This page has only limited features, please log in for full access.

Unclaimed
Yunsick Sung
Faculty of Computer Engineering, Keimyung University, Daegu, South Korea

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 01 August 2018 in Applied Soft Computing
Reads 0
Downloads 0
ACS Style

Jinyan Li; Simon Fong; Raymond K. Wong; Sabah Mohammed; Jinan Fiaidhi; Yunsick Sung. A suite of swarm dynamic multi-objective algorithms for rebalancing extremely imbalanced datasets. Applied Soft Computing 2018, 69, 784 -805.

AMA Style

Jinyan Li, Simon Fong, Raymond K. Wong, Sabah Mohammed, Jinan Fiaidhi, Yunsick Sung. A suite of swarm dynamic multi-objective algorithms for rebalancing extremely imbalanced datasets. Applied Soft Computing. 2018; 69 ():784-805.

Chicago/Turabian Style

Jinyan Li; Simon Fong; Raymond K. Wong; Sabah Mohammed; Jinan Fiaidhi; Yunsick Sung. 2018. "A suite of swarm dynamic multi-objective algorithms for rebalancing extremely imbalanced datasets." Applied Soft Computing 69, no. : 784-805.

Article
Published: 20 March 2017 in The Journal of Supercomputing
Reads 0
Downloads 0

Social network services (SNSs) have become one of the core Internet-based application services in recent years. Through SNSs, diverse kinds of private data are shared with users’ friends and SNS plug-in applications. However, these data can be exposed via abnormal private data access. For example, the addition of fake friends to a user’s account is one approach to gain access to a private user’s data. Private user data can be protected from being accessed by using an automated method to assess information. This paper proposes a method that evaluates private data accesses for social network security. By defining normal private data access patterns in advance, abnormal private data access patterns can be exposed. Normal private data access patterns are generated by analyzing all of the consecutive private data accesses of users based on Bayesian probability. We have proven the effectiveness of our approach by conducting experiments where the private data access signals of Twitter accounts were collected and analyzed.

ACS Style

Jong Hyuk Park; Yunsick Sung; Pradip Kumar Sharma; Young-Sik Jeong; Gangman Yi. Novel assessment method for accessing private data in social network security services. The Journal of Supercomputing 2017, 73, 3307 -3325.

AMA Style

Jong Hyuk Park, Yunsick Sung, Pradip Kumar Sharma, Young-Sik Jeong, Gangman Yi. Novel assessment method for accessing private data in social network security services. The Journal of Supercomputing. 2017; 73 (7):3307-3325.

Chicago/Turabian Style

Jong Hyuk Park; Yunsick Sung; Pradip Kumar Sharma; Young-Sik Jeong; Gangman Yi. 2017. "Novel assessment method for accessing private data in social network security services." The Journal of Supercomputing 73, no. 7: 3307-3325.

Journal article
Published: 24 December 2016 in Symmetry
Reads 0
Downloads 0

Unmanned aerial vehicles (UAVs) with auto-pilot capabilities are often used for surveillance and patrol. Pilots set the flight points on a map in order to navigate to the imaging point where surveillance or patrolling is required. However, there is the limit denoting the information such as absolute altitudes and angles. Therefore, it is required to set the information accurately. This paper hereby proposes a method to construct environmental symmetric big data using an unmanned aerial vehicle (UAV) during flight by designating the imaging and non-imaging points for surveillance and patrols. The K-Means-based algorithm proposed in this paper is then employed to divide the imaging points, which is set by the pilot, into K clusters, and K imaging points are determined using these clusters. Flight data are then used to set the points to which the UAV will fly. In our experiment, flight records were gathered through an UAV in order to monitor a stadium and the imaging and non-imaging points were set using the proposed method and compared with the points determined by a traditional K-Means algorithm. Through the proposed method, the cluster centroids and cumulative distance of its members were reduced by 87.57% more than with the traditional K-Means algorithm. With the traditional K-Means algorithm, imaging points were not created in the five points desired by the pilot, and two incorrect points were obtained. However, with the proposed method, two incorrect imaging points were obtained. Due to these two incorrect imaging points, the two points desired by the pilot were not generated.

ACS Style

Jeonghoon Kwak; Jong Hyuk Park; Yunsick Sung. Unmanned Aerial Vehicle Flight Point Classification Algorithm Based on Symmetric Big Data. Symmetry 2016, 9, 1 .

AMA Style

Jeonghoon Kwak, Jong Hyuk Park, Yunsick Sung. Unmanned Aerial Vehicle Flight Point Classification Algorithm Based on Symmetric Big Data. Symmetry. 2016; 9 (1):1.

Chicago/Turabian Style

Jeonghoon Kwak; Jong Hyuk Park; Yunsick Sung. 2016. "Unmanned Aerial Vehicle Flight Point Classification Algorithm Based on Symmetric Big Data." Symmetry 9, no. 1: 1.

Journal article
Published: 01 December 2016 in Sensors
Reads 0
Downloads 0

The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments.

ACS Style

Jaeseung Lee; Yunsick Sung; Jong Hyuk Park. Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments. Sensors 2016, 16, 2044 .

AMA Style

Jaeseung Lee, Yunsick Sung, Jong Hyuk Park. Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments. Sensors. 2016; 16 (12):2044.

Chicago/Turabian Style

Jaeseung Lee; Yunsick Sung; Jong Hyuk Park. 2016. "Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments." Sensors 16, no. 12: 2044.

Journal article
Published: 04 November 2016 in Sustainability
Reads 0
Downloads 0

Given that location information is the key to providing a variety of services in sustainable indoor computing environments, it is required to obtain accurate locations. Locations can be estimated by three distances from three fixed points. Therefore, if the distance between two points can be measured or estimated accurately, the location in indoor environments can be estimated. To increase the accuracy of the measured distance, noise filtering, signal revision, and distance estimation processes are generally performed. This paper proposes a novel framework for estimating the distance between a beacon and an access point (AP) in a sustainable indoor computing environment. Diverse types of received strength signal indications (RSSIs) are used for WiFi, Bluetooth, and radio signals, and the proposed distance estimation framework is unique in that it is independent of the specific wireless signal involved, being based on the Bluetooth signal of the beacon. Generally, RSSI measurement, noise filtering, and revision are required for distance estimation using RSSIs. The employed RSSIs are first measured from an AP, with multiple APs sometimes used to increase the accuracy of the distance estimation. Owing to the inevitable presence of noise in the measured RSSIs, the application of noise filtering is essential, and further revision is used to address the inaccuracy and instability that characterizes RSSIs measured in an indoor environment. The revised RSSIs are then used to estimate the distance. The proposed distance estimation framework uses one AP to measure the RSSIs, a Kalman filter to eliminate noise, and a log-distance path loss model to revise the measured RSSIs. In the experimental implementation of the framework, both a RSSI filter and a Kalman filter were respectively used for noise elimination to comparatively evaluate the performance of the latter for the specific application. The Kalman filter was found to reduce the accumulated errors by 8% relative to the RSSI filter. This confirmed the accuracy of the proposed distance estimation framework.

ACS Style

Yunsick Sung. RSSI-Based Distance Estimation Framework Using a Kalman Filter for Sustainable Indoor Computing Environments. Sustainability 2016, 8, 1136 .

AMA Style

Yunsick Sung. RSSI-Based Distance Estimation Framework Using a Kalman Filter for Sustainable Indoor Computing Environments. Sustainability. 2016; 8 (11):1136.

Chicago/Turabian Style

Yunsick Sung. 2016. "RSSI-Based Distance Estimation Framework Using a Kalman Filter for Sustainable Indoor Computing Environments." Sustainability 8, no. 11: 1136.

Journal article
Published: 16 October 2016 in Entropy
Reads 0
Downloads 0

Given that entropy-based IT technology has been applied in homes, office buildings and elsewhere for IT security systems, diverse kinds of intelligent services are currently provided. In particular, IT security systems have become more robust and varied. However, access control systems still depend on tags held by building entrants. Since tags can be obtained by intruders, an approach to counter the disadvantages of tags is required. For example, it is possible to track the movement of tags in intelligent buildings in order to detect intruders. Therefore, each tag owner can be judged by analyzing the movements of their tags. This paper proposes a security approach based on the received signal strength indicators (RSSIs) of beacon-based tags to detect intruders. The normal RSSI patterns of moving entrants are obtained and analyzed. Intruders can be detected when abnormal RSSIs are measured in comparison to normal RSSI patterns. In the experiments, one normal and one abnormal scenario are defined for collecting the RSSIs of a Bluetooth-based beacon in order to validate the proposed method. When the RSSIs of both scenarios are compared to pre-collected RSSIs, the RSSIs of the abnormal scenario are about 61% more different compared to the RSSIs of the normal scenario. Therefore, intruders in buildings can be detected by considering RSSI differences.

ACS Style

Yunsick Sung. Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators. Entropy 2016, 18, 366 .

AMA Style

Yunsick Sung. Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators. Entropy. 2016; 18 (10):366.

Chicago/Turabian Style

Yunsick Sung. 2016. "Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators." Entropy 18, no. 10: 366.

Journal article
Published: 09 September 2016 in Sustainability
Reads 0
Downloads 0

Software Defined Networking (SDN) has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT) infrastructure. For Future Sustainability Computing (FSC), SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO) and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.

ACS Style

Yunsick Sung; Pradip Kumar Sharma; Erik Miranda Lopez; Jong Hyuk Park. FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing. Sustainability 2016, 8, 919 .

AMA Style

Yunsick Sung, Pradip Kumar Sharma, Erik Miranda Lopez, Jong Hyuk Park. FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing. Sustainability. 2016; 8 (9):919.

Chicago/Turabian Style

Yunsick Sung; Pradip Kumar Sharma; Erik Miranda Lopez; Jong Hyuk Park. 2016. "FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing." Sustainability 8, no. 9: 919.

Journal article
Published: 01 September 2016 in Advanced Science Letters
Reads 0
Downloads 0

In indoor environments, beacon-based distance measurement approach can be utilized to find UAVs locations. Therefore, there are diverse kinds of approaches to revise the distances from APs and UAVs that contains beacons. As increasing the accuracy of the distance, the accuracy of the locations can be further increased. Therefore, it is required to improve the accuracy of the estimated distances. This paper proposes a method that improves a relative distance estimation method by defining and utilizing intermediate beacons. An intermediate beacon is a beacon that is located between access points and is referenced to revise the calculated distances between an AP and a beacon.

ACS Style

Yunsick Sung; Jong Hyuk Park. Improved Relative Distance Estimation Method Using Intermediate Reference Beacons for UAVs. Advanced Science Letters 2016, 22, 2524 -2526.

AMA Style

Yunsick Sung, Jong Hyuk Park. Improved Relative Distance Estimation Method Using Intermediate Reference Beacons for UAVs. Advanced Science Letters. 2016; 22 (9):2524-2526.

Chicago/Turabian Style

Yunsick Sung; Jong Hyuk Park. 2016. "Improved Relative Distance Estimation Method Using Intermediate Reference Beacons for UAVs." Advanced Science Letters 22, no. 9: 2524-2526.

Article
Published: 19 August 2016 in Multimedia Tools and Applications
Reads 0
Downloads 0

Nowadays, diverse kinds of user interfaces are being developed based on the natural user interface/experience. Examples of these include Leap motion, which measures finger motions to produce finger-based commands and MYO, which measures arm motions for arm-based commands. However, these types of motion sensors are still too expensive to be utilized for commercial applications. Moreover, multiple motion sensors sometimes need to be utilized concurrently in order to estimate user motions accurately. Thus, either the cost of motion sensors or the number utilized needs to be reduced. This paper proposes a motion framework that estimates unmeasured motions based on Bayesian probability and measured motions, where motions are defined by a set of MYO sensor values. Bayesian probability is calculated in advance by measuring co-related motions and counting the occurrence of these measured co-related motions. As a result, the number of MYOs needed is reduced. In experiments conducted using MYOs, the processes used to calculate Bayesian probability and to estimate unmeasured motions were validated. Comparison of the measured motions with the unmeasured motions showed that the difference between the two types of motions was small, and indicated that the proposed motion estimation framework estimates unmeasured motions with an average error of 0.05, which exhibits a 25 % improvement over the traditional method.

ACS Style

Sang-Geol Lee; Yunsick Sung; Jong Hyuk Park. Motion estimation framework and authoring tools based on MYOs and Bayesian probability. Multimedia Tools and Applications 2016, 1 -20.

AMA Style

Sang-Geol Lee, Yunsick Sung, Jong Hyuk Park. Motion estimation framework and authoring tools based on MYOs and Bayesian probability. Multimedia Tools and Applications. 2016; ():1-20.

Chicago/Turabian Style

Sang-Geol Lee; Yunsick Sung; Jong Hyuk Park. 2016. "Motion estimation framework and authoring tools based on MYOs and Bayesian probability." Multimedia Tools and Applications , no. : 1-20.

Withdrawal
Published: 01 May 2016 in Computerized Medical Imaging and Graphics
Reads 0
Downloads 0

This article has been withdrawn at the request of the author(s) and/or editor. The Publisher apologizes for any inconvenience this may cause. The full Elsevier Policy on Article Withdrawal can be found at http://www.elsevier.com/locate/withdrawalpolicy.

ACS Style

Jinyan Li; Lian-Sheng Liu; Simon Fong; Raymond K. Wong; Sabah Mohammed; Jinan Fiaidhi; Yunsick Sung; Kelvin K.L. Wong. WITHDRAWN: Adaptive Swarm Balancing Algorithms for rare-event prediction in imbalanced healthcare data. Computerized Medical Imaging and Graphics 2016, 1 .

AMA Style

Jinyan Li, Lian-Sheng Liu, Simon Fong, Raymond K. Wong, Sabah Mohammed, Jinan Fiaidhi, Yunsick Sung, Kelvin K.L. Wong. WITHDRAWN: Adaptive Swarm Balancing Algorithms for rare-event prediction in imbalanced healthcare data. Computerized Medical Imaging and Graphics. 2016; ():1.

Chicago/Turabian Style

Jinyan Li; Lian-Sheng Liu; Simon Fong; Raymond K. Wong; Sabah Mohammed; Jinan Fiaidhi; Yunsick Sung; Kelvin K.L. Wong. 2016. "WITHDRAWN: Adaptive Swarm Balancing Algorithms for rare-event prediction in imbalanced healthcare data." Computerized Medical Imaging and Graphics , no. : 1.

Book chapter
Published: 24 January 2016 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

The locations of residents are utilized not only for recognizing the situation of indoor ubiquitous computing environments but also for controlling devices and expressing intention. This paper proposes a novel user interface to utilize the locations of users as control signals in indoor ubiquitous computing environments. The locations of users are estimated by analyzing the distance between a beacon and APs.

ACS Style

Jeonghoon Kwak; Yunsick Sung. Indoor Location-Based Natural User Interface for Ubiquitous Computing Environment. Lecture Notes in Electrical Engineering 2016, 131 -136.

AMA Style

Jeonghoon Kwak, Yunsick Sung. Indoor Location-Based Natural User Interface for Ubiquitous Computing Environment. Lecture Notes in Electrical Engineering. 2016; ():131-136.

Chicago/Turabian Style

Jeonghoon Kwak; Yunsick Sung. 2016. "Indoor Location-Based Natural User Interface for Ubiquitous Computing Environment." Lecture Notes in Electrical Engineering , no. : 131-136.

Book chapter
Published: 24 January 2016 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

In the indoor ubiquitous computing environment where Global Positioning System (GPS) cannot be utilized, the approach to calculate the locations of Unmanned Aerial Vehicles (UAVs) is the core technique to control multiple UAVs. To calculate the locations of UAVs, the distance between Access Points (APs) and UAVs should be measured accurately given that the location of UAVs is obtained on the basis of the distance between APs and UAVs. In this paper, we propose a method to measure the distance between a single beacon and a single AP in an indoor ubiquitous computing environment. We assume that the beacon is attached to the bottom of a UAV. In the indoor experiment, while transferring a beacon, the distances between the beacon and an AP were measured and tuned. Therefore, the accumulated difference between the real beacon location and the calculated beacon location was reduced by 31.1 %.

ACS Style

Yunsick Sung; Jeonghoon Kwak; Young-Sik Jeong; Jong Hyuk Park. Beacon Distance Measurement Method in Indoor Ubiquitous Computing Environment. Lecture Notes in Electrical Engineering 2016, 125 -130.

AMA Style

Yunsick Sung, Jeonghoon Kwak, Young-Sik Jeong, Jong Hyuk Park. Beacon Distance Measurement Method in Indoor Ubiquitous Computing Environment. Lecture Notes in Electrical Engineering. 2016; ():125-130.

Chicago/Turabian Style

Yunsick Sung; Jeonghoon Kwak; Young-Sik Jeong; Jong Hyuk Park. 2016. "Beacon Distance Measurement Method in Indoor Ubiquitous Computing Environment." Lecture Notes in Electrical Engineering , no. : 125-130.

Journal article
Published: 22 January 2016 in Cluster Computing
Reads 0
Downloads 0

In ubiquitous computing, diverse media technologies have recently been extensively researched and applied to various fields. The goal of media technologies is to improve our daily lives by enabling us to control active media devices such as smart phones, tablets, and TVs. The locations of users are important to providing a variety of services to users. In addition, given that all devices cannot be simultaneously utilized, and only one device is sometimes being used, the location information can be utilized to help determine one of the core active media devices at a specific instant in time. This paper proposes an active media-control interface that is based on location recognition methods using beacons in indoor ubiquitous computing. In the proposed environment, users have a beacon that denotes the location of each user. The one that is the nearest from the beacon is selected from among multiple active media devices for servicing. In the experiments, four access points and one beacon was used to validate the proposed method. The advantage of the proposed method is that it enables us to apply active media technology to indoor environments. By recognizing user locations in indoor environments, several kinds of active media services become available.

ACS Style

Yunsick Sung; Young-Sik Jeong; Jong Hyuk Park. Beacon-based active media control interface in indoor ubiquitous computing environment. Cluster Computing 2016, 19, 547 -556.

AMA Style

Yunsick Sung, Young-Sik Jeong, Jong Hyuk Park. Beacon-based active media control interface in indoor ubiquitous computing environment. Cluster Computing. 2016; 19 (1):547-556.

Chicago/Turabian Style

Yunsick Sung; Young-Sik Jeong; Jong Hyuk Park. 2016. "Beacon-based active media control interface in indoor ubiquitous computing environment." Cluster Computing 19, no. 1: 547-556.

Book chapter
Published: 01 January 2016 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

This chapter proposes a method that controls User Interfaces by changing properties of UIs after analyzing the patters of events invoked by users. The events and criteria are defined and handled to determine the properties of UIs. In the experiment, our proposed method was applied to an education authoring tool. The changes of UIs after the analysis of user events were validated.

ACS Style

Junhyuck Son; Yunsick Sung. Bayesian Probability and User Experience-Based Smart UI Design Method. Lecture Notes in Electrical Engineering 2016, 245 -250.

AMA Style

Junhyuck Son, Yunsick Sung. Bayesian Probability and User Experience-Based Smart UI Design Method. Lecture Notes in Electrical Engineering. 2016; ():245-250.

Chicago/Turabian Style

Junhyuck Son; Yunsick Sung. 2016. "Bayesian Probability and User Experience-Based Smart UI Design Method." Lecture Notes in Electrical Engineering , no. : 245-250.

Book chapter
Published: 01 January 2016 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Deficiencies in low-priced motion recognition devices lead to diverse kinds of errors in recognizing palms and hands. To utilize lower-priced devices better, the recognition rate of the properties of hands should be improved. This chapter proposes a method that revises recognition errors in properties of hands. By calculating the Bayesian probability of the directions of a recognized palm, the directions were revised.

ACS Style

Phil Young Kim; Ji Won Kim; Yunsick Sung. Bayesian Probability-Based Hand Property Control Method. Lecture Notes in Electrical Engineering 2016, 251 -256.

AMA Style

Phil Young Kim, Ji Won Kim, Yunsick Sung. Bayesian Probability-Based Hand Property Control Method. Lecture Notes in Electrical Engineering. 2016; ():251-256.

Chicago/Turabian Style

Phil Young Kim; Ji Won Kim; Yunsick Sung. 2016. "Bayesian Probability-Based Hand Property Control Method." Lecture Notes in Electrical Engineering , no. : 251-256.

Book chapter
Published: 01 January 2016 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Universal courseware using motion recognition devices is very useful for students to learn universal science because it enables interactive learning. However, given that students change the radius of planets by the distance between their hands, it is nearly impossible to denote larger radii with their hands within fixed-hand recognition area of the motion recognition devices by a single expression. This chapter proposes a method that controls planets using motion recognition devices for courseware contents. The distance between hands is expressed by the sum of the difference of each position of the user’s hands. In the experiment, we validated the change of the radius of planets according to the difference of each recognized hand.

ACS Style

Ji Won Kim; Phil Young Kim; Yunsick Sung. Planet Editing Method Using Leap Motions. Lecture Notes in Electrical Engineering 2016, 225 -230.

AMA Style

Ji Won Kim, Phil Young Kim, Yunsick Sung. Planet Editing Method Using Leap Motions. Lecture Notes in Electrical Engineering. 2016; ():225-230.

Chicago/Turabian Style

Ji Won Kim; Phil Young Kim; Yunsick Sung. 2016. "Planet Editing Method Using Leap Motions." Lecture Notes in Electrical Engineering , no. : 225-230.

Book chapter
Published: 01 January 2016 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Smartphone sensors can be useful in recognizing risk situations faced by users. However, the use of diverse kinds of sensors for risk estimation increases the complexity of such analyses. This chapter proposes a method to recognize the risk quotient in user situations by measuring and managing the data that smartphone sensors provide.

ACS Style

Taejun Son; Jeonghoon Kwak; Suhyun Gong; Yunsick Sung. Risk Decision Method Based on Sensory Values of Smart Devices. Lecture Notes in Electrical Engineering 2016, 277 -282.

AMA Style

Taejun Son, Jeonghoon Kwak, Suhyun Gong, Yunsick Sung. Risk Decision Method Based on Sensory Values of Smart Devices. Lecture Notes in Electrical Engineering. 2016; ():277-282.

Chicago/Turabian Style

Taejun Son; Jeonghoon Kwak; Suhyun Gong; Yunsick Sung. 2016. "Risk Decision Method Based on Sensory Values of Smart Devices." Lecture Notes in Electrical Engineering , no. : 277-282.

Book chapter
Published: 01 January 2016 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

This chapter proposes a two-behavior networks-based method to automatically detect whether a situation is risky or not. Behavior network is used to analyze measured values from the sensors of a smart phone. Bayesian probability is also used for implementing such a behavior network. An experiment was conducted to validate that the speed of recognizing risk situations was improved by learning such situations iteratively through behavior networks with Bayesian probability.

ACS Style

Jeonghoon Kwak; Suhyun Gong; Yunsick Sung. Behavior Network-Based Risk Recognition Method. Lecture Notes in Electrical Engineering 2016, 201 -205.

AMA Style

Jeonghoon Kwak, Suhyun Gong, Yunsick Sung. Behavior Network-Based Risk Recognition Method. Lecture Notes in Electrical Engineering. 2016; ():201-205.

Chicago/Turabian Style

Jeonghoon Kwak; Suhyun Gong; Yunsick Sung. 2016. "Behavior Network-Based Risk Recognition Method." Lecture Notes in Electrical Engineering , no. : 201-205.

Book chapter
Published: 01 January 2016 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

This chapter proposes a novel design pattern that combines proxy and producer–consumer patterns to solve problems of a scenario generator for verifications of sensors in smart space. In addition, how to apply the novel design pattern to scenario generator is introduced. Proxy pattern hides the complexity of the process of generating scenarios and solves the storage problem of a scenario generator. By applying the proposed Proxy-Producer pattern including multiple threads, the generation time of the huge number of scenarios was reduced.

ACS Style

Jeonghoon Kwak; Jaehak Uam; Yunsick Sung. Integration Method of Proxy and Producer–Consumer Patterns. Lecture Notes in Electrical Engineering 2016, 239 -244.

AMA Style

Jeonghoon Kwak, Jaehak Uam, Yunsick Sung. Integration Method of Proxy and Producer–Consumer Patterns. Lecture Notes in Electrical Engineering. 2016; ():239-244.

Chicago/Turabian Style

Jeonghoon Kwak; Jaehak Uam; Yunsick Sung. 2016. "Integration Method of Proxy and Producer–Consumer Patterns." Lecture Notes in Electrical Engineering , no. : 239-244.

Book chapter
Published: 01 January 2016 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

This paper proposes a method in which the Visitor pattern is used to apply the Composite pattern for solving the structure problems of the scenario generator, based on Bayesian probability. The traditional Visitor pattern is not ideal for adding new member functions due to its structure problems. By applying the Composite pattern, our approach provides flexibility to interfaces for adding and deleting new member functions.

ACS Style

Jaehak Uam; Jeonghoon Kwak; Yunsick Sung. Integration Method of Composite Pattern for Solving Structure Problems of Visitor Pattern. Lecture Notes in Electrical Engineering 2016, 557 -562.

AMA Style

Jaehak Uam, Jeonghoon Kwak, Yunsick Sung. Integration Method of Composite Pattern for Solving Structure Problems of Visitor Pattern. Lecture Notes in Electrical Engineering. 2016; ():557-562.

Chicago/Turabian Style

Jaehak Uam; Jeonghoon Kwak; Yunsick Sung. 2016. "Integration Method of Composite Pattern for Solving Structure Problems of Visitor Pattern." Lecture Notes in Electrical Engineering , no. : 557-562.