Digital Library
Latest Publication | (Vol. 26, No. 1,
Feb.
2025)
-
Xuan Zhang, Heejung Byun, Vol. 26, No. 1, pp. 1-7, Feb. 2025
10.7472/jksii.2025.26.1.1
Keywords: , WSANs, divisive hierarchical clustering, K-means++, UAVs -
Tsagaantsooj Batzaya, Eun-bi Cho, Jeong-hyeon Chang, Kwanghoon Pio Kim, Vol. 26, No. 1, pp. 9-17, Feb. 2025
10.7472/jksii.2025.26.1.9
Keywords: CPTED, YOLO, GSV, 자연적 감시, 물리적 환경, 범죄 예방, CPTED, YOLO, GSV, Natural surveillance, Physical environment, Crime Prevention -
Hyun-Jung Park, Tae-Min Lee, Heui-Seok Lim, Vol. 26, No. 1, pp. 19-33, Feb. 2025
10.7472/jksii.2025.26.1.19
Keywords: 토픽 모델, 텍스트 마이닝, 응집도, 다양성, 1~N-그램 토픽 표현, LDA, BERTopic, Topic Model, Text Mining, Coherence, diversity, 1~N-gram Topic Representation, LDA, BERTopic -
4. Explosive Classification and Algorithm Performance Comparison Based on IMS Data in Port ContainersHyung-Tak Ju, Sae-Yong Park, Sung-Yoon Cho, Ki-Won Kwon, Tae-Ho Im, Vol. 26, No. 1, pp. 35-44, Feb. 2025
10.7472/jksii.2025.26.1.35
Keywords: 폭발물 분류, 시계열 데이터 분류, 머신러닝, explosive classification, Time series Classification, Machine Learning -
Dong-Hyun Kim, Sungyoon Cho, Kiwon Kwon, Vol. 26, No. 1, pp. 45-53, Feb. 2025
10.7472/jksii.2025.26.1.45
Keywords: 이온이동도분석법, 컨테이너, 위험화물, 마약, 폭발물, 사이클론 포집기, 지능형 검출 시스템, ion mobility spectrometry, Container, Dangerous cargo, Drug, Bomb, Cyclone Sampler, Device intelligent detection -
Yoosin Kim, Vol. 26, No. 1, pp. 55-63, Feb. 2025
10.7472/jksii.2025.26.1.55
Keywords: 공유차, 흡연탐지, 사물인터넷, 공기질센서, 기계학습, Smoking Detection, Rent-a-car, IoT, Air-Quality Sensor, Machine Learning -
Kwanghoon Pio Kim, Vol. 26, No. 1, pp. 65-77, Feb. 2025
10.7472/jksii.2025.26.1.65
Keywords: 비즈니스 프로세스 모델, 정보제어넷, 프로세스 관리 시스템, 프로세스 인텔리전스, 프로세스 이벤트-트레이스-로그 데이터세트, 프로세스 마이닝 시스템, 프로세스 데이터세트 전처리, 프로세스 패턴-클러스터링 접근방법, Business Process Models, information control nets, Process Management Systems, Process Intelligence, Process Event-Trace-Log Dataset, Process Log-Dataset Preprocessing, Process Mining, Process Pattern-Clustering Approaches -
Shao Jiawei, Liu ziyang, Vol. 26, No. 1, pp. 79-91, Feb. 2025
10.7472/jksii.2025.26.1.79
Keywords: , Augmented Reality, Flow Experience, Purchase Intentions, perceived risk, Technology Acceptance Model, S-O-R Model -
Eunsun Choi, Namje Park, Vol. 26, No. 1, pp. 93-102, Feb. 2025
10.7472/jksii.2025.26.1.93
Keywords: , information security, InfoSec Education, Public Sector, Metaverse, case study -
Feng Yi, Feng Yu, Liu Ziyang, Vol. 26, No. 1, pp. 103-115, Feb. 2025
10.7472/jksii.2025.26.1.103
Keywords: , Fresh agricultural products, Dual-pathway model (ELM), Purchasing intentions, influencing factors -
Hyun-kyoung Song, Vol. 26, No. 1, pp. 117-128, Feb. 2025
10.7472/jksii.2025.26.1.117
Keywords: 인공지능 로봇, AI 로봇, 인공지능 로봇 측정지표, 인공지능 윤리원칙, AI 윤리원칙, AI 로봇 측정지표, 위험성 측정지표, Artificial intelligence robots, AI robots, Artificial intelligence robot metrics, Artificial intelligence ethics principles, AI ethics principles, AI robot metrics, risk metrics -
JaMee Kim, Vol. 26, No. 1, pp. 129-137, Feb. 2025
10.7472/jksii.2025.26.1.129
Keywords: 정보과, 정보, 데이터의 의미, DIKW 피라미드, Informatics, information, Meaning of Data, DIKW Pyramid -
Jung-hoon Park, Jae-min Shin, Vol. 26, No. 1, pp. 139-147, Feb. 2025
10.7472/jksii.2025.26.1.139
Keywords: 메타버스, 이용자 경험, 인간-컴퓨터 상호작용, 학술정보서비스, 연구협업, 게임화, Metaverse, User eXperience, Human-Computer Interaction, Academic Information Service, Research Collaboration, Gamification -
14. Research on Network Packet Analysis and Unknown Intrusion Detection Method based on LSTM-AutoencoderHyoseong Park, Dongkyoo Shin, Dongil Shin, Vol. 26, No. 1, pp. 149-155, Feb. 2025
10.7472/jksii.2025.26.1.149
Keywords: LSTM, 오토인코더, 네트워크 침입 탐지, CIC-IDS2018, LSTM, Autoencoder, Network intrusion detection, CIC-IDS2018 -
Jihwan Oh, Se-Young Yun, Vol. 26, No. 1, pp. 157-169, Feb. 2025
10.7472/jksii.2025.26.1.157
Keywords: , decision-making, Language Model, instruction fine-tuning -
Minyoung Lee, Yun-Young Hwang, Jiseong Son, Heemin Kim, Vol. 26, No. 1, pp. 171-180, Feb. 2025
10.7472/jksii.2025.26.1.171
Keywords: 무기체계 정비, 상태기반정비, 예지정비, 고장 진단, 고장 예측, CBM+, Weapon System Maintenance, Condition Based Maintenance Plus, predictive maintenance, Diagnostic, Prognostic, CBM+ -
Ye-rin Nam, Han-seon Choi, Jong-Geun Choi, Hyuk-Jin Kwon, Young-hoon Lee, Vol. 26, No. 1, pp. 181-192, Feb. 2025
10.7472/jksii.2025.26.1.181
Keywords: 소형언어모델, 온디바이스, RAG, 지속사전학습, LoRa, 사전학습언어모델, 도메인특화, SLM(small Language Model), On-Device, RAG, Continual Pre-training, LoRa, PLM, Domain Specific -
Kunyoung Kim, Donggyu Kim, Hwiseung Son, Mye Sohn, Vol. 26, No. 1, pp. 193-202, Feb. 2025
10.7472/jksii.2025.26.1.193
Keywords: 지휘통제, AI 모델, 통합 DB, 온톨로지, 지식그래프, Command and control, AI model, Integrated DB, Ontology, Knowledge Graph -
Simun Yuk, Youngho Cho, Vol. 26, No. 1, pp. 203-209, Feb. 2025
10.7472/jksii.2025.26.1.203
Keywords: 국방분야 생성형 AI, 국방 생성형 AI, 거대언어모델, LLM, ChatGPT, Generative AI in National defense, Generative Defense AI, LLM, sLLM, ChatGPT -
Sukjoon Yoon, Cheol-gyu Yi, Jiwon Kang, Vol. 26, No. 1, pp. 211-220, Feb. 2025
10.7472/jksii.2025.26.1.211
Keywords: 우주체계, 사이버보안, K-RMF, 우주오버레이, 보안통제항목, Space system, Cyber Security, K-RMF, Space Overlays, security controls -
Janghyuk Kauh, Changmin Jeong, Koohyung Kwon, Vol. 26, No. 1, pp. 221-233, Feb. 2025
10.7472/jksii.2025.26.1.221
Keywords: 하드웨어 트로이목마, 이상행위 탐지, 전자기파 분석, 부채널 분석, FPGA, ASIC, Hardware Trojan, Anomaly Detection, Electromagnetic Analysis, Side channel analysis, FPGA, ASIC
Archives