UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1
hits: 10
1.
  • DQN-Based Optimization Fram... DQN-Based Optimization Framework for Secure Sharded Blockchain Systems
    Yun, Jusik; Goh, Yunyeong; Chung, Jong-Moon IEEE internet of things journal, 01/2021, Volume: 8, Issue: 2
    Journal Article

    High levels of scalability and reliability are needed to support the massive Internet-of-Things (IoT) services. In particular, blockchains can be effectively used to safely manage data from ...
Full text
2.
  • 5G Multi-RAT URLLC and eMBB... 5G Multi-RAT URLLC and eMBB Dynamic Task Offloading With MEC Resource Allocation Using Distributed Deep Reinforcement Learning
    Yun, Jusik; Goh, Yunyeong; Yoo, Wonsuk ... IEEE internet of things journal, 10/2022, Volume: 9, Issue: 20
    Journal Article

    In this article, a deep reinforcement learning (DRL) control scheme is proposed to satisfy the strict Quality-of-Service (QoS) requirements of ultrareliability low-latency communication (URLLC) and ...
Full text
3.
  • Optimized Resource Utilizat... Optimized Resource Utilization Scheme for Real-Time V2V Sidelink Unicast Communication in 5G Networks
    Yoo, Wonsuk; Yun, Jusik; Jung, Jaewook ... IEEE wireless communications letters, 10/2023, Volume: 12, Issue: 10
    Journal Article
    Peer reviewed

    In this letter, a resource allocation scheme for 5G new radio (NR) based vehicle-to-vehicle (V2V) sidelink mode 1 unicast communication is proposed. First, a M/G/1 queueing model-based end-to-end ...
Full text
4.
  • Trust-Based Shard Distribut... Trust-Based Shard Distribution Scheme for Fault-Tolerant Shard Blockchain Networks
    Yun, Jusik; Goh, Yunyeong; Chung, Jong-Moon IEEE access, 2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    Blockchains guarantee data integrity through consensus of distributed ledgers based on multiple validation nodes called miners. For this reason, any blockchain system can be critically disabled by a ...
Full text

PDF
5.
  • Centralized Trust-Based Sec... Centralized Trust-Based Secure Routing in Wireless Networks
    Yun, Jusik; Seo, Sunho; Chung, Jong-Moon IEEE wireless communications letters, 12/2018, Volume: 7, Issue: 6
    Journal Article
    Peer reviewed

    Wireless networks are vulnerable to various network attacks. To cope with these security issues, trust-based routing schemes have emerged. Typically, trust routing schemes are mainly focused on ...
Full text
6.
  • Secure Trust-based Delegate... Secure Trust-based Delegated Consensus for Blockchain Frameworks using Deep Reinforcement Learning
    Goh, Yunyeong; Yun, Jusik; Jung, Dongjun ... IEEE access, 2022, Volume: 10
    Journal Article
    Peer reviewed
    Open access

    IoT (IoT) networks generate massive amounts of data while supporting various applications, where the security and protection of IoT data are very important. In particular, blockchain technology ...
Full text
7.
Full text

PDF
8.
Full text

PDF
9.
  • Adaptive high-resolution image transmission method using MPEG-DASH
    Sunho Seo; Younghwan Shin; Jusik Yun ... 2017 International Conference on Information and Communication Technology Convergence (ICTC), 2017-Oct.
    Conference Proceeding

    With the emergence of new types of real-time network cameras, the demand for video streaming services is rapidly growing. To cope with this growing demand, the Moving Picture Experts Group (MPEG) has ...
Full text
10.
  • Analysis of Mining Performance Based on Mathmatical Approach of PoW
    Yun, Jusik; Goh, Yunyeong; Chung, Jong-Moon 2019 International Conference on Electronics, Information, and Communication (ICEIC), 2019-Jan.
    Conference Proceeding

    Blockchain technology has been developed for cryptocurrency systems. Bitcoin, the most famous cryptocurrency type, guarantees a safe consensus using the Proof of Work (PoW) process. The PoW scheme is ...
Full text
1
hits: 10

Load filters