- Advanced Data Storage Technologies
- Caching and Content Delivery
- Parallel Computing and Optimization Techniques
- Cloud Computing and Resource Management
- Distributed and Parallel Computing Systems
- Synthesis and properties of polymers
- Cellular Automata and Applications
- Data Management and Algorithms
- Peer-to-Peer Network Technologies
- IoT and Edge/Fog Computing
- Heat transfer and supercritical fluids
- Algorithms and Data Compression
- Traffic Prediction and Management Techniques
- Vehicular Ad Hoc Networks (VANETs)
- Tactile and Sensory Interactions
- Combustion and flame dynamics
- Computational Fluid Dynamics and Aerodynamics
- Anomaly Detection Techniques and Applications
- Advanced Malware Detection Techniques
- Catalytic Processes in Materials Science
- Network Security and Intrusion Detection
- Conducting polymers and applications
- Organic Electronics and Photovoltaics
- Silicone and Siloxane Chemistry
- Advanced Sensor and Energy Harvesting Materials
Kangwon National University
2017-2024
Pusan National University
2020
Korea Institute of Industrial Technology
2018
Ajou University
2008-2016
Korea Advanced Institute of Science and Technology
1998-2014
Yeungnam University
2012-2013
In Internet of things (IoT) millions devices are intelligently connected for providing smart services. Especially in indoor localization environment, that is one the most concerning topic cities, internet and wireless sensor networks. Many technologies being used purpose environment Wi-Fi using received signal strengths (RSSs) them. RSSs sensitive to reflection, refraction, interference channel noise cause irregularity strengths. The irregular anomalous RSS values, a cannot define location...
Diagnosis of heart disease is a difficult job, and researchers have designed various intelligent diagnostic systems for improved diagnosis. However, low prediction accuracy still problem in these systems. For better risk accuracy, we propose feature selection method that uses floating window with adaptive size elimination (FWAFE). After the elimination, two kinds classification frameworks are utilized, i.e., artificial neural network (ANN) deep (DNN). Thus, types hybrid proposed this paper,...
Vehicular Ad-hoc network (VANET) is an imminent technology having both exciting prospects and substantial challenges, especially in terms of security. Due to its distributed frequently changing topology, it extremely prone security attacks. The researchers have proposed different strategies for detecting various forms However, VANET still exposed several attacks, specifically Sybil attack. Attack one the most challenging attacks VANETS, which forge false identities undermine communication...
Advanced technologies, driven by extensive data analysis, support the concept of intelligent cities, which aim to enhance quality people's lives, minimize consumption energy, reduce pollution, and promote economic growth. The transportation network is a crucial component this vision in urbanized cities. However, massive increase road traffic poses significant challenge achieving vision. Developing an system requires accurately predicting speed. This paper proposes novel deep stacking-based...
The DC-DC converters are essential in power electronics as they maintain a stable output voltage even when there changes input and load current. This study introduces an advanced Proportional-Derivative (PD) compensator for buck converters. enhances stability transient responsiveness by employing unique modulation technique that has not been previously applied this context. proposed method entails applying of 28 volts, which yields amplification 15 the presence interference. small signal...
Remote healthcare systems and applications are being enabled via the Internet of Medical Things (IoMT), which is an automated system that facilitates critical emergency services in urban areas, addition to, bridges isolated rural communities for various services. Researchers developers are, to date, considering majority technological aspects issues around IoMT, e.g., security vulnerabilities other cybercrimes. One such major challenges IoMT has face widespread ransomware attacks; a malicious...
In recent decades, a large amount of research has been carried out to analyze location-based social network data highlight their application. These datasets can be used propose models and techniques that reproduce the spatiotemporal structures symmetries in user activities as well density estimations. current study, different estimation are utilized check-in frequency users more detail from dataset acquired Sina-Weibo, also referred Weibo, over specific period 10 districts Shanghai, China....
Query processing in road networks has been studied extensively recent years. However, the of moving queries received little attention. In this paper, we introduce a new algorithm called Safe Exit Algorithm SEA, which can efficiently compute safe exit points nearest neighbor NN query on networks. The region is an area where result remains unchanged, provided that inside At each point, and its non-safe meet so set represents border region. Before reaching client object does not have to request...
There are several physical and social factors that associated to the maternal health may be considered influential towards C-Section across world. Several studies have been conducted in different regions of world, mostly targeting pregnant women specific region. The dynamicity pregnancy differences among with respect region life enforces researchers widen sphere research at regional level comprehensively explore significant risk mother expected child. In this paper, interest is native city...
Abstract Smart devices are effective in helping people with impairments, overcome their disabilities, and improve living standards. Braille is a popular method used for communication by visually impaired people. Touch screen smart can be to take input instantaneously convert it into natural language. Most of these schemes require location-specific that difficult users. In this study, position-free accessible touchscreen-based algorithm designed implemented It aims place the least burden on...
Flash memory offers attractive features, such as non-volatile, shock resistance, fast access, and low power consumption for data storage. However, it has one main drawback of requiring an erase before updating the contents. Furthermore, flash can only be erased limited number times. To overcome limitations, needs a software layer called translation (FTL). The basic function FTL is to translate logical address from file system like allocation table (FAT) physical in memory. In this paper, new...
Query processing in road networks has been studied extensively recent years. However, the of moving queries received little attention. In this paper, we introduce a new algorithm called Safe Exit Algorithm (SEA), which can efficiently compute safe exit points nearest neighbor (NN) query on networks. The region is an area where result remains unchanged, provided that inside At each point, and its non-safe meet so set represents border region. Before reaching client (query object) does not...
Technology is advancing rapidly in present times. To serve as a useful and connected part of the community, everyone required to learn update themselves on innovations. Visually impaired people fall behind this regard because their inherent limitations. involve these active participants within communities, technology must be modified for facilitation. This paper provides comprehensive survey various user input schemes designed visually Braille natural language conversion. These techniques...
Ubiquitous online learning is continuing to expand, and the factors affecting success educational sustainability need be quantified. Procrastination one of compelling characteristics that students observe as a failure achieve weaker outcomes. Past studies have mainly assessed behaviors procrastination by describing explanatory work. Throughout this research, we concentrate on predictive measures identify forecast procrastinator using ensemble machine models (i.e., Logistic Regression,...
To keep a network secure, user authentication scheme that allows only authenticated users to access services is required. However, the limited resources of sensor nodes make providing challenging task. We therefore propose new method security for wireless (WSN). Our technique, Secure User Biometric Based Authentication Scheme (SUBBASe), based on biometrics WSNs. It achieves higher level as well improved performance. This solution consists easy operations and light computations. Herein,...
Nanostructuring is considered one of the key approaches to achieve highly efficient thermoelectric alloys by reducing thermal conductivity. In this study, we investigated effect oxide (ZnO and SnO2) nanolayers at grain boundaries polycrystalline In0.2Yb0.1Co4Sb12 skutterudites on their electrical transport properties. Skutterudite powders with were prepared atomic layer deposition method, number cycles was varied control coating thickness. The coated consolidated spark plasma sintering. With...
The flash translation layer design of smart devices differs from that traditional storages, because have frequent power-offs and limited resources. These unique features generate inconsistent response times performance degradation. This paper proposes a new FTL algorithm called the "Fast Responsive Flash Translation Layer (FFTL)" for devices. FFTL avoids merge operations by first executing cleaning policy provides faster time than superblocklevel associativity algorithms balancing each log...
A direct-contact heat exchange using particle-suspended gas as a transfer medium is analyzed with an extended emphasis on the radiation, i.e., considering radiation by both and particles. While Runge-Kutta method used for numerical analysis of momentum energy equations, finite volume utilized to solve radiative equation. The present study shows notable effect in addition particle especially when varying chamber length well mass flow rate. When rate raised, temperature heater increases...
The use of MLC/TLC (Multiple/Triple Level Cell) flash memory increases bit error rate, and declines its reliability. To remedy this loss, the Redundancy Array Inexpensive Disk (RAID) have been widely used to enhance reliability Hard Drive (HDD) Solid State (SSD). RAID 5 6 ensure high among various techniques. These techniques exploit parity recover failures, it is updated whenever data renewed. technique contains separated in a page different stripes. In technique, however, written double....