• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Detection ]" (96)
  1. 1. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
    Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
    10.7472/jksii.2018.19.1.1
    Keywords: LDA, network threat detection, Intrusion Detection System, signature
  2. 2. Method for Structural Vanishing Point Detection Using Orthogonality on Single Image
    Sung-Gi Jung, Chang-Hyung Lee, Hyung-Il Choi, Vol. 18, No. 5, pp. 39-46, Oct. 2017
    10.7472/jksii.2017.18.5.39
    Keywords: Vanishing Point Detection, Vanishing lines, Spatial Layout
  3. 3. A Robust Object Detection and Tracking Method using RGB-D Model
    Park, Seohee;Chun, Junchul;, Vol. 18, No. 4, pp. 61-68, Aug. 2017
    10.7472/jksii.2017.18.4.61
    Keywords: 3D CCTV, video surveillance, Object Detection, object tracking, Depth Map, Image Segmentation
  4. 4. Enhancement of Fall-Detection Rate using Frequency Spectrum Pattern Matching
  5. 5. A Detection Model using Labeling based on Inference and Unsupervised Learning Method
  6. 6. Inside Wall Frame Detection Method Based on Single Image
  7. 7. Event Detection System Using Twitter Data
    Tae Soo Park, Ok-Ran Jeong, Vol. 17, No. 6, pp. 153-0, Dec. 2016
    10.7472/jksii.2016.17.6.153
    Keywords: Event Detection, Social Network, Social Media Contents
  8. 8. A Rogue AP Detection Method Based on DHCP Snooping
    Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
    10.7472/jksii.2016.17.3.11
    Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping
  9. 9. A Road Luminance Measurement Application based on Android
    Young-Hwan Choi, Hongrae Kim, Min Hong, Vol. 16, No. 2, pp. 49-56, Apr. 2015
    10.7472/jksii.2015.16.2.49
    Keywords: image processing, lane detection, android NDK, Smartphone, Road luminance measurement, GPS sensor
  10. 10. An Inference Method of Stateless Firewall Policy Considering Attack Detection Threshold