Digital Library
Search: "[ keyword: RAG ]" (18)
-
Dongkuk Kim, Yeonjun Choi, Beakcheol Jang, Vol. 26, No. 4, pp. 79-88, Aug. 2025
10.7472/jksii.2025.26.4.79
Keywords: Time Series Forecasting, Large Language Model (LLM), COVID-19, RAG, Natural language-based time series forecasting -
JaeHwan Kwon, JuHo Bai, Gwang-Yong Gim, Vol. 26, No. 3, pp. 135-144, Jun. 2025
10.7472/jksii.2025.26.3.135
Keywords: Retrieval Augmented Generation(RAG), Large Language Model(LLM) Agent, Security Guide, Security Intelligence -
Ye-rin Nam, Han-seon Choi, Jong-Geun Choi, Hyuk-Jin Kwon, Young-hoon Lee, Vol. 26, No. 1, pp. 181-192, Feb. 2025
10.7472/jksii.2025.26.1.181
Keywords: SLM(small Language Model), On-Device, RAG, Continual Pre-training, LoRa, PLM, Domain Specific -
Byungkyoo Kim, Vol. 23, No. 3, pp. 137-145, Jun. 2022
10.7472/jksii.2022.23.3.137
Keywords: Network, ammunition, logistics, smart, Ammunition Storage -
Hanseong Lee, Hyung-WooLee, Vol. 21, No. 3, pp. 93-102, Jun. 2020
10.7472/jksii.2020.21.3.93
Keywords: File Carving, Smart Carving, File System, Block, Fragmentation, Forgery Analysis, Digital Forensics. -
6. A Study on Complexity Analysis of Extensible Profile Verification Software for Energy Storage SystemHyeokyoung Kwon, Youngsu Ryu, Jaehong Park, Kiwon Kwon, Vol. 17, No. 5, pp. 59-66, Oct. 2016
10.7472/jksii.2016.17.5.59
Keywords: Energy Storage System, Verification Software, Time Complexity, Space Complexity, Cyclomatic Complexity -
Ji-soo Kim, Jong-sub Moon, Vol. 17, No. 3, pp. 55-66, Jun. 2016
10.7472/jksii.2016.17.3.55
Keywords: Local Storage, integrity, Confidentiality, Encrypt, Hash -
Sungwook Kang, Jungsun Choi, Jaeyoung Choi, Vol. 17, No. 2, pp. 1-10, Apr. 2016
10.7472/jksii.2016.17.2.01
Keywords: Cloud Storage, SQL Server, Network disk sharing, Amazon EC2, Amazon EBS -
Yongje Woo, Jaehong Park, Mingoo Kang, Kiwon Kwon, Vol. 16, No. 5, pp. 29-38, Oct. 2015
10.7472/jksii.2015.16.5.29
Keywords: Energy Storage System, PCS, BMS, Private framework, Profile -
XiaoChun Yin, Non Thiranant, HoonJae Lee, Vol. 15, No. 2, pp. 49-58, Apr. 2014
10.7472/jksii.2014.15.2.49
Keywords: Secured data storage, Cloud computing, ECC