Zobrazeno 1 - 10
of 35
pro vyhledávání: '"You Boo Jeon"'
Publikováno v:
Symmetry, Vol 14, Iss 6, p 1151 (2022)
This paper deals with the prediction of the future location of vehicles, which is attracting attention in the era of the fourth industrial revolution and is required in various fields, such as autonomous vehicles and smart city traffic management sys
Externí odkaz:
https://doaj.org/article/20e57167f37c4edc8013a1166a414e93
Autor:
Seong Soo Han, Doo-Soon Park, You Boo Jeon, Chang-Sung Jeong, JinSoo Park, Yoon Ki Kim, Du Hyun Hwang
Publikováno v:
The Journal of Supercomputing. 76:5460-5485
IT technology and traditional industries have been combined recently, resulting in IT convergence technology in various fields. Through convergence with the automobile, pedestrian detection technology, in particular, is used in the autonomous navigat
Publikováno v:
Advances in Computer Science and Ubiquitous Computing ISBN: 9789811593420
Recently, various character recognition techniques are advanced and used a lot in real situations. In the real complex situation, it is difficult to recognize characters because of Korean, English of various fonts and background noise. In this paper,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b37a9586636a8de135d22a3a6779daf8
https://doi.org/10.1007/978-981-15-9343-7_60
https://doi.org/10.1007/978-981-15-9343-7_60
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 9 (2013)
Wireless and mobile sensor network technologies in M2M (machine to machine) are rapidly applied to our real life. Thus, in near future, advanced wireless and mobile sensor network in M2M application will be major key factor of the future generation c
Externí odkaz:
https://doaj.org/article/3aa0b11fc51b4784bc11f66c11b750f3
Publikováno v:
Advances in Computer Science and Ubiquitous Computing ISBN: 9789811393402
In Message Oriented Middleware are composed of semiautonomous, heterogeneous, and independently designed next generation framework. For described to achieve successful operation of such a system, the activities of the message controlling the subsyste
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::24e2786fca7cc6d6f84650d801d44539
https://doi.org/10.1007/978-981-13-9341-9_47
https://doi.org/10.1007/978-981-13-9341-9_47
Publikováno v:
Soft Computing. 22:6621-6627
In this paper, we propose a method to detect network intrusions using anomaly detection technique based on probabilistic analysis. Victim’s computers under attack show various symptoms such as degradation of TCP throughput, increase in CPU usage, i
Publikováno v:
KSII Transactions on Internet and Information Systems. 13
As technology advances, the amount of fake news is increasing more and more by various reasons such as political issues and advertisement exaggeration. However, there have been very few research works on fake news detection, especially which uses gra
Publikováno v:
Cluster Computing. 19:1001-1013
The ubiquitous cloud infrastructure different access methods are analyses to understand new message protocols that are used ubiquitous IoT mobile application environment that presented the cloud computing platform for mobile application. It supports
Publikováno v:
Cluster Computing. 18:637-646
In this paper, an increase in the effectiveness of advertising through promotional videos is studied using a holographic machine to machine (M2M) technique. The holographic technique is implemented using Adobe After Effects, and a layer overlay is ap
Publikováno v:
Cluster Computing. 18:599-608
The demand for ubiquitous mobile application on cloud computing platform is increasing due to the rapid advancement of cloud technology. In this paper, we shall present a new architecture for ubiquitous computing environment on cloud computing platfo