• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CA ]" (582)
  1. 1. A Study on the Characteristics of a series of Autoencoder for Recognizing Numbers used in CAPTCHA
    Jae-seung Jeon, Jong-sub Moon, Vol. 18, No. 6, pp. 25-34, Dec. 2017
    10.7472/jksii.2017.18.6.25
    Keywords: CAPTCHA, Autoencoder, Stacked autoencoder, Denoising, SOFTMAX
  2. 2. A Study on Rational Improvement of the Gift Regulation in the Telecommunications Market
    Yong-Beom Kim, Jeong Ho Kwak, Vol. 18, No. 6, pp. 137-144, Dec. 2017
    10.7472/jksii.2017.18.6.137
    Keywords: Bundled Products, Gift Regulation, Significant Market Power(SMP), Big data
  3. 3. Dynamic Subchannel Grouping Algorithm using Local Gateways for Enterprise Small-cell
    Se-Jin Kim, Vol. 18, No. 6, pp. 7-13, Dec. 2017
    10.7472/jksii.2017.18.6.7
    Keywords: Small-cell networks, Enterprise, Local gateway, dynamic, Subchannel grouping
  4. 4. Establishing Best Power Transmission Path using Receiver Based on the Received Signal Strength
  5. 5. A Classification Model for Attack Mail Detection based on the Authorship Analysis
    Sung-Sam Hong, Gun-Yoon Shin, Myung-Mook Han, Vol. 18, No. 6, pp. 35-46, Dec. 2017
    10.7472/jksii.2017.18.6.35
    Keywords: Text Mining, Machine Learning, Classification, Authorship Analysis, Attacker Identification
  6. 6. A Trusted Sharing Model for Patient Records based on Permissioned Blockchain
    Kyoung-jin Kim, Seng-phil Hong, Vol. 18, No. 6, pp. 75-84, Dec. 2017
    10.7472/jksii.2017.18.6.75
    Keywords: Permissioned blockchain, role-based access control, Medical data
  7. 7. A Method for Body Keypoint Localization based on Object Detection using the RGB-D information
  8. 8. Efficient dummy generation for protecting location privacy in location based services
    Tian-yuan Cai, Ji-hye Youn, Doo-hee Song, Kwang-jin Park, Vol. 18, No. 5, pp. 23-30, Oct. 2017
    10.7472/jksii.2017.18.5.23
    Keywords: cloaked region, dummy, K-anonymity, location protection, Privacy
  9. 9. Grid-based Trajectory Cloaking Method for protecting Trajectory privacy in Location-based Services
    Ji-hye Youn, Doo-hee Song, Tian-yuan Cai, Kwang-jin Park, Vol. 18, No. 5, pp. 31-38, Oct. 2017
    10.7472/jksii.2017.18.5.31
    Keywords: Location-Based Services, Trajectory information protection, cloaking, Random query
  10. 10. Construction of an PFT database with various clinical information using optical character recognition and regular expression technique
    Man Young Park, Rae Woong Park, Vol. 18, No. 5, pp. 55-60, Oct. 2017
    10.7472/jksii.2017.18.5.55
    Keywords: Chronic Obstructive Pulmonary Disease, FVC, COPD, PFT, database, optical character recognition