Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Haeng-Kon Kim is active.

Publication


Featured researches published by Haeng-Kon Kim.


asia-pacific software engineering conference | 2004

An architecture model for dynamically converting components into Web services

Roger Y. Lee; Haeng-Kon Kim; Hae Sool Yang

Components are the basic building blocks of enterprise and distributed applications. Component-based development (CBD) is the technique of using a component framework to develop components and it focuses on developing large software systems by integrating previously existing software components. Component oriented architecture has already being developed by which components may be developed, assembled, stored and reused. It is possible to assemble an application from a repository of components developed in various languages by homogeneous or heterogeneous composition. Web services represent an evolution of the Web to allow the open and flexible interaction of applications over the Internet. Web services standards provide a high level of interoperability across platforms, programming languages and applications and hence these facets of Web services have been used to integrate the best aspects of component-based development and the Web. In this paper we propose a new method for integrating Java and C++ components by dynamically converting them into Web services using AXIS and gSOAP respectively.


annual acis international conference on computer and information science | 2005

A model for application integration using Web services

Ashok K. Harikumar; Roger Y. Lee; Hae Sool Yang; Haeng-Kon Kim; Byeongdo Kang

The history of computing has seen several interesting trends. From a programmer building custom packaged applications to the development of enterprise resource planning (ERP) systems, and other business specific packages. The need for integrating different systems in the organization led to point to point interface and spaghetti architecture. Fallout of these spaghetti architectures is the development of the enterprise application integration (EAI) concept. In this paper we are going to discuss the evolution of EAI concepts and a new architecture for event driven data transformation for application integration using Web services. The new architecture overcomes the drawback of request-reply semantics of Web services by providing an event driven architecture, which supports asynchronous communication between applications using Web services. We have also implemented a secure framework for accessing third party Web services using message level encryption and digital certificates.


software engineering research and applications | 2005

A framework for dynamically converting components to Web services

Roger Y. Lee; Ashok K. Harikumar; Chia-Chu Chiang; Hae Sool Yang; Haeng-Kon Kim; Byeongdo Kang

Components are the basic building blocks of enterprise and distributed applications. Component-based development (CBD) is the technique of using a component framework to develop components and it focuses on developing large software systems by integrating previously existing software components. Software development based on component based architecture is already in wide use throughout the software industry. Component based development makes it possible to assemble an application from a repository of components developed in various languages by homogeneous or heterogeneous composition. Web services provide an easy way to extend component based development by adopting open Internet standards. Web services represent an evolution of the Web to allow the open and flexible interaction of applications over the Internet. Web services standards provide a high level of interoperability across platforms, programming languages and applications. In our current research we have created a model for automatically converting components created in different languages to Web services. The components that are developed in various languages are deployed dynamically (just in time) in the Web servers by using custom built deployers. Using this model the users can access the components that reside in the server using open Internet standards, without having to worry about the language and platform restrictions. The security aspects to access the Web services were also considered while implementing the model.


international conference on computational science and its applications | 2005

Automatic translation form requirements model into use cases modeling on UML

Haeng-Kon Kim; Youn-Ky Chung

Given the investment organizationsare making in use cases and the increasing use of computers to control safety-critical applications, the research on integrating use cases and safety consideration is highly demanded. However, currently the approaches for incorporating safety analysis into use case modeling are scarce. In this paper, we present an approach to integrating safety requirements into use case modeling. We demonstrate how deductive and inductive safety techniques can be used hand-in-hand with use cases. An application of the proposed approach facilitates early hazard identification and assessment, as well as elicitation and tracing of safety requirement though the entire development process. The proposed approach is illustrated by a realistic case study – a liquid handling workstation.


Future Generation Computer Systems | 2014

Convergence agent model for developing u-healthcare systems

Haeng-Kon Kim

Ubiquitous networking, the interlinking of computers, consumer electronics, automobiles, home appliances, medical equipment, transportation systems, animals and plants through an overlapping of electronic spaces and physical spaces, is expected to provide an environment that enhances our lives through improved convenience, efficiency and safety in all areas. Todays healthcare industry emphasizes safety, efficiency, patient-oriented approach, timeliness and balance. u-healthcare makes it possible to safely deliver appropriate services from any location at any time. To explain the emergence of u-healthcare, one must invoke, first of all, progress in IT and medical technology, and then the desire and willingness on the part of health care institutions to adopt the new service concept and increased health care demand. Digitalization of information, introduction of broadband communication and leaps made in healthcare technology in recent years have provided the technological capacity necessary for the achievement of u-healthcare. Based on recently reached theoretical results, integrating u-healthcare environments in virtual organizations, we proposed a methodology for the design and implementation of u-healthcare, linking the distributed mobile agents with medical entities into a convergence and collaborative environment. Despite the challenges in implementing and deploying u-healthcare, the advantages of ubiquitous healthcare are enabled by our smart model for the soft computing endowed ubiquitous. The strength of our approach is that it relates to u-healthcare a system which consists of its dual character emerging from the synergetic interaction between ubiquitous computing techniques and the mobile devices in convergence manner. We have developed a set of initial healthcare agent services on the mobile collaboration framework. We evaluate the functionality and effectiveness of our convergence mobile agent, whether the platform can manage services based on the model and whether the results of u-healthcare services discovery could satisfy users requirements with example cases.


Archive | 2007

Advances in Hybrid Information Technology

Marcin S. Szczuka; Daniel Howard; Dominik Ślȩzak; Haeng-Kon Kim; Tai-hoon Kim; Il-seok Ko; Geuk Lee; Peter M. A. Sloot

Data Analysis, Modelling, and Learning.- Taking Class Importance into Account.- Tolerance Based Templates for Information Systems: Foundations and Perspectives.- Reduction Based Symbolic Value Partition.- Investigative Data Mining for Counterterrorism.- Data Integration Using Lazy Types.- Data Generalization Algorithm for the Extraction of Road Horizontal Alignment Design Elements Using the GPS/INS Data.- Personalized E-Learning Process Using Effective Assessment and Feedback.- Optimally Pricing European Options with Real Distributions.- Applying Stated Preference Methods to Investigate Effects of Traffic Information on Route Choice.- A Study on Determining the Priorities of ITS Services Using Analytic Hierarchy and Network Processes.- An Introduction of Indicator Variables and Their Application to the Characteristics of Congested Traffic Flow at the Merge Area.- Imaging, Speech, and Complex Data.- Image Resize Application of Novel Stochastic Methods of Function Recovery.- Automatic Face Analysis System Based on Face Recognition and Facial Physiognomy.- Moving Cast Shadow Elimination Algorithm Using Principal Component Analysis in Vehicle Surveillance Video.- Automatic Marker-Driven Three Dimensional Watershed Transform for Tumor Volume Measurement.- A Study on the Medical Image Transmission Service Based on IEEE 802.15.4a.- Detecting Image Based Spam Email.- Efficient Fixed Codebook Search Method for ACELP Speech Codecs.- Conventional Beamformer Using Post-filter for Speech Enhancement.- Bandwidth Extension of a Narrowband Speech Coder for Music Delivery over IP.- A User-Oriented GIS Search Service Using Ontology in Location-Based Services.- A Filtered Retrieval Technique for Structural Information.- Applications of Artificial Intelligence.- An Analysis of a Lymphoma/Leukaemia Dataset Using Rough Sets and Neural Networks.- A Frequency Adaptive Packet Wavelet Coder for Still Images Using CNN.- Reduced RBF Centers Based Multi-user Detection in DS-CDMA Systems.- Approximate Life Cycle Assessment of Product Concepts Using a Hybrid Genetic Algorithm and Neural Network Approach.- A Solution for Bi-level Network Design Problem Through Nash Genetic Algorithm.- An Alternative Measure of Public Transport Accessibility Based on Space Syntax.- Adaptive Routing Algorithm Using Evolution Program for Multiple Shortest Paths in DRGS.- Particle Swarm Optimization for a Multi-UCAV Cooperative Task Scheduling.- Expert System Using Fuzzy Petri Nets in Computer Forensics.- MMORPG Map Evaluation Using Pedestrian Agents.- The Analysis of Game Playing Experiences: Focusing on Massively Multiplayer Online Role-Playing Game.- Hybrid, Smart, and Ubiquitous Systems.- How to Overcome Main Obstacles to Building a Virtual Telematics Center.- Real-Time Travel Time Estimation Using Automatic Vehicle Identification Data in Hong Kong.- A Context-Aware Elevator Scheduling System for Smart Apartment Buildings.- A MOM-Based Home Automation Platform.- An Error Sharing Agent for Multimedia Collaboration Environment Running on Pervasive Networks.- A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment.- Integration of Artificial Market Simulation and Text Mining for Market Analysis.- Agent-Based Intelligent Decision Support for the Home Healthcare Environment.- An Aware-Environment Enhanced Group Home: AwareRium.- The Situation Dependent Application Areas of EPC Sensor Network in u-Healthcare.- Ubiquitous Healthcare System Using Context Information Based on the DOGF.- Hardware and Software Engineering.- Load Balancing Using Dynamic Replication Scheme for the Distributed Object Group.- Design and Implementation of a Performance Analysis and Visualization Toolkit for Cluster Environments.- Enterprise Application Framework for Constructing Secure RFID Application.- A GDB-Based Real-Time Tracing Tool for Remote Debugging of SoC Programs.- A Novel Buffer Cache Scheme Using Java Card Object with High Locality for Efficient Java Card Applications.- Design and Implementation of the Decompiler for Virtual Machine Code of the C++ Compiler in the Ubiquitous Game Platform.- Mobile Pharmacology.- Wireless Control System for Pet Dogs in a Residential Environment.- Intelligent Embedded Real-Time Software Architecture for Dynamic Skill Selection and Identification in Multi-shaped Robots.- Networking and Telecommunications.- The Accurate Performance Evaluation of Time Hopping UWB Systems with Pulse Based Polarity.- Improvement of Adaptive Modulation System with Optimal Turbo Coded V-BLAST Technique.- Header Compression of RTP/UDP/IP Packets for Real Time High-Speed IP Networks.- Repetition Coding Aided Time-Domain Cancellation for Inter-Carrier Interference Reduction in OFDM Systems.- On Scheduling Transmissions for Hidden Terminal Problems in Dynamic RFID Systems.- Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation.- Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x.- A Sophisticated Base Station Centralized Simple Clustering Protocol for Sensor Networks.- Plus-Tree: A Routing Protocol for Wireless Sensor Networks.- Optimization and Routing Discovery for Ad Hoc Wireless Networks: A Cross Layer Approach.- Analysis of the Characteristics of Rain Attenuation in the 12.25GHz Band for Wireless Networking.


software engineering research and applications | 2007

Web Service Security model Using CBD Architecture

Eun-Ju Park; Haeng-Kon Kim; Roger Y. Lee

A Web services is programmable application logic accessible using standard Internet protocols. Web services combine the best aspects of component based development and the Web. like components, Web services represent black-box functionality that can be reused without knowing about how the service is implemented. Unlike current component technologies, Web services are not accessed via object-model-specific protocol. In this paper, we suggest the architecture development modeling and the Web integration architecture to develop Web service-security that is embodied in supplier on service oriented architecture (SOA). We also describe the various possibilities with which the components may be integrated well with applications have been explored and well-exposed using Web services. This paper focuses on integrating component based architecture modeling and Web services to enable the development and usage of facade and backside components through the Web by dynamically creating Web services-security for the functionalities of the components.


international conference on software engineering | 2003

Reliability Assurance in Development Process for TOE on the Common Criteria

Haeng-Kon Kim; Tai-hoon Kim; Jae-Sung Kim

Security begins with good software code and high quality testing of the code, and it continues with the process used to identify corrected and patch security vulnerabilities and with their auditing based on recognized standards. Security is an important aspect of software systems, especially for distributed security- sensitive systems. The Common Criteria (CC) is the standard requirements catalogue for the evaluation of security critical systems. Using the CC, a large number of security requirements on the system itself and on the system development can be defined. However, the CC does not give methodological process support. In this paper, we show how integrate security aspects into the software engineering process. In addition, we also introduce our work on ensuring the reliability assurance in development process for Network Management System as TOE. The activities and documents from the Common Criteria are tightly intertwined with the system development, which improves the quality of the developed system and reduces the additional cost and effort due to high security requirements.


Archive | 2012

Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity

Tai-hoon Kim; Carlos Ramos; Haeng-Kon Kim; Akingbehin Kiumi; Sabah Mohammed; Dominik Ślęzak

This book comprises the refereed proceedings of the International Conferences, ASEA and DRBC 2012, held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of advanced software engineering and its applications, and disaster recovery and business continuity.


AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology | 2010

CAS4UA: a context-aware service system based on workflow model for ubiquitous agriculture

Yongyun Cho; Hyun Yoe; Haeng-Kon Kim

Practical automation in agriculture can save the time of the cultivation and increased the productivity. Generally, because agricultural environment is very changeable, the natural elements has to be considered in the autonomic cultivation process. Recently, the workflow model has been used as an effectual service automation model in traditional business environment, Web service environment, and ubiquitous computing environment. This paper proposes CAS4UA, which is a context-aware service system based on a workflow model for agriculture. The suggested system uses a workflow model to offer an automatic and context-aware service for ubiquitous agriculture, and to support the ubiquitous agriculture based on USN/RFID. To do this, the system uses a workflow model including various agricultural context information. Through the workflow model, the suggested system can dynamically and automatically control a service flow according to the changeable conditions in agricultural environment. Therefore, the proposed system can be useful in developing a smart service or automating work processes for ubiquitous agriculture.

Collaboration


Dive into the Haeng-Kon Kim's collaboration.

Top Co-Authors

Avatar

Roger Y. Lee

Central Michigan University

View shared research outputs
Top Co-Authors

Avatar

Regin Joy Conejar

Catholic University of Daegu

View shared research outputs
Top Co-Authors

Avatar

Yvette E. Gelogo

Catholic University of Daegu

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hyun Yoe

Sunchon National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hyun Yeo

Sunchon National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Meonghun Lee

Sunchon National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge