Zobrazeno 1 - 10
of 89
pro vyhledávání: '"Ji-Young Chun"'
Publikováno v:
IEEE Access, Vol 10, Pp 104135-104143 (2022)
Federated learning (FL) is an emerging paradigm that helps to train a global machine learning (ML) model by utilizing decentralized data among clients without sharing them. Although FL is a more secure way of model training than a general ML, industr
Externí odkaz:
https://doaj.org/article/225c3606e0764fe6b008a905ab3d4285
Publikováno v:
IEEE Access, Vol 9, Pp 62038-62042 (2021)
An identity-based revocation (IBR) scheme is a useful one-to-many cryptographic message transmission method in which a message can be encrypted using receivers’ identities such as e-mail addresses as public keys and a trusted message sender who hol
Externí odkaz:
https://doaj.org/article/8d806e5d81e04f69ab52d104427e2651
Publikováno v:
Journal of the Institute of Electronics and Information Engineers. 59:21-30
Publikováno v:
International Journal of Environmental Research and Public Health; Volume 20; Issue 1; Pages: 56
Background: This descriptive survey aimed to identify the factors affecting the post-traumatic growth (PTG) of nurses in COVID-19 designated hospitals on the basis of a PTG model. Methods: A survey of 250 nurses working at three COVID-19 hospitals in
Autor:
Ji Young Chun1, Shin Ae Yoon1 sein.sung@samsung.com, Ji Sook Kim1, Yo Han Ho1, So Yoon Ahn1, Hye Soo Yoo1, Se In Sung1, Yun Sil Chang1, Won Soon Park1
Publikováno v:
Neonatal Medicine. May2016, Vol. 23 Issue 2, p74-80. 7p.
Publikováno v:
Crisis and Emergency Management: Theory and Praxis. 15:1-12
The purpose of this study is to identify disaster preparedness among community health nurses. The study subjects were 381 community health nurses in the Seoul metropolitan area, Chungcheong-do, and Gangwon-do. An independent t-test, one-way ANOVA and
Publikováno v:
Journal of Applied Mathematics, Vol 2014 (2014)
In a ring signature scheme, a user selects an arbitrary ring to be able to sign a message on behalf of the ring without revealing the signer’s identity. Whistle-blowers especially find this useful. To date, various ring signature schemes have been
Externí odkaz:
https://doaj.org/article/9a310a93ac814e83ba4c77eda6d5ab47
Publikováno v:
Journal of Applied Mathematics, Vol 2014 (2014)
It is critical to scientific progress to share clinical research data stored in outsourced generally available cloud computing services. Researchers are able to obtain valuable information that they would not otherwise be able to access; however, pri
Externí odkaz:
https://doaj.org/article/83919c4fed5b4422942700449b030c44
Autor:
Ji Young Chun, Geontae Noh
Publikováno v:
Electronics
Volume 10
Issue 5
Electronics, Vol 10, Iss 599, p 599 (2021)
Volume 10
Issue 5
Electronics, Vol 10, Iss 599, p 599 (2021)
The employment of mobile readers (or mobile phone collaborated with a Radio frequency identification (RFID) reader) opens a novel application for RFID technology. In particular, an RFID tag search system has been designed to find a particular tag in
Autor:
Ji Young Chun1, Ben Kang1, Yoo Min Lee1, Soo Youn Lee2, Mi Jin Kim3, Yon Ho Choe1 i101016@skku.edu
Publikováno v:
Pediatric Gastroenterology, Hepatology & Nutrition. Sep2013, Vol. 16 Issue 3, p171-177. 7p.