Digital Library
Search: "[ keyword: AI ]" (149)
-
Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
10.7472/jksii.2015.16.1.21
Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication -
12. A Weighted Frequent Graph Pattern Mining Approach considering Length-Decreasing Support ConstraintsUnil Yun, Gangin Lee, Vol. 15, No. 6, pp. 125-132, Dec. 2014
10.7472/jksii.2014.15.6.125
Keywords: Length-decreasing support constraint, weighted frequent pattern mining, graph pattern, Data Mining, Frequent pattern mining -
Sang-Hong Lee, Vol. 15, No. 3, pp. 109-116, Jun. 2014
10.7472/jksii.2014.15.3.109
Keywords: Instance Selection, Parkinson's disease, Gait, Fuzzy Neural Networks, Wavelet Transforms, Normal Distribution -
Sung-Su Hyun, Hyeon-Jin Jeong, Seoung-Sik Choi, Vol. 15, No. 3, pp. 53-62, Jun. 2014
10.7472/jksii.2014.15.3.53
Keywords: DTN Protocol, Spray and Wait Protocol, One simulator -
Dae Hong Min, Seung Ryul Jeong, Vol. 15, No. 2, pp. 95-108, Apr. 2014
10.7472/jksii.2014.15.2.95
Keywords: fit, project radicalness, organizational innovativeness, successful organizational change, supply chain integration -
Byoung-Ho Song, Kwang Jin Kim, Chang Sun Lee, Chang Gyoon Lim, Vol. 14, No. 6, pp. 33-40, Dec. 2013
10.7472/jksii.2013.14.6.33
Keywords: Intelligent Robot, Upper Limb Rehabilitation, Lower Extremities Rehabilitation, Walk Assist Robot, Wheelchair Robot -
Mi-Young Park, Hyen-Woo Seung, Yang-Mi Lim, Vol. 14, No. 3, pp. 23-34, Jun. 2013
10.7472/jksii.2013.14.3.23
Keywords: virtulaization environment, Vulnerability, risk model -
Frank I. Elijorde, Jaewan Lee, Vol. 13, No. 5, pp. 93-0, Oct. 2012
10.7472/jksii.2012.13.5.93
Keywords: Navigation System, Self-contained Localization, Car Locator, Built-in Sensors -
Sung Suk Kim, Ho Jin Choi, Vol. 13, No. 5, pp. 1-8, Oct. 2012
10.7472/jksii.2012.13.5.1
Keywords: Sequential clustering, Mountain clustering, Local clustering, Decision rule -
Cheong-Hyeon Choi, Vol. 13, No. 2, pp. 59-72, Apr. 2012
10.7472/jksii.2012.13.2.59
Keywords: Network Security, Public Key Encryption, ECC-based cryptography, identity based, Weil pairing