Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Asynchronous Classification of Error-Related Potentials in Human-Robot Interaction

    The use of implicit evaluations of humans such as electroencephalogram (EEG)-based human feedback is relevant for robot applications, e.g., robot learning or corrections of robot’s actions. In the presented st...

    Su Kyoung Kim, Michael Maurus, Mathias Trampler, Marc Tabie in Human-Computer Interaction (2023)

  2. No Access

    Chapter and Conference Paper

    A Design of Improvement Method of Central Patch Controlled Security Platform Using Blockchain

    The enterprise patch management system is highly dependent upon a central management server and typically suffers a single point of failure. This study suggests a hyperledger fabric blockchain-based distribute...

    Kyoung-Tack Song, Shee-Ihn Kim in Advances in Computer Science and Ubiquitou… (2021)

  3. No Access

    Chapter and Conference Paper

    CoolPath: An Application for Recommending Pedestrian Routes with Reduced Heatstroke Risk

    Global warming and urbanization have made heatstroke a serious emergency disease especially for large cities in summer daytime. Although a lot of studies have focused on the heat-related analysis or on develop...

    Tianqi **a, Adam Jatowt, Zhaonan Wang in Web and Wireless Geographical Information … (2020)

  4. No Access

    Chapter and Conference Paper

    Implementation of Automatic Adjustment of Font Size System on Smartphone

    Adjusting the font size is a function of the smartphone for improving readability. This smartphone is easier to use than other function but is less useful due to the psychological factors experienced by users,...

    Kyoung Soon Hong, JiSu Park, Kang Hyun Kim in Advances in Computer Science and Ubiquitou… (2020)

  5. No Access

    Chapter and Conference Paper

    How to Extend IndoorGML for Points of Interest

    Nowadays, the interest in spatial information services is growing and moving towards indoor spaces. Indoor spatial data is fundamental as the demand for expressing complex urban environments, in the context of...

    Taehoon Kim, Kyoung-Sook Kim, Jiyeong Lee in Web and Wireless Geographical Information … (2020)

  6. No Access

    Chapter and Conference Paper

    Mobile Atmospheric Quality Measurement and Monitoring System

    Recently, IoT (Internet of Things) technology is applied in various fields to increase convenience and usability. In this paper, we propose a mobile atmospheric pollution monitoring system as an IoT applicatio...

    Kyeongseok Park, Sungkuk Kim, Sojeong Lee in Advanced Multimedia and Ubiquitous Enginee… (2019)

  7. No Access

    Chapter and Conference Paper

    How to Extend IndoorGML for Seamless Navigation Between Indoor and Outdoor Space

    Navigation and tracking systems became a traditional tool of positioning determination and route guidance for moving objects such as vehicles and pedestrians. Position techniques like Global Positioning System...

    Taehoon Kim, Kyoung-Sook Kim, Jiyeong Lee in Web and Wireless Geographical Information … (2019)

  8. Chapter and Conference Paper

    Task-Aware Image Downscaling

    Image downscaling is one of the most classical problems in computer vision that aims to preserve the visual appearance of the original image when it is resized to a smaller scale. Upscaling a small image back ...

    Heewon Kim, Myungsub Choi, Bee Lim, Kyoung Mu Lee in Computer Vision – ECCV 2018 (2018)

  9. No Access

    Chapter and Conference Paper

    Security Validation for Data Diode with Reverse Channel

    Hardware-based data diode is a powerful security method that removes the reverse channel for network intrusion. However, simple removal leads to data unreliability and user inconvenience. A reverse channel is ...

    Jeong-Han Yun, Yeop Chang, Kyoung-Ho Kim in Critical Information Infrastructures Secur… (2017)

  10. No Access

    Chapter and Conference Paper

    Implementation of the Block2 Option Transfer for Resource Observing with the CoAPthon Library

    Utilization of the Constrained Application Protocol (CoAP) that is an important protocol of the Internet of Things (IoT) has increased. So the many associated libraries related with CoAP are also emerging. Amo...

    Kyoung-Han Kim, Hyun-Kyo Lim, Joo-Seong Heo in Advances in Computer Science and Ubiquitou… (2017)

  11. No Access

    Chapter and Conference Paper

    A Novel on Automatic K Value for Efficiency Improvement of K-means Clustering

    The development of H/W and S/W has shortened the repetition cycle of new data generation and produced various categories of data. Machine learning, in particular, attracts explosive interest as it categorizes...

    Se-Hoon Jung, Kyoung-Jong Kim, Eun-Cheon Lim in Advanced Multimedia and Ubiquitous Enginee… (2017)

  12. No Access

    Chapter and Conference Paper

    A Simple Fatigue Condition Detection Method by using Heart Rate Variability Analysis

    The traffic accident statistics show that fatigue (drowsiness) and drunk driving are the major causes of traffic accidents. Therefore, it is important to detect and prevent driving in fatigue condition. The co...

    U.-Seok Choi, Kyoung-Ju Kim, Sang-Seo Lee in Advances in Parallel and Distributed Compu… (2016)

  13. No Access

    Chapter and Conference Paper

    Implementation of MCA Rule Mapper for Cloud Computing Environments

    The client-server system in the old finance and banking circle was operated in such a way as to respond to a relatively small number of devices, such as ATMs (automated teller machines) and personal computers....

    Kyoung-Sup Kim, Joong-il Woo, Jung-Eun Kim in Advances in Parallel and Distributed Compu… (2016)

  14. No Access

    Chapter and Conference Paper

    Implementation of Intelligent Decision-Based Smart Group Scheduler

    Unlike in the past, where diaries and paper calendars were mostly used, the rapid increase in the use of computers and smartphones of late has demanded a function with which the users can confirm and attach th...

    Kyoung-Sup Kim, Yea-Bok Lee, Yi-Jun Min in Advances in Parallel and Distributed Compu… (2016)

  15. No Access

    Chapter and Conference Paper

    A Distributed Mobility Support in SDN-Based LTE/EPC Architecture

    As smart phone has rapidly proliferated over the past few years, LTE operators endeavor to cope with large mobile data traffic volumes. To solve such problems, we propose a new SDN-based distributed mobility m...

    Yong-hwan Kim, Hyun-Kyo Lim, Kyoung-Han Kim in Advances in Computer Science and Ubiquitou… (2015)

  16. No Access

    Chapter and Conference Paper

    Thermal Image-Based Disc Pads Diagnosis System in Grab Crane

    Grab cranes are used for multi-purpose when the sand and soil are deposited into harbor wharf or the undersea construction is performed. Among the components of crane grab, the wire drum and disc brake pad are...

    Yeon-Jae Oh, Kyoung-Wook Park, Eung-Kon Kim in Advanced Multimedia and Ubiquitous Enginee… (2015)

  17. No Access

    Chapter and Conference Paper

    Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network

    ICS (Industrial Control System) is a computer-controlled system that monitors and controls distributed field devices for power grid, water treatment and other industrial areas. Because ICS components fulfill t...

    Kyoung-Ho Kim, Jeong-Han Yun, Yeop Chang, Woonyon Kim in Information Security Applications (2015)

  18. No Access

    Chapter and Conference Paper

    Whitelist Generation Technique for Industrial Firewall in SCADA Networks

    The use of SCADA systems has been increased since the 1960s as a need arose to more efficiently monitor and control the status of remote equipment. But, they are becoming more and more vulnerable to cyber-atta...

    Dong-Ho Kang, Byoung-Koo Kim, Jung-Chan Na in Frontier and Innovation in Future Computin… (2014)

  19. No Access

    Chapter and Conference Paper

    A Study on Management System Design of Swimming Exercise Prescription by Using Fussy ANP

    It has become general common sense through numerous researches that exercise provides positive impacts on physical and mental health. And it has been reported that regular exercise adjusts obesity by reducing ...

    Kyoung-Hun Kim, Won-Hyun Kim, Tae-Won Kyung in IT Convergence and Security 2012 (2013)

  20. No Access

    Chapter and Conference Paper

    A Detection Mechanism for SMS Flooding Attacks in Cellular Networks

    In recent years, cellular networks have been reported to be susceptible targets for Distributed Denial of Service (DDoS) attacks due to their limited resources. One potential powerful DDoS attack in cellular n...

    Eun Kyoung Kim, Patrick McDaniel in Security and Privacy in Communication Netw… (2013)

previous disabled Page of 3