• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Detect ]" (104)
  1. 1. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
    Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
    10.7472/jksii.2018.19.1.1
    Keywords: LDA, network threat detection, Intrusion Detection System, signature
  2. 2. Method for Structural Vanishing Point Detection Using Orthogonality on Single Image
    Sung-Gi Jung, Chang-Hyung Lee, Hyung-Il Choi, Vol. 18, No. 5, pp. 39-46, Oct. 2017
    10.7472/jksii.2017.18.5.39
    Keywords: Vanishing Point Detection, Vanishing lines, Spatial Layout
  3. 3. A Robust Object Detection and Tracking Method using RGB-D Model
    Park, Seohee;Chun, Junchul;, Vol. 18, No. 4, pp. 61-68, Aug. 2017
    10.7472/jksii.2017.18.4.61
    Keywords: 3D CCTV, video surveillance, Object Detection, object tracking, Depth Map, Image Segmentation
  4. 4. Enhancement of Fall-Detection Rate using Frequency Spectrum Pattern Matching
  5. 5. A Detection Model using Labeling based on Inference and Unsupervised Learning Method
  6. 6. Inside Wall Frame Detection Method Based on Single Image
  7. 7. Event Detection System Using Twitter Data
    Tae Soo Park, Ok-Ran Jeong, Vol. 17, No. 6, pp. 153-0, Dec. 2016
    10.7472/jksii.2016.17.6.153
    Keywords: Event Detection, Social Network, Social Media Contents
  8. 8. A Rogue AP Detection Method Based on DHCP Snooping
    Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
    10.7472/jksii.2016.17.3.11
    Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping
  9. 9. BoF based Action Recognition using Spatio-Temporal 2D Descriptor
    JinOk KIM, Vol. 16, No. 3, pp. 21-32, Jun. 2015
    10.7472/jksii.2015.16.3.21
    Keywords: Action Recognition, BoF(Bag of Features), Spatio-temporal Action Detector, Feature Descriptor
  10. 10. An Illegally-copied App Detecting Method by Using Odex File in Android Platform
    Dueckyoun Cho, Jaeyoung Choi, Eunhoe Kim, Gi-Du Gang, Vol. 16, No. 2, pp. 67-76, Apr. 2015
    10.7472/jksii.2015.16.2.67
    Keywords: illegally-copied app, detector, android platform, execution hiding, odex file