Zobrazeno 1 - 10
of 183
pro vyhledávání: '"Chan Yeob Yeun"'
Autor:
S. Phani Praveen, Mohammad Kamrul Hasan, Siti Norul Huda Sheikh Abdullah, Uddagiri Sirisha, N. S. Koti Mani Kumar Tirumanadham, Shayla Islam, Fatima Rayan Awad Ahmed, Thowiba E. Ahmed, Ayman Afrin Noboni, Gabriel Avelino Sampedro, Chan Yeob Yeun, Taher M. Ghazal
Publikováno v:
Frontiers in Medicine, Vol 11 (2024)
IntroductionGlobal Cardiovascular disease (CVD) is still one of the leading causes of death and requires the enhancement of diagnostic methods for the effective detection of early signs and prediction of the disease outcomes. The current diagnostic t
Externí odkaz:
https://doaj.org/article/261f8a01b402474884413969dc986db6
Autor:
Song-Kyoo Kim, Xiaomei Feng, Hussam Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Sivaprasad Nandyala
Publikováno v:
IEEE Access, Vol 12, Pp 115296-115305 (2024)
In the area of machine learning (ML) training data optimization through the construction of compact data, the focus of this paper is presented. The concept of compact data design, aimed at creating an optimized dataset that maximizes benefits without
Externí odkaz:
https://doaj.org/article/2419f89ddae04656bf3448a2833fcae4
Autor:
Zhibo Zhang, Sani Umar, Ahmed Y. Al Hammadi, Sangyoung Yoon, Ernesto Damiani, Claudio Agostino Ardagna, Nicola Bena, Chan Yeob Yeun
Publikováno v:
IEEE Access, Vol 11, Pp 18134-18147 (2023)
The major aim of this paper is to explain the data poisoning attacks using label-flipping during the training stage of the electroencephalogram (EEG) signal-based human emotion evaluation systems deploying Machine Learning models from the attackers
Externí odkaz:
https://doaj.org/article/2ac112990c0941649ed2c9b08829c4d2
Publikováno v:
IEEE Access, Vol 10, Pp 14463-14479 (2022)
The breakthrough of blockchain technology has facilitated the emergence and deployment of a wide range of unmanned aerial vehicles (UAV) networks-based applications. Yet, the full utilization of these applications is still limited due to the fact tha
Externí odkaz:
https://doaj.org/article/937005d0b8f3460181bb4e3cd108c776
Publikováno v:
IEEE Access, Vol 10, Pp 21941-21954 (2022)
This study discusses the general overview of Timed Efficient Stream Loss-tolerant Authentication (TESLA) protocol, including its properties, key setups, and improvement protocols. The discussion includes a new proposed two-level infinite $\mu $ TESLA
Externí odkaz:
https://doaj.org/article/64915bbd02734d73be35c69e2a9a3bac
Publikováno v:
IEEE Access, Vol 10, Pp 93104-93139 (2022)
This survey presents a comprehensive review of current literature on Explainable Artificial Intelligence (XAI) methods for cyber security applications. Due to the rapid development of Internet-connected systems and Artificial Intelligence in recent y
Externí odkaz:
https://doaj.org/article/ff09ccc2b1a846f5af2c92dc43b88b8c
Autor:
Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Victor Mateu, Yousof Al-Hammadi
Publikováno v:
IEEE Access, Vol 10, Pp 54912-54921 (2022)
Continuous and low-cost broadcast authentication is a fundamental security service for distributed sensor networks. This paper presents a novel development of a continuous and low-overhead broadcast authentication protocol named enhanced Infinite tim
Externí odkaz:
https://doaj.org/article/d8609670b62648f9a9db3d179447f8dc
Autor:
Mohammad Z. Shanti, Chung-Suk Cho, Young-Ji Byon, Chan Yeob Yeun, Tae-Yeon Kim, Song-Kyoo Kim, Ahmed Altunaiji
Publikováno v:
IEEE Access, Vol 9, Pp 166603-166616 (2021)
The safety of workers at construction sites is one of the most important aspects that should be considered while performing their required tasks. Many rules and regulations have been implemented in the UAE to reduce injuries and fatalities in the job
Externí odkaz:
https://doaj.org/article/f3fcac092ec84543aa7f3b6b31ea8dca
Autor:
Hyoung-Kyu Song, Ebrahim AlAlkeem, Jaewoong Yun, Tae-Ho Kim, Hyerin Yoo, Dasom Heo, Myungsu Chae, Chan Yeob Yeun
Publikováno v:
BMC Bioinformatics, Vol 21, Iss 1, Pp 1-11 (2020)
Abstract Background Recognition is an essential function of human beings. Humans easily recognize a person using various inputs such as voice, face, or gesture. In this study, we mainly focus on DL model with multi-modality which has many benefits in
Externí odkaz:
https://doaj.org/article/4ba05541247d4c9581e8154414056da0
Publikováno v:
IEEE Access, Vol 8, Pp 118732-118740 (2020)
Nuclear Power Plants (NPPs) are physically isolated from external networks and have different operational environments than conventional information technology (IT) systems. Accordingly, NPPs were regarded as safe from external cyber-attacks. However
Externí odkaz:
https://doaj.org/article/46cf2cd5df6e4008a764be09e79b3ad0