• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: AI ]" (166)
  1. 51. Potential Use of 3D Course Material as a Pedagogical Tool for Laboratory Courses with respect to Assembly/Disassembly of the Combustion Chamber in Vocational High Schools
    Tae-gyoon Lee, Jong-Seong Kim, Vol. 17, No. 3, pp. 33-44, Jun. 2016
    10.7472/jksii.2016.17.3.33
    Keywords: 3D-based course material, Solidworks, a combustion chamber, aviational maintenance, the exclusive viewer
  2. 52. SNS as a Method of Election Campaign: A Case study of the 2015's Special Election in South Korea
    SeMi Park, HaSung Hwang, Vol. 17, No. 2, pp. 87-96, Apr. 2016
    10.7472/jksii.2016.17.2.87
    Keywords: SNS, election campaign, special election, political communication
  3. 53. Big Data and Entertainment Content : Case Studies and Prospects
    Hae Won Kim, Mina Lee, Vol. 17, No. 2, pp. 109-0, Apr. 2016
    10.7472/jksii.2016.17.2.109
    Keywords: Big data, Korean entertainments contents business, BLOTER, NEOTOUCHPOINT
  4. 54. Dynamic Service Chaining Method Considering Performance of Middlebox Over SDN
    Hyeongseok Oh, Namgi Kim, Yoon-Ho Choi, Vol. 16, No. 6, pp. 47-56, Dec. 2015
    10.7472/jksii.2015.16.6.47
    Keywords: Software Defined Networks, Dynamic Routing, Middlebox, Service Chaining
  5. 55. A Stochastic Work-Handover Relationship Model in Workflow-supported Social Networks
    Hyun Ahn, Kwanghoon Kim, Vol. 16, No. 5, pp. 59-66, Oct. 2015
    10.7472/jksii.2015.16.5.59
    Keywords: Stochastic Model, Workflow-supported Socail Network, Work-Handover Relationship, Workflow Intelligence
  6. 56. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
    Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
    10.7472/jksii.2015.16.1.21
    Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication
  7. 57. Improvement of Energy Efficiency of Plants Factory by Arranging Air Circulation Fan and Air Flow Control Based on CFD
    Seung-Mi Moon, Sook-Youn Kwon, Jae-Hyun Lim, Vol. 16, No. 1, pp. 57-66, Feb. 2015
    10.7472/jksii.2015.16.1.57
    Keywords: Plant Factory, CFD, Arrangement of Circulation Fan, Air Flow Control, Energy Efficiency Improvement
  8. 58. A Weighted Frequent Graph Pattern Mining Approach considering Length-Decreasing Support Constraints
    Unil Yun, Gangin Lee, Vol. 15, No. 6, pp. 125-132, Dec. 2014
    10.7472/jksii.2014.15.6.125
    Keywords: Length-decreasing support constraint, weighted frequent pattern mining, graph pattern, Data Mining, Frequent pattern mining
  9. 59. Classification of Parkinson's Disease Using Defuzzification-Based Instance Selection
    Sang-Hong Lee, Vol. 15, No. 3, pp. 109-116, Jun. 2014
    10.7472/jksii.2014.15.3.109
    Keywords: Instance Selection, Parkinson's disease, Gait, Fuzzy Neural Networks, Wavelet Transforms, Normal Distribution
  10. 60. Hybrid Spray and Wait Routing Protocol in DTN
    Sung-Su Hyun, Hyeon-Jin Jeong, Seoung-Sik Choi, Vol. 15, No. 3, pp. 53-62, Jun. 2014
    10.7472/jksii.2014.15.3.53
    Keywords: DTN Protocol, Spray and Wait Protocol, One simulator