Digital Library
Search: "[ keyword: Detection ]" (99)
-
Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
10.7472/jksii.2018.19.1.1
Keywords: LDA, network threat detection, Intrusion Detection System, signature -
Sung-Gi Jung, Chang-Hyung Lee, Hyung-Il Choi, Vol. 18, No. 5, pp. 39-46, Oct. 2017
10.7472/jksii.2017.18.5.39
Keywords: Vanishing Point Detection, Vanishing lines, Spatial Layout -
Park, Seohee;Chun, Junchul;, Vol. 18, No. 4, pp. 61-68, Aug. 2017
10.7472/jksii.2017.18.4.61
Keywords: 3D CCTV, video surveillance, Object Detection, object tracking, Depth Map, Image Segmentation -
Suhwan Lee, Hanif Bhuiyan, Dongik Oh, Kyeong-Jin Oh, Yunyoung Nam, Myung-Duk Hong, Geun-Sik Jo, Vol. 18, No. 3, pp. 11-18, Jun. 2017
10.7472/jksii.2017.18.3.11
Keywords: Fall Detection, Acceleration measurement, Frequency spectrum, Pattern matching, Wikipedia, Semantic relation, Identification, Infobox Template, Information Extraction, Semi-structured data -
Sung-Sam Hong, Dong-Wook Kim, Byungik Kim, Myung-Mook Han, Vol. 18, No. 1, pp. 65-76, Feb. 2017
10.7472/jksii.2017.18.1.65
Keywords: Labeling, Detection Model based on classification, Data Mining, Inference, Supervised/Unsupervised Learning, Security -
Do-Wook Jeong, Sung-Gi Jung, Hyung-Il Choi, Vol. 18, No. 1, pp. 43-50, Feb. 2017
10.7472/jksii.2017.18.1.43
Keywords: inside wall frame detection, vanishing points detection, tree based learning, superpixel segmentation -
Tae Soo Park, Ok-Ran Jeong, Vol. 17, No. 6, pp. 153-0, Dec. 2016
10.7472/jksii.2016.17.6.153
Keywords: Event Detection, Social Network, Social Media Contents -
Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
10.7472/jksii.2016.17.3.11
Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping -
Young-Hwan Choi, Hongrae Kim, Min Hong, Vol. 16, No. 2, pp. 49-56, Apr. 2015
10.7472/jksii.2015.16.2.49
Keywords: image processing, lane detection, android NDK, Smartphone, Road luminance measurement, GPS sensor -
Hyeonwoo Kim, Dongwoo Kwon, Hongtaek Ju, Vol. 16, No. 2, pp. 27-40, Apr. 2015
10.7472/jksii.2015.16.2.27
Keywords: Stateless Firewall, Policy Inference, Attack Detection Threshold, Active Probing, Inference Parameters, Sweep-line Algorithm