Skip to main content

and
  1. No Access

    Article

    Exploring horticultural traits and disease resistance in Capsicum baccatum through segmental introgression lines

    Segmental introgression and advanced backcross lines were developed and validated as important tools for improving agronomically important traits in pepper, offering improved sensitivity in detecting quantitat...

    **kwan Jo, Geon Woo Kim, Seungki Back, Siyoung Jang in Theoretical and Applied Genetics (2023)

  2. Article

    Open Access

    Genome-wide association study of resistance to anthracnose in pepper (Capsicum chinense) germplasm

    Anthracnose is a fungal disease caused by Colletotrichum spp. that has a significant impact on worldwide pepper production. Colletotrichum scovillei is the most common pathogenic anthracnose-causing species in th...

    Nayoung Ro, Mesfin Haile, Onsook Hur, Ho-Cheol Ko, Jung-Yoon Yi in BMC Plant Biology (2023)

  3. Article

    Open Access

    The role of N6-methyladenosine modification in the life cycle and disease pathogenesis of hepatitis B and C viruses

    N6-methyladenosine (m6A) is the most prevalent modification of mammalian cellular RNAs. m6A methylation is linked to epigenetic regulation of several aspects of gene expression, including RNA stability, splicing,...

    Geon-Woo Kim, Aleem Siddiqui in Experimental & Molecular Medicine (2021)

  4. No Access

    Article

    A tiny retraction of the pars flaccida may conceal an attic cholesteatoma

    The purpose of this study was to evaluate the possibility of attic cholesteatomas concealed within a tiny retraction of the pars flaccida (classification of Tos and Poulsen type I or II attic retraction) in pa...

    Geon Woo Kim, Hwi Kyeong Jung, Jae Moon Sung in European Archives of Oto-Rhino-Laryngology (2020)

  5. No Access

    Chapter and Conference Paper

    Early Wildfire Detection Using Convolutional Neural Network

    Wildfires are one of the disasters that are difficult to detect early and cause significant damage to human life, ecological systems, and infrastructure. There have been several research attempts to detect wi...

    Seon Ho Oh, Sang Won Ghyme, Soon Ki Jung, Geon-Woo Kim in Frontiers of Computer Vision (2020)

  6. No Access

    Article

    Genome divergence in Brassica rapa subspecies revealed by whole genome analysis on a doubled-haploid line of turnip

    Subspecies of Brassica rapa are morphologically and genetically diverse, and include a variety of fresh vegetables grown worldwide. Among them, turnip (B. rapa subsp. rapa) produces a large bulbous taproot, and t...

    Hye Rang Park, Taegu Kang, Gibum Yi, Seung Hwa Yu in Plant Biotechnology Reports (2019)

  7. No Access

    Chapter

    Development of a Physical Security Gateway for Connectivity to Smart Media in a Hyper-Connected Environment

    Due to the rapid technological growth of smart media and the rapid spread of convenience through increased convenience, most individuals have smart media, and many person information is stored on a server conn...

    Yong-Kyun Kim, Geon Woo Kim in Computational Science/Intelligence & Appli… (2019)

  8. No Access

    Chapter and Conference Paper

    Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing

    Recently, deep neural network and cloud computing based intelligent video surveillance technology are growing interests in the industrial and academia. The synergy with both technologies emerges as a key role ...

    Kyung-Soo Lim, Seoung-Hyeon Lee in Parallel and Distributed Computing, Applic… (2019)

  9. No Access

    Article

    Surface-Plasmon Assisted Transmission Through an Ultrasmall Nanohole of ~ 10 nm with a Bull’s Eye Groove

    We simulate the light transmission through an extremely small nanoscale aperture having a 10 nm diameter punctured in a metal film positioned at the center of a plasmonic bull’s eye grating. A considerable dir...

    Geon Woo Kim, Jae-Hyeon Ko, Doo Jae Park in Journal of the Korean Physical Society (2018)

  10. No Access

    Article

    Deep feature learning for person re-identification in a large-scale crowdsourced environment

    Finding the same individual across cameras in disjoint views at different locations and times, which is known as person re-identification (re-id), is an important but difficult task in intelligent visual surve...

    Seon Ho Oh, Seung-Wan Han, Bum-Suk Choi, Geon-Woo Kim in The Journal of Supercomputing (2018)

  11. No Access

    Article

    Compact deep learned feature-based face recognition for Visual Internet of Things

    The Visual Internet of Things has received much attention in recent years due to its ability to get the object location via image information of the scene, attach the visual label to the object, and then retur...

    Seon Ho Oh, Geon-Woo Kim, Kyung-Soo Lim in The Journal of Supercomputing (2018)

  12. Article

    Open Access

    HA1077 displays synergistic activity with daclatasvir against hepatitis C virus and suppresses the emergence of NS5A resistance-associated substitutions in mice

    The kinase C-related kinase 2 (PRK2), which phosphorylates hepatitis C virus (HCV) RNA polymerase, is a proviral factor enhancing HCV replication. Here, we report on the in vivo anti-HCV efficacy of HA1077, which...

    Seung-Hoon Lee, Jae-Su Moon, Bo-Yeong Pak, Geon-Woo Kim, Wooseong Lee in Scientific Reports (2018)

  13. Article

    Open Access

    Vibrio vulnificus quorum-sensing molecule cyclo(Phe-Pro) inhibits RIG-I-mediated antiviral innate immunity

    The recognition of pathogen-derived ligands by pattern recognition receptors activates the innate immune response, but the potential interaction of quorum-sensing (QS) signaling molecules with host anti-viral ...

    Wooseong Lee, Seung-Hoon Lee, Minwoo Kim, Jae-Su Moon in Nature Communications (2018)

  14. No Access

    Chapter and Conference Paper

    Prototype System Design for Large-Scale Person Re-identification

    Identifying a person across cameras in disjoint views at different time and location has important applications in visual surveillance. However, it is difficult to apply existing methods to the development of...

    Seon Ho Oh, Seung-Wan Han, Beom-Seok Choi in Advanced Multimedia and Ubiquitous Enginee… (2017)

  15. No Access

    Chapter and Conference Paper

    Face Recognition for Mobile Self-authentication with Online Model Update

    Face recognition system encounters complex change that varies over time, due to a limited control over the environment. So, the facial model of an individual tends to diverse from underlying distribution that ...

    Seon Ho Oh, Geon-Woo Kim in Advanced Multimedia and Ubiquitous Engineering (2017)

  16. No Access

    Chapter and Conference Paper

    ID Globalization Across Multiple Convergence Spaces Using Smart Cameras

    This paper suggests a scheme for ID globalization, wherein the single successful authentication at initial stage requires no further authentication check while traversing multiple convergence spaces. This is d...

    Geon Woo Kim, Jong Wook Han in Ubiquitous Information Technologies and Applications (2013)

  17. Article

    Open Access

    Application of the Western-based adjuvant online model to Korean colon cancer patients; a single institution experience

    Adjuvant Online (AOL) is web-accessible risk-assessment model that predicts the mortality and the benefits of adjuvant therapy (http://www.newadjuvantonline.com

    Minkyu Jung, Geon Woo Kim, Inkyung Jung, Joong Bae Ahn, Jae Kyung Roh in BMC Cancer (2012)

  18. Chapter and Conference Paper

    Security Technologies Based on Home Gateway for Making Smart Home Secure

    As home network is expanding into ubiquitous computing environment and lots of private information is accessible, it is required to protect home network system from illegal accesses and security threats in ope...

    Geon Woo Kim, Deok Gyu Lee, Jong Wook Han in Emerging Directions in Embedded and Ubiqui… (2007)

  19. No Access

    Chapter and Conference Paper

    Security Framework for Home Network: Authentication, Authorization, and Security Policy

    As a number of home network services are available and home network is expanding into ubiquitous computing environment, we need to protect home network system from illegal accesses and a variety of threats. Ho...

    Geon Woo Kim, Deok Gyu Lee, Jong Wook Han in Emerging Technologies in Knowledge Discove… (2007)

  20. No Access

    Chapter and Conference Paper

    Security Policy Deployment in IPsec

    Security policy system defines the basic rules and strategies for information security systems, e.g., IPsec, IKE, and Firewalls. But due to the heterogeneous network security systems and the corresponding appl...

    Geon Woo Kim, So Hee Park, Jae Hoon Nah in Information Networking: Wireless Communica… (2002)