This page has only limited features, please log in for full access.

Unclaimed
Jisu Park
Department of Computer Science and Engineering, Jeonju University, Jeonju, South Korea

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Original research
Published: 09 April 2021 in Journal of Ambient Intelligence and Humanized Computing
Reads 0
Downloads 0

In generative adversarial networks (GANs), a generator network and discriminator network compete in deep learning tasks to generate real images. To reduce the difference between the generated image and actual image, an edge GAN (eGAN) model using edge detection was proposed. This eGAN model can utilize ambient intelligence, a human-centered technology that includes IoT, smart cities, and autonomous driving. Ambient intelligence is essential for the interconnection between humans and objects. The eGAN model was used to make this connectivity more accurate and reliable. Edge detection is an edge feature that extracts the boundaries of an image and generate images in a fast manner; however, because its threshold is arbitrarily set, the connectivity may be unstable. To solve this problem and improve the performance of the eGAN model, we analyzed various GAN models and edge detection methods and proposed a new edge detection technology using threshold settings. This edge detection method sets the threshold value for images, thereby increasing the accuracy of edge connection and reducing the loss error between the image generated by the eGAN model and actual image. To evaluate the performance of the eGAN model, the error between the generated image and actual image was compared by applying the GAN and eGAN models to the same image dataset. Consequently, it was found that the performance of the eGAN model improved by 21% in comparison to the existing GAN model.

ACS Style

Cho Youn Lee; Jin Gon Shon; Ji Su Park. An edge detection–based eGAN model for connectivity in ambient intelligence environments. Journal of Ambient Intelligence and Humanized Computing 2021, 1 -10.

AMA Style

Cho Youn Lee, Jin Gon Shon, Ji Su Park. An edge detection–based eGAN model for connectivity in ambient intelligence environments. Journal of Ambient Intelligence and Humanized Computing. 2021; ():1-10.

Chicago/Turabian Style

Cho Youn Lee; Jin Gon Shon; Ji Su Park. 2021. "An edge detection–based eGAN model for connectivity in ambient intelligence environments." Journal of Ambient Intelligence and Humanized Computing , no. : 1-10.

Journal article
Published: 17 February 2021 in Sustainability
Reads 0
Downloads 0

It would be very beneficial to determine in advance whether a student is likely to succeed or fail within a particular learning area, and it is hypothesized that this can be accomplished by examining student patterns based on the data generated before the learning process begins. Therefore, this article examines the sustainability of data-mining techniques used to predict learning outcomes. Data regarding students’ educational backgrounds and learning processes are analyzed by examining their learning patterns. When such achievement-level patterns are identified, teachers can provide the students with proactive feedback and guidance to help prevent failure. As a practical application, this study investigates students’ perceptions of computer and internet use and predicts their levels of information and communication technology literacy in advance via sustainability-in-data-mining techniques. The technique employed herein applies OneR, J48, bagging, random forest, multilayer perceptron, and sequential minimal optimization (SMO) algorithms. The highest early prediction result of approximately 69% accuracy was yielded for the SMO algorithm when using 47 attributes. Overall, via data-mining techniques, these results will aid the identification of students facing risks early on during the learning process, as well as the creation of customized learning and educational strategies for each of these students.

ACS Style

Kyungyeul Kim; Han-Sung Kim; JaeKwoun Shim; Ji Park. A Study in the Early Prediction of ICT Literacy Ratings Using Sustainability in Data Mining Techniques. Sustainability 2021, 13, 2141 .

AMA Style

Kyungyeul Kim, Han-Sung Kim, JaeKwoun Shim, Ji Park. A Study in the Early Prediction of ICT Literacy Ratings Using Sustainability in Data Mining Techniques. Sustainability. 2021; 13 (4):2141.

Chicago/Turabian Style

Kyungyeul Kim; Han-Sung Kim; JaeKwoun Shim; Ji Park. 2021. "A Study in the Early Prediction of ICT Literacy Ratings Using Sustainability in Data Mining Techniques." Sustainability 13, no. 4: 2141.

Journal article
Published: 05 August 2020 in Electronics
Reads 0
Downloads 0

A Web archive system is a traditional subject for preserving web content for the future and the importance is getting more significant due to the explosive growth of web content. The reference model for an open archival information system (OAIS) has been advising guidance for a long-term archiving system and most organizations that archive web content follow this guidance. In addition, the web archive (WARC) ISO standard is for web content archiving. However, there is no way to secure content integrity, and it is hard to identify the original. Because of limitations, a web archive system has a weakness against the dispute of content integrity. In this paper, we proposed the blockchain linked (BCLinked) web archiving system, which uses blockchain technology and an extended WARC field to keep a web content integrity metadata into a blockchain. Furthermore, we designed the BCLinked web archiving system, and we confirmed the proposed system secures content integrity through the experiment.

ACS Style

Hyun Cheon Hwang; Jin Gon Shon; Ji Su Park. Design of an Enhanced Web Archiving System for Preserving Content Integrity with Blockchain. Electronics 2020, 9, 1255 .

AMA Style

Hyun Cheon Hwang, Jin Gon Shon, Ji Su Park. Design of an Enhanced Web Archiving System for Preserving Content Integrity with Blockchain. Electronics. 2020; 9 (8):1255.

Chicago/Turabian Style

Hyun Cheon Hwang; Jin Gon Shon; Ji Su Park. 2020. "Design of an Enhanced Web Archiving System for Preserving Content Integrity with Blockchain." Electronics 9, no. 8: 1255.

Journal article
Published: 29 May 2020 in Applied Sciences
Reads 0
Downloads 0

With the continuous development of wireless communication technology, the Internet of Things (IoT) is being used in a wide range of fields. The IoT collects and exchanges large amounts of data with objects, either tangible or intangible, such as sensors or physical devices, connected to the Internet. Wireless sensor networks (WSNs) are components of IoT systems. WSNs are used in various IoT systems, such as monitoring, tracking, and detection systems, to extract relevant information and deliver it to users. WSNs consist of sensor nodes with low power, low cost, and multiple functions. Because sensor nodes have limited resources, such as power and memory, a reduction in the energy efficiency of the sensor nodes in WSNs will lead to a decrease in wireless network performance and an increase in packet loss, which affects IoT system performance. Therefore, this study aimed to find an energy-efficient routing method that extends the lifetime of WSNs by minimizing the battery use of sensor nodes to improve the network performance of IoT systems. Conserving energy from sensor nodes and increasing network throughput in WSNs involves having protocols. The low-energy adaptive clustering hierarchy (LEACH ) protocol is a well-known hierarchical routing protocol in WSNs that constructs clusters and transmits data. LEACH increases energy efficiency by transmitting data from sensor nodes to the base station (BS) through the cluster head. It is widely adopted in the WSN network field, and many protocols are being studied to improve cluster header selection and data transmission to increase the energy efficiency of sensor nodes. In this study, we attempted to improve energy efficiency by removing unnecessary energy from LEACH. In LEACH, when the sensor node is located between the BS and the cluster head, the sensor node transmits data to the cluster head in the opposite direction of the BS. The data sent to the cluster head are transmitted in the direction of the BS. Thus, transmission in the opposite direction consumes unnecessary energy and affects the WSN performance of IoT systems. In this study, we propose a D-LEACH (direction-based LEACH) protocol based on the received signal strength indicator (RSSI) that improves the efficiency of transmission energy considering the data transmission direction of sensor nodes. D-LEACH aims to balance the energy of the sensor nodes and improve the performance of WSNs in the IoT system by reducing unnecessary energy consumption caused by reverse transmission considering the data transmission direction of the sensor nodes. In the course of the paper, we refer to the routing protocol of WSNs to improve network performance and describe LEACH. We also explain the D-LEACH protocol proposed in this paper and confirm the performance improvement of WSNs in an IoT system through simulation.

ACS Style

Kyeong Mi Noh; Jong Hyuk Park; Ji Su Park. Data Transmission Direction Based Routing Algorithm for Improving Network Performance of IoT Systems. Applied Sciences 2020, 10, 3784 .

AMA Style

Kyeong Mi Noh, Jong Hyuk Park, Ji Su Park. Data Transmission Direction Based Routing Algorithm for Improving Network Performance of IoT Systems. Applied Sciences. 2020; 10 (11):3784.

Chicago/Turabian Style

Kyeong Mi Noh; Jong Hyuk Park; Ji Su Park. 2020. "Data Transmission Direction Based Routing Algorithm for Improving Network Performance of IoT Systems." Applied Sciences 10, no. 11: 3784.

Journal article
Published: 21 March 2020 in Applied Sciences
Reads 0
Downloads 0

In upcoming smart urban environments, various things can be interconnected, and the Internet of Things (IoT) can be used to construct a safer and more convenient urban environment. Things in the IoT need an addressing system that can uniquely identify each one; internet protocol (IP) addresses can be used for this purpose. The IP address the two roles of an identifier and a locator. However, this binding has problems related to mobility and multihoming, and it is hard to deploy on a legacy IP system because of some limitations of sensor devices. To solve the problem, we propose a design for software-defined networking (SDN)-based identifier–locator separation architecture on IoT networks. In the proposed scheme, Internet Protocol version 6(IPv6)-based addresses are used for the identifiers and locators. The network is partitioned into a host identity domain for local routing and an IP domain for global routing. The host identity domain operates as an overlaid network over the IP domain, and it makes the unrouteable identifiers routable with a distributed hash table (DHT)-based routing strategy. For the evaluation of the proposed scheme, a packet forwarding cost and signaling cost model is calculated, and the results show that the proposed scheme is conjugable to an IoT network environment.

ACS Style

Chan Haeng Lee; Ji Su Park. A Design for SDN-Based Identifier–Locator Separation Architecture on IoT Networks. Applied Sciences 2020, 10, 2144 .

AMA Style

Chan Haeng Lee, Ji Su Park. A Design for SDN-Based Identifier–Locator Separation Architecture on IoT Networks. Applied Sciences. 2020; 10 (6):2144.

Chicago/Turabian Style

Chan Haeng Lee; Ji Su Park. 2020. "A Design for SDN-Based Identifier–Locator Separation Architecture on IoT Networks." Applied Sciences 10, no. 6: 2144.

Journal article
Published: 01 November 2019 in Symmetry
Reads 0
Downloads 0

In terms of deep reinforcement learning (RL), exploration is highly significant in achieving better generalization. In benchmark studies, ε-greedy random actions have been used to encourage exploration and prevent over-fitting, thereby improving generalization. Deep RL with random ε-greedy policies, such as deep Q-networks (DQNs), can demonstrate efficient exploration behavior. A random ε-greedy policy exploits additional replay buffers in an environment of sparse and binary rewards, such as in the real-time online detection of network securities by verifying whether the network is “normal or anomalous.” Prior studies have illustrated that a prioritized replay memory attributed to a complex temporal difference error provides superior theoretical results. However, another implementation illustrated that in certain environments, the prioritized replay memory is not superior to the randomly-selected buffers of random ε-greedy policy. Moreover, a key challenge of hindsight experience replay inspires our objective by using additional buffers corresponding to each different goal. Therefore, we attempt to exploit multiple random ε-greedy buffers to enhance explorations for a more near-perfect generalization with one original goal in off-policy RL. We demonstrate the benefit of off-policy learning from our method through an experimental comparison of DQN and a deep deterministic policy gradient in terms of discrete action, as well as continuous control for complete symmetric environments.

ACS Style

ChaYoung Kim; Jisu Park; Kim; Park. Exploration with Multiple Random ε-Buffers in Off-Policy Deep Reinforcement Learning. Symmetry 2019, 11, 1352 .

AMA Style

ChaYoung Kim, Jisu Park, Kim, Park. Exploration with Multiple Random ε-Buffers in Off-Policy Deep Reinforcement Learning. Symmetry. 2019; 11 (11):1352.

Chicago/Turabian Style

ChaYoung Kim; Jisu Park; Kim; Park. 2019. "Exploration with Multiple Random ε-Buffers in Off-Policy Deep Reinforcement Learning." Symmetry 11, no. 11: 1352.

Journal article
Published: 18 September 2019 in Computers & Electrical Engineering
Reads 0
Downloads 0

Because of the increasing application of reinforcement learning (RL), particularly deep Q-learning algorithm, research organizations utilize it with increasing frequency. The prediction of cyber vulnerability and development of efficient real-time online network intrusion detection (NID) systems are progressions toward becoming RL-powered. An open issues in NID is the model design and prediction of real-time online data composed of a series of time-related feature patterns. There have been concerns regarding the operation of the developed systems because cyber-attack scenarios vary continuously to circumvent NID. These issues have been related to the human interaction significance and the decrease in accuracy verification. Therefore, we employ an RL that permits a deep auto-encoder in the Q-network (DAEQ-N). The proposed DAEQ-N attempts to achieve the maximum prediction accuracy in online learning systems into which continuous behavior patterns are fed and which are trained with more significant weights by classifying it as either “normal” or “anomalous.”

ACS Style

ChaYoung Kim; Jisu Park. Designing online network intrusion detection using deep auto-encoder Q-learning. Computers & Electrical Engineering 2019, 79, 106460 .

AMA Style

ChaYoung Kim, Jisu Park. Designing online network intrusion detection using deep auto-encoder Q-learning. Computers & Electrical Engineering. 2019; 79 ():106460.

Chicago/Turabian Style

ChaYoung Kim; Jisu Park. 2019. "Designing online network intrusion detection using deep auto-encoder Q-learning." Computers & Electrical Engineering 79, no. : 106460.

Article
Published: 18 June 2019 in The Journal of Supercomputing
Reads 0
Downloads 0

A wireless sensor network is a network composed of various types of sensors for the detection of magnetic, thermal, infrared, and acoustic fields, in addition to earthquakes and radio detecting and ranging (radar), among others. The size of the data collected from the various sensors is significant, and it is utilized in various applications such as artificial intelligence, data prediction, and analyses. However, the hardware of a wireless sensor node has limited energy and consumes a significant amount of energy for data transmission. Several studies have been conducted on multi-hop communication, clustering, and the compression/merging of data to increase energy efficiency in data transmission. In this study, the differential data processing (DDP) method is employed to reduce the size of the transmission data and improve the performance of wireless sensor networks. We propose node identification (ID)-based DDP and cluster header (CH)-based DDP. The node ID-based DDP transmits the initial collected aggregate data to the CH at the start of the collection, compares the previous collected data with the currently collected data, and then transfers the difference value to the CH. The CH is transmitted to the base station based on the smallest value of the collected data. The CH-based DDP collects data from the CH, generates reference data for the difference, and transmits the reference data at the time of cluster broadcasting. The member node performs differential processing on the collected data using the reference data transmitted to the CH. The performances of low-energy adaptive clustering hierarchy and DDP were compared. The simulation results revealed that the performance of the wireless sensor networks was improved by efficiently using the energy of the sensor nodes and by decreasing energy consumption in data transmission, given the reduction in the data size.

ACS Style

Kwang Kyu Lim; Jisu Park; Jin Gon Shon. Differential data processing technique to improve the performance of wireless sensor networks. The Journal of Supercomputing 2019, 75, 4489 -4504.

AMA Style

Kwang Kyu Lim, Jisu Park, Jin Gon Shon. Differential data processing technique to improve the performance of wireless sensor networks. The Journal of Supercomputing. 2019; 75 (8):4489-4504.

Chicago/Turabian Style

Kwang Kyu Lim; Jisu Park; Jin Gon Shon. 2019. "Differential data processing technique to improve the performance of wireless sensor networks." The Journal of Supercomputing 75, no. 8: 4489-4504.

Journal article
Published: 28 February 2019 in The Journal of Korean Institute of Information Technology
Reads 0
Downloads 0
ACS Style

Il Hee Maeng; Jisu Park; Jin Gon Shon. A Study on Similar Pattern Data Compression Using PreHuffman Algorithm. The Journal of Korean Institute of Information Technology 2019, 17, 63 -70.

AMA Style

Il Hee Maeng, Jisu Park, Jin Gon Shon. A Study on Similar Pattern Data Compression Using PreHuffman Algorithm. The Journal of Korean Institute of Information Technology. 2019; 17 (2):63-70.

Chicago/Turabian Style

Il Hee Maeng; Jisu Park; Jin Gon Shon. 2019. "A Study on Similar Pattern Data Compression Using PreHuffman Algorithm." The Journal of Korean Institute of Information Technology 17, no. 2: 63-70.

Journal article
Published: 31 December 2018 in The Journal of Korean Institute of Information Technology
Reads 0
Downloads 0
ACS Style

Sungjin Leem; Jisu Park; Jin Gon Shon. A Study on Road-Based 3D Positioning Identification Code. The Journal of Korean Institute of Information Technology 2018, 16, 69 -74.

AMA Style

Sungjin Leem, Jisu Park, Jin Gon Shon. A Study on Road-Based 3D Positioning Identification Code. The Journal of Korean Institute of Information Technology. 2018; 16 (12):69-74.

Chicago/Turabian Style

Sungjin Leem; Jisu Park; Jin Gon Shon. 2018. "A Study on Road-Based 3D Positioning Identification Code." The Journal of Korean Institute of Information Technology 16, no. 12: 69-74.

Conference paper
Published: 29 November 2018 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Because wireless sensor networks are limited energy environments that cannot be recharged, various routing protocols have been studied to maximize energy efficiency. One of the most energy-efficient routing protocols in this research area is PEGASIS (Power-Efficient Gathering in Sensor Information Systems), a hierarchical routing protocol of chain-based topology configuration. However, PEGASIS also has some considerable problems resulted in higher energy consumption such as (1) it does not consider the Base Station (BS) location; (2) it does not consider residual energy of Leader Nodes (LNs); (3) it needs an additional device such as Global Positioning System (GPS); and (4) its chain can become too long to keep energy efficiency. In this paper, we have suggested a new routing protocol to improve PEGASIS by getting rid of the above problems. Especially, we have used the concepts of relative distance, by which the suggested protocol does not need GPS and it allows BS to generate the location information table and construct the multi-chain topology. Furthermore, this multi-chain protocol has used the differential data transfer that aggregates only the changed values in order to reduce the amount of data transmission. Simulation results show that the suggested protocol can increase the network lifetime of WSNs compared to PEGASIS.

ACS Style

Bok Gi Min; Jisu Park; Hyoung Geun Kim; Jin Gon Shon. Improvement of Multi-Chain PEGASIS Using Relative Distance. Lecture Notes in Electrical Engineering 2018, 523 -529.

AMA Style

Bok Gi Min, Jisu Park, Hyoung Geun Kim, Jin Gon Shon. Improvement of Multi-Chain PEGASIS Using Relative Distance. Lecture Notes in Electrical Engineering. 2018; ():523-529.

Chicago/Turabian Style

Bok Gi Min; Jisu Park; Hyoung Geun Kim; Jin Gon Shon. 2018. "Improvement of Multi-Chain PEGASIS Using Relative Distance." Lecture Notes in Electrical Engineering , no. : 523-529.

Conference paper
Published: 29 November 2018 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

A transaction document archive has been required by an enterprise company. However, the standard archive system consumes enormous processing time and storage because there are plenty of files depending on the number of customers. In this paper, we proposed ETD-archive (Enhanced Transaction Document archive) system which splits one PDF file which has all the customer document to shared resource and content and saves ETD-archive format to reduce total processing time and storage space. Our experiment has shown ETD-archive system reduces entire processing time and storage space efficiently.

ACS Style

Hyun Cheon Hwang; Jisu Park; Byeong Rae Lee; Jin Gon Shon. The Design and Implementation of an Enhanced Document Archive System Based on PDF. Lecture Notes in Electrical Engineering 2018, 531 -537.

AMA Style

Hyun Cheon Hwang, Jisu Park, Byeong Rae Lee, Jin Gon Shon. The Design and Implementation of an Enhanced Document Archive System Based on PDF. Lecture Notes in Electrical Engineering. 2018; ():531-537.

Chicago/Turabian Style

Hyun Cheon Hwang; Jisu Park; Byeong Rae Lee; Jin Gon Shon. 2018. "The Design and Implementation of an Enhanced Document Archive System Based on PDF." Lecture Notes in Electrical Engineering , no. : 531-537.

Conference paper
Published: 29 November 2018 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Whether a computer system can process its intended load can be checked through performance testing. The test can be done most accurately in the real system. However, it is impossible to test directly to the real system because of the possibility of corrupting or leaking data. Consequently, the tests have been carried out on the other system which is called a test system. In order to obtain correct results from the tests, the test system has to behave like the real system. There are many factors for the test system to act like the real one. The important factors regarding data are the amount and distribution of the test data stored in the system. This paper provides the method that generates the proper test data using frequency distribution and also implements and experiments a test data generator.

ACS Style

Sunkyung Kim; Jisu Park; Kang Hyoun Kim; Jin Gon Shon. A Test Data Generation for Performance Testing in Massive Data Processing Systems. Lecture Notes in Electrical Engineering 2018, 207 -213.

AMA Style

Sunkyung Kim, Jisu Park, Kang Hyoun Kim, Jin Gon Shon. A Test Data Generation for Performance Testing in Massive Data Processing Systems. Lecture Notes in Electrical Engineering. 2018; ():207-213.

Chicago/Turabian Style

Sunkyung Kim; Jisu Park; Kang Hyoun Kim; Jin Gon Shon. 2018. "A Test Data Generation for Performance Testing in Massive Data Processing Systems." Lecture Notes in Electrical Engineering , no. : 207-213.

Journal article
Published: 28 February 2018 in The Journal of Korean Institute of Information Technology
Reads 0
Downloads 0

본 논문은 시각장애인이 모바일 기기로 데이터를 입력하는 방법 중 모바일 기기용 점자입력 앱(소프트웨어를 이용하는 방법)에 관한 것이다. 점자입력의 경우는 일반 키보드보다 많은 양을 입력해야 하므로 손의 피로도가 높아진다. 본 논문에서는 손의 피로도를 줄이기 위해 SBraille 방법을 제안한다. 이 방법은 점자를 입력하기 위해 사용자가 기준선을 설정하고, 6점을 위로부터 세 개 부분으로 나누어 4가지 입력 패턴을 사용하여 한번에 2점씩 3번 입력하는 방법이다. 성능은 기존의 모바일 점자입력 방법들과 비교하였는데, 해석적 방법으로는 손의 피로도를 손 근육동작의 총합을 표현하여 비교하였고, 실험적 방법으로는 입력방법에 따라 반복적으로 점자를 입력할 때 피로를 인지하는 시간을 비교하였다. 성능 비교 결과, SBraille 방법이 근육동작의 횟수가 가장 적고, 가장 늦게 피로를 인지하는 것으로 나타나, 손의 피로를 줄이는 점자 입력방법임을 알 수 있다.

ACS Style

Soonyong Lee; Ji Su Park; Kang Hyun Kim; Jin Gon Shon. A Mobile Braille Input Method for Reducing Hand Fatigue. The Journal of Korean Institute of Information Technology 2018, 16, 119 -124.

AMA Style

Soonyong Lee, Ji Su Park, Kang Hyun Kim, Jin Gon Shon. A Mobile Braille Input Method for Reducing Hand Fatigue. The Journal of Korean Institute of Information Technology. 2018; 16 (2):119-124.

Chicago/Turabian Style

Soonyong Lee; Ji Su Park; Kang Hyun Kim; Jin Gon Shon. 2018. "A Mobile Braille Input Method for Reducing Hand Fatigue." The Journal of Korean Institute of Information Technology 16, no. 2: 119-124.

Conference paper
Published: 20 December 2017 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

It is important to extend the network lifetime by using the limited energy of the sensor node efficiently in Wireless Sensor Networks (WSNs). LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol is very well-known as one of most often used cluster based hierarchical routing protocols for WSNs, however, it wastes unnecessary data transmission energy for reverse direction when the sensor node exists between the cluster head and the base station. In this paper, we have proposed D-LEACH (Direction-based LEACH) protocol to reduce such energy wastes by considering the data transmission direction of sensor nodes. Our experiment has shown D-LEACH extends the network life by increasing the efficiency of the data transmission energy usage.

ACS Style

Kyeong Mi Noh; Jisu Park; Jin Gon Shon. A New Direction-Based Routing Protocol in WSNs. Lecture Notes in Electrical Engineering 2017, 1207 -1212.

AMA Style

Kyeong Mi Noh, Jisu Park, Jin Gon Shon. A New Direction-Based Routing Protocol in WSNs. Lecture Notes in Electrical Engineering. 2017; ():1207-1212.

Chicago/Turabian Style

Kyeong Mi Noh; Jisu Park; Jin Gon Shon. 2017. "A New Direction-Based Routing Protocol in WSNs." Lecture Notes in Electrical Engineering , no. : 1207-1212.

Conference paper
Published: 14 May 2017 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0
ACS Style

Jong Won Lee; Jisu Park; Heung-Keun Kim; Jin Gon Shon. A Cluster Head Selection Method by Restricting Selection Area in Wireless Sensor Networks. Lecture Notes in Electrical Engineering 2017, 211 -217.

AMA Style

Jong Won Lee, Jisu Park, Heung-Keun Kim, Jin Gon Shon. A Cluster Head Selection Method by Restricting Selection Area in Wireless Sensor Networks. Lecture Notes in Electrical Engineering. 2017; ():211-217.

Chicago/Turabian Style

Jong Won Lee; Jisu Park; Heung-Keun Kim; Jin Gon Shon. 2017. "A Cluster Head Selection Method by Restricting Selection Area in Wireless Sensor Networks." Lecture Notes in Electrical Engineering , no. : 211-217.

Journal article
Published: 09 June 2016 in Wireless Personal Communications
Reads 0
Downloads 0
ACS Style

Hyun Cheon Hwang; Jisu Park; Jin Gon Shon. Design and Implementation of a Reliable Message Transmission System Based on MQTT Protocol in IoT. Wireless Personal Communications 2016, 91, 1765 -1777.

AMA Style

Hyun Cheon Hwang, Jisu Park, Jin Gon Shon. Design and Implementation of a Reliable Message Transmission System Based on MQTT Protocol in IoT. Wireless Personal Communications. 2016; 91 (4):1765-1777.

Chicago/Turabian Style

Hyun Cheon Hwang; Jisu Park; Jin Gon Shon. 2016. "Design and Implementation of a Reliable Message Transmission System Based on MQTT Protocol in IoT." Wireless Personal Communications 91, no. 4: 1765-1777.

Book chapter
Published: 18 December 2015 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Objects such as windows, icons, menus, and pointers are being smaller and closer on devices display. Small and closely packed object requires more time and efforts in acquisition of target object persons with low vision. Traditional magnifier and cursor technologies are increasing recognition rate with magnification, color contrast, big-sized cursor and separation of the object. But, in the case of low vision, this traditional magnifiers and cursors are not enough to acquire target objects easily. In this paper, we propose a CPLV (cursor for persons with low vision). Basically, CPLV supports magnification, color contrast, and big-sized cursor for persons with low vision. Furthemore, it supports constraint of cursor movement, reduce of hand fatigue, and voice service.

ACS Style

Jong Won Lee; Jisu Park; Jin Gon Shon. Development of a Cursor for Persons with Low Vision. Lecture Notes in Electrical Engineering 2015, 529 -534.

AMA Style

Jong Won Lee, Jisu Park, Jin Gon Shon. Development of a Cursor for Persons with Low Vision. Lecture Notes in Electrical Engineering. 2015; ():529-534.

Chicago/Turabian Style

Jong Won Lee; Jisu Park; Jin Gon Shon. 2015. "Development of a Cursor for Persons with Low Vision." Lecture Notes in Electrical Engineering , no. : 529-534.

Book chapter
Published: 18 December 2015 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Many office working systems have been changed from desktop based systems to mobile device based systems. A communication system which is one of important components in the office working system widely that has been widely used is the push message service via SMS and polling service. However, push message has vulnerability to maintain ordering between messages. In this paper, we design and implement a collaboration messenger system using MQTT protocol to maintain ordering between messages for a reliable office working system.

ACS Style

Hyun Cheon Hwang; Jisu Park; Jin Gon Shon. Design and Implementation of a Collaboration Messenger System Based on MQTT Protocol. Lecture Notes in Electrical Engineering 2015, 513 -519.

AMA Style

Hyun Cheon Hwang, Jisu Park, Jin Gon Shon. Design and Implementation of a Collaboration Messenger System Based on MQTT Protocol. Lecture Notes in Electrical Engineering. 2015; ():513-519.

Chicago/Turabian Style

Hyun Cheon Hwang; Jisu Park; Jin Gon Shon. 2015. "Design and Implementation of a Collaboration Messenger System Based on MQTT Protocol." Lecture Notes in Electrical Engineering , no. : 513-519.

Conference paper
Published: 01 December 2015 in 2015 2nd International Conference on Information Science and Security (ICISS)
Reads 0
Downloads 0
ACS Style

Jong Won Lee; Gyeong Hui Gim; Jin Gon Shon; Jisu Park. Universal Design of a Cursor for the Learners with Visual Impairment. 2015 2nd International Conference on Information Science and Security (ICISS) 2015, 1 .

AMA Style

Jong Won Lee, Gyeong Hui Gim, Jin Gon Shon, Jisu Park. Universal Design of a Cursor for the Learners with Visual Impairment. 2015 2nd International Conference on Information Science and Security (ICISS). 2015; ():1.

Chicago/Turabian Style

Jong Won Lee; Gyeong Hui Gim; Jin Gon Shon; Jisu Park. 2015. "Universal Design of a Cursor for the Learners with Visual Impairment." 2015 2nd International Conference on Information Science and Security (ICISS) , no. : 1.