Digital Library
Search: "[ keyword: IT ]" (496)
-
Khusanbek Gafurov, Tai-Myoung Chung
Vol. 15, No. 4, pp. 797-819, Aug. 2019
10.3745/JIPS.03.0125
Keywords: Cloud, Edge, IoT, IoT Security, MEC/MCC, RFID, WSN, 5G -
Jeong Hoon Jo, Pradip Kumar Sharma, Jose Costa Sapalo Sicato, Jong Hyuk Park
Vol. 15, No. 4, pp. 765-784, Aug. 2019
10.3745/JIPS.03.0124
Keywords: Blockchain, Edge Computing, Internet of Things, network security, Smart City -
Hongbo Yan, Yanling Wang, Xiaofeng Zhou, Likai Liang, Zhijun Yin, Wei Wang
Vol. 15, No. 4, pp. 724-736, Aug. 2019
10.3745/JIPS.04.0122
Keywords: Dynamic Thermal Rating, Global/Regional Assimilation and Prediction System (GRAPES), Meteorological Data, Power Grids, Thermal Load Capacity, Transmission Line -
Won-Yong Jeong, Min Choi
Vol. 15, No. 3, pp. 707-716, Jun. 2019
10.3745/JIPS.03.0121
Keywords: Applicants Capability Verification, blockchain, Digital Certificate, Recruitment Platform -
Zhe Kan, Xiaolei Wang
Vol. 15, No. 3, pp. 632-644, Jun. 2019
10.3745/JIPS.04.0117
Keywords: Cloud Services, Cyber-Physical System (CPS), Dangerous Chemicals, Data Collector, Remote Monitoring and Warning -
Shuiping Ni, Huigang Chang, Yuping Xu
Vol. 15, No. 3, pp. 604-615, Jun. 2019
10.3745/JIPS.03.0122
Keywords: adaptive spectrum sensing, Cognitive Radio, Detection Time, Fusion Center, SNR Estimation, Voting Rule -
Han Peng, Chenglie Du, Lei Rao, Zhouzhou Liu
Vol. 15, No. 3, pp. 570-592, Jun. 2019
10.3745/JIPS.01.0043
Keywords: Behavior Semantic, Design Pattern Instantiation, Event-B Design Patterns, Labeled Transition System -
HyunYong Lee, Byung-Tak Lee
Vol. 15, No. 3, pp. 550-569, Jun. 2019
10.3745/JIPS.04.0116
Keywords: Additional Filters, Bloom Filter, False Positive Probability, Hash table, Processing Time -
Ghassan Sabeeh Mahmood, Dong Jun Huang, Baidaa Abdulrahman Jaleel
Vol. 15, No. 3, pp. 538-549, Jun. 2019
10.3745/JIPS.03.0117
Keywords: access control, Cloud Storage, Encryption, Security -
Min-Ji Seo, Myung-Ho Kim
Vol. 15, No. 3, pp. 520-537, Jun. 2019
10.3745/JIPS.03.0116
Keywords: Apriori Algorithm, Associated Abnormal Behavior List, Comprehensive Leakage Detection Scenario, Convolutional Neural Network, Data Leakage Detection