Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Hale Kim"'
Autor:
Hale Kim, Ji-Eun Choi
Publikováno v:
TALE
Due to the advent of the 4th Industrial Revolution in the 21st century, people with abilities based on convergence thinking are required in various fields of society. In addition, there is a growing interest in emphasizing the innovation of knowledge
Publikováno v:
Communications in Computer and Information Science ISBN: 9783319213828
HCI (28)
HCI (28)
The purpose of this study is to introduce gesture recognition-based STEAM educational games using Kinect. The game is instructional media for evoking a student’s interest and helping students understand in a STEAM education class. We suggested a ST
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d7578eba507f66ac3c84192e30225637
https://doi.org/10.1007/978-3-319-21383-5_45
https://doi.org/10.1007/978-3-319-21383-5_45
Publikováno v:
AVSS
Object detection plays an important role in autonomous video surveillance systems nowadays. Models based on the Hough Forests are widely applied, which use the local patches that vote for the object centers in images. Since these patches vote indepen
Autor:
Hale Kim, Shengzhe Li
Publikováno v:
Encyclopedia of Biometrics ISBN: 9783642277337
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3cbc4513ffa7261b82337d91481a28a3
https://doi.org/10.1007/978-3-642-27733-7_9049-2
https://doi.org/10.1007/978-3-642-27733-7_9049-2
Autor:
Peter Henry Tu, Sung Chun Lee, Hale Kim, Ting Yu, Joong-Hwan Baek, Dashan Gao, Phill Kyu Rhee, Ram Nevatia
Publikováno v:
WACV
Effective perimeter protection mechanisms for industrial sites and critical infrastructure must contend with a large variety of potential threats as well as with the fact that normal site activity can be both complex and diverse. This paper documents
Autor:
Sung Chun Lee, Peter Henry Tu, Hale Kim, Dashan Gao, Phill Kyu Rhee, Ting Yu, Joong-Hwan Baek, Ram Nevatia
Publikováno v:
AVSS
Summary form only given. The rapid evolution of tools and software systems to design experiments, automatically monitor, collect and warehouse large amounts of data, from applications such as life sciences and industrial processes has resulted in a n
Publikováno v:
2007 41st Annual IEEE International Carnahan Conference on Security Technology.
The vulnerabilities of biometric sensors have been discussed extensively in the literature and popularized in films and television shows. This research examines the image quality of an artificial print as compared to a genuine finger, and examines th
Autor:
Tu, Peter, Yu, Ting, Gao, Dashan, Nevatia, Ram, Sung Chun Lee, Hale Kim, Rhee, Phill Kyu, Joong-Hwan Baek
Publikováno v:
2012 IEEE Workshop on the Applications of Computer Vision (WACV); 1/ 1/2012, p257-262, 6p