- IoT and Edge/Fog Computing
- Caching and Content Delivery
- Innovation in Digital Healthcare Systems
- Cloud Computing and Resource Management
- Advanced Wireless Communication Techniques
- Wireless Communication Networks Research
- Advanced Malware Detection Techniques
- Cloud Data Security Solutions
- Software Reliability and Analysis Research
- Internet of Things and Social Network Interactions
- Software Engineering Research
- Security and Verification in Computing
- Advanced MIMO Systems Optimization
- Digital and Cyber Forensics
- IoT-based Smart Home Systems
- Blockchain Technology Applications and Security
- User Authentication and Security Systems
- Power Line Communications and Noise
- Network Security and Intrusion Detection
- Anomaly Detection Techniques and Applications
- IoT Networks and Protocols
- Advanced Neural Network Applications
- Transportation and Mobility Innovations
- Video Surveillance and Tracking Methods
- Cooperative Communication and Network Coding
Dongguk University
2015-2025
LG (South Korea)
2024
Seokyeong University
2022
Kongju National University
2019-2021
Kimpo University
2018
Pennsylvania State University
2004-2006
Center for Information Technology
2004-2006
Samsung (South Korea)
2006
In aerial surveillance using drones, person re-identification (ReID) is crucial for public safety. However, low resolutions in drone footage often leads to a significant drop ReID performance of subjects. To investigate this issue, rather than relying solely on real-world datasets, we employed synthetic dataset that systematically captures variations altitude and distance. We also utilized an eXplainable Artificial Intelligence (XAI) framework analyze how affect ReID. Based our findings,...
As the sharing economic market grows, number of users is also increasing but many problems arise in terms reliability between providers and processing services. The existing methods provide shared systems that judge provider from viewpoint user. In this paper, we have developed a system for establishing mutual trust environment to solve problems. order implement can measure control users' situation environment, analyzed necessary factors cyber physical (CPS). addition, user measurement based...
The problem of transparency in donation systems has long been a topic for discussion. However, the emphasis on raises privacy concerns donors and recipients, with some people attempting to hide donations or receipt money. Therefore, system that guarantees is required avoid negative side effects. In this study, we developed protects personal information by using one-time account address based blockchain while emphasizing transparency. could contribute creation sustainable safe environment culture.
Today, the Internet of Things (IoT) is used for convenience in everyday life many areas. Owing to fact that data collected from IoT are generated large quantities, cloud computing inevitably store and analyze data. However, storage not owned by user, so it unreliable. Verifying integrity an environment stored a has two problems: amount needs be verified, verification should done directly on device. Many methods use trusted third parties devices provide sufficient resources. difficult apply...
Korean education-related evaluation agencies utilize a centralized system that directly manages learner data. This leaves the intellectual property of organizations and personal information students vulnerable to leakage should central server be attacked. In this study, researchers propose multilateral portfolio authentication guarantees reliability, integrity, transparency data such as learner's schooling history. The uses features blockchain in distributed network wherein submits peer...
We propose a novel method of packet loss type discrimination at the receiver in network which includes error-prone wireless link. Former studies using receiver-side’s inter-arrival time make many mistakes when there are several streams on simultaneously. Our approach is based statistical value received packets, and different from existing ones that only exploit current behavior network. In simulation result, we show our scheme more accurate than other for both cases single stream exists...
A virtual machine with a conventional offloading scheme transmits and receives all context information to maintain program consistency during communication between local environments the cloud server environment. Most overhead costs incurred are proportional size of transmitted over network. Therefore, existing synchronization structure that is not required for job execution when offloading, which increases transmitting in low-performance Internet-of-Things (IoT) devices. In addition,...
Nowadays, social inequality is an important problem. Donations are one of the many ways to improve inequality. Donation largely divided into sponsorship by individuals such as corporations and public administration. In individual sponsorship, it common donate a donation organization support aid recipients organization. Many people reluctant this because lack transparency. addition, organizations transparent formal administration due working capital. Therefore, paper proposes method enhance...
IEEE is interested in specifying the next generation 10 Gbps copper cable Ethernet network, termed 10000BASE-T, not too distant future. In search of a proper solution, we are investigating involved tradeoffs at every design step. The paper presents conceptual designs 10000BASE-T transmission system for distribution digital signal over /spl sim/100 meters standard CAT-5 cable. These make it possible to achieve this target average bit error rate (BER) 10/sup -10/ after equalization and...
Driven by the development of information and communication technology (ICT) along with social consciousness civil societies, a cultural practice donation using ICT resources is emerging.However, owing to problems trust transparency systems public revelations corruption on part some groups accepting donations, participation rate gradually decreasing.Because welfare considered problem that cannot be solved only state, operation sound organizations individuals can consistently donate...
This research investigates the use of neural computing techniques in communication networks and evaluates their performance based on error rate, delay, throughput. The results indicate that different techniques, such as Artificial Neural Networks (ANNs), Convolutional (CNNs), Recurrent (RNNs), Long Short-Term Memory (LSTM) Generative Adversarial (GANs) have trade-offs terms effectiveness improving performance. selection technique will base particular requirements application. also relative...
IEEE is interested in specifying the next generation 10 Gbit/s copper cable Ethernet network, termed 10GBASE-T. In design of a 10GBASE-T transmission system up to 100 meters standard category-6 (CAT-6) cable, equalization and decoding play significant role achieving reliable data communication. this paper, we focus on processes propose vector 4-dimensional trellis coded-modulation (TCM) with 10-PAM signaling. At receiver, joint multiple-input multiple-output survival path feedback equalizer...
Recently, the computing environments are developing to IoT services which exchange a lot of information using various and heterogeneous devices that always connected on networks. Since data communication take places including not only traditional mobile such as smartphone but also household appliances, embedded devices, sensor nodes, security requirements is getting more important at this point in time. In paper, compiler with secure software concept was proposed develop applications for services.
The developed security scheme for user authentication, which uses both a password and the various devices, is always open by malicious user.In order to solve that problem, keystroke dynamics introduced.A person's has unique pattern.That allows use of authenticate users.However, it problem users because an accuracy problem.And many people passwords, most them simple word such as "password" or numbers "1234."Despite already perceive not secure enough, they still easy remember.And have includes...
The Quiet Time Period (QTP) is a new feature introduced in IEEE 802.11ax standard to support the coexistence of Station-to-Station (S2S) and uplink/downlink WLAN. However, according standard, an AP has restriction that it should accept QTP procedure only if introduction would benefit network performance. Therefore, prior designing practical control scheme, necessary analyze effect on For this purpose, paper evaluates performance QTP, Uplink OFDMA Random Access (UORA), MU DL (Multi-User Down...
This paper proposes an intelligent recommendation system that has increasing promotion effect. Normally, suggests suitable product to consumer but the Intelligent Recommendation System recommends fit well-known person company for It uses weight based algorithm and matching model on relation graph.
본 논문에서는 스마트 폰과 휴리스틱 방법을 이용하여 수액 낙하 속도를 측정하고, 투여 시 종료하는 시간을 측정할 수 있는 의료 IT융합 시스템을 안드로이드 환경에서 개발하였다. 먼저 폰을 사용하여 수액이 낙하하는 영상을 촬영하고, 이를 임계값을 이진영상으로 변환한 후 n번째 프레임과 n-1번째 프레임의 차영상을 계산하였다. 이때 휴리스틱을 사용해서 정확하게 있기 위한 이진화 변환시에 최적의 구하는 일은 중요하다. 그리고 모바일 응용 프로그램 화면의 진행 상태바를 보면서 의사 처방에 맞는 주입 조절할 있다. 논문에서 제안한 기법으로 실험한 결과 영상 처리 기법을 일반 환자들에게 충분히 적용할 있도록 있음을 알 있었다. This paper describes the medical and IT convergence system using a smart phone heuristic method for measurement of dripping speed liquid in drip...
In this paper, we developed a graphical user interface of mobile application to control digital audio system remotely. Especially, the must many channels simultaneous. The number input channel is 4 and output 8. Also, it has lot components that are controlled by application. As result, an efficient memory management necessary in order execute operation hard cording needed on To solve problem, GridLayout used. screen size not problem operate android.