Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Young B. Park is active.

Publication


Featured researches published by Young B. Park.


international conference on advanced software engineering and its applications | 2011

Mobile Application Compatibility Test System Design for Android Fragmentation

Hyung Kil Ham; Young B. Park

Android is an open operating system developed by the Open Handset Alliance (OHA) that Google-led. However, due to the nature of an open operating system, Android has the fragmentation problem which is mobile application behavior varies by device. And due to this problem, a developer has been consuming a lot of time and money to develop mobile app test. In this paper, we have designed mobile application compatibility test system for android fragmentation. This system is designed to compare code analysis result and API pre-testing to detect android fragmentation. By comparing the fragmentation in the code level and the API level, the time and cost of mobile application test can be reduced.


international conference on information science and applications | 2013

Fragmentation Problem in Android

Je-Ho Park; Young B. Park; Hyung Kil Ham

Due to the nature of an open operating system, Android framework cannot avoid the fragmentation problem. To address this, cost of time and efforts to devise application tests in mobile environment is unavoidable. In this paper, we propose two methods that handle android fragmentation problem.


international conference on information networking | 2015

The performance evaluation of k-means by two MapReduce frameworks, Hadoop vs. Twister

Yunhee Kang; Young B. Park

In data mining, k-means is a method of cluster analysis using the nearest mean. It has been successfully used in various topics, ranging from market segmentation, computer vision, geostatistics, and astronomy to agriculture. But k-means like clustering is not easy to apply MapReduce model due to the iterative manner that can happen the stagger map tasks with high likelihood. This paper presents the result of performance evaluation of K-means application running on Twister and Hadoop framework. We report how to design a MapReduce application to organize the objects of dataset into k partitions. This approach provides the way to cluster a dataset by Hadoop, the MapReduce frameworks in a parallel manner.


international conference on information science and applications | 2014

Test Case Generation from Cause-Effect Graph Based on Model Transformation

Hyun Seung Son; R. Young Chul Kim; Young B. Park

In software testing, cause-effect graph assures coverage criteria of 100% functional requirements with minimum test case. The existing test case generation from cause-effect graph implements the algorithmic approach. It has disadvantages to modify the entire program if the input model is different. In contrast, model transformation approach can flexibly implement with even a different input models. In the future, we need to study the method of automatic generation of test cases from UML Diagram. It is possible to generate the test case when mapping between cause-effect graph and UML diagram. In this paper, as a first research step, we propose the method to generate test cases from cause-effect graph based on model transformation. To implement the proposed method, we write the rules of model transformation with ATLAS Transformation Language (ATL), and execute the rules in development environment of Eclipse. The implemented tool of the proposed method can be easily extended by rewriting with the mapping rule between cause-effect graph and UML diagram. We just define the relationship between each models to generate the test case.


international conference on information science and applications | 2014

Modeling and Simulation for Embedded Software System

So Young Moon; Bo Kyung Park; R. Young Chul Kim; Young B. Park

For productivity and correctness of embedded software system, I will focus on the verification of modeling by using M&S (Modeling & Simulation) in the modeling part. M&S (Modeling & Simulation) will be used to verify the modeling. If models are simulated for verification after modeling when we develop the embedded software, we may have the correctness of models. Also, it is probably going to improve embedded softwares reusability and reliability because we will be reusing correctness models. In this paper, we will extend a dynamic diagram of UML2.0 and xUML including Real-Time concepts to adapt to the embedded environment for embedded software modeling. Furthermore, it is probably going to improve reliability of embedded software system with using modeling and simulation concepts.


KIPS Transactions on Software and Data Engineering | 2013

Derivation of State Transition Diagram from Class Using Tree Structure

Soo Kyung Choi; Young B. Park

To improve the reliability and quality of software system, many studies of the testing based on state-transition diagram have been in progress. Existing studies tried to solve the complexity problem of state-transition diagram. But the development of test case demands the better way to derive and manage the state diagram with low complexity. In this paper, the STMT(State-Transition Mapping Tree) is proposed to decrease the complexity of state diagram without changing or loosing the original state or transition information. Comparing with other methods, the proposed method turns out to be less complex.


international conference on advanced software engineering and its applications | 2011

Efficient Image Identifier Composition for Image Database

Je-Ho Park; Young B. Park

As devices with image acquisition functionality have became affordable, the amount of images produced in diverse applications is enormous. Hence, binding an image with a distinctive value for the purpose identification needs to be efficient in the perspective of cost and effective regarding the goal as well. In this paper, we present a novel approach to image identifier generation. The proposed identifier generation method is motivated by pursuing a simple but effective and efficient approach. Taking fundamental image feature extraction methods into account, we make use of distribution of line segment so as to compose identifiers that basically satisfy one-to-one relationship between an image and a corresponding identifier. The generated identifiers can be used for name composition mechanism in a storage system or indexing in a massive image database. Our experimental results on generation of constituent index values have shown favorable results.


Sensors | 2018

An Architecture Framework for Orchestrating Context-Aware IT Ecosystems: A Case Study for Quantitative Evaluation

Soo-Jin Park; Sungyong Park; Young B. Park

With the emergence of various forms of smart devices and new paradigms such as the Internet of Things (IoT) concept, the IT (Information Technology) service areas are expanding explosively compared to the provision of services by single systems. A new system operation concept that has emerged in accordance with such technical trends is the IT ecosystem. The IT ecosystem can be considered a special type of system of systems in which multiple systems with various degrees of autonomy achieve common goals while adapting to the given environment. The single systems that participate in the IT ecosystem adapt autonomously to the current situation based on collected data from sensors. Furthermore, to maintain the services supported by the whole IT ecosystem sustainably, the configuration of single systems that participate in the IT ecosystem also changes appropriately in accordance with the changed situation. In order to support the IT ecosystem, this paper proposes an architecture framework that supports dynamic configuration changes to achieve the goal of the whole IT ecosystem, while ensuring the autonomy of single systems through the collection of data from sensors so as to recognize the situational context of individual participating systems. For the feasibility evaluation of the proposed framework, a simulated example of an IT ecosystem for unmanned forest management was constructed, and the quantitative evaluation results are discussed in terms of the extent to which the proposed architecture framework can continuously provide sustainable services in response to diverse environmental context changes.


Mobile Information Systems | 2018

Methodology for Automatic Ontology Generation Using Database Schema Information

JungHyen An; Young B. Park

An ontology is a model language that supports the functions to integrate conceptually distributed domain knowledge and infer relationships among the concepts. Ontologies are developed based on the target domain knowledge. As a result, methodologies to automatically generate an ontology from metadata that characterize the domain knowledge are becoming important. However, existing methodologies to automatically generate an ontology using metadata are required to generate the domain metadata in a predetermined template, and it is difficult to manage data that are increased on the ontology itself when the domain OWL (Ontology Web Language) individuals are continuously increased. The database schema has a feature of domain knowledge and provides structural functions to efficiently process the knowledge-based data. In this paper, we propose a methodology to automatically generate ontologies and manage the OWL individual through an interaction of the database and the ontology. We describe the automatic ontology generation process with example schema and demonstrate the effectiveness of the automatically generated ontology by comparing it with existing ontologies using the ontology quality score.


Wireless Personal Communications | 2016

Software Vulnerability Detection Methodology Combined with Static and Dynamic Analysis

Seokmo Kim; R. Young Chul Kim; Young B. Park

Software vulnerability is the attack surface. Therefore, vulnerabilities innate in software should be detected for software security assurance. Vulnerability detection method can be divided into static vulnerability detection and dynamic vulnerability detection. Static vulnerability detection is more commonly used for vulnerability detection. This method has many benefits, but it also creates false positives. Therefore, this paper proposes a method to combine static and dynamic detection to reduce false positives created from static vulnerability detection. The proposed method verifies the vulnerability by implanting a fault, based on the information received from static code analysis.

Collaboration


Dive into the Young B. Park's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge