Digital Library
Search: "[ keyword: metric ]" (18)
-
Muhammad Hasnain, Muhammad Fermi Pasha, Imran Ghani, Seung Ryul Jeong, Aitizaz Ali, Vol. 23, No. 2, pp. 97-105, Apr. 2022
10.7472/jksii.2022.23.2.97
Keywords: Web services update, undetected regression anomalies, Performance metrics, services integrate -
2. A Comparative Study on the Effective Deep Learning for Fingerprint Recognition with Scar and WrinkleJunSeob Kim, BeanBonyka Rim, Nak-Jun Sung, Min Hong, Vol. 21, No. 4, pp. 17-23, Aug. 2020
10.7472/jksii.2020.21.4.17
Keywords: Deep Learning, Biometric information, 2D Convolutional Neural Network, discriminating of scar fingerprint, discriminating of wrinkle fingerprint -
Seungil Sonh, Min-Goo Kang, Vol. 21, No. 3, pp. 11-19, Jun. 2020
10.7472/jksii.2020.21.3.11
Keywords: TEA, XTEA, XXTEA, Symmetric Block Cipher, Encryption, Decryption, HDL Design -
Min-goo Kang, Vol. 21, No. 2, pp. 65-72, Apr. 2020
10.7472/jksii.2020.21.2.65
Keywords: Blockchain, biometric distributed ID(DID), fingerprint recognition FIDO2.0, S10 Key-store, crypto-currency transaction -
Woochun Jun, Suk-Ki Hong, Vol. 19, No. 5, pp. 107-113, Oct. 2018
10.7472/jksii.2018.19.5.107
Keywords: Object-oriented Database, Concurrency Control, Performance Evaluation Metrics, Class Hierarchy, Class Composition Hierarchy -
Seungil Sonh, Vol. 18, No. 5, pp. 1-8, Oct. 2017
10.7472/jksii.2017.18.5.01
Keywords: LEA(Lightweight Encryption Algorithm), Symmetric Block Cipher, Encryption, Decryption, HDL Design -
Dongsu Seo, Vol. 17, No. 4, pp. 79-86, Aug. 2016
10.7472/jksii.2016.17.4.79
Keywords: Security Metric, Secure Coding, Code Quality, Security-enhanced development -
8. Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction TechnologyYounsung Choi, Dongho Won, Vol. 17, No. 3, pp. 1-10, Jun. 2016
10.7472/jksii.2016.17.3.01
Keywords: User authentication scheme, biometrics, fuzzy extraction -
Hyun-Ju Lee, Vol. 13, No. 1, pp. 45-56, Feb. 2012
10.7472/jksii.2012.13.1.45
Keywords: clinical trials, data management, electronic data capture system, e-clinical data, performance metric -
Nam-Jin Kim, Doo-Seop Choi, Won-Seok Song, Hyuk Choi, Tae-Jeong Kim, Vol. 11, No. 5, pp. 119-0, Oct. 2010
Keywords: Asymmetric Watermarking, TKW, Robustness analysis, Detection Key