Young-Bin Kwon's research while affiliated with Chung-Ang University and other places

Publications (39)

Article
Full-text available
Federated learning-enabled edge devices train global models by sharing them while avoiding local data sharing. In federated learning, the sharing of models through communication between several clients and central servers results in various problems such as a high latency and network congestion. Moreover, battery consumption problems caused by loca...
Article
Full-text available
Recently, the emergence of fog computing and big internet of things (IoT) data have been considered as the main representatives identifying fifth‐generation mobile networks. In fifth generation, cloudization is extended from the core to the access tiers, referred to as fog radio access networks. Fog radio access networks provide ultralow latency of...
Article
Full-text available
We investigate a robust sequential estimation algorithm of particle filters, which combine multiple features of visual objects, in order to obtain reliable evidential information from independent sources of sensor data. Most of particle filter algorithms are based on conditional density propagation in Bayesian inference rules. In this paper, it is...
Article
Full-text available
Remote data checking (RDC) is a scheme that allows clients to efficiently check the integrity of data stored at an untrusted server using spot-checking. Efforts have been consistently devoted toward improving the efficiency of such RDC schemes because they involve some overhead. In this letter, it is assumed that a probabilistic attack model is ado...
Article
An extracting method of research trend in the field of a computer network which contained in the published papers of related conferences is presented. A topic is defined as a subset of vocabulary and the interest of the topic is represented as 'saliency'. The saliency, the degree of topic interest is measured as a product of joint distributions of...
Article
Full-text available
A new exemplar-based inpainting method which effectively preserves global structures and textures in the restored region driven by feature vectors is presented. Exemplars that belong to the source region are segmented based on their features. To express characteristics of exemplars such as shapes of structures and smoothness of textures, the Harris...
Article
The Impact Factor evaluated of ISI is exploited as a standard to evaluate the level of academic journals including multimedia journals. However, the service for the impact factors is mainly designed for English-based journals only. A reference index system and database, ‘Science Citation Index Processing System: SCIPS’ has been developed for refere...
Book
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Graphics Recognition (GREC 2011), held in Seoul, Korea, September 15-16, 2011. The 25 revised full papers presented were carefully selected from numerous submissions. Graphics recognition is a subfield of document image analysis that deals...
Article
Integrating approaches in a unified system for the online and offline data type are seldom found, although the similar recognition alogirhtms are used for the two data stream. A practical solution which is able to represent online and offline hand drawn graphic messages simultaneously is presented. Freehand-sketched graphics captured by a digitizin...
Article
It is difficult to generate significant results when evaluating algorithms developed in biometrics. Additionally, when third parties, such as system integrators, want to compare results among different algorithm providers, they cannot do so easily for several reasons: difficulty accessing large databases, inability to exchange biometric data among...
Article
Full-text available
We have been provided with a plenty of information about IT through the conferences. However, it is hard to find enough information or the latest trends from conferences because there are too many conferences. In this situation, we analyzed the latest trends related to the field of IT by exploiting the Netminer which is one of the software for anal...
Conference Paper
A contents based scoring model for clothes matching is represented. The major color sets for upper and lower clothes are extracted using color grouping and clustering after discarding background. The all possible combinations between two color sets are considered to measure the overall color harmony. The regions in which printed patterns on the clo...
Conference Paper
Full-text available
We present here a report on a new performance evaluation system for biometric systems, which is secure, automatic and remote. This system will provide developers in biometrics to progress in their works, avoiding problems with data protection policies related to testing, but without compromising the privacy of testing subjects. Biometric testing ne...
Article
In this paper, a method for automatic indexing of contents to reduce effort for inputting paper information and constructing index is considered. Existing document analysis methods can`t analyse various table of contents of journal paper formats efficiently because they have many exceptions. In this paper, various contents formats for journals, whi...
Conference Paper
A software architecture style for OCR to increase portability is presented. A hybrid style of four layers, combined with a pipe & filter and layer-type architecture is adopted to reduce the platform dependency keeping the cascading process stream of general OCR. The OCR process constructs a top layer to accomplish the main task. Data manager is sep...
Conference Paper
In this paper, we design the primary component, an automated segmentation method that extracts article titles, author names and page numbers from scanned image of a journal's table of contents. We expanded the method to five types of journal layout. An interactive tool was also developed with Visual C++ to help the user manage the segmentation resu...
Conference Paper
This paper proposes a method for character region extraction and picture separation in a passport by adopting a preprocessing phase for the passport recognition system. Character regions required for the recognition make black pixel and remainder of the passport regions makes white pixel in the detected character spaces. This method uses the MRZ su...
Chapter
Glutathione S-transferase are a family of Phase II detoxification enzymes that catalyse the conjugation of glutathione to a wide variety of xenobiotics. To gain further insight into the relationship between structure and function of glutathione S-transferase, the four cystein mutants and the three Tyr108 mutants of hGSTP1-1 were expressed in E. col...
Chapter
Telomerase is a specialized RNA-directed DNA polymerase that extends telomeres of eukaryotic chromosomes in most human cancer. To date, little is known about how telomerase is activated and controlled in cancer, although activation is thought to be involved in cancer cell immortalization. Telomerase is composed of two main subunits, the rate-limiti...
Article
This paper proposes on character region extraction method and picture separation in passport by preprocessing phase for passport recognition system. Character regions that need in recognition make black pixel and remainder of the passport regions makes white pixel in the detected character spaces. This method uses MRZ sub-region in order to automat...
Conference Paper
This paper proposes a character region extraction method and picture separation used for passports by adopting a preprocessing phase for passport recognition system. Character regions required in recognition make black pixel and remainder of the passport regions make white pixel in the detected character spaces. This method uses MRZ sub-region in o...
Conference Paper
In this paper, a method for automatically indexing the contents to reduce the effort that used to be required for input paper information and constructing index is sought. Various contents formats for journals, which have different features from those for general documents, are described. The principal elements that we want to represent are titles,...
Article
Recently the biometric recognition technology is intensively studied and the standardization of the technology has been highly demanded for its commercialization. Currently many blometric recognition products are being developed based on the BioAPl(Biometric Application Program-ming Interface) specification. However, the reliable testing tools (or...
Conference Paper
This paper deals with the quality of the image itself as well as the algorithm used for evaluating the quality of the fingerprints to construct an effective algorithm for evaluating the quality of the fingerprints. The quality of the fingerprint is acquired by taking the regional quality of each fingerprint image. The regional quality is acquired b...
Conference Paper
A practical solution to represent simple hand drawing graphic messages is presented. A freehand-sketch message captured by a digitizing tablet is approximated using the quadratic Bezier curve representation and generated curve control points are adjusted to reduce the dynamic range of the first order difference. The control point data is compressed...
Conference Paper
This work deals with the quality of the image itself as well as the algorithm used for evaluating the quality of the fingerprints to construct an effective algorithm for evaluating the quality of the fingerprints. The quality of the fingerprint is acquired by taking the regional quality of each fingerprint image. The amount of fingerprint varies ac...
Article
This paper deals with plain figures on the architectural drawings of apartment. This kind of architectural drawings consist of main walls represented by two parallel bold lines, symbols (door, window, \cdots), dimension line, extension line, and dimensions represent various numerical values and characters. This paper suggests a method for recognizi...
Conference Paper
This paper deals with plain figures on the architectural drawings of apartment. This kind of architectural drawings consist of main walls represented by two parallel bold lines, symbols(door, window, tile...), dimension line, extension line, and dimensions represent various numerical values and characters. This paper suggests a method for recognizi...
Conference Paper
Hangul is clustered into six different types in general. Type clustering has an effect of coarse classification in syllable matching and becomes the pre-processing stage for the segmentation in the grapheme matching process. We define a set of grapheme regions of preconsonants, vowel and post-consonant, that can absorb the change of the character's...
Book
This book presents refereed and revised papers presented at GREC 2001, the 4th IAPR International Workshop on Graphics Recognition, which took place in Kingston, Ontario, Canada in September 2001. Graphics recognition is a branch of document image analysis that focuses on the recognition of two-dimensional notations such as engineering drawings, ma...
Conference Paper
In this paper, vectorization is achieved by the recognition of architectural drawing images. To obtain vector components, an architectural drawing recognizer (ADR) is developed. The ADR recognizes line components such as main wall, dimension line and points that indicate the dimension of scanned architectural drawing images. A merging process from...
Conference Paper
In this paper, an automatic method for the detection of houses which represented black points on the large size scanned topographic map is described. Various signals such as characters, lines, signs, and dashed lines may overlapped with the house symbol. After contour detection method is used for detecting isolated houses. Run-length encoding metho...
Conference Paper
The off-line handwritten characters recorded on prescribed form documents may be overwritten by the lines of the form documents. Overwritten characters should be isolated in order to be recognized more effectively. However, removal of the lines causes breaks in the overwritten characters. Consequently, a character restoration process is necessary....
Conference Paper
In this paper, we propose an information extraction method which can restore the handwritten character information from prescribed and skewed form documents. The proposed method include the following aspects: boundary and successive internal line dectection, accurate skew angle measurement, line removal and broken character restoration using morpho...
Conference Paper
This paper introduces the methods for business forms proessing in Korea. Recognizing the forms of credit card sales slips, bank deposit slips, and insurance application forms will be introduced. This paper is divided into two parts. The first part in section 2 focuses on the forms processing by discussing the issues of form identification, recognit...
Conference Paper
We propose a character recognition method based on the sampling and quantization of unwrapped contour information. The character contour includes many different features. Numerous approaches are explored to find essential features which are extracted directly from the contour. Our idea is to decompose the multi-dimensional features of a contour int...
Conference Paper
In this paper, we describe an automatic region labeling method, which identifies each region and recognizes region names. Before tracing the region boundaries, it extracts the region names which consist of characters, dots, dashes, and indication lines. It uses two recognition methods to recognize characters in the region name. In the case of recog...

Citations

... Wang et al. [65] used a hierarchical aggregation of the clients' updates by adding intermediate servers to overcome the communication overload with the server. Moreover, Jeon et al. [66] and Zaw et al. [67] proposed a cloud-edgeclient scheme wherein the clients offload some or all the training tasks to the edge servers, which get portions of the clients' data for the training. This technique has some limitations in terms of communication overhead and client data privacy issues, but it may be useful in particular application-specific cases. ...
... In fog radio access networks, for upstream IoT offloading Vu et al. [117] proposed a joint energy and latency optimization (JELO) strategy. This strategy developed the optimal task assignment challenge to balance the energy consumption. ...
... Hence, fashion retailers and researchers are exploring and developing state-of-the-art recommendation models to improve the accessibility, navigability and consumers' overall purchasing experience. One of the prime elements that has been continuously researched in these articles was the improvement of existing and the development of new algorithms relevant to the filtering techniques [4,15,33,[39][40][41][42][43][44][45][46][47][48][49][50][51]. This review paper has identified state-of-the art algorithms and filtering techniques that have high potential to become more popular in the future. ...
... Park suggested a method for recognizing main walls based on extension line [9]. Zhu had provided a detailed review on techniques which were used to convert 2D floor plans into 3D buildings. ...
... Srivastava et al. [6] developed a new approach for Arabic news classification using statistical Maximum Entropy function. In [7], the authors proposed a method for topic clustering using multiword term extraction. This method is able to extract the candidate terminology of multi-word Arabic texts. ...
... Additional information about improving its precision is presented in paper [12]. Examples of application for OCR in multimedia databases are: -spelling correction system in scientific databases [19]; -recognition of characters in Chinese calligraphy [20]; -text extraction from video databases [36]; -preservation and processing of cultural heritage in digital humanities [28,34]; -management of medical texts [13]. ...
... Eventually, which is most similar to s in the set of candidates is selected as a target. The OSCE algorithm exploits the cosine similarity (Kwon et al., 2012) when it compares a source with the candidates of the target. The cosine similarity measures a similarity between two arrays in terms of the cosine angle between them. ...
... Related research All womenswear ( Liu et al., 2012a, Masuko and Hayashi, 2013, Dai, 2015, Lin, 2007b, Iwata et al., 2011, Akabane et al., 2011, Lin, 2007a, Jagadeesh et al., 2014, Vuruskan et al., 2015, Dong et al., 2013, Liu et al., 2012b, Tsujita et al., 2010, Cheng and Liu, 2008, Yu-Chu et al., 2012, Tu and Dong, 2010, Sekozawa et al., 2011, Tokumaru et al., 2003) All menswear ( Kim, 2009, Nagao et al., 2008, Shen et al., 2007, Kim et al., 2013) Womenswear and Menswear ( Miura et al., 2013, Dai, 2011, Kalantidis et al., 2013, Limaksornkul et al., 2014, Yamada and Takami, 2012, Zhang et al., 2008, Vogiatzis et al., 2012) Men's suit ( Hong Lu, 2013, Zeng et al., 2013) Women's Jacket ( Li and Li, 2012, Jung et al., 2013, Wang et al., 2008) ...
... The image quality of the iris is approached by different authors in different ways and perspectives (HOFBAUER et al. 2012;KALKA et al. 2006;LI et al. 2011;MAKINANA et al. 2014;REILLO et al. 2012). In turn, the ISO/IEC 29794-6: 2015 standard presents a set of metrics related to the image quality of the iris that must be considered when capturing or processing these images: ...
... One of the common procedures in recognizing the visa imitation is based on the Machine Lucid Zone (MRZ) is portrayed in [23]. MRZ is exceptionally basic in visa ISSN: 2347-8578 www.ijcstjournal.org ...