Digital Library
Search: "[ keyword: process ]" (88)
-
Hyun Ahn, Kwanghoon Pio Kim, Vol. 17, No. 4, pp. 69-78, Aug. 2016
10.7472/jksii.2016.17.4.69
Keywords: Business Process Management, Visual Analytics, Business Process Performer, Work-Sharing Relationship, Treemap -
Young-Won Seo, Chang-soo Kim, Vol. 16, No. 6, pp. 23-30, Dec. 2015
10.7472/jksii.2015.16.6.23
Keywords: SData Mining, Frequent-Pattern tree, Clustering Algorithms, Distributed Processing System, Recommendation System, Map Reduce -
Chun Woo Park, Soo Dong Kim, Vol. 16, No. 5, pp. 75-86, Oct. 2015
10.7472/jksii.2015.16.5.75
Keywords: Internet of Things (IoT), IoT Computing Environment, IoT Fault, Fault Management Process, Fault Management Method -
Yong-ho Sim, Wun-gyu Gil, Seo-kyun Kim, Vol. 16, No. 4, pp. 121-130, Aug. 2015
10.7472/jksii.2015.16.4.121
Keywords: Start-up, Technology based startup, Regulation improvement, Policy Priority, Information and communications technology(ICT), Creative Economy, AHP(Analytic Hierarchy Process) -
Young-Hwan Choi, Hongrae Kim, Min Hong, Vol. 16, No. 2, pp. 49-56, Apr. 2015
10.7472/jksii.2015.16.2.49
Keywords: image processing, lane detection, android NDK, Smartphone, Road luminance measurement, GPS sensor -
Okkyung Choi, Wooyeol Jung, Bong Gyou Lee, Seungbin Moon, Vol. 15, No. 1, pp. 55-62, Feb. 2014
10.7472/jksii.2014.15.1.55
Keywords: Mobile Cloud Computing, Human-friendly Robot Service, User Authentication, Big Data Processing Technology, Log-data Analysis -
Bo-yoon Choi, Byong-gul Lee, Vol. 26, No. 3, pp. 121-133, Jun. 2025
10.7472/jksii.2025.26.3.121
Keywords: Drone, safety assessment, Hazard analysis, Fault Tree Analysis (FTA), System-Theoretic Process Analysis (STPA) -
Dachan Jung, Dinh-Lam Pham, Kwanghoon Pio Kim, Vol. 26, No. 2, pp. 33-42, Apr. 2025
10.7472/jksii.2025.26.2.33
Keywords: XES, Process Mining, log visualization, trace animation -
Kwanghoon Pio Kim, Vol. 26, No. 1, pp. 65-77, Feb. 2025
10.7472/jksii.2025.26.1.65
Keywords: Business Process Models, information control nets, Process Management Systems, Process Intelligence, Process Event-Trace-Log Dataset, Process Log-Dataset Preprocessing, Process Mining, Process Pattern-Clustering Approaches -
Hoon Shin, Jaeyeong Jeong, Kyu-min Cho, Jae-il Lee, Dong-kyoo Shin, Vol. 25, No. 6, pp. 131-145, Dec. 2024
10.7472/jksii.2024.25.6.131
Keywords: AI Security, Artificial intelligence, Machine Learning, Deep Learning, CNN, DDoS, DrDoS, image processing, Image Classification