default search action
Myong-Chul Shin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [j3]Hyun Ho Moon, Jong-Joo Lee, Sang-Yule Choi, Jae Sang Cha, Jang Mook Kang, Jong Tae Kim, Myong-Chul Shin:
A Study Using a Monte Carlo Method of the Optimal Configuration of a Distribution Network in Terms of Power Loss Sensing. Sensors 11(8): 7823-7834 (2011) - [c17]Hyun-Jae Yoo, Myong-Chul Shin, Hak-Man Kim:
Modeling and Analysis of Jeju Power System with HVDC Using PSCAD/EMTDC. FGIT-CA/CES3 2011: 242-251 - [c16]Jang Mook Kang, Jae Sang Cha, You-Jin Song, Goo-Man Park, Eun-Young Ko, Myong-Chul Shin, Jeong Jin Kang, YouSik Hong:
A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control). ISA 2011: 378-383
2000 – 2009
- 2009
- [j2]Hak-Man Kim, Jong-Joo Lee, Myong-Chul Shin, Seok-Soo Kim:
A multi-functional platform for implementing intelligent and ubiquitous functions of smart substations under SCADA. Inf. Syst. Frontiers 11(5): 523-528 (2009) - [j1]Jong Kang Park, Jong Tae Kim, Myong-Chul Shin:
A CORDIC-based digital protective relay and its architecture. Microelectron. Reliab. 49(4): 438-447 (2009) - 2006
- [c15]Sang-Yule Choi, Myong-Chul Shin, Jae Sang Cha:
Loss Reduction in Distribution Networks Using Cyclic Best First Search. ICCSA (5) 2006: 312-321 - [c14]Hak-Man Kim, Jin-Hong Jeon, Myong-Chul Shin, Tae-Kyoo Oh:
New Design of PMU for Real-Time Security Monitoring and Control of Wide Area Intelligent System. KES (2) 2006: 812-818 - [c13]Sang-Yule Choi, Jae Sang Cha, Myong-Chul Shin:
Artificial Intelligent Application to Service Restoration Considering Load Balancing in Distribution Networks. KES (3) 2006: 883-892 - [c12]Hak-Man Kim, Jong-Yul Kim, Chang Dae Yoon, Myong-Chul Shin, Tae-Kyoo Oh:
Optimal Voltage and Reactive Power Control of Local Area Using Genetic Algorithm. KES (3) 2006: 900-906 - 2005
- [c11]Chang Dae Yoon, Seung-Yeon Lee, Myong-Chul Shin, Ho-Sung Jung, Jae Sang Cha:
A Fault Distance Estimation Method Based on an Adaptive Data Window for Power Network Security. ICCSA (2) 2005: 332-340 - [c10]Sang-Yule Choi, Myong-Chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha:
Distribution Data Security System Based on Web Based Active Database. ICCSA (2) 2005: 341-352 - [c9]Seung-youn Lee, Myong-Chul Shin:
Protection Profile for Software Development Site. ICCSA (2) 2005: 499-507 - [c8]Sang-Yule Choi, Myong-Chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha:
Distribution Data Security System Based on Web Based Active Database. ICCSA (4) 2005: 1319-1330 - [c7]Jong-Joo Lee, Jae Sang Cha, Myong-Chul Shin, Hak-Man Kim:
Adaptive Modulation Based Power Line Communication System. ICIC (2) 2005: 704-712 - [c6]Jae Sang Cha, Myong-Chul Shin, Jong-Joo Lee:
A Novel Interference-Cancelled Home Network PLC System Based on the Binary ZCD-CDMA. ICIC (2) 2005: 713-722 - [c5]Jong-wan Seo, Myong-Chul Shin:
A study on an ASIC design technique for digital protective relays. ISCAS (4) 2005: 3910-3913 - [c4]Phil-Hun Cho, Hak-Man Kim, Myong-Chul Shin, Jae Sang Cha:
Optimal Operation for Cogenerating System of Micro-grid Network. KES (2) 2005: 464-469 - [c3]Phil-Hun Cho, Myong-Chul Shin, Hak-Man Kim, Jae Sang Cha:
A Study of Power Network Stabilization Using an Artificial Neural Network. KES (1) 2005: 479-484 - 2004
- [c2]Tai-Hoon Kim, Myong-Chul Shin, Sang-ho Kim, Jae Sang Cha:
Security Requirements for Software Development. KES 2004: 116-122 - [c1]Seung-youn Lee, Myong-Chul Shin, Jae Sang Cha, Tai-Hoon Kim:
Threat Description for Developing Security Countermeasure. PCM (1) 2004: 548-555
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint