Digital Library
Search: "[ author: Park ]" (261)
-
Doohee Song, Kwangjin Park, Vol. 15, No. 2, pp. 33-40, Apr. 2014
10.7472/jksii.2014.15.2.33
Keywords: wireless broadcasting, spatial query, data scheduling, large volume of data, location based service -
Hee Yeon Min, Jin Hyung Park, Dong Hoon Lee, In Seok Kim, Vol. 15, No. 1, pp. 157-170, Feb. 2014
10.7472/jksii.2014.15.1.157
Keywords: Outlier Detection, User Input Pattern, E-finance Transaction Pattern -
Do-Hyung Park, Vol. 15, No. 1, pp. 73-88, Feb. 2014
10.7472/jksii.2014.15.1.73
Keywords: Online Community, Lurking Behavior, Social Network, Lurker -
Hyungwoo Park, Vol. 19, No. 6, pp. 63-72, Dec. 2018
10.7472/jksii.2018.19.6.63
Keywords: Voice analysis, Voice credit rating, Voice characteristics, Machine Learning, Support Vector Machine -
Young-Geol Lee, Younlae Lee, Hyunah Kim, Yeonyi Jang, Minjae Park, Vol. 19, No. 6, pp. 73-82, Dec. 2018
10.7472/jksii.2018.19.6.73
Keywords: rule based file management tool, facility management in disaster environments -
Seohee Park, Myunggeun Ji, Junchul Chun, Vol. 19, No. 6, pp. 41-51, Dec. 2018
10.7472/jksii.2018.19.6.41
Keywords: video surveillance, Object Detection, Keypoint Detection, Human Pose Estimation, Deep Learning -
Junghun Park, Dongik Oh, Wonhan Shin, Vol. 19, No. 5, pp. 97-105, Oct. 2018
10.7472/jksii.2018.19.5.97
Keywords: OCS (Order Communication System), Voluntary Medical Service, Patient Prescription, Wireless Communication, Medical ICT Infrastructure -
Chun-Su Park, Vol. 19, No. 4, pp. 7-13, Aug. 2018
10.7472/jksii.2018.19.4.7
Keywords: Copy move forgery, image tampering, keypoint-based methods, block-based methods -
Jong-Won Park, Ye-Chan Sim, Hae-Sun Jung, Yong-Woo Lee, Vol. 19, No. 4, pp. 1-6, Aug. 2018
10.7472/jksii.2018.19.4.1
Keywords: Smart Cities, Geographical Information, Big Sensor Data Stream, Generation of Real-time three Dimensional Noise Maps, Real-time Distributed Parallel Processing, Performance Evaluation -
Soohwa Hong, Yongsu Park, Vol. 17, No. 5, pp. 33-42, Oct. 2016
10.7472/jksii.2016.17.5.33
Keywords: Anti-debugging, Pin, Dynamic Analysis, Protector, Reverse engineering




