Mucheol Kim

ORCID: 0000-0003-2682-2195
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Recommender Systems and Techniques
  • Privacy-Preserving Technologies in Data
  • IoT and Edge/Fog Computing
  • Web Data Mining and Analysis
  • Semantic Web and Ontologies
  • Cloud Computing and Resource Management
  • Caching and Content Delivery
  • Technology and Data Analysis
  • Blockchain Technology Applications and Security
  • Access Control and Trust
  • Innovation in Digital Healthcare Systems
  • Mobile Ad Hoc Networks
  • Spam and Phishing Detection
  • Evacuation and Crowd Dynamics
  • Mobile Crowdsensing and Crowdsourcing
  • Complex Network Analysis Techniques
  • Multimedia Communication and Technology
  • Advanced Graph Neural Networks
  • Energy Efficient Wireless Sensor Networks
  • Diverse Approaches in Healthcare and Education Studies
  • Cloud Data Security Solutions
  • Urban Transport and Accessibility
  • Opinion Dynamics and Social Influence
  • Technology Adoption and User Behaviour
  • Data Management and Algorithms

Chung-Ang University
2009-2025

ORCID
2019

Wonkwang University
2017-2018

Sungkyul University
2014-2017

Korea Institute of Science & Technology Information
2012-2014

A typical growth of cells inside tissue is normally known as a nodular entity. Lung nodule segmentation from computed tomography (CT) images becomes crucial for early lung cancer diagnosis. An issue that pertains to the nodules homogenous modular variants. The resemblance among well neighboring regions very challenging deal with. Here, we propose an end-to-end U-Net-based framework named DA-Net efficient segmentation. This method extracts rich features by integrating compactly and densely...

10.3390/math9131457 article EN cc-by Mathematics 2021-06-22

This study aims to select disaster resistance roads in urban areas which require management through their topological relationship and by the consideration of roads' durable resilient attributes against disaster. Disaster road network means a safe that are used dynamically according various scenarios. The requires high accessibility resistance. In some cases, as an evacuation route secure safety citizens, preserve human resources, transport emergency supplies areas. Upon occurrence disaster,...

10.1016/j.scs.2023.104650 article EN cc-by-nc-nd Sustainable Cities and Society 2023-05-17

Business-to-business (B2B) organisations are increasingly utilising electronic devices in their business operations order to succeed competitive markets. This trend is prevalent the growing Asian markets, especially small and medium-sized enterprises (SMEs) sector. While prior research has focused on this issue context of large business-to-customer (B2C) Asia, there have hardly been any studies that shed light B2B sector SME setting. study aims critically explore e-marketing critical success...

10.1080/17517575.2016.1177205 article EN Enterprise Information Systems 2016-04-18

Cities are vulnerable to a range of disasters that can occur simultaneously due their complexity. Therefore, an effective disaster response plan is needed reduce the vulnerability cities. In particular, evacuation route management important for reducing losses from disaster. Efficient be realized by searching suitable routes and road network management. this paper, we propose framework based on multilayered structure our network. The suggested consists three layers An A* algorithm-based...

10.1177/00368504231152770 article EN cc-by-nc Science Progress 2023-01-01

As the frequency of disasters increases worldwide, it has become increasingly important to raise awareness risks and mitigate their effects through effective disaster management. Anticipating ensuring timely evacuations are crucial. This paper proposes SafeWitness, which dynamically captures evolving characteristics by integrating crowdsensing GIS-based geofencing. It not only enables real-time evacuation support but also provides spatial context mapping area based on GIS road information...

10.3390/fractalfract9030156 article EN cc-by Fractal and Fractional 2025-03-03

Blockchain, which started as a cryptocurrency bitcoin, has recently been applied to various fields such finance, distribution, and public services beyond the category of cryptocurrency. In this paper, we propose music distribution model protect copyrights rights holders' based on blockchain smart contract technology. By designing implementing blockchain-based model, it organizes assets into blocks distributes them among participating nodes, providing integrity, confidentiality...

10.1109/ictc49870.2020.9289184 article EN 2021 International Conference on Information and Communication Technology Convergence (ICTC) 2020-10-21

ABSTRACT As interest in social network studies has grown bigger along with the development of Web, trust management and applications have come into spotlight. The increasing services that are open systems motivated need for a reliable model enables practical information sharing protection. In this paper, we propose an identity management‐based solving sparsity problem leakage. proposed contributes to opportunities sharing. addition, creation use groups clustering approach partial identities...

10.1002/sec.379 article EN Security and Communication Networks 2011-10-03

A new wavelet threshold denoising function and an improved are proposed. It not only retains the advantages of hard soft functions but also overcomes disadvantages continuity problem constant deviation in method. In case conditions, has a better performance outstanding image details. can adapt to different images by joining adjusting factor. Simulation results show that ability performing details higher peak signal noise ratio (PSNR).

10.1155/2015/670216 article EN cc-by International Journal of Distributed Sensor Networks 2015-09-01

Blockchain is not only for the financial domain anymore. It evolves to accommodate a broad range of domains and applications where trust privacy are required smooth transitions. As blockchain evolving, researchers automating tasks better security performance. The management system monitors specific like transaction management, consensus, block security, network security. comprises specialized engineers software platform. This study explores opportunity Machine learning concepts work with...

10.1109/csci51800.2020.00138 article EN 2021 International Conference on Computational Science and Computational Intelligence (CSCI) 2020-12-01

As the frequency of disasters increases worldwide, resilience planning through disaster management has become critical. Disaster managers must make difficult decisions prioritizing various evacuation routes with limited road resources. This study proposes a network reconfiguration (RnR) framework for planning. The proposed model method to reconfigure that can consider factors based on open-source geographical information systems data. first presents big data processing generating an plan...

10.1016/j.scs.2021.103386 article EN cc-by-nc-nd Sustainable Cities and Society 2021-09-27

The development of information technology allows the collaborative business process to be run across multiple enterprises in a larger market environment. However, while expands realm businesses, it also causes various hazards Interaction, such as data falsification, inconstancy, and misuse. To solve these issues, blockchain-based modeling approach was proposed analyzed. existing studies lack blockchain risk problem-solving specification, there is no verification technique examine process....

10.32604/csse.2023.036658 article EN cc-by Computer Systems Science and Engineering 2023-01-01

This study highlights the importance of physical layer and its impact on network performance in Mobile Ad Hoc Networks (MANETs). was demonstrated by simulating various MANET scenarios using Network Simulator-2 ( NS-2 ) with enhanced capability adding propagation loss models (e.g., modified Two-Ray Ground model, ITU Line Sight Nonline (ITU-LoS NLoS) model into street canyons combined path shadowing (C-Shadowing)). The simulation results were then compared original (TRG) already available ....

10.1155/2015/286270 article EN cc-by Journal of Sensors 2015-01-01

In the modern days of Big Data, curation data has become more and important, especially for handling high volume complex systems. With volumes growing exponentially, along with increasing variety heterogeneity sources, acquiring you may need analysis a costly time-consuming process. Multiple sets from various sources must be first processed connected before they can used by big analytics tools. Publication presentation are also very important. However, traditional systems not designed this...

10.1109/access.2016.2642979 article EN cc-by-nc-nd IEEE Access 2016-12-21

Recently, the range of Internet things (IoT) technology could be utilized in real world by rapid spread sensor devices.Various sensed information such as temperature, illumination, pressure, and object detection has become a basic point for solving solutions to complex problems that have been difficult solve convergence with big data.Particularly, not only human health changes natural environment but also development analysis application is continuing.As result, it expected dramatically...

10.1155/2019/1654013 article EN Journal of Sensors 2019-02-17

With the development of ICT technology, users are actively participated in content creation and sharing. Service providers have provided more diverse extensive information services. recent evolution to a customized service, demand for use personal is increasing. However, it affects efficiency convenience service provision, as social problems security threats such leakage, human trafficking, misuse increase. In this article, we proposed an intelligent mediator-based enhanced smart contract...

10.1145/3404892 article EN ACM Transactions on Internet Technology 2021-01-05
Coming Soon ...