Hangbae Chang
Daejin University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hangbae Chang.
Multimedia Tools and Applications | 2012
Yanghoon Kim; Hyukjun Kwon; Jonggu Kang; Hangbae Chang
Of late, advance in hardware and communications technology has been rapidly increasing the demand for diverse multimedia information, which, including all image, audio, video, text, numerical data, etc., should be designed to excel the existing information processing system in the functions of data storage, search, transmission, display, etc. The newest image retrieval system is gradually being converted from text-based into content-based retrieval, which uses the image content itself as features. In content-based retrieval, how to combine the color, shape, layout, texture, etc. used for describing each image or object is considered an important element. The existing method has chiefly used histogram out of the content-based image method using color information, but this has a drawback in being sensitive to brightness of light and the object size in the image. Thus, the present methods is intended to design and implement a system that can retrieve images similar to the query image from image database without losing image information in the use of color features.
2008 International Symposium on Ubiquitous Multimedia Computing | 2008
Hangbae Chang; Hyukjun Kwon; GyungJun Kim; Gu-Beom Jeong; Guk-Boh Kim
In this study we designed the killer services for the scene of labor learning in ubiquitous computing. To achieve this purpose, we have explored the unmet needs of teachers in the scene of labor learning and examined whether the unmet needs could be served by the resources and capabilities of ubiquitous computing. Then, we have crafted detailed killer services that include value propositions and resource maps by using statistical methodology. Finally, the killer services for the scene of labor learning are proposed for users in educational institutions with the service architecture. The result of this study will be applied to develop new business model in ubiquitous computing as the basic research.
advanced information networking and applications | 2012
Jaehwan Lim; Yanghoon Kim; Yongsub Na; Hangbae Chang
Recently, a diversity of achievement has been attained such as diffusion of e-Business and construction of infrastructure to standardize B2B for each industry through B2B projects. Considerable results are currently obtained from building up electronic guarantee platforms based on this infrastructure, at the same time, a demand is increasing for information on e-Marketplace with electronic guarantee platforms, or selling and purchasing companies. However, information on major or newly expected transacting companies is not properly delivered, and there are practical difficulties for each company to prepare infrastructure solving them, therefore, a need is emerging to eliminate risk factors with e-Commerce by providing reliable business information. This study would like to establish a foundation for non-financial collaborative information systems preparing a win-win cooperative system between large and small companies and a sustainable management system, and to provide chances for credit reference agencies to create business opportunities as a new optional service.
Archive | 2012
Hangbae Chang; Jonggu Kang; Yanghoon Kim; Jaehwan Lim; Youngsub Na
Introduced an ERP system for increasing their profitability and a point of production system, shop floor controller system etc. for managing sites, however, data has still been managed manually in production sites, and the difficulty lies in the real-time process control due to limitations of the introduced information system. Therefore, this paper studied examples of cooperative real-time quality monitoring services utilizing sensor networks that could manage the real-time production process by integrating various technologies of ubiquitous sensor networks together with RFIDs considering characteristics for each workplace as well as for each industry.
Archive | 2011
Hangbae Chang; Hyukjun Kwon; Jaehwan Lim
In the diversifying competitive environment, enterprises have cooperated with others in various ways. In the competitive environment where increase in uncertainty of demand and supply, market globalization, diminish in Product Life Cycle (PLC), and rapid changes in technologies and business process take place, the enterprises are able to guarantee their own competitive advantage by collaborating with other enterprises. Under this situation, many enterprises have realized an importance of collaboration with others and changed a traditional transaction relationship into a collaborative relationship. Hence, we would like to analyze a Critical Success Factor (CSF) of IT business collaboration and performance evaluation to develop a method to facilitate IT business collaboration.
international conference on information technology | 2010
Hangbae Chang; Jonggu Kang; Hyukjun Kwon; ChangHoon Lee
To enhance international competitiveness through the protection of cutting-edge industrial technology, it is essential to establish the policy for strengthening ability to develop industrial security technology and raising international competitiveness. In this study we investigated and analyzed not only the ecumenic trend but also the present condition, then we executed the deduction of the industrial security technology development program in a aspect of government and analyzed the current status of the technical security technology for developing security technology and increasing leaks of the advanced industrial technology.
information security and assurance | 2009
Hangbae Chang; Jonggu Kang; Hyukjun Kwon
In this study we analyzed and gauged the information security needs for the new IT service which will be proceeding. Then we designed Information Security Rank Authentication System to raise the level of information security. To achieve this study, we analyzed rank authentication system of the inside and outside of the country and developed the practical propulsive system and the evaluation model which reflects IT services own feature differing from the general evaluation of IS information security. The result of this study can be utilized to assess the level of domestic IT service information security objectively, and it can be applied as the means of rational decision making for establishing a policy to raise degree of information security of corporations providing IT service.
complex, intelligent and software intensive systems | 2009
Hangbae Chang; Hyuk-Jun Kwon; Ilsun You
In this research, we improved pre-study which was necessary independent compiler and hardware, separating with game service, for prevention of game service counterfeiting, and developed technologies, which executing file itself can execute reverse-analysis by itself and prevent counterfeiting. In detail, suggested method through this research was to install two loaders which can encode and doble-code by separating data section and code section within execution file. For Anti Debugging, game service is automatically terminated when the motion of external debugger is sensed, and, the header of execution file which is referred by disassembling program is changed and made this impossible for Anti Disassembling. Lastly, the data that should be protected are copied in temporary shared memory for Anti Memory Dump as solution.
embedded and ubiquitous computing | 2007
Hangbae Chang; Moonoh Kim; Hyukjun Kwon; Byungwan Han
With continuing security concerns for airport operations, the protection of internal operational protocols of an international airport has become more critical than ever before. Therefore, the Information Security System (ISS) was developed for Incheon International Airport which can protect the critical information related to airport operations. The developed ISS includes a document access control server/client agent, a user access control service linker, and an operational log file database. The ISS was developed in consideration of information life cycle of airport workflow. As a result, it can securely protect the computer system at Incheon International Airport by (1) performing realtime encoding of the users who accessed the protected files and folders, (2) limiting the users capability to edit the protected documents, (3) tracking transmitted files to the outside companies, (4) blocking the users access to portable storage devices, and (5) inserting security water marks on the printed outputs. With the implementation of the ISS, the real-time information system audit environment has been securely established at the Incheon International Airport Corporation.
The e-Business Studies | 2011
Jonggu Kang; Jaehwan Lim; Hong-Joo Lee; Hangbae Chang