Digital Library
Search: "[ keyword: CTI ]" (386)
-
Seohee Park, Myunggeun Ji, Junchul Chun, Vol. 19, No. 6, pp. 41-51, Dec. 2018
10.7472/jksii.2018.19.6.41
Keywords: video surveillance, Object Detection, Keypoint Detection, Human Pose Estimation, Deep Learning -
Sung-gwan Hong, Seung Ryul Jeong, Vol. 19, No. 6, pp. 101-112, Dec. 2018
10.7472/jksii.2018.19.6.101
Keywords: Fire probability prediction, fire risk, Data Mining -
Ha Sung Hwnag, Vol. 19, No. 5, pp. 115-122, Oct. 2018
10.7472/jksii.2018.19.5.115
Keywords: Instagram, Social support, Subjective well –being, Loneliness -
Tae Soo Park, Ok-Ran Jeong, Vol. 17, No. 6, pp. 153-0, Dec. 2016
10.7472/jksii.2016.17.6.153
Keywords: Event Detection, Social Network, Social Media Contents -
Dong-ryul Kim, Jong-sub Moon, Vol. 17, No. 6, pp. 93-102, Dec. 2016
10.7472/jksii.2016.17.6.93
Keywords: Android memory protection, ptrace system call, /proc/PID/mem virtual file, Virtual memory protection, memory editor -
Jae Won Kim, You Dong Yun, Yu Jin Jung, Ki Youn Kim, Vol. 17, No. 5, pp. 151-160, Oct. 2016
10.7472/jksii.2016.17.5.151
Keywords: Sharing Economy, Collective Intelligence, Text Mining, Big data, R-programming, time series analysis -
207. A Study on the Management Capabilities Enhancement of Consignor's Personal Information ProtectionHwan-Suk Cheong, Euk-Nam Park, Sang-Joon Lee, Vol. 17, No. 4, pp. 95-114, Aug. 2016
10.7472/jksii.2016.17.4.95
Keywords: Personal Information, Personal Information Protection Act, Personal Information Protection Management System, Consignor -
Hong-min Bae, Byung-Seo Kim, Vol. 17, No. 4, pp. 87-94, Aug. 2016
10.7472/jksii.2016.17.4.87
Keywords: Elderly People, IT Service, Construction method, BIM -
Yun Hi Chang, Vol. 17, No. 4, pp. 161-172, Aug. 2016
10.7472/jksii.2016.17.4.161
Keywords: IT professionals' happiness, system dynamics analysis, causal loop dyagram, IT Job Satisfaction -
210. Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction TechnologyYounsung Choi, Dongho Won, Vol. 17, No. 3, pp. 1-10, Jun. 2016
10.7472/jksii.2016.17.3.01
Keywords: User authentication scheme, biometrics, fuzzy extraction




