Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Cheong Youn is active.

Publication


Featured researches published by Cheong Youn.


secure software integration and reliability improvement | 2010

Traceability Enhancement Technique through the Integration of Software Configuration Management and Individual Working Environment

Dae-Yeob Kim; Cheong Youn

Software productivity and quality improvement through software configuration management is based on organized and consistent change management. In change management, artifact identified as configuration item should be able to provide its changed history to the members in group and the members should be able to trace the changes made for the corresponding artifact. General software configuration management systems provide tracing information for artifacts only within the configuration management system, and it does not go further to changes that occur within individual working environment. This paper provides a solution that helps tracing changes that occur not only in configuration management, but also individual artifact’s changes through the integration of configuration management system and individual working environment. A revised version in configuration management system is connected to the artifact version of the working environment by the tagging technique, and traceability can be managed more effectively by sharing the tracing information.


The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology | 2007

Real-Time Distributed Simulation Environment for Air Defense System Using A Software Framework:

Byung-Gyu Cho; Dae Young Kim; Sae Hwan Kim; Cheong Youn

To solve the limitations of the test scope, test period, and budget, we have been adapting Modeling and Simulation (M&S) techniques for Test and Evaluation (T&E) of the state-of-the-art weapon systems. This paper describes the Real-time Distributed Simulation Environment (RDSE) for the Koreas medium-range surface-to-air missile system (Chelmae-II). The RDSE will be used to support the test bed and performance analysis tools for the Chelmae-II system. To develop the RDSE, this paper proposes the Air Defense Simulation Framework (ADSF) which supports the High Level Architecture (HLA) and the TCP/IP as well as a real-time simulation engine. An ADSF was successfully applied to the RDSE, and a satisfied test result was acquired through the Global Positioning System (GPS) timer.


Simulation | 2013

Development of a dynamic simulation code for the sulfur-iodine process coupled to a very high-temperature gas-cooled nuclear reactor

Jiwoon Chang; Youngjoon Shin; Ki-Young Lee; Yongwan Kim; Cheong Youn

One of the key issues in developing a sulfur–iodine (SI) thermochemical hydrogen production technology is how to operate the SI process, including the start-up operation procedure. In order to effectively establish a start-up procedure, it is necessary to develop a dynamic simulation code that can analyze the dynamic behavior of the SI process. Furthermore, a dynamic simulation is necessary for identifying the transient behaviors of the SI process by abnormal operation occurrences, which is a nuclear hydrogen process, coupled to a very high temperature gas-cooled reactor (VHTR) through an intermediate heat exchanger (IHX). In this paper, a VHTR-based SI process coupling system for a dynamic simulation code development is introduced. Component and integration modules for a dynamic simulation program including input/output graphical user interface (GUI) modules are also described, and the start-up dynamic behaviors of the SI process have been anticipated using the simulation code developed in this study. The GUI system of the dynamic simulation program, which has been developed using ChartFX and Spread 7.0, allows users to easily manage the I/O data generated from the dynamic simulation program of the SI process.


Journal of The Korean Society for Aeronautical & Space Sciences | 2011

A study on tracking method and normal point formation algorithm of new mobile SLR system in Korea

Yoon-Kyung Seo; Dong-Young Rew; Hyung-Chul Lim; Georg Kirchner; Jong-Uk Park; Cheong Youn

Korea Astronomy and Space Science Institute(KASI) has been developing one mobile SLR system since 2008 named as ARGO-M. Control logic in real-time laser ranging and data processing for normal point from the ranging data are key elements in the operation system of ARGO-M. KASI operation system team performed software logic analysis and related operations for SLR observation with help of Graz SLR station in Austria. This paper describes the algorithm required for SLR operation based on the method in Graz station. We figured out the essential logic for SLR operation and the remedy for the observation quality enhancement through this study.


Ai & Society | 2004

The hierarchical federation architecture for the interoperability of ROK and US simulations

Seung-Lyeol Cha; Thomas W. Green; Chong-Ho Lee; Cheong Youn

This paper presents the hierarchical federation architecture as it applies to the ROK-US combined exercises, such as Ulchi Focus Lens (UFL). We have analyzed and extracted the necessary improvements through the review of the simulation architecture currently used for ROK-US combined exercises and from the current ROK Armed Forces modeling and simulation (M&S) utilization. We have designed an advanced federation architecture based on a multi-federation architecture. Moreover, we have validated the usability and technical risks of our proposed architecture through development of a pilot system and its testing. Finally, we expect that this architecture will provide an enhancement in the ROK-US combined exercises while reducing costs. Furthermore, we believe that this architecture is an example to interoperate simulations with other allies.


international conference on information networking | 2015

User authentication using mobile phones for mobile payment

Soonhwa Sung; Cheong Youn; Eunbae Kong; Jae-Cheol Ryou

Mobile authentication systems for mobile payment often use either the Web or mobile channel individually to confirm the identity request of a remote user. Most common activity in mobile commerce is done through mobile phones. The mobile phones are vulnerable to numerous security threats due to involvement of valuable financial and personal information.To provide secure Web transactions using mobile phones, multifactorial authentication techniques are preferred. In former study, user authentication software technology using mobile phones, one of the multifactorial authentication techniques, can potentially be copied to another device. For the solution of the problem, this paper proposes Transaction Certificate Mode (TCM), a software token, which supports mutual authentication considering stolen, borrowed, and infected mobile phones for mobile payments. It uses a novel approach based on TCM to enforce a lightweight mobile security and provides a highly secure environment that is simple to use and deploy.


Journal of KIISE | 2015

Methodology for Traceability Management and Impact Analysis for Efficient Change Management in Object-Oriented Development

Dae-Yeob Kim; Cheong Youn

Software requirements are continuously changed for various reasons, consequently changes of software are inevitable. In the case of changes necessitated by changes in requirements, it is necessary to precisely predict the ripple effects of the changes for efficient management of the changes. This paper proposes the management method of traceability information, which can be applied in object-oriented development. Furthermore, we introduce the guidelines for prediction of the ripple effects of changes based on traceability information among artifacts composing a system. We identify traceability items for the essential artifacts which were composed of the object-oriented system, and define relationships among them. The purpose of the method proposed in this paper is to identify the scope of change precisely through the guidelines. These can then be used for tracing and analyzing the impact of the changes both the forward and backward looking, based on the relationships of traceability items.


The Kips Transactions:partd | 2011

Traceability Enhancement Technique for Dependency Relations of Software Artifacts based on the Integration of Software Configuration Management System and Personal Workspace

Dae-Yeob Kim; Cheong Youn

The ability to trace change history and dependency relations of software artifacts which are continuously changed has been recognized as an important factor that support quality management activities such as verification, validation, and testing in software system development process. General software configuration management systems provide tracing information for artifacts only within the configuration management system, and it does not go further to changes that occur within personal workspace. This paper provides a solution that helps tracing down not only changes of configuration items but also change history of artifacts existent in personal workspace through the integration of configuration management system and personal workspace. Furthermore, in cases of artifacts which are included in a configuration item, this paper provides a solution that support tracing dependency relations between the artifacts by identifying their version links. For the integration of configuration management system and personal workspace, a revision of configuration item is connected to the artifact`s version of the workspace by the tagging mechanism, and traceability for change history and dependency relations of artifacts can be managed more effectively through integrated change process.


The Kips Transactions:partd | 2009

Traceability Enhancement Technique Through the Integration of Software Configuration Management and Personal Working Space

Dae-Yeob Kim; Cheong Youn

ABSTRACT Software productivity and quality improvement through software configuration management is based on organized and consistent change management. In change management, artifact identified as configuration item should be able to provide its changed history to the members in group and the members should be able to track down the changes made for the corresponding artifact. General software configuration management systems provide tracking information for artifacts only within the configuration management system, and it does not go further to changes that occur within personal working space. This paper provides a solution that helps tracking down changes that occur not only in configuration management, but also personal artifact’s changes through the integration of configuration management system and personal working space. A revised version in configuration management system is connected to the artifact version of the working space by the tagging technique, and traceability can be managed more effectively by sharing the tracking information.Keywords:Traceability, Software Configuration Management, Version Control


computer software and applications conference | 2000

Reliable transaction design using MTS

Il-Chul Yoon; Hyung-Ho Kim; Cheong Youn; Doo-Hwan Bae

Component based development is an emerging discipline of software development. Recently, the growth of middleware technologies has brought the notion of server-side component into CBD for developing mission-critical applications. The authors propose a method for designing reliable component systems for mission-critical tasks. To this end, they formulate the MTS system (Microsoft Transaction Server) and develop a framework for describing the specification and design of component based systems and reasoning about them. For illustrating our framework, we show that the design of a simple bank example violates its specification. We strongly believe that the refactoring of transaction boundaries is common practice for improving scalability, and thus, the developed framework is useful when evaluating refactorings.

Collaboration


Dive into the Cheong Youn's collaboration.

Top Co-Authors

Avatar

Dae-Yeob Kim

Chungnam National University

View shared research outputs
Top Co-Authors

Avatar

Seung-Bock Lee

Korea Institute of Science and Technology Information

View shared research outputs
Top Co-Authors

Avatar

Soonhwa Sung

Chungnam National University

View shared research outputs
Top Co-Authors

Avatar

Byung-Gyu Cho

Agency for Defense Development

View shared research outputs
Top Co-Authors

Avatar

Eunbae Kong

Chungnam National University

View shared research outputs
Top Co-Authors

Avatar

Kyoil Chung

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Georg Kirchner

Austrian Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dong Young Rew

Korea Aerospace Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge