• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 모바일 ]" (48)
  1. 41. Node scheduling algorithm for energy efficiency and delay reduction in mobile sensor networks
    Jae-Hyun Son, Hee-Jung Byun, Vol. 15, No. 4, pp. 111-118, Aug. 2014
    10.7472/jksii.2014.15.4.111
    Keywords: Mobile sensor networks, Delay, Energy, Self-configuration
  2. 42. Implementation of Service Model to Exchange of Biosignal Information based on HL7 Fast Health Interoperability Resources for the hypertensive management
    Hune Cho, Ju Ok Won, Hae Sook Hong, Hwa Sun Kim, Vol. 15, No. 3, pp. 21-30, Jun. 2014
    10.7472/jksii.2014.15.3.21
    Keywords: Bluetooth Health Device Profile, HL7 FHIR, Hypertension, Personal Health Device, mobile Healthcare
  3. 43. A Study on Distributed Processing of Big Data and User Authentication for Human-friendly Robot Service on Smartphone
  4. 44. Study on WP-IBE compliant Mobile IPSec
    Cheong Hyeon Choi, Vol. 14, No. 5, pp. 11-26, Oct. 2013
    10.7472/jksii.2013.14.5.11
    Keywords: Mobile IPSec, Mobile IPv4, Elliptic Curve Cryptography, Identity Based Encryption
  5. 45. Story Generation Method using User Information in Mobile Environment
    Jeen-Pyo Hong, Jeong-Won Cha, Vol. 14, No. 3, pp. 81-0, Jun. 2013
    10.7472/jksii.2013.14.3.81
    Keywords: Sentence Generation, Information Extraction, Mobile Context, Natural Language Processing
  6. 46. Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 3, pp. 35-46, Jun. 2013
    10.7472/jksii.2013.14.3.35
    Keywords: Android, Malicious Application, Event Aggregation, Mobile Device, Malicious App. Detection
  7. 47. An Analysis on the Vulnerability of Secure Keypads for Mobile Devices
    Yunho Lee, Vol. 14, No. 3, pp. 15-22, Jun. 2013
    10.7472/jksii.2013.14.3.15
    Keywords: Mobile Security, Secure Keypads, Personal Information, Keylogger
  8. 48. Pratical Offloading Methods and Cost Models for Mobile Cloud Computing