Zobrazeno 1 - 10
of 199
pro vyhledávání: '"Jemin, Lee"'
Publikováno v:
ETRI Journal, Vol 46, Iss 5, Pp 851-864 (2024)
Deep learning (DL) has significantly advanced artificial intelligence (AI); how-ever, frameworks such as PyTorch, ONNX, and TensorFlow are optimized for general-purpose GPUs, leading to inefficiencies on specialized accelerators such as neural proces
Externí odkaz:
https://doaj.org/article/a94f0974947b454984dc245bbc413c74
Publikováno v:
ICT Express, Vol 10, Iss 4, Pp 851-856 (2024)
As UWSN have received attention, a need for an efficient and secure communication protocol has arisen to overcome the low device performance, node failure, and high propagation latency. However, existing works are either specialized for one-to-one co
Externí odkaz:
https://doaj.org/article/0d21708844ca46cfaf6e46822a4825cb
Publikováno v:
ICT Express, Vol 9, Iss 3, Pp 517-524 (2023)
In the forthcoming 6G wireless networks, the explosive growth in the number of human-type devices and machine-type devices will result in the network densification including both end-device (ED) densification and base station (BS) densification. Owin
Externí odkaz:
https://doaj.org/article/9f976c740fd94fdbb0c24db5bb4687a0
Publikováno v:
ETRI Journal, Vol 45, Iss 2, Pp 318-328 (2023)
Recently, embedded systems, such as mobile platforms, have multiple proces sing units that can operate in parallel, such as centralized processing units (CPUs) and neural processing units (NPUs). We can use deep-learning compilers to generate machine
Externí odkaz:
https://doaj.org/article/cdd2a0f42f2b41ff9c8a699b77bf4158
Publikováno v:
IEEE Access, Vol 10, Pp 41537-41550 (2022)
By focusing on unmanned aerial vehicle (UAV) communications in non-terrestrial networks (NTNs), this paper provides a guideline on the appropriate base station (BS) service provisioning scheme with considering the antenna tilt angle of BSs. Specifica
Externí odkaz:
https://doaj.org/article/3228b5a092e243b8a76a60b1d86811a7
Publikováno v:
IEEE Access, Vol 10, Pp 93799-93811 (2022)
Modern real-time embedded systems are equipped with multi-core processors to execute computationally intensive tasks. In multi-core architecture, last-level cache memory is shared by cores. The shared cache becomes a non-deterministic resource, which
Externí odkaz:
https://doaj.org/article/ca921b94d42d4b9581c9783b23c8974c
Publikováno v:
IEEE Transactions on Mobile Computing. 22:3123-3136
Publikováno v:
Applied Sciences, Vol 12, Iss 11, p 5432 (2022)
The increasing number of daily notifications generated by smartphones and wearable devices increases mental burdens, deteriorates productivity, and results in energy waste. These phenomena are exacerbated by emerging use cases in which users are wear
Externí odkaz:
https://doaj.org/article/56c85053a35e403ea4b96fbaf2362cf2
Publikováno v:
IEEE Access, Vol 6, Pp 32945-32957 (2018)
As many security solutions integrated with various technologies have been proposed against eavesdropping attacks, technical advances for adversaries can also pose a serious security threat. This paper considers a problem of smart eavesdropping attack
Externí odkaz:
https://doaj.org/article/744cad48314f41efa8580d8e526f7eef
Publikováno v:
IEEE Transactions on Wireless Communications. 21:5090-5105