Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Byong Kwon. Lee"'
Autor:
Byong Kwon. Lee
Publikováno v:
Webology. 19:4384-4395
Through the research of numerous researchers’ artificial intelligence imitates human language and visual expression with good performance and imitates human style in voice and picture. This ability although dependent on the data for learning artifi
Autor:
An-Na Kang, Byong-Kwon Lee
Publikováno v:
The Journal of Korean Institute of Information Technology. 18:141-149
Autor:
Byong Kwon Lee
Publikováno v:
Journal of Korea Multimedia Society. 19:436-442
특별한 장비 없이 즐기는 기능성 스포츠 게임 분야는 원격지에서 수집된 사용자 동작 데이터를 사용한다하지만 대부분의 동작 인식을 이용하는 솔루션의 경우 전면에서 한 개의 동작 인식
Publikováno v:
The Journal of Physiological Sciences. 65:159-164
Using a three-dimensional electromechanical model of the canine ventricles with dyssynchronous heart failure, we investigated the relationship between severity of valve regurgitation and ventricular mechanical responses. The results demonstrated that
Autor:
Byong Kwon Lee, Yang Sun Lee
Publikováno v:
Intelligent Automation & Soft Computing; Mar2020, Vol. 26 Issue 1, p133-139, 7p
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811015359
This paper proposes the interactive lecture system based on mixed reality using a transparent display that enables interaction with the users watching the display. This system unlike existing remote video lectures, will allow students to participate
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f4847f385eb45fbc1b5d77cf5f2b0652
https://doi.org/10.1007/978-981-10-1536-6_30
https://doi.org/10.1007/978-981-10-1536-6_30
Autor:
Joong Nam Jeon, Byong Kwon Lee
Publikováno v:
The KIPS Transactions:PartC. :611-620
Autor:
Joong Nam Jeon, Byong Kwon Lee
Publikováno v:
The KIPS Transactions:PartC. :813-820
The advance of computer and communication technologies enables the embedded systems to be equipped with the network communication interfaces. Their appearance in network leads to security issues on the embedded systems. An easy way to overcome the se
Publikováno v:
Advanced Science and Technology Letters.
as well as a variety of communication environment using the present communication network. Thus, it is required to investigate the authentication techniques for safer access control considering the access device. This paper proposed the authenticatio