Digital Library
Search: "[ keyword: CTI ]" (386)
-
Sun-Kuk Noh, Vol. 20, No. 6, pp. 129-135, Dec. 2019
10.7472/jksii.2019.20.6.129
Keywords: NFC, FIDO, Block-chain, Mobile gallery auction -
Jin-soo Kim, Kang-yoon Lee, Vol. 20, No. 6, pp. 137-142, Dec. 2019
10.7472/jksii.2019.20.6.137
Keywords: Photoplethysmography(PPG), Electrocardiogram(ECG), Abnormal event detection, SVM, LSTM -
Hyung-Woo Lee, Hanseong Lee, Vol. 20, No. 5, pp. 9-18, Oct. 2019
10.7472/jksii.2019.20.5.9
Keywords: Android Mobile APK, Detection DApp, Forgery Detection, Blockchain, Hyperledger Composer -
CHEOLHUN HWANG, Myung-Mook Han, Vol. 20, No. 5, pp. 1-8, Oct. 2019
10.7472/jksii.2019.20.5.1
Keywords: deep neural network, Bootstrapping, Data Expansion, Transfer Learning, Random Forest, Sequence Forward Selection -
Kun-Dong Choi, Hwa-Jeong Lee, Sang-Woo Hahm, Vol. 20, No. 5, pp. 67-77, Oct. 2019
10.7472/jksii.2019.20.5.67
Keywords: e-brochure, Job Satisfaction, Self-Efficacy, salespeople -
Jihun Chae, Hyoung-yong Ko, Byoung-gil Lee, Namgi Kim, Vol. 20, No. 4, pp. 39-46, Aug. 2019
10.7472/jksii.2019.20.4.39
Keywords: sink holes, pipe, GPR, Image recognition, underground detection, CNN, deep-learning -
Jin HaiYan, Sun HaiRong, HaSung Hwang, Vol. 20, No. 3, pp. 101-109, Jun. 2019
10.7472/jksii.2019.20.3.101
Keywords: online shopping festival, Theory of Reasoned Action, Technology Acceptance Model. -
Sungho Kim, Suchul Lee, Vol. 20, No. 2, pp. 9-19, Apr. 2019
10.7472/jksii.2019.20.2.9
Keywords: Malware, Detection rule, SNORT, LDA, network threat -
Jaewon Moon, Seungwoo Kum, Sangwon Lee, Vol. 20, No. 2, pp. 39-49, Apr. 2019
10.7472/jksii.2019.20.2.39
Keywords: Context, Interactive Digital Signage, Edge-Cloud cooperation -
Sumin Hwang, Hyung-Woo Lee, Vol. 20, No. 2, pp. 61-68, Apr. 2019
10.7472/jksii.2019.20.2.61
Keywords: Blockchain, Hyperledger Fabric, Android Mobile App, Malicious Counterfeit App Detection.




