• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Detection ]" (97)
  1. 61. Unstructured Data Analysis using Equipment Check Ledger: A Case Study in Telecom Domain
    Yeonjin Ju, Yoosin Kim, Seung Ryul Jeong, Vol. 21, No. 1, pp. 127-135, Feb. 2020
    10.7472/jksii.2020.21.1.127
    Keywords: Equipment Ledger, Unstructured Data, Telecom Domain, Anomaly Detection
  2. 62. Knowledge Graph-based Korean New Words Detection Mechanism for Spam Filtering
    Ji-hye Kim, Ok-ran Jeong, Vol. 21, No. 1, pp. 79-85, Feb. 2020
    10.7472/jksii.2020.21.1.79
    Keywords: Spam Filtering, spam detection, New Words Detection, Knowledge Graph, ConceptNet
  3. 63. A Comparative Study on the Optimal Model for abnormal Detection event of Heart Rate Time Series Data Based on the Correlation between PPG and ECG
    Jin-soo Kim, Kang-yoon Lee, Vol. 20, No. 6, pp. 137-142, Dec. 2019
    10.7472/jksii.2019.20.6.137
    Keywords: Photoplethysmography(PPG), Electrocardiogram(ECG), Abnormal event detection, SVM, LSTM
  4. 64. CNN-based Shadow Detection Method using Height map in 3D Virtual City Model
    Hee Jin Yoon, Ju Wan Kim, In Sung Jang, Byung-Dai Lee, Nam-Gi Kim, Vol. 20, No. 6, pp. 55-63, Dec. 2019
    10.7472/jksii.2019.20.6.55
    Keywords: shadow detection, deep-learning
  5. 65. An Efficient BotNet Detection Scheme Exploiting Word2Vec and Accelerated Hierarchical Density-based Clustering
    Taeil Lee, Kwanhyun Kim, Jihyun Lee, Suchul Lee, Vol. 20, No. 6, pp. 11-20, Dec. 2019
    10.7472/jksii.2019.20.6.11
    Keywords: Botnet Detection, Word2vec, clustering, Skip-gram
  6. 66. Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer
    Hyung-Woo Lee, Hanseong Lee, Vol. 20, No. 5, pp. 9-18, Oct. 2019
    10.7472/jksii.2019.20.5.9
    Keywords: Android Mobile APK, Detection DApp, Forgery Detection, Blockchain, Hyperledger Composer
  7. 67. A Study on the Pipe Position Estimation in GPR Images Using Deep Learning Based Convolutional Neural Network
    Jihun Chae, Hyoung-yong Ko, Byoung-gil Lee, Namgi Kim, Vol. 20, No. 4, pp. 39-46, Aug. 2019
    10.7472/jksii.2019.20.4.39
    Keywords: sink holes, pipe, GPR, Image recognition, underground detection, CNN, deep-learning
  8. 68. Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain
    Sumin Hwang, Hyung-Woo Lee, Vol. 20, No. 2, pp. 61-68, Apr. 2019
    10.7472/jksii.2019.20.2.61
    Keywords: Blockchain, Hyperledger Fabric, Android Mobile App, Malicious Counterfeit App Detection.
  9. 69. Automatic Malware Detection Rule Generation and Verification System
    Sungho Kim, Suchul Lee, Vol. 20, No. 2, pp. 9-19, Apr. 2019
    10.7472/jksii.2019.20.2.9
    Keywords: Malware, Detection rule, SNORT, LDA, network threat
  10. 70. A Method for 3D Human Pose Estimation based on 2D Keypoint Detection using RGB-D information
    Seohee Park, Myunggeun Ji, Junchul Chun, Vol. 19, No. 6, pp. 41-51, Dec. 2018
    10.7472/jksii.2018.19.6.41
    Keywords: video surveillance, Object Detection, Keypoint Detection, Human Pose Estimation, Deep Learning