Konkuk University

Displaying 1-11 of 11 results

  • White Papers // Mar 2013

    Towards Efficient Design and Implementation of a Hadoop-based Distributed Video Transcoding System in Cloud Computing Environment

    In this paper, the authors propose a Hadoop-based Distributed Video Transcoding System in a cloud computing environment that transcodes various video codec formats into the MPEG-4 video format. This system provides various types of video content to heterogeneous devices such as smart phones, personal computers, television, and pads. They design...

    Provided By Konkuk University

  • White Papers // Jan 2013

    Classification of Malicious Domain Names Using Support Vector Machine and Bi-Gram Method

    Everyday there are millions of domains registered and some of them are related to malicious activities. Recently, domain names have been used to operate malicious networks such as botnet and other types of malicious software (malware). Studies have revealed that it was challenging to keep track of malicious domains by...

    Provided By Konkuk University

  • White Papers // Oct 2012

    Design and Experiments of Small DDoS Defense System Using Traffic Deflecting in Autonomous System

    DDoS (Distributed Denial of Service) attacks are a serious threat to the legitimate use of the Internet. Many defense methods against DDoS attacks have been suggested. However, the deployment of defense systems becomes an important issue. In this paper, a framework for redirection and filtering that works within an AS...

    Provided By Konkuk University

  • White Papers // Oct 2012

    A Study on Water-Line Performance Improvement Based on OFDM System for Underwater Communication

    To overcome the poor communication environment between the underwater acoustic signal transmitter and receiver, previous research applied underwater acoustic OFDM communication system which had efficient bandwidth capacity and could mitigate multi-path delay spread effect via guard interval. Concurrently with this OFDM signal, additional data could be transmitted through spread spreading...

    Provided By Konkuk University

  • White Papers // Mar 2012

    Design of Copy Protection System for Android Platform

    The authors propose a copyright protection system for Android platform, which is an efficient way of using cryptographic technology to distribute application securely, and at runtime, only legitimate user can decrypt the application to run it. Legitimate users can get information needed to decrypt by using their authentication information, but...

    Provided By Konkuk University

  • White Papers // Apr 2011

    Location-Based Multicast Routing Algorithms for Wireless Sensor Networks in Presence of Interferences

    Location-based Multi-cast Routing (LMR) technique can increase the lifetime and the channel capacity of Wireless Sensor Network (WSN) by reducing the number of duplicated data transmissions and control messages. Previous LMR algorithms can suffer performance deterioration in real deployments because they consider only location of nodes and can transmit packets...

    Provided By Konkuk University

  • White Papers // Aug 2010

    Adaptive 3-Dimensional Topology Control for Wireless Ad-Hoc Sensor Networks

    Developing an adaptive 3-Dimensional (3D) topology control algorithm is important because most wireless nodes are mobile and deployed in buildings. Moreover, in buildings, wireless link qualities and topologies change frequently due to various objects and the interference from other wireless devices. Previous topology control algorithms can suffer significant performance degradation...

    Provided By Konkuk University

  • White Papers // Aug 2010

    Interference-Aware Energy-Efficient Geographical Routing for IEEE 802.15.4a Networks

    The IEEE 802.15.4a standard enables geographical routing in ZigBee networks but previous geographical routing algorithms can suffer high packet loss due to the interference effects. This paper proposes an interference-aware energy-efficient geographical routing algorithm for the IEEE 802.15.4a networks. The proposed algorithm estimates the energy cost by considering the interference...

    Provided By Konkuk University

  • White Papers // Apr 2010

    A Security Weakness in a Generic Construction of a Group Key Exchange Protocol

    The primary goal of cryptography is to provide a means for communicating confidentially and with integrity over a public channel. In practice, this goal is often achieved with key exchange protocols which allow the parties communicating over an insecure network to establish a common secret key called a session key....

    Provided By Konkuk University

  • White Papers // Oct 2008

    Interference-Aware Topology Control for Wireless Personal Area Networks

    Recently, many wireless devices operate in the 2.4GHz ISM band. Wireless Personal Area Network (WPAN) can suffer significant performance degradation due to the interference of WLAN and Bluetooth. This paper proposes an interference-aware topology control algorithm for WPANs. In the proposed algorithm, each node adjusts the transmission power dynamically by...

    Provided By Konkuk University

  • White Papers // May 2008

    Real-Time Communication Support for Embedded Linux Over Ethernet

    Many embedded systems are exploiting embedded Linux due to its rich features and device drivers. However, since embedded Linux is inherited from traditional monolithic kernel design, it has limitations to support real-time communication. One such example is that the protocol stacks of embedded Linux are following the bottom half based...

    Provided By Konkuk University

  • White Papers // Jan 2013

    Classification of Malicious Domain Names Using Support Vector Machine and Bi-Gram Method

    Everyday there are millions of domains registered and some of them are related to malicious activities. Recently, domain names have been used to operate malicious networks such as botnet and other types of malicious software (malware). Studies have revealed that it was challenging to keep track of malicious domains by...

    Provided By Konkuk University

  • White Papers // Oct 2012

    Design and Experiments of Small DDoS Defense System Using Traffic Deflecting in Autonomous System

    DDoS (Distributed Denial of Service) attacks are a serious threat to the legitimate use of the Internet. Many defense methods against DDoS attacks have been suggested. However, the deployment of defense systems becomes an important issue. In this paper, a framework for redirection and filtering that works within an AS...

    Provided By Konkuk University

  • White Papers // Mar 2013

    Towards Efficient Design and Implementation of a Hadoop-based Distributed Video Transcoding System in Cloud Computing Environment

    In this paper, the authors propose a Hadoop-based Distributed Video Transcoding System in a cloud computing environment that transcodes various video codec formats into the MPEG-4 video format. This system provides various types of video content to heterogeneous devices such as smart phones, personal computers, television, and pads. They design...

    Provided By Konkuk University

  • White Papers // Apr 2010

    A Security Weakness in a Generic Construction of a Group Key Exchange Protocol

    The primary goal of cryptography is to provide a means for communicating confidentially and with integrity over a public channel. In practice, this goal is often achieved with key exchange protocols which allow the parties communicating over an insecure network to establish a common secret key called a session key....

    Provided By Konkuk University

  • White Papers // May 2008

    Real-Time Communication Support for Embedded Linux Over Ethernet

    Many embedded systems are exploiting embedded Linux due to its rich features and device drivers. However, since embedded Linux is inherited from traditional monolithic kernel design, it has limitations to support real-time communication. One such example is that the protocol stacks of embedded Linux are following the bottom half based...

    Provided By Konkuk University

  • White Papers // Apr 2011

    Location-Based Multicast Routing Algorithms for Wireless Sensor Networks in Presence of Interferences

    Location-based Multi-cast Routing (LMR) technique can increase the lifetime and the channel capacity of Wireless Sensor Network (WSN) by reducing the number of duplicated data transmissions and control messages. Previous LMR algorithms can suffer performance deterioration in real deployments because they consider only location of nodes and can transmit packets...

    Provided By Konkuk University

  • White Papers // Aug 2010

    Adaptive 3-Dimensional Topology Control for Wireless Ad-Hoc Sensor Networks

    Developing an adaptive 3-Dimensional (3D) topology control algorithm is important because most wireless nodes are mobile and deployed in buildings. Moreover, in buildings, wireless link qualities and topologies change frequently due to various objects and the interference from other wireless devices. Previous topology control algorithms can suffer significant performance degradation...

    Provided By Konkuk University

  • White Papers // Aug 2010

    Interference-Aware Energy-Efficient Geographical Routing for IEEE 802.15.4a Networks

    The IEEE 802.15.4a standard enables geographical routing in ZigBee networks but previous geographical routing algorithms can suffer high packet loss due to the interference effects. This paper proposes an interference-aware energy-efficient geographical routing algorithm for the IEEE 802.15.4a networks. The proposed algorithm estimates the energy cost by considering the interference...

    Provided By Konkuk University

  • White Papers // Oct 2008

    Interference-Aware Topology Control for Wireless Personal Area Networks

    Recently, many wireless devices operate in the 2.4GHz ISM band. Wireless Personal Area Network (WPAN) can suffer significant performance degradation due to the interference of WLAN and Bluetooth. This paper proposes an interference-aware topology control algorithm for WPANs. In the proposed algorithm, each node adjusts the transmission power dynamically by...

    Provided By Konkuk University

  • White Papers // Mar 2012

    Design of Copy Protection System for Android Platform

    The authors propose a copyright protection system for Android platform, which is an efficient way of using cryptographic technology to distribute application securely, and at runtime, only legitimate user can decrypt the application to run it. Legitimate users can get information needed to decrypt by using their authentication information, but...

    Provided By Konkuk University

  • White Papers // Oct 2012

    A Study on Water-Line Performance Improvement Based on OFDM System for Underwater Communication

    To overcome the poor communication environment between the underwater acoustic signal transmitter and receiver, previous research applied underwater acoustic OFDM communication system which had efficient bandwidth capacity and could mitigate multi-path delay spread effect via guard interval. Concurrently with this OFDM signal, additional data could be transmitted through spread spreading...

    Provided By Konkuk University