Digital Library
Search: "[ keyword: Modeling ]" (32)
-
Ki-youn Kim, Vol. 25, No. 5, pp. 171-182, Oct. 2024
10.7472/jksii.2024.25.5.171
Keywords: Living Lab, Research Trends, LDA Topic Modeling, Semantic Network Analysis, Text Mining, Unstructured Data -
Soyon Kim, Ji Yeon Cho, Sang-Yeol Park, Bong Gyou Lee, Vol. 25, No. 4, pp. 109-119, Aug. 2024
10.7472/jksii.2024.25.4.109
Keywords: Generative AI Chatbot Service, On-Device AI, IS success model, User eXperience, LDA Topic Modeling -
Sunga Hwang, Seyeon Park, Beakcheol Jang, Vol. 25, No. 4, pp. 47-56, Aug. 2024
10.7472/jksii.2024.25.4.47
Keywords: BERT, hyperparameter fine-tuning, input sequence length, topic modeling, sentiment analysis, Korean review analysis -
Yifan Wang, Kyung Han You, Vol. 25, No. 3, pp. 55-70, Jun. 2024
10.7472/jksii.2024.25.3.55
Keywords: carbon neutrality, agenda-setting, topic modeling, concor analysis -
Soonchan Kwon, Jieun Kim, Beakcheol Jang, Vol. 25, No. 3, pp. 43-54, Jun. 2024
10.7472/jksii.2024.25.3.43
Keywords: OTT Services, Machine Learning, Text Mining, topic modeling, BERTopic, Deep Learning -
Eun Su Kim, Hyun Yoo, Kyungyong Chung, Vol. 25, No. 3, pp. 27-33, Jun. 2024
10.7472/jksii.2024.25.3.27
Keywords: Document Summarization, BART, topic modeling, LDA, Perplexity, ROUGE -
Hye-In Na, Byeong-Hee Lee, Vol. 25, No. 2, pp. 79-92, Apr. 2024
10.7472/jksii.2024.25.2.79
Keywords: ChatGPT, Reddit, Needmining, sentiment analysis, topic modeling -
Hyun-bin Kim, Jun-Chul Chun, Vol. 24, No. 1, pp. 49-59, Feb. 2023
10.7472/jksii.2023.24.1.49
Keywords: Anomaly Detection, Chest Radiograph, computer vision, Semi-supervised learning, Image Feature Modeling -
Woo-Min Nam, Keon Chul Park, Vol. 23, No. 6, pp. 79-86, Dec. 2022
10.7472/jksii.2022.23.6.79
Keywords: Smart City, Citizen Participation, Research Trend Analysis, Text Mining, topic modeling, Latent Dirchlet Allocation(LDA) -
Da-hyeon Kim, Ji-young Min, Jun-ho Ahn, Vol. 23, No. 6, pp. 27-37, Dec. 2022
10.7472/jksii.2022.23.6.27
Keywords: Virtual Private Network, STRIDE Threat Modeling, Threat Analysis, Threat Scenario, Security requirement