본문 바로가기
  • Home

2008, Vol.13, No.5

A Study on Development of an Integrated HMI System based on Embedded OPC Server
Hoongoo Lyeo , Rim,Seong-Rak , Han Kwang Rok | 2008, 13(5) | pp.1~10 | number of Cited : 1
Creation and Retrieval Method of Semantic Annotation Objects in 3D Virtual Worlds
sujin kim , Seok-Jong Yu | 2008, 13(5) | pp.11~18 | number of Cited : 0
Real-time Face Detection System using YCbCr Information and AdaBoost Algorithm
김형균 , 정기봉 | 2008, 13(5) | pp.19~26 | number of Cited : 8
Implementation of Loop Peeling in CTOC
Kim Ki Tae , 김제민 , Weon Hee Yoo | 2008, 13(5) | pp.27~36 | number of Cited : 1
An Implementation of Web-based E-portfolio Management System
한성현 | 2008, 13(5) | pp.37~44 | number of Cited : 9
An Efficient Dynamic Workload Balancing Strategy for High-Performance Computing System
Won Joo Lee , 박말순 | 2008, 13(5) | pp.45~52 | number of Cited : 0
An Ontology - based Transformation Method from Feature Model to Class Model
김동리 , Chee-Yang Song , Dongsu Kang and 1 other persons | 2008, 13(5) | pp.53~67 | number of Cited : 2
Class Code Generation method for Component model construction
임근 , 이기영 | 2008, 13(5) | pp.69~76 | number of Cited : 1
A Study on Localization of Text in Natural Scene Images
최미영 , Gye-young Kim , HYUNG IL CHOI | 2008, 13(5) | pp.77~84 | number of Cited : 1
A Framework for Multiple Wireless Services in Heterogeneous Wireless Networks
Choongyong Shin , Cho Jinsung | 2008, 13(5) | pp.85~94 | number of Cited : 0
A Study of the Next Generation STOCK-NETWORK and Design
하성용 , Dea-woo Park | 2008, 13(5) | pp.95~102 | number of Cited : 1
Sensitive Personal Information Protection Model for RBAC System
Hyung Jin Mun , 서정석 | 2008, 13(5) | pp.103~110 | number of Cited : 6
A Study on the Target Position Estimation Algorithm to Radar System
이관형 , Woo-Young Song | 2008, 13(5) | pp.111~116 | number of Cited : 3
Implementation of a pervasive health care system for cardiac patient on mobile environment
Kim Jeong-won | 2008, 13(5) | pp.117~124 | number of Cited : 5
Simply Separation of Head and Face Region and Extraction of Facial Features for Image Security
전영철 , 이건익 , 김강 | 2008, 13(5) | pp.125~134 | number of Cited : 2
Mobile Web Server Performance Improvement with Enhancing SOAP Message Transaction and NBTM
김용태 , Jeong Yoon Su , Gil-Cheol Park and 1 other persons | 2008, 13(5) | pp.135~142 | number of Cited : 1
A WebDAV-based Collaborative System Supporting Individualized Services
이홍창 , Myung-Joon Lee | 2008, 13(5) | pp.143~154 | number of Cited : 0
Chaos-based Image Encryption Scheme using Noise-induced Synchronization
GEOSU YIM , HongSop Kim | 2008, 13(5) | pp.155~162 | number of Cited : 11
Separation of Concerns Security Model of Component using Grey Box
김영수 , Cho Sun-Gu | 2008, 13(5) | pp.163~170 | number of Cited : 1
Mobile Development Process based on the UML Components
박종모 , Kyungsan CHO | 2008, 13(5) | pp.171~178 | number of Cited : 0
Channel Analysis of Wireless Sensor Networks
Kyung Kwon Jung , CHOI , WOO SEUNG | 2008, 13(5) | pp.179~186 | number of Cited : 2
User interface of Home-Automation for the physically handicapped person in wearable computing environment
Kang Sun-Kyung , 김영운 , Dae-Kyung Han and 1 other persons | 2008, 13(5) | pp.187~194 | number of Cited : 0
Security and Privacy Mechanism using TCG/TPM to various WSN
이기만 , 조내현 , 권환우 and 1 other persons | 2008, 13(5) | pp.195~202 | number of Cited : 1
Integrated NEMO Route Optimization to Improve Security and Communication Path
Kyungsan CHO , 신덕만 | 2008, 13(5) | pp.203~210 | number of Cited : 1
Quality Status Comparison and Analysis for the Service Development Direction of Domestic Job Information Site
정경희 , 김형래 | 2008, 13(5) | pp.211~218 | number of Cited : 13
Heuristic Backtrack Search Algorithm for Energy-efficient Clustering in Wireless Sensor Networks
손석원 | 2008, 13(5) | pp.219~228 | number of Cited : 0
A Robust Pair-wise Key Agreement Scheme without Trusted Third Party and Pre-distributing Keys for MANET Environments
SeungJin Han , Choi.Jun-Hyeog | 2008, 13(5) | pp.229~236 | number of Cited : 2
The shelter course guidance system using a sensor network
권정일 , 노영섭 | 2008, 13(5) | pp.237~246 | number of Cited : 4
A Web Link Architecture Based on XRI Providing Persistent Link
Euihyun Jung , 김원 , 박찬기 | 2008, 13(5) | pp.247~254 | number of Cited : 0
A Fast Tag Prediction Algorithm using Extra Bit in RFID System
Baek,Deuk-Hwa , Kim Sung soo , 안광선 | 2008, 13(5) | pp.255~262 | number of Cited : 2
The Authentication System in Real-Time using Face Recognition and RFID
Jee, Jeong-Gyu | 2008, 13(5) | pp.263~272 | number of Cited : 2
A Study on the Crime Prevention of Residential Zone through the Application of CPTED
Young Hwan Kim | 2008, 13(5) | pp.273~278 | number of Cited : 15
The Study about analyzing the Present Situation of Human Resource Outsourcing
차성호 , Yang, Donghoon | 2008, 13(5) | pp.279~290 | number of Cited : 6
The Study on the Emotional Labor, Emotional Exhaustion and Turnover Intention of Call Center Tele-Communicators
이수연 , HaeSool Yang | 2008, 13(5) | pp.291~308 | number of Cited : 14
An Exploratory Study on the Relationship of Organizational Citizenship Behavior of Police Officer, Empowerment and Customer Orientation
박창욱 , Munseung yang | 2008, 13(5) | pp.309~314 | number of Cited : 8
A Study on the Influence of Customer Quality, Physical Quality and Service Provider Quality on Hotel Quality
Shin, Chul-Ho | 2008, 13(5) | pp.315~321 | number of Cited : 2