Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Information Hiding Method Using CDMA on Wave Files

    Although many information hiding paradigm provides many advantages for protect important information, we try to introduce new method in concealing thing. One of these is Steganography Many efforts have been ma...

    Young-Shil Kim, Sang Yun Park, Suk-Hee Wang in Applied Parallel Computing. State of the A… (2006)

  2. No Access

    Chapter and Conference Paper

    A Secure Migration Mechanism of Mobile Agents Under Mobile Agent Environments

    Although mobile agent paradigm provides many advantages for distributed computing, several security issues of the mobile agent paradigm remain as the most import difficulty that should be solved to increase it...

    Dongwon Jeong, Young-Gab Kim, Young-Shil Kim in Applied Parallel Computing. State of the A… (2006)

  3. No Access

    Chapter and Conference Paper

    An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks

    We present a new efficient pointer protection method to defend buffer overflow attacks. It uses a simple watermark to protect the pointer: during dereferencing the pointer variable, a watermark is also written...

    Yongsu Park, Yookun Cho in Applied Parallel Computing. State of the A… (2006)

  4. No Access

    Chapter and Conference Paper

    Robust TSK Fuzzy Modeling Approach Using Noise Clustering Concept for Function Approximation

    This paper proposes the algorithm that additional term is added to an objective function of noise clustering algorithm to define fuzzy subspaces in a fuzzy regression manner to identify fuzzy subspaces and par...

    Kyoungjung Kim, Kyu Min Kyung, Chang-Woo Park in Computational and Information Science (2005)

  5. No Access

    Chapter and Conference Paper

    Deterministic Annealing EM and Its Application in Natural Image Segmentation

    In this paper, we present a color image segmentation algorithm based on a finite mixture model and examine its application to natural scene segmentation. Gaussian mixture model (GMM) is first adopted to repres...

    Jonghyun Park, Wanhyun Cho, Soonyoung Park in Computational and Information Science (2005)

  6. No Access

    Chapter and Conference Paper

    Two Fluids Formation in the Normal State of High-TC Superconductor

    Thermoelectric power (TEP) of high-TC superconductors has been investigated in a wide range of temperature (TC < T < 700 K) for La2−xSrxCuO4. For wide do** level from underdo** to heavily overdo**, TEP foll...

    J. S. Kim, Y. W. Park in New Challenges in Superconductivity: Exper… (2005)

  7. No Access

    Chapter and Conference Paper

    Computerized Detection of Liver Cirrhosis Using Wave Pattern of Spleen in Abdominal CT Images

    We examined the wave pattern of the spleen by using abdominal CT images of a patient with liver cirrhosis, and found that they are different from those of a person with a normal liver. This paper suggests a me...

    Won Seong, June-Sik Cho, Seung-Moo Noh in Computational and Information Science (2005)

  8. No Access

    Chapter and Conference Paper

    A Distributed Locking Protocol

    Concurrent accesses to a file frequently occur in a distributed computing environment where a few number of network-attached servers are designated as a data storage pool and the clients are physically connect...

    Jaechun No, Sung Soon Park in Computational and Information Science (2005)

  9. No Access

    Chapter and Conference Paper

    Microcalcifications Detection in Digital Mammogram Using Morphological Bandpass Filters

    Microcalcifications in digital mammogram images can be an early sign of breast cancer. It is very challenging, however, to detect all microcalcifications since they appear as slightly brighter spots than their...

    Ju Cheng Yang, ** Wook Shin, Gab Seok Yang in Computational and Information Science (2005)

  10. No Access

    Chapter and Conference Paper

    Determining Optimal Decision Model for Support Vector Machine by Genetic Algorithm

    The problem of determining optimal decision model is a difficult combinatorial task in the fields of pattern classification and machine learning. In this paper, we propose a new method to find the optimal deci...

    Syng-Yup Ohn, Ha-Nam Nguyen, Dong Seong Kim in Computational and Information Science (2005)

  11. No Access

    Chapter and Conference Paper

    Automatic Segmentation Technique Without User Modification for 3D Visualization in Medical Images

    It is necessary to analyze an image from CT or MR and then to segment an image of a certain organ from that of other tissues for 3D (Three-Dimensional) visualization. There are many ways for segmentation, but ...

    Won Seong, Eui-Jeong Kim, Jong-Won Park in Computational and Information Science (2005)

  12. No Access

    Chapter and Conference Paper

    Networked Control System Design Accounting for Delay Information

    In this paper a networked control system (NCS) design problem is discussed where a single digital controller and multiple plants interconnected by a common computer network with transfer time delays. The netwo...

    Byung-In Park, Oh-Kyu Kwon in Computational and Information Science (2005)

  13. No Access

    Chapter and Conference Paper

    PASL: Prediction of the Alpha-Helix Transmembrane by Pruning the Subcellular Location

    We have developed a software tool, called PASL, which predicts the transmembrane region and its topology by pruning the subcellular location. The main virtues of PASL are that it discriminates the integral protei...

    Young Joo Seol, Hyun Suk Park, Seong-Joon Yoo in Computational and Information Science (2005)

  14. No Access

    Chapter and Conference Paper

    A Novel Noise Modeling for Object Detection Using Uncalibrated Difference Image

    In order to extract the region of an object from an image, the difference image method is attractive since it is computationally inexpensive. However, the difference image is not frequently used due to the noi...

    Joungwook Park, Kwan H. Lee in Computational and Information Science (2005)

  15. No Access

    Chapter and Conference Paper

    Use of Simulation Technology for Prediction of Radiation Dose in Nuclear Power Plant

    In this study, a simulation program based on virtual environment concerning radiation work at nuclear power plants was developed. VRML and Java Applet were used to develop this simulation program. Radiation ex...

    Yoon Hyuk Kim, Won Man Park in Computational and Information Science (2005)

  16. No Access

    Chapter and Conference Paper

    Biosynthesis of Poly(3-hydroxybutyrate-co-3-hydroxyalkanoates) by Metabolically Engineered Escherichia coli Strains

    Biosynthesis of polyhydroxyalkanoates (PHAs) consisting of 3-hydroxyalkanoates (3HAs) of 4 to 10 carbon atoms was examined in metabolically engineered Escherichia coli strains. When the fadA and / or fadB mutant ...

    Si Jae Park, Sang Yup Lee in Proceedings of the Twenty-Fifth Symposium … (2004)

  17. No Access

    Chapter and Conference Paper

    Effects of Inoculum Conditions on Growth of Hairy Roots of Panax ginseng C.A. Meyer

    Plants have a potential to produce a large number of important metabolites such as pharmaceuticals, food additives, pigments, flavors, fragrances, and fine chemicals. Large-scale plant cell and tissue cultures...

    Gwi-Taek Jeong, Don-Hee Park, Hwa-Won Ryu in Proceedings of the Twenty-Fifth Symposium … (2004)

  18. No Access

    Chapter and Conference Paper

    Production of Biodiesel Fuel by Transesterification of Rapeseed Oil

    Fatty acid methyl esters (FAMEs) show large potential applications as diesel substitutes, also known as biodiesel fuel. Biodiesel fuel as renewable energy is an alternative that can reduce energy dependence on...

    Gwi-Taek Jeong, Don-Hee Park in Proceedings of the Twenty-Fifth Symposium … (2004)

  19. No Access

    Chapter and Conference Paper

    Biosynthesis of (R)-3-Hydroxyalkanoic Acids by Metabolically Engineered Escherichia coli

    An efficient system for the production of (R)-hydroxyalkanoic acids (RHAs) was developed in natural polyhydroxyalkanoate (PHA)-producing bacteria and recombinant Escherichia coli. Acidic alcoholysis of purified P...

    Si Jae Park, Sang Yup Lee, Young Lee in Proceedings of the Twenty-Fifth Symposium … (2004)

  20. No Access

    Chapter and Conference Paper

    The Implementation of 256 QAM CDMA Modulator

    We implemented 256 Quadrature Amplitude Modulation (QAM) Code Division Multiple Access (CDMA) modulator with Field Programmable Gate Array (FPGA). In this paper, we describe the implemented modulator specifica...

    Joon Woo Shin, Hyeong Jun Park, Dae Soon Cho in High-Speed Networks and Multimedia Communi… (2003)

previous disabled Page of 3