• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CTI ]" (349)
  1. 71. A fuzzy ART Approach for IS Personnel Selection and Evaluation
  2. 72. Implementation of integrated monitoring system for trace and path prediction of infectious disease
    Eungyeong Kim, Seok Lee, Young Tae Byun, Hyuk-Jae Lee, Taikjin Lee, Vol. 14, No. 5, pp. 69-76, Oct. 2013
    10.7472/jksii.2013.14.5.69
    Keywords: infectious disease, mathematical model, SIR model, influenza A, path prediction
  3. 73. Combined Feature Set and Hybrid Feature Selection Method for Effective Document Classification
    Joo-Ho In, Jung-Ho Kim, Soo-Hoan Chae, Vol. 14, No. 5, pp. 49-58, Oct. 2013
    10.7472/jksii.2013.14.5.49
    Keywords: Document Classification, Feature selection, mixed feature set, LSA, hybrid feature selection
  4. 74. A Study on Development of App-Based Electric Fire Prediction System
    Young-Kwan Choi, Eung-Kwon Kim, Vol. 14, No. 4, pp. 85-90, Aug. 2013
    10.7472/jksii.2013.14.4.85
    Keywords: Electric Fire Prediction System, arc detection, DSP(Digital Signal Processor), Smart phone App
  5. 75. Story Generation Method using User Information in Mobile Environment
    Jeen-Pyo Hong, Jeong-Won Cha, Vol. 14, No. 3, pp. 81-0, Jun. 2013
    10.7472/jksii.2013.14.3.81
    Keywords: Sentence Generation, Information Extraction, Mobile Context, Natural Language Processing
  6. 76. Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 3, pp. 35-46, Jun. 2013
    10.7472/jksii.2013.14.3.35
    Keywords: Android, Malicious Application, Event Aggregation, Mobile Device, Malicious App. Detection
  7. 77. Security Framework for Improving the Performance of the Malicious Process Control System
    Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
    10.7472/jksii.2013.14.2.61
    Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process
  8. 78. Design and Analysis of Flame Signal Detection with the Combination of UV/IR Sensors
    Daeseok Kang, Eunchong Kim, Piljae Moon, Wonho Sin, Min-goo Kang, Vol. 14, No. 2, pp. 45-52, Apr. 2013
    10.7472/jksii.2013.14.2.45
    Keywords: IR, UV, Combination IR/UV sensors, Signal processing, Flame image detection
  9. 79. Research on Military SNS Protection Profile for National defense
    DeokHoon Yu, SeungJoo Kim, Vol. 14, No. 1, pp. 41-52, Feb. 2013
    10.7472/jksii.2013.14.41
    Keywords: Military Security, Protection profile, social network service
  10. 80. Research on Key Success Factors of Social Authoring system : Focused on Linux and Wikipedia
    Seo-Young Lee, Bong-Gyou Lee, Vol. 13, No. 4, pp. 73-82, Aug. 2012
    10.7472/jksii.2012.13.4.73
    Keywords: Social Authoring, Collective Intelligence, Linux, Wikipedia, Web 2.0, Social Media