- Energy Efficient Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Energy Harvesting in Wireless Networks
- Security in Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Blockchain Technology Applications and Security
- Network Security and Intrusion Detection
- Machine Learning in Healthcare
- Advanced Text Analysis Techniques
- Advanced Wireless Communication Technologies
- Software-Defined Networks and 5G
- Advanced Malware Detection Techniques
- Opportunistic and Delay-Tolerant Networks
- Artificial Intelligence in Healthcare
- EEG and Brain-Computer Interfaces
- Brain Tumor Detection and Classification
- Photonic and Optical Devices
- Plasmonic and Surface Plasmon Research
- Sentiment Analysis and Opinion Mining
- Advanced Steganography and Watermarking Techniques
- Underwater Vehicles and Communication Systems
- Advanced Fiber Optic Sensors
- Analytical Chemistry and Sensors
- Ovarian function and disorders
- Acute Ischemic Stroke Management
Woosong University
2022-2025
Jeonbuk National University
2014-2024
Gono University
2024
Hajee Mohammad Danesh Science and Technology University
2024
Universiti Malaysia Pahang Al-Sultan Abdullah
2023
ORCID
2020
Kunsan National University
2017
Chonbuk National University Hospital
2012-2014
Blockchain technology is becoming increasingly attractive to the next generation, as it uniquely suited information era. can also be applied Internet of Things (IoT). The advancement IoT in various domains has led substantial progress distributed systems. concept requires a decentralized data management system for storing and sharing transactions network. This paper discusses blockchain relevant factors that provide detailed analysis potential security attacks presents existing solutions...
Advancements in Healthcare Internet of Things (H-IoT) systems have created new opportunities and solutions for healthcare services, including the remote treatment monitoring patients. In addition, security privacy personal health data must be ensured during transfer. Security breaches H-IoT can serious safety legal implications. This comprehensive review provides insights about secured accession by employing cryptographic platforms such as big data, blockchain, machine learning deep...
Predicting the time, location and magnitude of an earthquake is a challenging job as does not show specific patterns resulting in inaccurate predictions. Techniques based on Artificial Intelligence (AI) are well known for their capability to find hidden data. In case prediction, these models also produce promising outcome. This work systematically explores contributions made date prediction using AI-based techniques. A total 84 scientific research papers, which reported use techniques have...
The Internet of Things (IoT) integrates billions self-organized and heterogeneous smart nodes that communicate with each other without human intervention. In recent years, IoT based systems have been used in improving the experience many applications including healthcare, agriculture, supply chain, education, transportation traffic monitoring, utility services etc. However, node heterogeneity raised security concern which is one most complicated issues on IoT. Implementing measures,...
Background According to the World Health Organization (WHO), dementia is seventh leading reason of death among all illnesses and one causes disability world’s elderly people. Day by day number Alzheimer’s patients rising. Considering increasing rate dangers, disease should be diagnosed carefully. Machine learning a potential technique for diagnosis but general users do not trust machine models due black-box nature. Even, some those provide best performance because using only neuroimaging...
In this paper, a proper concept of kind photonic crystal fiber known as D-shaped PCF sensor based on SPR or Surface Plasmon Resonance phenomenon has been discussed. The analysis performed numerically using FEM Finite Element Method and PML (Perfectly Matched Layer) boundary conditions. Modal keeping the smallest mesh possible. main mechanism is interaction between core guided light beam metal layer surface that generates free electrons. proposed shows refractive index detection range...
Medical Imaging is the most significant technique that constitutes information needed to diagnose and make right decisions for treatment. These images suffer from inadequate contrast noise occurs during image acquisition. Thus, denoising enhancement crucial in increasing visual quality of obtaining quantitative measures. In this research, an innovative improvised implemented applies a sparse aware with convolution neural network (SA_CNN) investigating various medical modalities. To evaluate...
Blockchain is attracting more and attention to its applicability in the fields of Internet Things (IoT). In particular, it able store data unalterable blocks, associated with secure peer-to-peer a growing problem transaction authorization industrial service provisioning applications. Moreover, facilitates decentralized (TX) validation distributed ledger. The underneath algorithm TX selection for may not be effective terms delay various services Because existing random-based or fee-based...
Cerebral strokes, the abrupt cessation of blood flow to brain, lead a cascade events, resulting in cellular damage due oxygen and nutrient deprivation. Contemporary lifestyle factors, including high glucose levels, heart disease, obesity, diabetes, heighten risk stroke. This research investigates application robust machine learning (ML) algorithms, logistic regression (LR), random forest (RF), K-nearest neighbor (KNN), prediction cerebral strokes. Stroke data is collected from Harvard...
Background/Objectives: Polycystic Ovary Syndrome (PCOS) is a multifactorial endocrine disorder with significant clinical and reproductive implications. Identifying dose–response relationships between clinical, physical, factors PCOS can enhance diagnostic accuracy inform treatment strategies. This study utilized data-driven approach to analyze the associations key factors, including age, weight, menstrual cycle length, Anti-Mullerian Hormone (AMH) levels, follicle count, prevalence. Methods:...
The IPv6 routing protocol for low power and lossy networks (RPL) was designed to satisfy the requirements of a wide range Internet Things (IoT) applications, including industrial environmental monitoring. In most scenarios, different from an ordinary environment, monitoring system under emergency scenarios needs not only periodically collect information sensing region, but also respond rapidly some unusual situations. system, particularly when event occurs in surge data generated by sensors...
Clustering is an effective way to prolong the lifetime of a wireless sensor network (WSN). The common approach elect cluster heads take routing and controlling duty, periodically rotate each head's role distribute energy consumption among nodes. However, significant amount dissipates due control messages overhead, which results in shorter lifetime. This paper proposes energy-centric cluster-based mechanism WSNs. To begin with, are elected based on higher ranks rank defined by residual...
Lately, the Internet of Things (IoT) has opened up new opportunities to business and enterprises; however, cost providing security privacy best practices is preventing numerous organizations from adopting this innovation. With proliferation connecting devices in IoT, significant increases have been recorded energy use, harmful contamination e-waste. A paradigm green IoT aimed at designing environmentally friendly protocols by reducing carbon impact promote efficient techniques for use. There...
The emergence of an array new wireless networks has led researchers to evaluate the prospect utilizing physical properties medium in order design secure systems. In this paper, layer secrecy performance a mixed radio frequency-free space optical (RF-FSO) system with variable gain relaying scheme is investigated presence eavesdropper. We assume that eavesdropper can wiretap transmitted confidential data from RF link only. It further assumed main and links are modeled as generalized Gamma (GG)...
In this paper, an asymmetric photonic crystal fiber (PCF) working on surface plasmon resonance (SPR) has been proposed and demonstrated using the wavelength interrogation method lower birefringence peak method. The sensor contains a D-shaped analyte channel that can detect unknown analytes within sensing range of 1.42–1.47 refractive index units (RIU) analytes. structural asymmetry induces orthogonal x y polarization modes. numerical investigations with finite element (FEM) reveal maximum...
Data/tasks of Industrial Internet Things (IIoT) are extremely private and valuable to computing. Edge computing facilitates IIoT services by offering platforms supportive facilities functionalities. However, the convergence intelligent edge has been held back need develop systems for maintaining security privacy. In this article, we propose a new framework securely confidentially sending, storing, tasks. This employs lightweight encryption scheme alongside modified ElGamal digital signature...
This research is an attempt to examine the recent status and development of scientific studies on use machine learning algorithms model air pollution challenges. study uses Web Science database as a primary search engine covers over 900 highly peer-reviewed articles in period 1990–2022. Papers published these topics were evaluated using VOSViewer biblioshiny software identify visualize significant authors, key trends, nations, publications, journals working issues. The findings show that...
This research proposes a ground-breaking technique for protecting agricultural fields against animal invasion, addressing key challenge in the agriculture industry. The suggested system guarantees real-time intrusion detection and quick reactions by combining cutting-edge sensor technologies, image processing capabilities, Internet of Things (IoT), successfully safeguarding crops reducing losses. study involves thorough examination five models—Inception, Xception, VGG16, AlexNet,...