Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Factors associated with engraftment success of patient-derived xenografts of breast cancer

    Patient-derived xenograft (PDX) models serve as a valuable tool for the preclinical evaluation of novel therapies. They closely replicate the genetic, phenotypic, and histopathological characteristics of prima...

    Jongwon Lee, GunHee Lee, Hye Seon Park, Byung-Kwan Jeong in Breast Cancer Research (2024)

  2. Article

    Open Access

    Proteomic analysis of breast cancer based on immune subtypes

    Immunotherapy is applied to breast cancer to resolve the limitations of survival gain in existing treatment modalities. With immunotherapy, a tumor can be classified into immune-inflamed, excluded and desert b...

    Yeon** Jeon, GunHee Lee, Hwangkyo Jeong, Gyungyub Gong, JiSun Kim in Clinical Proteomics (2024)

  3. No Access

    Article

    Scalable Production of High Performance Flexible Perovskite Solar Cells via Film-Growth-Megasonic-Spray-Coating System

    Commercialization of flexible perovskite solar cells requires an effective scalable coating system that overcomes the inadequate wettability of conventional polymer-based flexible substrates. In this study, we...

    Mincheol Park, Seung Chan Hong in International Journal of Precision Enginee… (2023)

  4. Article

    Open Access

    Spider-inspired tunable mechanosensor for biomedical applications

    The recent advances of wearable sensors are remarkable but there are still limitations that they need to be refabricated to tune the sensor for target signal. However, biological sensory systems have the inher...

    Taewi Kim, Insic Hong, Yeonwook Roh, Dong** Kim, Sungwook Kim in npj Flexible Electronics (2023)

  5. No Access

    Article

    New susceptible locus, rs9428555, is associated with pediatric-onset immunoglobulin A nephropathy and immunoglobulin A vasculitis in Koreans

    Immunoglobulin A nephropathy (IgAN) is one of the most common primary forms of glomerulonephritis, while IgA vasculitis (IgAV) is the most common systemic vasculitis in children.

    Minho Lee, Gunhee Lee, Hee Gyung Kang, **-Soon Suh in Genes & Genomics (2021)

  6. No Access

    Article

    Multiscale modeling and integration of a combined cycle power plant and a two-tank thermal energy storage system with gPROMS and SimCentral

    With different computational tools, simulations ranging from detailed and rigorous mathematical models to overall process plant of black box models can be carried out. Whereas most of these computational tools...

    JaeHun Chang, GunHee Lee, Derrick Adams in Korean Journal of Chemical Engineering (2021)

  7. No Access

    Article

    Deep color transfer using histogram analogy

    We propose a novel approach to transferring the color of a reference image to a given source image. Although there can be diverse pairs of source and reference images in terms of content and composition simila...

    Junyong Lee, Hyeongseok Son, Gunhee Lee, Jonghyeop Lee, Sunghyun Cho in The Visual Computer (2020)

  8. Article

    Open Access

    Nature-inspired rollable electronics

    Inspired by the rolling mechanism of the proboscis of a butterfly, rollable electronics that can be rolled and unrolled to a great extent on demand are developed. Generally, electronic devices that are attache...

    Gunhee Lee, Yong Whan Choi, Taemin Lee, Kyung Seob Lim, Jooyeon Shin in NPG Asia Materials (2019)

  9. Article

    Open Access

    Ultra-sensitive Pressure sensor based on guided straight mechanical cracks

    Recently, a mechanical crack-based strain sensor with high sensitivity was proposed by producing free cracks via bending metal coated film with a known curvature. To further enhance sensitivity and controllabi...

    Yong Whan Choi, Daeshik Kang, Peter V. Pikhitsa, Taemin Lee in Scientific Reports (2017)

  10. No Access

    Chapter and Conference Paper

    Lightweight IEC 61850 Secure Communication Module for Microgrids

    Microgrid systems use distributed renewable energy resources to reduce dependency of traditional power systems. These energy devices are located at various places because of their characteristic and communicat...

    Yun-Sam Kim, Gunhee Lee, JungMin Kang in Advances on Broad-Band Wireless Computing,… (2017)

  11. Article

    Open Access

    High-performance Fuel Cell with Stretched Catalyst-Coated Membrane: One-step Formation of Cracked Electrode

    We have achieved performance enhancement of polymer electrolyte membrane fuel cell (PEMFC) though crack generation on its electrodes. It is the first attempt to enhance the performance of PEMFC by using cracks...

    Sang Moon Kim, Chi-Yeong Ahn, Yong-Hun Cho, Sungjun Kim in Scientific Reports (2016)

  12. No Access

    Article

    An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks

    The routing misbehavior is one of the most serious threats to wireless ad hoc networks where nodes are not forwarding messages correctly. Once the attack has been launched, nodes in the network are not able to...

    Gunhee Lee, Wonil Kim, Kangseok Kim in Peer-to-Peer Networking and Applications (2015)

  13. No Access

    Article

    IO–MAC: An Enhancement of IEEE 802.11 DCF Using Implicit Ordering

    In this paper, we present a novel medium access control protocol which is based on the IEEE 802.11 distributed coordination function (DCF) and embeds new capability allowing stations to make use of implicit or...

    Hyeonmok Ko, Gunhee Lee, Cheeha Kim in Wireless Personal Communications (2013)

  14. No Access

    Chapter and Conference Paper

    Testing the Differential Impact of Structural Paths in PLS Analysis: A Bootstrap** Approach

    Researchers are often interested in examining the relative impact of PLS structural paths. As such, this paper focuses on how one assesses the impact of various antecedent constructs to a particular endogenous...

    Wynne W. Chin, Yong ** Kim, Gunhee Lee in New Perspectives in Partial Least Squares … (2013)

  15. Chapter and Conference Paper

    A Privacy-Aware Service Protocol for Ubiquitous Computing Environments

    In a ubiquitous computing environment, every service should have the characteristic of context-awareness and location information is an important factor to grasp a user’s context. Thus, location privacy is an ...

    Gunhee Lee, Song-hwa Chae, Inwhan Hwang in Emerging Directions in Embedded and Ubiqui… (2006)

  16. Chapter and Conference Paper

    An Effective Method for Location Privacy in Ubiquitous Computing

    In ubiquitous computing environment, every service should have the characteristic of context-awareness. Since physical location is important information to grasp a user’s context, the service provider should m...

    Gunhee Lee, Wonil Kim, Dong-kyoo Kim in Embedded and Ubiquitous Computing – EUC 20… (2005)

  17. No Access

    Chapter and Conference Paper

    RPS: An Extension of Reference Monitor to Prevent Race-Attacks

    Most software involves some vulnerabilities because of various potential factors such as design flaw and program bug. Among them, a faulty assumption on file access results in a side-effect as known TOCTTOU vu...

    Jongwoon Park, Gunhee Lee, Sangha Lee in Advances in Multimedia Information Process… (2005)

  18. No Access

    Chapter and Conference Paper

    An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction

    The intrusion detection system (IDS) is used as one of the solutions against the Internet attack. However the IDS reports extremely many alerts as compared with the number of the real attack. Thus the operator...

    Jungtae Kim, Gunhee Lee, Jung-taek Seo in Information Networking. Convergence in Bro… (2005)

  19. No Access

    Chapter and Conference Paper

    Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs

    The attribute oriented induction (AOI) is a kind of aggregation method. By generalizing the attributes of the alert, it creates several clusters that includes a set of alerts having similar or the same cause. ...

    Jungtae Kim, Gunhee Lee, Jung-taek Seo in Fuzzy Systems and Knowledge Discovery (2005)

  20. No Access

    Chapter and Conference Paper

    Effective Web-Related Resource Security Using Distributed Role Hierarchy

    The recent trend of access control on the Web-related resource is that the service provider differentiates services according to the user’s attributes such as membership class or job position. For proper and s...

    Gunhee Lee, Wonil Kim, Dong-kyoo Kim in Advances in Web-Age Information Management (2004)

previous disabled Page of 2