
Jo Nam Jung- Inha University
Jo Nam Jung
- Inha University
About
6
Publications
178
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2
Citations
Current institution
Publications
Publications (6)
Ubiquitous Computing is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous Computing. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the information revolution that Cy...
In current video-conferencing systems. user's face movements are restricted by fixed camera, therefore it is inconvenient to users. To solve this problem, tracking of face movements is needed. Tracking using whole face needs much computing time and whole face is difficult to define as an one feature. Thus, using several feature points in face is mo...
It is said that the UC(Ubiquitous Computing) Environment will be come by the technological revolution in the future. This
paper firstly points out the problem that engineer thinks that Ubiquitous computing connected to network have become more
complexes and distributed, but most system-related research is still focused on the ’performance’ or ’effi...
Face recognition system needs the method of locating facial components like eyes, mouth, etc, for extracting features used
in recognition process. In this paper we propose a method of locating eyes using context-aware binarization. The proposed
method consists of binarization, connected region segmentation, eye candidate area extraction by heuristi...
In this paper we propose a method of locating face and eyes using context-aware binarization. Face detection obtains the face
region using neural network and mosaic image representation. Eye location extracts the location of eyes from the detected
face region. The proposed method is composed of binarization, connected region segmentation by labelin...
Recently many company has been cracked by crackers information security and everyday new computer virus come out. so e-trade partners should prevent the disasters. A few studies researched e-trade securities broadly but the new trend in information security division especially focused on electronic payment, EDI, Transportation, Contracts, Insurance...