• Citations Per Year
Learn More
People treated under the U-Health system are potential patients, and their condition is generally not critical, so most of their vital sign data are normal. Therefore, it is more efficient if the sensors attached to them send only abnormal data selectively without sending all data. In this paper, we propose an arrhythmia detection method in which ECG(More)
There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network and used the packets constructed based on the analysis. We(More)
This paper analyzes a vulnerability in the flash controller for secure USB drives, which is meant to enable secure USB drives to prevent unauthorized access to the data stored on them. This controller divides a driver into several partitions, one of which is configured as a secure area to store secret information. Generally, secure USB drives supporting(More)
In millimeter-wave communication systems with large-scale antenna arrays, conventional digital beamforming may not be cost-effective. A promising solution is the implementation of hybrid beamforming techniques, which consist of low-dimensional digital beamforming followed by analog radio frequency (RF) beamforming. This work studies the optimization of(More)
Passive network elements such as splitter which compose ODN for PON provide advantages on the optical access network installation and management. However, as new customers for FTTH service are increasing, needs to manage ODN more intelligently is growing. In this paper, we introduce about Smart RN(Remote Node) and design its architecture. To gather the data(More)
In this paper, we study self energy recycling techniques for point-to-point multiple-input multiple-output systems where a full-duplex transmitter with multiple antennas communicates with a multi-antenna receiver. Due to the full-duplex nature, the transmitter receives a signal transmitted by itself through a loop-back channel. Then, the energy of the(More)
Recently, security concerns to automobiles are rapidly increasing. When threats are found in a vehicular system, this may usually take time to acquire adequate countermeasures. Threats to a vehicle can be classified into three categories: theft of in-vehicle devices, penetration into the internal network and utilization of the external network. This paper(More)