Yangsan, South Korea

Youngsan University

Yangsan, South Korea

Youngsan University is a private university in southeastern South Korea. It operates a main campus in Yangsan City, South Gyeongsang province, a branch campus in nearby Busan, and an "auxiliary learning center" in Seoul. Youngsan offers undergraduate degrees in various practical fields, including international studies, law, Asian business, and information engineering. It also offers graduate degrees in legal affairs, hotel tourism management, information technology, real estate, and teaching English as a foreign language. Wikipedia.

Time filter
Source Type

Yeom K.,Youngsan University
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2017

A central issue in distributed formation of swarm is enabling robots with only a local view of their environment to take actions that advance global system objectives (emergence of collective behavior). This paper describes a bio-inspired control algorithm using pheromone for coordinating a swarm of identical flying robots to spatially self-organize into arbitrary shapes using local communication maintaining a certain level of density. © Springer International Publishing AG 2017.

Cheon S.,Youngsan University
Osong Public Health and Research Perspectives | Year: 2017

Objectives: Estrogen is an important hormone for cell growth, development, and differentiation by transcriptional regulation and modulation of intracellular signaling via second messengers. The reduction in the estrogen level after ovariectomy may lead to cognitive impairments associated with morphological changes in areas of the brain mediate memory. The aim of the present study was to find out the effect of tasks on the cognitive function after ovariectomy in rats. Methods: The animals used in the experiment were 50 Sprague-Dawley female rats. This study applied a hippocampus-independent task (wheel running) and a hippocampus-dependent task (Morris water maze) after ovariectomy in rats and measured the cognitive performance (objectrecognition and object-location test) and growth-associated protein 43 (GAP-43) and neurotrophin 3 (NT-3) expression in the hippocampus, which is an important center for memory and learning. Results: There were meaningful differences between the hippocampus-independent and hippocampus- dependent task groups for the object-location test and GAP-43 and NT-3 expression in the hippocampus, but not the object-recognition test. However, the hippocampus-independent task group showed a significant improvement in the object-recognition test, compared to the control group. Conclusion: These results suggest that hippocampus-dependent task training after ovariectomy enhances the hippocampus-related memory and cognitive function that are associated with morphological and functional changes in the cells of the hippocampus. © 2017 Korea Centers for Disease Control and Prevention.

Lee J.R.,Youngsan University
IOP Conference Series: Materials Science and Engineering | Year: 2017

Korea is a very interesting case. Korea shows rapid growth of the Internet users, and largertrade surplus in telecommunication industry with the help of government's successful information technology policy. And Koreans also made their country more democratic with active participation. This paper analyzed the growth of the Internet and SNS in South Korea. The Internet and SNS created cyber space. They have several advantages as an effective means of communication. Cyber space is influenced by three subjects such as the government [state], the market [capital], and citizens [people]. There are two research questions. First question is how the Korean CMC industry can grow fast after its birth. Three main subjects were dealt with in this research. They are the State, the Market, and the Citizen. I divided the history of Korean CMC industry into three periods. The first formation stage is from the birth of CMC in Korea between from 1980 and1990. The government initiated the monopolistic CMC market. Several conglomerates participated to co-operate the government. But the users are very small. The second growthstage is between from 1990 to 1995. The government also deregulated the Market with changing policy from 'appointment' to 'registration'. The companies increased investment for the possibility of wide diffusion of CMC use. The third prosperity stage is between 1995 and 2010. The government promoted the CMC market's competition with 'notice' policy. And citizens actively enjoy and apply CMC services. However, the fourth shift stage to smart phone faced several problems such as less democracy and one way communication which will weaken the creativity of the content. Second question is what the roles of three subjects are. I examined the cyber space by the uses of digital media with three subjects. Even though the state and the market have limits to promote democracy, the citizens are expected to make the digital society moredemocratic. If the state tries to monitor citizen by the use of digital media, that society is called 'surveillance society'. As the government is open and transparent, the citizens' democracy will increase. The market should limit to gather and accumulate peoples' information and profile for protecting their privacy. Cyber space is a public sphere, which is two-way, economic, and open to every people. Ithas various positive sides. It promotes the communication by people of political information and opinion freely and actively. It makes people form groups against thewrong-doing of big companies and keeps people's privileges. People buy goods morecheaply via e-commerce, which also helps companies lessen the expenses. However, the cyber space has several negative sides, too. The government and companies can accumulate people's information and use it for diverse purposes. If the government uses that information to monitor and control people, such a society may become a 'surveillance society' threatening democracy as in George Orwell's '1984'. As companies alsotake advantage of big data to sell more products for their profit increase, so people often feel they are captivated by a lot of commercial messages, including much advertising spammail. The more civil society depends on the cyber space, the more it can become fragile and risky. The digital media guarantees neither democracy nor a surveillance society. It's true that new technology gives us the opportunity to expand democracy. However, if we don't use new media rightly and positively, we may find it negative or even harmless. Therefore, the positive use of the digital media and keeping our cyber space democratic is very important. With democracy, the Internet and SNS industry can be flourished by the cooperation of netizen, business managers, IT researchers, and politicians. © Published under licence by IOP Publishing Ltd.

Yeom K.,Youngsan University
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2017

Computational models of multi-agent system are widely used for studying a variety of morphogenic processes, which include cell signaling, cell-cell interactions, pattern formation, and cell sorting during tissue self-assembly. This article describes a very simple genetic encoding and developmental system designed for self-organization of multi-cellular agents. The morphogenetic evolution system is guided by gene expression (genetic encoding) and cellular differentiation. Computer simulations show that the method can generate arbitrary 3D shape. © Springer International Publishing AG 2017.

Kang P.,Youngsan University
Software - Practice and Experience | Year: 2017

Function call interception (FCI), or method call interception (MCI) in the object-oriented programming domain, is a technique of intercepting function calls at program runtime. Without directly modifying the original code, FCI enables to undertake certain operations before and/or after the called function or even to replace the intercepted call. Thanks to this capability, FCI has been typically used to profile programs, where functions of interest are dynamically intercepted by instrumentation code so that the execution control is transferred to an external module that performs execution time measurement or logging operations. In addition, FCI allows for manipulating the runtime behavior of program components at the fine-grained function level, which can be useful in changing an application's original behavior at runtime to meet certain execution requirements such as maintaining performance characteristics for different input problem sets. Due to this capability, however, some FCI techniques can be used as a basis of many security exploits for vulnerable systems. In this paper, we survey a variety of FCI techniques and tools along with their applications to diverse areas in the computing and software domains. We describe static and dynamic FCI techniques at large and discuss the strengths and weaknesses of different implementations in this category. In addition, we also discuss aspect-oriented programming implementation techniques for intercepting method calls. © 2017 John Wiley & Sons, Ltd.

Yeom K.,Youngsan University
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2017

Positioning of flying swarm robots is an interesting research area because the global behaviors must emerge from many diverse local interactions. A central issue in coordinating of swarm is enabling robots to take emergence formation by collective behavior. This paper describes a hybrid coordinating algorithm using pheromone for controlling a swarm of identical flying robots to spatially self-organize into arbitrary shapes using local communication maintaining a certain level of density. The proposed approach considers the topological structure of the organization, supports dynamic reconfiguration and self-organization. © Springer International Publishing AG 2017.

Ji S.G.,Eulji University | Kim M.K.,Youngsan University
Clinical Rehabilitation | Year: 2015

Objective: To investigate the effect of mirror therapy on the gait of patients with subacute stroke. Design: Randomized controlled experimental study. Setting: Outpatient rehabilitation hospital. Subjects: Thirty-four patients with stroke were randomly assigned to two groups: a mirror therapy group (experimental) and a control group. Interventions: The stroke patients in the experimental group underwent comprehensive rehabilitation therapy and mirror therapy for the lower limbs. The stroke patients in the control group underwent sham therapy and comprehensive rehabilitation therapy. Participants in both groups received therapy five days per week for four weeks. Main measures: Temporospatial gait characteristics, such as single stance, stance phase, step length, stride, swing phase, velocity, and cadence, were assessed before and after the four weeks therapy period. Results: A significant difference was observed in post-training gains for the single stance (10.32 SD 4.14 vs. 6.54 SD 3.23), step length (8.47 SD 4.12 vs. 4.83 SD 2.14), and stride length (17.03 SD 6.57 vs 10.54 SD 4.34) between the experimental group and the control group (p 〈 0.05). However, there were no significant differences between two groups on stance phase, swing phase, velocity, cadence, and step width (P 〉 0.05). Conclusion: We conclude that mirror therapy may be beneficial in improving the effects of stroke on gait ability. © The Author(s) 2014.

Park H.,Youngsan University
International Journal of Smart Home | Year: 2013

With the recent advances in mobile platform technologies, a variety of studies on context-aware information services for the tourist information domain have been undertaken. Many studies on ontological approaches to tourist informationservices, moreover, have been conducted. However, most studies have focused on upper-level or domain ontologies; comparatively, few have proceeded from the perspective of task ontology based on mobile users' generic tasks. Thus, we considered the construction of a task model and task ontology based on mobile users' generic activities for a task-oriented tourist information service. In this paper, we introduce 1) a generic task model based on travelers' needs and generic activities before and during trips, which model accounts for generic tasks and task processes; 2) a task ontology based on the generic task model, and 3) a task-ontology-based Task-Oriented Tourist Information Service (TOTIS). Using the generic task model and the task ontology, task-oriented menu can be constructed automatically by means simply users' selections and context-awareness. Additionally, compared with the existing domain-oriented services, the TOTIS can facilitate more flexible searching of tourist information and make real-time determinations with context-awareness.

Kang H.W.,Youngsan University
Journal of the Korean Society of Food Science and Nutrition | Year: 2012

The potential antioxidant and anti-inflammatory effect of water and ethanol extracts from Flammulina velu-tipes (Curtis) Singer (FVS) on hydrogen peroxide (H2O2) and LPS-induced oxidative damage in PC-12 and RAW264.7 cells were investigated. The DPPH radical scavenging activities of the water extract from FVS was the highest, and the 50% inhibitory concentration value was 0.388 mg/mL. Also, the antioxidant activities of water and ethanol extracts were determined by ferric reducing antioxidant power, 2,2′-azino-bis-(3-ethybenzo-thiazoline-6-sulphonic acid) radical scavenging activity. In addition, water extract from FVS showed a strongly inhibitory effect on lipid peroxidation by measuring ferric thiocyanate values. The water extract decreased cell apoptosis in PC-12 cells against H2O2-induced oxidative damage. In addition, FVS extracts exhibited the strongest nitric oxide (NO) inhibition activity. It was also found that FVS extract inhibited LPS-induced iNOS and COX-2 expression in RAW264.7 cells. The findings of the present study suggest that extracts of FVS exhibit anti-oxidative and anti-inflammatory activity against oxidative stress and/or stimulated cells.

Youngsan University | Date: 2013-12-03

Disclosed is a method of detecting an excessive disparity object, which separates and detects only an object having an excessive disparity. The method includes a disparity-map forming step of forming disparity-maps for left and right images by analyzing the left and right images included in a 3-D image, a binarization step of setting an excessive disparity candidate region having a disparity value equal to or greater than a preset threshold value in each disparity-map, a masking step of maintaining a pixel value of a region of one selected from the left and right images, which is overlapped with the excessive disparity candidate region, as an original pixel value, and substituting a pixel value of a region of the one selected from the left and right images, which is not overlapped with the excessive disparity candidate region, with a reference pixel value, and a region division step of performing region division with respect to the region having the maintained pixel value based on pixel brightness and disparity.

Loading Youngsan University collaborators
Loading Youngsan University collaborators