Zobrazeno 1 - 10
of 243
pro vyhledávání: '"Minho Park"'
Autor:
Aro Kim, Seung-taek Woo, Minho Park, Dong-hwi Kim, Hanshin Lim, Soon-heung Jung, Sangwoon Kwak, Sang-hyo Park
Publikováno v:
EURASIP Journal on Image and Video Processing, Vol 2024, Iss 1, Pp 1-20 (2024)
Abstract In the video compression industry, video compression tailored to machine vision tasks has recently emerged as a critical area of focus. Given the unique characteristics of machine vision, the current practice of directly employing convention
Externí odkaz:
https://doaj.org/article/5127105087e847289b927b5d68f733d9
Publikováno v:
European Journal of Psychotraumatology, Vol 15, Iss 1 (2024)
Background: Firefighters, in the course of their professional responsibilities, confront an array of stressors contingent upon the distinctive characteristics of their duties.Objective: This study investigated the longitudinal impact of trauma incide
Externí odkaz:
https://doaj.org/article/d606d893a433402e8b424279f05c85e4
Autor:
Dinh-Hau Tran, Minho Park
Publikováno v:
Applied Sciences, Vol 14, Iss 16, p 6932 (2024)
With the proliferation of the Internet, network complexities for both commercial and state organizations have significantly increased, leading to more sophisticated and harder-to-detect network attacks. This evolution poses substantial challenges for
Externí odkaz:
https://doaj.org/article/a275ec6d2bd1441182afcd4f4b40cdf2
Publikováno v:
IEEE Access, Vol 11, Pp 70084-70092 (2023)
Recently, compression is essential to reduce large traffic generated from video or image-based services such as OTT, IOT, smart city, and self-driving cars. The high data compression reduces data traffic, but causes information loss and data quality
Externí odkaz:
https://doaj.org/article/762a23871bb941dd947636fe9c8ba60b
Autor:
Sichul Kevin Noh, Minho Park
Publikováno v:
Applied Sciences, Vol 13, Iss 22, p 12232 (2023)
A Software Defined Network (SDN) provides efficient network management by decoupling two planes: the control plane and the data plane. However, although SDN provides efficient network management, it also causes several critical vulnerabilities. In pa
Externí odkaz:
https://doaj.org/article/92959c6b08ae48288fefc9051e1f2cfb
Autor:
Chien-Nguyen Nhu, Minho Park
Publikováno v:
IEEE Access, Vol 10, Pp 72955-72972 (2022)
Network slicing is a key technology in fifth-generation (5G) networks that allows network operators to create multiple logical networks over a shared physical infrastructure to meet the requirements of diverse use cases. Among core functions to imple
Externí odkaz:
https://doaj.org/article/39acec8f42e746c2a46e16e3961b01e0
Publikováno v:
IEEE Access, Vol 10, Pp 34236-34245 (2022)
Image classification research is one of the fields continuously studied in the computer vision domain, and several related studies have been actively conducted until recently. However, a limit exists regarding the prediction performance of real-world
Externí odkaz:
https://doaj.org/article/a32949ffec944555836d9f1e10d0ee8e
Publikováno v:
Diagnostic and Interventional Radiology, Vol 27, Iss 4, Pp 519-523 (2021)
PURPOSEThe study aimed to evaluate the safety and clinical efficacy of transcatheter arterial embolization (TAE) for the treatment of arterial esophageal bleeding.METHODSNine patients (8 male, 1 female; mean age, 62.3±7.5 years) who underwent TAE fo
Externí odkaz:
https://doaj.org/article/7956fab6eecd483db60e930f5b32286c
Autor:
Phuc Trinh Dinh, Minho Park
Publikováno v:
IEEE Access, Vol 9, Pp 35057-35074 (2021)
Cloud computing is now known as the most cost-effective platform for delivering big data and artificial intelligence services over the Internet to enterprises and cloud consumers. However, despite many recent security developments, many cloud consume
Externí odkaz:
https://doaj.org/article/9a8fd992d3e742cf91999a6685b17003
Autor:
Phuc Trinh Dinh, Minho Park
Publikováno v:
IEEE Access, Vol 8, Pp 119346-119360 (2020)
Nowadays, Software-Defined Networks (SDNs) are increasingly being used in many practical settings, posing a variety of security risks, such as compromised switches. Once a switch is compromised by an attacker, the switch may be either malfunctioning
Externí odkaz:
https://doaj.org/article/73afa614e16c4ade98037a64780a6f17