• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: ICA ]" (305)
  1. 31. Design and Analysis of Educational Java Applets for Learning Simplification Procedure Using Karnaugh Map
  2. 32. A NFC-based Business Card Management System for Secure Many-to-many Communication
    Kyoung-ah Ko, Hee-eun Seo, Yunyoung Nam, Vol. 16, No. 3, pp. 13-20, Jun. 2015
    10.7472/jksii.2015.16.3.13
    Keywords: Near Field Communication(NFC), Business Card, multi-to-multi, one-to-multi
  3. 33. Design and Implementation of Medical Information System using QR Code
    Sung-Gwon Lee, Chang-Won Jeong, Su-Chong Joo, Vol. 16, No. 2, pp. 109-116, Apr. 2015
    10.7472/jksii.2015.16.2.109
    Keywords: QR code, Medical System, Medical image information, Bio-signal, Integration image file scheme
  4. 34. Labor market forecasts for Information and communication construction business
    Jeong Ho Kwak, Tae Hee Kwun, Dong-Suk Oh, Jung-Woo Kim, Vol. 16, No. 2, pp. 99-108, Apr. 2015
    10.7472/jksii.2015.16.2.99
    Keywords: information and communication construction business, Labor market forecast, ARIMA
  5. 35. Implementation of EPCIS Capturing Application for Finished Goods Trace History in EPC Network
    Jinsuk Kim, Yongtae Shin, Vol. 16, No. 2, pp. 19-26, Apr. 2015
    10.7472/jksii.2015.16.2.19
    Keywords: EPC, Capturing Application, Middleware, RFID, Trace
  6. 36. Factors of Leading the Adoption of Diet/Exercise Apps on Smartphones: Application of Channel Expansion Theory
  7. 37. Medical Information Dynamic Access System in Smart Mobile Environments
  8. 38. An Automatic Mobile Cell Counting System for the Analysis of Biological Image
    Jaejoon Seo, Junchul Chun, Jin-Sung Lee, Vol. 16, No. 1, pp. 39-46, Feb. 2015
    10.7472/jksii.2015.16.1.39
    Keywords: automatic cell counting, cell segmentation, morphological operation, watershed algorithm, HSV Color Model
  9. 39. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
    Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
    10.7472/jksii.2015.16.1.21
    Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication
  10. 40. A Method for Dynamic Clustering-based Efficient Management in Large-Scale IoT Environment
    Dae Young Kim, Hyun Jung La, Vol. 15, No. 6, pp. 85-98, Dec. 2014
    10.7472/jksii.2014.15.6.85
    Keywords: IoT, Dynamic Clustering, Hierarchical Algorithm, Optimization, IoT Computing Environment