Jungin Kim

Learn More
Increasingly the need for protecting information from unauthorized access has lead to more attention in the field of information security. Access control mechanisms have been in place for the last four decades and are a powerful tool utilized to ensure security. In a real-time distributed computing environment, systems have to meet timing constraints for(More)
PURPOSE To evaluate the radial displacement of clinical target volume in the patients with node negative head and neck (H&N) cancer and to quantify the relative positional changes compared to that of normal healthy volunteers. MATERIALS AND METHODS Three node-negative H&N cancer patients and five healthy volunteers were enrolled in this study. For setup(More)
  • 1