Kang G. Shin
New technologies delivered to your inbox Subscribe
Gap Sense: Lightweight Coordination of Heterogeneous Wireless Devices
5468 – A heterogeneous network enables the connection of computers and other devices that have different operating systems or protocols. Heterogeneous network devices are typically built to service specific application types that are not capable of communicating with one another directly even though they may share the same ISM radio band (i.e. use of WiFi for mobile Internet access versus use of... Read More
Method of Classifying the Program Behavior for Behavioral Detection of Malicious Programs on Mobile Handsets
3859 – The rapidly growing capability and world-wide proliferation of smart phones and mobile handhelds have begun to attract the attention of virus writers in recent years. The past three years alone have witnessed an exponential rise in the number of distinct mobile malware families to over 30, and their variants to more than 170. These malware can spread via Bluetooth and SMS/MMS messages, enable... Read More
Building Efficient Spectrum-Agile Devices for Dummies
5641 – Wireless technologies are ubiquitous in consumer and enterprise electronics. New devices and multimedia applications demand an increasing amount of data to be transferred over wireless networks, in order to meet this demand wireless devices have to make efficient use of networks. Current commercially available Wireless LAN or WiFi devices can select a frequency during startup based on the... Read More
Dynamic Reconfiguration of a Large-Scale Battery System
4302 – Electric vehicles powered with large-scale battery packs are gaining popularity as gasoline price soars. Large-scale battery packs usually consist of an estimated 12,000 battery cells connected in series and parallel, which are susceptible to battery cell failures. Currently available battery-management systems are often dedicated to micro-scale batteries based on static configuration,... Read More
System and Method for Detecting Mobile Malware Variants
4052 – Mobile users of computation and communication services have been rapidly adopting battery-powered mobile hand-helds, such as PocketPCs and SmartPhones, for their work. However, the limited battery-lifetime of these devices restricts their portability and applicability, and this weakness can be exacerbated by mobile malware targeting depletion of battery energy. Such malware are usually... Read More
Method of Modeling the Program Behavior for Behavioral Detection of Malicious Programs on Mobile Handsets
3860 – The rapidly growing capability and world-wide proliferation of smart phones and mobile handhelds have begun to attract the attention of virus writers in recent years. The past three years alone have witnessed an exponential rise in the number of distinct mobile malware families to over 30, and their variants to more than 170. These malware can spread via Bluetooth and SMS/MMS messages,... Read More
Scheduling of Battery Charge and Discharge
4442 – Electric vehicles operate inefficiently with a naïve battery management system that charges or discharges battery cells (BCs) in a battery pack based solely on application load demands. Effective scheduling (cyber) of battery charge and discharge activities, by making the most of battery characteristics (physical), can extend the battery pack’s operation-time and lifetime. ... Read More
A Behavioral Detection System for Mobile Handsets
3858 – The rapidly growing capability and world-wide proliferation of smart phones and mobile handhelds have begun to attract the attention of virus writers in recent years. The past three years alone have witnessed an exponential rise in the number of distinct mobile malware families to over 30, and their variants to more than 170. These malware can spread via Bluetooth and SMS/MMS messages,... Read More