Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Instance-Ambiguity Weighting for Multi-label Recognition with Limited Annotations

    Multi-label recognition with limited annotations has been gaining attention recently due to the costs of thorough dataset annotation. Despite significant progress, current methods for simulating partial labels...

    Daniel Shrewsbury, Suneung Kim in Advances in Knowledge Discovery and Data M… (2024)

  2. No Access

    Chapter and Conference Paper

    Target Detection Using Radar in Heavy Sea Clutter by Polarimetric Analysis and Neural Network

    To improve radar detection of targets in the presence of sea clutter, polarization decomposition analysis is used to output data to a neural network. To detect the target in heavy sea clutter, the received sig...

    Ji Eun Kim, Sang Min Lee, Seung-Phil Lee in Advances in Neural Networks – ISNN 2014 (2014)

  3. No Access

    Chapter and Conference Paper

    Development of Value Oriented Customized Contents

    Consumption values vary according to contexts. However, these values become ultimately the utopic value at the moment of decision whatever it will be because decisions are made to get maximum profit. In the er...

    Sung Young Lee, Eun Sok Bae, Bo Eun Jung in Computer Applications for Bio-technology, … (2012)

  4. No Access

    Chapter and Conference Paper

    The International Sculpture Symposium in Icheon as Local Cultural Values and a Possibility of Ecomuseum

    The present study aims to investigate the local-cultural values of International Sculpture Symposium Icheon (ISSI) which is one of the cultural and art resources of the city and its suitability for an eco muse...

    Eun Sok Bae, Sung Young Lee in Computer Applications for Bio-technology, … (2012)

  5. No Access

    Chapter and Conference Paper

    A Remote Firmware Upgrade Method of NAN and HAN Devices to Support AMI’s Energy Services

    As AMI system is applyed in Korea gradually, electric company can provide a lot of services to customers like DR(Demand Response), CSS (Customer Service System). In this case, field deployed devices which are ...

    Young-jun Kim, Do-eun Oh, Jong-min Ko in Convergence and Hybrid Information Technol… (2011)

  6. No Access

    Chapter and Conference Paper

    A Study on the Integration of Power System Operational Data and Application

    Modern utilities monitor and control the power system via a vast network of communication-enabled devices. The data generated from power plants to consumers has been treated independently and applications moni...

    Do-Eun Oh, Young-Il Kim, Young-Jun Kim in Convergence and Hybrid Information Technol… (2011)

  7. No Access

    Chapter and Conference Paper

    Energy-Efficient Fire Monitoring Protocol for Ubiquitous Sensor Networks

    Many countries are looking for ways to fight the forest fire at early stage using sensor network by integrating IT technologies. Studies are conducted in fire-related sensor network field in line with those ch...

    Heemin Kim, Ae-cheoun Eun, Sunyoung Han, Young-guk Ha in Communication and Networking (2011)

  8. No Access

    Chapter and Conference Paper

    A Context-Driven Bayesian Classification Method for Eye Location

    In this paper, we present a novel classification method for eye location. It is based on image context analysis. There is general accord that context can be affluent derivation of information about an illumina...

    Eun ** Koh, Mi Young Nam, Phill Kyu Rhee in Adaptive and Natural Computing Algorithms (2007)

  9. No Access

    Chapter and Conference Paper

    An Efficient Face and Eye Detector Modeling in External Environment

    In this paper, we propose multi-class classifier and knowledge based face detection. Eye region and face location is used illuminant based Bayesian detector. We propose the efficient face and eye detection sys...

    Mi Young Nam, Eun ** Koh, Phill Kyu Rhee in Artificial Intelligence and Soft Computing… (2006)

  10. No Access

    Chapter and Conference Paper

    Design and Performance Evaluation of Token-Based MAC Protocols in WDM Burst Switched Ring Networks

    Token-based MAC(Medium Access Control) Protocols are proposed for WDM Burst-Switched Ring Network which consists of nodes using TT-TR(Tunable Transmitter-Tunable Receiver). The node architectures with TT-TR ma...

    Li-Mei Peng, Young-Chul Kim, Kyoung-Min Yoo in Distributed Computing and Internet Technol… (2005)

  11. No Access

    Chapter and Conference Paper

    Version Space Learning with DNA Molecules

    Version space is used in inductive concept learning to represent the hypothesis space where the goal concept is expressed as a conjunction of attribute values. The size of the version space increases exponenti...

    Hee-Woong Lim, Ji-Eun Yun, Hae-Man Jang, Young-Gyu Chai, Suk-In Yoo in DNA Computing (2003)