본문 바로가기
  • Home

2025, Vol.11, No.1

Implementation of Real-time Monitoring System and Platform in Industrial Factory Based on BLE Mesh
Hyeok Han , Do-Won Kim , Hak-Cheol Kim | 2025, 11(1) | pp.1~8 | number of Cited : 0
Design of a Security Vulnerability Analysis and Response Model through Information Security Consulting for SMEs
Keun-Ho Lee | 2025, 11(1) | pp.9~15 | number of Cited : 0
A study on asynchronous grid division and stability analysis based on low frequency transmission Things Society
Park Tae-sik | 2025, 11(1) | pp.17~27 | number of Cited : 0
Performance Evaluation of a Smoothing Algorithm Considering Peak Transmission Rate Utilization in IoT Environments
MyounJae Lee | 2025, 11(1) | pp.29~35 | number of Cited : 0
3D Spatial Exploration and Elevation Mapping of Public Data Using V-World DEM Data
Su-Min Yun , Ha-Joo Song | 2025, 11(1) | pp.37~46 | number of Cited : 0
A Study on Development Strategies Through the Analysis of the Current Status of Christian Churches in the Metaverse Platform
MyounJae Lee | 2025, 11(1) | pp.47~54 | number of Cited : 0
Design of analysis indicators for privacy policy evaluation criteria based on qualitative characteristics and analysis of practical requirements for writing privacy policy
Mina Shim | 2025, 11(1) | pp.55~68 | number of Cited : 0
Analysis of AI·SW Education Models for Middle School Students in an IoT Environment -Focusing on the Case Study of the Digital Saessak Program
Keun-Ho Lee | 2025, 11(1) | pp.69~75 | number of Cited : 0
The Effect of Perceived Value and Enjoyment of Dance Performance Experience(4Es) on Reuse Intentio
SeoYoung | 2025, 11(1) | pp.77~86 | number of Cited : 0
A Design of Door Control System for Preventing Vehicle Collision Accidents in Tight Parking Lot Environments
Hyun-Seob Lee | 2025, 11(1) | pp.87~92 | number of Cited : 0
Design and Implementation of an Indicators of Compromise Information Sharing Mechanism for Effective Cyber Attack Response
Lee, Hyung Woo | 2025, 11(1) | pp.93~100 | number of Cited : 0
Research on XR and Key Technologies for Autonomous Driving
Jung Soo Han | 2025, 11(1) | pp.101~106 | number of Cited : 0
Design and Implementation of an Automatic Detection Mechanism for Malicious Information Based on Macro Data in MS-Office File
Lee, Hyung Woo | 2025, 11(1) | pp.107~114 | number of Cited : 0