Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Jeong-Yong Byun"'
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 9 (2013)
This paper presents an efficient data aggregation approach for cluster-based underwater wireless sensor networks in order to prolong network lifetime. In data aggregation, an aggregator collects sensed data from surrounding nodes and transmits the ag
Externí odkaz:
https://doaj.org/article/2bfbb7369f4a420c9f1c6cc6af2f35ac
Publikováno v:
IEEE Transactions on Semiconductor Manufacturing. 31:250-257
Wafer maps contain information about defects and clustered defects that form failure patterns. Failure patterns exhibit the information related to defect generation mechanisms. The accurate classification of failure patterns in wafer maps can provide
Autor:
Ga-Yeon Kim, Jeong-Yong Byun
Publikováno v:
Parallel and Distributed Computing, Applications and Technologies ISBN: 9789811359064
PDCAT
PDCAT
It is not easy to develop fonts for individual syllables because the scientific principles of Hunminjeongeum generate a huge number of syllables. So we need to develop syllable fonts combined with three phonemic glyphs. Here, the development of glyph
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::02645139e0dca47ecce78c83ec2d345b
https://doi.org/10.1007/978-981-13-5907-1_38
https://doi.org/10.1007/978-981-13-5907-1_38
Publikováno v:
Security and Communication Networks. 9:492-499
In order to secure the content of simple object access protocol SOAP messages in Web services, several security standards of Web service security, such as XML digital signature, are used. However, the content of a SOAP message, protected with XML dig
Publikováno v:
International Journal of Control and Automation. 7:391-400
Making Web Services secure means making SOAP messages secure and keeping them secure wherever they go. Several security standards of Web Service Security (WS-Security), such as XML Digital Signature, are used to secure SOAP messages exchange in Web S
Publikováno v:
Contemporary Engineering Sciences. 7:749-754
The rapid economic development in South Korea has resulted in increase of crimes. Timely detection and reduction of crimes are primary focus of police officers. Internet of Things (IoT) and increasingly cheap and wearable sensors can be used to facil
Publikováno v:
Proceedings of the 2015 International Conference on Big Data Applications and Services.
Skyline queries compute data that are not dominated by any other data in the same database. Thus, it can discover user preference points without using scoring functions. Until now a lot of algorithms have been proposed that can solve the given proble
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9783662478943
Data mining can be considered as a powerful tool that enables low enforcement and emergency agencies to discovery meaningful patterns in a large amount of danger situation. In this paper, we propose a data mining framework for predicting crimes. The
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::51c8b7a8c04d8d0f75bd22516d294347
https://doi.org/10.1007/978-3-662-47895-0_61
https://doi.org/10.1007/978-3-662-47895-0_61
Publikováno v:
Computer Science and its Applications ISBN: 9783662454015
This paper provides a new approach for solving the problems of modeling and structural syntheses of information networks of automated control systems by applying fuzzy sets theory, fuzzy logic and genetic algorithms. Modified genetic operators of cro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::58d9489235baba2fa5378c8607e3c0ae
https://doi.org/10.1007/978-3-662-45402-2_150
https://doi.org/10.1007/978-3-662-45402-2_150
Publikováno v:
Advanced Science and Technology Letters.
In this short paper, we describe a study on crime pattern prediction using data mining techniques. The study contains of steps to pre-sort danger situations, and generate test data, which carefully designs test dataset so that it comprises with well-