• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CAL ]" (132)
  1. 1. An empirical study on the employment impact of the Fourth Industrial Revolution
  2. 2. Roles of Authentic Leadership, Psychological Empowerment and Intrinsic Motivation on Workers’ Creativity in e-business
    Sang-Woo Hahm, Vol. 19, No. 1, pp. 113-122, Feb. 2018
    10.7472/jksii.2018.19.1.113
    Keywords: Creativity, authentic leadership, psychological empowerment, e-Business
  3. 3. Construction of an PFT database with various clinical information using optical character recognition and regular expression technique
    Man Young Park, Rae Woong Park, Vol. 18, No. 5, pp. 55-60, Oct. 2017
    10.7472/jksii.2017.18.5.55
    Keywords: Chronic Obstructive Pulmonary Disease, FVC, COPD, PFT, database, optical character recognition
  4. 4. The Performance Analysis of GPU-based Cloth simulation according to the Change of Work Group Configuration
    Young-Hwan Choi, Min Hong, Seung-Hyun Lee, Yoo-Joo Choi, Vol. 18, No. 3, pp. 29-36, Jun. 2017
    10.7472/jksii.2017.18.3.29
    Keywords: Cloth simulation, GPU parallel processing, Physically-based simulation, GLSL 4.3
  5. 5. Representative Labels Selection Technique for Document Cluster using WordNet
    Tae-Hoon Kim, Mye Sohn, Vol. 18, No. 2, pp. 61-74, Apr. 2017
    10.7472/jksii.2017.18.2.61
    Keywords: Documents Cluster Labeling, Information content, WordNet, Similarity Calculation
  6. 6. Status and Future of Security Techniques in the Internet Banking Service
  7. 7. A memory protection method for application programs on the Android operating system
  8. 8. Broadcast Scheduling for Wireless Networks Based on Theory of Complex Networks
  9. 9. A Study on Development of Common Criteria for Evaluation of Internet Ethics Index
  10. 10. A Study on Data Security of Web Local Storage
    Ji-soo Kim, Jong-sub Moon, Vol. 17, No. 3, pp. 55-66, Jun. 2016
    10.7472/jksii.2016.17.3.55
    Keywords: Local Storage, integrity, Confidentiality, Encrypt, Hash