Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Euijong Lee is active.

Publication


Featured researches published by Euijong Lee.


Expert Systems With Applications | 2017

Personalized recommender system based on friendship strength in social network services

Young Duk Seo; Young Gab Kim; Euijong Lee; Doo Kwon Baik

Abstract The rapid growth of social network services has produced a considerable amount of data, called big social data. Big social data are helpful for improving personalized recommender systems because these enormous data have various characteristics. Therefore, many personalized recommender systems based on big social data have been proposed, in particular models that use people relationship information. However, most existing studies have provided recommendations on special purpose and single-domain SNS that have a set of users with similar tastes, such as MovieLens and Last.fm; nonetheless, they have considered closeness relation. In this paper, we introduce an appropriate measure to calculate the closeness between users in a social circle, namely, the friendship strength. Further, we propose a friendship strength-based personalized recommender system that recommends topics or interests users might have in order to analyze big social data, using Twitter in particular. The proposed measure provides precise recommendations in multi-domain environments that have various topics. We evaluated the proposed system using one months Twitter data based on various evaluation metrics. Our experimental results show that our personalized recommender system outperforms the baseline systems, and friendship strength is of great importance in personalized recommendation.


Information & Software Technology | 2018

RINGA: Design and verification of finite state machine for self-adaptive software at runtime

Euijong Lee; Young Gab Kim; Young Duk Seo; Kwangsoo Seol; Doo Kwon Baik

Abstract Context In recent years, software environments such as the cloud and Internet of Things (IoT) have become increasingly sophisticated, and as a result, development of adaptable software has become very important. Self-adaptive software is appropriate for todays needs because it changes its behavior or structure in response to a changing environment at runtime. To adapt to changing environments, runtime verification is an important requirement, and research that integrates traditional verification with self-adaptive software is in high demand. Objective Model checking is an effective static verification method for software, but existing problems at runtime remain unresolved. In this paper, we propose a self-adaptive software framework that applies model checking to software to enable verification at runtime. Method The proposed framework consists of two parts: the design of self-adaptive software using a finite state machine and the adaptation of the software during runtime. For the first part, we propose two finite state machines for self-adaptive software called the self-adaptive finite state machine (SA-FSM) and abstracted finite state machine (A-FSM). For the runtime verification part, a self-adaptation process based on a MAPE (monitoring, analyzing, planning, and executing) loop is implemented. Results We performed an empirical evaluation with several model-checking tools (i.e., NuSMV and CadenceSMV), and the results show that the proposed method is more efficient at runtime. We also investigated a simple example application in six scenarios related to the IoT environment. We implemented Android and Arduino applications, and the results show the practical usability of the proposed self-adaptive framework at runtime. Conclusions We proposed a framework for integrating model checking with a self-adaptive software lifecycle. The results of our experiments showed that the proposed framework can achieve verify self-adaptation software at runtime.


IEEE Access | 2018

Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System

Kwangsoo Seol; Young Gab Kim; Euijong Lee; Young Duk Seo; Doo Kwon Baik

Cloud-based electronic health record (EHR) systems enable medical documents to be exchanged between medical institutions; this is expected to contribute to improvements in various medical services in the future. However, as the system architecture becomes more complicated, cloud-based EHR systems may introduce additional security threats when compared with the existing singular systems. Thus, patients may experience exposure of private data that they do not wish to disclose. In order to protect the privacy of patients, many approaches have been proposed to provide access control to patient documents when providing health services. However, most current systems do not support fine-grained access control or take into account additional security factors such as encryption and digital signatures. In this paper, we propose a cloud-based EHR model that performs attribute-based access control using extensible access control markup language. Our EHR model, focused on security, performs partial encryption and uses electronic signatures when a patient’s document is sent to a document requester. We use XML encryption and XML digital signature technology. Our proposed model works efficiently by sending only the necessary information to the requesters who are authorized to treat the patient in question.


Journal of KIISE | 2014

An Evaluation Method for Contents Importance Based on Twitter Characteristics

Euijong Lee; Jeong-Dong Kim; Doo-Kwon Baik

Twitter is a social network service that generates about 140 million contents a day. Contents of Twitter contain a variety of information and many researchers research those in various fields. In this research, we propose a method for evaluating the importance of content based on characteristics of Twitter. We have found that number of follower means users popularity and Re-tweet that means the popularity of content. We perform experiments about proposed method using real Twitter data for proving effectiveness of proposed method. Also, we found information providers in Twitter are public user who represent a company or a representative of a specific group.


Expert Systems With Applications | 2018

An enhanced aggregation method considering deviations for a group recommendation

Young Duk Seo; Young Gab Kim; Euijong Lee; Kwang Soo Seol; Doo Kwon Baik

Abstract The goal of a group recommendation involves providing appropriate information for all members in a group. Most extant studies use aggregation methods to determine group preferences. An aggregation method is an approach that aggregates individual preferences of group members to recommend items to a group. Previous studies on aggregation methods only consider high averages, counts, and rankings to provide recommendations. However, the most important component of a group recommendation involves ensuring that majority of the members in a group are satisfied with the recommended results. Therefore, it is necessary to consider the deviation as an important element in aggregation methods. The present study involves proposing an upward leveling (UL) aggregation method that considers deviations for group recommendations. The UL recommends items with low deviations and high averages in conjunction with frequency of positive rating counts for group members. Furthermore, the effectiveness of the UL is validated to perform a comparative evaluation with existing aggregation methods by using the normalized discounted cumulative gain (NDCG) and diversity. The results indicate that the UL outperforms all the baselines and that the deviation plays an important role in the aggregation method.


symposium on applied computing | 2017

Runtime verification method for self-adaptive software using reachability of transition system model

Euijong Lee; Young Gab Kim; Young Duk Seo; Kwangsoo Seol; Doo Kwon Baik

Self-adaptive software can change its own behavior in order to achieve an intended objective in a changing environment. Consequently, self-adaptive software requires practical runtime verification and validation. We propose an approach for runtime verification of self-adaptive software by using a designed transition system model. The proposed approach consists of two phases: pre-computing phase and runtime phase. In the precomputing phase, we assume that the self-adaptive software is designed as a transition system. In this phase, the proposed approach translates the designed transition system into equations for runtime verification. For translation, we suggest an algorithm based on state elimination and reachability. After the pre-computing phase, the results of the translated equations are verified in the runtime phase. In order to demonstrate the suitability of our proposed approach, we performed experiments to evaluate the performance of the pre-processing phase and the runtime phase. In comparison with other model-checking tools, our approach achieved excellent results.


asian simulation conference | 2017

Self-adaptive Software Simulation: A Lighting Control System for Multiple Devices

Hyunwoo Kim; Euijong Lee; Doo Kwon Baik

In this research, we propose a lighting control system for environments with multiple light sources, including a natural light source and an artificial light source, based on a self–adaptive software control system. We also propose an algorithm for optimization between control devices in a multi-lighting environment, and evaluation methods for self-adaptive software in an Internet of Things environment. Based on these proposals, a simulation is carried out.


International Journal of Software Engineering and Knowledge Engineering | 2017

An Evaluation Method for Content Analysis Based on Twitter Content Influence

Euijong Lee; Young Gab Kim; Young Duk Seo; Kwangsoo Seol; Doo Kwon Baik

Twitter is a microblogging website, which has different characteristics from any other social networking service (SNS) in that it has one-directional relationships between users with short posts of less than 140 characters. These characteristics make Twitter not only a social network but also a news media. In addition, Twitter posts have been used and analyzed in various fields such as marketing, prediction of presidential elections, and requirement analysis. With an increase in Twitter usage, we need a more effective method to analyze Twitter content. In this paper, we propose a method for content analysis based on the influence of Twitter content. For measuring Twitter influence, we use the number of followers of the content author, retweet count, and currency of time. We perform experiments to compare the proposed method, frequency, numerical statistics, user influence, and sentiment score. The results show that the proposed method is slightly better than the other methods. In addition, we discuss Twitter characteristics and a method for an effective analysis of Twitter content.


Journal of the Korea Society for Simulation | 2016

Simulation and Performance Evaluation of the Self-Adaptive Light Control System

Junhyi Lee; Euijong Lee; Doo-Kwon Baik


international conference on consumer electronics | 2018

Design of a smart greenhouse system based on MAPE-K and ISO/IEC-11179

Young Duk Seo; Young Gab Kim; Euijong Lee; Kwang Soo Seol; Doo Kwon Baik

Collaboration


Dive into the Euijong Lee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge