Guk-Boh Kim
Daejin University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Guk-Boh Kim.
international conference on computational science and its applications | 2005
Gu-Beom Jeong; Guk-Boh Kim
This paper will investigate the fundamental issues related to building and composing secure components. While all participants will closely cooperate, each will have primary responsibility in one area. The approach outlined in this paper develops a certification process for testing software components for security proper- ties. The anticipated results from this paper are a process, set of core white-box and black-box testing technologies to certify the security of software components and a framework for constructing compositional Component Security Assurance (CSA) based on the security property exposed by the atomic components. The manifestation of the product is a stamp of approval in the form of a digital signature.
international conference on it convergence and security, icitcs | 2013
Sungtae Kim; Minseok Kang; Ji-Yeon Kim; Hongil Kim; Guk-Boh Kim; Jongjin Jung
As mobile devices have been rapidly spread up throughout the world, various services have been provided through mobile devices recently. Many services of them have been developed by using built-in sensors mounted on the mobile devices. Non-photorealistic rendering techniques have been also applied to mobile devices for the purpose of user friendliness or attractions. This paper proposes non-photorealistic rendering method using built-in orientation sensor of mobile devices. The method makes changes of non-photorealistic rendering effects in real time by adjustment of vector fields according as coordinate values from orientation sensor get changed on a mobile device. The proposed method renders pen sketch for a given photo image with direction and strength of line strokes which are applied by vector fields. The method executes rendering based on enhanced LIC filter to make pen sketch on a mobile device. Finally, this paper proves efficiency through the experimental results and shows usefulness of the proposed method.
2008 International Symposium on Ubiquitous Multimedia Computing | 2008
Hangbae Chang; Hyukjun Kwon; GyungJun Kim; Gu-Beom Jeong; Guk-Boh Kim
In this study we designed the killer services for the scene of labor learning in ubiquitous computing. To achieve this purpose, we have explored the unmet needs of teachers in the scene of labor learning and examined whether the unmet needs could be served by the resources and capabilities of ubiquitous computing. Then, we have crafted detailed killer services that include value propositions and resource maps by using statistical methodology. Finally, the killer services for the scene of labor learning are proposed for users in educational institutions with the service architecture. The result of this study will be applied to develop new business model in ubiquitous computing as the basic research.
network-based information systems | 2011
Yanghoon Kim; Guk-Boh Kim; Hang-Bae Chang
The paradigm of RIA (Rich Internet Application) emerged since users¡® tendency to use web applications was changed for the sake of convenience, and the Flex was presented as a platform to develop the RIA with the advangtage of prevalance by the Adobe. The Flex is mainly composed of configuring user screens, which has insufficient compatibility and maintenance due to its unified layer. Accordingly, this paper woudl design and implement a FMT (Flex Mlti-Tier) framework to improve compatibility and maintenance of the Flex.
software engineering research and applications | 2007
Gu-Beom Jeong; Guk-Boh Kim
Agents can be autonomous entities, deciding their next step without the interference of a user or they can be controllable ,serving as a me diary between the user and another agent, thereby having some amount of Artificial Intelligence. Knowledge discovering agents are a very interesting approach to software development in computing environments. An agent consists in a thread of execution that can migrate across the network. In this paper, we will employ a multi-agent for the search and extraction of data in a distributed environment. We will use an Integrator Agent in the proposed model on the Knowledge Discovery Agent(KDA). The KDA will address the inadequacy of other data mining tools in processing performance and efficiency when use for knowledge discovery. The Integrator Agent was developed based on CORBA architecture for search and extraction of data from heterogeneous servers in the distributed environment. Our experiment shows that the KDA generated essential association rules which can be practically explained for decision making purposes.
international conference on computational science and its applications | 2006
Gu-Beom Jeong; Guk-Boh Kim
This paper presents an approach to evaluate software architecture. Our approach is divided into three main areas of activities : the work involved in preparation, execution, and completion of the evaluation. Through performing these activities, architectural evaluation can be systematically performed centering around architectural design decisions that have profound impacts on the achievement of quality attributes.
international conference on computational science and its applications | 2006
Hyewon K. Lee; Guk-Boh Kim; Youngsong Mun
For extending of hot-spot of wireless LAN (WLAN), [1] proposes internetworking scheme between WLAN and mobile ad-hoc network (MANET), which employ the same layer-2 protocol with different mode. Compared to internetworking schemes between UMTS (Universal Mobile Telecommunications Systems) and WLAN [3-4], the scheme from [1] has relatively low overhead and latencies because WLAN and MANET are physically and logically similar to each other. However, the mode switching algorithm proposed in [1] for internetworking only considers signal strength and determines handoff, and mobile nodes following a zigzag course in pollution area may frequently perform handoff at short intervals. Furthermore, [1] employs mobile IPv6 (MIPv6) at base, which brings still high delay on handoff and overhead due to signal message exchange. In this paper, we present optimized internetworking scheme between WLAN and MANET, modified from [1]. To settle ping-pong handoff, we propose adaptive mode switching algorithm. HMIPv6 is employed for IP connectivity and mobility service in WLAN, which solves some shortcomings, such as high handoff overhead and vulnerable security from MIPv6. For routing in MANET, OLSR is employed, which operates with current IP protocol compatibly with no change or modification. The proposed internetworking scheme based on adaptive mode switching algorithm shows better performance than scheme from [1].
Journal of Korea Multimedia Society | 2014
Mi-Yeon Park; Pil-Sook Park; Guk-Boh Kim; Jin-Yong Park; Gu-Beom Jeong
Journal of Korea Multimedia Society | 2009
Hangbae Chang; Hyukjun Kwon; Yanghoon Kim; Guk-Boh Kim
Journal of Korea Multimedia Society | 2008
Yanghoon Kim; Joon-Sik Jang; Guk-Boh Kim