Digital Library
Search: "[ keyword: CTI ]" (375)
-
Kookjin Kim, Seungjin Lee, Sungjoong Kim, Jaegeun Kim, Dongil Shin, Dong-kyoo shin, Vol. 21, No. 3, pp. 133-144, Jun. 2020
10.7472/jksii.2020.21.3.133
Keywords: Abnomaly detection, deep-learning, Autoencoder, Long Short-Term Memory models -
SoYeop Yoo, OkRan Jeong, Vol. 21, No. 3, pp. 123-131, Jun. 2020
10.7472/jksii.2020.21.3.123
Keywords: contextual information extraction, person extraction, Relation Extraction, sentiment extraction, BERT, Knowledge Graph -
Seong-Hun Ham, Hyun Ahn, Kwanghoon Pio Kim, Vol. 21, No. 3, pp. 83-92, Jun. 2020
10.7472/jksii.2020.21.3.83
Keywords: predictive process monitoring, remaining time prediction, LSTM model, Deep Learning, Process Mining -
254. The Effects of the Specific Attitudes toward the Fourth Industrial Revolution and Job SatisfactionSangWoo Hahm, Vol. 21, No. 3, pp. 53-60, Jun. 2020
10.7472/jksii.2020.21.3.53
Keywords: The Fourth Industrial Revolution, Self-Efficacy, expectancy, acceptance of change, Job Satisfaction -
Yang-Kyoo Lee, Jun-Ki Hong, Sung-Chan Hong, Vol. 21, No. 2, pp. 27-37, Apr. 2020
10.7472/jksii.2020.21.2.27
Keywords: Big data, Drones, Risk Prediction -
Manuel Eugenio Morocho-Cayamcela, Myung-Sik Kim, Wansu Lim, Vol. 21, No. 2, pp. 19-26, Apr. 2020
10.7472/jksii.2020.21.2.19
Keywords: Body area networks, wireless implants, indoor propagation, fading estimation, human tissue modeling, tumor detection. -
Sang-Hyun Yoo, Vol. 21, No. 2, pp. 9-18, Apr. 2020
10.7472/jksii.2020.21.2.9
Keywords: Moving object detection, Object Contours Detection, Bus Passenger Counting -
Jihun Chae, Hyoung-yong Ko, Byoung-gil Lee, Namgi Kim, Vol. 20, No. 4, pp. 39-46, Aug. 2019
10.7472/jksii.2019.20.4.39
Keywords: sink holes, pipe, GPR, Image recognition, underground detection, CNN, deep-learning -
Jin HaiYan, Sun HaiRong, HaSung Hwang, Vol. 20, No. 3, pp. 101-109, Jun. 2019
10.7472/jksii.2019.20.3.101
Keywords: online shopping festival, Theory of Reasoned Action, Technology Acceptance Model. -
Sungho Kim, Suchul Lee, Vol. 20, No. 2, pp. 9-19, Apr. 2019
10.7472/jksii.2019.20.2.9
Keywords: Malware, Detection rule, SNORT, LDA, network threat