• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: information ]" (107)
  1. 81. Korean Contextual Information Extraction System using BERT and Knowledge Graph
    SoYeop Yoo, OkRan Jeong, Vol. 21, No. 3, pp. 123-131, Jun. 2020
    10.7472/jksii.2020.21.3.123
    Keywords: contextual information extraction, person extraction, Relation Extraction, sentiment extraction, BERT, Knowledge Graph
  2. 82. A Study on the Analysis of Information Management of the Defense M&S and Improvement of Aquisition Supporting System
    Hye-soo Jeong, Ho-il Ahn, Jin-seok Yang, Vol. 21, No. 2, pp. 131-138, Apr. 2020
    10.7472/jksii.2020.21.2.131
    Keywords: Defense M&S, M&S, Modeling & Simulation, SBA, SBA Integrated Information System, Simulation Based Acquisition
  3. 83. Step-size Normalization of Information Theoretic Learning Methods based on Random Symbols
    Namyong Kim, Vol. 21, No. 2, pp. 49-55, Apr. 2020
    10.7472/jksii.2020.21.2.49
    Keywords: Distribution distance, random symbol, step-size, information potential, Impulsive noise.
  4. 84. An Analysis of the Factors Affecting User Satisfaction in Computational Science and Engineering Platforms: A Case Study of EDISON
  5. 85. Construction of Medical Image Information Viewer-Matching System Based by Diseases
    Si-Hyung No, Gyu-Sung Ham, Chang-Won Jeong, Su-Chong Joo, Vol. 20, No. 5, pp. 37-47, Oct. 2019
    10.7472/jksii.2019.20.5.37
    Keywords: Medical Information System, Medical Image Viewer Matching, PACS, Viewer Matching System
  6. 86. Disjunctive Process Patterns Refinement and Probability Extraction from Workflow Logs
  7. 87. Enhancing Model-based Fault Traceability by Using Similarity between Bug and Commit Information
    Dongju Jung, Kyeongsic Min, Jung-Won Lee, Byungjeong Lee, Vol. 20, No. 2, pp. 29-37, Apr. 2019
    10.7472/jksii.2019.20.2.29
    Keywords: Fault traceability, Bug Report, Commit Information
  8. 88. A MapReduce-Based Workflow BIG-Log Clustering Technique
  9. 89. Implementation of Dynamic Situation Authentication System for Accessing Medical Information
  10. 90. A study on primary control area for information security management system (ISMS): focusing on the finance-related organizations