Chonnam National University

Displaying 1-5 of 5 results

  • White Papers // Jan 2013

    Hey Home, Open Your Door, I'm Back! Authentication System Using Ear Biometrics for Smart Home

    Conventional authentication systems use secret knowledge like password either from alphanumeric PIN to graphical click-based or pattern password that impose memory burden to users. Biometrics appears to answer the problem related to conventional system. The authors propose an ear biometrics as an alternative to popular facial biometrics. One of the...

    Provided By Chonnam National University

  • White Papers // Jun 2011

    Globalization of Korean IT Companies: Opportunities and Strategies

    The main focus of this paper is to analyze the current IT industry and to provide relevant strategies for Korean IT companies (such as Samsung SDS and LG CNS et al.,) which want to go global. This paper first addresses an overview of the IT Industry. This paper examines the...

    Provided By Chonnam National University

  • White Papers // Dec 2009

    Virtual Gesture Screen System Based on 3D Visual Information and Multi-Layer Perceptron

    Active research is underway on virtual touch screens that complement the physical limitations of conventional touch screens. This paper discusses a virtual touch screen that uses a multi-layer perceptron to recognize and control Three-Dimensional (3D) depth information from a Time Of Flight (TOF) camera. This system extracts an object's area...

    Provided By Chonnam National University

  • White Papers // Nov 2008

    Predict Software Failure-Prone by Learning Bayesian Network

    The authors explore the software metrics and build a Bayesian Network Model for defect prediction. Much previous work has concentrated on how to select the software metrics that are most likely to indicate fault-proneness, based on the hypnosis that these metrics are independent. But in reality, software metric values are...

    Provided By Chonnam National University

  • White Papers // Apr 2008

    Network Traffic Anomalies Detection and Identification With Flow Monitoring

    Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. Researchers are still struggling to find an effective and lightweight method for anomaly detection purpose. In this paper, the authors propose a simple,...

    Provided By Chonnam National University

  • White Papers // Apr 2008

    Network Traffic Anomalies Detection and Identification With Flow Monitoring

    Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. Researchers are still struggling to find an effective and lightweight method for anomaly detection purpose. In this paper, the authors propose a simple,...

    Provided By Chonnam National University

  • White Papers // Jan 2013

    Hey Home, Open Your Door, I'm Back! Authentication System Using Ear Biometrics for Smart Home

    Conventional authentication systems use secret knowledge like password either from alphanumeric PIN to graphical click-based or pattern password that impose memory burden to users. Biometrics appears to answer the problem related to conventional system. The authors propose an ear biometrics as an alternative to popular facial biometrics. One of the...

    Provided By Chonnam National University

  • White Papers // Dec 2009

    Virtual Gesture Screen System Based on 3D Visual Information and Multi-Layer Perceptron

    Active research is underway on virtual touch screens that complement the physical limitations of conventional touch screens. This paper discusses a virtual touch screen that uses a multi-layer perceptron to recognize and control Three-Dimensional (3D) depth information from a Time Of Flight (TOF) camera. This system extracts an object's area...

    Provided By Chonnam National University

  • White Papers // Nov 2008

    Predict Software Failure-Prone by Learning Bayesian Network

    The authors explore the software metrics and build a Bayesian Network Model for defect prediction. Much previous work has concentrated on how to select the software metrics that are most likely to indicate fault-proneness, based on the hypnosis that these metrics are independent. But in reality, software metric values are...

    Provided By Chonnam National University

  • White Papers // Jun 2011

    Globalization of Korean IT Companies: Opportunities and Strategies

    The main focus of this paper is to analyze the current IT industry and to provide relevant strategies for Korean IT companies (such as Samsung SDS and LG CNS et al.,) which want to go global. This paper first addresses an overview of the IT Industry. This paper examines the...

    Provided By Chonnam National University