Do Hyeon Lee

Orcid: 0009-0000-1972-5448

According to our database1, Do Hyeon Lee authored at least 13 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Design Technique of Open-Slot Surface-Mounted PM Machines Using Coenergy-Based Subdomain Model and Teaching-Learning-Based Optimization Algorithm.
IEEE Access, 2024

2019
Novel routing protocol scheme for real-time applications in mobile Ad Hoc networks.
Clust. Comput., 2019

2014
IKEv2 authentication exchange model and performance analysis in mobile IPv6 networks.
Pers. Ubiquitous Comput., 2014

Optimizing image processing on multi-core CPUs with Intel parallel programming technologies.
Multim. Tools Appl., 2014

2012
Intelligent Control System for Railway Level Crossing Safety.
Proceedings of the International Conference on IT Convergence and Security, 2012

2009
Derivation and Analysis of Link/Route Maintenance Probability In Multi Hop Mobile Ad Hoc Networks.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Enhanced next hop selection scheme for QoS support in multi-hop wireless networks.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

2008
WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

2007
Mobile Agent Based Intrusion Detection System Adopting Hidden Markov Model.
Proceedings of the Computational Science and Its Applications, 2007

Location-Aided Secure Routing Scheme in Mobile Ad Hoc Networks.
Proceedings of the Computational Science and Its Applications, 2007

A Design of Fair Blind Signatures Protocol Using PVNIOT.
Proceedings of the Computational Science and Its Applications, 2007

An Access Control Using SPKI Certificate in Peer-to-Peer Environment.
Proceedings of the Computational Science and Its Applications, 2007

2006
Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006


  Loading...