Skip to main content

previous disabled Page of 6
and
  1. No Access

    Chapter and Conference Paper

    Seismic Fragility Evaluation of Retrofitted Low-Rise RC Structures

    In this research, a seismic fragility evaluation is used to assess the seismic performance of low-rise RC structures retrofitted with self-centering post-tensioned pre-cast concrete (SC-PC) frame with enlarged...

    Mohamed Noureldin, **koo Kim in Innovative Solutions for Soil Structure Interaction (2020)

  2. No Access

    Chapter and Conference Paper

    Implementation of 1:N Communication Model Using Serial Communication in an RF-Based Environment

    The most important thing in the Internet of Things (IoT) is data transmission and reception between devices. Accordingly, various types of communication modules have been introduced. Currently, Bluetooth modul...

    Yeon-Ju Lee, Jeong-In Kim, Eun-Ji Lee in Advances on Broad-Band Wireless Computing,… (2018)

  3. No Access

    Chapter and Conference Paper

    Correcting Misspelled Words in Twitter Text

    The SNS became popularized by computer, mobile devices, and tablets that are accessible to the Internet. Among SNS, Twitter posts the words of short texts and, it shares information. Twitter texts are the opti...

    Jeongin Kim, Eunji Lee, Taekeun Hong, Pankoo Kim in Big Data Technologies and Applications (2017)

  4. No Access

    Chapter and Conference Paper

    The Automatic Text Summarization Using Semantic Relevance And Hierarchical Structure Of Wordnet

    In recent years, rapid development and spread of smart devices has resulted in increase in data of online documents on the Internet day by day. Growing information overload of web texts leaves users facing dif...

    JunSeok Cha, Pan Koo Kim in Advances on Broad-Band Wireless Computing,… (2017)

  5. No Access

    Chapter and Conference Paper

    A Study of Interference Cancellation for NOMA Downlink Near-Far Effect to Support Big Data

    Non-orthogonal Multiple Access (NOMA) is proposed as a new multiple access for 5G communication. However, one of the crucial constraints is near-far effect that occurs to the NOMA downlink and serial interfere...

    Shaoyu Dou, **n Su, Dongmin Choi, Pankoo Kim in Green, Pervasive, and Cloud Computing (2017)

  6. No Access

    Chapter and Conference Paper

    Korean spelling error correction using a Hangul similarity algorithm

    Increasingly people use computers for word processing. This helps reduce word processing time and fatigue of hands, but may increase the possibility of occurrence of spelling errors. Although spelling errors a...

    SeungHyeon Bak, PanKoo Kim in Advances on Broad-Band Wireless Computing,… (2017)

  7. No Access

    Chapter and Conference Paper

    Travel Destination Recommendation Based on Probabilistic Spatio-temporal Inference

    Recently, a lot of users are increasing for searching travel information through smart devices such as, tourist attractions, accommodation, entertainment, local gourmet food and so on. A general method for rec...

    Chang Choi, Junho Choi, Htet Myet Lynn in Context-Aware Systems and Applications (2016)

  8. No Access

    Chapter and Conference Paper

    A Design of Sensor Data Ontology for a Large Scale Crop Growth Environment System

    The development of various sensor and sensor network made it possible to collect environmental date from specific area, however, there is a lack of practical application to share useful information and knowled...

    Eunji Lee, Byeongkyu Ko, Chang Choi, Pankoo Kim in Scalable Information Systems (2015)

  9. No Access

    Chapter and Conference Paper

    Detecting Abnormal Behavior in SCADA Networks Using Normal Traffic Pattern Learning

    SCADA systems have been upgraded from the standard serial bus systems to modern TCP/IP based systems. The Modbus protocol is one of the most widely used protocols in SCADA networks. However, it provides no inh...

    Byoung-Koo Kim, Dong-Ho Kang, Jung-Chan Na in Computer Science and its Applications (2015)

  10. No Access

    Chapter and Conference Paper

    An automatic dosimetric and geometric tracking system for head and neck adaptive radiotherapy

    The ability to track changes in tumors and organs at risk over a course of radiotherapy is essential for successful adaptive radiation therapy (ART). To that end, we have developed a software suite that helps ...

    Chang Liu, Akila Kumarasiri, Mona Kamal in World Congress on Medical Physics and Biom… (2015)

  11. Chapter and Conference Paper

    Low Ambiguity First Algorithm: A New Approach to Knowledge-Based Word Sense Disambiguation

    The Word Sense Disambiguation (WSD) problem has been considered as one of the most important challenging task in Natural Language Processing (NLP) research area. Even though, many of scientists applied the rob...

    Dong** Choi, Myunggwon Hwang, Byeongkyu Ko, Sicheon You, Pankoo Kim in HCI in Business (2015)

  12. No Access

    Chapter and Conference Paper

    A Method for Normalizing Non-standard Words in Online Social Network Services: A Case Study on Twitter

    Due to the big developments of Smartphone devices and on-line social network services, people can share diverse information about what they have been experienced during a day with no constrain to time or locat...

    Dong** Choi, Jeongin Kim, Pankoo Kim in Context-Aware Systems and Applications (2014)

  13. No Access

    Chapter and Conference Paper

    Design of Industrial Firewall System Based on Multiple Access Control Filter

    Although existing control systems have been developed and operated independently, the development of information technology has made access to control systems easier. Note, however, that such advancement of co...

    Byoungkoo Kim, Dong-Ho Kang, Jung-Chan Na in Frontier and Innovation in Future Computin… (2014)

  14. Chapter and Conference Paper

    A Design of Web Log Integration Framework Using NoSQL

    Webservice is a software technology as the representative method of information communication currently used to create a dynamic system environment that is configured to fulfill its users’ needs. Therefore, an...

    Hui** Jeong, Junho Choi, Chang Choi, Ilsun You in Information and Communication Technology (2014)

  15. No Access

    Chapter and Conference Paper

    Whitelist Generation Technique for Industrial Firewall in SCADA Networks

    The use of SCADA systems has been increased since the 1960s as a need arose to more efficiently monitor and control the status of remote equipment. But, they are becoming more and more vulnerable to cyber-atta...

    Dong-Ho Kang, Byoung-Koo Kim, Jung-Chan Na in Frontier and Innovation in Future Computin… (2014)

  16. No Access

    Chapter and Conference Paper

    Sentiment Analysis for Tracking Breaking Events: A Case Study on Twitter

    Social media such as Twitter and Facebook can be considered as a new media different from the typical media group. The information on social media spread much faster than any other traditional news media due t...

    Dong** Choi, Pankoo Kim in Intelligent Information and Database Systems (2013)

  17. Chapter and Conference Paper

    Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter

    Social network services such as Twitter and Facebook can be considered as a new media different from the typical media group. The information on social media spread much faster than any other traditional news ...

    Dong** Choi, Ilsun You, Pankoo Kim in Information and Communication Technology (2013)

  18. Chapter and Conference Paper

    Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding

    Socially and economically, the distributed denial-of-service (DDoS) attacks have been serious threats in the cyber world. Despite of many researches, current defense methods can be vulnerable to the DDoS attac...

    Daewon Kim, Byoungkoo Kim, Ikkyun Kim in Information and Communications Security (2012)

  19. No Access

    Chapter and Conference Paper

    Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks

    Distributed Denial-of-Service (DDoS) attacks are made in such a way that a plurality of zombie computers infected with malicious code simultaneously makes Denial-of-Service (DoS) attacks. These DDoS attacks st...

    Hyunjoo Kim, Byoungkoo Kim, Daewon Kim, Ik-Kyun Kim in Information Security Applications (2012)

  20. No Access

    Chapter and Conference Paper

    A Term Normalization Method for Better Performance of Terminology Construction

    The importance of research on knowledge management is growing due to recent issues with big data. The most fundamental steps in knowledge management are the extraction and construction of terminologies. Terms ...

    Myunggwon Hwang, Do-Heon Jeong, Hanmin Jung in Artificial Intelligence and Soft Computing (2012)

previous disabled Page of 6