http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Analysis of Trans-media Storytelling Strategies
Jeong-Hee Kim, Jong-Youl Hong 보안공학연구지원센터 2013 p.1-10
Constraint Mining in Business Intelligence: A Case Study of Customer Churn Prediction
Nittaya Kerdprasop, Phaichayon Kongchai,Kittisak Kerdprasop 보안공학연구지원센터 2013 p.11-20
Development of the Walking Trail Applications on GPS-based Smartphone Utilizing the Local Narrative
Dong Uk Im, Hak Ro Yoon,Jae Yeong Lee 보안공학연구지원센터 2013 p.31-40
Automatic Classification of Sunspot Groups for Space Weather Analysis
Rudy Adipranata, Gregorius Satia Budhi,Bambang Setiahadi 보안공학연구지원센터 2013 p.41-54
Fermentation Food Monitoring System using the Smart RFID Sensor Tag
Ki-Hwan Eom, Chang Won Lee,So Young Park,Joo woong Kim 보안공학연구지원센터 2013 p.55-66
A Hierarchical Power-saving Method of WUSB over WBAN
Kyeong Hur, Won-Sung Sohn,Jae-Kyung Kim,YangSun Lee 보안공학연구지원센터 2013 p.67-82
Zhongjian Wang 보안공학연구지원센터 2013 p.83-92
Museong Park, Wonsik Yoon 보안공학연구지원센터 2013 p.93-102
Six Human Factors to Acceptability of Wearable Computers
Cherrylyn Buenaflor, Hee-Cheol Kim 보안공학연구지원센터 2013 p.103-114