Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Jung-Il Namgung"'
Publikováno v:
Applied Sciences, Vol 9, Iss 15, p 3187 (2019)
In the last few decades, underwater communication systems have been widely used for the development of navy, military, business, and safety applications, etc. However, in underwater communication systems, there are several challenging issues, such as
Externí odkaz:
https://doaj.org/article/a82c587b23dc4325a3c0e9535bed2021
Publikováno v:
Sensors, Vol 10, Iss 1, Pp 501-525 (2010)
In this paper, several MAC scheduling methods applicable to an underwater environment are proposed. Besides, a new marine communication system model was proposed to improve the reliability of the proposed SBMAC method. The scheme minimizes transmissi
Externí odkaz:
https://doaj.org/article/45243a69c2a24505b5cf3f371d2c6616
Autor:
Sun-Ho Yum, Soo-Hyun Park, Jin Young Lee, Svetlana Balkashina, Soo-Young Shin, Jung-Il Namgung
Publikováno v:
Global Oceans 2020: Singapore – U.S. Gulf Coast.
Although Internet of Things (IoT) on the ground has been widely developed, there are a lot of challenges for Underwater Internet of Things (U-IoT) because of the hostile environments. Nevertheless, U-IoT is a potential field and it can be a platform
Publikováno v:
Sensor Letters. 16:698-711
Publikováno v:
Journal of the Institute of Electronics and Information Engineers. 55:47-59
Publikováno v:
WUWNet
The underwater network is a candidate instance of the constrained environment that communicates the facility of the smart underwater objects. The Internet of Underwater Things (IoUT) establishes the network of cognitive underwater devices. The paper
Autor:
Yong-Kon Lim, Soo-Hyun Park, Okyeon Yi, Jung-Il Namgung, Jaehoon Lee, Muppalla Kalyani, Chang Hwa Kim, Mukhridinkhon Ibragimov
Publikováno v:
Wireless Personal Communications. 89:479-499
In this paper, we briefly describe an underwater media access control protocol based on the request to send/clear to send mechanism with security algorithms, which is proposed to provide data confidentiality, authenticity, and replay attack protectio
Publikováno v:
Journal of the Institute of Electronics and Information Engineers. 53:76-88
사물통신(M2M)은 사람의 개입이나 간섭 없이도 2개 이상의 단말 간에 통신을 가능하게 하는 기술이다. M2M 통신은 환경모니터링, 헬스 케어 등과 같은 다양한 유즈케이스에 적용될 수 있다. 대
Publikováno v:
Journal of the Institute of Electronics and Information Engineers. 53:76-86
SQL Injection attacks are the most widely used and also they are considered one of the oldest traditional hacking techniques. SQL Injection attacks are getting quite complicated and they perform a high portion among web hacking. The big data environm
Autor:
Delphin Raj K M, Soo Young Shin, Jung-Il Namgung, Eunbi Ko, Jin-Young Lee, Soo-Hyun Park, Sun-Ho Yum
Publikováno v:
Electronics, Vol 9, Iss 1142, p 1142 (2020)
As oceans cover the majority of the earth’s surface, it becomes inevitable in extending the concepts of Internet of Things (IoT) to ocean bodies, thereby tiling the way for a new drift in the digital world, the Internet of Underwater Things (IoUT).