Digital Library
Search: "[ keyword: Internet of Things ]" (27)
-
Ji Su Park, Jong Hyuk Park
Vol. 16, No. 4, pp. 743-749, Aug. 2020
10.3745/JIPS.03.0146
Keywords: Artificial intelligence, Internet of Things, machine vision, 5G Mobile Network -
Mihui Kim, Younghee Park, Pankaj Balasaheb Dighe
Vol. 15, No. 5, pp. 1036-1054, Oct. 2019
10.3745/JIPS.01.0045
Keywords: Incentive Method, Internet of Things (IoT) Model, Mobile Crowd Sensing (MCS), Privacy-Preserving, Using Group Signature -
Young-Sik Jeong, Jong Hyuk Park
Vol. 15, No. 5, pp. 1029-1035, Oct. 2019
10.3745/JIPS.02.0118
Keywords: Blockchain and Crypto Currency, Cloud Computing, Internet of Things, Sentiment Analysis -
Jeong Hoon Jo, Pradip Kumar Sharma, Jose Costa Sapalo Sicato, Jong Hyuk Park
Vol. 15, No. 4, pp. 765-784, Aug. 2019
10.3745/JIPS.03.0124
Keywords: Blockchain, Edge Computing, Internet of Things, network security, Smart City -
Yunsick Sung, Jong Hyuk Park
Vol. 15, No. 3, pp. 457-463, Jun. 2019
10.3745/JIPS.03.0115
Keywords: Blockchain and Crypto Currency, Cloud Computing, Sentiment Analysis, Internet of Things -
Dong-Min Park, Seong-Kyu Kim, Yeong-Seok Seo
Vol. 15, No. 2, pp. 449-456, Apr. 2019
10.3745/JIPS.03.0114
Keywords: Infrared Module, Infrared Signal, IoT (Internet of Things), Radio Frequency Module, Remote Control, SMART Home, S-mote -
Jonghwa Choi, Sanghyun Ahn
Vol. 15, No. 2, pp. 440-448, Apr. 2019
10.3745/JIPS.03.0113
Keywords: Fog Computing, Internet of Things (IoT), Service Management, Service Placement, Service Provisioning -
Young-Sik Jeong, Jong Hyuk Park
Vol. 15, No. 2, pp. 233-238, Apr. 2019
10.3745/JIPS.04.0113
Keywords: Internet of Things, Smart City -
Vera Suryani, Selo Sulistyo, Widyawan Widyawan
Vol. 14, No. 6, pp. 1431-1437, Dec. 2018
10.3745/JIPS.03.0106
Keywords: Attacks, Authentication, Internet of Things, Security, Statistic -
Nam Yong Kim, Shailendra Rathore, Jung Hyun Ryu, Jin Ho Park, Jong Hyuk Park
Vol. 14, No. 6, pp. 1361-1384, Dec. 2018
10.3745/JIPS.03.0105
Keywords: Cyber Physical System, Internet of Things, Security Analysis, Security Threats