• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: AI ]" (174)
  1. 71. Performance Analyzer for Embedded AI Processor
    Dong Hyun Hwang, Young Hyun Yoon, Chang Yeop Han, Seung Eun Lee, Vol. 21, No. 5, pp. 149-157, Oct. 2020
    10.7472/jksii.2020.21.5.149
    Keywords: AI processor, Simulator, Artificial intelligence, Embedded System, SoC
  2. 72. Applying SeqGAN Algorithm to Software Bug Repair
    Geunseok Yang, Byungjeong Lee, Vol. 21, No. 5, pp. 129-137, Oct. 2020
    10.7472/jksii.2020.21.5.129
    Keywords: SeqGAN Algorithm, Bug Report, Software Bug Repair, Software Maintenance
  3. 73. Intelligent Railway Detection Algorithm Fusing Image Processing and Deep Learning for the Prevent of Unusual Events
    Ju-ho Jung, Da-hyeon Kim, Chul-su Kim, Ryum-duck Oh, Jun-ho Ahn, Vol. 21, No. 4, pp. 109-116, Aug. 2020
    10.7472/jksii.2020.21.4.109
    Keywords: Rapid-transit railway, Railway, Deep Learning, Fusion
  4. 74. A comparative study of Korean and Chinese BTS female fandom: The effect of Fandom activity on life satisfaction
    XueJin Jiang, SaRuLa, HaSung Hwang, Vol. 21, No. 4, pp. 59-68, Aug. 2020
    10.7472/jksii.2020.21.4.59
    Keywords: BTS Fandom Activity, Star Attributes, Illusory Romance, Daily Happiness
  5. 75. LSTM-based Business Process Remaining Time Prediction Model Featured in Activity-centric Normalization Techniques
    Seong-Hun Ham, Hyun Ahn, Kwanghoon Pio Kim, Vol. 21, No. 3, pp. 83-92, Jun. 2020
    10.7472/jksii.2020.21.3.83
    Keywords: predictive process monitoring, remaining time prediction, LSTM model, Deep Learning, Process Mining
  6. 76. Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users
    Seonjin Hwang, DongHyun Ko, Taeu Bahk, Yoon-ho Choi, Vol. 21, No. 3, pp. 1-9, Jun. 2020
    10.7472/jksii.2020.21.3.1
    Keywords: blockchain platform, Privacy, Blockchain Securicy, Ethereum
  7. 77. A Study on Establishment of Safety Training Center Based on Virtual Reality and Augmented Reality Technology for Military Safety and Suicide Accident Prevention
  8. 78. A Profiling Case Study to Phishing Mail Attack Group
    Jae-il Lee, Yong-joon Lee, Hyuk-jin Kwon, Vol. 21, No. 2, pp. 91-97, Apr. 2020
    10.7472/jksii.2020.21.2.91
    Keywords: Phishing mail, hacking, Cyber Attack Group, Profiling
  9. 79. The study of Defense Artificial Intelligence and Block-chain Convergence
    Seyong Kim, Hyukjin Kwon, Minwoo Choi, Vol. 21, No. 2, pp. 81-90, Apr. 2020
    10.7472/jksii.2020.21.2.81
    Keywords: AI, Block-chain, Hash Function, Big-Data
  10. 80. Design of Blockchain Application based on Fingerprint Recognition Module for FIDO User Authentification in Shoppingmall
    Min-goo Kang, Vol. 21, No. 2, pp. 65-72, Apr. 2020
    10.7472/jksii.2020.21.2.65
    Keywords: Blockchain, biometric distributed ID(DID), fingerprint recognition FIDO2.0, S10 Key-store, crypto-currency transaction