- Network Traffic and Congestion Control
- IoT and Edge/Fog Computing
- Internet Traffic Analysis and Secure E-voting
- Privacy-Preserving Technologies in Data
- Software Testing and Debugging Techniques
- Caching and Content Delivery
- Educational Systems and Policies
- Mobile Agent-Based Network Management
- Software-Defined Networks and 5G
- Opportunistic and Delay-Tolerant Networks
- Image and Video Quality Assessment
- Visual Attention and Saliency Detection
- Quantum Information and Cryptography
- IPv6, Mobility, Handover, Networks, Security
- Peer-to-Peer Network Technologies
- Smart Grid Security and Resilience
- Information and Cyber Security
- Augmented Reality Applications
- Cloud Data Security Solutions
- Advanced Wireless Communication Technologies
- Software Reliability and Analysis Research
- Wireless Communication Networks Research
- Traffic Prediction and Management Techniques
- Advanced Data and IoT Technologies
- Energy Efficient Wireless Sensor Networks
Electronics and Telecommunications Research Institute
2018-2024
Pusan National University
2007-2011
The fifth generation (5G) and beyond wireless networks are envisioned to provide an integrated communication computing platform that will enable multipurpose intelligent driven by a growing demand for both traditional end users industry verticals. This evolution be realized innovations in core access capabilities, mainly from virtualization technologies ultra-dense networks, e.g., software-defined networking (SDN), network slicing, function (NFV), multi-access edge (MEC), terahertz (THz)...
Network-assisted congestion control leveraging Explicit Congestion Notification (ECN) is an effective way to deal with issues on the Internet. However, we believe that existing ECN mechanism in TCP/IP protocol stack may require further optimization effectively address evolving challenges introduced by emerging technologies like immersive AR/VR applications and burgeoning field of Internet Things (IoT). To end, propose a multilevel notification called Enhanced (EECN) leverages two bits IP...
Congestion in the network is a persistent issue that becoming more challenging with advent of technologies such as metaverse and immersive AR/VR applications. Therefore, we propose Enhanced ECN (EECN), novel network-assisted congestion feedback protocol redesigns legacy ECN. EECN notifies two levels encoded existing bits, unlike which delivers only Boolean information about congestion. Additionally, control algorithm leverages this multilevel from using EECN. Our proposed mechanism can...
This study developed a novel group management scheme based on clustered federated learning (FL) for mobile traffic prediction (referred to as FedGM) in edge computing (MEC) systems. In FedGM, improve the convergence time during FL procedure, we considered multiple MEC servers first be their geographic locations and augmented data patterns references clustering. each cluster, by alleviating straggler impact owing heterogeneity of servers, then designed that optimizes i) number groups created...
This article proposes a novel deep learning-based robust Internet of Things (IoT) sensor data transmission period control (DL-RDTPC) framework in an IoT edge computing system. In general, as the sensors increases, energy consumption is reduced, and contrarily, amount un-transmitted (i.e., missing values) becomes continuously accumulated. Therefore, server charge accurately imputing these for reliable analysis. By addressing this issue, we newly design imputation accuracy prediction (IAP)...
This letter proposes a novel edge-cloud interworking framework in the video analytics of Internet Things (IoT) that consists cost-effective job load balancing and scheduling schemes for computation-intensive applications. The proposed aims to minimize cost cloud resource usage while guaranteeing deadlines when conducting concurrent operations. A formulation two-stage mixed-integer problem its heuristic greedy algorithms is presented, which captures all intertwined goals. From numerical...
Immersive technologies such as virtual reality (VR), augmented (AR), and holograms will change users' digital experience. These immersive have a multitude of applications, including telesurgeries, teleconferencing, Internet shopping, computer games, etc. Holographic-type communication (HTC) is type media that provides an experience to users. However, HTC has different characteristics network requirements, the existing architecture transport protocols may not be able cope with stringent...
Software maintenance is a very expensive activity in software life cycle. As conventional systems, Web-based applications also needs considerable cost of efforts and general the more because their inherent complex architecture. To estimate maintainability software, many metrics have been proposed. This paper presents result an experimental study to explore relationship between some typical metrics. We collected time really spent for applications. In study, we found that web-based existing...
Recently, Multi-access edge computing (MEC)-empowered mobile augmented reality (MAR) has emerged as a prominent technology domain. It highlights the disruptive potential of MEC in context 5G, it empowers devices (MDs) with limited local processing capabilities by offering enhanced power, and also significantly reduces latency. Thus, this innovation attracted considerable attention from both industry academia. However, design challenge offloading management for MAR is highly complex due to...
Quantum Key Distribution (QKD) technology enables the capabilities to distribute secure keys consisting of symmetric random bit strings that can be proven even against a cyberattack with an unbounded computational ability. QKD, however, has critical limitations in terms scalability, availability and expense. QKD network (QKDN) is which addresses these shortcomings by control management extend reachability availability. This paper proposes architecture for QKDN address required functionality...
Terminal-independent service mobility is capability to keep using a while switching between terminals without disconnection. That allows users continue the active session different terminals. Recently Internet keeps evolving toward ubiquitous environment. Users may use lot of for particular IP and choose best terminal user's available depend on situation. In this paper, we propose TCS (terminal control server) concept terminal-independent mobility. The enables which fits ongoing among user...
With the advancement of immersive applications, edge computing and IoT technologies to deliver application service in an intuitive, immediate reliable manner, we propose a viewpoint networking framework for Trusted Reality which is bridge real-cyber world based on trust by integrating individual preferences surrounding objects provide users with desired services perform preliminary proof concept verify feasibility proposed framework.
본고에서는 한국에서 ‘개신교와 사회복지’의 모범으로서 평가되는 독일 개신교의 디아코니 사업을 역사적으로 고찰한다. 19세기 중반 개신교에서의 이해 방식을 고찰함으로써 당시 개념이 현대적 의미의 ''복지'' 개념과는 상이한 의미였으며, 현대의 ‘복지’ 개념과 상응하는 것으로 등장하는 때는 20세기 이후부터임을 논의한다. 이해방식에 대한 자료는 사업단 설립에 결정적인 역할을 한 요한 힌리히 비헤른(Johann Hinrich Wichern, 1808~1881)과 최근에 들어서 디아코니와 관련하여 많은 조명을 받는 빌헬름 뢰헤(Wilhelm Löhe, 1808~1872)를 중심으로 검토한다. 이들은 디아코니를 혁명과 산업화, 기근으로 인해 탈교회화되는 인민들을 재그리스도교화 하기 위한 내방선교의 실천적 활동으로 이해했다. 비헤른은 구제사업을 통해 인민의 신앙 회복과 교회공동체로의 복귀가 이루어져 궁극적으로 그리스도교적 국가 정립을 목표로 반면, 뢰헤는 참된 루터교 공동체를 실현하는...
The purpose of this study is to analyze Korean listening texts for academic purposes and based on authenticity the material intertextuality. In study, 4 types textbooks developed learners were selected each unit analyzed. area, whether real materials used genre are set, in intertextuality number difficulty texts, relationship arrangement between set. As a result analysis, textbook generally unified format, there no using three at same time. Also, as examining discourse genre, all focused...