Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Seman Oh is active.

Publication


Featured researches published by Seman Oh.


International Journal of Grid and Distributed Computing | 2018

Hybrid Deep Neural Network based Performance Estimation Method for Efficient Offloading on IoT-Cloud Environments

Yunsik Son; Seman Oh; YangSun Lee

The IoT-Cloud virtual machine system is a cloud-based execution solution for IoT devices with offloading techniques that delegate tasks requiring high computing power from low-performance IoT devices to a high-performance cloud environment as a service. The IoT devices with the IoT-Cloud virtual machine system can perform complex tasks using the computing power of high-performance cloud. The offloading technique can reduce the execution performance depending on the workload of the IoT devices and the clouds. Therefore, it is necessary to decide offloading execution considering the workload of the IoT devices and the clouds. In this paper, CPU utilization trend, which is one of the workload indices, is predicted through deep learning in order to decide offloading execution considering the workload of the IoT devices and clouds. In this paper, we present four CPU usage models and introduce a technique for predicting server load based on hybrid deep neural network. The predicted CPU utilization trend is indicative of future CPU utilization information and is therefore an indicator for offloading execution decisions. Through experiments, we confirmed that the proposed method estimates the load of the model very similar, and it can apply the offloading adaptively according to the load of the server.


Proceedings of the International Conference on Advances in Image Processing | 2017

The x86/64 Binary Code to Smart Intermediate Language Translation for Software Weakness

Junho Jeong; Yunsik Son; Seman Oh

Today, the proportion of software in society as a whole is steadily increasing. In addition to size of software increasing, the number of cases dealing with personal information is also increasing. This shows the importance of weekly software security verification. However, software security is very difficult in cases where libraries do not have source code. To solve this problem, it is necessary to develop a technique for checking existing binary security weaknesses. To this end, techniques for analyzing security weaknesses using intermediate languages are actively being discussed. In this paper, we propose a system that translate binary code to intermediate language to effectively analyze existing security weaknesses within binary code.


international conference on digital information management | 2010

Dynamic reconfigurable screen keyboard generation method using probe key test

Seokhoon Ko; Seman Oh

As touch-screen mobile phones pour into the market, demands for reusing existing mobile applications by adding a touch-screen UI are increasing. Up until this point, the method of defining a single screen keyboard and redirecting touch inputs to key inputs was used. However, this method diminishes the efficiency of touch-screens because a fixed-layout is applied to every application even though different keys are used for different UI states of an application. This study proposes a method that investigates the type of keys used in an application during run-time using the probe key and dynamically configures the layout of screen keyboards. Test results of the proposed method showed that an optimized touch-screen UI was generated every time the UI state of an application changed.


Journal of Korean Institute of Intelligent Systems | 2008

Recording Support System for Off-Line Conference using Face and Speaker Recognition

Yunsik Son; Jin-Woo Jung; Han-Mu Park; Seung-Chul Kye; Jong-Hyuk Yoon; Nak-Chun Jung; Seman Oh

Recent multimedia technology has supported various application services based on the development of effective movie compression and network techniques. On-line video conference system is a typical example that use theses two technologies effectively. On-line video conference system can be characterized into an effective conferencing method for long-distanced on-line conference members. But, unfortunately, off-line conference with face-to-face meeting is more frequent than on-line conference and their support systems have not been sufficiently considered. In this paper, we propose a recording support system for off-Line conference using face and speaker recognition. This system finds the speaker in the conference by using three microphones and three webcam cameras. And analysis is done with face region information that gathered by currently active webcam camera, and recognizes the identity of face. Finally, the system tracks speaker and records conference with extract speaker information.


한국멀티미디어학회 국제학술대회 | 2008

Construction of Enhanced Parser for Mobile Contents

Yunsik Son; Seman Oh


Archive | 2014

Design and Implementation of HTML5 based SVM for Integrating Runtime of Smart Devices and Web Environments

Yunsik Son; Seman Oh; YangSun Lee


Journal of Korea Multimedia Society | 2010

Design and Implementation of the GNEX C-to-Android Java Converter using a Source-Level Contents Translator

Yunsik Son; Seman Oh; Yangsun Lee


Archive | 2012

Design and Implementation of a Compiler with Secure Coding Rules for Secure Mobile Applications

Yunsik Son; Seman Oh


Archive | 2012

Design and Implementation of the Compiler with Secure Coding Rules for Developing Secure Mobile Applications in Memory Usages

Yunsik Son; Yangsun Lee; Seman Oh


Journal of KIISE:Computing Practices and Letters | 2009

Automatic Generation Technique of Touch-Screen Interface for Mobile Game Contents

Seokhoon Ko; Yunsik Son; Ji-Woo Park; Seman Oh

Collaboration


Dive into the Seman Oh's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge