Tai-hoon Kim
Tai-hoon Kim
Sungshin University
Verified email at daum.net
Cited by
Cited by
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
HL Yeh, TH Chen, PC Liu, TH Kim, HW Wei
Sensors 11 (5), 4767-4779, 2011
Applications, systems and methods in smart home technology: A
RJ Robles, T Kim
Int. Journal of Advanced Science And Technology 15, 37-48, 2010
Use of artificial neural network in pattern recognition
JK Basu, D Bhattacharyya, T Kim
International journal of software engineering and its applications 4 (2), 2010
A review on security in smart home development
RJ Robles, T Kim, D Cook, S Das
International Journal of Advanced Science and Technology 15, 2010
Application of genetic algorithm in software testing
PR Srivastava, T Kim
International Journal of software Engineering and its Applications 3 (4), 87-96, 2009
Smart city and IoT
T Kim, C Ramos, S Mohammed
Future Generation Computer Systems 76, 159-162, 2017
A comparative study of wireless sensor networks and their routing protocols
D Bhattacharyya, T Kim, S Pal
sensors 10 (12), 10506-10523, 2010
Soccer robotics
JH Kim, DH Kim, YJ Kim, KT Seow
Springer Science & Business Media, 2004
MHD stagnation-point flow of Casson fluid and heat transfer over a stretching sheet with thermal radiation
K Bhattacharyya
Journal of thermodynamics 2013, 2013
IT security review: Privacy, protection, access control, assurance and system security
Y Sattarova Feruza, T Kim
International journal of multimedia and ubiquitous engineering 2 (2), 17-32, 2007
Face recognition using neural network: a review
MM Kasar, D Bhattacharyya, TH Kim
International Journal of Security and Its Applications 10 (3), 81-100, 2016
Data hiding in audio signal: A review
P Dutta, D Bhattacharyya, T Kim
International journal of database theory and application 2 (2), 1-8, 2009
Context aware tools for smart home development
RJ Robles, T Kim
International Journal of Smart Home 4 (1), 1-12, 2010
Dynamic power management in new architecture of wireless sensor networks
C Lin, N Xiong, JH Park, T Kim
International Journal of communication systems 22 (6), 671-693, 2009
A survey of consistency checking techniques for UML models
M Usman, A Nadeem, T Kim, E Cho
2008 Advanced Software Engineering and Its Applications, 57-62, 2008
Palm vein authentication system: A review
I Sarkar, F Alisherov, T Kim, D Bhattacharyya
Linear correlation-based feature selection for network intrusion detection model
HF Eid, AE Hassanien, T Kim, S Banerjee
International Conference on Security of Information and Communication …, 2013
Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics
G Kumar, R Saha, MK Rai, R Thomas, TH Kim
IEEE Internet of Things Journal 6 (4), 6835-6842, 2019
An efficient edge detection approach to provide better edge connectivity for image analysis
M Mittal, A Verma, I Kaur, B Kaur, M Sharma, LM Goyal, S Roy, TH Kim
IEEE access 7, 33240-33255, 2019
A dimensionality reduction-based multi-step clustering method for robust vessel trajectory analysis
H Li, J Liu, RW Liu, N Xiong, K Wu, T Kim
Sensors 17 (8), 1792, 2017
The system can't perform the operation now. Try again later.
Articles 1–20