Entity

Time filter

Source Type

Naju, South Korea

Lee M.,Chonbuk National University | Gatton T.M.,National University of La Jolla | Lee K.-K.,Koguryeo College
Sensors | Year: 2010

Diabetes is difficult to control and it is important to manage the diabetic's blood sugar level and prevent the associated complications by appropriate diabetic treatment. This paper proposes a system that can provide appropriate management for diabetes patients, according to their blood sugar level. The system is designed to send the information about the blood sugar levels, blood pressure, food consumption, exercise, etc., of diabetes patients, and manage the treatment by recommending and monitoring food consumption, physical activity, insulin dosage, etc., so that the patient can better manage their condition. The system is based on rules and the K Nearest Neighbor (KNN) classifier algorithm, to obtain the optimum treatment recommendation. Also, a monitoring system for diabetes patients is implemented using Web Services and Personal Digital Assistant (PDA) programming. © 2010 by the authors. Source


Dorj U.-O.,Chonbuk National University | Lee M.,Chonbuk National University | Lee K.-K.,Koguryeo College | Jeong G.,Wonkwang University
International Journal of Pattern Recognition and Artificial Intelligence | Year: 2013

The main goal of this present paper is to develop color detection, and counting algorithm for tangerine flowers under natural lighting conditions to estimate better yield of tangerine from orchards, and each tree picture was taken from four sides. As a result, total of 1340 subimages of tangerine flowers were detected by the newly introduced algorithm from a sample of 21 tangerine trees during blooming season. A Gaussian filter was used to reduce noise and illumination adjustment as much as possible for better clarity to identify exactly the tangerine flowers. The proposed algorithm gives accurate output of tangerine flower detection by including partially/semipartially occluded tangerine flowers and its clusters. Finally, the output of yield estimation reveals that about 10% of all total tangerine flowers turned out to be tangerine. © 2013 World Scientific Publishing Company. Source


Dorj U.-O.,Jeonju University | Lee K.-K.,Koguryeo College | Lee M.,Jeonju University
International Journal of Bio-Science and Bio-Technology | Year: 2013

The specific objective of this paper is to develop a computer vision algorithm to detect and count tangerine flowers in an image for estimate tangerine crops. The algorithm consists of image acquisition, Gaussian filter to remove noise, white color detection, counting of tangerine flowers. A Gaussian filter was used to reduce noise and illumination adjustment as much as possible for better clarity. It is observed that the developed method gives better valid output for tangerine flower detection in natural outdoor lighting, with different lighting condition without any alternative lighting source to control the luminance. The simulation result reveals that the method is reliable, feasible and efficient compared to other existing methods. © 2013 SERSC. Source


Lee M.,Chonbuk National University | Lee K.-K.,Koguryeo College
International Journal of Pattern Recognition and Artificial Intelligence | Year: 2010

U-healthcare systems are based on a ubiquitous and wireless computing and communication environment. They are comprised of the U-healthcare management center, electronic medical records (EMR) system, and the associated services for users and patients. The U-healthcare management center performs continuous monitoring and provides support services in multiple areas, requiring careful allocation of the limited service resources to provide customized healthcare services for users of the mobile distributed system. When the number of locally connected users increases rapidly, a mobile allocation and distribution server can be imbalanced by the load on service resources, resulting in delayed services. This study proposes a dynamic load balancing model for reducing the load of users on service resources and supporting efficient response services in a mobile distributed system. The proposed dynamic load balancing model clusters the system resources of servers dynamically, according to each users' movement and time. The dynamic clustering of system resources uses wFCM (weighted Fuzzy C-Means), which changes the cluster center by transforming existing FCM (Fuzzy C-Means) from a fixed weight to a dynamic one. Using wFCM, the load balance can be maintained, based on the usage rate of service resources, such as CPU, memory, and network. In addition, the balance between QoS (Quality of Service) requests and network response times can be maintained by adding an abstraction layer between application services and network infrastructure. Therefore, when the proposed model is applied to a U-healthcare monitoring system, the system can perform near real-time monitoring of service users in the mobile distributed environment, and effectively address emergent situations. This study evaluates the response time of the implemented model in relation to the number of concurrently connected users, and confirms that the proposed model is faster in response and service processing than existing WLC (Weighted Least-Connection Scheduling) and FCM (Fuzzy C-Means). © 2010 World Scientific Publishing Company. Source


Shahzad A.,Chonbuk National University | Lee M.,Chonbuk National University | Kim S.,Chonbuk National University | Kim K.,Chonbuk National University | And 3 more authors.
Sensors (Switzerland) | Year: 2016

Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. © 2016 by the authors; licensee MDPI, Basel, Switzerland. Source

Discover hidden collaborations