57 results on '"Minkyu Park"'
Search Results
2. Current Status and Prospective of Offshore Wind Power to Achieve Korean Renewable Energy 3020 Plan
- Author
-
Seongjun Park, Byungcheol Seong, Sokhee P. Jung, Minkyu Park, and Yeonjeong Choi
- Subjects
offshore wind power ,floating type ,business.industry ,020209 energy ,Environmental engineering ,020101 civil engineering ,02 engineering and technology ,Plan (drawing) ,Environmental economics ,renewable energy 3020 plan ,wind power waste ,TA170-171 ,0201 civil engineering ,Renewable energy ,Offshore wind power ,hywind ,0202 electrical engineering, electronic engineering, information engineering ,Environmental science ,Current (fluid) ,business - Abstract
This review comprehensively reviewed floating offshore wind power generation technology, which is being newly developed as a mid- to long-term plan for wind energy. From the perspective of investment per megawatt (MW), offshore wind power is still about 50 percent more expensive than land wind power. Nevertheless, many advanced countries began to investigate the data because they wondered why they were immersed in development and investment, and why offshore wind facilities installed on the beach and floating offshore wind installed in the middle of the sea, unlike the land wind we knew. We looked at the basic principles of offshore wind power generation and the technologies used in facilities, and looked at the advantages and disadvantages of offshore wind power generation compared to land wind power generation, and what differences between fixed offshore wind farms and floating offshore wind farms. It is investigated whether it is a realistic plan to verify residents’ opposition to the installation of offshore wind power facilities, the possibility of commercialization such as high operational management costs, and the feasibility of installing facilities for renewable energy 3020 as mid- to long-term goals. In addition, it compares foreign cases with offshore wind power development complexes in Korea, marine wind power generation complexes in operation, and high wind power in Scotland, the first floating offshore wind power in Ulsan, Korea, to overcome difficulties in installing facilities and suggest directions for domestic offshore wind power development. In addition, in Korea, where there are not many countries suitable for wind power generation unlike overseas, it was decided to investigate whether floating offshore wind power could be the answer as planned. The reason why the government is pushing for investment in renewable energy such as solar power and wind power is because energy sources from the sun are eco-friendly. However, the U.S. and Europe, which started the wind power project early, are having difficulty in handling the wings of wind power generators. The energy source looked at the contradictions caused by environmental pollution in the treatment of waste, although it was environmentally friendly, and investigated how waste was treated and utilized overseas. Compared to other countries that entered the offshore wind power business earlier, domestic power generation projects are in their infancy and should focus on developing technology and co-prosperity with neighboring residents rather than on excessive expansion.
- Published
- 2021
3. Motor fault diagnosis scheme by machine noise integration and signal similarity measurement
- Author
-
Dooyeon Kim, Yunseok Oh, Hongjae Im, Son, Joo Young, Jeongho Kang, and Minkyu Park
- Subjects
Scheme (programming language) ,Similarity (network science) ,Noise (signal processing) ,Computer science ,business.industry ,Fast Fourier transform ,Pattern recognition ,Artificial intelligence ,business ,Fault (power engineering) ,computer ,Signal ,computer.programming_language - Published
- 2020
4. The Consuming Status of Functional Foods and Perception of The Functional Foods with Aronia
- Author
-
Shinyu Ju, Minkyu Park, Hongmie Lee, and Namjo Heo
- Subjects
Embryology ,business.industry ,Perception ,media_common.quotation_subject ,Medicine ,Cell Biology ,Aronia ,Food science ,Anatomy ,business ,Developmental Biology ,media_common - Published
- 2020
5. Mitigation of B1 + inhomogeneity for ultra-high-field magnetic resonance imaging: hybrid mode shaping with auxiliary EM potential
- Author
-
Minkyu Park, Hansol Noh, and Namkyoo Park
- Subjects
Physics ,Dispersion engineering ,Multidisciplinary ,medicine.diagnostic_test ,business.industry ,Physics::Medical Physics ,lcsh:R ,lcsh:Medicine ,Magnetic resonance imaging ,Cladding (fiber optics) ,Homogenization (chemistry) ,Imaging phantom ,030218 nuclear medicine & medical imaging ,Magnetic field ,03 medical and health sciences ,Resonator ,0302 clinical medicine ,Optics ,Ultra high field ,medicine ,lcsh:Q ,business ,lcsh:Science ,030217 neurology & neurosurgery - Abstract
The notion of mode shaping based on evanescent coupling has been successfully applied in various fields of optics, such as in the dispersion engineering of optical waveguides. Here, we show that the same concept provides an opportunity for the seemingly different field of ultra-high-field MRI, addressing transmit RF magnetic field (B1+) inhomogeneity. In this work, treating the human phantom as a resonator, we employ an evanescently coupled high-index cladding layer to study the effects of the auxiliary potential on shaping the B1+ field distribution inside the phantom. Controlling the strength and coupling of the auxiliary potential ultimately determining the hybridized mode, we successfully demonstrate the global 2D homogenization of axial B1+ for a simplified cylindrical phantom and for a more realistic phantom of spheroidal geometry. The mode-shaping potentials with a magnetic permeability or material loss are also tested to offer additional degrees of freedom in the selection of materials as well as in the manipulation of the B1+ distribution, opening up the possibility of B1+ homogenization for 3D MRI scanning.
- Published
- 2020
6. Machine-Learning-Based Android Malware Family Classification Using Built-In and Custom Permissions
- Author
-
Daehan Kim, Seong-je Cho, Sangchul Han, Changha Hwang, Minkyu Park, and Min-Ki Kim
- Subjects
built-in permission ,Technology ,Software_OPERATINGSYSTEMS ,QH301-705.5 ,Computer science ,QC1-999 ,Android malware ,Permission ,Machine learning ,computer.software_genre ,Classifier (linguistics) ,balanced accuracy ,Feature (machine learning) ,General Materials Science ,AdaBoost ,Biology (General) ,Malware analysis ,QD1-999 ,Instrumentation ,Fluid Flow and Transfer Processes ,business.industry ,Physics ,Process Chemistry and Technology ,General Engineering ,Engineering (General). Civil engineering (General) ,Matthews correlation coefficient ,Computer Science Applications ,Chemistry ,ComputingMethodologies_PATTERNRECOGNITION ,machine learning ,Malware ,Artificial intelligence ,TA1-2040 ,malware family classification ,business ,computer ,custom permission - Abstract
Malware family classification is grouping malware samples that have the same or similar characteristics into the same family. It plays a crucial role in understanding notable malicious patterns and recovering from malware infections. Although many machine learning approaches have been devised for this problem, there are still several open questions including, “Which features, classifiers, and evaluation metrics are better for malware familial classification”? In this paper, we propose a machine learning approach to Android malware family classification using built-in and custom permissions. Each Android app must declare proper permissions to access restricted resources or to perform restricted actions. Permission declaration is an efficient and obfuscation-resilient feature for malware analysis. We developed a malware family classification technique using permissions and conducted extensive experiments with several classifiers on a well-known dataset, DREBIN. We then evaluated the classifiers in terms of four metrics: macrolevel F1-score, accuracy, balanced accuracy (BAC), and the Matthews correlation coefficient (MCC). BAC and the MCC are known to be appropriate for evaluating imbalanced data classification. Our experimental results showed that: (i) custom permissions had a positive impact on classification performance, (ii) even when the same classifier and the same feature information were used, there was a difference up to 3.67% between accuracy and BAC, (iii) LightGBM and AdaBoost performed better than other classifiers we considered.
- Published
- 2021
- Full Text
- View/download PDF
7. Exposure to phthalates and bisphenol analogues among childbearing-aged women in Korea: Influencing factors and potential health risks
- Author
-
Sungkyoon Kim, Yunsun Jeong, Sori Mok, Sunmi Kim, Inae Lee, Kyungho Choi, Minkyu Park, Hyo-Bang Moon, and Jeongim Park
- Subjects
Adult ,endocrine system ,Environmental Engineering ,Bisphenol ,Health, Toxicology and Mutagenesis ,0208 environmental biotechnology ,Phthalic Acids ,02 engineering and technology ,Urine ,Cosmetics ,010501 environmental sciences ,Diethyl phthalate ,urologic and male genital diseases ,01 natural sciences ,chemistry.chemical_compound ,Young Adult ,Phenols ,Environmental health ,Republic of Korea ,Environmental Chemistry ,Medicine ,Humans ,Benzhydryl Compounds ,0105 earth and related environmental sciences ,Exposure assessment ,business.industry ,Public Health, Environmental and Occupational Health ,Phthalate ,General Medicine ,General Chemistry ,Baseline data ,Environmental Exposure ,Pollution ,020801 environmental engineering ,Cumulative risk ,Chemistry ,chemistry ,Bisphenol S ,Female ,business ,hormones, hormone substitutes, and hormone antagonists - Abstract
Phthalates and bisphenol A (BPA), widely applied in industrial and consumer products, can affect hormones associated with the human reproductive system. Because the incidence of reproductive diseases is increasing, a comprehensive exposure assessment of phthalates and bisphenol analogues (BPs) is required for childbearing-aged women. Phthalate metabolites and BPs were measured in urine samples collected from 509 childbearing-aged women (20–48 years) in Korea to investigate their current exposure status, profiles, influencing factors, and potential health risks. DEHP metabolites and BPA were the dominant compounds found, indicating that they are highly consumed in daily life. Bisphenol S (BPS), as an alternative to BPA, was detected in most urine samples. Total concentrations of phthalate metabolites and BPs ranged from 3.42 to 3570 (GM: 45.6) ng/mL and from
- Published
- 2020
8. Effect of Laser Power Feedback Control on Mechanical Properties of Stainless Steel Part Built by Direct Energy Deposition
- Author
-
ChiYen Kim, JiSung Kim, Ho Lee, MinKyu Park, SungWook Kim, SeongSeon Shin, JunHo Hwang, and HyunDeok Kim
- Subjects
Materials science ,business.industry ,Feedback control ,Optoelectronics ,Laser power scaling ,business ,Deposition (chemistry) ,Energy (signal processing) - Published
- 2020
9. Relationship between seafood consumption and bisphenol A exposure: the Second Korean National Environmental Health Survey (KoNEHS 2012–2014)
- Author
-
Minkyu Park, Yeji Kim, Do Jin Nam, Eun Hye Yang, and Jae-Hong Ryoo
- Subjects
Consumption (economics) ,Percentile ,integumentary system ,Korean population ,business.industry ,Public Health, Environmental and Occupational Health ,food and beverages ,Odds ratio ,Korean National Environmental Health Survey ,Logistic regression ,030210 environmental & occupational health ,Confidence interval ,03 medical and health sciences ,Bisphenol A ,0302 clinical medicine ,Seafood ,Environmental health ,Medicine ,030212 general & internal medicine ,Health behavior ,Tuna ,business ,Research Article - Abstract
Background This study aimed to identify the relationship between exposure to bisphenol A (BPA) and seafood consumption using a nationally representative data of the general Korean population. Methods This study was conducted on 5,402 adults aged 19 years and older (2,488 men, 2,914 women) based on the second Korean National Environmental Health Survey (2012-2014). We stratified the data according to gender and analyzed urinary BPA concentrations in terms of sociodemographic characteristics, health behavior, dietary factor, and seafood consumption. In the high and low BPA exposure groups, the odds ratios (ORs) were calculated using logistic regression analysis according to the top 75th percentile concentration. Results In men, large fish and tuna and other seafood categories had significantly higher ORs before and after adjustment in the group who consumed seafood more than once a week than in the group who rarely consumed seafood, with an adjusted value of 1.97 (95% confidence interval [CI]: 1.12-3.48) and 1.74 (95% CI: 1.10-2.75), respectively. In the shellfish category, the unadjusted OR was 1.61 (95% CI: 1.00-2.59), which was significantly higher in the group who consumed seafood more than once a week than in the group who rarely consumed seafood. However, the OR after adjusting for the variables was not statistically significant. In women, the frequency of seafood consumption and the concentration of urinary BPA were not significantly associated. Conclusions BPA concentration was higher in men who frequently consumed large fish and tuna, shellfish and other seafood in this study.
- Published
- 2020
10. Relationship between dietary factors and bisphenol a exposure: the second Korean National Environmental Health Survey (KoNEHS 2012–2014)
- Author
-
Se-Young Kim, Minkyu Park, Hyunrim Choi, Sinye Lim, Hye-Eun Lee, Jin-Soo Park, and Yeji Kim
- Subjects
Percentile ,endocrine system ,Sample Weight ,Population ,010501 environmental sciences ,Logistic regression ,01 natural sciences ,Toxicology ,03 medical and health sciences ,0302 clinical medicine ,Environmental health ,Medicine ,030212 general & internal medicine ,education ,0105 earth and related environmental sciences ,education.field_of_study ,business.industry ,Public Health, Environmental and Occupational Health ,Odds ratio ,Dietary factors ,Bottled water ,Industrial medicine. Industrial hygiene ,Confidence interval ,RC963-969 ,Bisphenol a ,Endocrine disruptor ,Korean national environmental health survey ,Public aspects of medicine ,RA1-1270 ,business ,Research Article - Abstract
Background This study was aimed at finding out the exposure level of bisphenol A (BPA), a well-known endocrine disruptor, in relation to dietary factors using a data representing the Korean general population. Methods This study was performed on 5402 adults aged 19 years and older based on the Second Korean National Environmental Health Survey (KoNEHS 2012–2014). The data analyzed urinary BPA concentration in relation to socio-demographic variables, health behavior-related variables, and dietary factor-related variables. Odds ratio (OR) was calculated through a logistic regression analysis after dividing the participants into high BPA exposure group and low BPA exposure group based on the top 75 percentile concentration. The logistic regression analysis was carried out considering the appropriate sample weight, stratification, and clustering of the second KoNEHS sample design. Results The group drinking bottled water at home and the group using zip-top bags/plastic bags showed significantly higher urinary BPA concentration in female. OR tends to increase as the intake frequency of frozen food increased and OR of frozen food consumption of more than once a week was 1.48 (95% confidence interval (CI) 1.02–2.24) for male and the group drinking bottled water showed significantly higher OR of 1.45 (95% CI 1.06–2.17) after adjusting the related factors for female. Conclusions BPA levels were high in female using bottled water and in male consuming frozen food, and therefore bottled water and frozen food need to be avoided to reduce BPA levels.
- Published
- 2017
11. A systematic optimization of Internally Staged Design (ISD) for a full-scale reverse osmosis process
- Author
-
Seo Jin Ki, Minkyu Park, Kwanho Jeong, and Joon Ha Kim
- Subjects
Engineering ,Fouling ,business.industry ,Forward osmosis ,Full scale ,Environmental engineering ,Filtration and Separation ,02 engineering and technology ,Permeation ,021001 nanoscience & nanotechnology ,Total dissolved solids ,Biochemistry ,Pressure vessel ,Membrane ,020401 chemical engineering ,General Materials Science ,0204 chemical engineering ,Physical and Theoretical Chemistry ,0210 nano-technology ,Reverse osmosis ,business ,Process engineering - Abstract
In this study, Internally Staged Design (ISD) was numerically optimized in order to demonstrate the long-term performance of full-scale seawater reverse osmosis (SWRO) membrane systems in the presence of colloidal foulants. To this end, a numerical model based on a finite difference method was developed and optimized with various feed water qualities, such as fouling potential and total dissolved solids (TDS). As a result, the optimized ISD exhibited greater water flux and higher energy efficiency in long-term operation (90 days) compared to conventional designs, where single-type membrane elements were employed over a pressure vessel while achieving potable TDS concentration in permeate (
- Published
- 2017
12. A Comparative Study on the Siting Process of Nuclear Power Plants in Korea and Japan
- Author
-
Minkyu Park and Soon Cheol An
- Subjects
Waste management ,business.industry ,law ,Scientific method ,Nuclear power plant ,Environmental science ,Nuclear power ,business ,law.invention - Published
- 2017
13. Numerical model-based analysis of energy-efficient reverse osmosis (EERO) process : performance simulation and optimization
- Author
-
Minkyu Park, Tzyy Haur Chong, Kwanho Jeong, School of Civil and Environmental Engineering, and Singapore Membrane Technology Centre
- Subjects
Optimal design ,Materials science ,Civil engineering [Engineering] ,business.industry ,Countercurrent exchange ,Mechanical Engineering ,General Chemical Engineering ,Seawater Desalination ,Membrane fouling ,02 engineering and technology ,General Chemistry ,021001 nanoscience & nanotechnology ,Membrane ,020401 chemical engineering ,Cascade ,General Materials Science ,Nanofiltration ,0204 chemical engineering ,0210 nano-technology ,Reverse osmosis ,Process engineering ,business ,Reverse Osmosis ,Water Science and Technology ,Concentration polarization - Abstract
We conducted a feasibility study of the energy-efficient reverse osmosis (EERO) process, which is a multi-stage membrane system that integrates single-stage reverse osmosis (SSRO) and a countercurrent membrane cascade with recycle (CMCR). To this end, we developed a numerical model for the 1-2 EERO process (one SSRO stage with two stages in CMCR: one nanofiltration (NF) stage followed by one terminal RO stage), then validated the model using performance data obtained from commercial RO projection software. Retentate recycle ratio was one of the key parameters to determine energy efficiency of EERO. In addition, the implementation of NF membranes in the first stage of CMCR yielded additional improvement in EERO performance and played an important role in determining optimum salt rejection. An optimal design of the NF stage was successfully achieved by hybridization of different NF membranes in a vessel (internally staged design, ISD). Under the conditions optimized, EERO exhibited not only greater energy efficiency (3–25%), but lower concentration polarization (CP) and potentials of membrane fouling than conventional SSRO for ≥55% overall recoveries because of reduced water flux in the lead elements (averagely 34%). These findings can thus provide insight into optimal design and operation of the EERO process. Accepted version
- Published
- 2019
14. An Overhead Comparison of MMT and MPEG-2 TS in Broadcast Services
- Author
-
Yong Han Kim and MinKyu Park
- Subjects
Engineering ,business.industry ,IPTV ,computer.file_format ,Multiplexing ,law.invention ,Digital multimedia broadcasting ,Overhead (business) ,law ,MPEG-2 ,Internet Protocol ,Digital broadcasting ,Digital television ,business ,computer ,Computer network - Abstract
' (MMT(MPEG Media Transport) MPEG-2 TS(Transport Stream) )* (overhead)+ &,. MPEG-2 TS(DTV(Digital Television), IPTV(Internet Protocol Television), DMB(Digital Multimedia Broadcasting) -. /01 234 . 5 . 678+,9:; &?@AB@ )CDEF@GHI%JKL,. MPEG-2 TS MNO1990 PQ RJSFT, UV20 xyz{ |&)* Dv}?~p+I%;qFT, Dv^+F@7 )* + , 0 ;q,. AbstractThis paper compares the transport overhead of MMT (MPEG Media Transport) with that of MPEG-2 TS (Transport Stream). MPEG-2 TS is globally used in multiplexing compressed audio and video data in digital broadcast industry, including areas of DTV (Digital Television), IPTV (Internet Protocol Television), and DMB (Digital Multimedia Broadcasting). It was the early 1990s when MPEG-2 TS standard was established. After more than two decades of years since its first establishment, many parts of MPEG-2 TS turned out to be inappropriate to today’s broadcast and communication environment. Given the situations, in 2014 MPEG (ISO/IEC JTC 1 SC 29/WG 11) standardized MMT as the next-generation multimedia transport standard hopefully that can replace MPEG-2 TS. In this paper, with assumptions of broadcast service scenarios we applied both MMT and MPEG-2 TS to each scenario and we calculated their transport overheads. We used a software program that counts the transport overhead, which was developed in our laboratory for this paper. And we conducted a comparative analysis based on the calculated result of transport overhead. Keywords: MMT, MPEG-2 TS, transport overhead, DTV, IPTV
- Published
- 2016
15. Performance analysis of reverse osmosis, membrane distillation, and pressure-retarded osmosis hybrid processes
- Author
-
Minkyu Park, Joon Ha Kim, Jihye Kim, and Ho Kyong Shon
- Subjects
General Chemical Engineering ,02 engineering and technology ,010501 environmental sciences ,Osmosis ,Membrane distillation ,01 natural sciences ,Desalination ,law.invention ,020401 chemical engineering ,Brining ,law ,General Materials Science ,0204 chemical engineering ,Reverse osmosis ,Process engineering ,Distillation ,0105 earth and related environmental sciences ,Water Science and Technology ,business.industry ,Chemistry ,Mechanical Engineering ,Pressure-retarded osmosis ,Environmental engineering ,General Chemistry ,business ,Thermal energy - Abstract
A performance analysis of a tri-combined process that consists of reverse osmosis (RO), membrane distillation (MD), and pressure-retarded osmosis (PRO) was conducted by using numerical approaches in order to evaluate its feasibility. In the hybrid process, the RO brine is partially used as the MD feed solution, and the concentrated MD brine is then mixed with the rest of the RO brine to be considered as the PRO draw solution. Here, the brine division ratio, incoming flow rate of RO, dimensions of the MD and PRO processes, and the supply cost of the MD heat source were considered as influential parameters. Previously validated process models were employed and the specific energy consumption (SEC) was calculated to examine the performance of the RO–MD–PRO hybrid process. The simulation results confirmed that the RO–MD–PRO hybrid process could outperform stand-alone RO in terms of reducing the SEC and the environmental footprint by dilution of the RO brine in locations where free or low-cost thermal energy can be exploited. Despite the need for further investigations and pilot-tests to determine its commercial practicability, this study provides insights into future directions for water and energy nexus processes for energy efficient desalination.
- Published
- 2016
16. Android malware detection using convolutional neural networks and data section images
- Author
-
Seong-je Cho, Young-Sup Hwang, Minkyu Park, Sangchul Han, Jongmoo Choi, and Jaemin Jung
- Subjects
Computer science ,business.industry ,Image processing ,Pattern recognition ,0102 computer and information sciences ,02 engineering and technology ,computer.file_format ,computer.software_genre ,01 natural sciences ,Grayscale ,Convolutional neural network ,Identifier ,Stochastic gradient descent ,010201 computation theory & mathematics ,Header ,0202 electrical engineering, electronic engineering, information engineering ,Malware ,020201 artificial intelligence & image processing ,Executable ,Artificial intelligence ,business ,computer - Abstract
The paper proposes a new technique to detect Android malware effectively based on converting malware binaries into images and applying machine learning techniques on those images. Existing research converts the whole executable files (e.g., DEX files in Android application package) of target apps into images and uses them for machine learning. However, the entire DEX file (consisting of header section, identifier section, data section, optional link data area, etc.) might contain noisy information for malware detection. In this paper, we convert only data sections of DEX files into grayscale images and apply machine learning on the images with Convolutional Neural Networks (CNN). By using only the data sections for 5,377 malicious and 6,249 benign apps, our technique reduces the storage capacity by 17.5% on average compared to using the whole DEX files. We apply two CNN models, Inception-v3 and Inception-ResNet-v2, which are known to be efficient in image processing, and examine the effectiveness of our technique in terms of accuracy. Experiment results show that the proposed technique achieves better accuracy with smaller storage capacity than the approach using the whole DEX files. Inception-ResNet-v2 with the stochastic gradient descent (SGD) optimization algorithm reaches 98.02% accuracy.
- Published
- 2018
17. Relationship between personal care products usage and triclosan exposure: the second Korean National Environmental Health Survey (KoNEHS 2012-2014)
- Author
-
Jae-Hong Ryoo, Yeji Kim, Do Jin Nam, Minkyu Park, Se-Young Kim, and Sinye Lim
- Subjects
Percentile ,medicine.medical_specialty ,media_common.quotation_subject ,Population ,Urine ,Logistic regression ,Cosmetics ,Environmental health ,Medicine ,education ,media_common ,education.field_of_study ,Personal care ,business.industry ,Public health ,fungi ,Public Health, Environmental and Occupational Health ,Odds ratio ,Korean National Environmental Health Survey ,Industrial medicine. Industrial hygiene ,Triclosan ,RC963-969 ,Personal care products ,Public aspects of medicine ,RA1-1270 ,business ,Research Article - Abstract
Background We aimed to find the exposure level of triclosan (TCS), a known endocrine disruptor, related to the use of personal care products using a nationally representative data of the general population in Korea. Methods This study included data of 6288 adults aged 19 years and older (2692 men, 3596 women), based on the Second Korean National Environmental Health Survey (KoNEHS 2012–2014). The data were divided according to gender. The frequency and proportion of each variable were determined by dividing participants into two groups based on the top 75th percentile concentration of urinary TCS (male: 1.096 μg/g creatinine, female: 1.329 μg/g creatinine). Odds ratios (ORs) were calculated using logistic regression analysis for the high TCS exposure and low TCS exposure groups. Results Overall, the proportion of participants using personal care products was higher in women than in men. There was a significantly higher proportion of participants in the high TCS exposure group with younger age, higher education and income levels and with more frequent use of fragrance products, hair care products, body cleansers, cosmetics, and antimicrobial agents. In both men and women, ORs tended to increase with increased frequency of use of hair care products, body cleansers, and cosmetics before and after adjustment. Conclusions Our findings demonstrate that as the frequency of use of personal care products increases, urine TCS concentration increases. Because TCS is a well-known endocrine disruptor, further studies are needed and explore other health effects with exposure to TCS in general population in Korea. Electronic supplementary material The online version of this article (10.1186/s40557-019-0283-y) contains supplementary material, which is available to authorized users.
- Published
- 2018
18. PER Enhancement of Panda PM Fibers by Polarization Axis Alignment
- Author
-
Yohan Kim, Hwanseong Jeong, Young Min Jhon, Minkyu Park, Byeong Kwon Ju, Seongmook Jeong, and Byunghyuck Moon
- Subjects
Materials science ,business.industry ,Polarization-maintaining optical fiber ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Polarization (waves) ,01 natural sciences ,010309 optics ,Optics ,Optical fiber amplifiers ,Fiber laser ,0103 physical sciences ,0210 nano-technology ,business - Abstract
The PER of panda PM fiber was found to increase by 4.08 dB as the polarization axis became aligned at the same coiling diameter. PER was increased at larger coiling diameters.
- Published
- 2018
19. Female non-smokers’ environmental tobacco smoking exposure by public transportation mode
- Author
-
Se-Young Kim, Hye-Eun Lee, Sinye Lim, Minkyu Park, Jin-Soo Park, and Yeji Kim
- Subjects
medicine.medical_specialty ,Public transportation ,Urine ,Logistic regression ,03 medical and health sciences ,chemistry.chemical_compound ,0302 clinical medicine ,Environmental tobacco smoking ,Environmental health ,Medicine ,030212 general & internal medicine ,Cotinine ,Socioeconomic status ,Creatinine ,business.industry ,Public health ,Public Health, Environmental and Occupational Health ,Odds ratio ,030210 environmental & occupational health ,Industrial medicine. Industrial hygiene ,Confidence interval ,RC963-969 ,chemistry ,Korean national environmental health survey ,Public aspects of medicine ,RA1-1270 ,business ,Research Article - Abstract
Background This study aimed to analyze environmental tobacco smoking exposure in female nonsmokers by public transportation mode using representative data of Koreans. Methods Data from the Second Korean National Environmental Health Survey (2012–2014) were analyzed. Urine cotinine was analyzed by public transport behavior, secondhand smoke exposure, socioeconomic factors, and health-related factors. Participants were 1322 adult females; those with the top 75% urine cotinine concentrations were assigned to the high exposure group. A logistic regression analysis was performed considering appropriate weights and stratification according to the sample design of the Second Korean National Environmental Health Survey. Results The geometric mean of urine cotinine concentrations differed according to public transportation modes: subway (1.66 μg/g creatinine) bus (1.77 μg/g creatinine), and taxi (1.94 μg/g creatinine). The odds ratio [OR] was calculated for the high exposure group. The OR of the taxi (2.39; 95% confidence interval, 1.00–5.69) was statistically significantly higher than the subway value (reference), and marginally significant after adjusted with life style, sociodemographic factors and involuntary smoking frequency (2.42, 95% confidence interval, 0.97–6.04). Conclusions The odds ratio of passengers who mainly used taxis was marginally significantly higher than those of passengers who used subways and buses after adjusted with life style and sociodemographic factors. Implementation of supplementary measures and further studies on exposure to environmental tobacco smoking in taxis are warranted.
- Published
- 2018
20. An effective and intelligent Windows application filtering system using software similarity
- Author
-
Seong-je Cho, Sangchul Han, Minkyu Park, Guk-Seon Lee, Young-Sup Hwang, Yesol Kim, and Dongjin Kim
- Subjects
Scheme (programming language) ,business.industry ,Computer science ,010102 general mathematics ,02 engineering and technology ,Filter (signal processing) ,computer.file_format ,Similarity measure ,computer.software_genre ,01 natural sciences ,Theoretical Computer Science ,Software ,0202 electrical engineering, electronic engineering, information engineering ,Microsoft Windows ,020201 artificial intelligence & image processing ,The Internet ,Geometry and Topology ,Software system ,Executable ,Data mining ,0101 mathematics ,business ,computer ,computer.programming_language - Abstract
As licensed programs are pirated and illegally spread over the Internet, it is necessary to filter illegally distributed or cracked programs. The conventional software filtering systems can prevent unauthorized dissemination of the programs maintained by their databases using an exact matching method where the feature of a suspicious program is the same as that of any program stored in the database. However, the conventional filtering systems have some limitations to deal with cracked or new programs which are not maintained by their database. To address the limitations, we design and implement an efficient and intelligent software filtering system based on software similarity. Our system measures the similarity of the characteristics extracted from an original program and a suspicious one (or, a cracked one) and then determines whether the suspicious program is a cracked version of the copyrighted original program based on the similarity measure. In addition, the proposed system can handle a new program by categorizing it using a machine learning scheme. This scheme helps an unknown program to be identified by narrowing the search space. To demonstrate the effectiveness of the proposed system, we perform a series of experiments on a number of executable programs under Microsoft Windows. The experimental results show that our system has achieved comparable performance.
- Published
- 2015
21. MMT-based Broadcasting Services Combined with MPEG-DASH
- Author
-
MinKyu Park and Yong Han Kim
- Subjects
Dynamic Adaptive Streaming over HTTP ,Engineering ,Mpeg media transport ,Software ,business.industry ,Traffic conditions ,Dash ,The Internet ,Broadcasting ,business ,Computer network ,Wireless internet - Abstract
In this paper, we propose new broadcasting services that combine MMT (MPEG Media Transport) standard with MPEG-DASH (Dynamic Adaptive Streaming over HTTP) standard. MMT is a next-generation multimedia transport standard that is IP-friendly and provides functionalities appropriate for hybrid broadcasting that uses broadcast physical channels and the Internet simultaneously. MPEG-DASH enables media streaming services that can be dynamically adaptive both to the network traffic conditions of wired and/or wireless Internet and the receiving entity environment. We explain the scenarios of the proposed broadcasting services and demonstrate that various hybrid broadcasting services can be easily realized through the combined usage of MMT and MPEG-DASH. By making the test bitstreams containing contents for the new services and developing the receiver back-end software that performs the function of the receiving entity for the new services on personal computers, we verified that the proposed scenarios can be realized.
- Published
- 2015
22. A Study on Suitability Assessment for Rural Public Space and Facilities to Promote the Effectiveness of Design -With a focus on Derivation and Evaluation of Indicators for Suitability
- Author
-
Yoona Choi, Suh Joohwan, and Minkyu Park
- Subjects
Engineering ,Focus (computing) ,Public space ,business.industry ,Land suitability ,Environmental resource management ,Suitability analysis ,Analytic hierarchy process ,business - Published
- 2014
23. A new detection scheme of software copyright infringement using software birthmark on windows systems
- Author
-
Jinwoon Woo, Jongcheon Choi, Minkyu Park, Hae-Young Yoo, Seong-je Cho, Yongman Han, and Yunmook Nah
- Subjects
General Computer Science ,Database ,business.industry ,Computer science ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,computer.file_format ,computer.software_genre ,Software framework ,Software ,Operating system ,Microsoft Windows ,Package development process ,Backporting ,Executable ,Software system ,business ,computer ,Software versioning - Abstract
As software is getting more valuable, unauthorized users or malicious programmers illegally copies and distributes copyrighted software over online service provider (OSP) and P2P networks. To detect, block, and remove pirated software (illegal programs) on OSP and P2P networks, this paper proposes a new filtering approach using software birthmark, which is unique characteristics of program and can be used to identify each program. Software birthmark typically includes constant values, library information, sequence of function calls, and call graphs, etc. We target Microsoft Windows applications and utilize the numbers and names of DLLs and APIs stored in a Windows executable file. Using that information and each cryptographic hash value of the API sequence of programs, we construct software birthmark database. Whenever a program is uploaded or downloaded on OSP and P2P networks, we can identify the program by comparing software birthmark of the program with birthmarks in the database. It is possible to grasp to some extent whether software is an illegally copied one. The experiments show that the proposed software birthmark can effectively identify Windows applications. That is, our proposed technique can be employed to efficiently detect and block pirated programs on OSP and P2P networks.
- Published
- 2014
24. Photoresponsive Smart Coloration Electrochromic Supercapacitor
- Author
-
Donghyuk Kim, Tae Gwang Yun, Yong Ho Kim, Minkyu Park, Seung Min Han, and Seungmin Hyun
- Subjects
Supercapacitor ,Materials science ,business.industry ,Mechanical Engineering ,02 engineering and technology ,010402 general chemistry ,021001 nanoscience & nanotechnology ,Electrochromic devices ,01 natural sciences ,Capacitance ,Energy storage ,0104 chemical sciences ,Light intensity ,Mechanics of Materials ,Electrochromism ,Electrode ,Transmittance ,Optoelectronics ,General Materials Science ,0210 nano-technology ,business - Abstract
Electrochromic devices have been widely adopted in energy saving applications by taking advantage of the electrode coloration, but it is critical to develop a new electrochromic device that can undergo smart coloration and can have a wide spectrum in transmittance in response to input light intensity while also functioning as a rechargeable energy storage system. In this study, a photoresponsive electrochromic supercapacitor based on cellulose-nanofiber/Ag-nanowire/reduced-graphene-oxide/WO3 -composite electrode that is capable of undergoing "smart" reversible coloration while simultaneously functioning as a reliable energy-storage device is developed. The fabricated device exhibits a high coloration efficiency of 64.8 cm2 C-1 and electrochemical performance with specific capacitance of 406.0 F g-1 , energy/power densities of 40.6-47.8 Wh kg-1 and 6.8-16.9 kW kg-1 . The electrochromic supercapacitor exhibits excellent cycle reliability, where 75.0% and 94.1% of its coloration efficiency and electrochemical performance is retained, respectively, beyond 10 000 charge-discharge cycles. Cyclic fatigue tests show that the developed device is mechanically durable and suitable for wearable electronics applications. The smart electrochromic supercapacitor system is then integrated with a solar sensor to enable photoresponsive coloration where the transmittance changes in response to varying light intensity.
- Published
- 2016
25. 205 kW all-fiber high-beam-quality fiber amplifier with stimulated Brillouin scattering suppression incorporating a narrow-linewidth fiber-Bragg-grating-stabilized laser diode seed source
- Author
-
Jung Hwan Lee, Hwanseong Jeong, Ji Hoon Seung, Minkyu Park, Kwang Hyun Lee, and Junsu Lee
- Subjects
Materials science ,Laser diode ,business.industry ,Slope efficiency ,Physics::Optics ,Laser ,01 natural sciences ,Atomic and Molecular Physics, and Optics ,law.invention ,Power (physics) ,010309 optics ,Laser linewidth ,Optics ,Fiber Bragg grating ,law ,Brillouin scattering ,0103 physical sciences ,Laser beam quality ,Electrical and Electronic Engineering ,business ,Engineering (miscellaneous) - Abstract
We experimentally demonstrate an all-fiber high-power fiber amplifier with high beam quality and a slope efficiency of 81.8%, using a fiber-Bragg-grating-stabilized laser diode as a narrow spectral linewidth (0.08 nm) seed source. During amplification, the spectral linewidth of the laser output is broadened from 0.08 to 0.24 nm due to nonlinear phenomena. To the best of our knowledge, we report the first experimental observation of the suppression of stimulated Brillouin scattering (SBS), with increased output power. In addition, we investigated the SBS suppression by simultaneously measuring the optical backscattered power, backscattered spectrum, and output spectrum at different values of output power. The beam quality, M2, was measured to be ∼1.28 at the maximum output power of 2.05 kW, and modal instability was not observed.
- Published
- 2019
26. Reverse osmosis (RO) and pressure retarded osmosis (PRO) hybrid processes: Model-based scenario study
- Author
-
Shane A. Snyder, Jihye Kim, Joon Ha Kim, and Minkyu Park
- Subjects
Engineering ,business.industry ,Mechanical Engineering ,General Chemical Engineering ,Pressure-retarded osmosis ,Environmental engineering ,General Chemistry ,Osmosis ,Water production ,Hybrid system ,Cost analysis ,General Materials Science ,Seawater ,Reverse osmosis ,business ,Process engineering ,Water Science and Technology ,Production rate - Abstract
We conducted a scenario study on a promising RO–PRO hybrid system to alleviate water and energy demands. We utilized a previously validated reverse osmosis (RO) process model and modified a model of a pressure-retarded osmosis (PRO) process to properly consider the spatial distribution of concentration and velocity based on a mass balance principle. Using the models, we compared four different RO–PRO hybrid configurations based on the water and energy return rate (WERR). Subsequently, the comparison of the water production rate and energy production rate confirmed the results that RO plays a dominant role to determine the WERR value. Hybrid systems that use seawater as a feed water for RO are more energy price sensitive. That is, a decrease in the RO plant size considerably diminishes the WERR values; however, the PRO plant size plays a minor role to determine the WERR value. Research and available literature on RO–PRO hybrid processes are in a relatively early stage; this study is a preliminary step to evaluate further advances in hybrid systems that can eventually alleviate water and energy demands.
- Published
- 2013
27. Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation
- Author
-
Jongmoo Choi, Sangwook Cho, Minkyu Park, Seong-je Cho, Sangchul Han, and Gyoosik Kim
- Subjects
Java ,business.industry ,Computer science ,Cross-site scripting ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Directory traversal attack ,Bytecode ,SQL injection ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,Web application ,020201 artificial intelligence & image processing ,Web service ,business ,computer ,Java applet ,computer.programming_language - Abstract
As web applications is becoming more prominent due to the ubiquity of web services, web applications have become main targets for attackers. In order to steal or leak sensitive user data managed by web applications, attackers exploit a wide range of input validation vulnerabilities such as SQL injection, path traversal (or directory traversal), cross-site scripting (XSS), etc. This paper propose a technique that can verify input values of Java-based web applications using static bytecode instrumentation and runtime input validation. The technique searches for target methods or object constructors in compiled Java class files, and statically inserts bytecode modules. At runtime, the instrumented bytecode modules validate input values of the targets, and take countermeasure against malicious inputs. The proposed technique can mitigate the input validation vulnerabilities in Java-based web applications without source codes. To evaluate the effectiveness of the proposed technique, experiments are carried out with an insecure web application maintained by OWASP WebGoat Project. The experimental results show that the proposed technique successfully mitigates input validation vulnerabilities such as SQL injection and path traversal.
- Published
- 2016
28. The association between long working hours and hearing impairment in noise unexposed workers: data from the 5th Korea National Health and Nutrition Examination Survey (KNHANES 2010–2012)
- Author
-
Jung-Woo Park, Sinye Lim, Se-Young Kim, Minkyu Park, Jin-Soo Park, and Hyunrim Choi
- Subjects
medicine.medical_specialty ,Absolute threshold of hearing ,medicine.diagnostic_test ,National Health and Nutrition Examination Survey ,KNHANES ,business.industry ,Public health ,Public Health, Environmental and Occupational Health ,Odds ratio ,Audiology ,Logistic regression ,030210 environmental & occupational health ,Confidence interval ,Hearing impairment ,Long working hours ,03 medical and health sciences ,0302 clinical medicine ,Environmental health ,medicine ,030212 general & internal medicine ,Pure tone audiometry ,business ,Body mass index ,Research Article - Abstract
Background This study is aimed at finding out the relationship between long working hours, one of major job stress elements, and hearing impairment in unexposed workers to occupational and environmental noise. Methods This study was performed on 1628 regular, full-time wage workers between the age of 25-64 who indicated in the survey of having no experience of exposure to noise, normal otoscopic findings, and not suffering from diabetes based on the data from the fifth Korea National Health and Nutrition Examination Survey (KNHANES 2010–2012). The average working hours per week was categorized into 40 h and lower group, more than 40 to 48 h group, more than 48 to 60 h group, and more than 60 h group. The groups were defined as suffering from low or high frequencies hearing impairment if the average hearing threshold for 0.5, 1, 2 kHz or 3, 4, 6 kHz in both ears exceeds 25 dB based on the pure tone audiometry. The association between average weekly working hours and hearing impairment was analyzed using logistic regression after gender stratification. Results The prevalences of low and high frequencies hearing impairment in male workers were 4.3 and 28.6 %, respectively, which were much higher than female’s prevalence of 2.7 and 11.1 %. For male workers, no significant association was found between average weekly working hours and low and high frequencies hearing impairment. For female workers, odds ratios (OR) of low and high frequencies hearing impairment were 4.22 (95 % confidence interval (CI) 1.09–16.27) and 4.49 (95 % CI 1.73–11.67), respectively, after controlling for several related factors, such as, age, Body Mass Index (BMI), socio-economic status, health-related behavioral, and occupational characteristics variables, in the final model in the group working more than 60 h compared to the group working 40 h and lower. In addition, a dose-response relationship was observed that ORs of low and high frequencies hearing impairment were increased according to increasing average weekly working hours. Conclusions The association between long working hours and hearing impairment in both low and high frequencies was significant in Korean female workers with a dose-response relationship. Therefore, the law to change the culture of long working hours should be enacted in order to protect the workers’ health and improve the quality of life in Korean workers.
- Published
- 2016
29. My child cannot breathe while sleeping: a report of three cases and review
- Author
-
Seonkyeong Rhie, Dae Jin Song, Minkyu Park, Kyu Young Chae, Won Hee Seo, and So Hee Eun
- Subjects
Pediatrics ,medicine.medical_specialty ,Esophageal pH Monitoring ,Parasomnias ,Epilepsy, Frontal Lobe ,Polysomnography ,Case Report ,Electroencephalography ,Breath Holding ,Diagnosis, Differential ,03 medical and health sciences ,0302 clinical medicine ,030225 pediatrics ,medicine ,Laryngospasm ,Humans ,Breath-holding spell ,medicine.diagnostic_test ,business.industry ,digestive, oral, and skin physiology ,lcsh:RJ1-570 ,lcsh:Pediatrics ,Parasomnia ,Sudden infant death syndrome ,medicine.disease ,Nocturnal seizure ,Gastroesophageal reflux ,Child, Preschool ,Pediatrics, Perinatology and Child Health ,Etiology ,Female ,medicine.symptom ,Choking ,Esophageal pH monitoring ,business ,Sleep ,030217 neurology & neurosurgery - Abstract
Background Sudden breath-holding episodes during sleep in young children are potentially related to sudden infant death syndrome and other life-threatening events. Additionally, these episodes can negatively affect child’s growth and development. Case presentation Here, we present 3 cases of preschool children with similar paroxysmal nocturnal waking events associated with choking that had different etiologies (nocturnal frontal lobe epilepsy, nocturnal gastroesophageal reflux disease, and parasomnia, respectively). Conclusions It is important to take into consideration the fact that breath spells during sleep can occur as a rare manifestation of parasomnia due to gastroesophageal reflux or as a symptom of nocturnal frontal lobe epilepsy. Full video electroencephalography, polysomnography, and simultaneous gastric pH monitoring should be used for the differential diagnosis of sleep-related disorders, such as breath spells, in children.
- Published
- 2016
30. A fouling model for simulating long-term performance of SWRO desalination process
- Author
-
Minkyu Park, Young Geun Lee, Do Yeon Kim, Joon Ha Kim, Yun Seok Lee, and Dae Ryook Yang
- Subjects
Engineering ,Fouling ,business.industry ,Membrane fouling ,Environmental engineering ,Filtration and Separation ,Permeation ,Biochemistry ,Desalination ,Membrane technology ,Membrane ,General Materials Science ,Physical and Theoretical Chemistry ,business ,Reverse osmosis ,Concentration polarization - Abstract
A fouling model for the seawater reverse osmosis (SWRO) process is required to propose an appropriate strategy for membrane maintenance (i.e., membrane cleaning and replacement). In this study, a fouling model that considered the concentration polarization was properly developed to simulate the long-term performance of the SWRO process based on models from the literature. The model was practically applied to one-year operation data obtained from the Fujairah SWRO desalination plant with parameter estimation, and good agreement between the measured data and simulated results was obtained for both the rejection and recovery rates. Compared to an integrated model consisting of two models from the literature, the fouling model proposed in this study showed reliable performance for membrane fouling such as the increase in the permeate TDS concentration according to operating time. In addition, simulations for membrane maintenance were conducted based on the variation in membrane resistance, which reflects the fouling state of the membrane. These revealed that the rearrangement of membranes is not significantly effective without cleaning the fouled membrane. Instead, a partial replacement of membranes can be an effective maintenance scheme to increase the recovery rate. Accordingly, the results of the study presented here can be used to save operation and maintenance (O&M) costs in SWRO plants through the optimized management of fouled membranes.
- Published
- 2012
31. DMB Application Format for Mobile Multimedia Services
- Author
-
Houari Sabirin, Minkyu Park, Han-Kyu Lee, Munchurl Kim, Hui-Yong Kim, and Yong Han Kim
- Subjects
Multimedia ,Computer science ,business.industry ,Automatic voltage control ,Telecommunication security ,Mobile computing ,Iso standards ,computer.software_genre ,File format ,Computer Science Applications ,Digital multimedia broadcasting ,Hardware and Architecture ,Signal Processing ,Media Technology ,Iec standards ,business ,computer ,Software ,Transform coding ,Computer network - Abstract
The Digital Multimedia Broadcasting Application Format-part 9 of the ISO/IEC 23000 MPEG-A Multimedia Application Formats standard-specifies a structured file format for securely packaging and interactively consuming DMB content.
- Published
- 2012
32. SeaHERO core technology and its research scope for a seawater reverse osmosis desalination system
- Author
-
Minkyu Park, Young Geun Lee, Yun Seok Lee, and Joon Ha Kim
- Subjects
Engineering ,Energy recovery ,Waste management ,business.industry ,Ocean Engineering ,Energy consumption ,Geothermal desalination ,Pollution ,Desalination ,Reverse osmosis plant ,Membrane technology ,System integration ,business ,Reverse osmosis ,Water Science and Technology - Abstract
Seawater reverse osmosis (SWRO) desalination is considered one of the most promising technologies for supplying freshwater to the regions suffering from water scarcity. Although a considerable amount of research has been conducted in attempts to improve SWRO desalination technology, reducing the cost of producing freshwater is still required. In Korea, this effort is already been being carried out by the Seawater Engineering & Architecture of High Efficiency Reverse Osmosis (SeaHERO) project. Core Technology 2 (CT2), one of the most important sub-projects out of four CTs under SeaHERO, pursues two main goals: optimization of processes for low energy consumption/high efficiency and localization of core parts/equipments of the SWRO plant. Four unit technologies (UTs) are then incorporated into CT2 and each UT has its own technical target; UT1 focuses on the development of SWRO desalination system integration and optimization technology in terms of energy saving; UT2 and 3 work to develop high performance RO...
- Published
- 2010
33. A rapid performance diagnosis of seawater reverse osmosis membranes: simulation approach
- Author
-
Yu Chang Kim, Dae Ryook Yang, Do Yeon Kim, Da Hee Jung, Sangho Lee, Young Geun Lee, Joon Ha Kim, Yun Seok Lee, Sang Jin Park, and Minkyu Park
- Subjects
Materials science ,business.industry ,Forward osmosis ,Environmental engineering ,Ocean Engineering ,Permeation ,Rejection rate ,Pollution ,Volumetric flow rate ,Membrane technology ,Membrane ,Seawater ,Reverse osmosis ,Process engineering ,business ,Water Science and Technology - Abstract
Recovery and salt rejection rate, which are directly related to the membrane properties and operating conditions (i.e., feed flow rate, pressure, temperature, and TDS concentration), are two main indicators for evaluating the performance of a reverse osmosis (RO) membrane process. A simple and rapid test with minimum data is inevitably requested to diagnose membrane performance at a certain operating conditions, because experiments at all operating conditions are inefficient and consumable work in the view of cost as well as man-hour. In this study, permeate flow rate and TDS concentration of three kinds of commercial RO membranes were carefully examined under various operating conditions [i.e., feed pressure (45–65 kgf/cm2) and temperature (5–30°C)]. Based on the experimental data, membrane resistance models including temperature and pressure correction factors were developed for the rapid diagnosis of SWRO membrane performances. As a result, the models developed in this study have good agreements betwee...
- Published
- 2010
34. Machine learning-based software classification scheme for efficient program similarity analysis
- Author
-
Minkyu Park, Jonghyuk Park, Seong-je Cho, Sangchul Han, Yesol Kim, and Yunmook Nah
- Subjects
Scheme (programming language) ,Artificial neural network ,Computer science ,business.industry ,Static program analysis ,Machine learning ,computer.software_genre ,Random forest ,Counterfeit ,Software ,The Internet ,Software system ,Artificial intelligence ,Data mining ,business ,computer ,computer.programming_language - Abstract
For the health of software ecosystems, we should detect and filter out pirated and counterfeit software on the Web sites and peer-to-peer (P2P) networks. Whenever a suspicious program is found on the Internet or software market, we can adopt a software filtering system that determines whether the program is legal one or not by comparing it with the all programs maintained in the market. That is, we need to measure similarity between a suspicious program and one of the programs in the market for determining whether the suspicious program is one of pirated or hacked versions from its original. In this case, it is necessary to reduce the number of programs to be compared since there are so many programs in the market. This paper proposes a machine learning-based software classification scheme to reduce the number of comparisons for measuring software similarity. The scheme extracts API call frequency from a suspicious program, and classifies the program automatically through a machine learning technique like random forests. Experimental results show that the proposed scheme can effectively classify a program into one of nine categories and can reduce the time to determine whether the program is illegal version or not.
- Published
- 2015
35. Impacts of Spacers on Forward Osmosis Processes
- Author
-
Joon Ha Kim, Minkyu Park, and Jijung Lee
- Subjects
Materials science ,business.industry ,Forward osmosis ,Process engineering ,business - Published
- 2015
36. Wastewater compounds in urban shallow groundwater wells correspond to exfiltration probabilities of nearby sewers
- Author
-
Shane A. Snyder, Marina Feraud, Ai Jia, Jay C. Means, Patricia A. Holden, Minkyu Park, Do Gyun Lee, Jared S. Ervin, Tarun Anumol, Patrick R. Roehrdanz, Erving W. Morelius, Carlos Tamez, Jorge L. Gardea-Torresdey, and John A. Izbicki
- Subjects
Environmental Engineering ,Water Wells ,Sewage ,Wastewater ,Waste Disposal, Fluid ,California ,Sanitary sewer ,Waste Management and Disposal ,Groundwater ,Water Science and Technology ,Civil and Structural Engineering ,Hydrology ,geography ,geography.geographical_feature_category ,business.industry ,Ecological Modeling ,Environmental engineering ,Models, Theoretical ,Pollution ,Reclaimed water ,Nominal Pipe Size ,Environmental science ,business ,Effluent sewer ,Water Pollutants, Chemical ,Water well - Abstract
Wastewater compounds are frequently detected in urban shallow groundwater. Sources include sewage or reclaimed wastewater, but origins are often unknown. In a prior study, wastewater compounds were quantified in waters sampled from shallow groundwater wells in a small coastal California city. Here, we resampled those wells and expanded sample analyses to include sewage- or reclaimed water-specific indicators, i.e. pharmaceutical and personal care product chemicals or disinfection byproducts. Also, we developed a geographic information system (GIS)-based model of sanitary sewer exfiltration probability--combining a published pipe failure model accounting for sewer pipe size, age, materials of construction, with interpolated depths to groundwater--to determine if sewer system attributes relate to wastewater compounds in urban shallow groundwater. Across the wells, groundwater samples contained varying wastewater compounds, including acesulfame, sucralose, bisphenol A, 4-tert-octylphenol, estrone and perfluorobutanesulfonic acid (PFBS). Fecal indicator bacterial concentrations and toxicological bioactivities were less than known benchmarks. However, the reclaimed water in this study was positive for all bioactivity tested. Excluding one well intruded by seawater, the similarity of groundwater to sewage, based on multiple indicators, increased with increasing sanitary sewer exfiltration probability (modeled from infrastructure within ca. 300 m of each well). In the absence of direct exfiltration or defect measurements, sewer exfiltration probabilities modeled from the collection system's physical data can indicate potential locations where urban shallow groundwater is contaminated by sewage.
- Published
- 2015
37. Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems
- Author
-
Seong-je Cho, Heeheon Kim, Sangchul Han, Minkyu Park, Xuefeng Piao, and Yookun Cho
- Subjects
Government ,Operations research ,Computer science ,business.industry ,Processor scheduling ,Multiprocessing ,Schedule (project management) ,Scheduling (computing) ,Task (project management) ,Work (electrical) ,Artificial Intelligence ,Hardware and Architecture ,Information and Communications Technology ,Computer Vision and Pattern Recognition ,Electrical and Electronic Engineering ,Predictability ,Telecommunications ,business ,Real-time operating system ,Software - Abstract
This letter proves the finish time predictability of EDZL (Earliest Deadline Zero Laxity) scheduling algorithm for multiprocessor real-time systems, which is a variant of EDF. Based on the results, it also shows that EDZL can successfully schedule any periodic task set if its total utilization is not greater than (m + 1)/2, where m is the number of processors.
- Published
- 2006
38. Comparison of Deadline-Based Scheduling Algorithms for Periodic Real-Time Tasks on Multiprocessor
- Author
-
Seong-je Cho, Heeheon Kim, Yookun Cho, Sangchul Han, and Minkyu Park
- Subjects
Schedule ,Software_OPERATINGSYSTEMS ,business.industry ,Computer science ,Processor scheduling ,Workload ,Multiprocessing ,Parallel computing ,Multiprocessor scheduling ,Scheduling (computing) ,Artificial Intelligence ,Hardware and Architecture ,Information and Communications Technology ,Embedded system ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Computer Vision and Pattern Recognition ,Electrical and Electronic Engineering ,business ,Real-time operating system ,Software - Abstract
Multiprocessor architecture becomes common on real-time systems as the workload of real-time systems increases. Recently new deadline-based (EDF-based) multiprocessor scheduling algorithms are devised, and comparative studies on the performance of these algorithms are necessary. In this paper, we compare EDZL, a hybrid of EDF and LLF, with other deadline-based scheduling algorithms such as EDF, EDF-US[m(2m-1)], and fpEDF. We show EDZL schedules all task sets schedulable by EDF. The experimental results show that the number of preemptions of EDZL is comparable to that of EDF and the schedulable utilization bound of EDZL is higher than those of other algorithms we consider.
- Published
- 2005
39. A robust and efficient birthmark-based android application filtering system
- Author
-
Hyungjoon Shim, Seong-je Cho, SeongWook Kang, Sangchul Han, and Minkyu Park
- Subjects
ComputerSystemsOrganization_COMPUTERSYSTEMIMPLEMENTATION ,Computer science ,business.industry ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Computer security ,computer.software_genre ,medicine.disease ,Android app ,Software ,Robustness (computer science) ,Server ,medicine ,Android application ,Birthmark ,Android (operating system) ,business ,License ,computer - Abstract
Since it is very easy to decompile and repackage Android applications (or apps), many paid apps in the official Android Market are exposed to software piracy such as illegal copy, license cracking, and illegal distribution. To address this problem, we can employ app filtering systems that can prevent OSP servers from distributing illegally copied or tampered apps. In this paper, we propose a birthmark-based Android app filtering system. The system extracts birthmarks from APK files, and compares the birthmarks to examine if a given APK file is actually identical to one of (paid) original apps, that is, the APK file is a duplicated or tampered one. The experimental results show that the system is efficient and robust in the sense that the birthmark size is very small and the tampered apps can be identified effectively.
- Published
- 2014
40. Development of traveling surface characteristics extraction equipment using optical mouse array
- Author
-
Minkyu Park, Hyunbin Kim, and Sungbok Kim
- Subjects
Surface (mathematics) ,Operational principle ,Engineering ,Velocity estimation ,business.industry ,Acoustics ,Mobile robot ,law.invention ,Optical mouse ,law ,Electronic engineering ,Mechanical design ,Extraction (military) ,Development (differential geometry) ,business - Abstract
This paper presents the development of the traveling surface characteristics extraction equipment for accurate velocity estimation of a mobile robot using optical mice. In the traveling surface characteristics extraction equipment, a traveling surface sample is rotating relative to stationary optical mice, instead of a mobile robot equipped with optical mice traveling over a floor surface. First, the operational principle of the traveling surface characteristics extraction equipment is explained, Then, the mechanical design & construction, the hardware development, and the software development of the traveling surface characteristics extraction equipment are described in detail.
- Published
- 2014
41. On the security of a simple three-party key exchange protocol without server's public keys
- Author
-
Minkyu Park, Kim-Kwang Raymond Choo, Junghyun Nam, Dongho Won, Juryon Paik, Nam, Junghyun, Choo, Kim Kwang, Park, Minkyu, Paik, Juryon, and Wong, Dongho
- Subjects
Article Subject ,Computer science ,Internet Security Association and Key Management Protocol ,lcsh:Medicine ,security ,Computer security ,computer.software_genre ,lcsh:Technology ,General Biochemistry, Genetics and Molecular Biology ,Key authentication ,Access to Information ,Public-key cryptography ,Computer Communication Networks ,User-Computer Interface ,Security association ,Humans ,communication security ,lcsh:Science ,Computer Security ,Key exchange ,General Environmental Science ,business.industry ,lcsh:T ,lcsh:R ,Reproducibility of Results ,General Medicine ,Authenticated Key Exchange ,Authentication protocol ,lcsh:Q ,Lee-Hwang protocol ,Challenge–response authentication ,business ,computer ,Algorithms ,Confidentiality ,Research Article - Abstract
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. Refereed/Peer-reviewed
- Published
- 2014
42. Optical Mouse based Mobile Robot Traveling Simulator for Surface Characteristics Extraction
- Author
-
Sungbok Kim and Minkyu Park
- Subjects
Surface (mathematics) ,Engineering ,Operational principle ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Statistical parameter ,Angular velocity ,Mobile robot ,Kinematics ,law.invention ,Computer Science::Robotics ,Optical mouse ,Conceptual design ,law ,business ,Simulation ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
This paper presents the optical mouse based mobile robot traveling simulator for the extraction of the statistical parameters of a traveling surface. In the mobile robot traveling simulator proposed in this paper, a traveling surface sample is rotating relative to stationary optical mice, rather than a mobile robot equipped with optical mice is traveling over a surface. First, the conceptual design and operational principle of the mobile robot traveling simulator are explained. Second, the velocity kinematics which maps the velocity of a mobile robot under simulation to the velocities of optical mice of the mobile robot traveling simulator is derived. Third, the setting of the parameters of the mobile robot traveling simulator, including the angular velocity of a motor and the installation angles of optical mice, is described. Finally, using the prototype of mobile robot traveling simulator, experimental results for four different traveling surface samples are given.
- Published
- 2014
43. A Static Birthmark for MS Windows Applications Using Import Address Table
- Author
-
Hae-Young Yoo, Jongcheon Choi, Lawrence Chung, Seong-je Cho, Yongman Han, Minkyu Park, Youngsang Song, and Jinwoon Woo
- Subjects
Computer science ,business.industry ,Software birthmark ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,computer.file_format ,medicine.disease ,computer.software_genre ,Software ,Microsoft Windows ,medicine ,Operating system ,Table (database) ,Birthmark ,business ,computer ,Portable Executable - Abstract
A software birthmark is unique and native characteristics of software, and thus can be used to detect the theft of software. We propose a new static software birthmark for programs on Microsoft Windows which have Portable Executable (PE) format. These programs use different Dynamic Link Libraries (DLLs) and Application Program Interfaces (APIs) while they are executing. The number and names of the used DLLs and APIs are unique to each program. The proposed birthmark is based on these numbers and names. This information can be obtained from the Import Address Table (IAT), which is part of the PE file. By inspecting the proposed birthmark, we can identify certain software and detect pirated software. To evaluate the effectiveness of the proposed birthmark, we inspect and compare several applications of different kinds. The experimental results show that the proposed birthmark can identify Windows applications, leading to the prevention of an illegal distribution of copyrighted software.
- Published
- 2013
44. A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications
- Author
-
Jongcheon Choi, Yongman Han, Hae-Young Yoo, Sangchul Han, Ilsun You, Minkyu Park, Seong-je Cho, and Inshik Song
- Subjects
Source code ,Database ,Computer science ,business.industry ,media_common.quotation_subject ,Feature extraction ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Static program analysis ,computer.file_format ,computer.software_genre ,Software ,Microsoft Windows ,Backporting ,Executable ,Software system ,business ,computer ,media_common - Abstract
As software industry has been grown, it occurs more frequently to illegally copy software or to steal the core modules of a program. In order to detect program plagiarism, similarity analysis of suspicious programs based on source codes is one of accurate methods. However, the source codes are not always available. Therefore, it is necessary to analyze and determine software piracy or theft with only binary executables that are release versions of their products. In this paper, we propose a method to extract the feature information from the binary codes of the executable files on MS Windows systems in order to determine whether software is pirated or core modules of a program are stolen. We perform a small experiment to detect program similarity and plagiarism by comparing the statically extracted features of target programs.
- Published
- 2013
45. Effects of transverse isotropy on modes and mode coupling in shallow water
- Author
-
James A. Mercer, Minkyu Park, Robert I. Odom, Pauline Paik, and Robert S. Crosson
- Subjects
Physics ,Shear waves ,Acoustics and Ultrasonics ,Condensed matter physics ,business.industry ,Isotropy ,Coupled mode theory ,Physics::Fluid Dynamics ,Waves and shallow water ,Optics ,Arts and Humanities (miscellaneous) ,Transverse isotropy ,Mode coupling ,Phase velocity ,business ,Anisotropy - Abstract
Most marine sediments exhibit transverse isotropy (TI) that can have a significant effect on the signal properties of strongly bottom interacting sound. Locally, transverse isotropy has the greatest effect on the fundamental and near fundamental modal overtones. The local shallow water TI modes have reduced amplitude in the sediment relative to the corresponding shallow water modes for an isotropic bottom. Even a small departure from isotropy (2.4%) can have a significant (15%) effect on the phase velocity of bottom interacting modes. Calculations of mode–mode coupling coefficients for a range‐dependent medium indicate that mode coupling is more strongly confined to modal nearest neighbors for a TI medium characterized predominantly by shear wave anisotropy, when compared to the corresponding isotropic medium. As the frequency increases, the strongest coupling occurs between higher overtones and also becomes more strongly peaked around nearest neighbors. The coupled mode theory of Maupin [Geophys. J. 93, 173–185 (1988)] is employed to model the coupling. This theory can treat smooth gradients and sloping layer boundaries for all five of the bottom elastic moduli in a TI medium, the densities, and the range dependence of the water column itself. This coupled mode formulation also properly accounts for the continuity of stress and displacement boundary conditions in an exact way at irregular interfaces.
- Published
- 1996
46. An anti-piracy mechanism based on class separation and dynamic loading for Android applications
- Author
-
Dongjin Kim, Younsik Jeong, Jae-Chan Moon, Minkyu Park, Yeongung Park, and Seong-je Cho
- Subjects
Java ,GeneralLiterature_INTRODUCTORYANDSURVEY ,business.industry ,Address space ,Computer science ,Mechanism based ,Encryption ,computer.software_genre ,Android app ,Upload ,Smartphone app ,Operating system ,Android (operating system) ,business ,computer ,computer.programming_language ,Computer network - Abstract
With expanding use of smartphones, smartphone app piracy has grown more widespread. However, existing licensing services have limits on protecting copyright of apps because they can be cracked. We present a new approach to block execution of pirated apps and protect apps against piracy. The proposed approach uses Java class separation and dynamic loading. When an app is being developed, it is divided into two parts, an Incomplete Main Application (IMA) and Separate Essential Class (SEC). Then, they are uploaded to market server. If a user buys and installs an app, only its IMA is downloaded to the user's smartphone. When the user first execute the app's IMA, the market server authenticates the user, encrypts the app's SEC, and sends the encrypted SEC to the user's smartphone. The downloaded SEC is decrypted and stored in secure space on the smartphone. The SEC, then, is loaded dynamically into the app's address space and the app is successfully executed. Only designated processes are allowed to access the SEC stored in the secure space. Other accesses are considered illegal and are prohibited. Although the app's IMA can be pirated, without the SEC the app cannot be successfully executed. We verify effectiveness of the approach using experiments and show the approach incurs an acceptable overhead.
- Published
- 2012
47. AAGC
- Author
-
Minkyu Park, Jiman Hong, Bongjae Kim, Chang Oan Sung, Cheol Jeon, and Yookun Cho
- Subjects
Scheme (programming language) ,Hardware_MEMORYSTRUCTURES ,business.industry ,Computer science ,Computer data storage ,Parallel computing ,business ,computer ,Flash memory ,Associative property ,computer.programming_language ,Garbage collection ,Block (data storage) - Abstract
NAND ash memory has many advantages such as low-power consumption, shock-resistance, and non-volatility. For these reasons, NAND ash memory is used for data storage purposes in mobile, personal and even enterprise computer systems. When we use NAND ash memory as a means of data storage, it requires a garbage collection procedure due to its erase-before-write characteristic. The efficiency of this garbage collection is an important issue because it affects the performance of the NAND ash memory. In this paper, we propose an efficient garbage collection scheme that can be combined with previous hybrid FTLs. Our garbage collection scheme considers the associativity of the blocks when selecting a victim block. The proposed scheme effectively reduces the number of time-consuming block erasures. Our trace-driven simulation results show that the proposed garbage collection scheme can reduce the number of block erasures by as much as 14%. It can also reduce the average response time and maximum response time by nearly 10% and 70%, respectively.
- Published
- 2012
48. Topology Optimization of Spacers for Maximizing Permeate Flux on Membrane Surface in Reverse Osmosis Channel
- Author
-
Semyung Wang, Seungjae Oh, Minkyu Park, and Joonha Kim
- Subjects
Pressure drop ,Engineering ,Membrane ,Zigzag ,business.industry ,Topology optimization ,Control engineering ,Topology (electrical circuits) ,Mechanics ,business ,Reverse osmosis ,Finite element method ,Communication channel - Abstract
The objective of this study is to design spacers using fluid topology optimization in 2D crossflow Reverse Osmosis (RO) membrane channel to improve the performance of RO processes. This study is an initial attempt to apply topology optimization to designing spacers in RO membrane channel. The performance was evaluated by the quantity of permeate flux penetrating both upper and lower membrane surfaces. A coupled Navier-Stokes and Convection-Diffusion model was employed to calculate the permeate flux. To get reliable solutions, stabilization methods were employed with standard finite element method. The nine reference models which consist of the combination of circle, rectangular, triangle shape and zigzag, cavity, submerge configuration of spacers were simulated. Such models were compared with new model designed by topology optimization. The permeate flux at both membrane surfaces was determined as an objective function. In addition, permissible pressure drop along the channel and spacer volume were used as constraints. As a result of topology optimization as the permissible pressure drop changes in channel, characteristics of spacer design development was founded. Spacer design based on topology optimization was reconstructed to a simple one considering manufactuability and characteristics of development spacer design. When a simplified design was compared with previous 9 models, new design has a better performance in terms of permeate flux and wall concentration at membrane surface.Copyright © 2011 by ASME
- Published
- 2011
49. Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering
- Author
-
Philip A. Wilsey, Yongsu Park, Jin-Young Lee, Min-Jae Kim, Seong-je Cho, Minkyu Park, and Hye-Young Chang
- Subjects
Unpacking ,Reverse engineering ,business.industry ,Computer science ,Overhead (engineering) ,Executable compression ,Cryptography ,Encryption ,computer.software_genre ,Embedded software ,Software ,Embedded system ,Operating system ,business ,computer - Abstract
Packing (or executable compression) is considered as one of the most effective anti-reverse engineering methods in the Microsoft Windows environment. Even though many reversing attacks are widely conducted in the Linux-based embedded system there is no widely used secure binary code packing tools for Linux. This paper presents two secure packing methods that use AES encryption and the UPX packer to protect the intellectual property (IP) of software from reverse engineering attacks on Linux-based embedded system. We call these methods: secure UPX and AES-encryption packing. Since the original UPX system is designed not for software protection but for code compression, we present two anti-debugging methods in the unpacking module of the secure UPX to detect or abort reverse engineering attacks. Furthermore, since embedded systems are highly resource constrained, minimizing unpacking overhead is important. Therefore, we analyze the performance of the two packing methods from the perspective of: (i) code size, (ii) execution time, and (iii) power consumption. Our analysis results show that the Secure UPX performs better than AES-encryption packing in terms of the code size, execution time, and power consumption.
- Published
- 2010
50. Ultrasound field measuring using hydrophone for quantitative evaluation of medical ultrasonic probe
- Author
-
S. C. Noh, Jongha Park, W. J. Yu, Minkyu Park, H. K. Min, and Heung Ho Choi
- Subjects
Materials science ,Quality (physics) ,Field (physics) ,Hydrophone ,business.industry ,Acoustics ,Ultrasonic testing ,Ultrasound ,Ultrasonic sensor ,Sound pressure ,business ,Symmetry (physics) - Abstract
The quality of ultrasonic images is crucially affected by the applied ultrasonic probe; thus, it is necessary to evaluate the ultrasonic probe to achieve optimal performance. In this paper, the 3D acoustic field analysis method using a hydrophone, one of the probe evaluation methods, was performed, and the efficacy of this evaluation method for quantitative evaluation was evaluated. To acquire the acoustic field distribution of ultrasound at 7.5 MHz, a 128-multi-element medical ultrasonic array probe, that is considered to be inferior, was attached to a shaft. The shaft could be controlled in the x, y, and z directions. The hydrophone was attached in a water bath. The acoustic field distribution of each channel was displayed, and some parameters such as maximum acoustic pressure, the volume of -3dB field, and the symmetry of acoustic field were calculated. Using these parameters, the acoustic fields of normal, abnormal and simulated channels were compared. Comparing acoustic field characteristics of each channel proves that the proposed 3D acoustic field parameters are reliable and efficient to assess the performance of the ultrasonic probe.
- Published
- 2009
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.