134 Result(s)
-
Chapter and Conference Paper
Correction to: Generating BlobCell Label from Weak Annotations for Precise Cell Segmentation
In the original version of this paper some errors occurred. This was corrected.
-
Chapter and Conference Paper
Generating BlobCell Label from Weak Annotations for Precise Cell Segmentation
Cell segmentation in histopathological image analysis is critical for identifying cancer cells and predicting disease severity. However, manual cell labeling is time-consuming. Many experiments speed up the ge...
-
Chapter and Conference Paper
Development of Service and Product Design Processes Considering Product Life Cycle Management for a Circular Economy
One of the purposes of a circular economy is to reuse repeatedly products to extend their useful life and ultimately to be returned to nature. Therefore, following the concept of the circular economy, we need ...
-
Chapter and Conference Paper
Development of a Method for Service Creation and Product Design to Realize a Circular Economy
This study develops a method for creating services and products for a circular economy. The method consists of creating services to provide additional value for customers and the design method of products cons...
-
Chapter and Conference Paper
Application of a Structural Digital Twin on a Laboratory Model for Performance Monitoring of Aging and Degradation
The application of digital twin technology offers the potential to significantly enhance the reliability and performance of structural health monitoring techniques by providing detailed information on, and mea...
-
Chapter and Conference Paper
Characteristics of the Effective Cross-Sectional Area Reduction of the Turbine Nozzle Throat and Engine Performance of KSLV-II
The engines for the Korea Space Launch Vehicle-II (KSLV-II) are liquid oxygen/kerosene gas generator cycle engine. The turbine is driven by fuel rich gas of the gas generator. The turbine gas in kerosene-fuele...
-
Chapter and Conference Paper
Develo** a Speech Recognition Service for Korean Speakers with Dysarthria
The purpose of this study is to provide an API for converting the speech of people with dysarthria into a text form by constructing a model that learns the speech characteristics of Korean speakers with dysart...
-
Chapter and Conference Paper
Volumetric Body Composition Through Cross-Domain Consistency Training for Unsupervised Domain Adaptation
Computed tomography (CT) scans of the abdomen have emerged as a robust, precise, and dependable means of determining body composition. The accurate prediction of skeletal muscle volume (SMV) using slices of CT...
-
Chapter and Conference Paper
A Comparative Study on the Correlation Between Similarity and Length of News from Telecommunications and Media Companies
This study is based on the increasing damage caused by fake news, abusing articles, plagiarism, and similar news included in online news, and activities and systems for monitoring news copyright violations are...
-
Chapter and Conference Paper
Intrusion Detection System for Industrial Network
Various information and communication technologies are used to control industrial infrastructure. A programmable logic controller (PLC) manages and controls the detailed areas of each facility
-
Chapter and Conference Paper
Forensic Analysis of Apple CarPlay: A Case Study
Apple CarPlay is a system that puts some features of your iPhone or iPad onto the infotainment screen of a CarPlay-equipped vehicle, allowing drivers to use those features when driving. Using Apple CarPlay, dr...
-
Chapter and Conference Paper
Deep Learning Based Parking Slot Detection and Tracking: PSDT-Net
Around view monitor (AVM) based parking slot detection (PSD) is an important task for autonomous parking. Among various algorithms proposed for this task, such as parking line detection or segmentation-based a...
-
Chapter and Conference Paper
Consumers’ Perceived Benefits and Costs for Amazon Go Based on Social Media Data Using Text Mining
This study aims to identify the perceived benefits and costs of Amazon Go, the first unmanned store with advanced technology, based on the value-based adoption model using a text-mining technique. We collected...
-
Chapter and Conference Paper
Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks
Performance prediction in wireless mobile networks is essential for diverse purposes in network management and operation. Particularly, the position of mobile devices is crucial to estimating the performance i...
-
Chapter and Conference Paper
A Blockchain-Based Retribution Mechanism for Collaborative Intrusion Detection
Collaborative intrusion detection approach uses the shared detection signature between the collaborative participants to facilitate coordinated defense. In the context of collaborative intrusion detection syst...
-
Chapter and Conference Paper
Metaverse-Driven Interactive Performing Arts Content Development
The ongoing COVID-19 pandemic necessitated platform diversification and the revitalization of interactive performance (the metaverse), a new paradigm for the performing arts. In 2019, the authors implemented a...
-
Chapter and Conference Paper
A Security System for National Network
Recently, cybercrime attacking the national network has increased. National infrastructure such as water purification plants, power plants, and substations are operated by using programmable logic controllers ...
-
Chapter and Conference Paper
An Advanced Algorithm for Email Classification by Using SMTP Code
Email is an essential communication tool for modern people and offers a variety of functions. After the outbreak of COVID-19, the importance of emails enhanced further as non-face-to-face work increased. Howev...
-
Chapter and Conference Paper
A Privacy Preserving E-Voting System Based on Blockchain
An electronic voting system can enable greater democracy by allowing virtual and remote voting and facilitating greater participation. However, the e-voting systems have experienced allegations due to corrupti...
-
Chapter and Conference Paper
Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity
Network intrusion detection systems (IDS) has efficiently identified the profiles of normal network activities, extracted intrusion patterns, and constructed generalized models to evaluate (un)known attacks us...