Home | JKIIT Archives | About the JKIIT | E-SUBMISSON |
Sorry.
You are not permitted to access the full text of articles.
If you have any questions about permissions,
please contact the Society.
죄송합니다.
회원님은 논문 이용 권한이 없습니다.
권한 관련 문의는 학회로 부탁 드립니다.
2. p. 11 Anomaly Detection of Injection Molding using Statistics-based Feature Selection and Generative Adversarial Learning
Jongwook Si, Jisu Jeong, Minsu Jeong, Sungyoung Kim
DOI: https://doi.org/10.14801/jkiit.2023.21.4.11 |
3. p. 21 Threshold Determination Method in Anomaly Detection using LSTM Autoencoder
Seunghyeon Jeon, Chaelyn Park, Gyuwon Lee, Seongjong Kim, Bongen Gu
DOI: https://doi.org/10.14801/jkiit.2023.21.4.21 |
6. p. 57 Deep Learning Wearable Device using IoT-associated Voice Recognition for the Visually Impaired
Jeongok Lee, KyoungSoo Kim, Byungin Min, Dongseob Kim, Minseong Park, Gyuha Hwang, YongTae Kim, Jiseung Nam
DOI: https://doi.org/10.14801/jkiit.2023.21.4.57 |
8. p. 75 Analysis and Compensation of Doppler Shift for Low Earth Orbit Satellite Communication in Korean Peninsula
Hee-Won Lee, Tae-Sik Ha, Won-Sang Yoon, Youngjae Kim, Sungho Kim
DOI: https://doi.org/10.14801/jkiit.2023.21.4.75 |
10. p. 97 Collision Probability Analysis for Fine Synchronization in Link-16
Dongyeong Kim, KI SEOK KIM, JIN KI KIM, Joo-Young Choi, Young-Hwan Song, Dongweon Yoon
DOI: https://doi.org/10.14801/jkiit.2023.21.4.97 |
12. p. 117 Reinforcement Learning-based Container Multi-stage Loading Modelling Method in Port Logistics
Woo-Seok Jang, Hyo-June Lee, Min-Seoung Seo, Seong-Jin Lee, Dong-Gyu Kim
DOI: https://doi.org/10.14801/jkiit.2023.21.4.117 |
13. p. 125 Implementation of Secure QR Scan System using Format-Preserving Encryption
Seunghyeok Choi, Kyungwook Cho, Taehui Han, Yeonhui Byeon, Sun-Young Lee
DOI: https://doi.org/10.14801/jkiit.2023.21.4.125 |