29   Artículos

 
en línea
Hye-In Ho, Chae-Hong Park, Kyeong-Eun Yoo, Nan-Young Kim and Soon-Jin Hwang    
Eutrophic freshwater ecosystems are vulnerable to toxin-producing cyanobacteria growth or harmful algal blooms. Cyanobacteria belonging to the Nostocales order form akinetes that are similar to the seeds of vascular plants, which are resting cells surrou... ver más
Revista: Water    Formato: Electrónico

 
en línea
Yeon-Ji Park, Min-a Lee, Geun-Je Yang, Soo Jun Park and Chae-Bong Sohn    
The BioBERT Named Entity Recognition (NER) model is a high-performance model designed to identify both known and unknown entities. It surpasses previous NER models utilized by text-mining tools, such as tmTool and ezTag, in effectively discovering novel ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Myoung Hoon Lee, Hye Seon Kim, Dongwoo Yang, Bada Ryu, Young-Suk Jang, Young-Il Kim, Chae-Un Park, Joo Myun Park, Jong Dae Do and Haryun Kim    
Deteriorated river water quality affects estuarine environments due to river and estuary linkages. Thus, river water quality improvement could play a pivotal role in the maintenance of estuarine ecosystem functions. The South Korean administration opened... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Hanyong Lee, Min Suh Chae, Jong-Yoon Park, Kyoung Jae Lim and Youn Shik Park    
Changes in rainfall pattern and land use have caused considerable impacts on the hydrological behavior of watersheds; a Long-Term Hydrologic Impact Analysis (L-THIA) model has been used to simulate such variations. The L-THIA model defines curve number a... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Seon-Ho Kim, Kyung-Oh Lee, Yoon-Jae Chae, Ho-Won Lee and Yoon-Yong Park    
Algorithms that automatically search for routes have various applications, such as games, navigation, and robots, and are used to create optimal paths in the space of real and virtual worlds. This paper introduces an indoor navigation algorithm allowing ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Dong-Kyu Kim, Na-Hye Kim, Chae-Yun Oh, Jusun Jang, Hosung Nho and Sung-Un Park    
As the competition among businesses intensifies and customer needs become increasingly diverse and complex, the need for personalized service has emerged. This study examines the effect of technology-based self-service (TBSS) characteristics of a Taekwon... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jae-Won Yoo, Yong-Woo Lee, Mi-Ra Park, Chang-Soo Kim, Sungtae Kim, Chae-Lin Lee, Su-Young Jeong, Dhongil Lim and Sung-Yong Oh    
An ecological index of macrobenthic communities is an important tool for assessing the biological quality of habitats and ecosystems. We tested the performance of the inverse function of the Shannon?Wiener evenness proportion (ISEP) with data from the en... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Sung-Il Ahn, Sangbuem Cho, Eunjeong Jeon, Myungsun Park, Byungho Chae, Isaac Celestin Poaty Ditengou, Jr. and Nag-Jin Choi    
This study investigates the effect of probiotics supplementation on tight junction protein (TJP) expression in animal models by meta-analysis. We estimated the effect of probiotics administration in an animal inflammatory bowel disease model based on 47 ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jeong-Yeob Chae, Chanhyung Jeon, Pyeongjoong Kim, Naoki Hirose, Ahyoung Ku and Jae-Hun Park    
Typhoon-induced strong winds can dramatically change the oceanic environment, occasionally resulting in sudden stratification changes. In July 2015, two consecutive typhoons, Chanhom and Nangka, passed over the Yellow and East/Japan Seas within a week. R... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Dong-Kyu Chae, Sung-Jun Park, Eujeanne Kim, Jiwon Hong and Sang-Wook Kim    
Malware are developed for various types of malicious attacks, e.g., to gain access to a user?s private information or control of the computer system. The identification and classification of malware has been extensively studied in academic societies and ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »