Kiwon Chong
Soongsil University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kiwon Chong.
international conference on hybrid information technology | 2006
Sangim Ahn; Kiwon Chong
Establishing and maintaining traceability links places a big burden since complex systems have especially yield an enormous number of various artifacts although traceability links is useful for requirements change impact analysis, requirements conflict analysis, and requirements consistency checking. Hence, we propose a feature-oriented requirements tracing method including value consideration and intermediate catalysis. To achieve our goal in this paper, we present (1) a meta-model of feature-oriented requirements tracing, (2) a featureoriented requirement tracing process overview, and (3) cost-benefits analysis. The meta-model is a formalization of feature-oriented requirement tracing using UML notation. The feature-oriented requirement tracing process consists of requirements definition, feature modeling, feature prioritization, requirements linking, and traceability links evaluation. We also carry out cost-benefit analysis through a case study to demonstrate the feasibility of our approach.
embedded and ubiquitous computing | 2006
Sangim Ahn; Kiwon Chong
Needs of interoperability are getting increased since there have been some issues in heterogeneous wireless sensor networks such as information exchange, network protocol conversion, and integrity among multi-vendor products. We propose message-oriented middleware to make use of an intelligent bridge for information exchange in heterogeneous constraints. It includes middleware architecture, a message format and message types, and rule handling. We present the results of a case study in details to do demonstrate the feasibility of our approach. These are composed of three parts: First, we build a scenario based on an information exchange between wireless sensor networks in home environment so that it shows roles of a bridge, handling sensed events. Second, we define a process of information exchange using UML sequence diagram. Third, we represent soap messages which contain methods and data defined in advance. We confirm effectiveness of information exchange mechanism with extensibility and flexibility through the case study
collaborative computing | 2006
Sangim Ahn; Kiwon Chong
According as home networks become a practical reality, wireless sensor networks are getting increasingly into the spotlight to monitor and control environmental conditions at home. Some methods need to exchange information in heterogeneous wireless sensor networks, such as different network protocol, different embedded operating system, and different manufacturers to produce sensor nodes. We propose an intelligent bridge as interoperable middleware architecture. This approach offers two contributions to the study of information exchange in heterogeneous constraints: First, we described rule management technique with interoperability in an intelligent bridge. Second, we defined general message exchange mechanism. They are composed of three factors: (1) a message format has elements which are message type, destination, source, number of message, and contents; (2) a message style is XML documents; and (3) a message transmission protocol is SOAP, a lightweight XML-based messaging protocol. We conducted a case study on sensing event handle in home environment to demonstrate the feasibility of our approach. We confirmed the effect of information exchange mechanism with extensibility and flexibility
international conference on computational science and its applications | 2007
Sangim Ahn; Kiwon Chong
User requirements have been changed during development progresses, since they are impossible to define all of software requirements. These requirements change leads to mistakes because the developers cannot completely understand the software structure and behavior, or they cannot discover all parts affected by a change. Therefore, requirement changes have to be managed and assessed to ensure that they are feasible, make economic sense, and contribute to the business needs of the customer organization. We propose requirements change management process on feature-oriented requirements tracing. It is based on value analysis and feature-oriented requirement traceability links. Our approach offers two contributions to the study of requirements change: (1)We define a requirements change tree model to make user requirements change request generalize by feature level. (2)We provide overall process such as change request normalization, change impact analysis, change request alternative design, change request implementation, and change request evaluation. In addition, we especially summarize the results of a case study which is carried out in asset management portal system.
international conference on computational science and its applications | 2005
Yongsun Cho; Woojin Lee; Kiwon Chong
The systematic testing is frequently regretted in recent web applications because of time and cost pressure. Moreover developers have difficulties with applying the traditional testing techniques. A technique for generating test cases from the UML sequence diagrams of a web application is proposed for the rapid and effective testing. A test of the web applications is composed of a single web page test, a mutual web page test and an integrated web page test. The test cases for a single web page test are generated from self-call messages and the test cases for a mutual web page test are generated from the messages between web pages. The test cases for an integrated web page test are generated from the messages which are sent to the system by an actor and received back from the system.
embedded and ubiquitous computing | 2005
Woojin Lee; Juil Kim; Kiwon Chong
An intelligent agent which is a software component for the efficient home network system is proposed in this paper. The agent consists of six modules such as the Agent Manager, the Data Collector, the Execution Controller, the Data Storage, the Data Queue and the User Interface. The Agent Manager manages the tasks of modules, and the Data Collector collects the data from home appliances through the RFID readers. The Execution Controller determines the operations of home appliances according to the conditions of the home environment and transfers the operations to the appliances through the RFID readers. Moreover, the Data Storage keeps the data which is necessary for the operations of the agent, and the Data Queue temporarily stores the data which is collected from home appliances. Lastly, the User Interface provides the graphical user interface in which an individual can directly control and monitor the home network. The proposed intelligent agent autonomously learns the circumstances of a home network by analyzing the data about the state of home appliances, and provides the best suited environment to the user. Therefore, the user can live in an optimal home environment without effort if he/she performs home networking through the agent.
component based software engineering | 2006
Kwangyong Lee; Juil Kim; Woojin Lee; Kiwon Chong
As the number of available web services is steadily increasing, many applications are being developed by reusing web services. Accordingly, a tool to generate an adapter which integrates interfaces of several web services is proposed in this paper. The concept of the adapter for the integration of web services interface is described. The purpose of the adapter is to help developers use several web services with little effort for their application development. Then, implementation of the tool to generate an adapter is presented. The architecture of the tool, the process, and the algorithm to generate an adapter are described. The tool will help developers integrate several web services when they develop applications.
international conference on hybrid information technology | 2008
Sangim Ahn; Kiwon Chong
Traceability links are useful for requirements change impact analysis, requirements conflict analysis, and requirements consistency checking. However, establishing and maintaining traceability links places a big burden since complex systems have especially yield an enormous number of various artifacts. We propose a value estimation method for feature-oriented requirements tracing. It uses a feature as intermediate catalysis to generate traceability links between user requirements and implementation artifacts, by priority level after analyzing each features value. In addition, we present value evaluation parameters including requirements importance, requirements risk, cost & efforts, and templates for value analysis.
asia pacific network operations and management symposium | 2006
Sunwoo Jung; Jaehyun Choi; Dongkyu Kim; Kiwon Chong
The configuration management of a sensor network composed of tens or up to thousands of nodes is difficult due to the limit of memory space and energy consumption. This paper presents an approach for dynamic reconfiguration of application modules in sensor networks based on Nano-Qplus. The version information from proposed methods is registered into NVSync (Nano-Qplus Version Synchronization), a node management tool. It dynamically reconfigures application modules on the nodes by synchronizing them with the node information map on the centralized repository. Our approach utilizes efficient usage of limited memory by systematically managing application modules of each node composed of sensor network. Additionally, it reduces unnecessary energy consumption by dynamic reconfiguration of application modules on the nodes. Therefore, it can flexibly deal with change of application environment of the node.
The e-Business Studies | 2010
Young-Woon Kim; Kiwon Chong
Unlike typical corporate investments, IT expenditures have direct impact on many aspects of a business, including those that are difficult to quantify. Therefore, financial indicators alone do not do justice to the full effect of an If investment. Proposed in this paper is a methodology to measure the return on IT investments, including non-financial impacts expressed in terms of monetary values. This methodology shows tangible cost as well as hidden cost by analyzing total cost of ownership. The methodology also produces ROI by performing cost benefit analysis including financial and non-financial factors. This paper suggests a more objective validation of Ifs impact on the business activities. It rationalizes investment priorities and provides a systematic approach to effective IT investment.