Kyung Sup Kwak

Kyung Sup Kwak
Inha University · Department of Information and Communication Engineering

Ph.D from University of California, San Diego, USA and MS from Univ. of Southern Califirnia, Los Angeles, USA

About

875
Publications
185,581
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
13,777
Citations
Introduction
Current research interests - NOMA Applications -IoT base Communication Networks -Nano/Molecullar Communications -AI/Bigdata-empowered u-Health Networks
Additional affiliations
April 2015 - present
Inha University
Position
  • Professor
March 1990 - February 2015
Inha University
Position
  • Inha Fellow Professor
Description
  • - Teaching - Researching - Social Services
February 1989 - March 1990
IBM Network Research Center
Position
  • Senior Researcher
Description
  • - Develop Network Archtecture for Large Network
Education
September 1982 - June 1988
University of California, San Diego
Field of study
  • Electirical and Computer engineering
January 1980 - December 1981
University of Southern California
Field of study
  • Electrical Engineering

Publications

Publications (875)
Article
In this paper, with the investigation of the conventional Euclidean distance based transmit antenna selection (ED-AS) and the maximum likelihood detection (MLD) in spatial modulation (SM) multiple-input multiple-output (MIMO) system, we propose the deep neural network (DNN) based transmit antenna selection (DNN-AS) and signal detection (DNN-SD), re...
Preprint
Full-text available
In this paper, we propose a cognitive radio-inspired rate-splitting multiple access (CR-RSMA) scheme to assist semi-grant-free (SGF) transmissions in which a grant-based user (GBU) and multiple grant-free users (GFUs) access the base-station (BS) by sharing the same resource block. Using the cognitive radio principle, the GBU and admitted GFU are t...
Article
Wireless networks in next generation will provide users ubiquitous computing services with low delay by devices at the network edge, namely mobile edge computing (MEC). The intensive computation tasks can be partially offloaded to the MEC server via the wireless link and then processed through the MEC computation resources to cater for the delay de...
Article
Full-text available
Internet of Things (IoT) is a network of physical objects or things that can communicate and share information. In IoT-enabled Wireless Medical Sensor Network (WMSN), the smart sensing devices share remote patient monitoring data towards central repositories. During medical data aggregation and transmission, security is mandatory to guard against i...
Article
Full-text available
Energy consumption in residential, commercial and industrial buildings is one of the major contributors to global warming. Due to the increase in the latter, and growing global energy crisis, more attention is being paid to renewable energy resources (RES). The use of innovative concepts in existing buildings is gaining popularity to provide reduct...
Article
Full-text available
Reaching a flat network is the main target of future evolved packet core for the 5G mobile networks. The current 4th generation core network is centralized architecture, including Serving Gateway and Packet-data-network Gateway; both act as mobility and IP anchors. However, this architecture suffers from non-optimal routing and intolerable latency...
Article
Conventional transmitted reference (TR) technique in ultra wide-band (UWB) communications has provided a springboard for a lot of studies, and a transmitted reference pulse cluster (TRPC) structure was proved to have robust performance. Most of TR and TRPC related studies hitherto are based on the assumption that the delay lines (DLs) in their sche...
Article
The ongoing growth of Internet of Things (IoT) traffic increases the emergence of Multi-Access Edge Computing (MEC), which can serve IoT devices to process edge missions properly. The power supply for IoT devices is addressed by energy harvesting (EH) technology. However, the energy arrival model obeys the unknown energy arrival process. In additio...
Preprint
Full-text available
The secrecy performance of realistic wireless multicast scenarios can be significantly deteriorated by the simultaneous occurrence of multipath and shadowing. To resolve this security threat, in this work an opportunistic relaying-based dual-hop wireless multicast framework is proposed in which the source dispatches confidential information to a bu...
Article
Full-text available
The secrecy performance of realistic wireless multicast scenarios can be significantly deteriorated by the simultaneous occurrence of multipath and shadowing. To resolve this security threat, in this work an opportunistic relaying-based dual-hop wireless multicast framework is proposed in which the source dispatches confidential information to a bu...
Article
Full-text available
Background and Objectives Kinship verification and recognition (KVR) is the machine’s ability to identify the genetic and blood relationship and its degree between humans’ facial images. The face is used because it is one of the most significant ways to recognize each other. Automatic KVR is an interesting area for investigation. It greatly affects...
Article
Full-text available
This paper exploits the extreme learning machine (ELM) approach to address diabetic retinopathy (DR), a medical condition in which impairment occurs to the retina caused by diabetes. DR, a leading cause of blindness worldwide, is a sort of swelling leakage due to excessive blood sugar in the retina vessels. An early-stage diagnosis is therefore ben...
Preprint
Full-text available
Enabled by hybrid grant-based (GB) and grant-free (GF) transmission techniques, GF users of internet of things (IoT) devices and massive machine-type communications (mMTC) meet opportunities to share wireless resources with GB users. In this paper, we propose a rate splitting multiple access (RSMA) strategy for an emerging semi-grant-free (SGF) tra...
Article
Full-text available
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay’s transmitted optical signal. The RF and FSO links undergo (α-κ-μ)-shadowed fading and unified Málaga...
Preprint
Full-text available
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay's transmitted optical signal. The RF and FSO links undergo ($\alpha$-$\kappa$-$\mu$)-shadowed fading...
Article
Cyber-Physical Systems (CPS) comprise interactive computation, networking, and physical processes. The integrative environment of CPS enables the smart systems to be aware of the surrounding physical world. Smart systems, such as smart health care systems, smart homes, smart transportation, and smart cities, are made up of complex and dynamic CPS....
Article
Full-text available
Mobile crowd computing (MCC) that utilizes public-owned (crowd’s) smart mobile devices (SMDs) collectively can give adequate computing power without any additional financial and ecological cost. However, the major challenge is to cope with the mobility (or availability) issue of SMDs. User’s unpredicted mobility makes the SMDs really unstable resou...
Article
Full-text available
To support the massive connectivity in Internet of Things (IoT), several promising techniques like cognitive radio (CR) and non-orthogonal multiple access (NOMA) enables the user to share spectrum resources. This work aims to achieve fairness among secondary users (SUs) in IoT cooperative NOMA-based CR transmission. We design a power allocation alg...
Article
Full-text available
We propose a physical activity recognition and monitoring framework based on wearable sensors during maternity. A physical activity can either create or prevent health issues during a given stage of pregnancy depending on its intensity. Thus, it becomes very important to provide continuous feedback by recognizing a physical activity and its intensi...
Article
Full-text available
In post disaster scenarios such as war zones floods and earthquakes, the cellular communication infrastructure can be lost or severely damaged. In such emergency situations, remaining in contact with other rescue response teams in order to provide inputs for both headquarters and disaster survivors becomes very necessary. Therefore, in this researc...
Article
Full-text available
Advances in synthetic biology and nanotechnology have contributed to the design of tools that can be used to control, reuse, modify, and re-engineer cells' structure, as well as enabling engineers to effectively use biological cells as programmable substrates to realize Bio-NanoThings (biological embedded computing devices). Bio-NanoThings are gene...
Preprint
This work aims to achieve fairness among secondary users (SUs) in IoT cooperative NOMA-based CR transmission. We design a power allocation algorithm for secondary IoT network that ensures protection of primary system. Further, an independent battery constraint at each node is considered, and power gap among transmissions of two NOMA users is applie...
Preprint
This work aims to achieve fairness among secondary users (SUs) in IoT cooperative NOMA-based CR transmission. We design a power allocation algorithm for secondary IoT network that ensures protection of primary system. Further, an independent battery constraint at each node is considered, and power gap among transmissions of two NOMA users is applie...
Article
Full-text available
In this paper, a polarization-maintaining single-mode rectangular-shaped hollow-core waveguide with four segmented air cladding in the terahertz (THz) regime is presented for detecting various toxic industrial chemicals. A new type of injection moldable cyclic olefin copolymer, commercially named as TOPAS is used as the base fiber material for its...
Article
Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home IoT applications, remote users need to communicate securely with resource-constrained network entities through the public Internet to procure real-time information. While the 6LoWPAN ad...
Article
The cognitive radio enabled massive Internet of Things (CR-mIoT) is envisioned to shape the future of densely connected IoT devices in sixth-generation networks to support the hyperconnected society. In conventional CR networks, secondary users sense the whole block of spectrum to find idle channels, which is an energy-consuming, delay-inducing, an...
Article
Full-text available
Autistic people face many challenges in various aspects of daily life such as social skills, repetitive behaviors, speech, and verbal communication. They feel hesitant to talk with others. The signs of autism vary from one individual to another, with a range from mild to severe. Autistic children use fewer communicative gestures compared with typic...
Article
Full-text available
Increasing concerns regarding wireless systems’ security are leading researchers to exploit the physical properties of a medium while designing any secured wireless network. The secrecy performance of a mixed radio frequency-free space optical (RF-FSO) system with a variable gain relaying scheme is investigated in this paper under the attempt of wi...
Article
Full-text available
Most of the IoT-based smart systems require low latency and crisp response time for their applications. Achieving the demand of this high Quality of Service (QoS) becomes quite challenging when computationally intensive tasks are offloaded to the cloud for execution. Edge computing therein plays an important role by introducing low network latency,...
Article
In this paper, we investigate control-aware energy-efficient transmission strategies for wireless control systems (WCS) with short packets, in which remote state estimation error, system stability, transmission energy consumption and communication packets with finite-length coding are all taken into account. Specifically, we formulate the transmiss...
Article
Full-text available
The sea-land segmentation for optical remote sensing images (RSIs) has a valuable role in water resources and coastal zones management. However, it is challenging because optical RSIs mainly suffer from low contrast, intensity inhomogeneity with mixed pixels, and large image size with redundant information. This paper introduces a novel coarse-to-f...
Article
Accurate detection of traffic accidents as well as condition analysis are essential to effectively restoring traffic flow and reducing serious injuries and fatalities. This goal can be obtained using an advanced data classification model with a rich source of traffic information. Several systems based on sensors and social networking platforms have...
Article
Full-text available
A highly sensitive dual-polarized 'X' oriented quadruple D-shaped open channel photonic crystal fiber (PCF) based surface plasmon resonance (SPR) sensor for various analyte detection is proposed in this paper. Gold is taken as a plasmonic material for its stability and compatibility. Silicon nitride (Si3N4) and titanium oxide (TiO2) has been used s...
Article
This paper proposes a deep learning (DL) resource allocation framework to achieve the harmonious coexistence between the transceiver pairs (TPs) and the Wi-Fi users in LTE-U networks. The noncon- vex resource allocation is considered as a constrained learning problem and the deep neural network (DNN) is employed to approximate the optimal resource...
Article
Full-text available
Brain is the controlling center of our body. With the advent of time, newer and newer brain diseases are being discovered. Thus, because of the variability of brain diseases, existing diagnosis or detection systems are becoming challenging and are still an open problem for research. Detection of brain diseases at an early stage can make a huge diff...
Article
Wearable sensors and social networking platforms play a key role in providing a new method to collect patient data for efficient healthcare monitoring. However, continuous patient monitoring using wearable sensors generates a large amount of healthcare data. In addition, the user-generated healthcare data on social networking sites come in large vo...
Article
Full-text available
To meet the ever-increasing computation demands from various mobile applications, mobile edge computing (MEC) has been recognised as an emerging paradigm benefiting from its proximity to the smart devices (SDs). Besides, multiple radio access technology (multi-RAT) has been proposed to enhance network throughput and service reliability by efficient...
Article
Full-text available
Energy harvesting (EH) aided Internet of Things (IoT) network is a promising paradigm to librate IoT network from energy deficiency. Dynamic energy and traffic scheduling in such a scenario is challenging due to temporal correlation of energy constraints and delay requirements of IoT applications. In this paper, joint energy management and sampling...
Article
Full-text available
Alzheimer’s disease (AD) is the most common type of dementia. Its diagnosis and progression detection have been intensively studied. Nevertheless, research studies often have little effect on clinical practice mainly due to the following reasons: (1) Most studies depend mainly on a single modality, especially neuroimaging; (2) diagnosis and progres...
Article
Full-text available
In this paper, we propose an energy-efficient resource allocation algorithm for multiple radio access technologies (multi-RAT) networks, where the user equipments (UEs) transmit data over multiple radio interfaces for exploiting the complementary advantages of different RATs. In this scenario, the resource allocation is formulated as a stochastic e...
Article
Full-text available
Cloud computing use is exponentially increasing with the advent of industrial revolution 4.0 technologies such as the Internet of Things, artificial intelligence, and digital transformations. These technologies require cloud data centers to process massive volumes of workloads. As a result, the data centers consume gigantic amounts of electrical en...
Article
Full-text available
Android has been dominating the smartphone market for more than a decade and has managed to capture 87.8% of the market share. Such popularity of Android has drawn the attention of cybercriminals and malware developers. The malicious applications can steal sensitive information like contacts, read personal messages, record calls, send messages to p...
Article
In this letter, we propose a proactive online power allocation algorithm aiming to maximize the ergodic sum rate for an uplink multi-carrier non-orthogonal multiple access enabled Internet of Things (IoT) network, in which IoT devices (IoTDs) are subject to both instantaneous and ergodic transmit power constraints. The proposed algorithm enables a...
Article
Full-text available
A surface plasmon resonance (SPR) based photonic crystal fiber (PCF) sensor having a milled microchannel, and an open D-channel has been proposed in this paper. The sensor shows good functionality in the wide sensing range of 1.14-1.36 Refractive Index Units (RIU) of the analyte, having the capability to detect low refractive index (RI). The Finite...