The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Seok LEE(29hit)

1-20hit(29hit)

  • Missing-Value Imputation of Continuous Missing Based on Deep Imputation Network Using Correlations among Multiple IoT Data Streams in a Smart Space

    Minseok LEE  Jihoon AN  Younghee LEE  

     
    PAPER-Information Network

      Pubricized:
    2018/11/01
      Vol:
    E102-D No:2
      Page(s):
    289-298

    Data generated from the Internet of Things (IoT) devices in smart spaces are utilized in a variety of fields such as context recognition, service recommendation, and anomaly detection. However, the missing values in the data streams of the IoT devices remain a challenging problem owing to various missing patterns and heterogeneous data types from many different data streams. In this regard, while we were analyzing the dataset collected from a smart space with multiple IoT devices, we found a continuous missing pattern that is quite different from the existing missing-value patterns. The pattern has blocks of consecutive missing values over a few seconds and up to a few hours. Therefore, the pattern is a vital factor to the availability and reliability of IoT applications; yet, it cannot be solved by the existing missing-value imputation methods. Therefore, a novel approach for missing-value imputation of the continuous missing pattern is required. We deliberate that even if the missing values of the continuous missing pattern occur in one data stream, missing-values imputation is possible through learning other data streams correlated with this data stream. To solve the missing values of the continuous missing pattern problem, we analyzed multiple IoT data streams in a smart space and figured out the correlations between them that are the interdependencies among the data streams of the IoT devices in a smart space. To impute missing values of the continuous missing pattern, we propose a deep learning-based missing-value imputation model exploiting correlation information, namely, the deep imputation network (DeepIN), in a smart space. The DeepIN uses that multiple long short-term memories are constructed according to the correlation information of each IoT data stream. We evaluated the DeepIN on a real dataset from our campus IoT testbed, and the experimental results show that our proposed approach improves the imputation performance by 57.36% over the state-of-the-art missing-value imputation algorithm. Thus, our approach can be a promising methodology that enables IoT applications and services with a reasonable missing-value imputation accuracy (80∼85%) on average, even if a long-term block of values is missing in IoT environments.

  • PMOP: Efficient Per-Page Most-Offset Prefetcher

    Kanghee KIM  Wooseok LEE  Sangbang CHOI  

     
    PAPER-Computer System

      Pubricized:
    2019/04/12
      Vol:
    E102-D No:7
      Page(s):
    1271-1279

    Hardware prefetching involves a sophisticated balance between accuracy, coverage, and timeliness while minimizing hardware cost. Recent prefetchers have achieved these goals, but they still require complex hardware and a significant amount of storage. In this paper, we propose an efficient Per-page Most-Offset Prefetcher (PMOP) that minimizes hardware cost and simultaneously improves accuracy while maintaining coverage and timeliness. We achieve these objectives using an enhanced offset prefetcher that performs well with a reasonable hardware cost. Our approach first addresses coverage and timeliness by allowing multiple Most-Offset predictions. To minimize offset interference between pages, the PMOP leverages a fine-grain per-page offset filter. This filter records the access history with page-IDs, which enables efficient mapping and tracking of multiple offset streams from diverse pages. Analysis results show that PMOP outperforms the state-of-the-art Signature Path Prefetcher while reducing storage overhead by a factor of 3.4.

  • Predictive Trellis-Coded Quantization of the Cepstral Coefficients for the Distributed Speech Recognition

    Sangwon KANG  Joonseok LEE  

     
    LETTER-Multimedia Systems for Communications

      Vol:
    E90-B No:6
      Page(s):
    1570-1572

    In this paper, we propose a predictive block-constrained trellis-coded quantization (BC-TCQ) to quantize cepstral coefficients for distributed speech recognition. For prediction of the cepstral coefficients, the first order auto-regressive (AR) predictor is used. To quantize the prediction error signal effectively, we use the BC-TCQ. The quantization is compared to the split vector quantizers used in the ETSI standard, and is shown to lower cepstral distance and bit rates.

  • Design and Analysis of the ZFE MUD Receiver for DS-SS Microphone System in 2.4 GHz ISM Band

    Chang-Seok LEE  Jung-Gon KIM  Jae-Hyung KIM  Kyun-Hyon TCHAH  

     
    PAPER

      Vol:
    E87-A No:10
      Page(s):
    2702-2708

    In this paper, we consider a direct sequence spread spectrum (DS-SS) microphone system in 2.4 GHz ISM band under indoor environments. It can be modeled as the asynchronous DS-CDMA system in which multiple transmitters share a common channel to transmit information to a single receiver. However, this system has the two critical defects, one is that many burst errors are occurred because of the long-term deep fade in an indoor channel, and the other is that power control is impossible due to the unidirectional structure. Since the reliable performance of DS-CDMA systems can be guaranteed under a reliable bit error rate performance and perfect power control, the solution to these problems is imperative. Hence, in order to overcome these problems, we propose a zero forcing equalizer (ZFE) based multi-user detection (MUD) receiver for this system, since an MUD receiver doesn't require rigorous power control and is able to remove multiple access interference using linear equalization. We derive the modeling and the tap coefficients of the proposed ZFE, and also analyze the performance of the proposed receiver. Based on the performance comparison with the conventional receivers, such as single user detection and post-detection combining diversity receivers, it is shown that the proposed receiver can achieve a lower bit error rate performance.

  • Self-Organizing Neural Networks by Construction and Pruning

    Jong-Seok LEE  Hajoon LEE  Jae-Young KIM  Dongkyung NAM  Cheol Hoon PARK  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E87-D No:11
      Page(s):
    2489-2498

    Feedforward neural networks have been successfully developed and applied in many areas because of their universal approximation capability. However, there still remains the problem of determining a suitable network structure for the given task. In this paper, we propose a novel self-organizing neural network which automatically adjusts its structure according to the task. Utilizing both the constructive and the pruning procedures, the proposed algorithm finds a near-optimal network which is compact and shows good generalization performance. One of its important features is reliability, which means the randomness of neural networks is effectively reduced. The resultant networks can have suitable numbers of hidden neurons and hidden layers according to the complexity of the given task. The simulation results for the well-known function regression problems show that our method successfully organizes near-optimal networks.

  • Analysis of Oversampling Effect on Selected Mapping Scheme Using CORR Metric

    Jun-Young WOO  Kee-Hoon KIM  Kang-Seok LEE  Jong-Seon NO  Dong-Joon SHIN  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E99-B No:2
      Page(s):
    364-369

    It is known that in the selected mapping (SLM) scheme for orthogonal frequency division multiplexing (OFDM), correlation (CORR) metric outperforms the peak-to-average power ratio (PAPR) metric in terms of bit error rate (BER) performance. It is also well known that four times oversampling is used for estimating the PAPR performance of continuous OFDM signal. In this paper, the oversampling effect of OFDM signal is analyzed when CORR metric is used for the SLM scheme in the presence of nonlinear high power amplifier. An analysis based on the correlation coefficients of the oversampled OFDM signals shows that CORR metric of two times oversampling in the SLM scheme is good enough to achieve the same BER performance as four times and 16 times oversampling cases. Simulation results confirm that for the SLM scheme using CORR metric, the BER performance for two times oversampling case is almost the same as that for four and 16 times oversampling cases.

  • 6-Year of Broadband Performance in Korea: A View from the User's Experience

    Yeonhee LEE  Youngseok LEE  

     
    PAPER-Optical Fiber for Communications

      Vol:
    E99-B No:3
      Page(s):
    630-646

    The widespread use and increasing popularity of broadband service has prompted a focus on the measurement and analysis of its empirical performance in recent studies. The worldwide view of broadband performance has been examined over the short term with Speedtest.net, but research in this area has not yet provided a long-term evolutionary insight on how DSL, Cable, and Fiber access technologies have influenced on user experience. In this study, we present 6 years of measurement results, from 2006 to 2011, of broadband performance with fast developing broadband networks in Korea. With 57% Fiber penetration in 2011, our data consist of a total of 29M test records and 10M subscribers. Over the 6 years, we have observed a 2.9-fold improvement in download speed (57Mbps), 2.8-fold increase in upload speed (38Mbps), and 0.7-fold decrease in latency due to the high penetration rate of Fiber broadband service and the advanced Cable modem technology. In addition, we carried out longitudinal analysis of various aspects of services, providers, regions, and cost-performance. We believe that the evolutionary Korean broadband measurement results can shed light on how high-speed access technologies are substantially enhancing on end-to-end performance.

  • Performance Analysis of Partial Erasure Decoding with Adaptive Erasure-Decision for RS Coded FH/SSMA Communications

    Jung Gon KIM  Chang-Seok LEE  Hyung-Myung KIM  

     
    PAPER

      Vol:
    E87-A No:10
      Page(s):
    2709-2715

    In this paper, we propose a partial erasure decoding scheme with erasure-decision threshold for Reed-Solomon (RS) codes and analyze its performance in frequency-hopped multiple-access communications. RS code is used to correct erasures and errors caused by other-user interference. Binary FSK is employed to transmit the channel symbol. The proposed decoder decides whether to erase the received RS code symbol based on the ersure decsion threshold. The approximated formula for optimal erasure decision threshold is derived in such a way that packet error probability can be minimized. Numerical results show that the employment of adaptive erasure decision threshold attains the higher normalized throughput in the areas of high channel traffic cases.

  • BER Analysis of Dual-Carrier Modulation (DCM) over Nakagami-m Fading Channel

    Hyun-Seok RYU  Jun-Seok LEE  Chung-Gu KANG  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E94-B No:7
      Page(s):
    2123-2126

    This letter provides a tight upper bound on the bit error rate (BER) over the Nakagami-m fading channel for the dual carrier modulation (DCM) scheme, which is adopted by the multi-band orthogonal frequency division multiplexing (MB-OFDM) ultra-wideband (UWB) system. Its tightness is verified with the existing result for Rayleigh fading channel, i.e., for m=1, which would be also valid for a more general fading environment.

  • Examining Privacy Leakage from Online Used Markets in Korea

    Hyunsu MUN  Youngseok LEE  

     
    LETTER-Privacy protection in information systems

      Pubricized:
    2016/01/13
      Vol:
    E99-D No:4
      Page(s):
    891-894

    Online used markets such as eBay, Yahoo Auction, and Craigslist have been popular due to the web services. Compared to the shopping mall websites like eBay or Yahoo Auction, web community-style used markets often expose the private information of sellers. In Korea, the most popular online used market is a website called “Joonggonara” with more than 13 million users, and it uses an informal posting format that does not protect the users' privacy identifiable information. In this work, we examine the privacy leakage from the online used markets in Korea, and show that 45.9% and 74.0% of sample data expose cellular phone numbers and email addresses, respectively. In addition, we demonstrate that the private information can be maliciously exploited to identify a subscriber of the social network service.

  • Geometry Splitting: An Acceleration Technique of Quadtree-Based Terrain Rendering Using GPU

    Eun-Seok LEE  Byeong-Seok SHIN  

     
    PAPER-Computer Graphics

      Vol:
    E94-D No:1
      Page(s):
    137-145

    In terrain visualization, the quadtree is the most frequently used data structure for progressive mesh generation. The quadtree provides an efficient level of detail selection and view frustum culling. However, most applications using quadtrees are performed on the CPU, because the pointer and recursive operation in hierarchical data structure cannot be manipulated in a programmable rendering pipeline. We present a quadtree-based terrain rendering method for GPU (Graphics Processing Unit) execution that uses vertex splitting and triangle splitting. Vertex splitting supports a level of detail selection, and triangle splitting is used for crack removal. This method offers higher performance than previous CPU-based quadtree methods, without loss of image quality. We can then use the CPU for other computations while rendering the terrain using only the GPU.

  • Stochastic Congestion Control in Wireless Sensor Networks

    Hyung Seok KIM  Seok LEE  Namhoon KIM  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E93-A No:1
      Page(s):
    344-347

    In this paper, an effective congestion control algorithm is proposed to increase the end-to-end delivery success ratio of upstream traffic by reduction of buffer drop probabilities and their deviation in wireless sensor networks. According to the queue length of parent and child nodes, each child node chooses one of the parents as the next hop to the sink and controls the delay before transmission begins. It balances traffics among parents and mitigates congestion based on congestion level of a node. Simulation results show that the proposed algorithm reduces buffer drop probabilities and their deviation and increases the end-to-end delivery success ratio in wireless sensor networks.

  • A Shift First Strategy for Generalized LR Parsing

    Yong-Seok LEE  Hideto TOMABECHI  Jun-ichi AOE  

     
    PAPER-Artificial Intelligence and Cognitive Science

      Vol:
    E77-D No:10
      Page(s):
    1162-1169

    Tomita's parsing method (GLR) is a practical and successful parsing method for natural language. However, one difficulty in the GLR is that interleaved constraint processing of syntax and semantics in parallel is not trivial during parsing, because it uses the precompiled table for a fast real-time parsing. In this paper, we present a method which makes the GLR adaptable to interleaved parsing while making some limitation on its generality. For interleaved parsing, the conflicts of the LR parsing table must be resolved at the parse time. The shift-reduce conflict among the above conflicts is the most serious one for interleaved parsing because of the lack of knowledge for the conflict resolution at the parse time. Therefore, we concentrate on resolving a shift-reduce conflict by introducing a grammar which is called a shift-first LR (k) grammar. Our method for this is that the conflict resolution is delayed by the shift-first strategy which makes an unconditional choice of shift actions in the case of a shift-reduce conflict. Then, a delayed resolution that resolves the conflict, is made. Depending on the decision of the resolution, the pseudo parsing, which parses symbols in the LR parser stack, proceeds. Our experiments showed that our parser is efficient while attaining the interleaved parsing at real time.

  • Design of an Energy-Aware LED Light System (EA-LLS) for Energy Saving and User Satisfaction through Daylight, Space and User Movement Analysis in Buildings

    Sangmin PARK  Jinsung BYUN  Byeongkwan KANG  Daebeom JEONG  Beomseok LEE  Sehyun PARK  

     
    LETTER-Office Information Systems, e-Business Modeling

      Pubricized:
    2015/07/17
      Vol:
    E98-D No:10
      Page(s):
    1861-1865

    This letter introduces an Energy-Aware LED Light System (EA-LLS) that provides adequate illumination to users according to the analysis of the sun's position, the user's movement, and various environmental factors, without sun illumination detection sensors. This letter presents research using algorithms and scenarios. We propose an EA-LLS that offers not only On/Off and dimming control, but dimming control through daylight, space, and user behavior analysis.

  • Reuse Based Specification Support Method Using Mathematical Similarity

    Ushio YAMAMOTO  Eun-Seok LEE  Norio SHIRATORI  

     
    PAPER

      Vol:
    E79-A No:11
      Page(s):
    1752-1759

    In this paper, we discuss both effective approaches in specification process, formal specification and reuse, and focus on providing an integrated and systematic supportbased on them. Preparing the specification model which mediates an image of the designer and another representation of it in formal method, the designer can specify the target system incrementally and smoothly. As for the specification model, we employ LTS on the early step of specification process because of its understandability for the designer. Moreover, reuse of specification leads to reduction of the cost and time, defining retrieval mechanism of reusable cases from database by mathematically calculating similarity of them. For the reuse mechanism, we define a new concept of similarity on LTS as the criterion of case retrieval, which enables more flexible matching between the besigner's requirement and the existing case than any other traditional schema on LTS, and show the case retrieval algorithm. Integration of two approaches brings us the great improvement of the productivity on system development.

  • An Effective Application of Net-Theory to Communication Protocol Development

    Norio SHIRATORI  Eun-Seok LEE  Ken TERUYA  

     
    INVITED PAPER

      Vol:
    E77-A No:10
      Page(s):
    1588-1593

    This paper presents an effective application of Net-theory for all the stages of the communication protocol development process. Net-theory provides a basic mathematical model and tool for development of communication protocol. The special usability of Net-theory is that 1) visual representation of the system's stadic/dynamic structure, so that users may easily understand the represented contents, 2) formal specifications based on mathematical basis of Net-theory admit automatic verification, implementation and conformance testing. We have seen that Net-theory which has the above usability can provide a systematic and advanced paradigm for effective communication protocol development.

  • Tight Upper Bound on the Bit Error Rate of Rotation Code

    Hyun-Seok RYU  Jun-Seok LEE  Chung-Gu KANG  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E94-B No:5
      Page(s):
    1438-1441

    We provide a BER analysis of the well-known rotation code, which has been applied to various transmission schemes, such as coordinate-interleaved design (CID) for space-time block codes and trans-modulation or constellation rearrangement for a cooperative relay system. An upper bound on the BER of the rotation code under a fading channel is derived. It turns out to be much tighter than the existing one, which relies on the Chernoff bound. More specifically, the proposed bound is virtually identical to simulation result when Eb/No is larger than 4 dB.

  • A Smartcard-Based User Authentication Scheme to Ensure the PFS in Multi-Server Environments

    Yun-Seok LEE  Eun KIM  Seung-Joon SEOK  Min-Soo JUNG  

     
    LETTER-Internet

      Vol:
    E95-B No:2
      Page(s):
    619-622

    Nowadays, a user authentication is very important in network environments. For safe authentication, they came up with six essential conditions in earlier studies. And a variety of mechanisms is presented by research scientists. However, they could not achieve the PFS. Because, though all these schemes are assumed that the communication between a smart card and a host is safe, actually it is not. Therefore, in this paper, we will point out what the communication between a smart card and a host is not safe, and propose a new user authentication mechanism that can reach to the PFS. And also, an encryption algorithm is used about 45% less than earlier studies in our proposed scheme. Thus, we can say that enhance the efficiency.

  • Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    You-Seok LEE  Young-Jun LEE  Dong-Guk HAN  Ho-Won KIM  Hyoung-Nam KIM  

     
    LETTER-Cryptography and Information Security

      Vol:
    E95-A No:6
      Page(s):
    1091-1094

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  • n-Dimensional Cauchy Neighbor Generation for the Fast Simulated Annealing

    Dongkyung NAM  Jong-Seok LEE  Cheol Hoon PARK  

     
    LETTER-Algorithm Theory

      Vol:
    E87-D No:11
      Page(s):
    2499-2502

    Many simulated annealing algorithms use the Cauchy neighbors for fast convergence, and the conventional method uses the product of n one-dimensional Cauchy distributions as an approximation. However, this method slows down the search severely as the dimension gets high because of the dimension-wise neighbor generation. In this paper, we analyze the orthogonal neighbor characteristics of the conventional method and propose a method of generating symmetric neighbors from the n-dimensional Cauchy distribution. The simulation results show that the proposed method is very effective for the search in the simulated annealing and can be applied to many other stochastic optimization algorithms.

1-20hit(29hit)