Skip to main content

previous disabled Page of 7
and
  1. Chapter and Conference Paper

    Correction to: Generating BlobCell Label from Weak Annotations for Precise Cell Segmentation

    In the original version of this paper some errors occurred. This was corrected.

    Suk Min Ha, Young Sin Ko, Young** Park in Graphs in Biomedical Image Analysis, and O… (2024)

  2. No Access

    Chapter and Conference Paper

    Generating BlobCell Label from Weak Annotations for Precise Cell Segmentation

    Cell segmentation in histopathological image analysis is critical for identifying cancer cells and predicting disease severity. However, manual cell labeling is time-consuming. Many experiments speed up the ge...

    Suk Min Ha, Young Sin Ko, Young** Park in Graphs in Biomedical Image Analysis, and O… (2024)

  3. No Access

    Chapter and Conference Paper

    Development of Service and Product Design Processes Considering Product Life Cycle Management for a Circular Economy

    One of the purposes of a circular economy is to reuse repeatedly products to extend their useful life and ultimately to be returned to nature. Therefore, following the concept of the circular economy, we need ...

    Masahiro Arakawa, Won Young Park in Proceedings of Industrial Engineering and … (2024)

  4. No Access

    Chapter and Conference Paper

    Development of a Method for Service Creation and Product Design to Realize a Circular Economy

    This study develops a method for creating services and products for a circular economy. The method consists of creating services to provide additional value for customers and the design method of products cons...

    Masahiro Arakawa, Won Young Park in Proceedings of Industrial Engineering and … (2024)

  5. No Access

    Chapter and Conference Paper

    Application of a Structural Digital Twin on a Laboratory Model for Performance Monitoring of Aging and Degradation

    The application of digital twin technology offers the potential to significantly enhance the reliability and performance of structural health monitoring techniques by providing detailed information on, and mea...

    Lauren Thomas, Timothy Kernicky, Matthew Whelan in Dynamics of Civil Structures, Volume 2 (2024)

  6. No Access

    Chapter and Conference Paper

    Characteristics of the Effective Cross-Sectional Area Reduction of the Turbine Nozzle Throat and Engine Performance of KSLV-II

    The engines for the Korea Space Launch Vehicle-II (KSLV-II) are liquid oxygen/kerosene gas generator cycle engine. The turbine is driven by fuel rich gas of the gas generator. The turbine gas in kerosene-fuele...

    Chang-Ho Nam, Soon Young Park, Yoonwan Moon in 2023 Asia-Pacific International Symposium … (2024)

  7. No Access

    Chapter and Conference Paper

    Develo** a Speech Recognition Service for Korean Speakers with Dysarthria

    The purpose of this study is to provide an API for converting the speech of people with dysarthria into a text form by constructing a model that learns the speech characteristics of Korean speakers with dysart...

    Go Woon Choi, Min Hyuk Kim, Ha Young Park in Advances in Computer Science and Ubiquitou… (2023)

  8. No Access

    Chapter and Conference Paper

    Volumetric Body Composition Through Cross-Domain Consistency Training for Unsupervised Domain Adaptation

    Computed tomography (CT) scans of the abdomen have emerged as a robust, precise, and dependable means of determining body composition. The accurate prediction of skeletal muscle volume (SMV) using slices of CT...

    Shahzad Ali, Yu Rim Lee, Soo Young Park, Won Young Tak in Advances in Visual Computing (2023)

  9. No Access

    Chapter and Conference Paper

    A Comparative Study on the Correlation Between Similarity and Length of News from Telecommunications and Media Companies

    This study is based on the increasing damage caused by fake news, abusing articles, plagiarism, and similar news included in online news, and activities and systems for monitoring news copyright violations are...

    Yougyung Park, Inwhee Joe in Artificial Intelligence Application in Networks and Systems (2023)

  10. No Access

    Chapter and Conference Paper

    Intrusion Detection System for Industrial Network

    Various information and communication technologies are used to control industrial infrastructure. A programmable logic controller (PLC) manages and controls the detailed areas of each facility

    Woo Young Park, Sang Hyun Kim, Duy-Son Vu in Intelligent Systems and Applications (2023)

  11. No Access

    Chapter and Conference Paper

    Forensic Analysis of Apple CarPlay: A Case Study

    Apple CarPlay is a system that puts some features of your iPhone or iPad onto the infotainment screen of a CarPlay-equipped vehicle, allowing drivers to use those features when driving. Using Apple CarPlay, dr...

    Junsu Lee, Juwon Kim, Hojun Seong, Keonyong Lee, Seong-je Cho in Mobile Internet Security (2022)

  12. No Access

    Chapter and Conference Paper

    Deep Learning Based Parking Slot Detection and Tracking: PSDT-Net

    Around view monitor (AVM) based parking slot detection (PSD) is an important task for autonomous parking. Among various algorithms proposed for this task, such as parking line detection or segmentation-based a...

    Younghyo Park, Joonwoo Ahn, Jaeheung Park in Robot Intelligence Technology and Applicat… (2022)

  13. No Access

    Chapter and Conference Paper

    Consumers’ Perceived Benefits and Costs for Amazon Go Based on Social Media Data Using Text Mining

    This study aims to identify the perceived benefits and costs of Amazon Go, the first unmanned store with advanced technology, based on the value-based adoption model using a text-mining technique. We collected...

    Jaehye Suk, In-Hyoung Park, Cheol Lee in HCI International 2022 – Late Breaking Pap… (2022)

  14. Chapter and Conference Paper

    Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks

    Performance prediction in wireless mobile networks is essential for diverse purposes in network management and operation. Particularly, the position of mobile devices is crucial to estimating the performance i...

    Nikhil Sai Kanuri, Sang-Yoon Chang in Silicon Valley Cybersecurity Conference (2022)

  15. Chapter and Conference Paper

    A Blockchain-Based Retribution Mechanism for Collaborative Intrusion Detection

    Collaborative intrusion detection approach uses the shared detection signature between the collaborative participants to facilitate coordinated defense. In the context of collaborative intrusion detection syst...

    Wenjun Fan, Shubham Kumar, Sang-Yoon Chang in Silicon Valley Cybersecurity Conference (2022)

  16. No Access

    Chapter and Conference Paper

    Metaverse-Driven Interactive Performing Arts Content Development

    The ongoing COVID-19 pandemic necessitated platform diversification and the revitalization of interactive performance (the metaverse), a new paradigm for the performing arts. In 2019, the authors implemented a...

    ** Young Park, Yang Kyu Lim in HCI International 2022 – Late Breaking Posters (2022)

  17. No Access

    Chapter and Conference Paper

    A Security System for National Network

    Recently, cybercrime attacking the national network has increased. National infrastructure such as water purification plants, power plants, and substations are operated by using programmable logic controllers ...

    Woo Young Park, Sang Hyun Kim, Duy-Son Vu, Chang Han Song in Intelligent Computing (2022)

  18. No Access

    Chapter and Conference Paper

    An Advanced Algorithm for Email Classification by Using SMTP Code

    Email is an essential communication tool for modern people and offers a variety of functions. After the outbreak of COVID-19, the importance of emails enhanced further as non-face-to-face work increased. Howev...

    Woo Young Park, Sang Hyun Kim, Duy-Son Vu, Chang Han Song in Intelligent Computing (2022)

  19. No Access

    Chapter and Conference Paper

    A Privacy Preserving E-Voting System Based on Blockchain

    An electronic voting system can enable greater democracy by allowing virtual and remote voting and facilitating greater participation. However, the e-voting systems have experienced allegations due to corrupti...

    Wenjun Fan, Shubham Kumar, Vrushali Jadhav in Silicon Valley Cybersecurity Conference (2021)

  20. No Access

    Chapter and Conference Paper

    Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity

    Network intrusion detection systems (IDS) has efficiently identified the profiles of normal network activities, extracted intrusion patterns, and constructed generalized models to evaluate (un)known attacks us...

    Chungsik Song, Wenjun Fan, Sang-Yoon Chang in Silicon Valley Cybersecurity Conference (2021)

previous disabled Page of 7