• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: ICA ]" (305)
  1. 41. Ant Colony Hierarchical Cluster Analysis
    Mun-Su Kang, Young-Sik Choi, Vol. 15, No. 5, pp. 95-106, Oct. 2014
    10.7472/jksii.2014.15.5.95
    Keywords: Ant-based clustering, ant-based hierarchical clustering, clustering, swarm intelligence
  2. 42. A Study on Grade Comparison Difference Analysis of the Gifted Children in IT
    Woochun Jun, Suk-Ki Hong, Vol. 15, No. 5, pp. 25-32, Oct. 2014
    10.7472/jksii.2014.15.5.25
    Keywords: Gifted Children in IT, Grade Difference, Programming Ability, Logical Thinking Ability
  3. 43. A Software Development Process for Mobile Applications
    Byeong Do Kang, SeungWeon Yang, Jong Seok Lee, Vol. 15, No. 4, pp. 135-140, Aug. 2014
    10.7472/jksii.2014.15.4.135
    Keywords: Mobile Application, Development Process Model, Design Method with Diagram
  4. 44. Bio-mimetic Recognition of Action Sequence using Unsupervised Learning
    Jin Ok Kim, Vol. 15, No. 4, pp. 9-20, Aug. 2014
    10.7472/jksii.2014.15.4.09
    Keywords: Action sequence detection, Categorical action classification, Bio-inspired Action perception, Unsupervised learning
  5. 45. A Framework for Making Decision on Optimal Security Investment to the Proactive and Reactive Security Solutions management
    Yoon-Ho Choi, Vol. 15, No. 3, pp. 91-100, Jun. 2014
    10.7472/jksii.2014.15.3.91
    Keywords: Decision Making, mathematical analysis, investment on security solutions, optimal security investment
  6. 46. Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives
    Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
    10.7472/jksii.2014.15.3.79
    Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI
  7. 47. Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
    10.7472/jksii.2014.15.3.31
    Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism
  8. 48. A Study on the Interactions between the Actors of the 3D Broadcasting Standardization Process
    Kyung Hee Song, Kyu Tae Kwak, Soo Kyung Park, Bong Gyou Lee, Vol. 15, No. 2, pp. 109-128, Apr. 2014
    10.7472/jksii.2014.15.2.109
    Keywords: Standardization, Actor Network Theory, Socio-Technical Interpretation, 3D Broadcasting
  9. 49. Examining the Influence of Fit between Project Radicalness and Organizational Innovativeness on the Supply Chain Integration
  10. 50. Dynamic Behavior Modelling of Augmented Objects with Haptic Interaction
    Seonho Lee, Junchul Chun, Vol. 15, No. 1, pp. 171-178, Feb. 2014
    10.7472/jksii.2014.15.1.171
    Keywords: Haptic Interaction, Physically-based Modeling, rigid object, elastically deformable model, Augmented Reality