• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 패턴 ]" (31)
  1. 11. A Smartphone Addiction and Disease Prevention System Through the Collection and Analysis of Smartphone Usage Patterns
  2. 12. Analysis and Performance Evaluation of Pattern Condensing Techniques used in Representative Pattern Mining
  3. 13. A Weighted Frequent Graph Pattern Mining Approach considering Length-Decreasing Support Constraints
    Unil Yun, Gangin Lee, Vol. 15, No. 6, pp. 125-132, Dec. 2014
    10.7472/jksii.2014.15.6.125
    Keywords: Length-decreasing support constraint, weighted frequent pattern mining, graph pattern, Data Mining, Frequent pattern mining
  4. 14. Analysis and Evaluation of Frequent Pattern Mining Technique based on Landmark Window
    Gwangbum Pyun, Unil Yun, Vol. 15, No. 3, pp. 101-108, Jun. 2014
    10.7472/jksii.2014.15.3.101
    Keywords: Landmark Window, Frequent pattern mining, Online mining, Performance Evaluation, scalability
  5. 15. Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern
    Hee Yeon Min, Jin Hyung Park, Dong Hoon Lee, In Seok Kim, Vol. 15, No. 1, pp. 157-170, Feb. 2014
    10.7472/jksii.2014.15.1.157
    Keywords: Outlier Detection, User Input Pattern, E-finance Transaction Pattern
  6. 16. Performance Analysis of Frequent Pattern Mining with Multiple Minimum Supports
    Heungmo Ryang, Unil Yun, Vol. 14, No. 6, pp. 1-8, Dec. 2013
    10.7472/jksii.2013.14.6.01
    Keywords: Multiple minimum supports, Frequent pattern mining, Rare frequent patterns, Performance Evaluation, scalability
  7. 17. Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
    10.7472/jksii.2013.14.6.125
    Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis
  8. 18. A RFID Tag Anti-Collision Algorithm Using 4-Bit Pattern Slot Allocation Method
    Young Back Kim, Sung Soo Kim, Kyung Ho Chung, Kwang Seon Ahn, Vol. 14, No. 4, pp. 25-34, Aug. 2013
    10.7472/jksii.2013.14.4.25
    Keywords: Anti-collision, Collision Tracking, Slotted Query Tree, 4-Bit Pattern
  9. 19. Performance evaluation of approximate frequent pattern mining based on probabilistic technique
  10. 20. Relation Extraction based on Composite Kernel combining Pattern Similarity of Predicate-Argument Structure