Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Serial lung ultrasounds in pediatric pneumonia in Mozambique and Pakistan

    Lung ultrasound (LUS) is a promising point-of-care imaging technology for diagnosing and managing pneumonia. We sought to explore serial LUS examinations in children with chest-indrawing pneumonia in resource-...

    Amy Sarah Ginsburg, Imran Nisar, Lola Madrid, Jennifer L. Lenahan in Scientific Reports (2021)

  2. Article

    Open Access

    Malawian children with fast-breathing pneumonia with and without comorbidities

    Due to high risk of mortality, children with comorbidities are typically excluded from trials evaluating pneumonia treatment. Understanding heterogeneity of outcomes among children with pneumonia and comorbidi...

    Amy Sarah Ginsburg, Tisungane Mvalo, Jun Hwang, Melda Phiri, Eric D. McCollum in Pneumonia (2021)

  3. Chapter and Conference Paper

    Performance Evaluation of the Route Optimization Scheme in Mobile IPv6

    The paper presents the performance comparison between the triangle routing and the route optimization. The paper presents not only the analytical models to compare the performance but also the threshold value ...

    In-Hye Shin, Gyung-Leen Park, Junghoon Lee, Jun Hwang in Computational Science – ICCS 2007 (2007)

  4. No Access

    Chapter and Conference Paper

    A Study on the Transportation Period of the EPG Data Specification in Terrestrial DMB

    With the convergence of information communication and broadcasting technology, DMB (Digital Multimedia Broadcasting) becomes the hottest issue of the next generation in the new media industry and the communica...

    Minju Cho, Jun Hwang, Gyung-Leen Park in Computational Science and Its Applications… (2006)

  5. No Access

    Chapter and Conference Paper

    On the Face Detection with Adaptive Template Matching and Cascaded Object Detection for Ubiquitous Computing Environment

    This paper presents the template matching and efficient cascaded object detection. The proposed template matching method is superior to previous face detection. Furthermore, the proposed cascade method has som...

    Chun Young Chang, Jun Hwang in Computational Science and Its Applications – ICCSA 2005 (2005)

  6. No Access

    Chapter and Conference Paper

    On a Video Surveillance System with a DSP by the LDA Algorithm

    As face recognition algorithms move from research labs to real world product, power consumption and cost become critical issues, and DSP-based implementations become more attractive. Also, “real-time” automati...

    ** Ok Kim, ** Soo Kim, Chin Hyun Chung in Web and Communication Technologies and Int… (2005)

  7. Chapter and Conference Paper

    Energy-Aware Broadcasting Method for Wireless Sensor Network

    The communicative behaviors in Wireless Sensor Networks(WSNs) can be characterized by two different types: routing and broadcasting. The broadcasting is used for effective route discoveries and packet delivery...

    Cheol-Min Park, Dae-Won Kim, Jun Hwang in Embedded and Ubiquitous Computing – EUC 20… (2005)

  8. No Access

    Chapter and Conference Paper

    Efficient Iris-Region Normalization for a Video Surveillance System

    An efficient approach for iris recognition is presented in this paper. An efficient iris region normalization consists of a doubly polar coordinate and noise region exclude. And then a Haar wavelet transform i...

    ** Ok Kim, Bong Jo Joung, Chin Hyun Chung in Web and Communication Technologies and Int… (2005)

  9. No Access

    Chapter and Conference Paper

    Energy-Efficiency Method for Cluster-Based Sensor Networks

    Wireless sensor networks have recently emerged as an important computing platform. The sensors in this system are power-limited and have limited computing resources. Therefore sensors’ energy has to be managed...

    Kyung-Won Nam, Jun Hwang, Cheol-Min Park in Computational Science and Its Applications… (2005)

  10. No Access

    Chapter and Conference Paper

    Face Detection by Facial Features with Color Images and Face Recognition Using PCA

    Human face detection plays an important role in applications such as video surveillance, human computer interface, face recognition, and face image database management. The face recognition by a CCD camera has...

    ** Ok Kim, Sung ** Seo, Chin Hyun Chung in Computational Science and Its Applications… (2004)

  11. No Access

    Chapter and Conference Paper

    On Facial Expression Recognition Using the Virtual Image Masking for a Security System

    Since PC camera based net-meeting and video chatting program have been introduced, users become to enjoy real-time communication with each other through PC as having face to face meeting. This paper proposes v...

    ** Ok Kim, Kyong Sok Seo, Chin Hyun Chung in Computational Science and Its Applications… (2004)

  12. No Access

    Chapter and Conference Paper

    An Efficient Key Agreement Protocol for Secure Authentication

    The Diffie-Hellman Key Exchange scheme can produce a common session key between the communication parties but its problem is that it makes a man-in-the middle attack possible. To solve the problem, several pro...

    Young-Sin Kim, Eui-Nam Huh, Jun Hwang in Computational Science and Its Applications… (2004)

  13. Chapter and Conference Paper

    Efficient Management of Domain Foreign Agents in Mobile Computing Environment Using Load Balance

    Mobile IP is a protocol standard designed to be used in a mobile computing environment. However, Mobile IP has a drawback to incur a lot of handoff delays and waste network resources, since CoA registration pa...

    Yong Chul Kim, Min Gyo Chung, Jun Hwang in Wireless On-Demand Network Systems (2004)

  14. Chapter and Conference Paper

    CORBA Based Real-Time Object-Group Platform in Distributed Computing Environments

    Recently, the distributed real-time services are develo** in distributed object computing environments in a way that can support a new programming paradigm of the distributed platform that requires interoper...

    Su-Chong Joo, Sung-Kwun Oh, Chang-Sun Shin, Jun Hwang in Computational Science — ICCS 2003 (2003)

  15. Chapter and Conference Paper

    The Inductive Inverse Kinematics Algorithm to Manipulate the Posture of an Articulated Body

    Inverse kinematics is a very useful method for controlling the posture of an articulated body. In most inverse kinematics processes, the major matter of concern is not the posture of an articulated body itself...

    ** Ok Kim, Bum Ro Lee, Chin Hyun Chung, Jun Hwang in Computational Science — ICCS 2003 (2003)

  16. No Access

    Chapter and Conference Paper

    On Natural Motion Editing by a Geometric Mean Filter

    Recently, motion capture has become one of the most promising technologies in animation. Realistic motion data can be captured by recording the movement of a real actor with an optical or magnetic motion captu...

    ** Ok Kim, Chang Han Oh, Chin Hyun Chung in Computational Science and Its Applications… (2003)

  17. Chapter and Conference Paper

    The Uniform Posture Map Algorithm for the Real-Time Interactive Motion Transitions of an Articulated Body

    It is important to reuse existing motion capture data for reduction of the animation producing costs as well as for the efficiency of the producing process. Because its motion curve has no control point, howev...

    ** Ok Kim, Bum Ro Lee, Chin Hyun Chung, Jun Hwang in Computational Science — ICCS 2003 (2003)

  18. Chapter and Conference Paper

    On the Extraction of the Valid Speech-Sound by the Merging Algorithm with the Discrete Wavelet Transform

    A valid speech-sound block can be classified to provide important information for speech recognition. The classification of the speech-sound block comes from the MRA(multi-resolution analysis) property of the ...

    ** Ok Kim, Han Wook Paek, Chin Hyun Chung, Jun Hwang in Computational Science — ICCS 2003 (2003)

  19. No Access

    Chapter and Conference Paper

    Development of a Residential Gateway and a Service Server for Home Automation

    We have developed a residential gateway that centralizes device interfacing between the external Internet and internal devices as well as appliance networks. We have also proposed the concept of a service serv...

    Jongkyu Park, Ilseok Han, **hyuck Kwon in Advanced Internet Services and Applications (2002)

  20. Chapter and Conference Paper

    A Load Balancing Algorithm Using the Circulation of A Single Message Token

    We present an efficient load balancing algorithm which simplifies the system status information through the use of an information message (VISITOR) in distributed system. Using the proposed algorithm, informat...

    Jun Hwang, Woong J. Lee, Byong G. Lee, Young S. Kim in Computational Science — ICCS 2002 (2002)

previous disabled Page of 2