[1] Design of UAV and Smart Buoy for Edge Computing based Border Intrusion Detection Systems
[엣지 컴퓨팅 기반 국경 침입 감지 시스템을 위한 UAV 및 스마트 부표 설계]
[1] Design of UAV and Smart Buoy for Edge Computing based Border Intrusion Detection Systems
[엣지 컴퓨팅 기반 국경 침입 감지 시스템을 위한 UAV 및 스마트 부표 설계]
- submit to KICS.
[1] Design of UAV and Smart Buoy for Edge Computing based Border Intrusion Detection Systems
[엣지 컴퓨팅 기반 국경 침입 감지 시스템을 위한 UAV 및 스마트 부표 설계]
- Preregistration to KICS.
- Preparation for presentation.
E-WAMS (Edge Computing-Based Wild Animals Monitoring System)
- Find the device for encryption developed by Korecen company
- Think about what can we do with that device.
- Search about how to use Device for Encryption.
- and how apply that method to our project.
- Preparation for presentation for KICS.
- Study and Preparation for presentation for Seminar.
Try to submit a international conference