Zobrazeno 1 - 10
of 208
pro vyhledávání: '"Kwonhue Choi"'
Autor:
Khaled Mahmud Sujon, Rohayanti Binti Hassan, Zeba Tusnia Towshi, Manal A. Othman, Md Abdus Samad, Kwonhue Choi
Publikováno v:
IEEE Access, Vol 12, Pp 135300-135314 (2024)
Optimizing machine learning (ML) model performance relies heavily on appropriate data preprocessing techniques. Despite the widespread use of standardization and normalization, empirical comparisons across different models, dataset sizes, and domains
Externí odkaz:
https://doaj.org/article/b8de0854bbd440498395a24fc721073c
Publikováno v:
IEEE Access, Vol 12, Pp 50986-50997 (2024)
In the realm of renewable energy, wind turbines play a pivotal role in efficiently harnessing wind power, especially in offshore environments, where their significance is amplified. These turbines require vigilant monitoring due to the elevated risk
Externí odkaz:
https://doaj.org/article/9b192a5920b0409890ca4ef668bb70e1
Autor:
Hyungseop Son, Kwonhue Choi
Publikováno v:
IEEE Access, Vol 12, Pp 32569-32583 (2024)
This paper proposes a novel opportunistic full-duplex (FD) scheme switching among three duplex modes (DMs) of half duplex (HD), three node FD (TNFD) and bidirectional FD (BiFD) for the cellular systems. To this end, we first derive the conditions, by
Externí odkaz:
https://doaj.org/article/15fbb502fddc4c3ba95b3ff1d52430e9
Autor:
Nuruzzaman Faruqui, Sandesh Achar, Sandeepkumar Racherla, Vineet Dhanawat, Prathyusha Sripathi, Md. Monirul Islam, Jia Uddin, Manal A. Othman, Md Abdus Samad, Kwonhue Choi
Publikováno v:
Sensors, Vol 24, Iss 21, p 6895 (2024)
Security grids consisting of High-Definition (HD) Internet of Things (IoT) cameras are gaining popularity for organizational perimeter surveillance and security monitoring. Transmitting HD video data to cloud infrastructure requires high bandwidth an
Externí odkaz:
https://doaj.org/article/ca7f25ee46fe431d9a0533f56b6eb1d2
Publikováno v:
IEEE Access, Vol 11, Pp 34217-34226 (2023)
The path loss model for indoor emergency stairs has yet to get enough attention in the literature. Large-scale (LS) path loss models for a stairwell in a 10-stair academic building are the focus of this investigation. We measured the received power w
Externí odkaz:
https://doaj.org/article/b71cd7f1b36948cdbbe6392a7ab391f8
Publikováno v:
IEEE Photonics Journal, Vol 15, Iss 2, Pp 1-7 (2023)
Visible light communication (VLC) has emerged as an eco-friendly and low-cost technology for the next-generation communication systems. However, for VLC systems, existing works report performance degradation due to light-emitting-diode (LED) non-line
Externí odkaz:
https://doaj.org/article/a0c9f5914d5f4b118ab68c2e23feb57d
Publikováno v:
IEEE Access, Vol 11, Pp 2199-2225 (2023)
The prediction of radio signal transmission in tunnels is important for wireless communication link design as it enables the delivery of optimum power to the intended receiver inside the tunnel. Several techniques have been proposed to estimate path
Externí odkaz:
https://doaj.org/article/825c2e1cafcd4156af896e70d1de5661
Publikováno v:
Bioengineering, Vol 10, Iss 11, p 1293 (2023)
The application of deep learning for taxonomic categorization of DNA sequences is investigated in this study. Two deep learning architectures, namely the Stacked Convolutional Autoencoder (SCAE) with Multilabel Extreme Learning Machine (MLELM) and th
Externí odkaz:
https://doaj.org/article/b65dd940a51d495dbf73e52d6b513ff1
Autor:
Md. Sakir Hossain, Naim Hasan, Md. Abdus Samad, Hossain Md. Shakhawat, Joydeep Karmoker, Foysol Ahmed, K. F. M. Nafiz Fuad, Kwonhue Choi
Publikováno v:
IEEE Access, Vol 10, Pp 128754-128763 (2022)
Among the prevalent cyberattacks on Android devices, a ransomware attack is the most common and damaging. Although there are many solutions for detecting Android ransomware attacks, existing solutions have limited detection accuracy and high computat
Externí odkaz:
https://doaj.org/article/165f17a51ab94ec9be77115344afbabe
Publikováno v:
IEEE Access, Vol 10, Pp 38534-38544 (2022)
We propose a very fast-convergence joint iterative detection and decoding (JIDD) scheme for channel-coded sparse code multiple access (SCMA). In the conventional JIDD, all users’ channel decoding iterations are performed in parallel after all users
Externí odkaz:
https://doaj.org/article/37919270369f4874891c280cbaf7a09b