• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CTI ]" (386)
  1. 231. A Proposal for Mobile Gallery Auction Method Using NFC-based FIDO and 2 Factor Technology and Permission-type Distributed Director Block-chain
    Sun-Kuk Noh, Vol. 20, No. 6, pp. 129-135, Dec. 2019
    10.7472/jksii.2019.20.6.129
    Keywords: NFC, FIDO, Block-chain, Mobile gallery auction
  2. 232. A Comparative Study on the Optimal Model for abnormal Detection event of Heart Rate Time Series Data Based on the Correlation between PPG and ECG
    Jin-soo Kim, Kang-yoon Lee, Vol. 20, No. 6, pp. 137-142, Dec. 2019
    10.7472/jksii.2019.20.6.137
    Keywords: Photoplethysmography(PPG), Electrocardiogram(ECG), Abnormal event detection, SVM, LSTM
  3. 233. Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer
    Hyung-Woo Lee, Hanseong Lee, Vol. 20, No. 5, pp. 9-18, Oct. 2019
    10.7472/jksii.2019.20.5.9
    Keywords: Android Mobile APK, Detection DApp, Forgery Detection, Blockchain, Hyperledger Composer
  4. 234. The prediction of appearance of jellyfish through Deep Neural Network
  5. 235. The Effects of E-Brochure Functions and Attitudes to E-Brochures on Self-Efficacy and Salespeople Job Satisfaction in Pharmaceutical Companies
    Kun-Dong Choi, Hwa-Jeong Lee, Sang-Woo Hahm, Vol. 20, No. 5, pp. 67-77, Oct. 2019
    10.7472/jksii.2019.20.5.67
    Keywords: e-brochure, Job Satisfaction, Self-Efficacy, salespeople
  6. 236. A Study on the Pipe Position Estimation in GPR Images Using Deep Learning Based Convolutional Neural Network
    Jihun Chae, Hyoung-yong Ko, Byoung-gil Lee, Namgi Kim, Vol. 20, No. 4, pp. 39-46, Aug. 2019
    10.7472/jksii.2019.20.4.39
    Keywords: sink holes, pipe, GPR, Image recognition, underground detection, CNN, deep-learning
  7. 237. Exploring factors affecting continuous intention to use online shopping festival
    Jin HaiYan, Sun HaiRong, HaSung Hwang, Vol. 20, No. 3, pp. 101-109, Jun. 2019
    10.7472/jksii.2019.20.3.101
    Keywords: online shopping festival, Theory of Reasoned Action, Technology Acceptance Model.
  8. 238. Automatic Malware Detection Rule Generation and Verification System
    Sungho Kim, Suchul Lee, Vol. 20, No. 2, pp. 9-19, Apr. 2019
    10.7472/jksii.2019.20.2.9
    Keywords: Malware, Detection rule, SNORT, LDA, network threat
  9. 239. A Platform Providing Interactive Signage Based on Edge-cloud Cooperation
    Jaewon Moon, Seungwoo Kum, Sangwon Lee, Vol. 20, No. 2, pp. 39-49, Apr. 2019
    10.7472/jksii.2019.20.2.39
    Keywords: Context, Interactive Digital Signage, Edge-Cloud cooperation
  10. 240. Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain
    Sumin Hwang, Hyung-Woo Lee, Vol. 20, No. 2, pp. 61-68, Apr. 2019
    10.7472/jksii.2019.20.2.61
    Keywords: Blockchain, Hyperledger Fabric, Android Mobile App, Malicious Counterfeit App Detection.