• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ author: Park ]" (261)
  1. 151. Efficient Data Scheduling considering number of Spatial query of Client in Wireless Broadcast Environments
    Doohee Song, Kwangjin Park, Vol. 15, No. 2, pp. 33-40, Apr. 2014
    10.7472/jksii.2014.15.2.33
    Keywords: wireless broadcasting, spatial query, data scheduling, large volume of data, location based service
  2. 152. Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern
    Hee Yeon Min, Jin Hyung Park, Dong Hoon Lee, In Seok Kim, Vol. 15, No. 1, pp. 157-170, Feb. 2014
    10.7472/jksii.2014.15.1.157
    Keywords: Outlier Detection, User Input Pattern, E-finance Transaction Pattern
  3. 153. The Effect of Online Community, Members, and Personal Characteristics on Lurking Behavior: Why do people only consume rather than create contents?
    Do-Hyung Park, Vol. 15, No. 1, pp. 73-88, Feb. 2014
    10.7472/jksii.2014.15.1.73
    Keywords: Online Community, Lurking Behavior, Social Network, Lurker
  4. 154. Personal Credit Evaluation System through Telephone Voice Analysis: By Support Vector Machine
    Hyungwoo Park, Vol. 19, No. 6, pp. 63-72, Dec. 2018
    10.7472/jksii.2018.19.6.63
    Keywords: Voice analysis, Voice credit rating, Voice characteristics, Machine Learning, Support Vector Machine
  5. 155. A rule based file management tool for facility log files integration in disaster environments
  6. 156. A Method for 3D Human Pose Estimation based on 2D Keypoint Detection using RGB-D information
    Seohee Park, Myunggeun Ji, Junchul Chun, Vol. 19, No. 6, pp. 41-51, Dec. 2018
    10.7472/jksii.2018.19.6.41
    Keywords: video surveillance, Object Detection, Keypoint Detection, Human Pose Estimation, Deep Learning
  7. 157. Development of a Mini-OCS System for Voluntary Medical Services in the Challenged Regions
  8. 158. Hybrid copy-move-forgery detection algorithm fusing keypoint-based and block-based approaches
    Chun-Su Park, Vol. 19, No. 4, pp. 7-13, Aug. 2018
    10.7472/jksii.2018.19.4.7
    Keywords: Copy move forgery, image tampering, keypoint-based methods, block-based methods
  9. 159. Real Time Distributed Parallel Processing to Visualize Noise Map with Big Sensor Data and GIS Data for Smart Cities
  10. 160. The design and implementation of pin plugin tool to bypass anti-debugging techniques
    Soohwa Hong, Yongsu Park, Vol. 17, No. 5, pp. 33-42, Oct. 2016
    10.7472/jksii.2016.17.5.33
    Keywords: Anti-debugging, Pin, Dynamic Analysis, Protector, Reverse engineering