Second Half of 2023

Optimizing LRU Lock Management in the Linux Kernel for Improving Parallel Write Throughout in Many-Core CPU Systems

Modern HPC systems are equipped with many-core CPUs with dozens of cores. When performing parallel I/O in such a system, there is a limit to scalability due to the problem of the LRU lock management policy of the Linux system. The study proposes an i...
show more
Effect Analysis of Data Imbalance for Emotion Recognition Based on Deep Learning

In recent years, as online counseling for infants and adolescents has increased, CNN-based deep learning models are widely used as assistance tools for emotion recognition. However, since most emotion recognition models are trained on mainly adult da...
show more

Unlicensed Band Traffic and Fairness Maximization Approach Based on Rate-Splitting Multiple Access

As the spectrum shortage problem has accelerated by the emergence of various services, New Radio-Unlicensed (NR-U) has appeared, allowing users who communicated in licensed bands to communicate in unlicensed bands. However, NR-U network users reduce ...
show more

A Study on the Image/Video Data Processing Methods for Edge Computing-Based Object Detection Service

Unlike cloud computing, edge computing technology analyzes and judges data close to devices and users, providing advantages such as real-time service, sensitive data protection, and reduced network traffic. EdgeX Foundry, a representative open source...
show more

First Half of 2023

Digital Twin-Based Communication Optimization Method for Mission Validation of Swarm Robot

Robots are expected to expand their scope of application to the military field and take on important missions such as surveillance and enemy detection in the coming future warfare. Swarm robots can perform tasks that are difficult or time-consuming f...
show more
Development of a Real-Time Control & Management System with In-Vitro Diagnostic Medical Device for Dengue Fever

Dengue virus transmission is a viral infection disease between humans and Aedes mosquitoes. Dengue is ubiquitous throughout the tropics and subtropical zones, where 1/3 of the global population live. The weather in Korea is also changing to subtropic...
show more

Performance Evaluation Using Neural Network Learning of Indoor Autonomous Vehicle Based on LiDAR

Data processing through the cloud causes many problems, such as latency and increased communication costs in the communication process. Therefore, many researchers study edge computing in the IoT, and autonomous driving is a representative applicatio...
show more

Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK

Block cipher is not expected to be safe for quantum computer, as Grover's algorithm reduces the security strength by accelerating brute-force attacks on symmetric key ciphers. So it is necessary to check the post-quantum security strength by implemen...
show more

Second Half of 2022

Dynamic Resource Adjustment Operator Based on Autoscaling for Improving Distributed Training Job Performance on Kubernetes

One of the many tools used for distributed deep learning training is Kubeflow, which runs on Kubernetes, a container orchestration tool. TensorFlow jobs can be managed using the existing operator provided by Kubeflow. However, when considering the di...
show more
Automobile Cruise Control System Using PID Controller and Kalman Filter

In this paper, the PID controller and Kalman filter are applied to improve the automobile cruise control in the environment with disturbance and noise, and the performance is verified through diverse simulation. First, a mathematical model for a auto...
show more

A Study on the System for AI Service Production

As various services using AI technology are being developed, much attention is being paid to AI service production. Recently, AI technology is acknowledged as one of ICT services, a lot of research is being conducted for general-purpose AI service p...
show more

GPU Resource Contention Management Technique for Simultaneous GPU Tasks in the Container Environments with Share the GPU

In a container-based cloud environment, multiple containers can share a graphical processing unit (GPU), and GPU sharing can minimize idle time of GPU resources and improve resource utilization. However, in a cloud environment, GPUs, unlike CPU or m...
show more

First Half of 2022

Design and Evaluation of 32-Bit RISC-V Processor Using FPGA

RISC-V is an open-source instruction set architecture which has a simple base structure and can be extensible depending on the purpose. In this paper, we designed a small and low-power 32-bit RISC-V processor to establish the base for research on RIS...
show more
Teacher-Student Architecture Based CNN for Action Recognition

Convolutional neural network (CNN) generally uses two-stream architecture RGB and optical flow stream for its action recognition function. RGB frames stream display appearance and optical flow stream interprets its action. However, the standard metho...
show more

Transfer Learning Technique for Accelerating Learning of Reinforcement Learning-Based Horizontal Pod Autoscaling Policy

Recently, many studies using reinforcement learning-based autoscaling have been performed to make autoscaling policies that are adaptive to changes in the environment and meet specific purposes. However, training the reinforcement learning-based Hori...
show more

A Study on the Blockchain-Based Access Control Using Random-List in Industrial Control System

Industrial control systems that manage and maintain various industries were mainly operated in closed environment without external connection, but with the recent development of the Internet and the introduction of ICT technology, the access to the i...
show more

Second Half of 2021

Hybrid All-Reduce Strategy with Layer Overlapping for Reducing Communication Overhead in Distributed Deep Learning

Since the size of training dataset become large and the model is getting deeper to achieve high accuracy in deep learning, the deep neural network training requires a lot of computation and it takes too much time with a single node. Therefore, distri...
show more
Optimized Implementation of Block Cipher PIPO in Parallel-Way on 64-bit ARM Processors

The lightweight block cipher PIPO announced at ICISC’20 has been effectively implemented by applying the bit slice technique. In this paper, we propose a parallel optimal implementation of PIPO for ARM processors. The proposed implementation enables ...
show more

Equal Energy Consumption Routing Protocol Algorithm Based on Q-Learning for Extending the Lifespan of Ad-Hoc Sensor Network

Recently, smart sensors are used in various environments, and the implementation of ad-hoc sensor networks (ASNs) is a hot research topic. Unfortunately, traditional sensor network routing algorithms focus on specific control issues, and they can’t b...
show more

Task Migration in Cooperative Vehicular Edge Computing

With the rapid development of the Internet of Things(IoT) technology recently, multi-access edge computing(MEC) is emerged as a next-generation technology for real-time and high-performance services. High mobility of users between MECs with limited s...
show more

First Half of 2021

High Quality Video Streaming System in Ultra-Low Latency over 5G-MEC

The Internet including mobile networks is developing to overcoming the limitation of physical distance and providing or acquiring information from remote locations. However, the systems that use video as primary information require higher bandwidth f...
show more
Fat Client-Based Abstraction Model of Unstructured Data for Context-Aware Service in Edge Computing Environment

With the recent advancements in the Internet of Things, context-aware system that provides customized services become important to consider. The existing context-aware systems analyze data generated around the user and abstract the context informatio...
show more

Performance Analysis of QUIC Protocol for Web and Streaming Services

The IETF has recently been standardizing the QUIC protocol for HTTP/3 services. It is noted that HTTP/3 uses QUIC as the underlying protocol, whereas HTTP/1.1 and HTTP/2 are based on TCP. Differently from TCP, the QUIC uses 0-RTT or 1-RTT transmissi...
show more

A New Incentive Based Bandwidth Allocation Scheme For Cooperative Non-Orthogonal Multiple Access

Non Orthogonal Multiple Access (NOMA) is a technology to guarantee the explosively increased Quality of Service(QoS) of users in 5G networks. NOMA can remove the frequent orthogonality in Orthogonal Multiple Access (OMA) while allocating the power d...
show more

Second Half of 2020

Design of a Lightweight Security Protocol Using Post Quantum Cryptography

As the IoT (Internet of Things) era is activated, a lot of information including personal information is being transmitted through IoT devices. For information protection, it is important to perform cryptography communication, and it is required to u...
show more
Deployment and Performance Analysis of Data Transfer Node Cluster for HPC Environment

Collaborative research in science applications based on HPC service needs rapid transfers of massive data between research colleagues over wide area network. With regard to this requirement, researches on enhancing data transfer performance between m...
show more

Natural Language Processing Model for Data Visualization Interaction in Chatbot Environment

With the spread of smartphones, services that want to use personalized data are increasing. In particular, healthcare-related services deal with a variety of data, and data visualization techniques are used to effectively show this. As data visualiza...
show more

Distributed Edge Computing for DNA-Based Intelligent Services and Applications: A Review

Nowadays, Data-Network-AI (DNA)-based intelligent services and applications have become a reality to provide a new dimension of services that improve the quality of life and productivity of businesses. Artificial intelligence (AI) can enhance the val...
show more

First Half of 2020

CNN Architecture Predicting Movie Rating from Audience’s Reviews Written in Korean

In this paper, we present a movie rating prediction architecture based on a convolutional neural network (CNN). Our prediction architecture extends TextCNN, a popular CNN-based architecture for sentence classification, in three aspects. First, charac...
show more
Fully Automatic Heart Segmentation Model Analysis Using Residual Multi-Dilated Recurrent Convolutional U-Net

In this paper, we proposed that a fully automatic multi-class whole heart segmentation algorithm using deep learning. The proposed method is based on U-Net architecture which consist of recurrent convolutional block, residual multi-dilated convolutio...
show more

Advanced FEC Scheme Considering Energy and Link-Quality for Solar-Powered WSNs

In Solar-powered wireless sensor networks(SP-WSN), the battery is periodically charged, so the best use of harvested energy is more important, rather than minimizing energy consumption. Meanwhile, as is well known, the reliability of communication be...
show more

Proactive Caching Strategy Based on Optimal Content Distribution in Content Centric Vehicular Networks

In vehicular communications environment, content pre-caching can reduce the delay time from the user to the content server. However, the problem of where and how much pre-caching is still not solved. In this paper, based on the movement probability o...
show more

Second Half of 2019

Transmission Latency-Aware MAC Protocol Design for Intra-Body Communications

Intra-Body Communication (IBC) is a communication method using the human body as a communication medium. The fact that our human body consists of water and electrolyte allow such communication method could work and have strength in low-power. Howeve...
show more
Parallelization of Genome Sequence Data Pre-Processing on Big Data and HPC Framework

Analyzing next-generation genome sequencing data in a conventional way using single server may take several tens of hours depending on the data size. However, in order to cope with emergency situations where the results need to be known within a few ...
show more

Multi-Hop Vehicular Cloud Construction and Resource Allocation in VANETs

Vehicular cloud computing is a new emerging technology that can provide drivers with cloud services to enable various vehicular applications. A vehicular cloud is defined as a set of vehicles that share their own resources. Vehicles should collaborat...
show more

Evaluation of Distributed Intrusion Detection System Based on MongoDB

Due to the development and increased usage of Internet services such as IoT and cloud computing, a large number of packets are being generated on the Internet. In order to create a safe Internet environment, malicious data that may exist among these ...
show more

First Half of 2019

Blockchain Based Financial Portfolio Management Using A3C

In the financial investment management strategy, the distributed investment selecting and combining various financial assets is called portfolio management theory. In recent years, the blockchain based financial assets, such as cryptocurrencies, have...
show more
Distributed Processing System Design and Implementation for Feature Extraction from Large-Scale Malicious Code

Traditional Malware Detection is susceptible for detecting malware which is modified by polymorphism or obfuscation technology. By learning patterns that are embedded in malware code, machine learning algorithms can detect similar behaviors and repla...
show more

Machine Learning Approach for Pattern Analysis of Energy Consumption in Factory

This paper describes the pattern analysis for data of the factory energy consumption by using machine learning method. While usual statistical methods or approaches require specific equations to represent the physical characteristics of the plant, ma...
show more

MSHR-Aware Dynamic Warp Scheduler for High Performance GPUs

Recent graphic processing units (GPUs) provide high throughput by using powerful hardware resources. However, massive memory accesses cause GPU performance degradation due to cache inefficiency. Therefore, the performance of GPU can be improved by re...
show more