- Mobile Ad Hoc Networks
- Cooperative Communication and Network Coding
- Wireless Networks and Protocols
- Opportunistic and Delay-Tolerant Networks
- Vehicular Ad Hoc Networks (VANETs)
- Caching and Content Delivery
- Advanced Wireless Network Optimization
- Full-Duplex Wireless Communications
- Energy Efficient Wireless Sensor Networks
- Advanced MIMO Systems Optimization
- Marine and coastal ecosystems
- Advanced Wireless Communication Technologies
- Wireless Communication Security Techniques
- Geometric Analysis and Curvature Flows
- Diatoms and Algae Research
- Underwater Vehicles and Communication Systems
- Wireless Communication Networks Research
- Interconnection Networks and Systems
- Parallel Computing and Optimization Techniques
- Geometry and complex manifolds
- Advanced Differential Geometry Research
- UAV Applications and Optimization
- Complexity and Algorithms in Graphs
- Antenna Design and Analysis
- Computational Drug Discovery Methods
Hongik University
2014-2024
Korea Institute of Ocean Science and Technology
2024
Seoul National University Hospital
2018-2021
59th Medical Wing
2018
University of Oklahoma
2012
Dongguk University
2012
Virginia Tech
1988-2012
Sangmyung University
2008-2010
Yonsei University
2007
University of California, Los Angeles
2003-2006
In this article we present CodeCast, a network-coding-based ad hoc multicast protocol. CodeCast is especially well-suited for multimedia applications with low-loss, low-latency constraints such as audio/video streaming. The key ingredient of random network coding, which transparently implements both localized loss recovery and path diversity very low overhead. Simulation results show that in typical setting, yields nearly 100 percent delivery ratio, compared to 94 ratio by traditional...
Mobile peer-to-peer systems have recently got in the lime-light of research community that is striving to build efficient and effective mobile content addressable networks. Along this line research, we propose a network coding based file swarming protocol targeting vehicular ad hoc net-works (VANET). We argue protocols VANET should deal with typical issues such as dynamic topology intermittent connectivity well various other been disregarded previous researches addressing, node/user density,...
Vehicular ad hoc networks (VANETs) are envisioned to provide us with numerous interesting services in the near future. One of most promising applications is dissemination commercial advertisements via car-to-car communication. However, due non-cooperative behavior selfish nodes or even malicious ones real-world scenario, such vehicular advertisement system cannot be realized unless proper incentives and security mechanisms taken into consideration. This paper presents Signature-Seeking Drive...
In this study, we introduce the concept of a virtual ¿flea market¿ over vehicular ad hoc network (VANET) called FleaNet. FleaNet customers express their demands/offers to buy/sell items via radio queries. These queries are opportunistically disseminated, exploiting mobility other customers, until matching customer/vendor is found. We identify key performance metrics, namely, query resolution latency, scalability, mobility, and churning, evaluate impact on using analytic simulation models....
Multimedia (e.g., video) information exchange in VANET, if feasible, will help enhance vehicle navigation safety. We show that network coding allows very reliable and efficient data dissemination thus is suitable for multimedia safety dissemination. If the column has gaps, jointly with "data muling" on vehicles opposite direction can deliver files to disconnected components faster than other known schemes.
Smart antennas present a radical way to improve the capacity of wireless networks. The advantages such can be leveraged by MAC and higher layers. In this paper, we SPACE-MAC, protocol which enables "spatial reuse" medium multiple transmit/receive pairs are in same collision domain. SPACE-MAC prevents interference between selectively nulling signals from potentially interfering transmissions. This is achieved totally distributed fashion utilizing channel state information (CSI) at both...
We develop algorithmic optimizations to improve the cache performance of four fundamental graph algorithms. present a cache-oblivious implementation Floyd-Warshall algorithm for problem all-pairs shortest paths by relaxing some dependencies in iterative version. show that this achieves lower bound on processor-memory traffic /spl Omega/(N/sup 3///spl radic/C), where N and C are size size, respectively. Experimental results shows more than six times improvement real execution time over with...
This paper introduces a promising application over vehicular ad hoc networks (VANETs), where advertisers use VANETs to disseminate their commercial ads via car-to-car communication, targeting large number of potential customers inside cars. However, due the noncooperative behavior selfish or even malicious nodes in real-world scenarios, such advertisement system cannot be realized unless proper incentives and security mechanisms are place. presents signature-seeking drive (SSD), which is...
Although detecting small objects is critical in various applications, neural network models designed and trained for generic object detection struggle to do so with precision. For example, the popular Single Shot MultiBox Detector (SSD) tends perform poorly objects, balancing performance of SSD across different sized remains challenging. In this study, we argue that current IoU-based matching strategy used reduces training efficiency due improper matches between default boxes ground truth...
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear be protocol compliant. For instance, since packet loss is common in mobile wireless networks, the adversary can exploit this fact hiding its malicious intents using compliant losses that caused environmental reasons.In paper we study two use disguised deplete resources reduce performance. These have not been fully addressed...
Network coding, the notion of performing coding operations on contents packets while in transit through network, was originally developed for wired networks; recently, however, it has been also applied with success to wireless ad hoc networks. In fact, shown that network can yield substantial performance gains, e.g., reduced energy consumption, this paper, we compare, using linear programming formulations, maximum throughput a multicast application achieve and without unreliable show...
Over recent years, mobile Internet devices such as laptops, PDAs, smart phones etc, have become extremely popular and widespread. Once on board of a vehicle, these can automatically connect to the vehicle processor thus greatly amplify communications processing capabilities available owner in "pedestrian mode". We envision that this "amplification" opportunity will be one drivers car curb communications. In fact, system not used exclusively for access, but also distributed platform...
This paper provides an overview of how our access to the electromagnetic spectrum has evolved and will continue expand over time. We first focus on historical origins technological regulatory choices, provide some insight into these choices have impacted efficiency with which we currently utilize spectrum, can better use it in future. In turn, summarize relevant technologies being discussed today's standardization research development efforts. Finally, a vision for evolution that,...
In order to provide network connectivity in highly partitioned ad-hoc networks, we propose a routing strategy that incorporates an existing protocol, ad hoc on demand distance vector (AODV), with disruption tolerant networking (DTN) la store-carry-forward mechanisms using unmanned aerial vehicles (UAVs) as carriers. This paper focuses the design, implementation, and evaluation of strategy. The major contribution this work is implementation our DTN aware protocol top mostly unmodified AODV....
Many multicast protocols have been proposed for ad hoc networks. ODMRP is one of the most popular due to its robustness in highly mobile wireless However, unscalable terms number sources. We improve scalability using cognitive radio technology, which diversifies channel usage members with multiple channels. design a allocation and distribution scheme build tree each group. In addition, we implement cooperative sensing by join query reply messages. simulation experiments, our protocol,...
In wireless ad-hoc networks, unidirectional links occur for several reasons: nonuniform transmit power, background noise, and external interference. Several researchers have addressed the associated routing problem. The main focus has been so far on unicast routing; consensus is that should be detected avoided. this paper, we consider multicast case derive a different conclusion: namely, it pays to exploit rather then avoid them. To prove point, select popular ad hoc protocol, on-demand...
Mobile peer-to-peer (P2P) systems have recently got in the limelight of research community that is striving to build efficient and effective mobile content addressable networks. Along this line research, we propose a new file sharing protocol suited ad hoc networks (MANET). The main ingredients our are network coding mobility assisted data propagation, i.e., single-hop communication. We argue combination with communication allows P2P MANET operate more manner helps deal typical issues such...
This letter analyzes a class of neighbor discovery algorithms in ad hoc networks using directional antennas for both reception and transmission. We consider synchronized random sector - timeslot assignment strategies compare their behaviors. Analytic results validated by simulation clearly show the latency benefits over assignment.
TCP over wireless networks is challenging due to random losses and ACK interference. Although network coding schemes have been proposed improve robustness against extreme losses, a critical problem still remains of DATA–ACK To address this issue, we use inter-flow between DATA reduce the number transmissions among nodes. In addition, also utilize “pipeline” linear scheme with adaptive redundancy overcome high packet loss unreliable links. The resulting scheme, ComboCoding, combines...
In this paper, we investigate parallel implementation techniques for network coding. It is known that coding useful both wired and wireless networks it also mitigates peer/piece selection problems in P2P file sharing systems. However, due to the decoding complexity of coding, there have been concerns about adoption practical systems improve performance, exploitation parallelism has proposed previously. argue naive parallelization strategies may result unbalanced workload distribution, thus,...