• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ author: Yun ]" (489)
  1. 451. LSTM-based Business Process Remaining Time Prediction Model Featured in Activity-centric Normalization Techniques
    Seong-Hun Ham, Hyun Ahn, Kwanghoon Pio Kim, Vol. 21, No. 3, pp. 83-92, Jun. 2020
    10.7472/jksii.2020.21.3.83
    Keywords: predictive process monitoring, remaining time prediction, LSTM model, Deep Learning, Process Mining
  2. 452. Analysis on the Ripple and Investment Effect of Digital Bio-Healthcare Industry : Using Input-Output Tables 2019
  3. 453. Temporal Analysis of Opinion Manipulation Tactics in Online Communities
    Sihyung Lee, Vol. 21, No. 3, pp. 29-39, Jun. 2020
    10.7472/jksii.2020.21.3.29
    Keywords: Opinion Manipulation, online communities, Temporal Analysis, clustering
  4. 454. Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users
    Seonjin Hwang, DongHyun Ko, Taeu Bahk, Yoon-ho Choi, Vol. 21, No. 3, pp. 1-9, Jun. 2020
    10.7472/jksii.2020.21.3.1
    Keywords: blockchain platform, Privacy, Blockchain Securicy, Ethereum
  5. 455. Adaptive Control Technique for the Random Access Channel in DVB-RCS2 based Next Generation Military Satellite Networks
    WonKyun Lee, Dae-Hee Jang, Jong-Moon Chung, Vol. 21, No. 2, pp. 99-108, Apr. 2020
    10.7472/jksii.2020.21.2.99
    Keywords: Emergency Preparation, Future War, Satellite, RAMA, CRDSA, RA Channel, CRDSA2R
  6. 456. Recent Technique Analysis, Infant Commodity Pattern Analysis Scenario and Performance Analysis of Incremental Weighted Maximal Representative Pattern Mining
    Unil Yun, Eunmi Yun, Vol. 21, No. 2, pp. 39-48, Apr. 2020
    10.7472/jksii.2020.21.2.39
    Keywords: Weighted maximal pattern mining, Incremental mining, Representative pattern, Application scenario, Performance Evaluation
  7. 457. Impact of the human body in wireless propagation of medical implants for tumor detection
  8. 458. A study on counting number of passengers by moving object detection
    Sang-Hyun Yoo, Vol. 21, No. 2, pp. 9-18, Apr. 2020
    10.7472/jksii.2020.21.2.9
    Keywords: Moving object detection, Object Contours Detection, Bus Passenger Counting
  9. 459. The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification
    Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
    10.7472/jksii.2020.21.2.1
    Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering
  10. 460. A study on the Application of Effects-based Operation in Cyberspace
    Won-gu Jang, Kyun-ho Lee, Vol. 21, No. 1, pp. 221-230, Feb. 2020
    10.7472/jksii.2020.21.1.221
    Keywords: Effects-based Operation, Cyberspace, Cyber Attack, Five Strategic Rings Model, Parallel Warfare