http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Mining Workflow Outlier with a Frequency-Based Algorithm
MinTzu Wang, PingYu Hsu,Yu-Cheng Chuang 보안공학연구지원센터 2011 p.1-22
Yushing Cheung, Jae H. Chung 보안공학연구지원센터(IJCA) 2011 p.1-17
Optimizing Fibre Optics for Coal Mine Automation
Atul Kumar, Dheeraj Kumar,U. K. Singh,P. S. Gupta,Gauri Shankar 보안공학연구지원센터(IJCA) 2011 p.19-30
Design of Loop-Shaping and Internal Model Controller for Unstable and Communication Delay System
Faramarz Asharif, Shiro Tamaki,Tsutomu Nagado,Tomokazu Nagata,Mohammad Reza Asharif 보안공학연구지원센터 2011 p.23-34
Support Vector Machines Based Adaptive Controller for Piston Hydraulic Motor
Hossam Mohammad Khalil, Mohamad El Bardini 보안공학연구지원센터(IJCA) 2011 p.31-50
Remote Position Control System of Stepper Motor Using DTMF Technology
Sagarika Pal, Niladri S. Tripathy 보안공학연구지원센터 2011 p.35-42
Network Based Public Key Method for Steganography
Samir Kumar Bandyopadhyay, Tai -Hoon Kim,Sarthak Parui 보안공학연구지원센터 2011 p.43-48
Adaptive Extended Kalman Filter Based Geolocation Using TDOA/FDOA
Dongkyun Kim, Jihyun Ha,Kwanho You 보안공학연구지원센터 2011 p.49-58
Yassine Manai, Mohamed Benrejeb 보안공학연구지원센터(IJCA) 2011 p.51-64
Implementation and Evaluation for Sophisticated Periodic Execution Control in Embedded Systems
Yuuki Furukawa, Toshihiro Yamauchi,Hideo Taniguchi 보안공학연구지원센터 2011 p.59-78