2016 (331)
2015 (305)
2014 (138)
2013 (186)
2012 (52)
2011 (18)
2010 (18)
2009 (23)
2008 (28)
2007 (21)
A Novel Way of BPA Calculation for Context Inference using Sensor Signals
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.1-8
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Basic probability assignment (BPA) has the key role in multi-sensor data fusion. This paper proposed a way to determine BPA using the various signals acquired from the sensors. It described the analysis of signals detected by the sensors. The determined BPA were used for multi-sensor data fusion to infer and recognize the context targeted by a wireless sensor networks. To determine BPA, the change rate was calculated and assessed to be reflected. The method enabled context inference using the sensor signals even when there was no advanced information of the situation.
Development of Foreign Language-Based Apps for Supporting Immigrants
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.9-14
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The Korean government has implemented many multicultural policies in the recent years in order to support marriage immigrants. However, most of the programs designed to them basically help the immigrants’ daily living. In addition, the programs are usually conducted on the spot such as the Multicultural Family Support Centers in the neighborhood. Thus, the immigrants with low income, who are likely to be forced to enter a job market, hardly make access to the centers in time of need. Consequently, 1 out of 3 marriage immigrants appeared that they have never gotten services at the centers. With this economic disadvantage, some Korean spouses hesitate to help their wife or husband adapt to Korean society sooner than they expect. This reluctance results from purchasing marriages, which may require substantial amount of time to build a mutual trust. In this context, multicultural support programs focused on marriage immigrants should develop online that provides more direct and easy way to approach information as well as offline programs. This study suggests that foreign language-based apps can help immigrants acquire knowledge and information to live an independent life in Korea.
Attenuation of Signal at a Tropical Location with Radiosonde Data Due to Cloud
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.15-22
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Cloud attenuation is calculated from cloud liquid water content (LWC). Cloud liquid water content (LWC) is derived from the radiosonde data using the Salonen model, show a prominent linear variation with the attenuation contribution due to cloud at a tropical location. In this paper, the attenuation contribution due to cloud liquid water content (LWC) and attenuation contribution due to cloud ice water content is studied at different frequencies in the tropical region. Cloud liquid water content shows a greater contribution compared to Cloud ice water content in causing attenuation of signal due to cloud in troposphere.
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.23-34
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper focuses on the research of the problem and the prevention of the catastrophy which the T-DMB Emergency Alert Message would cause by changing the contents paralyze the national communication channels during the transferring process. The T-DMB Emergency Alert which is used when the Disaster occur. Using the notice support message of that program. Protecting not just vicious attacks but forceful channel transfer rights and sending coded no-public certification information coordination method along with video. Since suing T-DMB Emergency Alert Message could give the right to transfer channels and could be moved to a different channel. So in this case all T-DMB receivers are the targets of the vicious Emergency Alert Broadcast. This paper compares the current Emergency Alert Broadcast Service which T-DMB Broadcast and the One-Time PAD based message alert which traditional service model provides. Suggested research content could be applied to all other Emergency Alert casts of digital broadcasts and national broadcasting system.
Picture Enhancement and Enlargement Algorithm on a Small Infrared Images
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.35-44
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A thermal infrared images obtained by a FLIR infrared cameras can be used to inspect the malfunction or energy strength of warmth in a location. However, generally the resolution of thermal infrared images is smaller than that of optical images, image enlargement approach is requested. In this paper, we studied on filter design algorithm for image upsampling and horizontally, vertically, or horizontally-vertically. Through the training process, the most appropriate filter coefficients are assigned to achieve a better performance. In a comparison with different sized filters and existing upsampler, it is clearly seen that bigger filter outperforms all other smaller filters in terms of both objective and visual quality.
An Innovative Approach for Regular Expression Matching Based on NoC Architecture
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.45-52
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
An new regular expression (regex) matching method based on Network-on-Chip(NoC) architecture is proposed in this paper. The idea is to combine a new kind of regex matching engine implemented in hardware with NoC architecture to get a high matching rate. The Regex matching was performed by partitioning the regex into several parts to make the finite state machine (FSM) simpler. Each part of regex can be matched by an engine cell core, and each core communicates with other cores by routers on a NOC topology. This method is suitable for different rule libraries in Deep packet inspection (DPI) and is easy to change the rule library of regex stored in memory. The engine was designed and implemented based on field programming gate array (FPGA) as a prototype and a model to implement the architecture in Application-Specific Integrated Circuits (ASIC) is also discussed in this paper. The experimental results show that this method can make regex matching much faster than traditional methods.
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.53-60
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study is focused on the research of exhibition design model for science museum, dedicated to preschoolers aged from 3 to 5 in their crucial developmental phase for wholesome development to help them explore intellectual curiosity through scientific play and experience. In this process, I propose exhibition design types or structures tailored to preschoolers’ science material and development features suitable for their each age group along with preferable play environment plan, and attempted to verify the direction for differentiated new hands-on education against average science museums. Based on the direction mapped out in this study, preschoolers’ science museum for their scientific thinking and wholesome human development are expected to be established.
A Study of Methods to Use Local Communities through Book Cafes
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.61-70
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study looks into cultural characteristics of book cafes emerging in the Hongdae area and methods for the effective use of cultural space through the cases of Potato Flower Studio in Gangwon-do and of the changes of two markets ‘Gwangjang Market’ and ‘Tongin Market’ in Seoul. The cultural space is generally acknowledged as a place or facility where citizens can appreciate culture and arts or they can create or educate cultural products in life. As a potential space in the cultural space of a city, book cafes should be developed into a cultural space which can be easily accessed by publishers, Korean readers, and foreigners. It is required that a book cafe acts as a local community space with its characteristics, that is, a complex culture space. To find a utilization plan for book cafes, we conducted a comparative study with ‘Potato Flower Studio’ in Pyeongchang, Gangwon-do which is the place connecting successfully with regional culture of the area. The cultural space should be changed to meet the needs of the time. This study investigates various methodologies to create a cultural space.
A Review on Device-Free Passive Indoor Positioning Methods
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.71-94
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
There is an increasing need for unobtrusive positioning systems in smart homes and assisted living environments. This review presents the main technologies used for device-free passive indoor positioning, including pressure sensors, thermal infrared sensors, sound source localization, ultrasound, radio frequency, infrastructure-mediated sensing and electric-field-based methods. In addition, it compares the advantages and disadvantages of a range of positioning systems to help identify the most suitable positioning technology for specific cases.
Comparative Performance Study of Localization Schemes in Wireless Sensor Networks
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.95-102
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Localization is one of the most important tasks for location-aware applications in wireless sensor networks (WSNs). The accuracy of positioning information gives the applications a great number of advantages and, thus, it is very important to choose a localization scheme with the highest accuracy. In this paper, we review three typical localization schemes for WSNs and, then, compare their performance via computer simulation in terms of localization accuracy. The simulation study shows that the probability grid localization scheme achieves the best performance with the minimum location error rate.
Policy Perspective Analysis of Technology Adoption in Industries
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.103-112
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Technology innovation offers new paradigm for economic development in the globalized world. Business sector role is significant for the development of the country. Technology adoption is very critical and risk taking decisions for the firms. Firms require greater experience and investment for undertaking technology adoption decision. This paper demonstrates the trend of technology adoption in firms of developing countries and explores industrial landscape features. The case study of Pakistan is used for analysis, it represents the developing country of Asia. The paper used the content analysis method. The key points extracted by using the Socio-economical development indicators. This study is twofold. First highlights the problems and second identify the best strategies for adoption of technology in firms by the government.
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.113-122
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Electric vehicles (EVs) have become one of the most important means of transportation recently. So far, the research related to EVs has mainly focused on battery charging technique and battery management. Since the infrastructure for EV services in Jeju is in the inchoate stage, more various kinds of research works related to EV charging services should be performed. In this paper, we propose new reservation recommendation algorithms for charging EVs while traveling, especially in Jeju-do, to prepare for EV charging reservation systems in the near future. In our proposed algorithms, we select charging stations based on distance and route. When we recommend alternative charging stations, we provide 3 possible stations such as (i) the desired amount of battery without waiting time, (ii) the desired amount of battery with waiting time, and (iii) the limited amount of battery with waiting time. We also describe how to manage the time slots for scheduling the EVs which want to reserve charging.
Proposal of MDM Management Framework for BYOD use of Large Companies
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.123-128
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Result of the confirmation of the analytical data security assessment project of Samsung control items, large companies, learned that there is a difference in the level of implementing the management policy to the characteristics of the business of the department and affiliated companies. It is intended to provide a management framework of MDM [1] security solutions for the application of this information, to prevent the outflow of internal assets in BYOD [2]. Currently, research and functional evaluation of MDM security solutions is the major. However, when introducing the MDM solutions, research management framework to reflect the characteristics of the amplifier section of the department and affiliates in the large companies, considering the technical and policy is not presented, so far the hard way are. Therefore, management framework that can be with the data collected during the analysis of the questionnaire Samsung security management existing items, to understand the need for MDM security solutions for each department and affiliated companies, to make effective use of this I will try to offer.
HMM-Based Decision Model for Smart Home Environment
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.129-138
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The smart home environment typically includes various systems with high level of heterogeneity characteristics. Smart home environment are configured in such a way that it comfort driven as well as achieving optimized security and task-oriented without human intervention inside the home. Smart home environment contain diversified systems ranging from entertainment to automation like devices that is heterogeneous in nature. For the reason that of systems heterogeneity, it is frequently challenging to execute interoperation around them and realize desired services preferred by the home occupants. The interoperation complexity stands at the bottleneck in ensuring various tasks executed jointly among diversified systems in smart home environment. In this paper, we present a Hidden-Markov Model (HMM) based decision model for smart home environment by providing decision support ability. The implementation has been carried out in such a way that quality information is acquired among the systems to demonstrate the effectiveness of interoperability among them. This proposed decision model is tested and proven that there is an elevated amount of reliability on this decision model in the smart home setting.
Survey the Interactive Broadcast Management System in Smart Devices
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.139-144
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Smart spaces are dynamic environments for sharing information. People use phones to store and contact personal information and increasingly they have high-speed Internet connections. The smartphone has become a powerful computer in its own hands. In addition, smartphones are now being widely used in interactive broadcast systems. But this makes these attractive devices to challenges. The key challenges for smart spaces include security and interoperability between heterogeneous devices. To solve this problem, we survey these trends and propose the Interactive Broadcast Management System Architecture.
Algorithm to Differentiate Indoor MTC Devices
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.145-156
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Typical machine type communication (MTC) applications require the MTC devices to be located in enclosed spaces, such as the cars or basement. These indoor MTC devices would experience an additional 20 dB penetration loss on the radio interface with respect to normal LTE devices. To guarantee the coverage of these indoor MTC devices, it is necessary to differentiate them from normal LTE devices and adopt dedicated compensation mechanisms. In this paper, we develop a unified differentiating algorithm suitable for any fading channels which are characterized by the probability distribution functions of receiving envelopes. Taking Rayleigh fading channel as an example, we carry out the performance analysis of this algorithm. The influences of additional penetration loss and proportion of indoor MTC devices on the error rate of discrimination is given out. In addition, we also proposed a dedicated power compensation mechanism with TTI bundling for indoor MTC devices to evaluate the link performance of this algorithm. Numerical results show that the proposed algorithm works well under Rayleigh fading and has a good ability to adapt the fast fading environment with profound stability.
Vehicle Trajectory Discovery for Vehicular Wireless Networks
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.157-164
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper introduces vehicle trajectory discovery for vehicular wireless networks. Nowadays, GPS-based navigation systems are popular used for providing efficient driving paths for drivers, as well as it’s still a major challenge to process such information in order to explain moving object interactions, which could help in deriving trajectory patterns. To that end, we consider a vehicular wireless networks-based representation of trajectory data. This paper shows the inefficient elements during the route discovery in well-known reactive protocols such as ERS (Expanding Ring Search) Method.
Smart Surveillance Camera based on Pattern
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.165-174
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.175-186
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this thesis, A video information system uses IP camera, which transmits video information to HOST via Streaming Server or ftp server. But there’s problem that HOST cannot retrieve video information without video information transmitted from IP camera. So in this thesis, host-active application program is developed, which can retrieve video information from HOST with only IP camera’s IP address. By installing cloud server in the HOST, which smartphone can send videos to it regardless of network realms such as Wi-Fi, LTE or AP and transfer smartphone’s video information to cloud server anytime using wired or wireless networks. So by installing a Private Cloud server in HOST, which provides unrestricted environment where user can develop and launch application programs and sync smartphone to it. Smartphone’s video information is synced with Private Cloud ubiquitously using wired or wireless networks such as AP, LTE or WIFI and stored to Private Cloud so smartphone or IP Camera’s video information is always stored in Private Cloud server which can be used as evidence when there’s crime. Also employees can save materials of meeting which is saved to corporation’s Private Cloud server in real-time and enables remote monitoring for employee in office to cooperate with employee in remote locations.
A Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.187-196
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Fall detection is an important problem in the application research of wireless sensor. The paper presents wireless sensor architecture based human falling detection system especially for elderly people. The falling detection system is implemented using 3-axis acceleration sensor to measures and collects the elderly people activities acceleration and transfer data by zigbee-3G network to remote medical monitoring system platform, which makes a pre-processing method that suspected data is acquired based on one -class SVM classification algorithm. The algorithm analyzed different action which expended different threshold ranges of energy to judgment, and then analyzed the special temporal speed, displacement and angle as an auxiliary criterion for judgment. The experiments show that the application can offer a new guarantee for the elderly health.
The Path Search Be Applied Algorithm for Spread of Flame and Smoke in Fire Simulation
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.197-206
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Fire is one of the disasters that often occur in everyday life. There has been much research done to build a fire Simulator. In this paper, we propose a fire Simulator that is applied optimal path search algorithm to arrange the quick evacuation. This simulator considers the structure of a building and the location where the fire has initially occurred, applying it to the simulator. Especially when implementing the training simulation for firefighters, optimized evacuation path for the required virtual rescuer awaiting rescue was informed to implement more realistic firefighting training simulator. For the simulation for the test, fixed data was set to apply the shortest path search algorithm and flame smoke spread algorithm. As a result of the test, the optimized path was derived through avoiding the flame occurred from flame smoke spread algorithm and following the shortest path search algorithm.
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.207-216
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Focusing on the influence of various factors of cutter and work-piece in milling process, such as force, wear and vibration, using discrete method to compute the trajectory of each points, and get the coordinates values of discrete points on the cutting edge at any time. A new method has been proposed to obtain the dynamic response of discrete points by transforming deformation of those values into work-piece coordinate system. At the same time, a new policy of retention has been proposed to avoid inadequate statistics and large number of statistics. Retaining coordinates which can effectively influence the formation of surface topography, the prediction model of surface topography can be established with the consideration of force, wear and dynamic response on the ball-end mill. This prediction model of surface topography has been proved to be effective and practicable by an experiment.
The Conjugation Method of Augmented Reality in Museum Exhibition
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.217-228
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the age of digital convergence, examples of digital convergence are often witnessed in all aspects of society. Particularly worthy of note among them is the development of a technology called augmented reality (AR), which are aimed at pushing the limits of human experience. This has laid the foundation for new cultural conditions by manipulating the existing conditions of human experience. Especially, mobile is actively used as ubiquitous service that surpasses the limit of time and space. And it gives the people wanted information. Technologies like this are applied to exhibition at museums. AR technology has a wide range of applications, and can be effectively applied to museum exhibit environments, should the need arise for information on the uses and functions of artifacts, information on the restoration of damaged artifacts, the spatial characteristics of artifacts, or objects that require the modernization of artifacts. Utilizing AR technology via mobile applications can be implemented with no additional need for hardware and system. Augmented reality (AR) technology can provide a variety of solutions to help museums fulfill their role and goals..
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.229-240
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The previous development environments for smart phone contents are needed to generate specific target code depending on target devices or platforms, and each platform has its own developing language. Therefore, even if the same contents are to be used, it must be redeveloped depending on the target machine and a compiler for that specific machine is needed, making the contents development process very inefficient. The Smart Cross Platform was developed for executing contents written in various programming languages – C, C++, Java, and Objective-C – on iOS or Android based smart devices. The contents developed in each programming language are translated into intermediate language called SIL (Smart Intermediate Language) by the compiler. And, the translation results - intermediate programs are executed on the SVM (Smart Virtual Machine) – a core module of the Smart Cross Platform – without device dependency. Intermediate language based SVM has an advantage of execution on multiple target devices without considerations about device specific features, but it has also a problem which low performance by the software-based execution, consequently. Therefore, to improve the performance of SVM is very important issue. In this paper, we deal with two kinds of optimization technique to optimize stack based SVM which can execute on various smart devices. And, to improve performance of the SVM on execution engine aspect, we apply the one of these optimization techniques. For verification of this optimization technique, we profile and analyze performance of the original/optimized SVM. As a result of the experiments, the optimized SVM has 23~27% reduced execution times than the original SVM.
Design of the Smart Vessel Platform using the Remote Monitoring Technique
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.241-250
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The intention of a vessel platform is to control or monitor systems or sensors in the vessel control panel as well as provide diverse marine information. In this study a smart vessel platform design is shown which can be used to monitor the data of control systems and sensors in the vessel as well as provide diverse marine information. With it, the base which provides information on the vessel and service information is available. Also, it is expected that through use of this system marine accidents which might occur during navigation can be prevented, marine information can be provided and the safety and efficiency of the system can be enhanced.
Smart Parking Information System Exploiting Visible Light Communication
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.251-260
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we propose a smart parking information system exploiting visible light communication (VLC) technology to help drivers getting the real-time parking information as well as direction guide. By providing accurate information on available parking spaces, drivers save time and fuel and increase efficiency of the parking process. Therefore, the proposed system not only gives the illumination function of LED but also the function of communicating in the manner of application based on the VLC. The effectiveness of the proposed scheme is validated through experiments in an indoor environment.
Effect of Urbanization on Climate Change in Nanjing
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.261-268
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Research on Hydrostatic Thrust Bearing Worktable Job Status
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.269-278
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The idea of the hydrostatic thrust bearing pose control was presented to improve NC machine tool precision. The bearing worktable poses by controlled by coupling oil film thickness of 4 controllable chambers. The chamber flow can be regulated by variable pump. The flow of the variable pump was controlled by electro hydraulic servo valve according to the surface roughness, load, cutting force, and thermal effects of worktable. The mathematical models of the controllable chamber flow. The pose control model was established, which contains the kinematics positive and negative solution. The simulation experiment was carried out on the electro hydraulic servo test bench. The experiment results show that the model of hydrostatic thrust bearing pose is reasonable and control scheme is effective.
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.279-292
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The Smart Cross Platform is a virtual machine based solution that supports various programming languages and platforms, and its aims are to support programming languages like C++, Java and Objective-C and smart phone platforms such as Android and iOS. Various contents that developed by supported language on the Smart Cross Platform can be execute on Android and iOS platforms at no additional cost, because it has the platform independent characteristic by using SIL(Smart Intermediate Language) as an intermediate language. In this paper, we will introduce a Java compiler for the Smart Cross Platform to support Java contents. Proposed compiler translates given Java programs into stack based intermediate SIL codes to execute on the SVM(Smart Virtual Machine). Thus, existing JVM’s contents can be easily ported and executed on the Android or iOS with SVM.
Detecting Human Head and Shoulders Trajectory in a Smart Classroom
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.8 No.1 2014.01 pp.293-302
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.