Jong-Won Ko
Kyung Hee University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jong-Won Ko.
Multimedia Tools and Applications | 2015
Jong-Won Ko; Kyung-Yong Chung; Jung-Soo Han
Regarding the software development, MDA (Model Driven Architecture) of OMG can be regarded as the concept of making an independently-designed model according to the development environment and language and reusing it according to the desired development environment and language by expanding the reusable unit into the software model when developing software. The problem with these traditional research methods, but the first model, design model for checking the information with the model by defining a formal representation in the form of an abstract syntax tree, as you’ve shown how to perform validation of UML design model. Additional steps need to define more complex due to a software problem that is not the way to the model suitable for model transformation verification. In this paper, as defined in the verification based meta model for input and target model. And we also suggest how to perform model transformation verification using property matching based transformation similarity and graph comparison algorithm. This paper proposes model transformation verification using verification meta information and transformation similarity by property matching. In addition, in order to support verification of the target model generated from the source model, we define verification meta model for UML model, RDBMS model and RT-UML model. Recent researches from model-based architecture did partial tests focusing on phrase-correctness about the re-use in the perspective of converted software model. To overcome such limitations, this study suggests the ways to define transformation profiles using property information of system structure models as the test-based meta-model and transformation rules, improve graph comparison algorithm, and even supports the correctness of meanings. There were problems in existing methods of model transformation verification such as graph comparison or the one considering only syntax-correctness through pattern-matching. To remedy such problems, this study suggests a new verification method by defining the meta-model which has additional structural attributes and property information and the transformation profile, and using graph comparison algorithm which checks whether the information acquired from transformation is correct.
international conference on it convergence and security, icitcs | 2013
Jong-Won Ko; Su-Jin Baek; Gui-Jung Kim
This study proposed a method of developing an intelligent recommendation system for automotive parts assembly. The proposed system will display the detailed information and the list components which make up the relevant part that an user wants through the database using the ontology when selecting an automotive part that an user intends to learn or to be guided of. The intelligent recommendation system for parts is offered to users through determining the automatic recommendation order between parts using the weights. This study has experimented the principles of the recommendation system and the method of setting the weights by setting two scenarios.
international conference on it convergence and security, icitcs | 2012
Jong-Won Ko; Su-Jin Beak; Young-Jae Song
Verification of existing software design models and transformed target models for the study, mainly checking (Model Checking) with a code-based software designed to define in the abstract syntax tree or on the models generated using refactoring on design models for refinery operations and define how to perform. The problem with these traditional research methods, but the first model, design model for checking the information with the model by defining a formal representation in the form of an abstract syntax tree, as you’ve shown how to perform verification of the model to perform model optimization. Additional steps need to define more complex due to a software problem that is not the way to the model suitable for optimization. In this paper, as defined in the MDA-based model transformation studies of a graph based model transformation, also as redefined PSO algorithm for model optimization in source model and how to perform model transformation verification through graph comparison algorithm.
international conference on it convergence and security, icitcs | 2012
Jong-Won Ko; Jung-Soo Han; Young-Jae Song
In order to easily port mobile applications suitable for each platform, that have been developed under diverse development environment for individual wireless communication service providers, or redevelop them on a specific platform, it is required to reuse them at software model level that is a software development paradigm for Model Driven Architecture (MDA). Verification of existing design models and test models for the study, mainly checking (Model Checking) with a code-based software designed to define in the abstract syntax tree or on the models generated using refactoring on design models for refinery operations and define how to perform. The problem with these traditional research methods, but the first model, design model for checking the information with the model by defining a formal representation in the form of an abstract syntax tree, as you’ve shown how to perform verification of the model. Additional steps need to define more complex due to a software problem that is not the way to the model suitable for model transformation verification. In this paper, as defined in the pattern-based model transformation studies of a reusable mapping patterns, given the pattern information automatically through the software model offers a way to perform model transformation verification.
Archive | 2012
Jong-Won Ko; Young-Jae Song
In order to easily port mobile applications suitable for each platform, that have been developed under diverse development environment for individual wireless communication service providers, or redevelop them on a specific platform, it is required to reuse them at software model level that is a software development paradigm for MDA (Model Driven Architecture). Verification of existing design models and test models for the study, mainly checking (Model Checking) with a code-based software designed to define in the abstract syntax tree or on the models generated using refactoring on design models for refinery operations and define how to perform. The problem with these traditional research methods, but the first model, design model for checking the information with the model by defining a formal representation in the form of an abstract syntax tree, as you’ve shown how to perform verification of the model to perform refactoring. Additional steps need to define more complex due to a software problem that is not the way to the model suitable for optimization refactoring. In this paper, as defined in the MDA-based model transformation studies of a reusable model transformation patterns, abstract factory pattern and the bridge pattern given the pattern information automatically through the software model offers a way to perform refactoring.
international conference on information science and applications | 2011
Su-Jin Baek; Jong-Won Ko; Young-Jae Song
The scope of the problems that could be solved by monitoring and the improvement of the recognition time is directly correlated to the performance of the management function of the business process. The Enhydra Shark from the existing WfMS shows the process records on the web client by the allocated activities during the designing process of the process log for the sake of the process monitoring. In WfMOpen, the documentation on the definition of the process is complication and insufficient, and there is no interacting part with other work flow services. Therefore, it rather provides services in accordance with the process result information that was allocated during the previous designing, rather than the monitoring of the changes by the influence of the external environment. In this paper we propose a system, which can interpret and monitoring to the result of each business acts follows in change of external environment. The proposed system applies a meta-heuristic genetic algorithms which to reduce additional load and to acquire the accuracy of system information. In addition, the similarity with the activities, dependency, and correlation are examined to find similar process model, and then the relevancy is extracted by using the event property information. Such information is used to figure out the problems occurring as a result of the changes and provide diagnostic information to support the adaptation decision making. With this, it is possible to apply the judgment of the situation info of the users as it occurs in a dynamic context.
international conference on it convergence and security, icitcs | 2013
Jong-Won Ko; Su-Jin Baek; Jung-Soo Han
Regarding the software development, MDA (Model Driven Architecture) of OMG can be regarded as the concept of making an independently-designed model according to the development environment and language and reusing it according to the desired development environment and language by expanding the reusable unit into the software model when developing software. The problem with these traditional research methods, but the first model, design model for checking the information with the model by defining a formal representation in the form of an abstract syntax tree, as you have shown how to perform validation of UML design model. Additional steps need to define more complex due to a software problem that is not the way to the model suitable for model transformation verification. In this paper, as defined in the verification based meta model for input and target model. And we also suggest how to perform model transformation verification using property matching based transformation similarity and mapping patterns.
international conference on it convergence and security, icitcs | 2013
Su-Jin Baek; Jong-Won Ko; Jung-Soo Han
As there is an increasing reliance on information systems in most organizations, there is also an increased risk of security accidents of information systems. Therefore, in order to verify the potential security risks and their results, it is necessary to have a security threat assessment process called threat modeling. However, research in security threat modeling has yet to mature as there is paucity of established techniques and tools to aid the threat modeling and formal analysis process. This study provides a method to design and analyze threats that occur in the bio-information processing system using the visual Goal-oriented threat modeling. In addition, it determines each threat based on the Goal-Threat model and defends itself through measuring repetitive assessment, vulnerability the degree of risk. Then, by designing each organization to perform security checks on its own, it supports to make it possible to easily find vulnerabilities in terms of administration and presents a recommendation to be performed in order to ensure stability.
international conference on it convergence and security, icitcs | 2012
Su-Jin Baek; Jong-Won Ko; Gui-Jung Kim; Jung-Soo Han; Young-Jae Song
Because of the rapid changes in the market environment and the uncertain demands from the customers, the investment in the information system by the corporate is increasing. This also resulted in the adoption of the process management system, which is intended for the adaptation to the speed of such changes, creation of competitiveness, and systematic management of the business process. To process the service demands from the customers that come in a dynamic manner, an analysis on the possible scope of changes on the recognition of the problems will be required, as well as the concept of data mining to redesign the process based on the adaptive decisions. The existing workflow mining technology was designed to extract business process redesign information from simple database fields or create a process model by collecting, identifying, and analyzing log information from the system that it could not be dynamically reconfigured by exploring the process flow suitable for new requests made on business process. In this study, an analytical method will be suggested using a heuristic algorithm based on the goals to create an adaptive process mining model that could provide a continuous service demand scenario that is created dynamically.
international conference on information science and applications | 2011
Jong-Won Ko; Sung-Ho Sim; Young-Jae Song
In order to easily port mobile applications suitable for each platform, that have been developed under diverse development environment for individual wireless communication service providers, or redevelop them on a specific platform, it is required to reuse them at software model level that is a software development paradigm for MDA (Model Driven Architecture). The existing model transformation tools such as UMT,MTL,ATL have focused on various transformation format supports, scalability or applicability of model transformation mechanism itself or how it is easy to understand transformation rules without verification of the transformation model generated through mainly model transformation engines. The test based model transformation framework proposed on this paper generates prediction model by defining test Oracle as model transformation rules that may conduct verification test of the generated transformation model, in order to support verification on verification of the converted model through MDA based model transformation mechanism. By comparing this prediction model with the target model, it is possible to execute verification test on the converted model. Therefore, by increasing reliability of model transformation and further applying test issues on the software development process to the software mode at software design phase, it is possible to reduce modification cost through advantage to predict or find out any system error earlier than test to be progressed after implementation of the existing source codes.