• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Network ]" (239)
  1. 51. Design and Implementation of RSSI-based Intelligent Location Estimation System
    Chang Gyoon Lim, O Seong Andrew Kang, Chang Young Lee, Kang Chul Kim, Vol. 14, No. 6, pp. 9-18, Dec. 2013
    10.7472/jksii.2013.14.6.09
    Keywords: RSSI, location estimation, Artificial neural network, mobile robot, RFID
  2. 52. A Closeness Centrality Analysis Algorithm for Workflow-supported Social Networks
    Sungjoo Park, Kwanghoon Pio Kim, Vol. 14, No. 5, pp. 77-86, Oct. 2013
    10.7472/jksii.2013.14.5.77
    Keywords: Workflow, Social Network, Workflow-supported Social Network, Closeness Centrality
  3. 53. A BPM Activity-Performer Correspondence Analysis Method
    Hyun Ahn, Chungun Park, Kwanghoon Kim, Vol. 14, No. 4, pp. 63-72, Aug. 2013
    10.7472/jksii.2013.14.4.63
    Keywords: Business Process Intelligence, Affiliation Network, Correspondence Analysis
  4. 54. Social Network based Podcast Search System
    Ok-Ran Jeong, Vol. 14, No. 2, pp. 35-44, Apr. 2013
    10.7472/jksii.2013.14.2.35
    Keywords: Social Network, Podcast, Recommendation, Search
  5. 55. An Activity-Performer Bipartite Matrix Generation Algorithm for Analyzing Workflow-supported Human-Resource Affiliations
    Hyun Ahn, Kwanghoon Kim, Vol. 14, No. 2, pp. 25-34, Apr. 2013
    10.7472/jksii.2013.14.2.25
    Keywords: Workflow, ICN Workflow Model, Business Process Intelligence, Affiliation Network
  6. 56. A recommendation algorithm which reflects tag and time information of social network
    Hyeon Jo, Jong-Hyun Hong, Joon Yeon Choeh, Soung Hie Kim, Vol. 14, No. 2, pp. 15-24, Apr. 2013
    10.7472/jksii.2013.14.2.15
    Keywords: Recommender System, Social Bookmarking System, Social Network
  7. 57. Research on Military SNS Protection Profile for National defense
    DeokHoon Yu, SeungJoo Kim, Vol. 14, No. 1, pp. 41-52, Feb. 2013
    10.7472/jksii.2013.14.41
    Keywords: Military Security, Protection profile, social network service
  8. 58. Air Threat Evaluation System using Fuzzy-Bayesian Network based on Information Fusion
    Jongmin Yun, Bomin Choi, Myung-Mook Han, Su-Hyun Kim, Vol. 13, No. 5, pp. 21-32, Oct. 2012
    10.7472/jksii.2012.13.5.21
    Keywords: JDL, Threat Evaluation, Fuzzy, Bayesian Network, Fuzzy-Bayesian Network
  9. 59. An Energy-Efficient and Practical Duty-Cycling Mechanism on Building Automation and Home Sensor Networks
    Mi-Hui Kim, June-S. Hong, Vol. 13, No. 3, pp. 23-30, Jun. 2012
    10.7472/jksii.2012.13.3.23
    Keywords: Energy-Efficient, Duty-Cycling, Practical Management, Building Automation and Home Sensor Networks
  10. 60. A Workflow-based Affiliation Network Knowledge Discovery Algorithm
    Kwang-Hoon Kim, Vol. 13, No. 2, pp. 109-118, Apr. 2012
    10.7472/jksii.2012.13.2.109
    Keywords: Workflow, business process, Workflow Intelligence, Affiliation Network, Knowledge Discovery Algorithm