• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Most Downloaded Papers


MOST DOWNLOADED PARPERS

  1. 1. Korean Contextual Information Extraction System using BERT and Knowledge Graph
  2. 2. Rethinking OTT regulation based on the global OTT market trends and regulation cases
  3. 3. A layered-wise data augmenting algorithm for small sampling data
    Hee-chan Cho, Jong-sub Moon, Vol. 20, No. 6, pp. 65-72, Dec. 2019
    10.7472/jksii.2019.20.6.65
    Keywords: 딥러닝, 데이터 증강, 고유값 분해, Deep Learning, data augmentation, Eigen decomposition
  4. 4. Design of Video Pre-processing Algorithm for High-speed Processing of Maritime Object Detection System and Deep Learning based Integrated System
  5. 5. A Study on the Operation Concept of Cyber Warfare Execution Procedures
  6. 6. A Comparative Study on the Optimal Model for abnormal Detection event of Heart Rate Time Series Data Based on the Correlation between PPG and ECG
  7. 7. A Study on the Anomaly Prediction System of Drone Using Big Data
    Yang-Kyoo Lee, Jun-Ki Hong, Sung-Chan Hong, Vol. 21, No. 2, pp. 27-37, Apr. 2020
    10.7472/jksii.2020.21.2.27
    Keywords: 빅데이터, 드론, 위험예측, Big data, Drones, Risk Prediction
  8. 8. Deep Learning-based Abnormal Behavior Detection System for Dementia Patients
  9. 9. The study of Defense Artificial Intelligence and Block-chain Convergence
    Seyong Kim, Hyukjin Kwon, Minwoo Choi, Vol. 21, No. 2, pp. 81-90, Apr. 2020
    10.7472/jksii.2020.21.2.81
    Keywords: 인공지능, 블록체인, 해쉬함수, 빅데이터, AI, Block-chain, Hash Function, Big-Data
  10. 10. Design and Implementation of Smart City Data Marketplace based on oneM2M Standard IoT Platform
  11. 11. Corona Blue and Leisure Activities : Focusing on Korean Case
  12. 12. A research on the emotion classification and precision improvement of EEG(Electroencephalogram) data using machine learning algorithm
  13. 13. A Blockchain-based User Authentication Model Using MetaMask
  14. 14. Layered Authoring of Cyber Warfare Training Scenario
  15. 15. Unstructured Data Analysis using Equipment Check Ledger: A Case Study in Telecom Domain
  16. 16. Analysis on the Ripple and Investment Effect of Digital Bio-Healthcare Industry : Using Input-Output Tables 2019
  17. 17. Knowledge Graph-based Korean New Words Detection Mechanism for Spam Filtering
  18. 18. Network Intrusion Detection with One Class Anomaly Detection Model based on Auto Encoder
  19. 19. Analyzing Patterns of Sales and Floating Population Using Markov Chain
  20. 20. The Issues and Requirements of the Establishment of Regulation and Standard for Drone Safety
  21. 21. Interconnection Fee or Access fee? - Focusing on ISP-CP settlement dispute -
  22. 22. A Study on Model for Drivable Area Segmentation based on Deep Learning
  23. 23. GAN-based shadow removal using context information
    Hee-jin Yoon, Kang-jik Kim, Jun-chul Chun, Vol. 20, No. 6, pp. 29-36, Dec. 2019
    10.7472/jksii.2019.20.6.29
    Keywords: , Shadow removal, Generative Adversarial Network, deep-learning
  24. 24. Analysis of Blockchain Platforms from the Viewpoint of Privacy Protection
  25. 25. Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users
  26. 26. Abnormal Behavior Pattern Identifications of One-person Households using Audio, Vision, and Dust Sensors
  27. 27. Alternatives for New Internet Interconnection Policy
  28. 28. A study on counting number of passengers by moving object detection
  29. 29. A Profiling Case Study to Phishing Mail Attack Group
  30. 30. Design of Blockchain Application based on Fingerprint Recognition Module for FIDO User Authentification in Shoppingmall