• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CAL ]" (129)
  1. 21. An Automatic Mobile Cell Counting System for the Analysis of Biological Image
    Jaejoon Seo, Junchul Chun, Jin-Sung Lee, Vol. 16, No. 1, pp. 39-46, Feb. 2015
    10.7472/jksii.2015.16.1.39
    Keywords: automatic cell counting, cell segmentation, morphological operation, watershed algorithm, HSV Color Model
  2. 22. A Method for Dynamic Clustering-based Efficient Management in Large-Scale IoT Environment
    Dae Young Kim, Hyun Jung La, Vol. 15, No. 6, pp. 85-98, Dec. 2014
    10.7472/jksii.2014.15.6.85
    Keywords: IoT, Dynamic Clustering, Hierarchical Algorithm, Optimization, IoT Computing Environment
  3. 23. Ant Colony Hierarchical Cluster Analysis
    Mun-Su Kang, Young-Sik Choi, Vol. 15, No. 5, pp. 95-106, Oct. 2014
    10.7472/jksii.2014.15.5.95
    Keywords: Ant-based clustering, ant-based hierarchical clustering, clustering, swarm intelligence
  4. 24. A Study on Grade Comparison Difference Analysis of the Gifted Children in IT
    Woochun Jun, Suk-Ki Hong, Vol. 15, No. 5, pp. 25-32, Oct. 2014
    10.7472/jksii.2014.15.5.25
    Keywords: Gifted Children in IT, Grade Difference, Programming Ability, Logical Thinking Ability
  5. 25. Bio-mimetic Recognition of Action Sequence using Unsupervised Learning
    Jin Ok Kim, Vol. 15, No. 4, pp. 9-20, Aug. 2014
    10.7472/jksii.2014.15.4.09
    Keywords: Action sequence detection, Categorical action classification, Bio-inspired Action perception, Unsupervised learning
  6. 26. Analysis and Evaluation of Frequent Pattern Mining Technique based on Landmark Window
    Gwangbum Pyun, Unil Yun, Vol. 15, No. 3, pp. 101-108, Jun. 2014
    10.7472/jksii.2014.15.3.101
    Keywords: Landmark Window, Frequent pattern mining, Online mining, Performance Evaluation, scalability
  7. 27. A Framework for Making Decision on Optimal Security Investment to the Proactive and Reactive Security Solutions management
    Yoon-Ho Choi, Vol. 15, No. 3, pp. 91-100, Jun. 2014
    10.7472/jksii.2014.15.3.91
    Keywords: Decision Making, mathematical analysis, investment on security solutions, optimal security investment
  8. 28. Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
    10.7472/jksii.2014.15.3.31
    Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism
  9. 29. A Study on the Interactions between the Actors of the 3D Broadcasting Standardization Process
    Kyung Hee Song, Kyu Tae Kwak, Soo Kyung Park, Bong Gyou Lee, Vol. 15, No. 2, pp. 109-128, Apr. 2014
    10.7472/jksii.2014.15.2.109
    Keywords: Standardization, Actor Network Theory, Socio-Technical Interpretation, 3D Broadcasting
  10. 30. Examining the Influence of Fit between Project Radicalness and Organizational Innovativeness on the Supply Chain Integration