Abstract is missing.
- Implementing Business/IT Projects Alignment through the Project Portfolio Approval ProcessCarlos Juiz, Mercedes Gómez, M. Isabel Barceló. 1-8 [doi]
- A Design of IoT Based Agricultural Zone Management SystemHyunjoong Kang, Junwook Lee, Hyochan Bang, Sungsoo Kang. 9-14 [doi]
- A Design of Plant Factory Environment Control SystemDae-Heon Park, Kyo-Hoon Son, Se-Han Kim. 15-20 [doi]
- A Study on Ubiquitous Business Process Management for Real-Time Open USN Mash-Up ServicesYoon-Sik Yoo, Jaehak Yu, Byung-Bog Lee, Hyo-Chan Bang. 21-27 [doi]
- Adaptive Auto Bias Control in Wireless Communication SystemsYong Chul Lee, Sok-Kyu Lee, Woong Cho. 29-34 [doi]
- Comparison of Temperature in the Deep Part of the Dummy by the Electronic Moxibustion and the Gu-Gwan MoxibustionMin Woo Cheon, Tae Gon Kim, Dae-Hwan Youn, Ki Won Nam, Chang-Su Na, Young-Eok Kim, Jung-Chul Lee. 35-40 [doi]
- Wound Healing Effect by 633 nm Wavelength Using LED IrradiatorYang-Sun Lee, Tae Gon Kim, Min Woo Cheon. 41-46 [doi]
- Development and Evaluation of an In-Vehicle Haptic Navigation SystemJungsik Hwang, Kyungmi Chung, Jinshil Hyun, Jeha Ryu, Kwangsu Cho. 47-53 [doi]
- Modeling of Energy Consumption for K-Coverage in Wireless Sensor NetworksBabar Shah, Ki-Il Kim. 55-61 [doi]
- Natural Language Processing for Modeling Stable Writing Characteristics of UsersNamseok Lee, Kwangsu Cho. 63-70 [doi]
- Electronic Cane Usability for Visually Impaired PeopleSung-Yeon Kim, Kwangsu Cho. 71-78 [doi]
- Solving Traffic Assignment Problem by an Improved Particle Swarm Optimization and a Segmented Impedance FunctionHongwei Ge, Qiaoxia Zhang, Fan Wang. 79-86 [doi]
- 3D Reconstruction for Internal Organs Based on Improved Gray-Coded Structured LightYanjun Chen, Wangmeng Zuo, Zhaoxin Li, Kuanquan Wang. 87-93 [doi]
- Adaptive Resource Control Strategy over Cognitive Networks for Multimedia ServicesMoonsik Kang, Kilhung Lee. 95-102 [doi]
- Towards a Trusted Vehicular Routing in VANETDeng Chuan. 103-117 [doi]
- Forensic Analysis of Digsby Log Data to Trace Suspected User ActivitiesMuhammad Yasin, Muhammad Abulaish, Muhammad Nour Naeem Elmogy. 119-126 [doi]
- SDSPF: A Secure Data Storage and Processing Framework for Cloud Computing SystemsLongbo Ran, Hai Jin 0001. 127-133 [doi]
- Data Consistency for Self-acting Load Balancing of Parallel File SystemGuoying Li, Bin Dong, Xiuqiao Li, Qimeng Wu, Qianqian Zhong, Mingfa Zhu, Limin Xiao, Li Ruan. 135-143 [doi]
- Isomorphism Classes of Jacobi Quartic Curve over Finite FieldsHongfeng Wu, Rongquan Feng. 145-153 [doi]
- Fingerprinting Data Based on Secret MaskHeesook Choi, Phyllis Reuther. 155-162 [doi]
- Packet-Based Quality Measurement and Analysis for Mobile VoIP ServiceHae-Jong Joo, Bong-Hwa Hong, Eu-Soo Lee, Hae-Kil Choi. 163-170 [doi]
- The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart PhoneHai-Cheng Chu, Szu-Wei Yang, Shiuh-Jeng Wang, Jong Hyuk Park. 171-178 [doi]
- Email Encryption System Using Certificateless Public Key Encryption SchemeYee-Lee Er, Wei-Chuen Yau, Syh-Yuan Tan, Bok-Min Goi. 179-186 [doi]
- Methodology for Digital Investigation of Illegal Sharing Using BitTorrentSooyoung Park, Hyunji Chung, Changhoon Lee, Sangjin Lee. 187-195 [doi]
- Methodology for Digital Forensic Investigation of iCloudJeehee Lee, Hyunji Chung, Changhoon Lee, Sangjin Lee. 197-206 [doi]
- Analysis Framework to Detect Artifacts of Portable Web BrowserJong-Hyun Choi, Keun-Gi Lee, Jungheum Park, Changhoon Lee, Sangjin Lee. 207-214 [doi]
- Performance Analysis of Zone Based Routing by Varying Radius of Zone Using Ant Colony in MANETNeeraj Kumar 0001, Jongsung Kim. 215-223 [doi]
- Security Analysis of Authentication Scheme for Wireless Communications with User AnonymityWoongryul Jeon, Jeeyeon Kim, Youngsook Lee, Dongho Won. 225-231 [doi]
- Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server EnvironmentMijin Kim, Namje Park, Dongho Won. 233-240 [doi]
- Design of a Simple User Authentication Scheme Using QR-Code for Mobile DeviceYoungsook Lee, Jeeyeon Kim, Woongryul Jeon, Dongho Won. 241-247 [doi]
- Customizing Data Analysis Using Forensic Approach in Personalized RFID for Access Control of Student's Harmful ContentsYoungsoo Kim, Namje Park. 249-256 [doi]
- Elementary Education of Creativity Improvement Using Rube Goldberg's InventionYilip Kim, Namje Park. 257-263 [doi]
- Mobile RFID/NFC Linkage Based on UHF/HF Dual Band's Integration in U-Sensor Network EraNamje Park. 265-271 [doi]
- Security Balancing for IT-Enabled Service InnovationAda Hui-Chuan Chen, Huei-Chung Chu, Sou-Chein Wu. 273-277 [doi]
- The Electronic Bidding System Based on Public Key InfrastructureHuei-Chung Chu, Ada Hui-Chuan Chen. 279-283 [doi]
- High-Capacity Steganographic Method Based on Division Arithmetic and LSB ReplacementWen-Chung Kuo, Yi-Heng Chen, Yu-Chih Huang. 285-291 [doi]