↧
Vulnerability Evaluation Tools of Matching Algorithm and Integrity...
AbstractPersonal identification technology is a critical field of information security that has raised various equipments and communications in the modern society. Most studies have concentrated on...
View ArticleThe Semantic Web Approach in Location Based Services
AbstractIn recent years, there has been growing interest in Location Based Service (LBS). However, the existing LBS has some limitations in the management of dynamic location-dependent contents and...
View ArticleLocation-Sensitive Tour Guide Services Using the Semantic Web
AbstractThe tour guide services are a LBS application that provides the information based on the location of users. The recent researches of the tour guide services focus on the context-sensitive...
View ArticleThe Development of Reliability Verification Tool of RFID Tag for Effective...
AbstractRadio Frequency Identification (RFID) systems, which are the important technology to identify objects using tags, readers, and sensors, have been used in many applications. Recently, the...
View ArticleThe Design and Implementation of Real-Time Environment Monitoring Systems...
AbstractThis research focuses on the implementation of a real-time environment monitoring system for environment detection using wireless sensor networks. The purpose of our research is to construct...
View ArticleOntology-Based Information Search in the Real World Using Web Services
AbstractThe ontology is an essential component to demonstrate the semantic Web, which is being described as the next Web generation. A semantic information search based on the ontology can provide the...
View ArticleDesign and Implementation of Wireless Sensor Based-Monitoring System for...
AbstractThis research focuses on the making the smart factory of supporting utility machine for real-time environment using wireless sensor network architecture. The purpose of this research is the...
View ArticleStructural and Electrical Properties of High Temperature Polycrystalline...
AbstractFor the photovoltaic application, a technique of high temperature crystallization was proposed to change from amorphous to polycrystalline silicon. We investigated the structural and electrical...
View ArticleA Study on the Extraction of Damage Locations Using Twitter Messages
AbstractIn the past, people had to rely on broadcasts and public agencies to receive disaster information when the disaster occurred. More recently, disaster information is shared by means of photos or...
View ArticleA Study on Damage Spatial Data Generation to Construct Disaster History...
AbstractWhen disasters occur, data for damage is been collected through media such as the internet, smart-phones, telephones of government-related organizations and some civilians. However, an...
View ArticleStructural and optical properties of a radio frequency magnetron-sputtered...
AbstractThis study introduces optical properties of a columnar structured zinc oxide [ZnO] antireflection coating for solar cells. We obtained ZnO films of columnar structure on glass substrates using...
View ArticleEstimation of Flood Risk on the Roads Using Current Accumulated Rainfall via...
AbstractAs the frequent occurrence of localized heavy rainfall due to abnormal climate and rapid urbanization, urban flood inundation is increasing unlike in the past. Especially the isolation of...
View Article
More Pages to Explore .....