Seok-Man Kim

  • Citations Per Year
Learn More
This paper presents an implementation of IEEE802.11a wireless LAN system including a baseband processor and MAC (medium access control). We introduce some innovative techniques improving the performance as well as to fulfill the mandatory requirement of the standard. The evaluation system consists of a test-board with the fabricated base band processor chip(More)
ash functions are a special family of cryptographic algorithms, which are applied widely wherever message integrity and authentication issues are critical. It is used in many security protocol like that TLS, SSL, PGP, SSH and IPSec. In this paper, we propose a high performance Hash coding architecture that computes next round coefficient in the present(More)
Spermatogonial stem cells (SSCs) are essential for spermatogenesis throughout the lifespan of the male. However, the rarity of SSCs has raised the need for an efficient selection method, but little is known about culture conditions that stimulate monkey SSC proliferation in vitro. In this study, we report the development of effective enrichment techniques(More)
A Memristor theorized by Chua in 1971 has the potential to dramatically influence the way electronic circuits are designed. It is a two terminal device whose resistance state is based on the history of charge flow brought about as the result of the voltage being applied across its terminals and hence can be thought of as a special case of a reconfigurable(More)
  • 1