• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CC ]" (98)
  1. 1. A Trusted Sharing Model for Patient Records based on Permissioned Blockchain
    Kyoung-jin Kim, Seng-phil Hong, Vol. 18, No. 6, pp. 75-84, Dec. 2017
    10.7472/jksii.2017.18.6.75
    Keywords: Permissioned blockchain, role-based access control, Medical data
  2. 2. A Robust Object Detection and Tracking Method using RGB-D Model
    Park, Seohee;Chun, Junchul;, Vol. 18, No. 4, pp. 61-68, Aug. 2017
    10.7472/jksii.2017.18.4.61
    Keywords: 3D CCTV, video surveillance, Object Detection, object tracking, Depth Map, Image Segmentation
  3. 3. 5G Radio Access Network Architecture for Mobile Augmented Reality Service
    Hyoungjun Cho, Jong-Moon Chung, Vol. 18, No. 4, pp. 27-34, Aug. 2017
    10.7472/jksii.2017.18.4.27
    Keywords: Augmented Reality, 5G network, Radio Access Network
  4. 4. Collaborative Filtering using Co-Occurrence and Similarity information
    Kwang Tek Na, Ju Hong Lee, Vol. 18, No. 3, pp. 19-28, Jun. 2017
    10.7472/jksii.2017.18.3.19
    Keywords: Collaborative Filtering, Recommender System, co occurrence, similarity, SVD, latent factor model
  5. 5. Enhancement of Fall-Detection Rate using Frequency Spectrum Pattern Matching
  6. 6. An Automatic AP Connections Scheme using iBeacon
    ChoonSung Nam, DongRyeol Shin, Vol. 18, No. 2, pp. 1-12, Apr. 2017
    10.7472/jksii.2017.18.2.01
    Keywords: Autonomous access, Access point, Public wireless LAN, SSID, iBeacon, Android
  7. 7. A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone
    Jong-jin Park, Min-kyong Choi, Jong-chang Ahn, Vol. 18, No. 1, pp. 105-120, Feb. 2017
    10.7472/jksii.2017.18.1.105
    Keywords: Smartphones, information security, Degree of personal risk accepting, Buying intention, Android, iOS
  8. 8. A Dynamic Security Service using Access Control Model in Distributed Framework Support for u-Healthcare
  9. 9. Perception of Students with disabilities and their WBI personnel about Web accessibility and its effective instructional design strategies
  10. 10. XML Document Encrypt Implementation using Elliptic Curve Cryptosystem
    Hoon Ko, Vol. 8, No. 1, pp. 79-86, Feb. 2007
    Keywords: ECC, RSA, XML, Encryption