Choong-Hee Cho

ORCID: 0000-0002-9077-9905
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Advanced Optical Network Technologies
  • Interconnection Networks and Systems
  • Network Packet Processing and Optimization
  • Optical Network Technologies
  • Caching and Content Delivery
  • Software System Performance and Reliability
  • Cryptographic Implementations and Security
  • Network Security and Intrusion Detection
  • Artificial Intelligence in Healthcare
  • Anomaly Detection Techniques and Applications
  • DNA and Biological Computing
  • Cloud Computing and Resource Management
  • Coding theory and cryptography
  • Optimization and Search Problems
  • Smart Grid Security and Resilience
  • Online Learning and Analytics
  • Reinforcement Learning in Robotics
  • Chaos-based Image/Signal Encryption
  • Algorithms and Data Compression

Sahmyook University
2023

Korea Advanced Institute of Science and Technology
2020-2021

Korea Electronics Technology Institute
2021

Korea Institute of Science & Technology Information
2020

Korea University of Science and Technology
2016-2019

Korea University
2017

Incheon National University
2002

Driven by increasing in the demand for cloud computing, providers are constantly seeking configuration mechanisms designed to simply install a reliable and easy-to-manage architecture—similar installing an operating system on computer using thumb drive. Accordingly, software components can be packaged into lightweight portable containers, then easily deployed managed through orchestration tools such as Kubernetes. Similarly, load balancers also containerized environments container,...

10.1109/access.2021.3108801 article EN cc-by IEEE Access 2021-01-01

Student dropout is a serious issue in that it not only affects the individual students who drop out but also has negative impacts on former university, family, and society together. To resolve this, various attempts have been made to predict student using machine learning. This paper presents model at Sahmyook University Academic records collected from 20,050 of university were analyzed used for Various learning algorithms implement model, including Logistic Regression, Decision Tree, Random...

10.3390/app132112004 article EN cc-by Applied Sciences 2023-11-03

Network administrators can make their own programmable network by using an SDN infrastructure with the OpenFlow protocol. Through protocol, a controller instructs switch to perform specific actions, such as service chaining, according header fields of incoming packets. Our main goal is support extended view architecture inspecting not only packet but also payload information in For this purpose, we address sophisticated forwarding scheme DPI inspect effectively all According results our...

10.1109/icsn.2016.7501921 article EN 2016-05-01

Shared mesh protection (SMP) is a mechanism that recovers traffic delivery against failures on working path as rapidly linear protection. In addition, it allows for resource sharing among the paths with different endpoints in network by coordinating use of shared resources when multiple compete these resources. Owing to limited and preemption consequence priority comparison, SMP introduces new optimization problem whose objective find optimal assignment maximizes number protected services...

10.1109/tcomm.2018.2884988 article EN IEEE Transactions on Communications 2018-12-05

Block cipher algorithms encrypt sensitive personal, financial, and confidential information to prevent unauthorized access. The ARIA is a general block algorithm with an involutional SPN structure optimized for lightweight environments hardware implementation. This study focuses on implementing in the crypto-subsystem of Linux kernel because it has yet be implemented despite being recognized as global standard. improves practicality by reasonable performance attempts reduce CPU cycles...

10.1109/access.2023.3298026 article EN cc-by-nc-nd IEEE Access 2023-01-01

Summary Shared mesh protection (SMP) protects service traffic on a working path and requires coordinated use of the shared resources when is routed through path. If there are many intermediate nodes path, delay caused by coordination at each node increases switching time, resulting in losing more traffic. Considering capacity link bandwidth required paths using that link, it appears necessary. However, looking closely relationships with other links their paths, exist may require no all. This...

10.1002/nem.2136 article EN International Journal of Network Management 2020-08-20

In SDN and NFV technologies, performance of a virtual switch is important to provide network functionalities swiftly. Since the lookup operation has been considered major bottleneck performance, we need devise an efficient way reduce time. To improve speed, previous research suggested compact table in fast memory, but issue collision hash not addressed well enough. This paper proposes new scheme that mitigates collisions by utilizing empty slots table. We propose insert element may collide...

10.23919/icact.2017.7890143 article EN 2022 24th International Conference on Advanced Communication Technology (ICACT) 2017-01-01

A carrier suffering a communication disaster may be unable to maintain network services using its own protection resources. In this case, it could avoid service disruptions by other carriers' However, along with national regulatory efforts requiring coordinate multiple use of resources, many technical issues exist in connecting two networks owned different carriers. key issue is determining where connect the networks. This paper introduces new optimization problem whose objective minimize...

10.1109/ict-dm47966.2019.9032905 article EN 2019-12-01

Memory allocation problem has two independent goals: minimization of number memories and registers in one memory. Our concern is the ordering bindings during memory allocation. We formulate analyze three different algorithms by changing their binding order. It shown that when we combine these subtasks solve them simultaneously heuristic cost function significant savings (up to 20%) can be obtained total area memories.

10.1109/aspdac.1997.600131 article EN Proceedings of the ASP-DAC Asia and South Pacific Design Automation Conference, 2003. 2002-11-22

Shared mesh protection (SMP) protects traffic against failures occurring in a working path, as with linear protection, and allows resource sharing of paths different endpoints.The SMP mechanism coordinates multiple that require shared resources when occur on paths.When networks limited resources, activation can fail because some the path are already use.In this case, node confirming is not available has option to wait until or withdraw path.In study, we recognize switching time number...

10.3837/tiis.2021.07.015 article EN KSII Transactions on Internet and Information Systems 2021-07-31
Coming Soon ...