Digital Library
Search: "[ keyword: CAL ]" (132)
-
Jongchang Ahn, Jun Hwang, Woongjae Lee, Vol. 19, No. 1, pp. 131-140, Feb. 2018
10.7472/jksii.2018.19.1.131
Keywords: Employment impact; the 4th Industrial revolution; core technology; actualization possibility; empirical research -
Sang-Woo Hahm, Vol. 19, No. 1, pp. 113-122, Feb. 2018
10.7472/jksii.2018.19.1.113
Keywords: Creativity, authentic leadership, psychological empowerment, e-Business -
Man Young Park, Rae Woong Park, Vol. 18, No. 5, pp. 55-60, Oct. 2017
10.7472/jksii.2017.18.5.55
Keywords: Chronic Obstructive Pulmonary Disease, FVC, COPD, PFT, database, optical character recognition -
Young-Hwan Choi, Min Hong, Seung-Hyun Lee, Yoo-Joo Choi, Vol. 18, No. 3, pp. 29-36, Jun. 2017
10.7472/jksii.2017.18.3.29
Keywords: Cloth simulation, GPU parallel processing, Physically-based simulation, GLSL 4.3 -
Tae-Hoon Kim, Mye Sohn, Vol. 18, No. 2, pp. 61-74, Apr. 2017
10.7472/jksii.2017.18.2.61
Keywords: Documents Cluster Labeling, Information content, WordNet, Similarity Calculation -
Lee, Kyungroul;Yim, Kangbin;Seo, Jungtaek;, Vol. 18, No. 2, pp. 31-42, Apr. 2017
10.7472/jksii.2017.18.2.31
Keywords: Internet Banking Service, Security Techniques, Technical classification, Financial institution area, Network communication area -
Dong-ryul Kim, Jong-sub Moon, Vol. 17, No. 6, pp. 93-102, Dec. 2016
10.7472/jksii.2016.17.6.93
Keywords: Android memory protection, ptrace system call, /proc/PID/mem virtual file, Virtual memory protection, memory editor -
Jong-Hong Park, Sunho Seo, Jong-Moon Chung, Vol. 17, No. 5, pp. 1-8, Oct. 2016
10.7472/jksii.2016.17.5.01
Keywords: Complex network theory, Broadcast scheduling problem, wireless large-scale network, scale-free network -
Young-Han Lee, Jeong-Dong Kim, Jeong-Ho Park, Vol. 17, No. 3, pp. 75-86, Jun. 2016
10.7472/jksii.2016.17.3.75
Keywords: Internet Ethics, Internet Ethics Index, Education of Internet Ethics, Common Criteria, Dual Comparisons Scale -
Ji-soo Kim, Jong-sub Moon, Vol. 17, No. 3, pp. 55-66, Jun. 2016
10.7472/jksii.2016.17.3.55
Keywords: Local Storage, integrity, Confidentiality, Encrypt, Hash