Home Intro home home home home home home
 

International_A

International_B

International_C

Domestic_J

Domestic_C

Patents



International Journals Group A

*

S.M. Nam and T.H. Cho, "Context-Aware Architecture for Probabilistic Voting-based Filtering Scheme in Sensor Networks", IEEE Transactions on Mobile Computing, vol. 16 (10), pp. 2751-2763, Oct. 2017

*

Muhammad K. Shahzad and Tae Ho Cho, "A Network Density-adaptive Improved CCEF Scheme for Enhanced Network Lifetime, Energy efficiency, and Filtering in WSNs", Ad Hoc & Sensor Wireless Networks, vol. 35 (1-2), pp 129-149, Apr. 10, 2017.

*

Muhammad K. Shahzad and Tae Ho Cho, "An Energy-aware Routing and Filtering node (ERF) selection in CCEF to extend Network lifetime in WSN", IETE Journal of Research, vol. 62 (6), pp. 1-13, Feb. 2017.

*

Muhammad Akram and Tae Ho Cho, "Energy efficient fuzzy adaptive selection of verification nodes in wireless sensor networks", Ad Hoc Networks, Elsevier, vol. 47, pp. 16-25, Sep. 2016.
  • Muhammad K. Shahzad and T.H. Cho, "Extending the Network Lifetime by Pre-deterministic Key Distribution in CCEF in Wireless Sensor Networks," Wireless Networks, Springer, vol. 21, No. 8, pp. 2799-2809. Nov. 2015.

    *

    S.M. Nam and T.H. Cho, "A Fuzzy Rule-based Path Configuration Method for LEAP in Sensor Networks," Ad Hoc Networks, Elsevier, vol. 31, pp. 63-79, Aug. 2015.

    *

    S.Y. Moon and T.H. Cho, "A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks," The Scientific World Journal, Hindawi, vol. 2014, pp. 1-12, Jul. 2014.
  • J.M. Kim and T.H. Cho, "Location-Based Key Management Structure for Secure Group Communication in Wireless Sensor Networks," IEICE Transactions on Communications, IEICE, vol. E96-B, no. 9, pp. 2183-2189, Sep. 2013.
  • S.Y. Moon and T.H. Cho, "Key Index-Based Routing for Filtering False Event Reports in Wireless Sensor Networks," IEICE Transactions on Communications, IEICE, vol. E95-B, no. 9, pp. 2807-2814, Sep. 2012.

    *

    J.M. Kim and T.H. Cho, "A* Based Metal Grating Layout Method for Cutting Plan Process," Information, International Information, vol. 14, no. 11, pp. 3673-3682, Nov. 2011.
  • H.Y. Lee and T.H. Cho, "Optimized Fuzzy adaptive Filtering for Ubiquitous Sensor Networks," IEICE Transactions on Communications, IEICE, vol. E94-B, no. 6, pp. 1648-1656, Jun. 2011.

    *

    J.M. Kim, Y.S. Han, H.Y. Lee and T.H. Cho "Path Renewal Method in Filtering Based Wireless Sensor Networks," Sensors, MDPIAG, vol. 11, pp. 1396-1404, Jan. 2011.
  • H.Y. Lee and T.H. Cho, "A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks," IEICE Transactions on Communications, IEICE, vol. E93-B, no. 7, pp. 1881-1889, Jul. 2010.

    *

    H.Y. Lee, S.M. Park and T.H. Cho, "Simulation Modeling of SAM Fuzzy Logic Controllers," IEICE Transactions on Information and Systems, IEICE, vol. E93-D, no. 7, pp. 1984-1986, Jul. 2010.

    *

    P.T. Nghiem and T.H. Cho, "A Multi-path Interleaved Hop by Hop En-route Filtering Scheme in Wireless Sensor Networks," Computer Communications, Elsevier, vol. 33, issue 10, 1202-1209, Jun. 2010.

    *

    H.Y. Lee and T.H. Cho, "Fuzzy-Based Path Selection Method for Improving the Detection of False Reports in Sensor Networks," IEICE Transactions on Information and Systems, IEICE, vol. E92-D, no. 8, pp.1574-1576, Aug. 2009.

    *

    C.I. Sun, H.Y. Lee and T.H. Cho, "A Path Selection Method for Improving the Detection Power of the Statistical Filtering in Sensor Networks," Journal of Information Science and Engineering, Institute of Information Science, Vol. 25, No. 4, pp. 1163-1175, Jul. 2009.
  • P.T. Nghiem and T.H. Cho, "A Fuzzy-Based Interleaved Multi-Hop Authentication Scheme in Wireless Sensor Networks," Journal of Parallel and Distributed Computing, Elsevier, vol. 69, issue 5, pp. 441-450, May 2009.

    *

    S.R. Kim, H.Y. Lee and T.H. Cho, "Fuzzy Adaptive Partitioning Method for the Statistical Filtering," IEICE Transactions on Information and Systems, IEICE, vol. E91-D, no. 7, pp.2065-2067, Jul. 2008.

    *

    J.M. Kim and T.H. Cho, "A* based Key Tree Structure Generation for Group Key Management in Wireless Sensor Networks," Computer Communications, Elsevier, vol. 31, issue 10, pp. 2414-2419, Jun. 2008.
  • H.Y. Lee and T.H. Cho, "A* based layout design for gratings allocation," Computer-Aided Design, Elsevier, vol. 40, issue 4, pp. 455-464, Apr. 2008.

    *

    M.S. Kim and T.H. Cho, "A Multipath En-Route Filtering Method for Dropping in Sensor Networks," IEICE Transactions on Information and Systems, IEICE, vol. E90-D, no. 12, pp.2108-2109, Dec. 2007.
  • H.Y. Lee and T.H. Cho, "Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks," IEICE Transactions on Communications, IEICE, vol. E90-B, no. 12, pp. 3346-3353, Dec. 2007.

    *

    S.H. Chi and T.H. Cho, "Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion based Sensor Networks," Lecture Notes in Artificial Intelligence, Springer Verlag, LNAI 4223, pp. 725-734, Sep. 2006.

    *

    M.R. Yi, J.H. Hong and T.H. Cho, "Genetic Algorithms for Improving Material Utilization in Manufacturing," Lecture Notes in Computer Science, Springer Verlag, LNCS 4113, pp. 717-724, Aug. 2006.

    *

    S.H. Chi and T.H. Cho, "Fuzzy Logic based Propagation Limiting Method for message routing in Wireless Sensor Networks," Lecture Notes in Computer Science, Springer Verlag, LNCS 3983, pp. 58-67, May 2006.

    *

    H.S. Seo and T.H. Cho, "Application of Fuzzy Logic for Distributed Intrusion Detection," Lecture Notes in Artificial Intelligence, Springer Verlag, LNAI 3802, pp. 340-347, Dec. 2005.

    *

    S.B. Baeg and T.H. Cho, "Transmission Relay Method for Balanced Energy Depletion in Wireless Sensor Network Using Fuzzy Logic," Lecture Notes in Artificial Intelligence, Springer Verlag, LNAI 3614, pp. 998-1007, Aug. 2005.

    *

    W.Y. Lee, H.S. Seo and T.H. Cho, "Modeling of policy-based network with SVDB," Lecture Notes in Artificial Intelligence, Springer Verlag, LNAI 3397, pp. 323-332, Feb. 2005.

    *

    M.R. Yi and T.H. Cho, "Simulation Modeling with Hierarchical Planning: Application to a metal manufacturing system," Lecture Notes in Artificial Intelligence, Springer Verlag, LNAI 3397, pp. 71-80, Feb. 2005.

    *

    H.S. Seo and T.H. Cho, "Distributed Security Agent Modeling in the Policy-based Networking," Lecture Notes in Computer Science, Springer Verlag, LNCS 3320, pp. 782-786, Dec. 2004.

    *

    H.J. Kim, J.M. Kim, K.S. Lee, H.S. Lee and T.H. Cho, "Simulation-based Security Testing for Continuity of Essential Service," Lecture Notes in Computer Science, Springer Verlag, LNCS 3043, pp. 567-576, May 2004.

    *

    H.S. Seo and T.H. Cho, "Simulation Model Design of Security System based on Policy-Based Framework," Transactions of The Society for Modeling and Simulation International, vol. 79, no. 9, pp. 515-527, Sep. 2003.

    *

    M.R. Yi and T.H. Cho, "Hierarchical Simulation Model with Animation," Engineering with Computers, Springer, vol. 19, no. 2-3, pp. 203-212, Aug. 2003.

    *

    H.S. Seo and T.H. Cho, "An application of blackboard architecture for the coordination among the security systems," Simulation Modelling Practice and Theory, Elsevier Science B.V., vol. 11, issues 3-4, pp. 269-284, Jul. 2003.

    *

    H.S. Seo, T.H. Cho and S.D. Chi, "Modeling and Simulation of Distributed Security Models," Lecture Notes in Computer Science, Springer Verlag, LNCS 2660, pp. 809-818, Jun. 2003.

    *

    G.Y. Lee, J.S. Kim and T.H. Cho, "Generalized Fibonacci Functions and Sequences of Generalized Fibonacci Functions," The Fibonacci Quarterly, vol. 41, no. 2, pp. 108-121, May 2003.

    *

    T.H. Cho, "Embedding intelligent planning capability to DEVS Models by Goal Regression Method," Transactions of The Society for Modeling and Simulation International, vol. 78, no. 12, pp. 716-730, May 2003.

    *

    J.Y. Koh, M.R. Yi, T.H. Cho, H.J. Kim and H.G. Kim, "Knowledge-based modeling and simulation of network access control mechanisms representing security policies," Lecture Notes in Computer Science, Springer Verlag, LNCS 2513, pp. 374-385, Dec. 2002.

    *

    H.S. Seo and T.H. Cho, "Modeling and Simulation for Detecting a Distributed Denial of Service Attack," Lecture Notes in Artificial Intelligence, Springer Verlag, LNAI 2557, pp. 179-190, Dec. 2002.

    *

    H.S. Seo and T.H. Cho, "Simulation of Network Security with Collaboration among IDS Models," Lecture Notes in Artificial Intelligence, Springer Verlag, LNAI 2256, pp. 438-448, Dec. 2001.

    *

    M.R. Yi and T.H. Cho, "Simulation Modeling with Hierarchical Animation for Large Network Security," Lecture Notes in Computer Science, Springer Verlag, LNCS 2229, pp. 456-466, Nov. 2001.

    *

    T.H. Cho and H.J. Kim, "DEVS Simulation of Distributed Intrusion Detection System," Transactions of the Society for Computer Simulation International, vol. 18, no. 3, pp. 133-146, Sep. 2001.
  • T.H. Cho, Bernard P.Zeigler, "Simulation of Intelligent Hierarchical Flexible Manufacturing : Batch Job Routing in Operation Overlapping," IEEE Transactions on Systems, Man and Cybernetics-PART A : System and Humans, IEEE, vol. 27, no. 1, pp. 116-126, Jan. 1997.
  • Bernard P.Zeigler, T.H. Cho and J.W. Rozenblit, "A knowledge-based simulation environment for hierarchical flexible manufacturing ," IEEE Transactions on Systems, Man and Cybernetics-PART A, IEEE, vol. 26, no. 1, pp. 81-89, Jan. 1996.
    
    Copyright, 2013 by Intelligence Modeling Laboratory. All rights reserved.