- Software-Defined Networks and 5G
- Advanced Optical Network Technologies
- Interconnection Networks and Systems
- Network Packet Processing and Optimization
- Optical Network Technologies
- Caching and Content Delivery
- Software System Performance and Reliability
- Cryptographic Implementations and Security
- Network Security and Intrusion Detection
- Artificial Intelligence in Healthcare
- Anomaly Detection Techniques and Applications
- DNA and Biological Computing
- Cloud Computing and Resource Management
- Coding theory and cryptography
- Optimization and Search Problems
- Smart Grid Security and Resilience
- Online Learning and Analytics
- Reinforcement Learning in Robotics
- Chaos-based Image/Signal Encryption
- Algorithms and Data Compression
Sahmyook University
2023
Korea Advanced Institute of Science and Technology
2020-2021
Korea Electronics Technology Institute
2021
Korea Institute of Science & Technology Information
2020
Korea University of Science and Technology
2016-2019
Korea University
2017
Incheon National University
2002
Driven by increasing in the demand for cloud computing, providers are constantly seeking configuration mechanisms designed to simply install a reliable and easy-to-manage architecture—similar installing an operating system on computer using thumb drive. Accordingly, software components can be packaged into lightweight portable containers, then easily deployed managed through orchestration tools such as Kubernetes. Similarly, load balancers also containerized environments container,...
Student dropout is a serious issue in that it not only affects the individual students who drop out but also has negative impacts on former university, family, and society together. To resolve this, various attempts have been made to predict student using machine learning. This paper presents model at Sahmyook University Academic records collected from 20,050 of university were analyzed used for Various learning algorithms implement model, including Logistic Regression, Decision Tree, Random...
Network administrators can make their own programmable network by using an SDN infrastructure with the OpenFlow protocol. Through protocol, a controller instructs switch to perform specific actions, such as service chaining, according header fields of incoming packets. Our main goal is support extended view architecture inspecting not only packet but also payload information in For this purpose, we address sophisticated forwarding scheme DPI inspect effectively all According results our...
Shared mesh protection (SMP) is a mechanism that recovers traffic delivery against failures on working path as rapidly linear protection. In addition, it allows for resource sharing among the paths with different endpoints in network by coordinating use of shared resources when multiple compete these resources. Owing to limited and preemption consequence priority comparison, SMP introduces new optimization problem whose objective find optimal assignment maximizes number protected services...
Block cipher algorithms encrypt sensitive personal, financial, and confidential information to prevent unauthorized access. The ARIA is a general block algorithm with an involutional SPN structure optimized for lightweight environments hardware implementation. This study focuses on implementing in the crypto-subsystem of Linux kernel because it has yet be implemented despite being recognized as global standard. improves practicality by reasonable performance attempts reduce CPU cycles...
Summary Shared mesh protection (SMP) protects service traffic on a working path and requires coordinated use of the shared resources when is routed through path. If there are many intermediate nodes path, delay caused by coordination at each node increases switching time, resulting in losing more traffic. Considering capacity link bandwidth required paths using that link, it appears necessary. However, looking closely relationships with other links their paths, exist may require no all. This...
In SDN and NFV technologies, performance of a virtual switch is important to provide network functionalities swiftly. Since the lookup operation has been considered major bottleneck performance, we need devise an efficient way reduce time. To improve speed, previous research suggested compact table in fast memory, but issue collision hash not addressed well enough. This paper proposes new scheme that mitigates collisions by utilizing empty slots table. We propose insert element may collide...
A carrier suffering a communication disaster may be unable to maintain network services using its own protection resources. In this case, it could avoid service disruptions by other carriers' However, along with national regulatory efforts requiring coordinate multiple use of resources, many technical issues exist in connecting two networks owned different carriers. key issue is determining where connect the networks. This paper introduces new optimization problem whose objective minimize...
Memory allocation problem has two independent goals: minimization of number memories and registers in one memory. Our concern is the ordering bindings during memory allocation. We formulate analyze three different algorithms by changing their binding order. It shown that when we combine these subtasks solve them simultaneously heuristic cost function significant savings (up to 20%) can be obtained total area memories.
Shared mesh protection (SMP) protects traffic against failures occurring in a working path, as with linear protection, and allows resource sharing of paths different endpoints.The SMP mechanism coordinates multiple that require shared resources when occur on paths.When networks limited resources, activation can fail because some the path are already use.In this case, node confirming is not available has option to wait until or withdraw path.In study, we recognize switching time number...