Digital Library
Search: "[ keyword: CC ]" (95)
-
Jin Ma, Hyunah Kim, Minjae Park, Vol. 19, No. 2, pp. 27-32, Apr. 2018
10.7472/jksii.2018.19.2.27
Keywords: role-based access control, External Interface, Web API, Restful API -
Kyoung-jin Kim, Seng-phil Hong, Vol. 18, No. 6, pp. 75-84, Dec. 2017
10.7472/jksii.2017.18.6.75
Keywords: Permissioned blockchain, role-based access control, Medical data -
Park, Seohee;Chun, Junchul;, Vol. 18, No. 4, pp. 61-68, Aug. 2017
10.7472/jksii.2017.18.4.61
Keywords: 3D CCTV, video surveillance, Object Detection, object tracking, Depth Map, Image Segmentation -
Hyoungjun Cho, Jong-Moon Chung, Vol. 18, No. 4, pp. 27-34, Aug. 2017
10.7472/jksii.2017.18.4.27
Keywords: Augmented Reality, 5G network, Radio Access Network -
Kwang Tek Na, Ju Hong Lee, Vol. 18, No. 3, pp. 19-28, Jun. 2017
10.7472/jksii.2017.18.3.19
Keywords: Collaborative Filtering, Recommender System, co occurrence, similarity, SVD, latent factor model -
Suhwan Lee, Hanif Bhuiyan, Dongik Oh, Kyeong-Jin Oh, Yunyoung Nam, Myung-Duk Hong, Geun-Sik Jo, Vol. 18, No. 3, pp. 11-18, Jun. 2017
10.7472/jksii.2017.18.3.11
Keywords: Fall Detection, Acceleration measurement, Frequency spectrum, Pattern matching, Wikipedia, Semantic relation, Identification, Infobox Template, Information Extraction, Semi-structured data -
ChoonSung Nam, DongRyeol Shin, Vol. 18, No. 2, pp. 1-12, Apr. 2017
10.7472/jksii.2017.18.2.01
Keywords: Autonomous access, Access point, Public wireless LAN, SSID, iBeacon, Android -
Jong-jin Park, Min-kyong Choi, Jong-chang Ahn, Vol. 18, No. 1, pp. 105-120, Feb. 2017
10.7472/jksii.2017.18.1.105
Keywords: Smartphones, information security, Degree of personal risk accepting, Buying intention, Android, iOS -
Deepanjal Shrestha, Seung Ryul Jeong, Vol. 17, No. 6, pp. 113-122, Dec. 2016
10.7472/jksii.2016.17.6.113
Keywords: ICT, information access, Internet, data center, tourism industry -
Yousra Abdul Alsahib S.Aldeen, Shaligram Prajapat, Mojtaba Raeisi Nejad Dobuneh, Noor Azeera Abdul Aziz, Jung-Gyu Lee, Muhammad Younas, Do Yeon Kim, Minjae Park, NurLiyanaSulaiman NurLiyanaSulaiman, Taghi Javdani Gandomani, Noorrezam Yusop, Isma Farah Siddiqui, Yoosin Kim, Mina Ziaei Nafchi, Seung-Ryul Jeong, MohdNaz'ri Mahrin, MohdAizainiMaarof MohdAizainiMaarof, Ashok Sharma, Dayang N.A. Jawawi, Imran Ghani, Mazleena Salleh, Hyun Ahn, Massila Kamalrudin, Scott Uk-Jin Lee, Ramjeevan Singh Thakur, Dayang Norhayati Abang Jawawi, Anazida Zainal, Kwanghoon Pio Kim, Sang Hyun Choi, Mokhtar Mohd Yusof, RasimahCheMohd Yusoff, Muhammad Murad Khan, Mohammed HazimAlkawaz, Safiah Sidek, Vol. 17, No. 5, pp. 9-16, Oct. 2016
10.7472/jksii.2016.17.5.09
Keywords: access control, Smart Environment, Semantic web, XACML, Security requirement, security attribute, mobile application development, Data-Intensive Workflow Validation, Workflow, BPM, K-anonymity, Privacy, L-diversity, data relocation, generalization, Global Agile Development, Cloud computing, Challenges, benefits, Framework, cloud-based agile tools, Regression Testing, Prioritization, Evolutionary Algorithm, Web Application, User Session, Automatic Variable Key (AVK), cryptanalysis, Hacker, AI, genetic algorithm, swarm intelligence, cipher, Neural Network, cryptography, Artificial neural Networks (ANN), Genetic Algorithm (GA), Swarm Intelligence (SI), Features Combinations, Opinion Target Extraction, Text sentiment analysis, Conditional Random Field and Sequence Labeling Algorithm, Process Diagram, Project Monitoring, Project Management, Context Diagram, Awareness, agile practices, agile software development methodology, Agile Software Development, Agile Methods, Agile Transformation, Agile Adoption, Transition Prerequisites, Agile Transition, Grounded Theory (GT)