• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: ARM ]" (14)
  1. 1. PredFeed Net: GRU-based feed ration prediction model for automation of feed rationing
    Kyu-jeong Sim, Su-rak Son, Yi-na Jeong, Vol. 25, No. 2, pp. 49-55, Apr. 2024
    10.7472/jksii.2024.25.2.49
    Keywords: Gated Recurrent Unit, PredFeed Net, Fish Farm
  2. 2. Efficient Time-Series Similarity Measurement and Ranking Based on Anomaly Detection
    Ji-Hyun Choi, Hyun Ahn, Vol. 25, No. 2, pp. 39-47, Apr. 2024
    10.7472/jksii.2024.25.2.39
    Keywords: Time-series Similarity, Anomaly Detection, Subsequences, Spearman’s Rank Correlation Coefficient
  3. 3. Proposal for the『Army TIGER Cyber Defense System』Installation capable of responding to future enemy cyber attack
    Byeong-jun Park, Cheol-jung Kim, Vol. 25, No. 1, pp. 157-166, Feb. 2024
    10.7472/jksii.2024.25.1.157
    Keywords: Army TIGER, Drone, robot, unmanned vehicle, AI, Cloud Center, Cyber Defense
  4. 4. Practical suggestions for development of『manned & unmanned complex combat performance plan』(drone operation)
    Cheol-jung Kim, Bo-Ram Kim, Min-Youn Kim, Jae-Seok Lim, Vol. 25, No. 1, pp. 137-146, Feb. 2024
    10.7472/jksii.2024.25.1.137
    Keywords: Army TIGER, Drone, FPV, Frequency, Perspective
  5. 5. A Research on Adversarial Example-based Passive Air Defense Method against Object Detectable AI Drone
    Simun Yuk, Hweerang Park, Taisuk Suh, Youngho Cho, Vol. 24, No. 6, pp. 119-125, Dec. 2023
    10.7472/jksii.2023.24.6.119
    Keywords: object detectable drone, AI drone, Adversarial machine learning, swarm drone, air defense, base defense
  6. 6. Development of Modular Control System Based on Closed-Loop Control for Wind Farms
    Hyunho Ji, Taehyoung Kim, Jeongtaek Lim, Kyung Sun Ham, Vol. 22, No. 6, pp. 17-24, Dec. 2021
    10.7472/jksii.2021.22.6.17
    Keywords: modular control system, Wind farm, Active power control, closed loop control
  7. 7. Analysis of Building Characteristics and Temporal Changes of Fire Alarms
  8. 8. A Task Offloading Approach using Classification and Particle Swarm Optimization
    John Cristopher A. Mateo, Jaewan Lee, Vol. 18, No. 1, pp. 1-10, Feb. 2017
    10.7472/jksii.2017.18.1.01
    Keywords: Cloudlet, Classification, Particle Swarm Optimization, Mobile Cloud Computing
  9. 9. Ant Colony Hierarchical Cluster Analysis
    Mun-Su Kang, Young-Sik Choi, Vol. 15, No. 5, pp. 95-106, Oct. 2014
    10.7472/jksii.2014.15.5.95
    Keywords: Ant-based clustering, ant-based hierarchical clustering, clustering, swarm intelligence
  10. 10. Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives
    Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
    10.7472/jksii.2014.15.3.79
    Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI