• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CTI ]" (347)
  1. 21. A memory protection method for application programs on the Android operating system
  2. 22. Korean Collective Intelligence in Sharing Economy Using R Programming: A Text Mining and Time Series Analysis Approach
    Jae Won Kim, You Dong Yun, Yu Jin Jung, Ki Youn Kim, Vol. 17, No. 5, pp. 151-160, Oct. 2016
    10.7472/jksii.2016.17.5.151
    Keywords: Sharing Economy, Collective Intelligence, Text Mining, Big data, R-programming, time series analysis
  3. 23. Causal Loop Diagrams Model of IT Professionals' Happiness : Through System Dynamics Analysis Approach
    Yun Hi Chang, Vol. 17, No. 4, pp. 161-172, Aug. 2016
    10.7472/jksii.2016.17.4.161
    Keywords: IT professionals' happiness, system dynamics analysis, causal loop dyagram, IT Job Satisfaction
  4. 24. A Study on the Management Capabilities Enhancement of Consignor's Personal Information Protection
  5. 25. Research on Possible Method to Converge IT and Architectural Design Techniques for Efficient Design of Elderly Housing
    Hong-min Bae, Byung-Seo Kim, Vol. 17, No. 4, pp. 87-94, Aug. 2016
    10.7472/jksii.2016.17.4.87
    Keywords: Elderly People, IT Service, Construction method, BIM
  6. 26. A Design of Satisfaction Analysis System For Content Using Opinion Mining of Online Review Data
    MoonJi Kim, EunJeong Song, YoonHee Kim, Vol. 17, No. 3, pp. 107-114, Jun. 2016
    10.7472/jksii.2016.17.3.107
    Keywords: Opinion mining, Satisfaction Analysis, Hadoop, Online Review
  7. 27. Degree of autonomy for education robot
  8. 28. A Rogue AP Detection Method Based on DHCP Snooping
    Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
    10.7472/jksii.2016.17.3.11
    Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping
  9. 29. Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology
    Younsung Choi, Dongho Won, Vol. 17, No. 3, pp. 1-10, Jun. 2016
    10.7472/jksii.2016.17.3.01
    Keywords: User authentication scheme, biometrics, fuzzy extraction
  10. 30. SNS as a Method of Election Campaign: A Case study of the 2015's Special Election in South Korea
    SeMi Park, HaSung Hwang, Vol. 17, No. 2, pp. 87-96, Apr. 2016
    10.7472/jksii.2016.17.2.87
    Keywords: SNS, election campaign, special election, political communication