Seman Oh
Dongguk University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Seman Oh.
International Journal of Grid and Distributed Computing | 2018
Yunsik Son; Seman Oh; YangSun Lee
The IoT-Cloud virtual machine system is a cloud-based execution solution for IoT devices with offloading techniques that delegate tasks requiring high computing power from low-performance IoT devices to a high-performance cloud environment as a service. The IoT devices with the IoT-Cloud virtual machine system can perform complex tasks using the computing power of high-performance cloud. The offloading technique can reduce the execution performance depending on the workload of the IoT devices and the clouds. Therefore, it is necessary to decide offloading execution considering the workload of the IoT devices and the clouds. In this paper, CPU utilization trend, which is one of the workload indices, is predicted through deep learning in order to decide offloading execution considering the workload of the IoT devices and clouds. In this paper, we present four CPU usage models and introduce a technique for predicting server load based on hybrid deep neural network. The predicted CPU utilization trend is indicative of future CPU utilization information and is therefore an indicator for offloading execution decisions. Through experiments, we confirmed that the proposed method estimates the load of the model very similar, and it can apply the offloading adaptively according to the load of the server.
Proceedings of the International Conference on Advances in Image Processing | 2017
Junho Jeong; Yunsik Son; Seman Oh
Today, the proportion of software in society as a whole is steadily increasing. In addition to size of software increasing, the number of cases dealing with personal information is also increasing. This shows the importance of weekly software security verification. However, software security is very difficult in cases where libraries do not have source code. To solve this problem, it is necessary to develop a technique for checking existing binary security weaknesses. To this end, techniques for analyzing security weaknesses using intermediate languages are actively being discussed. In this paper, we propose a system that translate binary code to intermediate language to effectively analyze existing security weaknesses within binary code.
international conference on digital information management | 2010
Seokhoon Ko; Seman Oh
As touch-screen mobile phones pour into the market, demands for reusing existing mobile applications by adding a touch-screen UI are increasing. Up until this point, the method of defining a single screen keyboard and redirecting touch inputs to key inputs was used. However, this method diminishes the efficiency of touch-screens because a fixed-layout is applied to every application even though different keys are used for different UI states of an application. This study proposes a method that investigates the type of keys used in an application during run-time using the probe key and dynamically configures the layout of screen keyboards. Test results of the proposed method showed that an optimized touch-screen UI was generated every time the UI state of an application changed.
Journal of Korean Institute of Intelligent Systems | 2008
Yunsik Son; Jin-Woo Jung; Han-Mu Park; Seung-Chul Kye; Jong-Hyuk Yoon; Nak-Chun Jung; Seman Oh
Recent multimedia technology has supported various application services based on the development of effective movie compression and network techniques. On-line video conference system is a typical example that use theses two technologies effectively. On-line video conference system can be characterized into an effective conferencing method for long-distanced on-line conference members. But, unfortunately, off-line conference with face-to-face meeting is more frequent than on-line conference and their support systems have not been sufficiently considered. In this paper, we propose a recording support system for off-Line conference using face and speaker recognition. This system finds the speaker in the conference by using three microphones and three webcam cameras. And analysis is done with face region information that gathered by currently active webcam camera, and recognizes the identity of face. Finally, the system tracks speaker and records conference with extract speaker information.
한국멀티미디어학회 국제학술대회 | 2008
Yunsik Son; Seman Oh
Archive | 2014
Yunsik Son; Seman Oh; YangSun Lee
Journal of Korea Multimedia Society | 2010
Yunsik Son; Seman Oh; Yangsun Lee
Archive | 2012
Yunsik Son; Seman Oh
Archive | 2012
Yunsik Son; Yangsun Lee; Seman Oh
Journal of KIISE:Computing Practices and Letters | 2009
Seokhoon Ko; Yunsik Son; Ji-Woo Park; Seman Oh