Full Text
- View/download PDF
3. Locate UWB Smart Keys: Smart and Faster.
- Author
-
Jiwoong Park, Hong-Beom Choi, Young-Bae Ko, and Keun-Woo Lim
- Published
- 2021
- Full Text
- View/download PDF
4. Energy-Aware Distribution of Data Fragments in Unattended Wireless Sensor Networks.
- Author
-
Hong-Beom Choi, Young-Bae Ko, and Keun-Woo Lim
- Published
- 2018
- Full Text
- View/download PDF
5. Reliable Mutual Node Evaluation for Trust-Based OLSR in Tactical MANETs.
- Author
-
Ji-Hun Lim, Keun Woo Lim, and Young-Bae Ko
- Published
- 2017
- Full Text
- View/download PDF
6. Sensor Localization System for AR-assisted Disaster Relief Applications.
- Author
-
Hong-Beom Choi, Keun-Woo Lim, and Young-Bae Ko
- Published
- 2019
- Full Text
- View/download PDF
7. Poster: adaptive flow control for wireless serial bus using wi-fi transmission opportunity.
- Author
-
Woo Sung Jung, Keun Woo Lim, and Young-Bae Ko
- Published
- 2014
- Full Text
- View/download PDF
8. On the interplay between clustering and power control in multihop wireless networks.
- Author
-
Zeeshan Hameed Mir, Keun Woo Lim, and Young-Bae Ko
- Published
- 2014
- Full Text
- View/download PDF
9. Improve your USB experience with Wi-Fi through dynamic QoS adaptation.
- Author
-
Woo Sung Jung, Keun Woo Lim, and Young-Bae Ko
- Published
- 2015
- Full Text
- View/download PDF
10. Enhanced power management for Wi-Fi Direct.
- Author
-
Keun Woo Lim, Woo Sung Jung, Hanna Kim, Jina Han, and Young-Bae Ko
- Published
- 2013
- Full Text
- View/download PDF
11. A practical approach for channel problem detection and adaptation in tactical radio systems.
- Author
-
Woo Sung Jung, Keun Woo Lim, Young-Bae Ko, Yooseung Song, and Sangjoon Park
- Published
- 2011
- Full Text
- View/download PDF
12. Efficient Cluster Head Election in Surveillance Reconnaissance Sensor Network.
- Author
-
Young Bag Moon, Naesoo Kim, Cheol Sig Pyo, Keun Woo Lim, Ji Sun Jung, and Young-Bae Ko
- Published
- 2010
13. A Hybrid Approach for Clustering-Based Data Aggregation in Wireless Sensor Networks.
- Author
-
Woo Sung Jung, Keun Woo Lim, Young-Bae Ko, and Sangjoon Park
- Published
- 2009
- Full Text
- View/download PDF
14. Multi-Hop Data Dissemination with Replicas in Vehicular Sensor Networks.
- Author
-
Keun Woo Lim, Woo Sung Jung, and Young-Bae Ko
- Published
- 2008
- Full Text
- View/download PDF
15. Contention mitigated EDCA algorithm for reliable smart grid mesh networks.
- Author
-
Jaebeom Kim, Keun Woo Lim, and Young-Bae Ko
- Published
- 2012
- Full Text
- View/download PDF
16. Adaptive wireless mesh networks architecture based on IEEE 802.11s for public surveillance.
- Author
-
Youn Seo, Keun Woo Lim, Young-Bae Ko, Yooseung Song, and Sangjoon Park
- Published
- 2012
- Full Text
- View/download PDF
17. Congestion-aware multi-gateway routing for wireless mesh video surveillance networks.
- Author
-
Keun Woo Lim, Young-Bae Ko, Sung-Hee Lee, and Sangjoon Park
- Published
- 2011
- Full Text
- View/download PDF
18. Luvi: Lightweight Uwb-Vio Based Relative Positioning for Ar-Iot Applications
- Author
-
Hong-Beom Choi, Keun-Woo Lim, and Young-Bae Ko
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Software - Published
- 2022
19. Mobile contents on the big screen: adaptive frame filtering for mobile device screen sharing.
- Author
-
Jisu Ha, Puleum Bae, Keun Woo Lim, JeongGil Ko, and Young-Bae Ko
- Published
- 2014
- Full Text
- View/download PDF
20. Tracking Loss Recovery for Relative UWB Tag Positioning in AR-IoT Applications
- Author
-
Ko, Young-Bae, Hong-Beom Choi, and Keun-Woo Lim
- Subjects
Computer science ,business.industry ,Real-time computing ,Augmented reality ,Tracking (particle physics) ,Internet of Things ,business - Published
- 2020
21. Locate UWB Smart Keys
- Author
-
Hong-Beom Choi, Keun-Woo Lim, Young-Bae Ko, and Jiwoong Park
- Subjects
Scheme (programming language) ,Computer science ,Computation ,Real-time computing ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Non-line-of-sight propagation ,0203 mechanical engineering ,Smart key ,Location-based service ,Channel impulse response ,0202 electrical engineering, electronic engineering, information engineering ,Transceiver ,computer ,computer.programming_language - Abstract
This poster proposes an Ultra-wideband localization scheme for the smart key system based on a machine learning approach. Previous studies try to use the channel impulse response measurement and apply machine learning to improve the localization accuracy. However, it was found difficult to perform real-time localization in the key fob hardware as these studies require complex computation. In addition, localization accuracy is severely degraded due to frequent NLOS conditions in vehicular environments. In order to solve these problems, we propose vehicular features based on machine learning approach to improve localization accuracy and to support the real-time operation. We evaluate the proposed scheme by deploying Decawave UWB transceivers on an actual vehicle. The proposed scheme showed more than 98% localization accuracy and an average prediction delay of 7.4 milliseconds.
- Published
- 2021
22. Distributed channel adaptation using instantaneous clusters in energy-constrained multi-hop wireless networks.
- Author
-
Keun Woo Lim, Woo-Sung Jung, and Young-Bae Ko
- Published
- 2011
- Full Text
- View/download PDF
23. Improved Virtual Anchor Selection for AR-assisted Sensor Positioning in Harsh Indoor Conditions
- Author
-
Young-Bae Ko, Keun-Woo Lim, and Hong-Beom Choi
- Subjects
0209 industrial biotechnology ,Computer science ,business.industry ,Real-time computing ,020206 networking & telecommunications ,02 engineering and technology ,020901 industrial engineering & automation ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Augmented reality ,Visual odometry ,business ,Mobile device ,Selection (genetic algorithm) - Abstract
In this work, we propose a sensor localization system assisted by wireless communication and augmented reality (AR) suitable for harsh indoor environments. Future handheld and unattended devices will be equipped with technologies, which have the means to enable localization of various phenomenon in indoor environments. These include visual odometry based on cameras and augmented reality, and communication hardware such as UWB. Integration of such technologies allows us to compensate for each other’s errors in measurements. However, existing work cannot fully exploit these technologies to high extent, often inducing more errors or wasted resources. Furthermore, many other existing indoor localization methods require a pre-defined architecture or building information, which are impossible to acquire in harsh indoor conditions. In our proposed system, we specifically propose an improved method of utilizing virtual anchors for localization of sensor tags in harsh indoor environments, based on a cluster-based selection algorithm that allows the system to improve the positioning accuracy through angular diversity while also improving resource utilization without existing knowledge of the location. Our work has been fully implemented and tested on several indoor environments.
- Published
- 2020
24. Multi-hop Data Fragmentation in Energy Harvesting Wireless Sensor Networks
- Author
-
Katarzyna Kapusta, Woo-Sung Jung, Keun-Woo Lim, and Gerard Memmi
- Subjects
business.industry ,Computer science ,Data management ,Distributed computing ,Sensor node ,Energy harvesting wireless sensor networks ,Provisioning ,business ,Wireless sensor network ,Efficient energy use ,Hop (networking) - Abstract
In this work, we utilize multi-hop data fragmentation in energy harvesting wireless sensor networks (EHWSN) for improved security and routing.1 Data fragmentation is a secure data management and data provisioning technique used in unattended sensor networks. However, it compromises energy efficiency for better protection, possibly decreasing the lifetime of a traditional sensor network. Instead, it has potentials to be used in EHWSN, which allows better energy utilization for each sensor node while security of sensed data remains an important factor. In our work, we consider how data fragmentation can be applied in EHWSN, and propose a multi-hop data fragmentation method suitable for EHWSN.
- Published
- 2020
25. Adaptive Frame Skipping With Screen Dynamics for Mobile Screen Sharing Applications
- Author
-
Keun-Woo Lim, Puleum Bae, Young-Bae Ko, JeongGil Ko, and Jisu Ha
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Frame (networking) ,Mobile computing ,020206 networking & telecommunications ,02 engineering and technology ,Video quality ,Computer Science Applications ,Control and Systems Engineering ,Embedded system ,Mobile station ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Mobile search ,020201 artificial intelligence & image processing ,Mobile telephony ,Electrical and Electronic Engineering ,business ,Mobile device ,Computer hardware ,Information Systems - Abstract
The improvement in hardware capabilities of mobile devices has led to the active use of processor-heavy contents, such as multimedia files, on resource-limited platforms. In addition to simply enjoying such contents on mobile devices, recently commercialized protocols allow the real-time sharing of multimedia (or a mobile device's screen contents) with neighboring devices via wireless connection. However, unlike PC-scale computing platforms, use-case expansions on mobile devices face an additional technical challenge. Specifically, while the improved computation power is capable of handling processor-hungry applications, battery limitations hold back their full utilization. This paper acknowledges the fact that screen sharing on mobile devices can be attractive, but empirically show that minimizing the energy consumption is crutial, and introduces enhancements to the widely used H.264 encoder on mobile devices. Specifically, our enhancements target to minimize the transmission size of multimedia contents by analyzing the screen's dynamics. For contents with high dynamics, our scheme tries to maintain the video quality, while aggressively skipping frames for regions with minimal motion intensity. Our empirical evaluations show that the proposed light-weight enhancements reduce the size of a typical multimedia file by $\sim \hbox{42}$ %, while maintaining a high user-perceived quality (e.g., Structural SIMilarity measure) of 0.925. Wirelessly sharing this video results in $\sim \hbox{31}$ % lower frame transmission rate and up to $\sim \hbox{21}$ % power savings in less dynamic regions.
- Published
- 2018
26. Practical implementation of M4 for web visualization service
- Author
-
Young-Bae Ko, Woo-Sung Jung, Keun-Woo Lim, Puleum Bae, HAL, TelecomParis, Réseaux, Mobilité et Services (RMS), Laboratoire Traitement et Communication de l'Information (LTCI), Institut Mines-Télécom [Paris] (IMT)-Télécom Paris-Institut Mines-Télécom [Paris] (IMT)-Télécom Paris, Département Informatique et Réseaux (INFRES), and Télécom ParisTech
- Subjects
Computer Networks and Communications ,Computer science ,Distributed computing ,Reliability (computer networking) ,Data management ,Big data ,02 engineering and technology ,computer.software_genre ,[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,[INFO.INFO-MC]Computer Science [cs]/Mobile Computing ,[INFO.INFO-MC] Computer Science [cs]/Mobile Computing ,M4 ,020204 information systems ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Data processing ,[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,business.industry ,[INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing ,020207 software engineering ,Data aggregation ,[INFO.INFO-ES] Computer Science [cs]/Embedded Systems ,Visualization ,Data aggregator ,Graph (abstract data type) ,[INFO.INFO-ES]Computer Science [cs]/Embedded Systems ,Data mining ,time series ,business ,computer ,web visualization ,Information Systems - Abstract
Vast volumes of time series are becoming more common in part to recent research advancements in big data analytics and sensor/monitoring networks. However, tranmission of time series for visualization services can cause serious bandwidth wastage and extensive network delays if there is no efficient data management. Existing work such as M4 aim to solve this problem by providing high data reduction rates through data aggregation and guaranteeing the reliability of visualization results at the same time. However, current work on M4 does not consider verification in a more practical environment; for example experimentation on web-based servers that are openly accessible by users. In this paper, we propose inter-pixel gradient-based M4 (IGM4) for enhancing the existing M4 scheme, and conduct a study to reduce the amount of data and delay without distorting the results of visualized graph. We build user-friendly web-based system to dealing with the data processing technique, and perform test on the empirical environment. Finally, we present the results of performance evaluation through comparison among the original data, M4, and IGM4 reflecting the various kinds of time series and resolutions.
- Published
- 2017
27. Sensor Localization System for AR-assisted Disaster Relief Applications (poster)
- Author
-
Keun-Woo Lim, Young-Bae Ko, and Hong-Beom Choi
- Subjects
Emergency management ,Computer science ,business.industry ,Real-time computing ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Plan (drawing) ,0203 mechanical engineering ,Software deployment ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Augmented reality ,Visual odometry ,Localization system ,business - Abstract
In this poster, we propose a sensor localization system assisted by wireless communication and augmented reality (AR) suitable for disaster relief applications. Generally, disaster environments are considered extremely hazardous and deteriorated, with unpredictable effects to human mobility and digital devices. To maximize the safety and efficiency of first responders, deployment of wireless sensors are of utmost importance, as sensor nodes can provide sensing information as well as location information. We analyze the issues and challenges that need to be tackled for high accuracy localization of sensor nodes in such environments, and then propose a system that we plan to develop in the near future.
- Published
- 2019
28. Energy-Aware Distribution of Data Fragments in Unattended Wireless Sensor Networks
- Author
-
Young-Bae Ko, Hong-Beom Choi, Keun-Woo Lim, Réseaux, Mobilité et Services (RMS), Laboratoire Traitement et Communication de l'Information (LTCI), Institut Mines-Télécom [Paris] (IMT)-Télécom Paris-Institut Mines-Télécom [Paris] (IMT)-Télécom Paris, Département Informatique et Réseaux (INFRES), and Télécom ParisTech
- Subjects
020203 distributed computing ,Exploit ,Computer science ,Fragment (computer graphics) ,Real-time computing ,Testbed ,Survivability ,020206 networking & telecommunications ,02 engineering and technology ,[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing ,[INFO.INFO-MC]Computer Science [cs]/Mobile Computing ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,0202 electrical engineering, electronic engineering, information engineering ,[INFO.INFO-ES]Computer Science [cs]/Embedded Systems ,Overall performance ,Wireless sensor network ,Energy (signal processing) ,Efficient energy use - Abstract
In this paper, we study and analyze data fragment placement techniques to exploit their problems and design an energy-aware fragment placement method in Unattended Wireless Sensor Networks (UWSN). In UWSN, the survivability of data is of utmost importance because sensed data cannot be immediately transmitted and must reside in the storage of sensor nodes for extended periods of time. The data, which have delay-tolerant characteristics, can be exploited by attackers that access the storage to erase or steal the data. Even though data fragmentation methods have been designed to solve this problem, these works do not consider a critical issue of where to place data fragments in the sensor network. In this work, we show that basic existing methods of data fragment placement have some problems, especially in terms of energy efficiency and data survival probability. Based on our analysis, we propose a lightweight method that allows us to efficiently select sensor nodes that are used to safely distribute and place data fragments. We show through simulation and preliminary testbed analysis that our proposed method can improve the overall performance of data fragmentation.
- Published
- 2018
29. Reliable Mutual Node Evaluation for Trust-Based OLSR in Tactical MANETs
- Author
-
Young-Bae Ko, Jihun Lim, and Keun-Woo Lim
- Subjects
Service (systems architecture) ,Computer science ,business.industry ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,Packet forwarding ,050801 communication & media studies ,020206 networking & telecommunications ,02 engineering and technology ,Mobile ad hoc network ,0508 media and communications ,Optimized Link State Routing Protocol ,Link-state routing protocol ,Evaluation methods ,0202 electrical engineering, electronic engineering, information engineering ,Routing (electronic design automation) ,business ,Computer network - Abstract
This paper proposes a mutual node evaluation method in mobile ad hoc networks to recognize and reliably remove attacker nodes from deteriorating the network. We focus on a tactical networking environment, where the network is generally maintained in harsh and hostile areas while the applications require stringent service requirements. In these kinds of environments, it is desirable to utilize proactive routing methods such as Optimized Link State Routing (OLSR). However, OLSR have weaknesses against various security attacks. To solve this problem, we provide a trust-based evaluation approach where node evaluate each other based on the packet forwarding capabilities. We prove the performance of our proposed method through NS-3.
- Published
- 2018
30. Utilising partially overlapped channels for OFDM-based 802.11 WLANs
- Author
-
Young-Bae Ko, Keun-Woo Lim, and Woo-Sung Jung
- Subjects
Computer Networks and Communications ,Orthogonal frequency-division multiplexing ,business.industry ,Wireless network ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Local area network ,Throughput ,Data_CODINGANDINFORMATIONTHEORY ,Multiplexing ,Subcarrier ,Transmission (telecommunications) ,Wireless ,business ,Data transmission ,Computer network ,Communication channel - Abstract
This paper proposes a modified subcarrier design of the orthogonal frequency-division multiplexing (OFDM) scheme for supporting the concept of partially overlapped channels (POC) in wireless local area networks. Our proposed scheme, named as “channel-overlapped OFDM (CO-OFDM)”, enables the POC in OFDM by reconfiguring its subcarrier alignment and creating subcarrier subsets that allow clear transmission between nodes by using different non-orthogonal channels. This makes the nodes maintain connectivity with each other through beaconing even though they use adjacent channels. In addition, simultaneous data transmission can be achieved via channel switching and MIMO-based data transmission, thereby increasing the overall throughput of the network. Further, we integrate our CO-OFDM into IEEE 802.11a/g/n/ac-based wireless networks and analyse its superiority over existing protocols through mathematical modelling. Evaluation results show that the proposed CO-OFDM guarantees over 300% performance increase in network capacity.
- Published
- 2015
31. Reliable Packet Flow Control for Preventing Buffer Overflow in Wi-Fi Serial Bus
- Author
-
Keun-Woo Lim, Young-Bae Ko, and Woo-Sung Jung
- Subjects
Computer science ,Serial communication ,business.industry ,Network packet ,Wireless network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,USB ,Computer Science Applications ,law.invention ,Transmission (telecommunications) ,Asynchronous communication ,law ,Modeling and Simulation ,Electrical and Electronic Engineering ,business ,Buffer overflow ,Data transmission ,Computer network - Abstract
This letter proposes a novel buffer management scheme for improving the packet delivery of Universal Serial Bus (USB) services in wireless networks. In the future, USB may be used with various wireless services, most notably Wi-Fi, thus realizing Wi-Fi USB (WSB). However, data transmission of Wi-Fi and USB is asynchronous due to differences in their Medium Access Control (MAC), resulting in buffer overflow. To alleviate this problem, we propose an overflow prevention scheme where rates of USB transmission are varied depending on status of Wi-Fi. The proposed scheme is evaluated via the NS-3 simulator, showing that the packet delivery ratio of USB data can reach near 100% even in wireless transmission.
- Published
- 2015
32. Energy efficient quality-of-service for WLAN-based D2D communications
- Author
-
Young-Bae Ko, Woo-Sung Jung, and Keun-Woo Lim
- Subjects
Power management ,Computer Networks and Communications ,business.industry ,Computer science ,Wi-Fi Direct ,Quality of service ,Hardware and Architecture ,Transmission time ,business ,Electrical efficiency ,Software ,Computer network ,Data transmission ,Efficient energy use - Abstract
The research presented in this paper proposes methods for enhancing the energy efficiency and quality of service (QoS) for WLAN-based Device-to-Device communications. We focus specifically on the research related to Wi-Fi Direct technology in order to provide better services for a wider range of Wi-Fi D2D applications. Although Wi-Fi Direct defines two power management schemes for providing energy efficiency in P2P devices, neither is sufficient for meeting the power efficiency and reliability requirements for various services. In order to alleviate this problem, the proposed scheme, which is referred to as Dynamically Synchronized Power Management (DSPM), proposes a method for synchronizing the active time slots with the data transmission intervals and adjusts the sleep and active cycles accordingly. Furthermore, transmission time slots are adjusted dynamically depending on the status of data transmission in order to further enhance the energy efficiency of D2D services while maintaining their service quality. Mathematical analysis and simulations are used to compare the proposed scheme with the existing power schemes for Wi-Fi Direct and analyze its effectiveness.
- Published
- 2015
33. Dynamic power management in Wi-Fi Direct for future wireless serial bus
- Author
-
Jun-Hyung Kim, Young-Bae Ko, Youn Seo, Jong-Hyo Lee, and Keun-Woo Lim
- Subjects
Power management ,Computer Networks and Communications ,Computer science ,business.industry ,Serial communication ,Wi-Fi Direct ,Wireless USB ,Key (cryptography) ,Wireless ,Electrical and Electronic Engineering ,business ,Electrical efficiency ,Information Systems ,Computer network - Abstract
This paper presents a performance analysis of Wi-Fi Direct power management schemes and exploits their problems to design a novel, enhanced power management for future wireless USB (WSB) applications. Wi-Fi Direct will become a key technology for the support of future WSB services that require high standards of service quality and power efficiency at the same time. To provide this, Wi-Fi Direct defines two power management schemes, opportunistic power save mode and notice-of-absence. Even though each scheme has its own characteristics and advantages, specification does not have any definition of how to select the schemes and its parameters based on the type of WSB application being serviced. We analyze the properties of the two power management schemes of Wi-Fi Direct, and discover that their performance can greatly vary depending on the number and type of WSB applications that is being transmitted in the network. To solve this problem, we propose a novel power saving algorithm that can dynamically change the power management of Wi-Fi Direct. Our work is extensively evaluated using the Wi-Fi Direct module implemented in the NS-3 simulator.
- Published
- 2014
34. Characterizing and predicting mobile application usage
- Author
-
Keun-Woo Lim, Lionel Tabourier, Stefano Secci, Badis Tebbani, Phare, Laboratoire d'Informatique de Paris 6 (LIP6), Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS), ComplexNetworks, Ucopia, and UCOPIA
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Mobile broadband ,Local area network ,020206 networking & telecommunications ,02 engineering and technology ,Service provider ,computer.software_genre ,Clustering ,[INFO.INFO-SI]Computer Science [cs]/Social and Information Networks [cs.SI] ,Data consumption behavior ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Mobile applications ,Analytics ,Data analytics ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,020201 artificial intelligence & image processing ,Data mining ,Cluster analysis ,business ,computer - Abstract
International audience; In this paper, we propose data clustering techniques to predict temporal characteristics of data consumption behavior of different mobile applications via wireless communications. While most of the research on mobile data analytics focuses on the analysis of call data records and mobility traces, our analysis concentrates on mobile application usages, to characterize them and predict their behavior. We exploit mobile application usage logs provided by a Wi-Fi local area network service provider to characterize temporal behavior of mobile applications. More specifically, we generate daily profiles of " what " types of mobile applications users access and " when " users access them. From these profiles, we create usage classes of mobile applications via aggregation of similar profiles depending on data consumption rate, using three clustering techniques that we compare. Furthermore, we show that we can utilize these classes to analyze and predict future usages of each mobile application through progressive comparison using distance and similarity comparison techniques. Finally, we also detect and exploit outlying behavior in application usage profiles and discuss methods to efficiently predict them.
- Published
- 2016
35. Emerging trends and applications in ad hoc networks
- Author
-
Luigi Fratta, Keun-Woo Lim, and Mario Gerla
- Subjects
business.industry ,Computer science ,Wireless ad hoc network ,Electrical and Electronic Engineering ,business ,Computer communication networks ,Computer network - Published
- 2018
36. Design and implementation of adaptive WLAN mesh networks for video surveillance
- Author
-
Keun-Woo Lim, Woo-Sung Jung, Sangjoon Park, Youn Seo, and Young-Bae Ko
- Subjects
Wi-Fi array ,Computer Networks and Communications ,Computer science ,Mesh networking ,Shared mesh ,law.invention ,IEEE 802.11 ,law ,Wireless ,Wi-Fi ,Electrical and Electronic Engineering ,Fixed wireless ,IEEE 802.11s ,Wireless mesh network ,business.industry ,Network packet ,Service set ,Wireless network ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Testbed ,Local area network ,Wireless WAN ,Order One Network Protocol ,Network congestion ,Network planning and design ,Wireless site survey ,Key distribution in wireless sensor networks ,Switched mesh ,business ,Municipal wireless network ,Information Systems ,Computer network - Abstract
This paper presents a novel design and practical experiments of adaptive wireless mesh networks based on 802.11 based Wireless Local Area Networks for supporting public video surveillance. A network of video cameras and sensors can be equipped with wireless communication modules to form wireless surveillance at only a small expense of cost and labor. However, large and redundant multimedia data transmitted through the wireless medium pose challenging problems such as decrease in Quality of Service (QoS) and system reliability. To support seamless transmission of surveillance data through wireless means, we propose a wireless surveillance network design based on the protocols and functions of IEEE 802.11 mesh standard. One of the key functions of our adaptive mesh network is the “Multi-Gateway Routing with Congestion Avoidance”, which provides enhanced QoS support via adaptive congestion control. Network congestion is predicted in a distributed manner and amounts of data traffic transmitted to the congested path are redirected to multiple gateways. Redirection of traffic flows are made in such a way to provide quicker transmission for more time critical packets. Experimental studies via practical testbed implementation and simulation via NS-3 are conducted to prove the superiority of our proposed scheme.
- Published
- 2013
37. Improving the reliability of IEEE 802.11s based wireless mesh networks for smart grid systems
- Author
-
Dabin Kim, Young-Bae Ko, Jaebeom Kim, Sang-Youm Lee, and Keun-Woo Lim
- Subjects
Wireless mesh network ,Computer Networks and Communications ,business.industry ,Service set ,Computer science ,Inter-Access Point Protocol ,Wireless Routing Protocol ,Hybrid Wireless Mesh Protocol ,Order One Network Protocol ,Smart grid ,business ,Information Systems ,Computer network ,IEEE 802.11s - Abstract
A challenge faced by smart grid systems is providing highly reliable transmissions to better serve different types of electrical applications and improve the energy efficiency of the system. Although wireless networking technologies can provide highspeed and cost-effective solutions, their performance may be impaired by various factors that affect the reliability of smart grid networks. Here, we first suggest the use of IEEE 802.11s-based wireless LAN mesh networks as high-speed wireless backbone networks for smart grid infrastructure to provide high scalability and flexibility while ensuring low installation and management costs. Thereafter, we analyze some vital problems of the IEEE 802.11s default routing protocol (named hybrid wireless mesh protocol; HWMP) from the perspective of transfer reliability, and propose appropriate solutions with a new routing method called HWMP-reliability enhancement to improve the routing reliability of 802.11s-based smart grid mesh networking. A simulation study using ns-3 was conducted to demonstrate the superiorityof the proposed schemes.
- Published
- 2012
38. A Clinical Analysis of PTEN Expressions in Breast Cancers
- Author
-
Keun Woo Lim, Se Jeong Oh, Jeong Soo Kim, Hang Ju Cho, Chang Hyeok Ahn, Seock-Ah Im, Sang Seol Jung, Kee Hwan Kim, and Woo Chan Park
- Subjects
Oncology ,Cancer Research ,medicine.medical_specialty ,Clinical pathology ,biology ,business.industry ,Estrogen receptor ,medicine.disease ,law.invention ,Breast cancer ,law ,Internal medicine ,Progesterone receptor ,medicine ,biology.protein ,Tensin ,Suppressor ,PTEN ,business ,Gene - Abstract
Purpose: The PTEN gene, a novel tumor suppressor, is localized to chromosome 10q23.3 and shares extensive homology with the cytoskeletal protein, tensin. A high frequency of mutations at the PTEN locus has been described in a variety of neoplasms including breast cancer and Cowden Disease. However, the role of PTEN alterations and its association with clinicopathological factors have not been well established. We investigated the relationship between the PTEN expression and clinicopathological factors. Materials and Methods: Formalin-fixed, paraffin-embedded tissues from 105 women with breast cancer were evaluated for the PTEN expression and were scored semi-quantitatively based on staining intensity and distribution. Results were statistically compared with clinicopathological factors. Results: Forty-seven (45%) of the 105 breast cancers had a loss of the PTEN expression. In the recurrent group, 19 of 32 (59%) patients showed a loss of the PTEN expre- ssion, whereas in the non-recurrent group, only 28 of 73 (38%) patients showed a loss of the PTEN expression. The loss of PTEN expression correlated with estrogen receptors (ER) (p=0.027), recurrence (p=0.046), HER-2/neu overexpression (p=0.016), disease-free survival (p=0.0163), and overall survival (p=0.0357). In particular, when HER-2/ neu was overexpressed, the overall survival rate correlated with the loss of PTEN expression statistically (p=0.0454), whereas when HER-2/neu was negative, there was no correlation (p=0.9808). Progesterone receptor (PR) and disease stage had no relationship with the PTEN expression. Conclusion: Our results support that PTEN plays a role as a tumor suppressor in breast cancer and is a prognostic factor in predicting recurrence.
- Published
- 2015
39. Clinical Analysis of PTEN, p53 and Her-2/neu Expressions in Thyroid Cancers
- Author
-
Chung Soo Chun, Kee Hwan Kim, Keun Woo Lim, Jeong Soo Kim, Chang Hyeok Ahn, Hae Myung Jeon, Ja Seong Bae, and Se Jeong Oh
- Subjects
Cancer Research ,medicine.medical_specialty ,biology ,Tumor suppressor gene ,Clinical pathology ,business.industry ,Thyroid ,medicine.disease_cause ,medicine.disease ,medicine.anatomical_structure ,Oncology ,biology.protein ,medicine ,Cancer research ,PTEN ,Immunohistochemistry ,business ,Carcinogenesis ,Thyroid cancer ,Thyroid neoplasm - Abstract
PURPOSE The dual-specificity phosphatase PTEN/ MMAC1/TEP1 has recently been identified as the tumor suppressor gene most frequently mutated and/or deleted in human tumors. However, PTEN mutations have rarely been detected in sporadic thyroid cancers. Therefore, this study investigated the PTEN expression of thyroid cancer and the relationship between PTEN, clinical status and other biologic factors such as HER-2/neu and p53. MATERIALS AND METHODS The study samples consisted of 62 thyroid cancer specimens and 24 benign thyroid tumor specimens from patients who were operated on the Department of Surgery, Uijongbu St. Mary's hospital during the 5 years from January 1995 until January 2000. All tumors were studied by immunohistochemical staining using monoclonal antibodies against PTEN, HER-2/neu and p53. The results were analyzed statistically. RESULTS PTEN protein was found to be under-expressed more frequently in thyroid cancers (29%) than in benign thyroid tumors (4.2%). The reduction in PTEN expression in thyroid cancers was not significantly related with the recorded clinical factors such as size, age, lymph node metastasis and p53, except for HER-2 which was found to be significantly related (p=0.001). HER-2 over- expression was noted in thyroid cancer (83.8%) more frequently than in benign tumors (16.7%). CONCLUSION This study has demonstrated that the under-expression of PTEN protein and the over-expression of HER-2 protein may play a role in the carcinogenesis and development of thyroid cancer.
- Published
- 2015
40. Efficient clustering-based data aggregation techniques for wireless sensor networks
- Author
-
Young-Bae Ko, Keun-Woo Lim, Woo-Sung Jung, and Sangjoon Park
- Subjects
Computer Networks and Communications ,Computer science ,Aggregate (data warehouse) ,Energy consumption ,computer.software_genre ,Data aggregator ,Data stream clustering ,State (computer science) ,Data mining ,Electrical and Electronic Engineering ,Cluster analysis ,Wireless sensor network ,computer ,Information Systems ,Efficient energy use - Abstract
In wireless sensor network applications for surveillance and reconnaissance, large amounts of redundant sensing data are frequently generated. It is important to control these data with efficient data aggregation techniques to reduce energy consumption in the network. Several clustering methods were utilized in previous works to aggregate large amounts of data produced from sensors in target tracking applications (Park in A dissertation for Doctoral in North Carolina State University, 2006). However, such data aggregation algorithms show effectiveness only in restricted environments, while posing great problems when adapting to other various situations. To alleviate these problems, we propose two hybrid clustering based data aggregation mechanisms. The combined clustering-based data aggregation mechanism can apply multiple clustering techniques simultaneously in a single network depending on the network environment. The adaptive clustering-based data aggregation mechanism can adaptively choose a suitable clustering technique, depending on the status of the network. The proposed mechanisms can increase the data aggregation efficiency as well as improve energy efficiency and other important issues compared to previous works. Performance evaluation via mathematical analysis and simulation has been made to show the effectiveness of the proposed mechanisms.
- Published
- 2011
41. Improve your USB experience with Wi-Fi through dynamic QoS adaptation
- Author
-
Woo-Sung Jung, Young-Bae Ko, and Keun-Woo Lim
- Subjects
Wi-Fi array ,Distributed database ,Computer science ,business.industry ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,USB ,law.invention ,Key distribution in wireless sensor networks ,law ,Embedded system ,Wireless ,business ,Wireless sensor network ,Computer network ,Communication channel - Abstract
Conjunction of USB applications with wireless technologies leads us to USB over Wi-Fi through the means of Wireless Serial Extension (WSE). However, USB and Wi-Fi has distinct data prioritization methods, which causes problems in existing QoS protocols when the two technologies are used together. To solve this problem, this poster proposes and evaluates the dynamic QoS adaptation scheme, which intelligently maps the data of USB with the weighted transmission queues of enhanced distributed channel access (EDCA) mechanism.
- Published
- 2015
42. The First Case of Intraperitoneal Bronchogenic Cyst in Korea Mimicking a Gallbladder Tumor
- Author
-
Chang Hyeok Ahn, Ok Ran Shin, Eun-Jung Lee, Keun Woo Lim, Young Mi Ku, Kee Hwan Kim, Ji Il Kim, and Jeong Soo Kim
- Subjects
medicine.medical_specialty ,business.industry ,medicine.medical_treatment ,Gallbladder ,Bronchogenic cyst ,Case Report ,General Medicine ,medicine.disease ,Bronchogenic Cyst ,medicine.anatomical_structure ,Laparotomy ,medicine ,Abdomen ,Cyst ,Cholecystectomy ,Gallbladder Neoplasms ,Radiology ,Gallbladder Neoplasm ,Differential diagnosis ,business - Abstract
We present a case of an intraperitoneal bronchogenic cyst located at inferior surface of the liver, next to the gallbladder which clinically mimicked a gallbladder tumor. This is the first case reported in Korea, and we offer reviews of the related literatures. A 48-yr-old woman was admitted to our hospital because of intermittent abdominal pain in right upper quadrant. Computed tomography showed a large mass alongside the gallbladder. During laparotomy, the mass showed an ovoid cystic nature, which was attached to the normal gallbladder and liver bed. Cyst excision with cholecystectomy was performed, and histopathological examination revealed a bronchogenic cyst. Most bronchogenic cysts have a benign nature, but malignant changes have also been reported. Therefore, if a cystic tumor in the abdomen is suspected during preoperative diagnosis, a bronchogenic cyst should be considered in the differential diagnosis.
- Published
- 2004
43. On the interplay between clustering and power control in multihop wireless networks
- Author
-
Keun-Woo Lim, Zeeshan Hameed Mir, and Young-Bae Ko
- Subjects
business.industry ,Topology control ,Computer science ,Distributed computing ,Logical topology ,Hierarchical network model ,Cluster analysis ,business ,Network topology ,Average path length ,Power control ,Computer network ,Network simulation - Abstract
Topology control offers many advantages for wireless networks such as reduced energy cost, simplified communication graph and network-wide connectivity. There are mainly two methods for managing the network topology. In clustering, a hierarchy of backbone nodes is selected to improve on the systems scalability and network lifetime whereas in power control each node adjusts its transmission power to achieve certain desirable properties of the resulting topology. While the focus of the former approach is to find an ideal number of the backbone nodes, the main objective of the later approach is to estimate a minimal power level which can solve multi-objective design problem. There have been several topology control protocols proposed however they miss the potential of combining both approaches. In this paper we propose Two-Tiered Topology Control (TTTC) protocol, a generic framework which combines the clustering and power control approach towards topology control and evaluate different conditions under which it performs well. TTTC operation is divided into two phases. During the first phase, a parameterized clustering algorithm is executed to obtain clusters of varying properties. At the end of first phase, the network is organized into two tiers. The backhaul-tier consists of cluster-head nodes while the connectivity-tier contains the cluster-members. In the second phase, each cluster-head runs a local MST-based power control algorithm. Simulation results show that proposed framework achieves efficient trade-off in terms of energy cost, neighbor count and hop count while maintaining fully connected network. Moreover, the framework relies on local available information with lower communication overhead.
- Published
- 2014
44. Poster
- Author
-
Woo-Sung Jung, Young-Bae Ko, and Keun-Woo Lim
- Subjects
Flow control (data) ,Computer science ,business.industry ,Serial communication ,Network packet ,USB ,law.invention ,Asynchronous communication ,law ,USB hub ,business ,Data transmission ,Computer network ,Buffer overflow - Abstract
This poster proposes an adaptive flow control scheme for reliable packet delivery of Universal Serial Bus (USB) services when they are transmitted through wireless medium. In the future, USB can be utilized with the Wi-Fi technology to provide Wi-Fi USB (WSB). However, the data transmission of Wi-Fi and USB are asynchronous due to their different Medium Access Control (MAC) characteristics, which may result in buffer overflow. To prevent buffer overflow, we propose an adaptive flow control scheme that can select between the various transmission speeds of USB to match with the bandwidth provided by the Wi-Fi layer. Preliminary results of the proposed scheme evaluated via the NS-3 shows that the packet delivery ratio of USB data can be substantially increased, thus providing better USB reliability.
- Published
- 2014
45. Phakomatosis pigmentovascularis IIb with hypoplasia of the inferior vena cava and the right iliac and femoral veins causing recalcitrant stasis leg ulcers
- Author
-
Keun Woo Lim, Kyung Sup Song, Jin-Wou Kim, Jun Young Lee, Sang Seob Yun, Hyun-Jeong Lee, Seog-Jun Ha, Jong-Gap Park, and Kee-Young Roh
- Subjects
Adult ,Male ,Neurofibromatosis 2 ,medicine.medical_specialty ,Femoral vein ,Vena Cava, Inferior ,Large vessel ,Dermatology ,Iliac Vein ,Risk Assessment ,Severity of Illness Index ,Inferior vena cava ,Vascular anomaly ,Recurrence ,medicine ,Humans ,Abnormalities, Multiple ,Embryonic period ,Vascular Diseases ,Vasomotor ,business.industry ,Leg Ulcer ,Phlebography ,Skin Transplantation ,Femoral Vein ,medicine.disease ,Hypoplasia ,Surgery ,Treatment Outcome ,Phakomatosis pigmentovascularis ,medicine.vein ,cardiovascular system ,Radiology ,business ,Follow-Up Studies - Abstract
We present a patient with phakomatosis pigmentovascularis (PPV) type IIb accompanied with venous hypoplasia, from the inferior vena cava to the superficial femoral vein. Although it is not obvious whether this vascular anomaly, which is probably congenital, is coincidental or not, it is possible that the 2 diseases have some relationship each other, because PPV is thought to result from abnormal vasomotor activity during the embryonic period. In the diagnosis of type II PPV, careful examination and several studies are required to determine systemic involvement that may include large vessel changes.
- Published
- 2003
46. Contention mitigated EDCA algorithm for reliable smart grid mesh networks
- Author
-
Young-Bae Ko, Jaebeom Kim, and Keun-Woo Lim
- Subjects
Scheme (programming language) ,Computer science ,Wireless ad hoc network ,Network packet ,business.industry ,Reliability (computer networking) ,Retransmission ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mesh networking ,Smart grid ,business ,computer ,Algorithm ,computer.programming_language ,Computer network - Abstract
This paper focuses on enhancing IEEE 802.11e EDCA for improving reliability in Smart grid networks. 802.11e can support prioritized QoS to differentiate traffic and guarantee fairness for delay-stringent applications. However, this may pose serious problems when applied to Smart Grid environments which support applications that have strict reliability requirements. To solve this problem, we suggest a contention mitigated EDCA algorithm (CM-EDCA), which utilizes packet collision and MAC retransmission parameters to change the packet priority and reduce packet collisions. The proposed scheme is compatible with IEEE 802.11e and easy to implement for Smart grid devices. Simulation studies show improved reliability compared to the existing methods in IEEE 802.11e.
- Published
- 2012
47. Adaptive wireless mesh networks architecture based on IEEE 802.11s for public surveillance
- Author
-
Yoo-Seung Song, Young-Bae Ko, Sangjoon Park, Keun-Woo Lim, and Youn Seo
- Subjects
Wireless mesh network ,Computer science ,Service set ,business.industry ,Wireless network ,Adaptive system ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Testbed ,Mesh networking ,Order One Network Protocol ,business ,Computer network ,IEEE 802.11s - Abstract
We propose and demonstrate an adaptive wireless mesh network architecture for public surveillance and monitoring. The proposed architecture is based on IEEE 802.11s WLAN mesh network, which is enhanced to provide adaptation depending on the environment of the network. We first introduce the implementation architecture of the adaptive mesh, and then describe the demonstration of the network on the wireless mesh camera sensor testbed.
- Published
- 2012
48. Distributed channel adaptation using instantaneous clusters in energy-constrained multi-hop wireless networks
- Author
-
Keun-Woo Lim, Young-Bae Ko, and Woo-Sung Jung
- Subjects
Engineering ,Detect and avoid ,business.industry ,Wireless network ,Energy constrained ,Channel adaptation ,business ,Cluster analysis ,Mobile device ,Computer Science::Information Theory ,Computer network ,Hop (networking) ,Communication channel - Abstract
This paper proposes a practical lightweight scheme for channel problem detection and adaptation in energy-constrained multi-hop wireless networks. Generally, handheld devices such as smart phones have functional constraints that limit them from utilizing multiple radio interfaces. Even with these limits, these nodes must be able to efficiently detect and avoid interfered channels. We propose a novel channel sensing and adaptation method that is suitable for these environments, and analyze it through implementation to prove its superiority.
- Published
- 2011
49. A practical approach for channel problem detection and adaptation in tactical radio systems
- Author
-
Woo-Sung Jung, Yoo-Seung Song, Sangjoon Park, Young-Bae Ko, and Keun-Woo Lim
- Subjects
Engineering ,SIMPLE (military communications protocol) ,business.industry ,Radio jamming ,Real-time computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Software-defined radio ,Signal-to-noise ratio ,Interference (communication) ,Electronic engineering ,Wireless ,Adaptation (computer science) ,business ,Communication channel - Abstract
Soldier-based tactical radio systems in the battlefield have tendencies to be severely affected by various phenomenon such as signal jamming and environment deterioration. This is because many types of wireless handheld and manpack devices carried by soldiers may not have efficient algorithms or the hardware for adapting the device to these conditions. Taking on the advantage that most of these devices use software-defined radios but do not fully utilize its functionalities, we present channel quality estimation and channel adaptation algorithms that can solve the problems of these devices. We utilize simple and practical channel problem detection methods by constantly monitoring the channel quality parameters such as signal-to-interference-noise ratio and clear channel assessment value while inducing low overhead. Furthermore, we propose efficient channel adaptation methods that can quickly sense and avoid deteriorated channel conditions. Via the experimental studies, we implement our proposed scheme on actual testbeds and show that it can improve the performance and mission-criticality of the tactical networks.
- Published
- 2011
50. Congestion-aware multi-gateway routing for wireless mesh video surveillance networks
- Author
-
Sangjoon Park, Sung-Hee Lee, Keun-Woo Lim, and Young-Bae Ko
- Subjects
Routing protocol ,Network congestion ,Wireless mesh network ,Traffic congestion ,Computer science ,business.industry ,Default gateway ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,business ,Wireless sensor network ,Internetworking ,Hierarchical routing ,Computer network - Abstract
In video surveillance and monitoring systems based on wireless mesh networks, large volumes of multimedia data with different priorities and time demands are generated by video cameras and wireless sensors. Hence, one of the key issues is how to alleviate network congestion for highly reliable transfer of multimedia data towards gateways. This paper proposes a solution for utilizing multiple gateways to divert data streams and alleviate traffic congestion near a specific gateway. With a new routing protocol, named “Multi-Gateway Routing with Congestion Avoidance (MGR-CA)”, network congestion can be predicted in a distributed manner and amounts of data traffic transmitted to the congested path are redirected to an alternative gateway based on the severity of congestion. Preliminary testbed experiments are made to show the performance of our scheme.
- Published
- 2011
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.