연구성과로 돌아가기
2023 연구성과 (271 / 285)
※ 컨트롤 + 클릭으로 열별 다중 정렬 가능합니다.
Excel 다운로드
| WoS | SCOPUS | Document Type | Document Title | Abstract | Authors | Affiliation | ResearcherID (WoS) | AuthorsID (SCOPUS) | Author Email(s) | Journal Name | JCR Abbreviation | ISSN | eISSN | Volume | Issue | WoS Edition | WoS Category | JCR Year | IF | JCR (%) | FWCI | FWCI Update Date | WoS Citation | SCOPUS Citation | Keywords (WoS) | KeywordsPlus (WoS) | Keywords (SCOPUS) | KeywordsPlus (SCOPUS) | Language | Publication Stage | Publication Year | Publication Date | DOI | JCR Link | DOI Link | WOS Link | SCOPUS Link |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ○ | Conference paper | On the Scalability of Parking Trajectory Optimization of Autonomous Ground Vehicles | Although the use of optimization-based algorithms for autonomous motion planning in the context of parking has been studied in the literature, most of the existing works were based on either unrealistic simulation environments or a single vehicle type or model. In order to support the deployment of such frameworks for real-world applications, the need for the scalability analysis of such optimization frameworks under realistic simulation environments as well as different vehicle types becomes important. Therefore this paper investigates the suitability of a two-stage optimization framework under a realistic simulation environment as well as using 4 different vehicle models. Specifically, the two-stage optimization process involves first the use of the A star algorithm for initial path generation, and in the second stage, Sequential Quadratic Programming (SQP) is used to optimize the results pathways. In terms of vehicle type, we employ four different vehicle types with different model parameters and evaluated the performance of the framework accordingly. The results show that also the optimization framework is capable of generating feasible parking trajectories, some vehicle types require more script run-time compared to others. © 2023 IEEE. | Aboyeji, Esther; Ajani, Oladayo S.; Mallipeddi, Rammohan | Kyungpook National University, Department of Artificial Intelligence, Daegu, South Korea; Kyungpook National University, Department of Artificial Intelligence, Daegu, South Korea; Kyungpook National University, Department of Artificial Intelligence, Daegu, South Korea | 58406711200; 57465126000; 25639919900 | aboyejitolulopeesther@gmail.com; | International Conference on ICT Convergence | 2162-1233 | 0.43 | 2025-06-25 | 1 | Autonomous Driving; Parking Navigation and Maneuvers; Trajectory Optimization | Aerodynamics; Autonomous vehicles; Ground vehicles; Intelligent vehicle highway systems; Motion planning; Quadratic programming; Scalability; Autonomous driving; Autonomous ground vehicles; Optimization framework; Parking navigation and maneuver; Realistic simulation; Simulation environment; Trajectory optimization; Two stage optimizations; Vehicle modelling; Vehicle types; Trajectories | English | Final | 2023 | 10.1109/ictc58733.2023.10393642 | 바로가기 | 바로가기 | |||||||||||||||||
| ○ | Conference paper | On The Security of PACMAN: Privacy-Preserving Authentication Scheme for Managing Cybertwin-Based 6G Networking | Cybertwin-based cloud-centric networks are attracting considerable attention as new multiaccess edge computing network architecture in 6G networks. However, the sensitive data transmitted between the cybertwin and users/things via wireless communication can be intercepted and hijacked by malicious attackers, resulting in security threats and privacy concerns owing to leakage or abuse. Therefore, secure authentication and key agreement schemes are essential to ensure secure communication in cybertwin-based networks. In 2021, Soleymani et at. presented a privacy-preserving authentication scheme for managing cybertwin-based 6G netoworking (PACMAN). Soleymani et at. claimed that their scheme can satisfy privacy-preserving requirements and resist security threats. However, we demonstrates that PACMAN fails to achieve privacy-preserving requirement. Thus, we suggest the necessary security guidelines to achieve privacy-preserving and resolve the security risks of PACMAN. © 2023 IEEE. | Kim, Myeonghyun; Son, Seunghwan; Park, Youngho; Park, Kilhoum | Kyungpook National University, School of Electronic and Electrical Engineering, Daegu, South Korea; Kyungpook National University, School of Electronic and Electrical Engineering, Daegu, South Korea; Kyungpook National University, School of Electronic and Electrical Engineering, Daegu, South Korea; Kyungpook National University, School of Electronic and Electrical Engineering, Daegu, South Korea | 57210278739; 57221744477; 56962990300; 35776805000 | khpark@ee.knu.ac.kr; | International Conference on Ubiquitous and Future Networks, ICUFN | 2165-8528 | 2023-July | 0 | 2025-06-25 | 0 | authentication; Cryptanalysis; cybertwin; privacy-preserving; security | Computer architecture; Mobile security; Network architecture; Network security; Privacy-preserving techniques; Queueing networks; Security systems; Sensitive data; Authentication scheme; Cryptanalyse; Cybertwin; Edge computing; Multiaccess; Privacy preserving; Privacy-preserving authentication; Security; Security threats; Sensitive datas; Authentication | English | Final | 2023 | 10.1109/icufn57995.2023.10201074 | 바로가기 | 바로가기 | ||||||||||||||||
| ○ | Book chapter | On the Structure of Conditionally Positive Definite Algebraic Operators | Recently, the authors have introduced and intensively studied a class of bounded Hilbert space operators called conditionally positive definite. Its origins go back to the harmonic analysis on ∗-semigroups, namely to the concept of conditional positive definiteness. Our main aim here is to give a complete description of algebraic conditionally positive definite operators on inner product spaces; we do not assume that the operators under consideration are bounded. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2023. | Jabłoński, Zenon Jan; Jung, Il Bong; Stochel, Jan | Instytut Matematyki, Uniwersytet Jagielloński, ul, Łojasiewicza 6, Kraków, PL-30348, Poland; Department of Mathematics, Kyungpook National University, Daegu, 41566, South Korea; Instytut Matematyki, Uniwersytet Jagielloński, ul, Łojasiewicza 6, Kraków, PL-30348, Poland | 6602624635; 7102964485; 6602273956 | Jan.Stochel@im.uj.edu.pl; | Multivariable Operator Theory: the Jörg Eschmeier Memorial Volume | 0 | 2025-06-25 | 0 | Algebraic operator; Conditional positive definiteness; Conditionally positive definite operator; Similarity | English | Final | 2023 | 10.1007/s11785-022-01265-0 | 바로가기 | 바로가기 | |||||||||||||||||||
| ○ | ○ | Proceedings Paper | On the Value of Sequence-based System Call Filtering for Container Security | One critical attack that exploits kernel vulnerabilities through system call invocations is considered a serious threat to container security since it results in the privilege escalation followed by the infamous container escape. The seccomp kernel feature provides the first line of defense against it. Further, secure container runtimes such as gVisor also make use of it to strengthen security. However, it is known to be brittle since it operates at the granularity of the individual system call. Inadvertent filtering of necessary system calls may inhibit the correct execution while overly generous rules allow the attacks. We believe that, by looking at the sequence of system calls, we can achieve more accurate and effective blocking of attacks in containers. To this end, we built a software tool, NIMOS, that performs a combination of static and dynamic analyses of exploit codes in an automated way and investigated the existence of such commonly occurring system call sequences. Then, we analyzed the expected defensive power from applying the sequence-based filtering mechanisms using a large set of collected kernel vulnerabilities to assess the feasibility. We found that there exist a significant number and forms of commonly appearing system call sequences that can be used as a clear signature of the class of attacks. We characterize these common system call sequences that exist among the exploit codes and evaluate the expected effectiveness of a sequence-based system call filtering mechanism for containers. | Song, Somin; Suneja, Sahil; Le, Michael V.; Tak, Byungchul | Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu, South Korea; IBM TJ Watson Res Ctr, Yorktown Hts, NY USA | song, soming/HJZ-2029-2023 | 57943710100; 55813198500; 57190177825; 6506911621 | sominsong@knu.ac.kr;suneja@us.ibm.com;mvle@us.ibm.com;bctak@knu.ac.kr; | 2023 IEEE 16TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD | 2159-6182 | 2.01 | 2025-06-25 | 5 | 8 | container security; Linux security; seccomp; Linux kernel vulnerability; system call sequence pattern | container security; Linux kernel vulnerability; Linux security; seccomp; system call sequence pattern | Linux; Container security; Filtering mechanism; Linux kernel; Linux kernel vulnerability; Linux security; Seccomp; Sequence patterns; System call sequence pattern; System calls; System-call sequence; Containers | English | 2023 | 2023 | 10.1109/cloud60044.2023.00043 | 바로가기 | 바로가기 | 바로가기 | ||||||||||||
| ○ | Conference paper | On-Device Deep Learning-based Multiple Behavior Detection using IMU Motion Sensors | This study proposes a system for monitoring the behavior of patients using an on-device deep learning-based inertial measurement unit (IMU) motion sensor. The wearable device captures the patient's four active behavior states (walking, eating, falling, and resting) using a three-dimensional accelerometer (ACC) and gyroscope (GYR). Five features, including mean value, standard deviation, median absolute deviation, minimum, and maximum, are applied to each 1- second segmented sample to extract the most significant characteristics from the signals. Four machine-learning approaches, such as support vector machines (SVM), multilayer perceptron neural network (MLP), long short-term memory (LSTM), and convolutional neural networks (CNNs), are used to evaluate the system's viability for different patient behavior identifications. The CNN algorithm showed the highest accuracy in patient behavior classification, surpassing the other algorithms by 92.68%. This algorithm is installed directly on the wearable device due to its exceptional performance, increasing system efficiency, and decreasing data transmission and connection latency. Additionally, a software program installed on the computer helps obtain necessary data from the wearable device through Bluetooth. It enables doctors, nurses, or supervisors to monitor a patient's behavior and other relevant information. The study's analysis results demonstrate the reliability of the device-based deep learning system for patient behavior recognition. © 2023 IEEE. | Kim, Dong-Eon; Mai, Ngoc-Dau; Han, Dong Seog | Kyungpook National University, Center for Ict and Automotive Convergence, Daegu, South Korea; Ai Research Laboratory, Visionin, Seoul, South Korea; Kyungpook National University, School of Electronic and Electrical Engineering, Daegu, South Korea | 58556670400; 57222326137; 7403219442 | dshan@knu.ac.kr; | International Conference on Ubiquitous and Future Networks, ICUFN | 2165-8528 | 2023-July | 0.99 | 2025-06-25 | 2 | Behavior Detection; Deep learning; Edge machine learning; IMU | Behavioral research; Convolutional neural networks; Learning systems; Long short-term memory; Multilayer neural networks; Reliability analysis; Wearable sensors; Active behaviours; Behavior detection; Convolutional neural network; Deep learning; Edge machine learning; Inertial measurements units; Machine-learning; Mean values; Motion sensors; Wearable devices; Support vector machines | English | Final | 2023 | 10.1109/icufn57995.2023.10200343 | 바로가기 | 바로가기 | ||||||||||||||||
| ○ | Conference paper | On-sky point spread function analysis for the off-axis freeform three-mirror telescope | We have acquired on-sky point spread functions through a year-long test run using a 300 mm off-axis freeform three mirror telescope. We present the observational data along with comprehensive simulation results. © 2023 The Author (s). | Lee, Gayoung; Kim, Yunjong; Kim, Daewook; Byun, Woowon; Chang, Seunghyuk; Ko, Jongwan | Kyungpook National University, Daegu, 41566, South Korea, Korea Astronomy and Space Science Institute, Daejeon, 34055, South Korea; Korea Astronomy and Space Science Institute, Daejeon, 34055, South Korea; Wyant College of Optical Sciences, University of Arizona, Tucson, 85721, AZ, United States; Korea Astronomy and Space Science Institute, Daejeon, 34055, South Korea; Center for Integrated Smart Sensors, Daejeon, 34141, South Korea; Korea Astronomy and Space Science Institute, Daejeon, 34055, South Korea, University of Science and Technology, Korea, Daejeon, 34113, South Korea | 57846551600; 57203310827; 57219213285; 57216758314; 12759772300; 18434193800 | yjkim@kasi.re.kr; | Optical Fabrication and Testing in Proceedings Optica Design and Fabrication Congress 2023, IODC, OFT - Part of Optica Design and Fabrication Congress | 4.27 | 2025-06-25 | 4 | Mirrors; Optical design; Telescopes; Freeforms; Function analysis; Observational data; Off-axis; Point-Spread function; Test runs; Optical transfer function | English | Final | 2023 | 바로가기 | |||||||||||||||||||||
| ○ | Book chapter | One-Dimensional Governing Equations and Finite Element Formulation | Chapter 1 suggests that the three-dimensional displacements on the midline of a cross-sectional wall can be expressed as products of the generalized 1D displacements and sectional shape functions. The displacements at a general point on a cross-section are calculated using those on the midline based on the kinematic assumption Kirchhoff’s thin plate theory, i.e., the assumption of no shear and normal strains in the thickness direction (εnn= γns= γzn= 0 ). The local coordinates (z, n, s) defined on the midline of a cross-sectional wall will be used to facilitate the expression of the strain field from the three-dimensional displacements. A two-dimensional stress field can be derived assuming a plane-stress state (i.e.,σnn=τns=τzn=0) for thin walls. © 2023, Springer Nature Singapore Pte Ltd. | Kim, Yoon Young; Jang, Gang-Won; Choi, Soomin | Department of Mechanical Engineering, Seoul National University, Seoul, South Korea; Department of Mechanical Engineering, Sejong University, Seoul, South Korea; School of Mechanical Engineering, Kyungpook National University, Daegu, South Korea | 36062771200; 7102646127; 56124305600 | yykim@snu.ac.kr; | Solid Mechanics and its Applications | 0925-0042 | 257 | 0 | 2025-06-25 | 0 | Finite element method; Finite element formulations; Governing equations; Kinematic assumptions; Kirchhoff; Normal strain; One-dimensional; Shape functions; Thickness direction; Thin plate theory; Three-dimensional displacements; Strain | English | Final | 2023 | 10.1007/978-981-19-7772-5_3 | 바로가기 | 바로가기 | |||||||||||||||||
| ○ | Conference paper | Optical-see-through near-eye-display with 3D occlusion | We propose an augmented reality near-eye-display which can present varifocal virtual images with corresponding masks. The varifocal mask occludes the real scene behind the virtual images, enhancing their visibility. © 2023 The Author (s). | Park, Jae-Hyeung; Han, Woongseob; Lee, Jae-Won; Shin, Jung-Yeop; Choi, Myeong-Ho; Kim, Hak-Rin | Department of Electrical and Computer Engineering, Inha University, 100 Inha-ro, Michuhol-gu, Incheon, 22212, South Korea; Department of Electrical and Computer Engineering, Inha University, 100 Inha-ro, Michuhol-gu, Incheon, 22212, South Korea; School of Electronic and Electrical Engineering, Kyungpook National University, 80 Daehak-ro, Buk-gu, Daegu, 41566, South Korea; School of Electronic and Electrical Engineering, Kyungpook National University, 80 Daehak-ro, Buk-gu, Daegu, 41566, South Korea; Department of Electrical and Computer Engineering, Inha University, 100 Inha-ro, Michuhol-gu, Incheon, 22212, South Korea; School of Electronic and Electrical Engineering, Kyungpook National University, 80 Daehak-ro, Buk-gu, Daegu, 41566, South Korea | 36067259500; 57410596200; 58377059800; 57956975700; 57211561152; 7410124944 | jh.park@inha.ac.kr; | 3D Image Acquisition and Display: Technology, Perception and Applications in Proceedings Optica Imaging Congress, 3D, COSI, DH, FLatOptics, IS, pcAOP 2023 | 0 | 2025-06-25 | 0 | Augmented reality; Three dimensional displays; Image enhancing; Optical see-through; Virtual images; Image enhancement | English | Final | 2023 | 10.1364/3d.2023.dw4a.2 | 바로가기 | 바로가기 | |||||||||||||||||||
| ○ | Conference paper | Optimal evacuation path search scheme for fire situations using 5G communication technology | This paper proposes an enhanced A∗ algorithm for optimizing evacuation routes within buildings during a fire outbreak. One important research topic is finding the safest and quickest evacuation route considering the structure of the building and the location of the fire when it occurs. The proposed technique employs a multisensor-based fire detection system facilitated by 5G communication technology, enabling not only fire detection but also assessment of potential evacuation routes considering various factors such as smoke, heat, and population density. Ultimately, it provides a route to safely evacuate to the destination. The technique proposed in this paper enhances the conventional path-finding A∗ algorithm by designating waypoints, setting optimal paths, and thus solving the problems resulting from the traditional A∗ algorithm, which simply designates a path from the starting point to a simple target. The proposed scheme leverages 5G communication technology to apply to building and fire map data, finding the optimal path from the starting point to the destination and selecting the path with the least cost from these routes. This approach provides a safe and efficient route for evacuees during a fire outbreak. In performance verification under simulation conditions, the proposed technique was validated to determine a route to the destination with a minimum cost, showing superiority over the conventional A∗ algorithm. The simulation results confirm that the proposed technique can process more data compared to the existing scheme. © 2023 IEEE. | Yoon, Mahnsuk; Lim, Gilhwan; Kwon, Jaeuk; Choi, Hyunchul; Lee, Hyunjoo; Cho, Kyucheol | GERI(Gumi Electronics and Information Technology Research Institute), Future Mobile Communication Research Center, Gumi, South Korea; Research Institute Daon Co., Ltd., Gumi, South Korea; GERI(Gumi Electronics and Information Technology Research Institute), Future Mobile Communication Research Center, Gumi, South Korea; Research Institute Daon Co., Ltd., Gumi, South Korea; GERI(Gumi Electronics and Information Technology Research Institute), Future Mobile Communication Research Center, Gumi, South Korea; Software Education Center Kyungpook National University, School of Computer Secience and Engineering, Daegu, South Korea | 57203640624; 57991627800; 57991576500; 57991627900; 57991677700; 26031217700 | yms@geri.re.kr; | International Conference on ICT Convergence | 2162-1233 | 0.43 | 2025-06-25 | 1 | 5G Communication Technology; Fire Detection and Evacuation; Multi-Sensor Based Systems | 5G mobile communication systems; Fire detectors; Population statistics; Smoke; 5g communication technology; A* algorithm; Communicationtechnology; Evacuation routes; Fire detection; Fire evacuation; Fire outbreak; Multi sensor; Multi-sensor based system; Sensor based systems; Fires | English | Final | 2023 | 10.1109/ictc58733.2023.10393282 | 바로가기 | 바로가기 | |||||||||||||||||
| ○ | ○ | Proceedings Paper | Optimal Power Regulating for Wind Turbine with LQR and Disturbance Accommodation Pitch Control | For variable speed variable pitch wind turbine with constant torque control, PI variable pitch control is often used as traditional control strategies. The drive-train damping is too small, which is easy to cause resonance under wind disturbance. Based on the optimal control theory, this paper establishes a control-oriented model considering the dynamic of the drive-train, generator and pitch actuator. Controller is designed by using Disturbance Accommodation Control (DAC) augmented model which is an enhanced version of Linear Quadratic Regulator (LQR). Then, state is obtained and the disturbance is reconstructed by selecting suitable gain matrix of observer. In order to verify the effectiveness of the proposed method, the LQR and PID controller are implemented on MATLAB/Simulink. The results show that LQR method has better adjustment effect on output power. | Wen, Haoyuan; Liu, Yajuan; Lee, S. M.; Park, Ju H. | North China Elect Power Univ, Sch Control & Comp Engn, Beijing, Peoples R China; Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu, South Korea; Yeungnam Univ, Dept Elect Engn, Daegu, South Korea | Park, Ju H./J-8796-2012; Lee, Sangmoon/C-4502-2018 | 58478825000; 55255775300; 59510733500; 15036553900 | wenhaoyuan3845@163.com;yajuan.liu.12@gmail.com;moony@knu.ac.kr;jessie@ynu.ac.k; | 2023 9TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND ROBOTICS, ICCAR | 2251-2446 | 2251-2454 | 1.6 | 2025-06-25 | 2 | 4 | wind turbine; LQR; pitch control; disturbance accommodation control | DESIGN | disturbance accommodation control; LQR; pitch control; wind turbine | Controllers; Three term control systems; Accommodation control; Disturbance accommodation; Disturbance accommodation control; Drive train; Linear quadratic; Linear quadratic regulator; Optimal power; Pitch-control; Quadratic regulators; Variable speed-variable pitches; Wind turbines | English | 2023 | 2023 | 10.1109/iccar57134.2023.10151773 | 바로가기 | 바로가기 | 바로가기 | ||||||||||
| ○ | Article | Optimizing combination of cryoprotective additives to enhance the viability of probiotic Lactobacillus plantarum; [Lactobacillus plantarum의 생존성 증진을 위한 동결보호제 조합 최적화] | Freeze-drying is widely used to stabilize lactic acid bacteria products for storage and distribution. This lyophilization process damages microbial cells, so improving cell viability during the process is necessary. We evaluated cryoprotective additives to maximize the survival rate of probiotic Lactobacillus plantarum during lyophilization and storage. We used mathematical factorial designs, including Plackett-Burman design (PBD) and central composite design (CCD), to optimize the screening process and types and composition of cryoprotectants. Trehalose, skim milk, and monosodium glutamate (MSG) showed higher protection effects than the other candidates in experiments and PBD. A combination of skim milk (5.1%), trehalose (10.55%), and MSG (4.72%) was predicted as the best composition of the cryoprotectants by employing CCD. The survival rate was determined experimentally and predictively as approximately 80% with this combination, which was 2.67 times higher than the protective effect of 10% skim milk widely used as a cryoprotective additive in laboratories. This study highlights the importance of precise processing for the distribution of probiotics, and suggests a method for selecting proper cryoprotectants to maximize the viability of probiotic bacteria. © Copyright 2023, The Microbiological Society of Korea | Li, Yuling; Kim, Whee-Soo; Lee, Sang-Mok; Hong, Liang; Kang, Sang-Kee; Cho, Chong-Su; Choi, Yun-Jaie; Lee, Jun-Yeong | Department of Agricultural Biotechnology, Seoul National University, Seoul, 08826, South Korea; Department of Agricultural Biotechnology, Seoul National University, Seoul, 08826, South Korea; Department of Agricultural Biotechnology, Seoul National University, Seoul, 08826, South Korea; Department of Agricultural Biotechnology, Seoul National University, Seoul, 08826, South Korea; Institute of Green-Bio Science & Technology, Seoul National University, Pyeongchang, 25354, South Korea; Department of Agricultural Biotechnology, Seoul National University, Seoul, 08826, South Korea, Research Institute of Agriculture and Life Sciences, Seoul National University, Seoul, 08826, South Korea; Department of Agricultural Biotechnology, Seoul National University, Seoul, 08826, South Korea; School of Life Sciences, BK21 FOUR KNU Creative BioResearch Group, Kyungpook National University, Daegu, 41566, South Korea | 57240627200; 57201639395; 57203597282; 57201643131; 8313343600; 55430062200; 57226210461; 56428518900 | junyeong@knu.ac.kr;cyjcow@snu.ac.kr; | Korean Journal of Microbiology | 0440-2413 | 59 | 2 | 0.16 | 2025-06-25 | 1 | cryoprotectant; freezedrying; Lactobacillus plantarum; monosodium glutamate; skim milk; trehalose | English | Final | 2023 | 10.7845/kjm.2023.3020 | 바로가기 | 바로가기 | ||||||||||||||||
| ○ | ○ | Proceedings Paper | Optimizing Memory Allocation in a Serverless Architecture through Function Scheduling | In a serverless architecture, a function does not fully utilize the allocated memory. Such memory over-allocation increases node utilization and wastes resources, causing cold-start and latency issues. This paper presents a fine-grained scheduling approach for a serverless architecture that aims to address the issue of over-memory allocation and improve data locality. The proposed approach estimates how much memory each function uses so that similar functions can be scheduled on the same node. As a result, it makes less use of each node and keeps the state within a single node. We evaluated our approach through the existing FaaS applications and real-world data. | Pandey, Manish; Kwon, Young Woo | Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu, South Korea | Kwon, Young-Woo/HGE-6607-2022; Pandey, Manish/J-6825-2019 | 57239896800; 57208480210 | manishpandeyabc@gmail.com;ywkwon@knu.ac.kr; | 2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW | 1.47 | 2025-06-25 | 1 | 3 | Serverless computing; scheduling; resource utilization | and resource utilization; scheduling; Serverless computing | And resource utilization; Cold-start; Data locality; Fine grained; Node utilizations; Real-world; Resources utilizations; Serverless architecture; Serverless computing; Waste resources; Memory architecture | English | 2023 | 2023 | 10.1109/ccgridw59191.2023.00056 | 바로가기 | 바로가기 | 바로가기 | |||||||||||||
| ○ | ○ | Proceedings Paper | Ordinal Regression for Beef Grade Classification | Beef, one of the leading meat consumed by humans, is classified into five categories: 1++, 1+, 1, 2, 3 in South Korea. These grades are directly determined by professional judges, who check the status of the meat with their eyes. This procedure may be subjective because there is no quantified criterion, and it may cost a considerable time. In this paper, we propose a deep learning algorithm to alleviate this problem. By using deep learning, the beef grade can be classified faster and by more objective criteria. In addition, we redefined the problem with the original regression to consider the order of grades, and it achieves higher performance than training the model with a hard label. Furthermore, through ensemble learning with various ordinal regression models, we achieved the highest performance without significantly increasing resource usage. | Lee, Chaehyeon; Hong, Jiuk; Lee, Jonghyuck; Choi, Taehoon; Jung, Heechul | Kyungpook Natl Univ, Dept Artificial Intelligence, Daegu, South Korea; Seoreu Co Ltd, Busan, South Korea | Jung, Heechul/HTL-7199-2023 | 57222731243; 57353688600; 57491056900; 58121526900; 55652175200 | 123456ccdd@knu.ac.kr;hong4497@knu.ac.kr;jhlee@seoreu.com;choi_th@seoreu.com;heechul@knu.ac.kr; | 2023 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, ICCE | 0 | 2025-06-25 | 0 | 0 | Deep learning; convolutional neural network; classification; ordinal regression; ensemble learning | classification; convolutional neural network; Deep learning; ensemble learning; ordinal regression | Convolutional neural networks; Deep learning; Learning algorithms; Learning systems; Classifieds; Convolutional neural network; Deep learning; Ensemble learning; Objective criteria; Ordinal regression; Performance; Regression modelling; Resource usage; South Korea; Beef | English | 2023 | 2023 | 10.1109/icce56470.2023.10043530 | 바로가기 | 바로가기 | 바로가기 | |||||||||||||
| ○ | Conference paper | Outdoor Long Range Ubiquitous Projectiles Tracking System Using P-MPLR and Computer Vision | A growing body of research has been dedicated to investigating systems for quickly detecting and pinpointing the location of projectiles aimed at a target. Various studies and products have demonstrated the feasibility of predicting the point of origin for a shot. However, existing tools come with limitations and inconveniences. This study aims to introduce a model that achieves highly accurate and low-latency tracking of shot origins during long-range shooting, free from constraints, by incorporating LoRa, computer vision, and sound detection technologies. The proposed system commences with an initial photograph captured by a camera positioned near the target. Whenever the adjacent acoustic sensor detects a fired projectile, the camera captures a new image, triggering the Raspberry Pi located beside the target to calculate the coordinates of the shot by comparing it with the previous image. When compared to the actual bullet mark, the predicted bullet mark's error remains under 1 mm. This paper's proposal showcases accuracy suitable for integration into military intelligence training systems, offering a cost-effective solution. © 2023 IEEE. | Kim, Minjae; Choi, Woojin; Jeong, Hansu; Lee, Sophia; Moon, Jeongwon; O'Sullivan, Ethan; Na, Donghyeon; Smith, Anthony | Kyung Hee University, Yongin, South Korea; Sun Moon University, Asan, South Korea; Sangmyung University, Seoul, South Korea; Purdue University, West Lafayette, United States; Kyungpook National University, Daegu, South Korea; Purdue University, West Lafayette, United States; Sangmyung University, Seoul, South Korea; Purdue University, West Lafayette, United States | 58842511300; 59033767000; 58875856300; 58876219700; 58875145300; 58875856400; 58876040700; 55599443800 | kmj5596@khu.ac.kr; | International Conference on ICT Convergence | 2162-1233 | 0 | 2025-06-25 | 0 | Computer vision; LoRa; Sound detection | Cameras; Cost effectiveness; Projectiles; Tracking (position); Acoustic Sensors; Detection technology; Fired projectiles; Growing bodies; Highly accurate; Lora; Low latency; Projectile tracking; Sound detection; Tracking system; Computer vision | English | Final | 2023 | 10.1109/ictc58733.2023.10393144 | 바로가기 | 바로가기 | |||||||||||||||||
| ○ | Article | Overview and Prevention of Complications During Full-Endoscopic Cervical Spine Surgery | Objective: Posterior full-endoscopic cervical foraminotomy/discectomy (PECF) is used to treat medically intractable cervical radiculopathy. PECF has many potential advantages; however, despite its minimally invasive nature, complications of PECF are possible, including hemorrhage, infection, injury to neural tissue, damage to the facet joint and musculature, loss of cervical lordosis, and subsequent progression to cervical kyphosis. We examined complications following PECF and reviewed the relevant literature. Methods: We retrospectively reviewed 101 patients who underwent PECF for either disc herniation (DH, 59 patients) or foraminal stenosis (FS, 42 patients). After surgery, the patients were encouraged to ambulate and were discharged 2–3 days later without the use of a neck collar. Events occurring during hospitalization were documented in the hospital information system. Patients were followed-up for a mean period of 21±26 months (range, 1–110 months). Results: Clinical parameters improved from 1 month postoperatively and were maintained throughout the follow-up period, with no significant differences between the DH and FS groups (p>0.05). Complications occurred in 14 patients (14%) with no significant difference between the DH (8 of 59, 14%) and FS (6 of 42, 14%) groups (p>0.05). The most common complication was dural tear, followed by motor weakness, sensory changes, hematoma collection, incomplete decompression, reoperation, and wrong-level surgery. Two patients underwent reoperation due to symptomatic hematoma collection and symptom recurrence 3 years postoperatively. Conclusion: The incidence of complications following PECF was 14%. Although most were transient, an understanding of both reported and unreported complications, along with thorough preparation, could reduce the occurrence of PECF-associated complications. © 2023 Korean Minimally Invasive Spine Surgery Society. | Kim, Young-Rak; Kim, Jun-Hoe; Park, Tae-Hwan; Park, Hangeul; Kim, Sum; Lee, Chang-Hyun; Kim, Kyoung-Tae; Chung, Chun Kee; Kim, Chi Heon | Department of Neurosurgery, Seoul National University Hospital, Seoul, South Korea; Department of Neurosurgery, Seoul National University Hospital, Seoul, South Korea; Department of Neurosurgery, Seoul National University Hospital, Seoul, South Korea; Department of Neurosurgery, Seoul National University Hospital, Seoul, South Korea; Department of Neurosurgery, Seoul National University Hospital, Seoul, South Korea; Department of Neurosurgery, Seoul National University Hospital, Seoul, South Korea, Department of Neurosurgery, Seoul National University College of Medicine, Seoul, South Korea; Department of Neurosurgery, School of Medicine, Kyungpook National University, Daegu, South Korea, Department of Neurosurgery, Korea University Guro Hospital, Korea University College of Medicine, Seoul, South Korea; Department of Neurosurgery, Seoul National University Hospital, Seoul, South Korea, Department of Neurosurgery, Seoul National University College of Medicine, Seoul, South Korea, Department of Brain and Cognitive Sciences, Seoul National University, Seoul, South Korea; Department of Neurosurgery, Seoul National University Hospital, Seoul, South Korea, Department of Neurosurgery, Seoul National University College of Medicine, Seoul, South Korea, Department of Medical Device Development, Seoul National University College of Medicine, Seoul, South Korea | 57222335356; 57854370000; 58555501300; 57221731362; 58609171200; 56942572100; 57201369790; 7403613043; 35145892000 | chiheon1@snu.ac.kr; | Journal of Minimally Invasive Spine Surgery and Technique | 2508-2043 | 8 | 2 | 0.25 | 2025-06-25 | 1 | Complication; Endoscopy; Minimally invasive surgical procedure; Spine; Surgery | English | Final | 2023 | 10.21182/jmisst.2023.00892 | 바로가기 | 바로가기 |
페이지 이동: