Do-Hyung Kim

Learn More
In this paper, an algorithm for human head detection over a distance exceeding 2.5 m between a camera and an object is described. This algorithm is used for the control of a robot, which has the additional limits of a moving camera, moving objects, various face orientations, and unfixed illuminations. With these circumstances, only the assumption that human(More)
This paper describes the vertical handover architecture with low latency handover for mobile terminals which supports interworking between heterogeneous networks. The vertical handover architecture defines handover-related modules for mobile terminal and the handover switching flows among them. We adapt low latency handover method to mobile IP for reducing(More)
This paper describes a new robot photographer system which can interact with people. The goal of this research is to make the system act like a human photographer. This system is based on a mobile robot having capabilities of wireless communication and stereo vision. It recognizes waving hands of people, moves toward them, and takes pictures with designated(More)
This paper proposes a novel face verification algorithm based on multiple feature combination and a support vector machine. The main issue in face verification is to deal with the variability in appearance. It seems difficult to solve this issue by using a single feature. Therefore, combination of mutually complementary features is necessary to cope with(More)
The Florida town of High Springs joins the University of Florida to develop a vision for the revitalization of its historic town center. An essential component of this effort is the ability to communicate to the citizens of High Springs the present physical and socioeconomic conditions and be able to interactively visualize the proposed design alternatives.(More)
Many algorithms do not work well in real-world systems as real-world systems have problems with illumination variation and imperfect detection of face and eyes. In this paper, we compare the illumination normalization methods (SQI, HE, GIC), and the feature extraction methods (PCA, LDA, 2dPCA, 2dLDA, B2dLDA) using Yale B database and ETRJ database. In(More)
p. 1 Remote Access VPN with Port Protection Function by Mobile Codes p. 16 A Role of DEVS Simulation for Information Assurance p. 27 Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes p. 42 Reliable Cascaded Delegation Scheme for Mobile Agent Environments p. 55 Practical Solution for Location Privacy in Mobile IPv6 p. 69 CTAR:(More)
The user authentication problem is discussed in the context of robot environments. Although authentication is indispensable for useful robot services, the traditional approaches that have been applied in strictly regulated environments cannot be applied as they are when both the robot and humans are freely moving around. In this paper, a new authentication(More)
This paper is based on our extensive surveys on human-robot interaction function methodologies and implementations, which are currently used in robotic products and research project in Japan and Korea. This specification defines a framework that can handle messages and data exchanged between human-robot interaction service components and service(More)