Seon-Tae Kim

Learn More
More and more applications are being discovered for scalable video coding (SVC) in network-adaptive video streaming and storage systems. In the SVC encoder, an exhaustive search technique is employed to select the best coding mode for each macro block. This technique achieves the highest possible coding efficiency, but it results in extremely large encoding(More)
BACKGROUND Hereditary hemorrhagic telangiectasia (HHT) is an autosomal-dominant vascular disorder, characterized by recurrent epistaxis, mucocutaneous telangiectases, and arteriovenous malformations (AVMs) in various visceral organs. Endoglin (ENG) and activin receptor-like kinase 1 (ACVRL1; ALK1), receptors for transforming growth factor-β (TGF-β)(More)
—Widespread powerful mobile devices and the advanced technologies in wireless mesh networks (WMNs) open a new scenario where users require audio/video group chatting with their neighbors anywhere without the need of fixed communication infrastructure. However, development of audio/video group chat applications for WMNs are still challenging because the(More)
SUMMARY An improved algorithm for fast motion estimation based on the block matching algorithm (BMA) is presented for use in a block-based video coding system. To achieve enhanced motion estimation performance , we propose an adaptive search pattern length for each iteration for the current macro block (MB). In addition, search points that must be checked(More)
99 Sublingual immunotherapy (SLIT) was recently developed and is widely used in Europe. SLIT has been reported to be well-tolerated and effective for the treatment of allergic rhinitis (AR) and asthma in children, adults, and elderly patients. 1,2 Several systemic reviews indicate that the use of SLIT in patients with AR sensitive to house dust mites (HDMs)(More)
— Currently, developers of sensor network monitoring systems have to use various web languages including HTML, JavaScript and Ajax, and have to set up web servers using Apache, PHP, and MySQL. In addition, the implementation of security and authorization may need to be considered in many cases. Thus, the implementation and management of sensor network(More)
  • 1