• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)

Most Downloaded Papers


  1. 1. A Study on the Characteristics of a series of Autoencoder for Recognizing Numbers used in CAPTCHA
    Jae-seung Jeon, Jong-sub Moon, Vol. 18, No. 6, pp. 25-34, Dec. 2017
    Keywords: CAPTCHA, Autoencoder, Stacked autoencoder, Denoising, SOFTMAX
  2. 2. Deployment of Network Resources for Enhancement of Disaster Response Capabilities with Deep Learning and Augmented Reality
    Younghwan Shin, Jusik Yun, Sunho Seo, Jong-Moon Chung, Vol. 18, No. 5, pp. 69-77, Oct. 2017
    Keywords: Augmented Reality, Object Detection, Disaster Response, Network Resource
  3. 3. A Study of Administration of Cyber Range
    Daesik Kim, Yonghyun Kim, Vol. 18, No. 5, pp. 9-16, Oct. 2017
    Keywords: Cyber Range, Test-bed, System Engineering
  4. 4. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
    Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
    Keywords: LDA, network threat detection, Intrusion Detection System, signature
  5. 5. Design of Encryption/Decryption IP for Lightweight Encryption LEA
    Seungil Sonh, Vol. 18, No. 5, pp. 1-8, Oct. 2017
    Keywords: LEA(Lightweight Encryption Algorithm), Symmetric Block Cipher, Encryption, Decryption, HDL Design
  6. 6. A Study on Factors Influencing User's Satisfaction of OTT Service
    Heesung Lee, Haiyan Jin, HaSung Hwang, Vol. 18, No. 6, pp. 93-100, Dec. 2017
    Keywords: OTT service, TAM, user satisfaction
  7. 7. A Trusted Sharing Model for Patient Records based on Permissioned Blockchain
    Kyoung-jin Kim, Seng-phil Hong, Vol. 18, No. 6, pp. 75-84, Dec. 2017
    Keywords: Permissioned blockchain, role-based access control, Medical data
  8. 8. Analysis of News Articles Regarding Safety Issue of HPV Vaccine
  9. 9. A Classification Model for Attack Mail Detection based on the Authorship Analysis
  10. 10. Establishing Best Power Transmission Path using Receiver Based on the Received Signal Strength
  11. 11. Privacy-Preserving DNA Matching Protocol
  12. 12. Method for Structural Vanishing Point Detection Using Orthogonality on Single Image
    Sung-Gi Jung, Chang-Hyung Lee, Hyung-Il Choi, Vol. 18, No. 5, pp. 39-46, Oct. 2017
    Keywords: Vanishing Point Detection, Vanishing lines, Spatial Layout
  13. 13. A Study on Factors Affecting Innovation Resistance and Intention of Use of Social TV Non-Users: Focused on Innovation Diffusion Theory and Innovation Resistance Model
    Byung-Hye Lee, Vol. 18, No. 6, pp. 101-112, Dec. 2017
    Keywords: innovation characteristics, perceived risk, innovation resistance, Intention to Use, social TV
  14. 14. Hazard Analysis Process Based on STPA Using SysML
    Na-yeon Choi, Byong-gul Lee, Vol. 20, No. 3, pp. 1-11, Jun. 2019
    Keywords: 위험원 분석, STPA, SysML, 안전 요구사항, Hazard analysis, process, STPA, SysML, Safety Requirement
  15. 15. A Study on the Strategy of Platform Operator for Free Mobile Data : from the Perspectives of Business Opportunity and Risk
    Dae-Keun Cho, In-Kuk Song, Vol. 18, No. 5, pp. 123-131, Oct. 2017
    Keywords: zero-rating, platform operator, ISP, business strategy, business opportunity and risk
  16. 16. A Study on Rational Improvement of the Gift Regulation in the Telecommunications Market
    Yong-Beom Kim, Jeong Ho Kwak, Vol. 18, No. 6, pp. 137-144, Dec. 2017
    Keywords: Bundled Products, Gift Regulation, Significant Market Power(SMP), Big data
  17. 17. A Study on the Validity of Net Neutrality Regulation in Respect of Zero-Rating
    Dae-Keun Cho, In-Kuk Song, Vol. 18, No. 5, pp. 133-141, Oct. 2017
    Keywords: zero-rating, Communication Regulation, Net Neutrality, ISP, platform operator, Regulation Policy
  18. 18. Panoramic Image Generation in Mobile Ad-Hoc Cloud
    Yong-Suk Park, Hyun-Sik Kim, Jong-Moon Chung, Vol. 18, No. 5, pp. 79-85, Oct. 2017
    Keywords: Panorama, Image Stitching, Mobile Ad-Hoc Cloud
  19. 19. Grid-based Trajectory Cloaking Method for protecting Trajectory privacy in Location-based Services
  20. 20. A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering
  21. 21. Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification
  22. 22. A Comparative Study on the Factors Affecting SNS Switching Intention among College Students in South Korea and China
    ShaSha Gong, HaiYan Jin, HaSung Hwang, Vol. 18, No. 5, pp. 95-102, Oct. 2017
    Keywords: SNS, switching intention, migration theory
  23. 23. Development of IoT Service Classification Method based on Service Operation Characteristic
  24. 24. Specificity and Commitment: UX approach to Netflix
    Joon Suk Hwang, Youngjoon Cheon, Kyu Tae Kwak, Vol. 18, No. 6, pp. 127-136, Dec. 2017
    Keywords: Specificity, Netflix, Commitment, Transaction Cost Economics(TCE), User Experience(UX)
  25. 25. Short Text Classification for Job Placement Chatbot by T-EBOW
    Jeongrae Kim, Han-joon Kim, Jeong Kyoung Hee, Vol. 20, No. 2, pp. 93-100, Apr. 2019
    Keywords: 취업알선, 챗봇, 단문, 분류, Job placement, Chatbot, Short text, Classification
  26. 26. Design and Implementation of Luo-kuan Recognition Application
    Han-Syel Kim, Kwi-Bin Seo, Mingoo Kang, Gee Soo Ryu, Min Hong, Vol. 19, No. 1, pp. 97-103, Feb. 2018
    Keywords: Luo-kuan(落款), Mobile Application, image processing
  27. 27. Workflow Process-Aware Data Cubes and Analysis
  28. 28. Combining Support Vector Machine Recursive Feature Elimination and Intensity-dependent Normalization for Gene Selection in RNAseq
    Chayoung Kim, Vol. 18, No. 5, pp. 47-53, Oct. 2017
    Keywords: Support-Vector Machine, RNAseq, Big-Data, Intensity-dependent Normalization, SVM-RFE
  29. 29. Energy Efficient Adaptive Relay Station ON/OFF Scheme for Cellular Relay Networks
    Se-Jin Kim, Vol. 19, No. 2, pp. 9-15, Apr. 2018
    Keywords: , Cellular relay network, OFDMA, Adaptive, Relay station, Energy saving
  30. 30. A study on regulatory approach to sharing economy platform