Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Cheolwon Lee"'
Publikováno v:
IEEE Access, Vol 11, Pp 69046-69055 (2023)
This study presents a deep learning-based approach for consistent Sun Protection Factor (SPF) grading by quantifying skin erythema. Despite strict international standards, the current human-based Minimum Erythema Dose (MED) determination method for S
Externí odkaz:
https://doaj.org/article/9ca3aaeefaab45039df2a6703e177df8
Publikováno v:
IEEE Access, Vol 10, Pp 132376-132383 (2022)
In this study, we propose the Progressive Weighted Self-training Ensemble (PWStE) method that reinforces efficiency of labeled data for multi-type skin lesion semantic segmentation. The generation of multi-type skin lesion labeled data is extremely e
Externí odkaz:
https://doaj.org/article/7d1f6e1cb7d84885aebac7150a8223bc
Publikováno v:
Sensors, Vol 19, Iss 7, p 1598 (2019)
This paper describes our virtual fence system for goats. The present invention is a method of controlling goats without visible physical fences and monitoring their condition. Control occurs through affecting goats, using one or more sound signals an
Externí odkaz:
https://doaj.org/article/6deed40367bb4a289e71272a53df617b
Autor:
Cheolwon Lee
Publikováno v:
Exercise Science. 23:257-266
Autor:
Cheolwon Lee
Publikováno v:
Exercise Science. 20:139-148
Autor:
Cheolwon Lee, Jungtaek Seo
Publikováno v:
IEEE Power and Energy Magazine. 9:82-90
The Smart Grid System will Deliver Electricity from producers to consumers using digital communications technology in order to conserve energy and increase reliability. Since the power grid system is one of the critical infrastructures in each countr
Publikováno v:
Digital Investigation. 6:S108-S113
This paper analyzes the National Software Reference Library Reference Data Set (NSRL RDS) and constructs a Korean RDS (KRDS) based on it. The fact that NSRL RDS offers the largest amount of hash data sets has led to its widespread adoption. However,
Publikováno v:
2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering.
This paper proposes an efficient message authentication scheme providing non-repudiation of the smart metering service in Smart Grid. One of the main challenges in securing Advanced Meter Infrastructure is to accomplish message authentication and non
Publikováno v:
Future Generation Information Technology ISBN: 9783642105081
FGIT
FGIT
Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems. It is difficult to decide whether the sting is obfuscated because the shape of obfuscated strings are changed co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3d39313a6e40dadee9d148d1e163fd4a
https://doi.org/10.1007/978-3-642-10509-8_19
https://doi.org/10.1007/978-3-642-10509-8_19
Publikováno v:
2016 International Conference on Information Science & Communications Technologies (ICISCT); 2016, p1-7, 7p