Digital Library
Search: "[ author: Lee ]" (513)
-
31. Device Personalization Methods for Enhancing Packet Delay in Small-cells based Internet of ThingsByungBog Lee, Wang Seok Han, Se-Jin Kim, Vol. 17, No. 6, pp. 25-32, Dec. 2016
10.7472/jksii.2016.17.6.25
Keywords: Internet of Things, Small-cell, Device Personalization -
Jaeho Lee, Sukun Jin, Hyunkyung Shin, Vol. 17, No. 5, pp. 141-150, Oct. 2016
10.7472/jksii.2016.17.5.141
Keywords: ICT, Gifted Education, Core Competence, Creative Talented Persons -
Hae-sung Lee, Soon-young Kim, Jay-hoon Kim, Jeong-hwan Kim, Vol. 17, No. 5, pp. 75-88, Oct. 2016
10.7472/jksii.2016.17.5.75
Keywords: Recommender System, Recommendation, citation networks, personalized academic contents, log analysis, usage statics -
Yousra Abdul Alsahib S.Aldeen, Shaligram Prajapat, Mojtaba Raeisi Nejad Dobuneh, Noor Azeera Abdul Aziz, Jung-Gyu Lee, Muhammad Younas, Do Yeon Kim, Minjae Park, NurLiyanaSulaiman NurLiyanaSulaiman, Taghi Javdani Gandomani, Noorrezam Yusop, Isma Farah Siddiqui, Yoosin Kim, Mina Ziaei Nafchi, Seung-Ryul Jeong, MohdNaz'ri Mahrin, MohdAizainiMaarof MohdAizainiMaarof, Ashok Sharma, Dayang N.A. Jawawi, Imran Ghani, Mazleena Salleh, Hyun Ahn, Massila Kamalrudin, Scott Uk-Jin Lee, Ramjeevan Singh Thakur, Dayang Norhayati Abang Jawawi, Anazida Zainal, Kwanghoon Pio Kim, Sang Hyun Choi, Mokhtar Mohd Yusof, RasimahCheMohd Yusoff, Muhammad Murad Khan, Mohammed HazimAlkawaz, Safiah Sidek, Vol. 17, No. 5, pp. 9-16, Oct. 2016
10.7472/jksii.2016.17.5.09
Keywords: access control, Smart Environment, Semantic web, XACML, Security requirement, security attribute, mobile application development, Data-Intensive Workflow Validation, Workflow, BPM, K-anonymity, Privacy, L-diversity, data relocation, generalization, Global Agile Development, Cloud computing, Challenges, benefits, Framework, cloud-based agile tools, Regression Testing, Prioritization, Evolutionary Algorithm, Web Application, User Session, Automatic Variable Key (AVK), cryptanalysis, Hacker, AI, genetic algorithm, swarm intelligence, cipher, Neural Network, cryptography, Artificial neural Networks (ANN), Genetic Algorithm (GA), Swarm Intelligence (SI), Features Combinations, Opinion Target Extraction, Text sentiment analysis, Conditional Random Field and Sequence Labeling Algorithm, Process Diagram, Project Monitoring, Project Management, Context Diagram, Awareness, agile practices, agile software development methodology, Agile Software Development, Agile Methods, Agile Transformation, Agile Adoption, Transition Prerequisites, Agile Transition, Grounded Theory (GT) -
Jae-Shin Lee, Vol. 17, No. 4, pp. 135-144, Aug. 2016
10.7472/jksii.2016.17.4.135
Keywords: source credibility, social categorization, social identity theory, perceived usefulness, in-group, out-group -
36. A Study on the Management Capabilities Enhancement of Consignor's Personal Information ProtectionHwan-Suk Cheong, Euk-Nam Park, Sang-Joon Lee, Vol. 17, No. 4, pp. 95-114, Aug. 2016
10.7472/jksii.2016.17.4.95
Keywords: Personal Information, Personal Information Protection Act, Personal Information Protection Management System, Consignor -
Eunji Jang, Inyoung Kim, Woongjae Lee, Vol. 17, No. 4, pp. 43-50, Aug. 2016
10.7472/jksii.2016.17.4.43
Keywords: Synchronized ethernet, Automotive intelligent Network, Fault tolerant algorithm, Intelligent System -
Young Ho Lee, Yong Wan Koo, Vol. 17, No. 4, pp. 27-34, Aug. 2016
10.7472/jksii.2016.17.4.27
Keywords: Internet Address, Internet Domain, Open Domain, Dynamic System -
Young-Han Lee, Jeong-Dong Kim, Jeong-Ho Park, Vol. 17, No. 3, pp. 75-86, Jun. 2016
10.7472/jksii.2016.17.3.75
Keywords: Internet Ethics, Internet Ethics Index, Education of Internet Ethics, Common Criteria, Dual Comparisons Scale -
Tae-gyoon Lee, Jong-Seong Kim, Vol. 17, No. 3, pp. 33-44, Jun. 2016
10.7472/jksii.2016.17.3.33
Keywords: 3D-based course material, Solidworks, a combustion chamber, aviational maintenance, the exclusive viewer