Digital Library
Search: "[ keyword: SI ]" (564)
-
Nak-Jun Sung, Yoo-Joo Choi, Min Hong, Vol. 17, No. 4, pp. 35-42, Aug. 2016
10.7472/jksii.2016.17.4.35
Keywords: Deformable Object Simulation, Augmented Reality -
AL-Harbi Fahad Jazi, Naghmeh Niknejad, Kangseok kim, Imran Ghani, Jai-Hoon Kim, Ab Razak Che Hussin, Seung Ryul Jeong, Vol. 17, No. 4, pp. 1-10, Aug. 2016
10.7472/jksii.2016.17.4.01
Keywords: Distributed Shared Memory, fault-tolerant, consistency, Reliability, data replication, Service-Oriented Architecture, SOA adoption, TOE Framework, Significant Factors, Effective Factors -
MoonJi Kim, EunJeong Song, YoonHee Kim, Vol. 17, No. 3, pp. 107-114, Jun. 2016
10.7472/jksii.2016.17.3.107
Keywords: Opinion mining, Satisfaction Analysis, Hadoop, Online Review -
Woo-chun Jun, Vol. 17, No. 3, pp. 87-94, Jun. 2016
10.7472/jksii.2016.17.3.87
Keywords: Gifted Children in IT, Observation-Recommendation, Admission System, Gifted Children in Math, Gifted Children in Science -
Tae-gyoon Lee, Jong-Seong Kim, Vol. 17, No. 3, pp. 33-44, Jun. 2016
10.7472/jksii.2016.17.3.33
Keywords: 3D-based course material, Solidworks, a combustion chamber, aviational maintenance, the exclusive viewer -
Namyong Kim, Gyoo-yeong Lee, Vol. 17, No. 3, pp. 19-24, Jun. 2016
10.7472/jksii.2016.17.3.19
Keywords: MEE, MSE, optimum, weight, impulsive, noise -
Hae Won Kim, Mina Lee, Vol. 17, No. 2, pp. 109-0, Apr. 2016
10.7472/jksii.2016.17.2.109
Keywords: Big data, Korean entertainments contents business, BLOTER, NEOTOUCHPOINT -
Hang Sub Kim, Bong Gyou Lee, Vol. 17, No. 2, pp. 67-76, Apr. 2016
10.7472/jksii.2016.17.2.67
Keywords: Signage, Q Methodology, market definition, market typology -
Ji-Eon Kim, Chang-Won Jeong, Su-Chong Joo, Vol. 17, No. 2, pp. 59-66, Apr. 2016
10.7472/jksii.2016.17.2.59
Keywords: Medical System, Bio-signal, Health-Care, Color Environment, wearable device, Smart Device -
Hae-Duck J. Jeong, Myeong-Un Ryu, Min-Jun Ji, You-Been Cho, Sang-Kug Ye, Jong-Suk R. Lee, Vol. 17, No. 2, pp. 19-28, Apr. 2016
10.7472/jksii.2016.17.2.19
Keywords: Anomaly traffic, self-similarity, Hurst parameter, ATMSim, DDoS attack