• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Hot Downloaded Papers


HOT DOWNLOADED PARPERS (LAST 3 MONTHS)

  1. 1. A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity
  2. 2. A Predictive Bearing Anomaly Detection Model Using the SWT-SVD Preprocessing Algorithm
  3. 3. Design of a Recommendation System for Improving Deep Neural Network Performance
  4. 4. A study on the design of an efficient hardware and software mixed-mode image processing system for detecting patient movement
  5. 5. Proposal of Standardization Plan for Defense Unstructured Datasets based on Unstructured Dataset Standard Format
  6. 6. A Foundational Study on Developing a Structural Model for AI-based Sentencing Prediciton Based on Violent Crime Judgment
  7. 7. Stream-based API composition for stable API Gateway
  8. 8. Development of Product Recommendation System Using MultiSAGE Model and ESG Indicators
    Hyeon-woo Kim, Yong-jun Kim, Gil-sang Yoo, Vol. 25, No. 1, pp. 69-78, Feb. 2024
    10.7472/jksii.2024.25.1.69
    Keywords: MultiSAGE, 추천 시스템, ESG, GraphSAGE, MultiSAGE, recommend system, ESG, GraphSAGE
  9. 9. Design and Implementation on Cloud-based System for O2O Disinfection Services
  10. 10. Virtual Object Weight Information with Multi-modal Sensory Feedback during Remote Manipulation
  11. 11. A Study on the Automation of Fish Species Identification and Body Length Measurement System
  12. 12. Optimizing Language Models through Dataset-Specific Post-Training: A Focus on Financial Sentiment Analysis
  13. 13. Practical suggestions for development of『manned & unmanned complex combat performance plan』(drone operation)
    Cheol-jung Kim, Bo-Ram Kim, Min-Youn Kim, Jae-Seok Lim, Vol. 25, No. 1, pp. 137-146, Feb. 2024
    10.7472/jksii.2024.25.1.137
    Keywords: Army TIGER, Drone, FPV, 주파수, 원근감, Army TIGER, Drone, FPV, Frequency, Perspective
  14. 14. Research on BGP dataset analysis and CyCOP visualization methods
  15. 15. An Exploratory Study on the Trustworthiness Analysis of Generative AI
  16. 16. Proposal for the『Army TIGER Cyber Defense System』Installation capable of responding to future enemy cyber attack
  17. 17. Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data
  18. 18. Development of deep learning network based low-quality image enhancement techniques for improving foreign object detection performance
  19. 19. Analysis of the Security Requirements of the Chatbot Service Implementation Model