User profiles for Shiho Kim

Shiho Kim

School of Integrated Technology, Yonsei University
Verified email at yonsei.ac.kr
Cited by 4732

Branch based blockchain technology in intelligent vehicle

M Singh, S Kim - Computer Networks, 2018 - Elsevier
Intelligent vehicle (IV) is an internet-enabled vehicle, commonly referred to as a self-driving
car, which enables vehicles-to-everything communications. This communication environment …

Blockchain: A game changer for securing IoT data

M Singh, A Singh, S Kim - 2018 IEEE 4th World Forum on …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is now in its initial stage but very soon, it is going to influence almost
every day-to-day items we use. The more it will be included in our lifestyle, more will be the …

A 5.1-/spl mu/W UHF RFID tag chip integrated with sensors for wireless environmental monitoring

N Cho, SJ Song, S Kim, S Kim… - Proceedings of the 31st …, 2005 - ieeexplore.ieee.org
An RF-powered transponder with temperature and photo sensors is designed and
fabricated for environmental monitoring. The transponder gathers power from external ISM (860-…

A thermoelectric generator using engine coolant for light-duty internal combustion engine-powered vehicles

S Kim, S Park, S Kim, SH Rhi - Journal of electronic materials, 2011 - Springer
We proposed and fabricated a thermoelectric generator (TEG) using the engine water coolant
of passenger vehicles. The experimental results revealed that the maximum output power …

Evolution of V2X communication and integration of blockchain for security enhancements

R Shrestha, SY Nam, R Bajracharya, S Kim - Electronics, 2020 - mdpi.com
With the rapid evolution in wireless communications and autonomous vehicles, intelligent and
autonomous vehicles will be launched soon. Vehicle to Everything (V2X) communications …

Blockchain based intelligent vehicle data sharing framework

M Singh, S Kim - arXiv preprint arXiv:1708.09721, 2017 - arxiv.org
The Intelligent vehicle (IV) is experiencing revolutionary growth in research and industry, but
it still suffers from many security vulnerabilities. Traditional security methods are incapable …

6G enabled unmanned aerial vehicle traffic management: A perspective

R Shrestha, R Bajracharya, S Kim - IEEE Access, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) and UAV traffic management (UTM) have drawn attention
for applications such as parcel delivery, aerial mapping, agriculture, and surveillance based …

Analysis and modeling of effective temperature differences and electrical parameters of thermoelectric generators

S Kim - Applied energy, 2013 - Elsevier
We have derived an analytic model describing the interior temperature difference as a function
of the load current of a thermoelectric generator (TEG); we have also proposed a method …

Blockchain technology for decentralized autonomous organizations

M Singh, S Kim - Advances in computers, 2019 - Elsevier
With continuously changing operational and business needs of the organizations, Decentralized
Autonomous Organizations (DAO) is the current need of the organizations. Centralized …

Machine-learning-enabled intrusion detection system for cellular connected UAV networks

R Shrestha, A Omidkar, SA Roudi, R Abbas, S Kim - Electronics, 2021 - mdpi.com
The recent development and adoption of unmanned aerial vehicles (UAVs) is due to its
wide variety of applications in public and private sector from parcel delivery to wildlife …