• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 모델 ]" (122)
  1. 61. Analysis and Prediction Algorithms on the State of User's Action Using the Hidden Markov Model in a Ubiquitous Home Network System
  2. 62. Effect of Layout and Complexity of Class Diagram on Model Comprehension
  3. 63. A Machine Learning-based Popularity Prediction Model for YouTube Mukbang Content
    Beomgeun Seo, Hanjun Lee, Vol. 24, No. 6, pp. 49-55, Dec. 2023
    10.7472/jksii.2023.24.6.49
    Keywords: Machine Learning, YouTube, Mukbang, Popularity Prediction, Predictive model
  4. 64. A Study on Automatic Discovery and Summarization Method of Battlefield Situation Related Documents using Natural Language Processing and Collaborative Filtering
  5. 65. AI-based Cybersecurity Solution for Industrial Control System
    Bu-Seong Jo, Mun-Suk Kim, Vol. 23, No. 6, pp. 97-105, Dec. 2022
    10.7472/jksii.2022.23.6.97
    Keywords: ICS, AI, IDS, Data Collection, Model Evaluation
  6. 66. The Case Study for Childcare Service Demand Forecasting Using Bigdata Reference Analysis Model
    Chung-Sik Yun, Seung Ryul Jeong, Vol. 23, No. 6, pp. 87-96, Dec. 2022
    10.7472/jksii.2022.23.6.87
    Keywords: BigData, Reference Analysis Model, Effectiveness
  7. 67. Civic Participation in Smart City : A Role and Direction
  8. 68. Comparative Analysis and Implications of Command and Control(C2)-related Information Exchange Models
    Kunyoung Kim, Gyudong Park, Mye Sohn, Vol. 23, No. 6, pp. 59-69, Dec. 2022
    10.7472/jksii.2022.23.6.59
    Keywords: Command and Control(C2), interoperability, Information Exchange Model, database, XML schema
  9. 69. Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling
    Da-hyeon Kim, Ji-young Min, Jun-ho Ahn, Vol. 23, No. 6, pp. 27-37, Dec. 2022
    10.7472/jksii.2022.23.6.27
    Keywords: Virtual Private Network, STRIDE Threat Modeling, Threat Analysis, Threat Scenario, Security requirement
  10. 70. Efficient distributed consensus optimization based on patterns and groups for federated learning
    Seung Ju Kang, Ji Young Chun, Geontae Noh, Ik Rae Jeong, Vol. 23, No. 4, pp. 73-85, Aug. 2022
    10.7472/jksii.2022.23.4.73
    Keywords: Federated learning, Optimization, Weight model, Communication time, Privacy, ADMM