• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: AI ]" (149)
  1. 11. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
    Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
    10.7472/jksii.2015.16.1.21
    Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication
  2. 12. A Weighted Frequent Graph Pattern Mining Approach considering Length-Decreasing Support Constraints
    Unil Yun, Gangin Lee, Vol. 15, No. 6, pp. 125-132, Dec. 2014
    10.7472/jksii.2014.15.6.125
    Keywords: Length-decreasing support constraint, weighted frequent pattern mining, graph pattern, Data Mining, Frequent pattern mining
  3. 13. Classification of Parkinson's Disease Using Defuzzification-Based Instance Selection
    Sang-Hong Lee, Vol. 15, No. 3, pp. 109-116, Jun. 2014
    10.7472/jksii.2014.15.3.109
    Keywords: Instance Selection, Parkinson's disease, Gait, Fuzzy Neural Networks, Wavelet Transforms, Normal Distribution
  4. 14. Hybrid Spray and Wait Routing Protocol in DTN
    Sung-Su Hyun, Hyeon-Jin Jeong, Seoung-Sik Choi, Vol. 15, No. 3, pp. 53-62, Jun. 2014
    10.7472/jksii.2014.15.3.53
    Keywords: DTN Protocol, Spray and Wait Protocol, One simulator
  5. 15. Examining the Influence of Fit between Project Radicalness and Organizational Innovativeness on the Supply Chain Integration
  6. 16. Joint Angles Analysis of Intelligent upper limb and lower extremities Wheelchair Robot System
  7. 17. The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization
    Mi-Young Park, Hyen-Woo Seung, Yang-Mi Lim, Vol. 14, No. 3, pp. 23-34, Jun. 2013
    10.7472/jksii.2013.14.3.23
    Keywords: virtulaization environment, Vulnerability, risk model
  8. 18. Infrastructure-independent Navigation System Using Embedded Map and Built-in Sensors in the Ubiquitous Parking Management
    Frank I. Elijorde, Jaewan Lee, Vol. 13, No. 5, pp. 93-0, Oct. 2012
    10.7472/jksii.2012.13.5.93
    Keywords: Navigation System, Self-contained Localization, Car Locator, Built-in Sensors
  9. 19. New Sequential Clustering Combination for Rule Generation System
    Sung Suk Kim, Ho Jin Choi, Vol. 13, No. 5, pp. 1-8, Oct. 2012
    10.7472/jksii.2012.13.5.1
    Keywords: Sequential clustering, Mountain clustering, Local clustering, Decision rule
  10. 20. Study on Improvement of Weil Pairing IBE for Secret Document Distribution
    Cheong-Hyeon Choi, Vol. 13, No. 2, pp. 59-72, Apr. 2012
    10.7472/jksii.2012.13.2.59
    Keywords: Network Security, Public Key Encryption, ECC-based cryptography, identity based, Weil pairing