Digital Library
Search: "[ keyword: CA ]" (565)
-
Min-goo Kang, Vol. 23, No. 4, pp. 65-72, Aug. 2022
10.7472/jksii.2022.23.4.65
Keywords: Passwordless security, Multi-Factor Authentication(MFA), Zero Trust, FIDO transaction, Secondary user authentication -
462. Deep Learning Based Rescue Requesters Detection Algorithm for Physical Security in Disaster SitesDa-hyeon Kim, Man-bok Park, Jun-ho Ahn, Vol. 23, No. 4, pp. 57-64, Aug. 2022
10.7472/jksii.2022.23.4.57
Keywords: Risk of building, Physical Security, Deep Learning, Disaster sites, Object Detection -
Chang-Hyeon Lee, Sung-Yoon Cho, Ki-Won Kwon, Tae-Ho Im, Vol. 23, No. 4, pp. 11-19, Aug. 2022
10.7472/jksii.2022.23.4.11
Keywords: Deep Learning, explosive classification, abnormality detection system -
Gwang-Su Lee, Vol. 23, No. 3, pp. 125-135, Jun. 2022
10.7472/jksii.2022.23.3.125
Keywords: Machine Learning, Random Forest, XGBoost, LightGBM, CatBoost, Government Statistical Indicators -
Soonju So, Seongjin Ahn, Vol. 23, No. 3, pp. 111-123, Jun. 2022
10.7472/jksii.2022.23.3.111
Keywords: Artificial intelligence, AI ethics, AI ethics Measurement indicators, Measurement indicators, Personal Rights -
Gyu-Sung Ham, Mingoo Kang, Su-Chong Joo, Vol. 23, No. 3, pp. 87-95, Jun. 2022
10.7472/jksii.2022.23.3.87
Keywords: Medical Information Platform, Automatic Authentication, Emergency Situations, Edge Computing, Big data processing, Medical Big data -
Woobin Park, Moonseong Kim, Woochan Lee, Vol. 23, No. 3, pp. 67-76, Jun. 2022
10.7472/jksii.2022.23.3.67
Keywords: Computational Electromagnetics, Finite element method, Numerical analysis, Absorbing Boundary Condition, parallelization -
468. Adaptive Window-based Detection of Narcotics and Explosives using IMS Signals in Cargo ContainersHeesong Ju, Donghyun Kim, Sungyoon Cho, Kyungwon Park, Yangsub Kim, Wongi Jeon, Kiwon Kwon, Vol. 23, No. 3, pp. 57-65, Jun. 2022
10.7472/jksii.2022.23.3.57
Keywords: narcotics and explosives, ion mobility spectrometry, cargo container, adaptive window, Detection Technique -
Cheong-Hyeon Choi, Vol. 23, No. 3, pp. 21-33, Jun. 2022
10.7472/jksii.2022.23.3.21
Keywords: Shamir Threshold Secret Sharing; Schnorr Encryption Scheme; Collaborative Threshold Authentication -
Soosun Cho, Vol. 23, No. 2, pp. 107-114, Apr. 2022
10.7472/jksii.2022.23.2.107
Keywords: Self-evaluation, Peer-evaluation, Academic Achievement, Team-based Instruction, Computer Engineering Education