Digital Library
Search: "[ keyword: IR ]" (202)
-
Jong-woo Ryu, Geon-hee Baek, Choon-Sung Nam, Vol. 26, No. 3, pp. 111-119, Jun. 2025
10.7472/jksii.2025.26.3.111
Keywords: Stock Price Prediction, LSTM, Features, Unidirectional, Bidirectional, RMSE -
WonJun Choi, JeSeol Yu, Vol. 26, No. 2, pp. 51-60, Apr. 2025
10.7472/jksii.2025.26.2.51
Keywords: forensic, scientific ciriminal investigation, activity level, Fingerprint, Deep Learning -
Tsagaantsooj Batzaya, Eun-bi Cho, Jeong-hyeon Chang, Kwanghoon Pio Kim, Vol. 26, No. 1, pp. 9-17, Feb. 2025
10.7472/jksii.2025.26.1.9
Keywords: CPTED, YOLO, GSV, Natural surveillance, Physical environment, Crime Prevention -
Yoosin Kim, Vol. 26, No. 1, pp. 55-63, Feb. 2025
10.7472/jksii.2025.26.1.55
Keywords: Smoking Detection, Rent-a-car, IoT, Air-Quality Sensor, Machine Learning -
Gukhua Lee, Joon Woo, Taeyoung Hong, Vol. 25, No. 5, pp. 41-51, Oct. 2024
10.7472/jksii.2024.25.5.41
Keywords: High-Performance Computing, Customized container image, Image manager, Supercomputing environment -
Dong-il Cho, Vol. 25, No. 4, pp. 39-46, Aug. 2024
10.7472/jksii.2024.25.4.39
Keywords: API Gateway, GraalVM, Virtual Thread, reactive, Microservice Architecture, Cloud computing -
LiuCun Zhu, JiaJin Chen, HaSung Hwang, Vol. 25, No. 3, pp. 93-100, Jun. 2024
10.7472/jksii.2024.25.3.93
Keywords: Virtual community Ifland, use and satisfaction, innovativeness, Satisfaction, intention to continue use -
Hong hwan Ahn, Han Sol Lim, Seung Kyun Ra, Bong Gyou Lee, Vol. 25, No. 3, pp. 71-81, Jun. 2024
10.7472/jksii.2024.25.3.71
Keywords: Airport Industry, First Mover, Testbed, Customer Service, Expert Interviews, AHP Analysis -
Jiyeon Baek, Jiwon Jang, Seongmin Kim, Vol. 25, No. 3, pp. 1-8, Jun. 2024
10.7472/jksii.2024.25.3.1
Keywords: Memory Forensics, Over-The-Air (OTA), ESP32, Attack Scenario -
Kyu-min Cho, Jae-il Lee, Dong-kyoo Shin, Vol. 25, No. 1, pp. 167-176, Feb. 2024
10.7472/jksii.2024.25.1.167
Keywords: Chatbot, AI Security, Artificial intelligence, Security Requirements, implementation model, security threat analysis, security evaluation criteria




