Jang-Mook Kang

Jang-Mook Kang
  • PhD of Engineering (Information Security), 2005
  • Professor at Korea University

About

75
Publications
10,784
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
521
Citations
Current institution
Korea University
Current position
  • Professor
Additional affiliations
January 2015 - November 2015
Korea University
Position
  • Professor

Publications

Publications (75)
Article
Full-text available
Objective: Achromobacter spp. are aerobic, non-fermentative Gram-negative bacilli that can be widely found in aquatic environments. Nosocomial outbreaks and pseudo-outbreaks of Achromobacter spp. bacteremia have been recognized for decades. Notably, commonly used germicides in hospital settings constitute important sources for these outbreaks. Thi...
Article
Recently, hacking accidents and Distributed Denial of Service (DDoS) attacks are increasing in theInternet of Things(IoT) environment, and various cyber threats are increasing. In particular, threatsfrom various services such as webcams and telemedicine provided by mobile communication operatorssuch as LGU+ and KT olleh through IoT services are inc...
Article
Objective: To investigate the prevalence and risk factors of Blastocystis infections among primary school students in Jiangjin District, Chongqing City. Methods: A cross-sectional questionnaire survey was conducted among students sampled from a primary school in Jiangjin District, Chongqing City on April, 2018, and their stool samples were colle...
Article
Full-text available
Objective: To evaluate the clinical manifestations and outcomes of neonates born to women who had Coronavirus Disease 2019 (COVID-19) during pregnancy. Materials and methods: A systematic literature search was conducted on PubMed and Embase till April 15, 2020, by combining the terms (COVID-19, Severe Acute Respiratory Syndrome Coronavirus 2, SA...
Article
Full-text available
High Mn austenitic steels are a class of materials for cryogenic applications. Previous studies on Fe-34.5Mn-0.04C austenitic steels have shown that refining grain size can suppress the formation of deformation-induced ε and α’ martensite and improve the tensile strength and ductility at temperatures down to 123 K. Here we report a new observation...
Article
Objective: To understand the prevalence and risk factors of Blastocystis hominis infection in inpatients in Jiangjin District, Chongqing City. Methods: A cross-sectional study was conducted in a community hospital in Jiangjin District, Chongqing City, and the inpatients were surveyed by questionnaires. After obtaining the informed consent from t...
Article
Full-text available
News currently spreads rapidly through the internet. Because fake news stories are designed to attract readers, they tend to spread faster. For most readers, detecting fake news can be challenging and such readers usually end up believing that the fake news story is fact. Because fake news can be socially problematic, a model that automatically det...
Article
Appropriate seeding rate and row spacing are essential for optimizing alfalfa hay yield and quality. This paper reports a field experiment conducted from 2015 to 2017 to study the effects of seeding rate and row spacing on alfalfa hay yield, quality and other traits at the Dongying Academy of Agricultural Sciences experimental base, in the Huang-Hu...
Article
Full-text available
In this work, fully recrystallized ultrafine-grained (UFG) Fe-30Mn-0.11C steel with mean grain size of 1 μm was successfully produced by using traditional cold rolling and annealing process. The UFG Fe-30Mn-0.11C steel exhibited high tensile ductility (∼60.4%) and yield strength (381 MPa). Grain refinement and source hardening were responsible for...
Article
In order to explore the genetic basis for flowering date variation in alfalfa, a QTL mapping population was set up comprising 152 F 1 hybrids of 2 parent plants with contrasting maturity dates, and the QTL loci associated with flowering date were identified. A low-yielding early-maturing alfalfa variety was used as the pollen parent and a high-yiel...
Article
Full-text available
An Fe-34.5Mn-0.04C steel has been processed by cold rolling and annealing to prepare samples with a lamellar structure, a recrystallized grain structure and a composite structure of layers of recovered and recrystallized structures. For the recrystallized grain structure and the lamellar structure, the flow stress has been analyzed by applying Hall...
Article
In this paper, we propose the method to generate occlusion images which include sunglass and scarf from occlusion-free images for criminals identification. First, we construct an auxiliary set that has occlusion-free face image and its occluded face images from AR database. Secondly, pixel weights are determined by the statistical analysis of the d...
Article
Full-text available
The use of IoT devices such as wearable digital devices based on mobile devices is increasingly evident. In IoT-based environment, communication protocol of IoT category and lightweight special environment software are used instead of universal network configuration. Due to the operating structure of IoT, preparation of countermeasures to automatic...
Article
Full-text available
The long-term survival of alfalfa (Medicago sativa L.) is limited by several factors, including Fusarium root rot (FRR) caused by several Fusarium species. Resistance to FRR in alfalfa is usually evaluated under field conditions or in a soil culture test conducted under greenhouse conditions in artificially inoculated soil, both of which involve th...
Article
As the Smart phone has propagated, the mobile application market is expanded. Recently many kinds of researches and new methods are introduced to use smart devices in many field. In 5G environment, security is a necessary enabler for continuity of the everywhere and consumers’ daily lives are easily exposed to producers or companies. For this, it’s...
Article
Full-text available
Fine grained Fe-34.5Mn-0.04C steel samples with fully recrystallized grain sizes of 3.8 to 2.0 μm were prepared by cold rolling followed by annealing a temperatures of either 650 °C or 800 °C. It is found that a simultaneous increase in both strength and ductility can be obtained by grain refinement, leading to an observation that the best combinat...
Article
Full-text available
In order to creating map based on lidar in GPS-denied environments, a high precision 2D laser point-clouds map creating method based on loop closure detection was proposed. Firstly, the poses of unmanned vehicle were extracted from the observation data of 2D lidar, and the environment features and the sum of Gaussian mapping value of frame data in...
Article
Full-text available
In order to improve the barrier classification ability of mobile 2D LiDAR in urban environment, the creating accuracy of environmental map, and the safety and accuracy of autonomic behavior decision-making for unmanned vehicle, a classification method of environmental features based on machine learning was proposed. The data from 2D LiDAR were divi...
Article
Full-text available
Objectives : This study applied the research model of Bontis (1998), which has been used to investigate everything from business corporations to hospitals in Korea, examined its generalizability and attempted to verify which factors of the intellectual capital affects organizational performance, represented by indicators for the clinical and financ...
Article
Objectives : The purpose of this study was to examine the factors that affect employee satisfaction according to hospital size, job group and career at hospitals. Methods : Data were collected from 4,307 employees working at 5 university hospitals. Statistics were done with the SPSS program version 21.0. Results : There were significant differences...
Article
Full-text available
In the real world, especially for wearable context with the education information communicating, the diversified contexts need to be considered to apply the Attribute-Based Encryption. However, it is hard to design the optimized dynamic access structures because it is static access structures and properties of Attribute-Based Encryption. In this pa...
Conference Paper
Full-text available
According to the development of the technology for Wearable and Big Data, we need to consider Attribute-Based Encryption to protect the confidentiality of personal information. In the real world, especially for wearable context with the medical information communicating, the diversified contexts need to be considered to apply the Attribute-Based En...
Article
Google, Yahoo, Daum and Naver has the POI(point of interest) service. And POI on the map is expending to social commerce, SNS, social game and social shopping. At the same time the uses`s position on the map is the starting point of the Humanities Story. That means our current position is the place for stories of tales, children`s song, fictional c...
Article
This paper is intended for the CCTV (closed-circuit television) installedarea like schools and welfare facilities. Previous CCTVs could not connect with thesurrounding CCTVs intelligently. However, in this paper, intelligent CCTV is designedand through this Photographing and Video Surveillance is possible. The CCTV analyzescrime-expectation-places...
Article
The present study aimed to survey doctors working in five university hospitals about internal customer satisfaction and organization commitment level in order to identify casual relationships through structure equations. According to the analysis, organization management had the biggest impact on internal customer satisfaction level, and the sooner...
Article
User`s sensitivity is recognized as a very important parameter for communication between company, government and personnel. Especially in many studies, researchers use voice tone, voice speed, facial expression, moving direction and speed of body, and gestures to recognize the sensitivity. Multiplex modality is more precise than single modality how...
Article
According to the lunching of Google glass, the interest for wearable computer is increasing. This paper is about how to apply humanity or humanist metaphor to the development and application of wearable computer. Humanity is consisted of dream, imagination and desire of human mind. However the software development methodology and application design...
Article
Full-text available
SNS (Social Network Service) has evolved to life-friendly service with the combination of local services. Unlike exsiting mobile services, life-friendly service is expected to be personalized with gathering of local information, location information and social network service information. In the process of gathering various kinds of information, Bi...
Conference Paper
Soil-shredded tire mixture is examined to reduce frost heave and force due to effective prevention against intrusion of cold air from atmosphere to ground. Frost force called as frost earth pressure occurs when ground temperature decreases under 0 C and soil volume expands. Soil expansion proceeds in a horizontal direction as well as a vertical dir...
Conference Paper
Many theoretical and computational models have been frequently used in the past to estimate the frost depth of frozen soil, but these models require accurate data for the atmospheric environments and soil properties which is generically diverse with respect to locations. Compared to the models, field measurements directly provide the frost depth, i...
Article
Full-text available
This article examines the Internet fandom culture of YouTube and Facebook and Twitter for Korea Wave Fandom. This article the principle of shared network connection and re-mediated and looked at in terms of the spread and the value passed. Useful field of view which korea wave look forward to continue to release and Challenges. At the same time, Ko...
Article
This paper presents modifications and improvements to the interface of a secure real media contents management model with the intention of increasing security and usability. This paper examines a security technology that needs to be considered in the EHR (Electronic Health Record) service model. This EHR(Electronic Health Record) service model is s...
Article
This study is about the architecture of the system utilizing for smart phones and the Augmented Reality (AR) technology. AR is the technology of adding various types of information on the real word to create a third space (real plus internet). Smart phone users can learn the AR information provided by the management server. The proposed system util...
Conference Paper
UX (User experience) and design are grand of the leading factors in determining the success of a mobile initiative in these days. Social Network service concerned about improving the mobile user experience will understand the sense of touch as a tremendous and underused source of both physical and emotional attachment. In this study, we analyzed th...
Article
Full-text available
Now that the agricultural facilities are being increase owing to development of technology and diversification of agriculture and the ratio of garden crops that are imported a lot and the crops cultivated in facilities are raised in Korea, the number of vinyl greenhouses is tending upward. So, it is important to grasp the distribution of vinyl gree...
Article
Full-text available
We investigated the accuracy in three dimensional geo-positioning derived by two homo-type stereo pairs and four hetero-type stereo pairs of high resolution satellite images using the vendor-provided rational polynomial coefficients (RPC) in this research. The results of 3D geo-positioning from six different stereo combinations were assessed with s...
Article
Full-text available
The purpose of this study is to investigate the determinants of intent to use the medical-application(M-APP) of smart phone of nurses working at the nursing department of two university hospitals in Korea. The independent variables used in the study are performance expectancy, effort expectancy, social influence, facilitating condition, attitude to...
Article
This study purports to investigate the difference between upward and downward feedback and to find out the strategy to enhance the validity and reliability of the multi-source feedback system. Data were collected from 88 middle-level managers working at divisions of nursing, administration, and clinical technology at a university hospital located i...
Article
Full-text available
This paper presents an adaptive e-learning system which supports collaborative learning based on a location-based social network and semantic modeling. In the system, a social network among e-learning learners is dynamically constructed on the basis of the location information of learners using GPS sensors for collaborative learning. In addition, u...
Article
In this paper, we proposed a latticed indoor VLC channel model and interference cancelled ZCDVLC((Zero Correlation Duration- Visible Light Communication) system using unipolar ZCD code. As a spreading sequence, unipolar ZCD code has an excellent ACF(Auto Correlation Function) and CCF(Cross Correlation Function) characteristics. It's spreading prope...
Article
Rise in the use of cloud computing is increasing the volume of data stored and managed on a daily basis beyond TB level. Google, Naver, Daum, Yahoo and Amazon, etc. are developing proprietary distributed computing platform technologies based on massive cluster to store and manage data in large quantity. One of the best-known applications of cloud c...
Article
In this paper, we proposed positioning data watermarking scheme for VLC(Visible Light Communication) system based on QPSK-OFDM modulation. Optical watermarking sequence containing positioning data is transferred on top of original VLC data so both information is sent concurrently. Original data is not affected by watermarking sequence if the magnit...
Chapter
Hybrid application is the one with advantage of mobile web and an application. In this study, we analyzed the communication of political network campaigns based on the technical features of hybrid application. Political network campaigns strengthen relation, reputation, influence, and attention using social media. Especially, the political communic...
Chapter
The communication network takes on an aspect of complexity through the mass media and personal media maintain a complementary relationships each other. Recently the Relationship Information comes on a major factor in a political communication because that political information has been collected, spread out, and reproduced based on the social netwo...
Article
This paper experimentally analyzes the production characteristics of hot-brine stimulation accompanying hydrate reformation in the presence of methane hydrate. Many attempts have been made to recover methane hydrate commercially, such as depressurization, thermal stimulation, and inhibitor injection. Hot-brine injection coupled with inhibitor injec...
Conference Paper
Internet access is now available everywhere. In particular, the emergence of mobile networks increased the connectivity of the Internet. Therefore, The Internet has permeated in all things. The Internet can identify the location of objects. Also, check this out on a political campaign can be location-based services. Located in a political campaign,...
Conference Paper
In this paper, we will review the privacy algorithm. In particular, recently has emerged from Facebook and Google + deal with privacy. In this article, working in a mobile environment can take advantage of social networking services should review the security algorithm.
Conference Paper
In this paper, we propose a complex network scheme for various political decision path. And this study represents a broad change in how people communicate with one another for political issues. Often overlooked, however, is the impact of political decision path on the complex network, and in turn the relevance of the facebook network and google plu...
Article
This paper presents an e-learning support system which constructs a social network among elearning learners on the basis of the location information of the learner and the instructor obtained using GPS sensors, etc. For this, we suggest a mechanism that supports the construction of a social network service using the location information of the smar...
Article
Large amounts of information being generated in real time in a distributed environment due to recent development of cloud services such as SaaS, etc. is stored and managed in a database and is shared by users. But because the sensitive information of an individual is included in this information, the privacy damage by illegal utilization is worried...
Article
Computational models have been widely used to predict thermal distribution in soils, but care must be taken to determine thermal conductivity which is a key parameter in computational models. Thermal conductivity is affected by dry density, water content, particle size, unfrozen and frozen condition, saturation degree, and soil components. Experime...
Article
Full-text available
This study suggests an approach to effective transmission of multimedia content in a rapidly changing Internet environment including smart-phones. Guaranteeing QoS in networks is currently an important research topic. When transmitting Assured Forwarding (AF) packets in a Multi-DiffServ network environment, network A may assign priority in an order...
Article
Full-text available
In sensor networks, nodes must often operate in a demanding environment facing restrictions such as restricted computing resources, unreliable wireless communication and power shortages. Such factors make the development of ubiquitous sensor network (USN) applications challenging. To help developers construct a large amount of node software for sen...
Article
Full-text available
This Paper deals with Social Network Service for smart-phone environment. Mobile social network service will developed with augmented reality combined with SNS. Therefore, this research introduce methodology and augmented reality system for social network analysis based on smart-phone environment. Introducing methodology and item and augmented real...
Article
Full-text available
In this paper, we propose the performance improvement technique using convolutional codes for T-DMB watermarking system. By applying the channel coding, the error performance is improved and the capacity of additional data is increased. We certified availability of our proposed technology by using various simulation.
Article
Full-text available
Social individualized broadcasting increases rapidly in an environment that combines communication and broadcasting. Real-time individualized broadcasting is a service that is provided by multiple individuals to many and unspecified persons. In contrast, newly introduced individualized broadcasting service is a service that has not been experienced...
Conference Paper
In this paper, we describe Platform to allow social participation. Digital Social is the technology for computer to estimate and reason the relation between human beings. With the relation being strengthened by Digital Social, you can encourage participation. Especially emotion can change weak tie into strong tie by furthering participation. This s...
Conference Paper
This paper proposes Semantic DRM (Digital Rights Management) Content to be developed by means of RDF (Resource Description Framework) among Ontology Technology. The purpose of this paper is to implement DRM utilizing semantic web technology for resolving the threat to copyright in ubiquitous network environment. This paper analyses research procedu...
Article
Cognitive radio (CR), which is proposed as a technology that utilizes the frequency resources effectively, has studied to relive scarcity of the frequency resources. CR provides opportunistically unused frequency to the secondary user when the primary user is not detected. Spectrum sensing is the most important technology to detect primary user. Ho...
Article
In current video-conferencing systems. user's face movements are restricted by fixed camera, therefore it is inconvenient to users. To solve this problem, tracking of face movements is needed. Tracking using whole face needs much computing time and whole face is difficult to define as an one feature. Thus, using several feature points in face is mo...
Conference Paper
It is said that the UC(Ubiquitous Computing) Environment will be come by the technological revolution in the future. This paper firstly points out the problem that engineer thinks that Ubiquitous computing connected to network have become more complexes and distributed, but most system-related research is still focused on the 'performance' or 'effi...
Article
Recently many company has been cracked by crackers information security and everyday new computer virus come out. so e-trade partners should prevent the disasters. A few studies researched e-trade securities broadly but the new trend in information security division especially focused on electronic payment, EDI, Transportation, Contracts, Insurance...
Conference Paper
The morphology of the interface controls the crystalline quality of heterostructures grown by epitaxy. For GaAs/Si, with poor interfacial organization, the density of threading dislocations in the top of 3 mu m thick layer of GaAs is about 10(8)/cm(2). When the surface is ideal, as for GaSb/(001)GaAs, the misfit dislocation network is a perfect gri...
Chapter
This paper aims to construct a social network among e-learning learners on the basis of the location information of the learner and the instructor obtained using GPS sensors, etc. For this, we suggest a system that supports the construction of a social education network service using the location information of the smart-phone in e-learning. This s...

Network

Cited By