Donghyeok An

ORCID: 0000-0001-6703-9311
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Wireless Networks and Protocols
  • Network Traffic and Congestion Control
  • Peer-to-Peer Network Technologies
  • Advanced Neural Network Applications
  • Cooperative Communication and Network Coding
  • Software-Defined Networks and 5G
  • Medical Image Segmentation Techniques
  • Advanced Wireless Network Optimization
  • Brain Tumor Detection and Classification
  • Image and Video Quality Assessment
  • Distributed and Parallel Computing Systems
  • Internet Traffic Analysis and Secure E-voting
  • Multimedia Communication and Technology
  • Network Security and Intrusion Detection
  • Advanced Data Storage Technologies
  • Advanced MIMO Systems Optimization
  • IPv6, Mobility, Handover, Networks, Security
  • Mobile Ad Hoc Networks
  • Concrete Corrosion and Durability
  • Maritime Navigation and Safety
  • Structural Behavior of Reinforced Concrete
  • Radiation Effects in Electronics
  • Service-Oriented Architecture and Web Services
  • Video Coding and Compression Technologies

Changwon National University
2018-2025

Keimyung University
2015-2017

Samsung (South Korea)
2015

Sungkyunkwan University
2014

Korea Advanced Institute of Science and Technology
2008-2011

University of Louisville
1995

This paper aims to address sensor-related challenges in simultaneous localization and mapping (SLAM) systems, specifically within the open-source Google Cartographer project, which implements graph-based SLAM. The primary problem tackled is adaptability functionality of SLAM systems diverse robotic applications. To solve this, we developed a novel framework that integrates five additional functionalities into existing Robot Operating System (ROS). These innovations include an inertial data...

10.3390/s25061808 article EN cc-by Sensors 2025-03-14

In autonomous driving technologies, a camera is necessary for establishing path and detecting an object. Object recognition based on images from several cameras required to detect impediments in ships. Furthermore, order avoid ship collisions, it important follow the movements of recognized this paper, we use Singapore Maritime Dataset (SMD) crawling image model training. Then, present four YOLO-based object models evaluate their performance maritime environment. propose tracking algorithm...

10.3390/jmse10070841 article EN cc-by Journal of Marine Science and Engineering 2022-06-21

The fourth industrial revolution is accelerating automation. In networks, manufacturing processes require hard real-time communication where the latency less than 1ms. Time-sensitive networking (TSN) technology over Ethernet already supports deterministic delivery for communication. However, TSN technologies wireless networks are currently in their initial development stage. Therefore, this study presents an overview of research trends communications. This paper focuses on 5G and IEEE...

10.3390/en14154497 article EN cc-by Energies 2021-07-26

SUMMARY In this paper, we propose a novel technique to deal with sudden bandwidth changes in transmission control protocol (TCP). the current Internet, may occur because of vertical handovers between heterogeneous access networks, routing path changes, cognitive ratio, and multi‐rate wireless local area network. The implementation TCP is designed optimized for stable networks does not adapt well upon changes. Consequently, it might suffer from packet losses burst decrement under‐utilization...

10.1002/dac.1322 article EN International Journal of Communication Systems 2011-08-16

Recently, realistic services like virtual reality and augmented have gained popularity. These require deterministic transmission with end-to-end low latency high reliability for practical applications. However, these real-time to be deterministic, the network core should provide requisite level of network. To deliver differentiated each service, service providers can classify applications based on traffic. due presence personal information in headers, application classification encrypted...

10.3390/s24020564 article EN cc-by Sensors 2024-01-16

Abstract We propose a bandwidth prediction approach based on deep learning. The is intended to accurately predict the of various types mobile networks. first use machine learning technique, namely, gradient boosting algorithm, recognize connected network. Second, we apply handover detection algorithm network recognition account for vertical that causes variance. Third, as communication performance offered by 3G, 4G, and 5G networks varies, suggest bidirectional long short‐term memory model...

10.4218/etrij.2022-0459 article EN publisher-specific-oa ETRI Journal 2023-08-01

In this paper, we propose a novel technique to deal with sudden bandwidth changes in TCP. the current Internet, may occur due vertical handovers between heterogeneous access networks or routing path changes. The implementation of TCP is designed and optimized for stable networks, does not adapt well upon Consequently, it might suffer from packet losses burst decrements under-utilization increments bandwidth. To resolve problem, modify algorithm include new phase, called fast adaptation (FA)....

10.1109/icc.2008.566 article EN IEEE International Conference on Communications 2008-01-01

Internet traffic is experiencing rapid growth, with the majority of generated from video steaming, web data services and Things. As these include transmission small data, such as pages, chunks sensing latency affects quality experience rather than throughput. Therefore, this study aims to decrease improve user experience. To end, we measure service delay throughput in mobile networks. The results indicate a low for users, even though networks support large We therefore propose light-weight...

10.3390/electronics8101204 article EN Electronics 2019-10-22

Various technologies have been developed for the efficient use of multiple radio access resource at network level or other levels to improve user service quality in mobile communication networks. In long-term evolution, carriers are commercializing network-level traffic aggregation such as licensed-assisted access-long-term evolution-unlicensed, and evolution-wireless local area aggregation, which multi-accesses 3rd Generation Partnership Project WiFi, multipath transmission control...

10.1177/1550147720909759 article EN cc-by International Journal of Distributed Sensor Networks 2020-02-01

In brain image processing applications the skull stripping is an essential part to explore. numerous medical stage act as a pre-processing step due this accuracy of diagnosis increases in manifold. The MR removes non-brain tissues from such dura, skull, and scalp. Nowadays MRI emerging method for imaging. However, existence region low contrast are two main drawbacks magnetic resonance Therefore, we have proposed enhancement using histogram equalization techniques. While morphological...

10.14569/ijacsa.2020.0110372 article EN International Journal of Advanced Computer Science and Applications 2020-01-01

In Korea, public warning systems are being actively used to provide COVID-19 information people avoid additional infections. The explosion of messages has caused redundant and unnecessary transmission messages. This study propose an enhanced system. First, a generation model based on deep learning is proposed for automatically generating the coordinates broadcast area. Second, system modified users. Finally, customization scheme presented; therefore, number decreases. evaluated by measuring...

10.23919/jcn.2021.000036 article EN Journal of Communications and Networks 2021-10-01

10.1007/s11277-014-1943-4 article EN Wireless Personal Communications 2014-07-09

Variety of types security systems have been utilized in a lot places such as government office, company, and etc. Among them, gate system is representative system. In the existing systems, ID card or biometrics frequently exploited for identification authorization. based widely adopted, but it vulnerable to replication modification card. Biometrics has no weakness modification, requires high complexity shows false ratio rather than this paper, we proposed on mash-up framework. our scheme,...

10.1109/acdt.2017.7886160 article EN 2017-01-01

Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), long-term evolution (LTE) have been rapidly deployed. Many device users can access the Internet wirelessly, which has increased traffic. In 2014, more than half of traffic around world was devoted to satisfying demand for video streaming. this paper, we propose a scalable streaming relay scheme. Because many collisions degrade scalability streaming, first separate networks prevent...

10.1371/journal.pone.0167403 article EN cc-by PLoS ONE 2016-12-01

The image segmentation, tumor detection and extraction of area from brain MR images are the main concern but time-consuming tedious task performed by clinical experts or radiologist, while accuracy relies on their experiences only. So, to overcome these limitations, usage computer-aided design (CAD) technology has become very important. Magnetic resonance imaging (MRI) Computed Tomography (CT) two major modalities that used for detection. In this paper, we have carried out a critical review...

10.14569/ijacsa.2020.0110156 article EN International Journal of Advanced Computer Science and Applications 2020-01-01

Recently, Internet is an essential part for human life, and several problems lead Future Internet. Software Defined Networks (SDN) a representative approach in We propose Cooperative Random Early Detection (CoopRED) to avoid inefficiency core routers when incoming traffic generates congestion. Our scheme selects packets that will be dropped the bottleneck link, drops them early edge router. conducted simulation measure performance, it shows proposed improves efficiency of networks.

10.1109/icoin.2015.7057901 article EN 2022 International Conference on Information Networking (ICOIN) 2015-01-01

Today, energy and performance efficiency have become a crucial factor in modern computing environments, such as high-end mobile devices, desktops, enterprise servers, because data volumes cloud datacenters increase exponentially. Unfortunately, many researchers engineers neglect the power consumption internal incurred by storage devices. In this paper, we present renewable-zoned namespace (ReZNS), an performance-optimal mechanism based on emerging ZNS SSDs. Specifically, ReZNS recycles...

10.3390/app14219717 article EN cc-by Applied Sciences 2024-10-24

In deep learning (DL) frameworks, a checkpoint operation is widely used to store intermediate variable values (e.g., weights, biases, and gradients) on storage media. This helps reduce the recovery time of running machine (ML) model after sudden power failures or random crashes. However, can stall overall training step waste expensive hardware resources by leaving GPU in idle sleep during operation. addition, completion unpredictable cloud server environments AWS Azure) because excessive I/O...

10.3390/app14198848 article EN cc-by Applied Sciences 2024-10-01

With the evolution of cellular networks and wireless-local-area-network-based communication technologies, services for smart device users have appeared. popularity 4G 5G, can now consume larger bandwidths than before. Consequently, demand various services, such as streaming, online games, video conferences, has increased. For improved quality experience (QoE), streaming utilize adaptive bitrate (ABR) algorithms to handle network bandwidth variations. ABR use history future prediction,...

10.3390/app142210490 article EN cc-by Applied Sciences 2024-11-14
Coming Soon ...