• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Web ]" (81)
  1. 11. Construction and Service of a Web-based Simulation software management system for the Computational Science and Engineering
    Inho Jeon, Yejin Kwon, Jin Ma, Sik Lee, Kum Won Cho, Jerry Seo, Vol. 18, No. 4, pp. 99-108, Aug. 2017
    10.7472/jksii.2017.18.4.99
    Keywords: Computational Science and Engineering, Web-based Simulation, Simulation software, Open Science
  2. 12. Tag Based Web Resource Recommendation System
    Je-In Song, Ok-Ran Jeong, Vol. 17, No. 6, pp. 133-142, Dec. 2016
    10.7472/jksii.2016.17.6.133
    Keywords: Recommendation, tagging, Context Information, Web Service, Web resource
  3. 13. Access Control as a Service for Information Protection in Semantic Web based Smart Environment
    Yousra Abdul Alsahib S.Aldeen, Shaligram Prajapat, Mojtaba Raeisi Nejad Dobuneh, Noor Azeera Abdul Aziz, Jung-Gyu Lee, Muhammad Younas, Do Yeon Kim, Minjae Park, NurLiyanaSulaiman NurLiyanaSulaiman, Taghi Javdani Gandomani, Noorrezam Yusop, Isma Farah Siddiqui, Yoosin Kim, Mina Ziaei Nafchi, Seung-Ryul Jeong, MohdNaz'ri Mahrin, MohdAizainiMaarof MohdAizainiMaarof, Ashok Sharma, Dayang N.A. Jawawi, Imran Ghani, Mazleena Salleh, Hyun Ahn, Massila Kamalrudin, Scott Uk-Jin Lee, Ramjeevan Singh Thakur, Dayang Norhayati Abang Jawawi, Anazida Zainal, Kwanghoon Pio Kim, Sang Hyun Choi, Mokhtar Mohd Yusof, RasimahCheMohd Yusoff, Muhammad Murad Khan, Mohammed HazimAlkawaz, Safiah Sidek, Vol. 17, No. 5, pp. 9-16, Oct. 2016
    10.7472/jksii.2016.17.5.09
    Keywords: access control, Smart Environment, Semantic web, XACML, Security requirement, security attribute, mobile application development, Data-Intensive Workflow Validation, Workflow, BPM, K-anonymity, Privacy, L-diversity, data relocation, generalization, Global Agile Development, Cloud computing, Challenges, benefits, Framework, cloud-based agile tools, Regression Testing, Prioritization, Evolutionary Algorithm, Web Application, User Session, Automatic Variable Key (AVK), cryptanalysis, Hacker, AI, genetic algorithm, swarm intelligence, cipher, Neural Network, cryptography, Artificial neural Networks (ANN), Genetic Algorithm (GA), Swarm Intelligence (SI), Features Combinations, Opinion Target Extraction, Text sentiment analysis, Conditional Random Field and Sequence Labeling Algorithm, Process Diagram, Project Monitoring, Project Management, Context Diagram, Awareness, agile practices, agile software development methodology, Agile Software Development, Agile Methods, Agile Transformation, Agile Adoption, Transition Prerequisites, Agile Transition, Grounded Theory (GT)
  4. 14. Construction and Service of a Web-based Cyber-learning Platform for the Computational Science and Engineering Community in Korea
    Young-Kyoon Suh, Kum Won Cho, Vol. 17, No. 4, pp. 115-126, Aug. 2016
    10.7472/jksii.2016.17.4.115
    Keywords: Web, Cyber-Learning, Platform, Computational Science and Engineering, High-Performance Computing, Simulations, Solvers
  5. 15. Augmented Reality Technology Implementation Utilizing Web 3.0 Information Services in Disaster Response Situations
    Jong-Hong Park, Younghwan Shin, Yongkyun Kim, Jong-Moon Chung, Vol. 17, No. 4, pp. 61-68, Aug. 2016
    10.7472/jksii.2016.17.4.61
    Keywords: Web 3.0, Semantic web, Augmented Reality, Mobile Visual Search, Disaster Response
  6. 16. A Content Analysis for Website Usefulness Evaluation: Utilizing Text Mining Technique
  7. 17. Design of a Web-based Java Applet for Conceptual Learning in Digital Logic Circuits and its Student Satisfaction Survey
  8. 18. User Perspective Website Clustering for Site Portfolio Construction
    Mingyu Kim, Namgyu Kim, Vol. 16, No. 3, pp. 59-70, Jun. 2015
    10.7472/jksii.2015.16.3.59
    Keywords: Bigdata Analysis, Site Category Analysis, Site Clustering, Web Log Analysis
  9. 19. Design and Analysis of Educational Java Applets for Learning Simplification Procedure Using Karnaugh Map
  10. 20. OTACUS: Parameter-Tampering Prevention Techniques using Clean URL
    Guiseok Kim, Seungjoo Kim, Vol. 15, No. 6, pp. 55-64, Dec. 2014
    10.7472/jksii.2014.15.6.55
    Keywords: Web service Security, URL Parameter, OWASP