Sciweavers

FGCN
2008
IEEE
131views Communications» more  FGCN 2008»
14 years 6 months ago
Object Tracking of Mobile Robot Using Moving Color and Shape Information for the Aged Walking
A mobile robot with various types of sensors via ubiquitous networks is introduced. We designed a mobile robot composed of TCP/IP network, wireless camera and several sensors in a...
Sanghoon Kim, Sangmu Lee, Seungjong Kim
FGCN
2008
IEEE
130views Communications» more  FGCN 2008»
14 years 6 months ago
Word Sense Disambiguation Based on Bayes Model and Information Gain
Word sense disambiguation has always been a key problem in Natural Language Processing. In the paper, we use the method of Information Gain to calculate the weight of different po...
Zhengtao Yu, Bin Deng, Bo Hou, Lu Han, Jianyi Guo
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
14 years 6 months ago
Environment Recognition Based on Human Actions Using Probability Networks
To realize context aware applications for smart home environments, it is necessary to recognize function or usage of objects as well as categories of them. On conventional researc...
Hiroshi Miki, Atsuhiro Kojima, Koichi Kise
FGCN
2008
IEEE
161views Communications» more  FGCN 2008»
14 years 6 months ago
The Development of Software Pricing Schemata and Its Application to Software Industry in Korea
The purpose of this this research is to suggest comprehensive pricing schemata that software developers can use in the integrated state of software uses. To do so, we have reviewe...
Youngsik Kwak, Yunkyung Lee, Yoonsik Kwak
FGCN
2008
IEEE
143views Communications» more  FGCN 2008»
14 years 6 months ago
The Study of Location Strategy for Bank
In this paper, authors attempt to shed light on the factors that influence the locations of bank branches in establishing a bank’s branch network from the angle of the network a...
Jae Weon Hong, Won Eui Hong, Yoon-Sik Kwak
FGCN
2008
IEEE
173views Communications» more  FGCN 2008»
14 years 6 months ago
Performance Analysis of Hybrid Fingerprint Matching Methods
The fingerprint verification methods include minutiae-based and image-based methods. The minutiae-based method has been frequently used, but it has limitations in performance. Thes...
Jong Ku Kim, Seung-Hoon Chae, Sung Jin Lim, Sung B...
FGCN
2008
IEEE
199views Communications» more  FGCN 2008»
14 years 6 months ago
A Context-Sensitive Rule-Based Architecture for a Smart Building Environment
In a smart building environment nomadic users can benefit from specialised contextsensitive services. These can increase productivity and offer an improved lifestyle for users. Th...
John Herbert, John O'Donoghue, Xiang Chen
FGCN
2008
IEEE
153views Communications» more  FGCN 2008»
14 years 6 months ago
Experimental Study on Neuronal Spike Sorting Methods
When recording extracellular neural activity, it is often necessary to distinguish action potentials arising from distinct cells near the electrode tip, a process commonly referre...
Jianhua Dai, Xiaochun Liu, Yu Yi, Huaijian Zhang, ...
FGCN
2008
IEEE
104views Communications» more  FGCN 2008»
14 years 6 months ago
A Practical Dynamic Frequency Scaling Scheduling Algorithm for General Purpose Embedded Operating System
Dynamic frequency scaling (DFS) techniques for real-time embedded systems have been widely studied. However, most of the scheduling algorithms so far concern only special purpose ...
Tianzhou Chen, Jiangwei Huang, Liangxiang Xiang, Z...
FGCN
2008
IEEE
111views Communications» more  FGCN 2008»
14 years 6 months ago
Towards an Estimation of the Accuracy of TCP Reassembly in Network Forensics
Today, honeypot operators are strongly relying on network analysis tools to examine network traces collected in their honeynet environment. The accuracy of such analysis depends o...
Gérard Wagener, Alexandre Dulaunoy, Thomas ...