Digital Library
Search: "[ keyword: 정보 ]" (125)
-
81. Development of a Data Reference Model for Joint Utilization of Biological Resource Research DataSoon--chul Kwon, Seung-ryul Jeong, Vol. 19, No. 4, pp. 135-150, Aug. 2018
10.7472/jksii.2018.19.4.135
Keywords: Biological Resources, Marine Biological Resources, Research Data, Data Reference Model, Information System, Data Model Evaluation -
Jong-Won Park, Ye-Chan Sim, Hae-Sun Jung, Yong-Woo Lee, Vol. 19, No. 4, pp. 1-6, Aug. 2018
10.7472/jksii.2018.19.4.1
Keywords: Smart Cities, Geographical Information, Big Sensor Data Stream, Generation of Real-time three Dimensional Noise Maps, Real-time Distributed Parallel Processing, Performance Evaluation -
Kai Sun, Hyun Ahn, Kwanghoon Pio Kim, Vol. 19, No. 3, pp. 25-33, Jun. 2018
10.7472/jksii.2018.19.3.25
Keywords: cloud computing environments, workflow models, information control nets, cloud service deployment models, cloud workflow architectures, cloud workflow services -
Je-In Song, Ok-Ran Jeong, Vol. 17, No. 6, pp. 133-142, Dec. 2016
10.7472/jksii.2016.17.6.133
Keywords: Recommendation, tagging, Context Information, Web Service, Web resource -
Jaeho Lee, Sukun Jin, Hyunkyung Shin, Vol. 17, No. 6, pp. 143-152, Dec. 2016
10.7472/jksii.2016.17.6.143
Keywords: Gifted education in Science, ICT, ICT competency, ICT Education -
Jae-Shin Lee, Vol. 17, No. 4, pp. 135-144, Aug. 2016
10.7472/jksii.2016.17.4.135
Keywords: source credibility, social categorization, social identity theory, perceived usefulness, in-group, out-group -
Ye-sun Bae, Woo-chun Jun, Vol. 17, No. 4, pp. 127-134, Aug. 2016
10.7472/jksii.2016.17.4.127
Keywords: Information Culture Index, Academic Background, Information and Communication Ethics, Information Literacy -
88. A Study on the Management Capabilities Enhancement of Consignor's Personal Information ProtectionHwan-Suk Cheong, Euk-Nam Park, Sang-Joon Lee, Vol. 17, No. 4, pp. 95-114, Aug. 2016
10.7472/jksii.2016.17.4.95
Keywords: Personal Information, Personal Information Protection Act, Personal Information Protection Management System, Consignor -
89. Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction TechnologyYounsung Choi, Dongho Won, Vol. 17, No. 3, pp. 1-10, Jun. 2016
10.7472/jksii.2016.17.3.01
Keywords: User authentication scheme, biometrics, fuzzy extraction -
Woo-chun Jun, Vol. 17, No. 3, pp. 87-94, Jun. 2016
10.7472/jksii.2016.17.3.87
Keywords: Gifted Children in IT, Observation-Recommendation, Admission System, Gifted Children in Math, Gifted Children in Science




