• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CTI ]" (358)
  1. 1. Malware Application Classification based on Feature Extraction and Machine Learning for Malicious Behavior Analysis in Android Platform
  2. 2. Performance Analysis of Fractional Frequency Reuse Scheme for Enterprise Femtocell Networks
    Se-Jin Kim, Vol. 19, No. 1, pp. 11-17, Feb. 2018
    10.7472/jksii.2018.19.1.11
    Keywords: Femtocell networks, Enterprise, Fractional frequency reuse, resource management
  3. 3. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
    Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
    10.7472/jksii.2018.19.1.1
    Keywords: LDA, network threat detection, Intrusion Detection System, signature
  4. 4. Construction of an PFT database with various clinical information using optical character recognition and regular expression technique
    Man Young Park, Rae Woong Park, Vol. 18, No. 5, pp. 55-60, Oct. 2017
    10.7472/jksii.2017.18.5.55
    Keywords: Chronic Obstructive Pulmonary Disease, FVC, COPD, PFT, database, optical character recognition
  5. 5. Method for Structural Vanishing Point Detection Using Orthogonality on Single Image
    Sung-Gi Jung, Chang-Hyung Lee, Hyung-Il Choi, Vol. 18, No. 5, pp. 39-46, Oct. 2017
    10.7472/jksii.2017.18.5.39
    Keywords: Vanishing Point Detection, Vanishing lines, Spatial Layout
  6. 6. Grid-based Trajectory Cloaking Method for protecting Trajectory privacy in Location-based Services
    Ji-hye Youn, Doo-hee Song, Tian-yuan Cai, Kwang-jin Park, Vol. 18, No. 5, pp. 31-38, Oct. 2017
    10.7472/jksii.2017.18.5.31
    Keywords: Location-Based Services, Trajectory information protection, cloaking, Random query
  7. 7. Efficient dummy generation for protecting location privacy in location based services
    Tian-yuan Cai, Ji-hye Youn, Doo-hee Song, Kwang-jin Park, Vol. 18, No. 5, pp. 23-30, Oct. 2017
    10.7472/jksii.2017.18.5.23
    Keywords: cloaked region, dummy, K-anonymity, location protection, Privacy
  8. 8. A Robust Object Detection and Tracking Method using RGB-D Model
    Park, Seohee;Chun, Junchul;, Vol. 18, No. 4, pp. 61-68, Aug. 2017
    10.7472/jksii.2017.18.4.61
    Keywords: 3D CCTV, video surveillance, Object Detection, object tracking, Depth Map, Image Segmentation
  9. 9. Design and Implementation of Interactive Game based on Embedded System
    Woosik Lee, Hoejung Jung, Hojin Heo, Namgi Kim, Vol. 18, No. 4, pp. 43-50, Aug. 2017
    10.7472/jksii.2017.18.4.43
    Keywords: Embedded System, Arduino, Android, Interactive Game, Mobile Game
  10. 10. Effects of Informal Communication and Mindfulness Practice on the Non-Class-Related Behavior in the Team-Based Learning using Smartwork Tool: Focusing on Mediating Effects of Perceived Self-Efficacy
    Jong Man Lee, Vol. 18, No. 3, pp. 63-70, Jun. 2017
    10.7472/jksii.2017.18.3.63
    Keywords: Team-Based Learning, Perceived Self-Efficacy, Informal Communication, Mindfulness Practice