Abstract is missing.
- Eye Tracking Technique for Product Information ProvisionSeoksoo Kim. 1-7 [doi]
- A Study on Marker Overlapping Control for M2M-Based Augmented Reality Multiple Object Loading Using Bresenham AlgorithmSungmo Jung, Jaegu Song, Seoksoo Kim. 8-15 [doi]
- Single Image Super-Resolution via Edge Reconstruction and Image FusionGuangling Sun, Zhoubiao Shen. 16-23 [doi]
- Scanning and Measuring Device for Diagnostic of Barrel BoreAles Marvan, Josef Hajek, Jan Vana, Radim Dvorak, Martin Drahanský, Robert Jankovych, Jozef Skvarek. 24-29 [doi]
- Recognition of Hits in a TargetVojtech Semerak, Martin Drahanský. 30-34 [doi]
- Disparity Estimation Method Based on Reliability Space Using Color EdgeSeungtae Lee, Youngjoon Han, Hernsoo Hahn. 35-42 [doi]
- Web-Based IP Reuse CAD System, FlowrianMing Ma, Hyoung Kie Yun, Woo-Kyung Lee, Jung Seop Seo, Inhag Park, Dai-Tchul Moon. 43-48 [doi]
- * Vector FlowRajalida Lipikorn, Krisorn Chunhapongpipat, Sirod Sirisup, Ratinan Boonklurb, Nagul Cooharojananone. 49-57 [doi]
- d-Metric in Rough Measures and Image AnalysisDariusz Malyszko, Jaroslaw Stepaniuk. 58-67 [doi]
- Semantic Supervised Clustering Approach to Classify Land Cover in Remotely Sensed ImagesMiguel Torres, Marco Moreno, Rolando Menchaca Mendez, Rolando Quintero, Giovanni Guzmán. 68-77 [doi]
- Fuzzified Probabilistic Rough Measures in Image SegmentationDariusz Malyszko, Jaroslaw Stepaniuk. 78-86 [doi]
- JHUF-5 Steganalyzer: Huffman Based Steganalytic Features for Reliable Detection of YASS in JPEG ImagesVeena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik. 87-97 [doi]
- Region Covariance Matrices for Object Tracking in Quasi-Monte Carlo FilterXiaofeng Ding, Lizhong Xu, Xin Wang, Guofang Lv. 98-106 [doi]
- Target Detection Using PCA and Stochastic FeaturesSuk-Jong Kang, Hyeon-Deok Bae. 107-114 [doi]
- Cloud Image Resolution Enhancement Method Using Loss Information EstimationWon-Hee Kim, Jong-Nam Kim. 115-120 [doi]
- Multiple Ship Detection and Tracking Using Background Registration and Morphological OperationsNasim Arshad, Kwang-Seok Moon, Jong-Nam Kim. 121-126 [doi]
- A Fast Motion Estimation Algorithm Using Unequal Search and Criterion for Video CodingJong-Nam Kim. 127-133 [doi]
- A Survey on Automatic Speaker Recognition SystemsZia Saquib, Nirmala Salam, Rekha P. Nair, Nipun Pandey, Akanksha Joshi. 134-145 [doi]
- FITVQSPC: Fast and Improved Transformed Vector Quantization Using Static Pattern ClusteringR. Krishnamoorthy, R. Punidha. 146-155 [doi]
- New Data Hiding Scheme Using Method of Embedding Two Bits Data into Two DCT CoefficientsMakoto Fujimura, Tetsuya Takano, Satoshi Baba, Hideo Kuroda. 156-164 [doi]
- Design and Implementation of a Video-Zoom Driven Digital Audio-Zoom System for Portable Digital Imaging DevicesNam In Park, Seon-Man Kim, Hong Kook Kim, Ji Woon Kim, Myeong Bo Kim, Su Won Yun. 165-174 [doi]
- An Item-Based Collaborative Filtering Algorithm Utilizing the Average Rating for ItemsLei Ren, Junzhong Gu, Weiwei Xia. 175-183 [doi]
- Validation of Classifiers for Facial Photograph Sorting PerformanceDaryl H. Hepting, Dominik Slezak, Richard Spring. 184-195 [doi]
- Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 NetworksGiovanni Cagalaban, Seoksoo Kim. 196-203 [doi]
- Fusion Render Cloud System for 3D Contents Using a Super ComputerE.-Jung Choi, Seoksoo Kim. 204-211 [doi]
- On Perceptual Encryption: Variants of DCT Block Scrambling Scheme for JPEG Compressed ImagesMuhammad Imran Khan, Varun Jeoti, Aamir Saeed Malik. 212-223 [doi]
- The iPad and EFL Digital LiteracyRobert C. Meurant. 224-234 [doi]
- Dematerialization and Deformalization of the EFL/ESL Textbook - Literature Review and Relevant IssuesRobert C. Meurant. 235-244 [doi]
- Real-Time Adaptive Shot Change Detection ModelWon-Hee Kim, Jong-Nam Kim. 245-252 [doi]
- Search for Effective Distance Learning in Developing Countries Using Multimedia TechnologySagarmay Deb. 253-259 [doi]
- Scheduling and Planning Software for Corrugation ProcessChantana Chantrapornchai, T. Sathapanawat. 260-266 [doi]
- Hierarchical Data Structures for Accessing Spatial DataRituparna Samaddar, Sandip Samaddar, Tai-Hoon Kim, Debnath Bhattacharyya. 267-274 [doi]
- OSI Layer Wise Security Analysis of Wireless Sensor NetworkShilpi Saha, Debnath Bhattacharyya, Tai-Hoon Kim. 275-282 [doi]
- Business Planning in the Light of Neuro-fuzzy and Predictive ForecastingPrasun Chakrabarti, Jayanta Kumar Basu, Tai-Hoon Kim. 283-290 [doi]
- Identification of Plant Using Leaf Image AnalysisSubhra Pramanik, Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Tai-Hoon Kim. 291-303 [doi]
- Using Incentives to Reduce Active Network Privacy Threats and VulnerabilitiesMaricel O. Balitanas, Tai-Hoon Kim. 304-316 [doi]
- Security Encryption Scheme for Communication of Web Based Control SystemsRosslin John Robles, Tai-Hoon Kim. 317-325 [doi]