Jang‐Eui Hong

ORCID: 0000-0001-9786-7732
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Software Engineering Methodologies
  • Service-Oriented Architecture and Web Services
  • Software System Performance and Reliability
  • Software Engineering Research
  • Green IT and Sustainability
  • Software Reliability and Analysis Research
  • Safety Systems Engineering in Autonomy
  • Model-Driven Software Engineering Techniques
  • Software Engineering Techniques and Practices
  • Risk and Safety Analysis
  • Business Process Modeling and Analysis
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Autonomous Vehicle Technology and Safety
  • Video Coding and Compression Technologies
  • Parallel Computing and Optimization Techniques
  • Software Testing and Debugging Techniques
  • Internet of Things and Social Network Interactions
  • Embedded Systems Design Techniques
  • Systems Engineering Methodologies and Applications
  • Real-Time Systems Scheduling
  • Simulation Techniques and Applications
  • Image and Video Quality Assessment
  • Advanced Vision and Imaging
  • Open Source Software Innovations

Chungbuk National University
2014-2024

Southwest University of Science and Technology
2009-2014

Korea Advanced Institute of Science and Technology
2000-2003

University of Ulster
2002

Cyber-physical systems have emerged as a new engineering paradigm, which combine the cyber and physical world with comprehensive computational analytical tools to solve complex tasks. In cyber-physical systems, components are developed detect failures, prevent or mitigate failures of system. Sensors gather real-time data an input system for further processing. Therefore, whole depends on sensors accomplish their tasks failure one sensor may lead To address this issue, we present approach...

10.3390/computers7040068 article EN cc-by Computers 2018-12-06

During the development and maintenance of object-oriented (OO) software, information on classes which are more prone to be changed is very useful. Developers maintainers can make a flexible software by modifying part sensitive changes. Traditionally, most change-proneness prediction has been studied based source codes. However, in early phase provide an easier way for developing stable current design or choosing alternative designs before implementation. To address this need, we present...

10.1109/compsac.2008.80 article EN 2008-01-01

Nowadays, Internet of Things technology has garnered a great amount interest because it can make our life much easier, convenient, and even safer. devices be connected to the or each other whenever wherever in order collect, process, share information support various services. In provide useful support, important issues related security, performance, energy consumption have considered. For example, personal easily exposed others hacked; low performance high limit effectiveness devices. These...

10.1177/1550147716682738 article EN cc-by International Journal of Distributed Sensor Networks 2017-01-01

The System of Cyber-Physical Systems (SoCPS) comprises several independent (CPSs) that interact with each other to achieve a common mission the individual systems cannot on their own. SoCPS are rapidly gaining attention in various domains, e.g., manufacturing, automotive, avionics, healthcare, transportation, and more. extremely large, complex, safety-critical. As these safety-critical nature, it is necessary provide an adequate safety analysis mechanism for collaborative so whole network...

10.3390/s22124474 article EN cc-by Sensors 2022-06-13

The perception system is a safety-critical component that directly impacts the overall safety of autonomous driving systems (ADSs). It imperative to ensure robustness deep-learning model used in system. However, studies have shown these models are highly vulnerable adversarial perturbation input data. existing works mainly focused on studying impact attacks classification rather than regression models. Therefore, this paper first introduces two generalized methods for perturbation-based...

10.3390/make5040080 article EN cc-by Machine Learning and Knowledge Extraction 2023-11-07

Abstract Large software development organizations manage reusable components through a repository in order to reduce time and cost improve quality productivity. This paper presents hybrid DevOps process with systematic reuse‐based management the effort required for rework increase The proposed approach promotes reuse of based on both information retrieval ontology‐based techniques. assets are presented different styles ease support fine‐grained artifacts. To evaluate our process, pilot...

10.1002/smr.2248 article EN Journal of Software Evolution and Process 2020-01-30

Kolmogorov–Arnold Networks (KANs) are a novel class of neural network architectures based on the representation theorem, which has demonstrated potential advantages in accuracy and interpretability over Multilayer Perceptron (MLP) models. This paper comprehensively evaluates robustness various KAN architectures—including KAN, KAN-Mixer, KANConv_KAN, KANConv_MLP—against adversarial attacks, constitute critical aspect that been underexplored current research. We compare these models with...

10.3390/app142210173 article EN cc-by Applied Sciences 2024-11-06

Software product lines (SPLs) are complex software systems by nature due to their common reference architecture and interdependencies.Therefore, any form of evolution can lead a more situation than single system.On the other hand, developed keeping long-term perspectives in mind, which expected have considerable lifespan investment.SPL development organizations need consider systematic way complexity size.Addressing new user requirements over time is one most crucial factors successful...

10.3837/tiis.2019.08.021 article EN KSII Transactions on Internet and Information Systems 2019-08-31

Cyber-Physical System (CPS) is co-engineered interacting networks of physical and computational components that operate on different spatial temporal scales. The safety goal a single CPS usually achieved by applying hazard analysis techniques following the standard processes defined in ISO 26262 IEC 61508. However, property may not be satisfied when multiple CPSs collaborate due to complexity, uncertainty, variability. Therefore, technique would provide hazardous-free collaboration for...

10.1109/access.2020.3021460 article EN cc-by-nc-nd IEEE Access 2020-01-01

Cyber-physical systems (CPSs) that interact with each other to achieve common goals are known as collaborative CPSs. Collaborative CPSs can complex individual cannot on their own. One of the examples is vehicular cyber-physical (VCPSs), which integrate computing and physical resources improve traffic safety, situational awareness, efficiency. The perception system VCPS has limitations its coverage detection accuracy. For example, autonomous vehicle's sensor detect occluded objects obstacles...

10.3390/s22176610 article EN cc-by Sensors 2022-09-01

Social network services allow a large population of end-users software products to publicly share their concerns and experiences about systems. From engineering perspective, such data can be collected analyzed help development organizations infer users’ emerging demands, receive feedback, plan the rapid evolution product lines. For lines, supplement requirements in meet user’s needs also retain dominance market. Therefore, social services, being communication channel, have supported number...

10.3390/app9193944 article EN cc-by Applied Sciences 2019-09-20

Blockchain technologies are intended to help enhance the trustworthiness of information, by improving transparency, traceability, and immutability business logic hence with potential be applicable process reengineering (BPR). However, an ad hoc approach adopting blockchain during BPR may lead not better, but worse, than current processes, disappointments. In this paper, we present Fides - a framework for systematically utilizing towards enhancing processes trustworthiness. takes...

10.1145/3341105.3374022 article EN 2020-03-30

Cognitive radio (CR) wireless parameter optimizationis a typical multi-objective optimization problem. In order to design parameters, multiobjective immune genetic algorithm is presented based on non-dominated sort in this paper. Comparative studies are performed between the proposed and NSGA-II by use of four functions. Simulation results show that can effectively solve problems has more obvious advantage than NSGA-II. We control module using simulate optimal CR parameters IEEE 802.11a...

10.1109/cmc.2009.186 article EN 2009-01-01

A fast intra mode skip decision algorithm for H.264/AVC video encoding is proposed in this paper. Although the macroblock (MB) prediction algorithm, based on various methods pixel domain instead of transformed domain, increases compression ratio, it requires a significant increase computational complexity. MBs are only small part whole inter frame, large loads occur because all must be examined by process. To reduce processing time frame decision, scheme using an adaptive motion vector map...

10.1109/tce.2009.4814432 article EN IEEE Transactions on Consumer Electronics 2009-02-01
Coming Soon ...