- Recommender Systems and Techniques
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Web Data Mining and Analysis
- Semantic Web and Ontologies
- Cloud Computing and Resource Management
- Caching and Content Delivery
- Technology and Data Analysis
- Blockchain Technology Applications and Security
- Access Control and Trust
- Innovation in Digital Healthcare Systems
- Mobile Ad Hoc Networks
- Spam and Phishing Detection
- Evacuation and Crowd Dynamics
- Mobile Crowdsensing and Crowdsourcing
- Complex Network Analysis Techniques
- Multimedia Communication and Technology
- Advanced Graph Neural Networks
- Energy Efficient Wireless Sensor Networks
- Diverse Approaches in Healthcare and Education Studies
- Cloud Data Security Solutions
- Urban Transport and Accessibility
- Opinion Dynamics and Social Influence
- Technology Adoption and User Behaviour
- Data Management and Algorithms
Chung-Ang University
2009-2025
ORCID
2019
Wonkwang University
2017-2018
Sungkyul University
2014-2017
Korea Institute of Science & Technology Information
2012-2014
A typical growth of cells inside tissue is normally known as a nodular entity. Lung nodule segmentation from computed tomography (CT) images becomes crucial for early lung cancer diagnosis. An issue that pertains to the nodules homogenous modular variants. The resemblance among well neighboring regions very challenging deal with. Here, we propose an end-to-end U-Net-based framework named DA-Net efficient segmentation. This method extracts rich features by integrating compactly and densely...
This study aims to select disaster resistance roads in urban areas which require management through their topological relationship and by the consideration of roads' durable resilient attributes against disaster. Disaster road network means a safe that are used dynamically according various scenarios. The requires high accessibility resistance. In some cases, as an evacuation route secure safety citizens, preserve human resources, transport emergency supplies areas. Upon occurrence disaster,...
Business-to-business (B2B) organisations are increasingly utilising electronic devices in their business operations order to succeed competitive markets. This trend is prevalent the growing Asian markets, especially small and medium-sized enterprises (SMEs) sector. While prior research has focused on this issue context of large business-to-customer (B2C) Asia, there have hardly been any studies that shed light B2B sector SME setting. study aims critically explore e-marketing critical success...
Cities are vulnerable to a range of disasters that can occur simultaneously due their complexity. Therefore, an effective disaster response plan is needed reduce the vulnerability cities. In particular, evacuation route management important for reducing losses from disaster. Efficient be realized by searching suitable routes and road network management. this paper, we propose framework based on multilayered structure our network. The suggested consists three layers An A* algorithm-based...
As the frequency of disasters increases worldwide, it has become increasingly important to raise awareness risks and mitigate their effects through effective disaster management. Anticipating ensuring timely evacuations are crucial. This paper proposes SafeWitness, which dynamically captures evolving characteristics by integrating crowdsensing GIS-based geofencing. It not only enables real-time evacuation support but also provides spatial context mapping area based on GIS road information...
Blockchain, which started as a cryptocurrency bitcoin, has recently been applied to various fields such finance, distribution, and public services beyond the category of cryptocurrency. In this paper, we propose music distribution model protect copyrights rights holders' based on blockchain smart contract technology. By designing implementing blockchain-based model, it organizes assets into blocks distributes them among participating nodes, providing integrity, confidentiality...
ABSTRACT As interest in social network studies has grown bigger along with the development of Web, trust management and applications have come into spotlight. The increasing services that are open systems motivated need for a reliable model enables practical information sharing protection. In this paper, we propose an identity management‐based solving sparsity problem leakage. proposed contributes to opportunities sharing. addition, creation use groups clustering approach partial identities...
A new wavelet threshold denoising function and an improved are proposed. It not only retains the advantages of hard soft functions but also overcomes disadvantages continuity problem constant deviation in method. In case conditions, has a better performance outstanding image details. can adapt to different images by joining adjusting factor. Simulation results show that ability performing details higher peak signal noise ratio (PSNR).
Blockchain is not only for the financial domain anymore. It evolves to accommodate a broad range of domains and applications where trust privacy are required smooth transitions. As blockchain evolving, researchers automating tasks better security performance. The management system monitors specific like transaction management, consensus, block security, network security. comprises specialized engineers software platform. This study explores opportunity Machine learning concepts work with...
As the frequency of disasters increases worldwide, resilience planning through disaster management has become critical. Disaster managers must make difficult decisions prioritizing various evacuation routes with limited road resources. This study proposes a network reconfiguration (RnR) framework for planning. The proposed model method to reconfigure that can consider factors based on open-source geographical information systems data. first presents big data processing generating an plan...
The development of information technology allows the collaborative business process to be run across multiple enterprises in a larger market environment. However, while expands realm businesses, it also causes various hazards Interaction, such as data falsification, inconstancy, and misuse. To solve these issues, blockchain-based modeling approach was proposed analyzed. existing studies lack blockchain risk problem-solving specification, there is no verification technique examine process....
This study highlights the importance of physical layer and its impact on network performance in Mobile Ad Hoc Networks (MANETs). was demonstrated by simulating various MANET scenarios using Network Simulator-2 ( NS-2 ) with enhanced capability adding propagation loss models (e.g., modified Two-Ray Ground model, ITU Line Sight Nonline (ITU-LoS NLoS) model into street canyons combined path shadowing (C-Shadowing)). The simulation results were then compared original (TRG) already available ....
In the modern days of Big Data, curation data has become more and important, especially for handling high volume complex systems. With volumes growing exponentially, along with increasing variety heterogeneity sources, acquiring you may need analysis a costly time-consuming process. Multiple sets from various sources must be first processed connected before they can used by big analytics tools. Publication presentation are also very important. However, traditional systems not designed this...
Recently, the range of Internet things (IoT) technology could be utilized in real world by rapid spread sensor devices.Various sensed information such as temperature, illumination, pressure, and object detection has become a basic point for solving solutions to complex problems that have been difficult solve convergence with big data.Particularly, not only human health changes natural environment but also development analysis application is continuing.As result, it expected dramatically...
With the development of ICT technology, users are actively participated in content creation and sharing. Service providers have provided more diverse extensive information services. recent evolution to a customized service, demand for use personal is increasing. However, it affects efficiency convenience service provision, as social problems security threats such leakage, human trafficking, misuse increase. In this article, we proposed an intelligent mediator-based enhanced smart contract...