Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Eun-Ser Lee is active.

Publication


Featured researches published by Eun-Ser Lee.


Archive | 2012

An Agricultural Expert Cloud for a Smart Farm

Yongyun Cho; Kyoungryong Cho; Chang-Sun Shin; Jangwoo Park; Eun-Ser Lee

In agricultural environments, know-how and experience of skillful agricultural experts, who may are farmers, researchers, market analysts, distribution specialists, and so on, have been more important roles than ever. Especially, for farmers newly trying to cultivate a high value crops, the knowledge and the experience of experts for the crops will be very important factors for successful cultivation. So, for higher productivity and better quality, the valuable information has to be able to be supplied easily and quickly to a user in agricultural environments. Cloud computing technologies may suggest a potential service model to do that through Internet and various state-of-edge technologies based on IT. In this paper, we introduce a service model based on an agricultural expert Cloud to support a smart farm service in ubiquitous agricultural environments. The introduced service is based an expert system, in which the knowledge and the experience of the various fields related in agriculture is accumulated. So, by easily gaining the valuable knowledge and experience about a specific crop through the expert Cloud, a user can efficiently and successfully cultivate any crops in ubiquitous agricultural environments.


international conference on computational science and its applications | 2005

Development system security process of ISO/IEC TR 15504 and security considerations for software process improvement

Eun-Ser Lee; Malrey Lee

This research is intended to develop the system security process. The IT products like as firewall, IDS (Intrusion Detection System) and VPN (Virtual Private Network) are made to perform special functions related to security, so the developers of these products or systems should consider many kinds of things related to security not only design itself but also development environment to protect integrity of products. When we are making these kinds of software products, ISO/IEC TR 15504 may provide a framework for the assessment of software processes, and this framework can be used by organizations involved in planning, monitoring, controlling, and improving the acquisition, supply, development, operation, evolution and support of software. But, in the ISO/IEC TR 15504, considerations for security are relatively poor to other security-related criteria such as ISO/IEC 21827 or ISO/IEC 15408 [10-12]. In this paper we propose some measures related to development process security by analyzing the ISO/IEC 21827, the Systems Security Engineering Capability Maturity Model (SSE-CMM) and ISO/IEC 15408, Common Criteria (CC). And we present a Process of Security for ISO/IEC TR 15504. This enable estimation of development system security process by case study.


multimedia and ubiquitous engineering | 2007

Design Opportunity Tree for Requirement Management and Software Process Improvement

Eun-Ser Lee; Je-Min Bae

There are many risk items of the requirement phase that cause the defect occurring in the latter phase and the quality problems during process management and project progress. This paper designs the opportunity tree that requirement manage the defects and their problems solution as well. For the similar projects, we can estimate defects and prepare to solve them by using domain expert knowledge and the Opportunity Tree, which can greatly improve the software process. And this paper identifies risk items to produce reliable software and analyzes in the requirements phase. Also, this paper is intended to develop the relationship between defects and their causes to introduce. Therefore, using defect causes, we understand the associated relationship between defect triggers and design Opportunity Tree to manage the defects.


international conference on intelligent computing | 2006

Definition of Security Requirement Items and Its Process to Security and Progress Management

Eun-Ser Lee; Sun-myoung Hwang

This paper propose the development of a security requirement items and its process of the profile and security target(ISO/IEC 15408). This paper estimate the security requirement items and progress management that manage the security requirements and the progress and its problems. For projects in similar domains, it is possible to remove security risk items and to manage progress by using security lifecycle and progress milestone, which can greatly improve the software process.


international conference on computational science and its applications | 2006

Design progress management for security requirements in ubiquitous computing using COQUALMO

Eun-Ser Lee; Sang-Ho Lee

This paper estimates the development of a security process in four cases. This paper is intended to help the design lifecycle and progress management in ISO/IEC 15408 (Common Criteria). There are many defects that cause the security requirement problems during the software development. This paper explores the areas of the lifecycle and progress management that remove the security requirements and also manage the schedule and quality problems. For projects in similar domains, it is possible to remove security risk items and to manage progress by using security lifecycle and progress milestone, which can greatly improve the software process.


international conference on computational science and its applications | 2008

An Effective Data Processing Method for Fast Clustering

Hyun-Joo Moon; Sangheon Kim; Jongbae Moon; Eun-Ser Lee

Because of the extensive diffusion of Internet usage, heterogeneous computing platforms, and ubiquitous computing technologies, Web data that are usually written in XML format are explosively increased. With the growth of Web data and the importance of their clustering, we need similarity detection method because it is a fundamental technology for efficient document management. In this paper, we introduce a similarity detection method that can check both semantic similarity and structural similarity between XML DTDs. For semantic checking, we adopt ontology technology, and we apply longest common string and longest nesting common string methods for structural checking. Our similarity detection method uses multi-tag sequences instead of traversing XML schema trees, so that it gets fast and reasonable results.


international conference on computational science and its applications | 2006

Design and implementation of semantic web search system using ontology and anchor text

Nam-Deok Cho; Eun-Ser Lee

The World Wide Web has incurred the problem that users are not necessarily provided with the information they want to receive, at a time when the amount of information is explosively increasing. Therefore, W3C (World Wide Web Consortium) proposes the Semantic Web as the new web paradigm to present semantic information and study browser systems that use ontology to perform their tasks. However, these systems do not necessarily provide correct information, particularly when users are trying to show relevant information, or information they are not familiar with. Therefore, the authors of this paper propose that the Semantic WebGraph system should be used to present semantic information, using ontology to query language, and also to show relevant information using Anchor Text in web pages. Such a system forms a Semantic Web base search engine that can get relevant information, as well as information about queried language.


international conference on hybrid information technology | 2011

A context-driven development methodology for context-aware systems

Jongmyung Choi; Rosa I. Arriaga; Hyun-Joo Moon; Eun-Ser Lee

Context-aware systems demand a customized development methodology because they have their own features such as ambiguous system scope, context modeling, and implementing context-dependent services. Furthermore, it has been known that these systems are more complex than traditional systems. In this paper, we meet this challenge by extending the unified process (UP), and add three workflows: context requirements, context modeling, and context testing. At each workflow, stakeholders analyze, model, and test for the perspective context. We also provide guidelines for task performance, artifact production and development specifications for each stage of the context. Our methodology supports the full development process and the best practice technologies including OOP, UML, and UP.


international conference on hybrid information technology | 2008

MAGE: A Grid Management System Based on Mobile Agent and Multi-Layered Architecture

Sungju Kwon; Eun-Ser Lee

MAGE (mobile agent-based grid environment) is a monitoring system on Grid computing environment to provide a dynamically reconfigurable multi-layered architecture. With the growing requirement of computational power and hardware resources, Grid takes one of the major roles in several researches and many business areas. Grid computing has, recently, migrated to pervasive and ubiquitous computing with the advanced capabilities of mobile, lightweight, and thin devices. MAGE, an agent-based lightweight Grid application toolkit, consists of multi-hierarchical layers with dynamically configurable agents to achieve independence from various types of communication, message interpretation, and diverse actual tasks. Each element of application can be replaced with a new task without intervention of other tasks because an agent represents a service in MAGE. This paper describes various Grid design issues and advantages of MAGE.


international conference on computational science and its applications | 2006

Design opportunity tree for schedule management and evaluation by COQUALMO

Eun-Ser Lee; Sang-Ho Lee

Project planning is often the most difficult part of project management. Relationship of jobs, risk items and human resources have been used successfully for schedule and project progress. There are many defects that cause the schedule and progress management problems during software development. This paper designs the opportunity tree framework that remove and manage the schedule and quality problems as well. For the similar projects, we can estimate defects and prepare to solve them by using domain expert knowledge and the opportunity tree framework, which can greatly improve the software process.

Collaboration


Dive into the Eun-Ser Lee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Haeng-Kon Kim

Catholic University of Daegu

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chang-Sun Shin

Sunchon National University

View shared research outputs
Top Co-Authors

Avatar

Jangwoo Park

Sunchon National University

View shared research outputs
Top Co-Authors

Avatar

Kyoungryong Cho

Sunchon National University

View shared research outputs
Top Co-Authors

Avatar

Donghyouk Lim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Hyun-Joo Moon

Hankuk University of Foreign Studies

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge