• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 모델 ]" (105)
  1. 11. Control-Path Driven Process-Group Discovery Framework and its Experimental Validation for Process Mining and Reengineering
  2. 12. A Study on Efficient AI Model Drift Detection Methods for MLOps
    Ye-eun Lee, Tae-jin Lee, Vol. 24, No. 5, pp. 17-27, Oct. 2023
    10.7472/jksii.2023.24.5.17
    Keywords: Artificail Inteligence, Machine Learning Model, Drift Detection, XAI, MLOps
  3. 13. TGC-based Fish Growth Estimation Model using Gaussian Process Regression Approach
  4. 14. A Method for Region-Specific Anomaly Detection on Patch-wise Segmented PA Chest Radiograph
    Hyun-bin Kim, Jun-Chul Chun, Vol. 24, No. 1, pp. 49-59, Feb. 2023
    10.7472/jksii.2023.24.1.49
    Keywords: Anomaly Detection, Chest Radiograph, computer vision, Semi-supervised learning, Image Feature Modeling
  5. 15. AI-based Cybersecurity Solution for Industrial Control System
    Bu-Seong Jo, Mun-Suk Kim, Vol. 23, No. 6, pp. 97-105, Dec. 2022
    10.7472/jksii.2022.23.6.97
    Keywords: ICS, AI, IDS, Data Collection, Model Evaluation
  6. 16. The Case Study for Childcare Service Demand Forecasting Using Bigdata Reference Analysis Model
    Chung-Sik Yun, Seung Ryul Jeong, Vol. 23, No. 6, pp. 87-96, Dec. 2022
    10.7472/jksii.2022.23.6.87
    Keywords: BigData, Reference Analysis Model, Effectiveness
  7. 17. Civic Participation in Smart City : A Role and Direction
  8. 18. Comparative Analysis and Implications of Command and Control(C2)-related Information Exchange Models
    Kunyoung Kim, Gyudong Park, Mye Sohn, Vol. 23, No. 6, pp. 59-69, Dec. 2022
    10.7472/jksii.2022.23.6.59
    Keywords: Command and Control(C2), interoperability, Information Exchange Model, database, XML schema
  9. 19. Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling
    Da-hyeon Kim, Ji-young Min, Jun-ho Ahn, Vol. 23, No. 6, pp. 27-37, Dec. 2022
    10.7472/jksii.2022.23.6.27
    Keywords: Virtual Private Network, STRIDE Threat Modeling, Threat Analysis, Threat Scenario, Security requirement
  10. 20. Efficient distributed consensus optimization based on patterns and groups for federated learning
    Seung Ju Kang, Ji Young Chun, Geontae Noh, Ik Rae Jeong, Vol. 23, No. 4, pp. 73-85, Aug. 2022
    10.7472/jksii.2022.23.4.73
    Keywords: Federated learning, Optimization, Weight model, Communication time, Privacy, ADMM