Skip to main content

and
  1. Article

    Open Access

    Toward explainable heat load patterns prediction for district heating

    Heat networks play a vital role in the energy sector by offering thermal energy to residents in certain countries. Effective management and optimization of heat networks require a deep understanding of users' ...

    L. Minh Dang, Jihye Shin, Yanfen Li, Lilia Tightiz, Tan N. Nguyen in Scientific Reports (2023)

  2. Article

    Open Access

    Author Correction: Daily and seasonal heat usage patterns analysis in heat networks

    L. Minh Dang, Su** Lee, Yanfen Li, Chanmi Oh, Tan N. Nguyen in Scientific Reports (2022)

  3. Article

    Open Access

    Daily and seasonal heat usage patterns analysis in heat networks

    Heat usage patterns, which are greatly affected by the users' behaviors, network performances, and control logic, are a crucial indicator of the effective and efficient management of district heating networks....

    L. Minh Dang, Su** Lee, Yanfen Li, Chanmi Oh, Tan N. Nguyen in Scientific Reports (2022)

  4. No Access

    Article

    Smartphone-based bulky waste classification using convolutional neural networks

    The rapid urbanization process is escalating the urban waste problem, and ineffective management has worsened the issue, leading to severe consequences to the population health and economy. Although many count...

    Hanxiang Wang, Yanfen Li, L. Minh Dang, Jaesung Ko in Multimedia Tools and Applications (2020)

  5. No Access

    Article

    Background Information of Deep Learning for Structural Engineering

    Since the first journal article on structural engineering applications of neural networks (NN) was published, there have been a large number of articles about structural analysis and design problems using mach...

    Seunghye Lee, **gwan Ha in Archives of Computational Methods in Engin… (2018)

  6. No Access

    Chapter and Conference Paper

    3D Face Representation Using Inverse Compositional Image Alignment for Multimodal Face Recognition

    A 3D model based approach for a face representation and recognition algorithm has been investigated as a robust solution for pose and illumination variation compared to 2D face recognition system. However, a 3...

    Kanghun Jeong, Hyeonjoon Moon, Sanghoon Kim in Frontier and Innovation in Future Computin… (2014)

  7. Chapter and Conference Paper

    Face Recognition Technology for Ubiquitous Computing Environment

    In this paper, we explore face detection and face recognition algorithms for ubiquitous computing environment. We develop algorithms for application programming interface (API) suitable for embedded system. Th...

    Kanghun Jeong, Seongrok Hong, Ilyang Joo in Universal Access in Human-Computer Interac… (2009)

  8. No Access

    Chapter and Conference Paper

    Biometric User Authentication Based on 3D Face Recognition Under Ubiquitous Computing Environment

    In this paper, we developed a biometric user authentication system based on 3-dimensional (3D) face recognition under ubiquitous computing environment. Since 2D based face recognition has been shown its struct...

    Hyeonjoon Moon, Taehwa Hong in Advanced Intelligent Computing Theories an… (2007)

  9. Chapter and Conference Paper

    Knowledge-Based User Authentication Associated with Biometrics

    User authentication is necessary for proving and verifying the claimed identity of users in a distributed environment. Three factors such as user’s knowledge, belongings, and biometric traits are usually consi...

    Taekyoung Kwon, Hyeonjoon Moon in Universal Acess in Human Computer Interact… (2007)

  10. Chapter and Conference Paper

    Biometric Person Authentication for Access Control Scenario Based on Face Recognition

    There are tremendous need increase for personal verification and identification in internet security, electronic commerce and access control in recent years. Also, as the demands for security in many applicati...

    Hyeonjoon Moon, Taekyoung Kwon in Universal Acess in Human Computer Interact… (2007)

  11. Chapter and Conference Paper

    Biometric Driver Authentication Based on 3D Face Recognition for Telematics Applications

    In this paper we developed driver authentication system based on face recognition. Since 2D based face recognition has been shown its structural limitation, 3D model based approach for face recognition has bee...

    Hyeonjoon Moon, Kisung Lee in Universal Acess in Human Computer Interact… (2007)

  12. Chapter and Conference Paper

    Face Representation Method Using Pixel-to-Vertex Map (PVM) for 3D Model Based Face Recognition

    3D model based approach for face recognition has been spotlighted as a robust solution under variant conditions of pose and illumination. Since a generative 3D face model consists of a large number of vertices...

    Taehwa Hong, Hagbae Kim, Hyeonjoon Moon in Computer Vision in Human-Computer Interact… (2006)

  13. No Access

    Chapter and Conference Paper

    System Design and Assessment Methodology for Face Recognition Algorithms

    For biometric person authentication, system design and assessment methodology form essential part of the entire process. We design a performance evaluation methodology for face recognition system based on iden...

    Hyeonjoon Moon in Advances in Biometric Person Authentication (2005)

  14. No Access

    Chapter and Conference Paper

    Multi-modal Biometrics with PKIs for Border Control Applications

    In this paper, we present a simple model that enables a low-cost but highly-scalable method for national border control applications. The proposed model could allow combining multi-modal biometrics with public...

    Taekyoung Kwon, Hyeonjoon Moon in Computational Science and Its Applications – ICCSA 2005 (2005)

  15. No Access

    Chapter and Conference Paper

    Multi-modal Techniques for Identity Theft Prevention

    The rapid growth of the Internet has caused a large number of social problems including invasion of privacy and violation of personal identity. Currently, it is an emerging trend to verify personal identity ba...

    Taekyoung Kwon, Hyeonjoon Moon in Web and Communication Technologies and Int… (2005)

  16. No Access

    Chapter and Conference Paper

    Multi-modal Biometrics with PKI Technologies for Border Control Applications

    It is widely recognized that multi-modal biometrics has the potential to strengthen border protection by reducing the risk of passport fraud. However, it may take high costs to issue smart-card enabled passpor...

    Taekyoung Kwon, Hyeonjoon Moon in Intelligence and Security Informatics (2005)

  17. No Access

    Chapter and Conference Paper

    Biometrics Identification and Verification Using Projection-Based Face Recognition System

    Over the last several years, numerous biometrics algorithms have been investigated for face, fingerprints, iris, and voice reocognition applications. For face recognition research, projection-based face recogn...

    Hyeonjoon Moon, Jaihie Kim in Information Security Applications (2004)

  18. No Access

    Chapter and Conference Paper

    Biometrics Person Authentication Using Projection-Based Face Recognition System in Verification Scenario

    There are tremendous need for personal verification and identification in internet security, electronic commerce and access control in recent years. Also, as the demands for security in many applications such ...

    Hyeonjoon Moon in Biometric Authentication (2004)

  19. No Access

    Chapter

    The FERET Evaluation

    Two of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technolog...

    P. Jonathon Phillips, Hyeonjoon Moon, Syed Rizvi, Patrick Rauss in Face Recognition (1998)

  20. No Access

    Chapter and Conference Paper

    The FERET September 1996 database and evaluation procedure

    Two of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technology (...

    P. Jonathon Phillips, Hyeonjoon Moon in Audio- and Video-based Biometric Person Au… (1997)