연구성과로 돌아가기

2023 연구성과 (161 / 285)

※ 컨트롤 + 클릭으로 열별 다중 정렬 가능합니다.
Excel 다운로드
WoS SCOPUS Document Type Document Title Abstract Authors Affiliation ResearcherID (WoS) AuthorsID (SCOPUS) Author Email(s) Journal Name JCR Abbreviation ISSN eISSN Volume Issue WoS Edition WoS Category JCR Year IF JCR (%) FWCI FWCI Update Date WoS Citation SCOPUS Citation Keywords (WoS) KeywordsPlus (WoS) Keywords (SCOPUS) KeywordsPlus (SCOPUS) Language Publication Stage Publication Year Publication Date DOI JCR Link DOI Link WOS Link SCOPUS Link
Article Lethal abdominal compartment syndrome after extracorporeal cardiopulmonary resuscitation in a patient with out-of-hospital cardiac arrest: a case report BackgroundClinical attempts of extracorporeal cardiopulmonary resuscitation (ECPR) in patients with out-of-hospital cardiac arrest (OHCA) have increased in recent years; however, it also has life-threatening complications. Massive fluid and transfusion resuscitation, shock status, or low cardiac output status during ECPR may lead to ascites and interstitial edema, resulting in secondary abdominal compartment syndrome (ACS).Case presentationA 43-year-old male patient was admitted to the emergency department due to cardiac arrest. Due to refractory ventricular fibrillation, ECPR was initiated. Approximately, 3 h after extracorporeal membrane oxygenation support, abdominal distension and rigidity developed. Therefore, ACS was suspected. Decompression laparotomy was required to relieve elevated intra-abdominal pressure.ConclusionsWe report a case of a patient with OHCA who developed lethal ACS after ECPR. Despite this, the patient was able to recover from several major crises. Regardless of how lethal the patient is, if compartment syndrome develops in any part of the body, we should aggressively consider surgical decompression. Kim, Gun Jik; Lim, Kyoung Hoon; Oh, Tak-hyuk; Lee, Hyun-Joo; Hwang, Deokbi; Jung, Hanna Kyungpook Natl Univ, Kyungpook Natl Univ Hosp, Sch Med, Dept Thorac & Cardiovasc Surg, Daegu 41944, South Korea; Kyungpook Natl Univ, Kyungpook Natl Univ Hosp, Trauma Ctr, Dept Surg,Sch Med, Daegu 41944, South Korea; Kyungpook Natl Univ, Chilgok Hosp, Sch Med, Dept Thorac & Cardiovasc Surg, Daegu 41404, South Korea; Kyungpook Natl Univ, Kyungpook Natl Univ Hosp, Sch Med, Dept Orthoped Surg, Daegu 41944, South Korea; Kyungpook Natl Univ, Kyungpook Natl Univ Hosp, Sch Med, Div Transplantat & Vasc Surg,Dept Surg, Taegu 41944, South Korea 22234444300; 25630643100; 59278524700; 58838750100; 57194422879; 56467570700 navybluesail@knu.ac.kr; INTERNATIONAL JOURNAL OF EMERGENCY MEDICINE INT J EMERG MED 1865-1372 1865-1380 16 1 ESCI EMERGENCY MEDICINE 2023 2 34.3 0 2025-06-25 0 0 Cardiopulmonary resuscitation; Compartment Syndromes; Extracorporeal membrane oxygenation; Fasciotomy; Intensive care units; Laparotomy; Out-of-hospital cardiac arrest MEMBRANE-OXYGENATION; SUPPORT Cardiopulmonary resuscitation; Compartment Syndromes; Extracorporeal membrane oxygenation; Fasciotomy; Intensive care units; Laparotomy; Out-of-hospital cardiac arrest abdominal compartment syndrome; abdominal pressure; adult; advanced cardiac life support; Article; bladder pressure; case report; clinical article; coronary angiography; decompression surgery; emergency ward; extracorporeal oxygenation; fasciotomy; femoral artery; heart ejection fraction; heart function; heart rhythm; human; intensive care unit; laparotomy; male; mean arterial pressure; neuromuscular blocking; orthopedic surgery; out of hospital cardiac arrest; resuscitation; return of spontaneous circulation English 2023 2023-09-26 10.1186/s12245-023-00543-8 바로가기 바로가기 바로가기 바로가기
Article Multi-objective green design model for prestressed concrete slabs in long-span buildings Prestressed concrete (PC) slab using tendons is one of the most frequently used slab systems in the construction of buildings with long-span slabs. To simultaneously minimize the construction cost and the environmental impact, a green design model for PC slabs in long-span structures is necessary. In this paper, a multi-objective green design model for prestressed concrete slabs (MGDPCS) was developed to minimize both CO2 emissions and the construction costs of PC slabs. MGDPCS provides the optimized PC slab thickness, diameter and yield strength of the rebar, size and yield strength of the tendon using the Non-dominated Sorting Genetic Algorithm (NSGA-II) for the input PC slab size and load. Furthermore, the effects of changes in the long- and short-side of span and tendons of PC slabs on construction costs and environmental impact are analyzed using the proposed model. Accordingly, we developed two indicators, that is, the environmental and economic scores and the eco-friendly coefficient, to evaluate the performance of the practical green designs using MGDPCS. To verify the applicability of MGDPCS, the model was applied used to analyze the designs of PC slabs in an actual six-story industrial building with a slab span of 10 m x 10 m. The results showed that the optimal designs obtained from MGDPCS outperformed existing slab designs for buildings by 8.12% and 13.62% based on the reductions in CO2 emissions and costs, respectively. Choi, Jewoo; Hong, Do Hun; Lee, Seung Hyeong; Lee, Ha Yeon; Hong, Taehoon; Lee, Dong-Eun; Park, Hyo Seon Yonsei Univ, Dept Architectural Engn, Seoul, South Korea; KyungPook Natl Univ, Sch Architecture & Civil & Architectural Engn, Daegu, South Korea; Yonsei Univ, Dept Architectural Engn, Seoul 120749, South Korea Lee, Hyoungjin/GRR-7154-2022; Choi, Jewoo/MGT-4857-2025; Hong, Taehoon/E-9169-2012 57205453819; 57222247962; 57222242872; 57973210500; 57969349700; 56605563300; 55669886900 hspark@yonsei.ac.kr; ARCHITECTURAL ENGINEERING AND DESIGN MANAGEMENT ARCHIT ENG DES MANAG 1745-2007 1752-7589 19 5 SCIE CONSTRUCTION & BUILDING TECHNOLOGY;ENGINEERING, CIVIL 2023 2.7 34.3 0.93 2025-06-25 5 6 Multi-objective optimization; green design; sustainable construction; CO2 emissions; prestressed concrete slab CO2 EMISSION; OPTIMIZATION; COSTS; TECHNOLOGY; REDUCTION; COLUMNS; CARBON CO<sub>2</sub> emissions; green design; Multi-objective optimization; prestressed concrete slab; sustainable construction Architectural design; Carbon dioxide; Concrete beams and girders; Concrete slabs; Ecodesign; Genetic algorithms; Life cycle; Office buildings; Prestressed concrete; Structural design; Sustainable development; Yield stress; CO 2 emission; Construction costs; Construction of buildings; Design models; Long span; Multi objective; Multi-objectives optimization; Pre-stressed concrete slab; Slab systems; Sustainable construction; Multiobjective optimization English 2023 2023-09-03 10.1080/17452007.2022.2147897 바로가기 바로가기 바로가기 바로가기
Article A Deep Neural Network Based Wake-After-Sleep-Onset Time Aware Sleep Apnea Severity Estimation Scheme Using Single-Lead ECG Data Obstructive sleep apnea (OSA) is a prevalent yet potentially severe sleep disorder. Polysomnography (PSG) is most commonly used to assess the severity of OSA. However, there have been numerous studies to find OSA patients more effectively since running a PSG test is expensive and time-consuming. The existing studies, however, raise four major concerns, such as (i) the use of inaccurate sleep time data to calculate the apnea-hypopnea index, (ii) the use of poor preprocessing techniques for real patient clinical datasets, (iii) the lack of multi-stage classification capability, and (iv) the absence of experiments on sufficiently large data sets. To address these concerns, we propose a novel OSA severity classification scheme based on single-lead electrocardiogram (ECG) data, as well as a novel deep learning model, CLNet, to perform apnea/hypopnea and sleep stage classification. By identifying apnea/hypopnea events from a patient's ECG data and computing AHI using "pure" sleep duration via CLNet, our method improves patient OSA severity degree estimation. CLNet was trained and evaluated using two different real-world datasets containing 286 OSA patient records and a total of 2,155 hours of ECG data. In our experiments, the proposed scheme outperforms existing approaches by up to 10% in total accuracy and AUC on the public PhysioNet dataset. In terms of apnea classification sensitivity, we show that the proposed CLNet model outperforms the state-of-the-art model by up to 41.8% for our clinical dataset. Our scheme can be used as a successful, high-quality pre-screening tool by more effectively prioritizing prospective OSA patients. We will be able to perform PSG on only the most severe patients, saving both time and money. Our algorithms are publicly available on GitHub. Seo, Dae-Woong; Kim, Jeeyoung; Lee, Ho-Won; Suh, Young-Kyoon Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 41566, South Korea; Kyungpook Natl Univ, Grad Sch Data Sci, Daegu 41566, South Korea; Kyungpook Natl Univ, Sch Med, Dept Neurol, Daegu 41404, South Korea; Kyungpook Natl Univ, Brain Sci & Engn Inst, Daegu 41404, South Korea 58261639100; 57204647175; 35337240700; 55443739900 neuromd@knu.ac.kr;yksuh@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 11 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2023 3.4 34.4 0.13 2025-06-25 0 1 Sleep apnea; Labeling; Electrocardiography; Deep learning; Estimation; Data models; Indexes; Apnea-hypopnea index; classification; deep learning; electrocardiogram; polysomnography; sleep apnea severity classification Apnea-hypopnea index; classification; deep learning; electrocardiogram; polysomnography; sleep apnea severity classification Classification (of information); Deep neural networks; Sleep research; Apnea-hypopnea indices; Deep learning; Index; Labelings; Obstructive sleep apnea; Polysomnography; Sleep apnea; Sleep apnea severity classification; Electrocardiograms English 2023 2023 10.1109/access.2023.3272373 바로가기 바로가기 바로가기 바로가기
Article A Secure Content Trading for Cross-Platform in the Metaverse With Blockchain and Searchable Encryption In a rapidly evolving metaverse, where the physical and virtual realms naturally merge, users are actively participating in interactive experiences, content creation, and content trading, transcending spatial and temporal constraints. However, with the spread of the metaverse, security concerns have been raised about privacy and the integrity of digital transactions. Several studies have thus focused on enhancing the security and privacy in metaverse. However, there is still a lack of security research on content trading between metaverse platforms. Therefore, this paper proposes a secure content trading system for cross-platform interactions within the metaverse. Leveraging the blockchain technology, the proposed system delivers an ecosystem that ensures secure content management, data integrity, and verifiable transactions. We use smart contracts that enable reliable and automated purchase methods, empowering users and building their trust. In addition, we incorporate searchable encryption to further enhance the user experience within the metaverse by allowing avatars to seamlessly search for and obtain the desired content across different metaverse platforms. The security of the proposed scheme is comprehensively assessed via vulnerability analyses, including BAN logic and Scyther, to identify potential threats and vulnerabilities in various content trading scenarios. The security and performance of the proposed system are compared with those of the related schemes. Result reveals that the proposed scheme is robust and can be applied to content trading systems in dynamic and ever-expanding metaverse environments. Oh, Jihyeon; Kim, Myeonghyun; Park, Yohan; Park, Youngho Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea; Keimyung Univ, Sch Comp Engn, Daegu 42601, South Korea 57222066296; 57210278739; 55660095600; 56962990300 kimmyeong123@knu.ac.kr;parkyh@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 11 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2023 3.4 34.4 1.81 2025-06-25 10 14 content trading; cross-platform; interoperability; searchable encryption; blockchain AUTHENTICATION SCHEME blockchain; content trading; cross-platform; interoperability; Metaverse; searchable encryption Commerce; Cryptography; Information management; Smart contract; Block-chain; Content creation; Content trading; Cross-platform; Metaverses; Searchable encryptions; Security and privacy; Spatial constraints; Temporal constraints; Trading systems; Blockchain English 2023 2023 10.1109/access.2023.3328232 바로가기 바로가기 바로가기 바로가기
Article AMBITION: Ambient Temperature Aware VM Allocation for Edge Data Centers Edge data centers are increasingly deployed to improve response time of intelligent services. Due to the high computing demands for such services, edge data centers consume a considerable amount of power, generating excessive heat. To mitigate thermal problems with a smaller cooling power, edge data centers usually trigger software-based thermal management techniques along with the air cooling systems. Unfortunately, the ambient temperature of servers often has a surge due to the consolidation of VMs and heat propagation among components (e.g., CPU, GPU, memory unit, disk, etc.). Higher ambient temperature further increases the on-chip temperature, invoking more frequent thermal throttling. To resolve thermal problems deteriorated by the ambient temperature, in this paper, we propose an ambient temperature aware VM allocation technique, called AMBITION. Considering the performance impact of ambient temperature, AMBITION estimates the actual computing capacity of servers. Based on the computing demands of VMs, AMBITION finds an appropriate server which has sufficient ambient-aware computing capacity to run the VM; it allocates computation-intensive VMs to the servers with the higher ambient-aware computing capacity, and distributes memory-intensive VMs to the individual servers as much as possible. In our experiments on an edge data center, AMBITION shows the execution time speedup of 50.3%, on average (up to 73.8%), compared to a conventional VM allocation technique while saving system-wide energy by 5.9% (up to 13.6%). At the expense of 5.8% speedup (from 50.3% to 44.5%), AMBITION further saves cooling power by 84.3%, leading to 29.3% of total edge data center energy saving. Choi, Seung Hun; Kim, Seon Young; Kim, Young Geun; Kong, Joonho; Chung, Sung Woo Korea Univ, Dept Comp Sci & Engn, Seoul 02841, South Korea; Elect & Telecommun Res Inst, Daejeon 34129, South Korea; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41556, South Korea Kim, Ju/AAV-3029-2020; Kim, Sung-Kyoung/G-6782-2011 57211108323; 57222560934; 56298609100; 25927220400; 7404293097 younggeun_kim@korea.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 11 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2023 3.4 34.4 0.26 2025-06-25 1 2 Ambient temperature; computing capacity; edge data centers; heterogeneous servers; VM allocation THERMAL MANAGEMENT Ambient temperature; computing capacity; edge data centers; heterogeneous servers; VM allocation Cooling; Cooling systems; Energy conservation; Green computing; Information management; Temperature; Temperature control; Thermal management (electronics); Thermoanalysis; Computing capacity; Datacenter; Edge data; Edge data center; Heating system; Heterogeneous servers; Resource management; Systems-on-Chip; VM allocation; System-on-chip English 2023 2023 10.1109/access.2023.3292342 바로가기 바로가기 바로가기 바로가기
Article An Adaptive Kalman Filter-Based Condition-Monitoring Technique for Induction Motors Induction motors are typical rotating machines that are widely used in various industrial processes. The condition of induction motors has to be monitored to avoid serious losses, which can be caused by various reasons. Over the last decades, although many studies have been performed on the condition monitoring (CM), there is still an increasing need for cost-effective and reliable CM techniques for induction motor. This paper presents an adaptive Kalman filter (AKF)-based CM technique for an induction motor driving a scrubber fan. In this work, AKFs are used to extract useful information about the induction motor's condition based on measured vibration signals. The main novelty of the proposed method is the use of multiple AKFs for the detection of outliers and anomalies. The output of the AKFs plays as the basis of severity assessment on the vibration signals. A set of AKFs are employed to deal with various anomaly conditions caused by different severity levels of vibration as the IM is deteriorated. Moreover, the effectiveness of the proposed method is demonstrated through experiments involving a real scrubber fan driven by an induction motor. Kim, Jaehoon; Song, Moogeun; Kim, Donggil; Lee, Dongik Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea; Kyungil Univ, Dept Robot Engn, Gyongsan 38428, South Korea ; Kim, Donggil/AAY-5032-2021 57202767865; 25930551000; 23090866400; 55698910600 dilee@ee.knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 11 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2023 3.4 34.4 1.17 2025-06-25 6 9 Kalman filters; Vibrations; Induction motors; Mathematical models; Estimation; Uncertainty; Time measurement; Failure analysis; Adaptive Kalman filter; condition monitoring; failure detection; induction motor; severity assessment BROKEN ROTOR BAR; FAULT-DETECTION; PARAMETER-ESTIMATION; FREQUENCY; DIAGNOSIS; STATOR; NETWORK Adaptive Kalman filter; condition monitoring; failure detection; induction motor; severity assessment Adaptive filtering; Adaptive filters; Bandpass filters; Condition monitoring; Cost effectiveness; Induction motors; Uncertainty analysis; Adaptive kalman filter; Condition; Failure detection; Filter-based; Inductions motors; Monitoring techniques; Severity assessment; Uncertainty; Vibration; Kalman filters English 2023 2023 10.1109/access.2023.3273809 바로가기 바로가기 바로가기 바로가기
Article An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment Recently, the Digital Twin (DT) technology has procured a lot of attention because of its applicability in the manufacturing and space industries. The DT environment involves the formation of a clone of the tangible object to perform simulations in the virtual space. The combination of conceptual development, predictive maintenance, real-time monitoring, and simulation characteristics of DT has increased the utilization of DT in different scenarios, such as medical environments, healthcare, manufacturing industries, aerospace, etc. However, these utilizations have also brought serious security pitfalls in DT deployment. Towards this, several authentication protocols with different security and privacy features for DT environments have been proposed. In this article, we first review a recently proposed two-factor authentication protocol for DT environments that utilizes the blockchain technology. However, the analyzed scheme is unable to offer the desirable security and cannot withstand various security attacks like offline password-guessing attack, smart card stolen attack, anonymity property, and known session-specific temporary information attack. We also demonstrate that an attacker can impersonate the analyzed protocol's legal user, owner, and cloud server. To mitigate these security loopholes, we devise an effective three-factor privacy-preserving authentication scheme for DT environments. The proposed work is demonstrated to be secure by performing the informal security analysis, the formal security analysis using the widely recognized Burrows-Abadi-Needham (BAN) logic, and the Real-or-Random (ROR) model. A detailed comparative study on existing competing schemes including the analyzed scheme demonstrates that the devised framework furnishes better security features while also having lower computation costs and comparable communication costs than the existing schemes. Thakur, Garima; Kumar, Pankaj; Jangirala, Srinivas; Das, Ashok Kumar; Park, Youngho Cent Univ Himachal Pradesh, Srinivasa Ramanujan Dept Math, Dharamshala 176206, India; O P Jindal Global Univ, Jindal Global Business Sch, Sonipat, Haryana, India; Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad, India; Kyungpook Natl Univ, Sch Elect Engn, Daegu, South Korea ; Jangirala, Srinivas/AGP-1572-2022; Das, Ashok Kumar/U-2790-2019; kumar, Pankaj/HPF-8395-2023; Thakur, Garima/AGV-6444-2022 58127115800; 57207718111; 59059544500; 57192372562; 55450732800; 56962990300 iitkgp.akdas@gmail.com;parkyh@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 11 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2023 3.4 34.4 8.55 2025-06-25 42 68 Security; Authentication; Blockchains; Protocols; Cloud computing; Servers; Digital twins; Digital twin; blockchain; authentication; key agreement; security USER AUTHENTICATION SCHEME; KEY AGREEMENT PROTOCOL; ACCESS-CONTROL; MUTUAL AUTHENTICATION; PROVABLY SECURE; HONEY LIST; DESIGN; INTERNET; EXCHANGE authentication; blockchain; Digital twin; key agreement; security Blockchain; Cloud computing; Computation theory; Cryptography; Data privacy; Network security; Security systems; Smart cards; Authentication protocols; Block-chain; Cloud-computing; Key agreement; Manufacturing industries; Privacy preserving; Security; Security protocols; Authentication English 2023 2023 10.1109/access.2023.3249116 바로가기 바로가기 바로가기 바로가기
Article An Optimized Multi-Organ Cancer Cells Segmentation for Histopathological Images Based on CBAM-Residual U-Net In digital pathology, the accurate segmentation of cell nuclei in histopathology images is essential for medical image analysis. Histopathologists visually evaluate the patterns of cellular architecture and tissue patterns in histopathology image analysis for cancer detection to determine the malignant tissue portions and assess the severity of malignancy. However, manually analyzing scans using a high-resolution microscope requires significant effort and time. A computer-assisted diagnosis system utilizing deep learning (DL) algorithms rapidly, reliably, and automatically segments cell nuclei. However, the existing research studies have limited accuracy, high computational costs, and a lack of robustness and generalizability on diverse datasets. To address these issues, this paper proposes a novel and improved DL architecture based on the U-Net, namely, the CBAM-Residual U-Net for improving accuracy, robustness, and generalized segmentation algorithm that can be applied to various staining techniques and tissue structures. The proposed architecture utilizes a ResConv and convolution block attention modules (CBAM). These modules help the proposed architecture learn the image's shallow and deep features. The CBAM module uses an attention mechanism concentrating on essential features such as cell nuclei's shape, texture, and intensity to accurately segment the raw input patterns. The proposed CBAM-Residual U-Net involves fewer trainable parameters, reducing the computational and time cost s compared to state-of-the-art techniques. Extensive experiments and comprehensive evaluations are conducted to demonstrate the performance of the proposed scheme on publicly available datasets: i) Data Science Bowl (DSB) 2018, ii) The GlaS, iii) Triple-Negative Breast Cancer (TNBC). The experimental results show that our proposed model considerably outperforms the state-of-the-art techniques and detects cellular boundaries well, providing fine-grained segmentation results. Shah, Hasnain Ali; Kang, Jae-Mo Kyungpook Natl Univ, Dept Artificial Intelligence, Daegu 41566, South Korea 57762344700; 56024930400 jmkang@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 11 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2023 3.4 34.4 2.07 2025-06-25 14 16 Digital pathology; deep learning; medical image segmentation; cell nuclei; cancer detection cancer detection; cell nuclei; deep learning; Digital pathology; medical image segmentation Cancer cells; Cells; Computer aided diagnosis; Computer aided instruction; Computer architecture; Cytology; Deep learning; Diseases; E-learning; Feature extraction; Image analysis; Medical imaging; Pathology; Tissue; Cancer; Cancer detection; Cell nucleus; Deep learning; Digital pathologies; Digital system; Features extraction; Images segmentations; Medical diagnostic imaging; Medical image segmentation; Solid modelling; Image segmentation English 2023 2023 10.1109/access.2023.3295914 바로가기 바로가기 바로가기 바로가기
Article Analysis and Modeling of Axial Leakage for Spoke-Type Hybrid Permanent Magnet Machines In this study, we propose a novel analysis method for a spoke-type permanent magnet (PM) synchronous motor (PMSM) using two types of PMs that consider axial leakage flux using a magnetic equivalent circuit (MEC). Spoke-type ferrite PMSM have the advantage of concentrating magnetic flux; however owing to the shape in which the PMs are arranged along the radial direction, some magnetic flux leaks in the axial direction, which causes inconsistency between the 2D and 3D finite element analysis (FEA) results. Because 3D FEA requires considerable analysis time, using it in the initial design stage of the motor is inefficient. Therefore, we present a new analytical method combined with MEC to overcome the existing inefficient approach. To obtain analysis results equivalent to 3D FEA, the new residual magnetic flux density considering axial flux leakage was applied to 2D FEA PMs using MEC and 2D FEA. The validity of the proposed method was verified through 3D FEA and experiments conducted on the test models using two magnet types. Seok, Chang-Hoon; Yoon, Seung-Young; Choi, Hong-Soon; Lee, Ho-Young; Seo, Jangho Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea; Kyungpook Natl Univ, Dept Elect Engn, Daegu 41566, South Korea; Korea Inst Ind Technol, Adv Mechatron Res & Dev Grp, Daegu 31056, South Korea; Kyungpook Natl Univ, Sch Automot Engn, Sangju 37224, South Korea 57581239400; 57320197600; 7404338767; 57049871300; 12791073600 j.seo@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 11 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2023 3.4 34.4 0.65 2025-06-25 4 5 Axial flux leakage; ferrite permanent magnet motor; hybrid magnet; less-rare-earth motor; lumped magnetic equivalent circuit; spoke-type permanent magnet motor RARE-EARTH; AIR-GAP; FERRITE Axial flux leakage; ferrite permanent magnet motor; hybrid magnet; less-rare-earth motor; lumped magnetic equivalent circuit; spoke-type permanent magnet motor Equivalent circuits; Ferrite; Finite element method; Magnetic circuits; Magnetic leakage; Permanent magnets; Synchronous motors; Timing circuits; Axial flux; Axial flux leakage; Ferrite permanent magnet motor; Ferrite permanent magnets; Flux leakage; Hybrid magnets; Less-rare-earth motor; Lumped magnetic equivalent circuit; Magnetic equivalent circuits; Permanent magnet motor; Rare-earths; Spoke-type permanent magnet motor; Rare earths English 2023 2023 10.1109/access.2022.3233386 바로가기 바로가기 바로가기 바로가기
Article Attention Mechanism-Based Bidirectional Long Short-Term Memory for Cycling Activity Recognition Using Smartphones Bicycles are an ecofriendly mode of transportation, and cycling offers physical and mental well-being. However, their increased use has resulted in frequent bicycle-human accidents, car-to-bicycle collisions, related injuries and cyclist crashes. Moreover, rules for safe cycling are limited. Smart healthcare systems using smartphones and/or wearable devices, such as a cycling monitoring application that can inform fellow cyclists about the state of the user, can be developed to provide assistance during such unexpected events. In this study, a one-dimensional convolutional neural network (1DCNN)-bidirectional long short-term memory (BiLSTM) based on attention mechanism (CBiAM) model is proposed for detecting cyclists' states using a mobile phone, thereby enhancing their safety and promoting a secure cycling experience in case of accidents or emergencies. In addition, the "cycling safe (CySa) dataset," a new dataset containing data on the cyclists' actions during cycling, collected from a smartphone positioned in the cyclists' pocket is presented. The proposed CBiAM model was trained on the CySa dataset using different sliding window sizes, batch sizes (Bz), and learning rates (Lr). Experimental results confirmed the superior performance of the proposed model compared to conventional approaches, such as support vector machines and artificial neural networks, and existing advanced architectures, such as 1DCNN, long short-term memory (LSTM), and Bi-LSTM. The robustness of the model was validated using public datasets, such as UCI-human activity recognition (HAR), PAMAP2, Opportunity, MOTIONSENSE, and WISDM, where it achieved impressive F1-scores of 97.51%, 99.82%, 94.72%, 97.67%, and 87.05%, respectively. Nguyen, Van Sy; Kim, Hyunseok; Suh, Dongjun Kyungpook Natl Univ, Dept Convergence & Fus Syst Engn, Sangju 37224, South Korea; Univ Cent Florida, Mech & Aerosp Engn Dept, Orlando, FL 32816 USA; Dong A Univ, Dept Comp Engn, Busan 49315, South Korea ; SY, NGUYEN/JVO-2691-2024 57767742800; 57219215131; 36613529600 dongjunsuh@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 11 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2023 3.4 34.4 1.04 2025-06-25 7 8 Attention mechanism; cycling; human activity recognition; bidirectional LSTM Attention mechanism; bidirectional LSTM; cycling; human activity recognition Accidents; Bicycles; Brain; Pattern recognition; Smartphones; Support vector machines; Activity recognition; Attention mechanisms; Bidirectional long short-term memory; Cycling; Eco-friendly; Human activity recognition; Mechanism-based; Related injuries; Smart phones; Well being; Long short-term memory English 2023 2023 10.1109/access.2023.3338137 바로가기 바로가기 바로가기 바로가기
Article Blockchain Integration for IoT-Enabled V2X Communications: A Comprehensive Survey, Security Issues and Challenges In V2X (vehicle-to-everything) communication, there is a two-way communication among the vehicle(s) and other Internet of Things (IoT)-enabled smart devices around it that may change how we need to drive. Due to the advancement of Information and Communications Technology (ICT) and the rapid development of IoT in transportation, traditional applications are converted to intelligent applications. In V2X communications, the collected information from the IoT smart devices and other sources passes through low-latency, high-bandwidth, high-reliability links. With the future adoption of the 5th generation mobile network (5G) and beyond networks, V2X continues to produce a huge volume of data. However, collecting and storing data securely in blockchain-based storage are extremely needed for immutability and transparency. In this survey article, the convergence of IoT, V2X and blockchain technologies, and various security challenges and their countermeasures are discussed. Next, we discuss various V2X applications and their respective services. Moreover, IoT-V2X architecture and its enabling technologies are discussed in this article. In addition, we also provide a comprehensive analysis of various security mechanisms. Finally, we provide some important challenges and issues of Blockchain for Intelligent Transportation System (BITS). Rao, P. Muralidhara; Jangirala, Srinivas; Pedada, Saraswathi; Das, Ashok Kumar; Park, Youngho Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, India; OP Jindal Global Univ, Jindal Global Business Sch, Sonipat 131001, Haryana, India; GITAM Univ, GITAM Sch Technol, Dept Comp Sci & Engn, Visakhapatnam 530045, India; Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India; Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea Jangirala, Srinivas/AGP-1572-2022; Patruni, Dr. Muralidhara Rao/AAC-9239-2019; Das, Ashok Kumar/U-2790-2019 57801867800; 57192372562; 57481323200; 55450732800; 56962990300 iitkgp.akdas@gmail.com;parkyh@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 11 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2023 3.4 34.4 2.2 2025-06-25 9 17 Vehicle-to-everything (V2X); Internet of Things (IoT); blockchain; attacks; security WIRELESS SENSOR NETWORKS; ACCESS-CONTROL SCHEME; AUTHENTICATION PROTOCOL; PROVABLY SECURE; INTERNET; DESIGN; TECHNOLOGIES; SYSTEM attacks; blockchain; Internet of Things (IoT); security; Vehicle-to-everything (V2X) 5G mobile communication systems; Blockchain; Digital storage; Intelligent systems; Internet of Everything; Network security; Vehicle to Everything; Vehicle to vehicle communications; Vehicles; Attack; Block-chain; Internet of thing; Security; Security challenges; Security issues; Smart devices; Vehicle-to-everything (V2X); Internet of things English 2023 2023 10.1109/access.2023.3281844 바로가기 바로가기 바로가기 바로가기
Article Brain-Inspired Mutual Synchronization in Cross-Coupled NbOx Oscillation Neurons for Oscillatory Neural Network Applications The brain performs cognitive functions through rhythmic communications of neural oscillations across numerous spatially distributed neurons. This process is known as "binding by synchrony". Herein, we demonstrate oscillatory neural networks (ONNs) based on a nanoscale NbOx device for compact oscillation neurons (ONs). When a voltage (V-DD) is applied to the NbOx-based device, a high resistance state is temporarily changed to a low resistance state due to the formation of a conducting path. Owing to the volatile switching characteristics, the VDD across the NbOx device, serially connected with an additional load resistor (R-L), is repeatedly increased and decreased, generating oscillations at the intermediate node. We experimentally investigated the impact of R-L and V-DD on the oscillation behavior of the single ON circuit. Thereafter, through simulations, we analyzed the interactions between the voltage oscillations when two NbOx-based ONs were connected by a coupling element (e.g., variable resistor or capacitor). The results showed that the oscillations were either in- or out-of-phase synchronized owing to the coupling strength. These two distinguishable synchronizations can be used to encode binary information in the phase domain, resulting in energy-efficient computing. This study proves that by building ONNs comprising multiple ONs, both sharp edges and pretrained patterns can be detected from images. Kim, Hyun Wook; Jeon, Seyeong; Jeon, Seonuk; Hong, Eunryeong; Kim, Nayeon; Woo, Jiyong Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea; Ulsan Natl Inst Sci & Technol, Sch Mech Engn, Ulsan 44919, South Korea 57557016000; 58523437300; 57955098300; 57556070800; 59884547500; 53985749100 jiyong.woo@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 11 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2023 3.4 34.4 0.39 2025-06-25 4 3 NbO ₓ-based device; oscillation neurons; oscillatory neural networks; pattern recognition NbOa-based device; oscillation neurons; oscillatory neural networks; pattern recognition Brain; Energy efficiency; Memristors; Neural networks; Neurons; Pattern recognition; Resistors; Threshold voltage; Brain-inspired; Device; Mutual synchronization; NbO<sub xmlns:ali="; Oscillation neuron; Oscillatory neural networks; Resistance; Xmlns:mml="; Xmlns:xlink="; Xmlns:xsi="; Synchronization English 2023 2023 10.1109/access.2023.3301562 바로가기 바로가기 바로가기 바로가기
Article Cascade Windows-Based Multi-Stream Convolutional Neural Networks Framework for Early Detecting In-Sleep Stroke Using Wristbands A stroke, particularly when it occurs during sleep, is likely to have a negative prognosis due to delayed detection. Timely and early detection plays a vital role in ensuring prompt administration of reperfusion therapy and preventing permanent disabilities. To address this, we propose a wearable system comprising two wristbands that monitor asymmetric motion patterns (hemiparesis) during sleep. A novel deep learning framework called Early Detection of In-sleep Stroke (EDIS) serves as the core engine for stroke detection during sleep. The framework employs cascading windows of various sizes for convolutional neural networks (CNNs) to enhance both the detection performance and the detection time. We utilize 1D accelerometer sensor data from both hands to generate 2D matrix images, which serve as input for multiple CNN models. Predictions from these models are combined using blending ensemble learning to make a final decision. Although the EDIS framework requires a larger parameter size and longer inference time due to its network architecture with multiple CNNs, it outperforms five single-CNN models by improving detection performance and reducing detection time. Extensive evaluation results demonstrate that EDIS framework accurately and quickly detects in-sleep stroke within the deadline (3 hours). EDIS-Resnet50 has the best classification performance out of the ten DL model candidates, with an F1-score of 0.955 (0.950, 0.960). We believe that our framework will be a fundamental component of real-time stroke monitoring systems, contributing to a reduction in mortality rates among patients suspected of having a stroke. Jeon, Sanghoon; Lee, Yang-Soo; Son, Sang Hyuk Hanyang Univ, Coll Med, Dept Emergency Med, Seoul 04763, South Korea; Kyungpook Natl Univ, Sch Med, Dept Phys Med & Rehabil, Daegu 41944, South Korea; DGIST, Dept Elect Engn & Comp Sci, Daegu 42988, South Korea ; Jeon, Sanghoon/AAP-7839-2020 57190983415; 57202952463; 7202529973 son@dgist.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 11 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2023 3.4 34.4 0.39 2025-06-25 2 3 Deep learning; ensemble learning; stroke detection; sleep; wearable computing ACTIGRAPHY; THROMBOLYSIS; HEALTH Deep learning; ensemble learning; sleep; stroke detection; wearable computing Biomedical signal processing; Convolution; Deep learning; Electrophysiology; Feature extraction; Network architecture; Neural networks; Real time systems; Sleep research; Wearable technology; Deep learning; Ensemble learning; Features extraction; Medical conditions; Sleep; Sleep apnea; Stroke (medical condition); Stroke detection; Wearable computing; Electroencephalography English 2023 2023 10.1109/access.2023.3301872 바로가기 바로가기 바로가기 바로가기
Article Comparative Analysis of Deep Learning Architectures for Penetration and Aspiration Detection in Videofluoroscopic Swallowing Studies This study concentrates on machine learning, specifically deep learning techniques, to automatically detect the presence of aspiration or penetration in videofluoroscopic swallowing studies (VFSS). A comparative analysis is conducted on various deep learning architectures such as 2D Convolutional Neural Networks (2D-CNN), Long Short-Term Memory (LSTM), and 3D Convolutional Neural Networks (3D-CNN). This comparison assesses the performance, network size, and computational speed of the models. In addition, we present findings derived from multi-label and multi-class classification methods. By evaluating the strengths and weaknesses of each technique, we propose the most effective method for detecting penetration or aspiration in VFSS. Our comprehensive evaluation reveals the superiority of 3D-CNN in the automatic detection of penetration and aspiration in VFSS. This research contributes to the development of a clinically viable automatic detection system, offering potential advancements in the care and management of patients with dysphagia. Reddy, Chinthala Sreya; Park, Eunhee; Lee, Jong Taek Univ Southern Calif, Viterbi Sch Engn, Los Angeles, CA 90007 USA; Kyungpook Natl Univ, Sch Med, Dept Rehabil Med, Daegu 41944, South Korea; Kyungpook Natl Univ Chilgok Hosp, Dept Rehabil Med, Daegu 41404, South Korea; Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 41566, South Korea 57270255300; 56107216400; 24341317500 ehmdpark@knu.ac.kr;jongtaeklee@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 11 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2023 3.4 34.4 0.65 2025-06-25 3 5 Convolutional neural networks; Streaming media; Feature extraction; Deep learning; Training; Three-dimensional displays; Predictive models; Videofluoroscopic swallowing study; dysphagia; convolutional networks; long short-term memory; video classification DYSPHAGIA; PNEUMONIA convolutional networks; dysphagia; long short-term memory; video classification; Videofluoroscopic swallowing study Brain; Classification (of information); Convolution; Deep neural networks; Feature extraction; Media streaming; Memory architecture; Network architecture; Three dimensional computer graphics; Three dimensional displays; Convolutional networks; Convolutional neural network; Deep learning; Dysphagia; Features extraction; Predictive models; Streaming medium; Three-dimensional display; Video classification; Videofluoroscopic swallowing study; Long short-term memory English 2023 2023 10.1109/access.2023.3315342 바로가기 바로가기 바로가기 바로가기
Article Considering cell volume in dopant screening for improving Li-ion mobility in an amorphous LiPON solid-state electrolyte: an ab initio study Engineering of solid electrolytes of Li-ion batteries is carried out for achieving high levels of ionic conductivity and preserving low levels of electrical conductivity. Doping metallic elements into solid electrolyte materials composed of Li, P, and O is quite challenging due to instances of possible decomposition and secondary phase formation. To accelerate the development of high-performance solid electrolytes, predictions of thermodynamic phase stabilities and conductivities are necessary, as they would avoid the need to carry out exhaustive trial-and-error experiments. In this study, we demonstrated theoretical approach to increase the ionic conductivity of amorphous solid electrolyte by doping: cell volume-ionic conductivity relation. Using density functional theory (DFT) calculations, we examined the validity of the hypothetical principle in predicting improvements in stability and ionic conductivity with 6 candidate doping elements (Si, Ti, Sn, Zr, Ce, Ge) in a quaternary Li-P-O-N solid electrolyte system (LiPON) both in crystalline and amorphous phases. The doping of Si into LiPON (Si-LiPON) was indicated to stabilize the system and enhance ionic conductivity based on our calculated doping formation energy and cell volume change. The proposed doping strategies provide crucial guidelines for the development of solid-state electrolytes with enhanced electrochemical performances. Choi, Heechae; Ji, Seulgi; Cho, Haneol; Kim, Chansoo; Kim, Patrick Joohyun; Park, Hyunjung; Choi, Junghyun Xian Jiaotong Liverpool Univ, Dept Chem, Suzhou Ind Pk, Suzhou 215123, Peoples R China; Univ Cologne, Inst Inorgan Chem, Theoret Mat & Chem Grp, Greinstr 6, D-50939 Cologne, Germany; Korea Inst Sci & Technol, Hwarangro 14 Gil 5, Seoul 136791, South Korea; Kyungpook Natl Univ, Dept Appl Chem, Daegu 41566, South Korea; Chosun Univ, Dept Mat Sci & Engn, Gwangju 61452, South Korea; Korea Inst Ceram Engn & Technol, Energy Storage Mat Ctr, Jinju 52851, South Korea ; Choi, Heechae/U-5776-2018; Choi, Heechae/AFM-0327-2022 24469888700; 58186041800; 57193171067; 7409872719; 57195611779; 55713687300; 59883103900 jchoi@kicet.re.kr; RSC ADVANCES RSC ADV 2046-2069 13 21 SCIE CHEMISTRY, MULTIDISCIPLINARY 2023 3.9 34.4 0.1 2025-06-25 1 1 GENERALIZED GRADIENT APPROXIMATION; CONDUCTIVITY Amorphous silicon; Density functional theory; Germanium compounds; Ionic conduction in solids; Ionic conductivity; Lithium compounds; Lithium-ion batteries; Phosphorus compounds; Silicon compounds; Solid-State Batteries; Titanium compounds; Ab initio study; Cell volume; Decomposition phasis; Electrical conductivity; Electrolyte material; Ion Mobility; Metallic elements; Phase formations; Secondary phase; Solid-state electrolyte; Solid electrolytes English 2023 2023-05-09 10.1039/d3ra00557g 바로가기 바로가기 바로가기 바로가기
페이지 이동:

논문 데이터 용어 설명

용어 설명
WoS Web of Science. Clarivate Analytics에서 제공하는 학술 데이터베이스입니다. 해당 논문이 WoS에 수록되어 있는지 여부를 표시합니다 (○: 수록됨).
SCOPUS Elsevier에서 제공하는 세계 최대 규모의 초록 및 인용 데이터베이스입니다. 해당 논문이 SCOPUS에 수록되어 있는지 여부를 표시합니다 (○: 수록됨).
Document Type 문헌의 유형을 나타냅니다. Article(원저), Review(리뷰), Proceeding Paper(학회논문), Editorial Material(편집자료), Letter(레터) 등으로 분류됩니다.
Title 논문의 제목입니다.
Abstract 논문의 초록(요약)입니다. 연구의 목적, 방법, 결과, 결론을 간략히 요약한 내용입니다.
Authors 논문의 저자 목록입니다. 공동 저자가 여러 명인 경우 세미콜론(;)으로 구분됩니다.
Affiliation 저자들의 소속 기관 정보입니다. 대학, 연구소, 기업 등 저자가 소속된 기관명이 표시됩니다.
ResearcherID (WoS) Web of Science의 고유 연구자 식별번호입니다. 동명이인을 구분하고 연구자의 업적을 정확하게 추적할 수 있습니다.
AuthorsID (SCOPUS) SCOPUS의 고유 저자 식별번호입니다. 연구자의 모든 출판물을 추적하고 관리하는 데 사용됩니다.
Journal 논문이 게재된 학술지의 정식 명칭입니다.
JCR Abbreviation Journal Citation Reports에서 사용하는 저널의 공식 약어입니다. 저널을 간략하게 표기할 때 사용됩니다.
ISSN International Standard Serial Number. 국제표준연속간행물번호로, 인쇄본 저널에 부여되는 고유 식별번호입니다.
eISSN Electronic ISSN. 전자 버전 저널에 부여되는 고유 식별번호입니다.
Volume 저널의 권(Volume) 번호입니다. 보통 연도별로 하나의 권이 부여됩니다.
Issue 저널의 호(Issue) 번호입니다. 한 권 내에서 여러 호로 나누어 출판되는 경우가 많습니다.
WoS Edition Web of Science의 에디션입니다. SCIE(Science Citation Index Expanded), SSCI(Social Sciences Citation Index), AHCI(Arts & Humanities Citation Index) 등으로 구분됩니다.
WoS Category Web of Science의 주제 분류 카테고리입니다. 저널과 논문이 속한 학문 분야를 나타냅니다.
JCR Year 해당 저널의 JCR(Journal Citation Reports) 지표가 산출된 연도입니다.
IF (Impact Factor) 저널 영향력 지수. 최근 2년간 발표된 논문이 해당 연도에 평균적으로 인용된 횟수를 나타냅니다. 저널의 학술적 영향력을 나타내는 대표적인 지표입니다.
JCR (%) 해당 카테고리에서 저널이 위치하는 상위 백분율입니다. 값이 낮을수록 우수한 저널임을 의미합니다 (예: 5%는 상위 5%를 의미).
FWCI Field-Weighted Citation Impact. 분야별 가중 인용 영향력 지수입니다. 논문이 받은 인용을 동일 분야, 동일 연도, 동일 문헌 유형의 평균과 비교한 값입니다. 1.0이 평균이며, 1.0보다 높으면 평균 이상의 인용을 받았음을 의미합니다.
FWCI UpdateDate FWCI 값이 마지막으로 업데이트된 날짜입니다. FWCI는 인용이 누적됨에 따라 주기적으로 업데이트됩니다.
WOS Citation Web of Science에서 집계된 해당 논문의 총 인용 횟수입니다.
SCOPUS Citation SCOPUS에서 집계된 해당 논문의 총 인용 횟수입니다.
Keywords (WoS) 저자가 논문에서 직접 지정한 키워드입니다. Web of Science에 등록된 저자 키워드 목록입니다.
KeywordsPlus (WoS) Web of Science에서 자동으로 추출한 추가 키워드입니다. 논문의 참고문헌 제목에서 자주 등장하는 단어들로 생성됩니다.
Keywords (SCOPUS) 저자가 논문에서 직접 지정한 키워드입니다. SCOPUS에 등록된 저자 키워드 목록입니다.
KeywordsPlus (SCOPUS) SCOPUS에서 자동으로 추출하거나 추가한 색인 키워드입니다.
Language 논문이 작성된 언어입니다. 대부분 English이며, 그 외 다양한 언어로 작성된 논문이 포함될 수 있습니다.
Publication Year 논문이 출판된 연도입니다.
Publication Date 논문의 정확한 출판 날짜입니다 (년-월-일 형식).
DOI Digital Object Identifier. 디지털 객체 식별자로, 논문을 고유하게 식별하는 영구적인 식별번호입니다. 이를 통해 논문의 온라인 위치를 찾을 수 있습니다.