Digital Library
Search: "[ keyword: LEA ]" (214)
An Energy Efficient Cluster Management Method based on Autonomous Learning in a Server Cluster Environment
Sungchul Cho , Hukeun Kwak , Kyusik Chung KIPS Transactions on Computer and Communication Systems,
Vol. 4, No. 6, pp. 185-196,
Jun.
2015
10.3745/KTCCS.2015.4.6.185
10.3745/KTCCS.2015.4.6.185
Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario
Jang Su Park , Im Yeong Lee KIPS Transactions on Computer and Communication Systems,
Vol. 4, No. 2, pp. 65-72,
Feb.
2015
10.3745/KTCCS.2015.4.2.65
10.3745/KTCCS.2015.4.2.65
Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack
Kwang Il Jeong , Joon Ku Lee , Geun Ok Park KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 12, pp. 561-568,
Dec.
2013
10.3745/KTCCS.2013.2.12.561
10.3745/KTCCS.2013.2.12.561
A Monitoring Tool for Personal Information Leakage Prevention in Network Packets
Tea Kyung Ju , Chong Min Hong , Weon Shin KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 11, pp. 489-494,
Nov.
2013
10.3745/KTCCS.2013.2.11.489
10.3745/KTCCS.2013.2.11.489
Efficient Transmission of Scalable Video Streams Using Dual-Channel Structure
Ho Min Yoo , Jaem Youn Lee , Ju Young Park , Sang Hwa Han , Kyung Tae Kang KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 9, pp. 381-392,
Sep.
2013
10.3745/KTCCS.2013.2.9.381
10.3745/KTCCS.2013.2.9.381
Implementation of the Realtime Learning Evaluation System and Interaction for Smart learning
Myung Suk Lee , Yoo Ek Son KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 6, pp. 245-252,
Jun.
2013
10.3745/KTCCS.2013.2.6.245
10.3745/KTCCS.2013.2.6.245
Continuous Multiple Prediction of Stream Data Based on Hierarchical Temporal Memory Network
Chang Yeong Han , Sung Jin Kim , Hyun Syug Kang KIPS Transactions on Computer and Communication Systems,
Vol. 1, No. 1, pp. 11-20,
Oct.
2012
10.3745/KTCCS.2012.1.1.11
10.3745/KTCCS.2012.1.1.11
Preprocessing Technique for Malicious Comments Detection Considering the Form of Comments Used in the Online Community
Kim Hae Soo, Kim Mi Hui KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 3, pp. 103-110,
Mar.
2023
https://doi.org/10.3745/KTCCS.2023.12.3.103
Keywords: Natural Languege Processing, Preprocessing, Deep Learning, Malicious Comment
https://doi.org/10.3745/KTCCS.2023.12.3.103
Keywords: Natural Languege Processing, Preprocessing, Deep Learning, Malicious Comment
Real-Time Streaming Traffic Prediction Using Deep Learning Models Based on Recurrent Neural Network
Jinho Kim, Donghyeok An KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 2, pp. 53-60,
Feb.
2023
https://doi.org/10.3745/KTCCS.2023.12.2.53
Keywords: Real-Time Streaming Service, traffic prediction, Recurrent Neural Network, deep-learning
https://doi.org/10.3745/KTCCS.2023.12.2.53
Keywords: Real-Time Streaming Service, traffic prediction, Recurrent Neural Network, deep-learning
Imbalanced Data Improvement Techniques Based on SMOTE and Light GBM
Young-Jin Han, In-Whee Joe KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 12, pp. 445-452,
Dec.
2022
https://doi.org/10.3745/KTCCS.2022.11.12.445
Keywords: Machine Learning, Scaling, SMOTE, Light GBM, Imbalanced Classification
https://doi.org/10.3745/KTCCS.2022.11.12.445
Keywords: Machine Learning, Scaling, SMOTE, Light GBM, Imbalanced Classification