본문 바로가기
  • Home

2025, Vol.21, No.3

A Security Vulnerability Assessment of Personal Data Storage Technologies
Dupyo Hong , Sung-Il Jang , Yong-Joon Joe and 1 other persons | 2025, 21(3) | pp.1~10 | number of Cited : 0
A Study on the Advanced Random Walk Graph Search Technique to Prevent Tottering Phenomena
SeongCheol Yoon , Su-Hyun Kim , Im-Yeong Lee | 2025, 21(3) | pp.11~19 | number of Cited : 0
Research on Copyright Technology that Supports Generative AI-based Webtoon Content in an On-device Environment
Byoung-Soo Koh | 2025, 21(3) | pp.21~30 | number of Cited : 0
A Study on a License Compatibility Determination Model Using LLM-Based Clause Understanding and Attribute Extraction
Dong-Wan Kim , Kyung-Yeob Park , YongJoon Joe and 1 other persons | 2025, 21(3) | pp.31~46 | number of Cited : 0
D2MR: A Framework for Recommending Drift Detection Method via Data Characteristic-based Rule Mapping in Machine Learning System
Okjoo Choi | 2025, 21(3) | pp.47~60 | number of Cited : 0
Reconstruction Mechanism of Knowledge Network for Reliablity based Intelligent System Design
Jeong Yon Shim | 2025, 21(3) | pp.61~69 | number of Cited : 0
A study on the configuration of audio system output protection functions using microcontrollers and software
KWON SUNG YEOL , Lee HyunChang | 2025, 21(3) | pp.71~78 | number of Cited : 0
Implementation of USB-UART Converter for Digital Virtual Experiments
Ki Jang Geun | 2025, 21(3) | pp.79~85 | number of Cited : 0
A Study of Korea Agricultural Digital Transformation Promotion Strategy Focused on Citrus Farming in Jeju Island
Bae, Doo-Hwan , HeuiChae Jin , Lee Sangmook and 1 other persons | 2025, 21(3) | pp.87~97 | number of Cited : 0
Implementation of an Autonomous Patrol and Risk Detection Module based on WebRTC and ROS2 for a Quadruped Robot
Dong-Ha Hwang , Kim Jae Woong , Kim Dong Hyun | 2025, 21(3) | pp.99~112 | number of Cited : 0
A Study on the Interrelationship with SLM-based Knowledge Graph
Kim, JeongSig , KIM, JIN HONG | 2025, 21(3) | pp.113~122 | number of Cited : 0