1 |
K. W. Koh. (2020). Physical activity guideline for social distancing during COVID-19. Korean Journal of Health Education and Promotion, 37(1), 109-112. DOI : 10.14367/kjhep.2020.37.1.109
DOI
|
2 |
H. Ko, S. Kim & N. Kang. (2017). Design and implementation of smart-mirror supporting recommendation service based on personal usage data. KIISE transactions on computing practices, 23(1), 65-73. DOI : 10.5626/KTCP.2017.23.1.65
DOI
|
3 |
S. W. Lee, D. M. Ji, H. S. Shin, Y. B. Chae & Y. G. Kim. (2018). A Personalised Smart Mirror Based on Face Recognition. Proc. of Korea Information Science Society, 1644-1646.
|
4 |
Y. C. Hwang, H. J. Mun & J. W. Lee. (2015). Face Recognition System Technologies for Authentication System-A Survey. Journal of Convergence for Information Technology, 5(3), 9-13. DOI : 10.22156/CS4SMB.2015.5.3.009.
DOI
|
5 |
D. H. Kim & S. J. Lee. (2013). Design of Multi-Purpose Preprocessor for Keyword Spotting and Continuous Language Support in Korean. Journal of Digital Convergence, 11(1), 225-236. DOI : 10.14400/JDPM.2013.11.1.225
DOI
|
6 |
H. J Mun. (2019). A Study on the User Identification and Authentication in the Smart Mirror in Private. Journal of Convergence for Information Technology, 9(7), 100-105. DOI : 10.22156/CS4SMB.2019.9.7.100
DOI
|
7 |
S. K. Kwon, H. S. Han & J. H. Eom. (2012). A Study on The Operation Scheme of Layered Access Control for Effective Visitors's Access Control. Journal of Security Engineering, 9(3), 231-240.
|
8 |
Raspberry Pi 4 Model B, Raspberry Pi 4 on sale now from $35. https://www.raspberrypi.org/blog/raspberrypi-4-on-sale-now-from-35/
|
9 |
P. Y. Kumbhar, A. Mulla, P. Kanagi & R. Shah. (2018). Smart Mirror Using Raspberry PI. International Journal for Research in Emerging Science and Technology, 5(4), 2349-2610.
|
10 |
Raspbian. Welcome to Raspbian, https://www.raspbian.org/
|
11 |
W. Harrington. (2015). Learning Raspbian. Packt Publishing Ltd.
|
12 |
T. Kimura, T. Nose, S. Hirooka, Y. Chiba & A. Ito. (2018, November). Comparison of Speech Recognition Performance Between Kaldi and Google Cloud Speech API. In International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 109-115). Springer, Cham.
|
13 |
C. J. Chae, H. J. Cho & H. M. Jung. (2018). Authentication Method using Multiple Biometric Information in FIDO Environment. Journal of Digital Convergence, 16(1), 159-164. DOI : 10.14400/JDC.2018.16.1.159
DOI
|
14 |
S. J. Bu & S. B. Cho. (2018). Speaker Identification Method based on Convolutional Neural Network with STFT Sound-Map. KIISE Transactions on Computing Practices, 24(6), 289-294.
DOI
|
15 |
N. H. Kim & J. Y. Choi. (2019). A study on user authentication method using speaker authentication mechanism in login process. Korean Institute of Smart Media, 8(3), 23-30. DOI : 10.30693/smj.2019.8.3.23
DOI
|
16 |
S. V. Viraktamath, M. Katti, A. Khatawkar & P. Kulkarni. (2013). Face detection and tracking using OpenCV. The SIJ Transactions on Computer Networks & Communication Engineering (CNCE), 1(3), 45-50.
|
17 |
J. Shin, Z. Liu, C. M. Kim & H. J. Mun. (2018). Writer identification using intra-stroke and inter-stroke information for security enhancements in P2P systems. Peer-to-Peer Networking and Applications, 11(6), 1166-1175. DOI : 10.1007/s12083-017-0606-0
DOI
|