- Cooperative Communication and Network Coding
- Advanced MIMO Systems Optimization
- Advanced Multi-Objective Optimization Algorithms
- Cognitive Radio Networks and Spectrum Sensing
- Water Systems and Optimization
- Metaheuristic Optimization Algorithms Research
- Full-Duplex Wireless Communications
- Water Treatment and Disinfection
- Image and Video Quality Assessment
- Diverse Approaches in Healthcare and Education Studies
- IPv6, Mobility, Handover, Networks, Security
- Cloud Computing and Remote Desktop Technologies
- Technology and Data Analysis
- Innovation in Digital Healthcare Systems
- Web Data Mining and Analysis
- Water Quality Monitoring Technologies
- Data Mining Algorithms and Applications
- Wireless Communication Networks Research
- IoT and Edge/Fog Computing
- Rough Sets and Fuzzy Logic
- Quinazolinone synthesis and applications
- Advanced Wireless Communication Technologies
- Click Chemistry and Applications
- Evolutionary Algorithms and Applications
- Energy Load and Power Forecasting
Korea University
2020-2023
University of Ulsan
2014
Chungbuk National University
2012
Kyungdong University
2008
Offloading heavy virtual reality (VR) computational operations to a network edge computation entity is receiving increasing attention as tool wirelessly and energy efficiently provide low-end client devices with high-quality immersive interactive VR services anytime anywhere across the globe. In this work, we aim an understanding of various characteristics offloading through comprehensive experiments conducted using prototype testbed for edge-assisted processing streaming. First, investigate...
Rapid and accurate detection/localization of leakage is important to preventing severe consequences in water distribution systems, such as loss resources sinkholes. This study presents a novel two-phased approach detection localization part the 'Battle Leakage Detection Isolation Methods' (BattLeDIM). During Phase 1, data classification, feature scaling, verification were performed, where individual events detected using K-mean clustering algorithm. In 2, location was identified...
Discovering access patterns from web log data is a typical sequential pattern mining application, and lot of algorithms have been proposed. In this paper, we propose an improved approach Gap-BIDE algorithm to extract user data. Compared with the previous algorithm, process getting large event set proposed in provided algorithm; can find out frequent events by discarding infrequent which do not occur continuously accessing time before generating candidate patterns. experiment, compare one,...
Abstract The data forwarding transmission is an important function of the relay in cooperative communication wireless systems. However, additional cause waste power consumption and cost. Therefore, this paper, we consider how to use user mobile devices stead relays deal with problem. In proposed protocol that divide each into two states idle non-idle. receiver has functions base station device. case, it possible no cost, improve spectral efficiency network capacity. We verified BER...
Abstract In this paper, we proposed a method using the user mobile device to overcome interference constraint without building cooperative communication system. addition, in order mitigate interference, apply selection method, and then exploit power allocation scheme device. The protocol is analyzed Rayleigh fading environment, performance system evaluated terms of bit error rate outage probability. simulation results showed that when transmission algorithm applied, can be mitigated....
Abstract A novel protocol was developed for synthesizing 2-aryl-substituted azaindole-3-acetic acid derivatives from 2-aminoazacinnamic and aryl aldehydes through an imino-Stetter reaction. Condensation of with forms the corresponding aldimines, which are then treated cyanide to yield desired derivatives. Notably, this could be employed synthesis all regioisomers by using appropriate azacinnamic
This paper proposes an approach to transmit of Multimedia Contents effectively in a rapidly changing Internet environment. At present, guaranteeing QoS network has become important subject consider. When transmitting AF packets Multi-DiffServ environment, A gives priority order AF1, AF2, AF3 and AF4; on the other hand, B reverses with AF4, AF3, AF2 AF1. In this case, AF1 that received best quality service will receive lowest network, which results dropping vice versa. suggests way guarantee...
With the rise of gig economy, online language tutoring platforms are becoming increasingly popular. These provide temporary and flexible jobs for native speakers as tutors allow learners to have one-on-one speaking practices on demand, which occasionally practice with different tutors. such distributed tutorship, can hold schedules receive diverse feedback. However, face challenges in consistently tracking their learning progress because feedback from standards perspectives, hardly refer...
Recently, various detection approaches that identify anomalous events (e.g., discoloration, contamination) by analyzing data collected from smart meters (so-called structured data) have been developed for many water distribution systems (WDSs). However, although some of them showed promising results, often fail to collect/transmit the (i.e., missing thus meaning these methods may frequently not work anomaly identification. Thus, clear next step is combine with another type data, unstructured...