Learn More
People treated under the U-Health system are potential patients, and their condition is generally not critical, so most of their vital sign data are normal. Therefore, it is more efficient if the sensors attached to them send only abnormal data selectively without sending all data. In this paper, we propose an arrhythmia detection method in which ECG(More)
This paper analyzes a vulnerability in the flash controller for secure USB drives, which is meant to enable secure USB drives to prevent unauthorized access to the data stored on them. This controller divides a driver into several partitions, one of which is configured as a secure area to store secret information. Generally, secure USB drives supporting(More)
There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network and used the packets constructed based on the analysis. We(More)
In USN systems, data streams are generated from sensor nodes. It is very important to find information from these data stream because data streams present practical phenomena. Data streams have temporal properties, so we can apply sequential pattern mining methods to data streams. However, because data streams are continuous and infinite, we need to develop(More)
Passive network elements such as splitter which compose ODN for PON provide advantages on the optical access network installation and management. However, as new customers for FTTH service are increasing, needs to manage ODN more intelligently is growing. In this paper, we introduce about Smart RN(Remote Node) and design its architecture. To gather the data(More)
—In millimeter-wave communication systems with large-scale antenna arrays, conventional digital beamforming may not be cost-effective. A promising solution is the implementation of hybrid beamforming techniques, which consist of low-dimensional digital beamforming followed by analog radio frequency (RF) beamforming. This work studies the optimization of(More)