Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to prote...
The Web Services-Event-Condition-Action (WSECA) framework is designed to enable the heterogeneous communication devices in Ubiquitous Computing Environments to achieve inter-opera...
For interoperation of heterogeneous management systems and integration of existing legacy applications in telecommunication network management systems, a translation from GDMO/ASN...
Tourism industry is one of the important sources of income in many countries. The appropriate and quick submission of primary information such as address of hotels to the tourists...
In WSNs, since the attacks, such as jamming or eavesdropping without physical access, easily occur, security is one of the important requirements for WSNs. The key pre-distributio...
Yoon-Su Jeong, Yong-Tae Kim, Gil-Cheol Park, Sang ...
This paper proposes a novel single-input sampling instance control circuit used in primary-side controller of Switch Mode Power Supplies (SMPS) without optical-coupler and seconda...
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
The importance of individual characteristics has been emphasized in the human computer interaction and information visualization (IV) literature. However, decision style, which is...
Nik Ghazali Nik Daud, Wan Adilah Wan Adnan, Nor La...
A rule set generation technique based on a generated decision tree is suggested for better decision making to compensate the weak point of decision trees
There are many interests and researches among an industry as IT develops. It is important to use information effectively and adequately as applying IT to industry because IT provi...
Kyung-Min Min, Nam-Hyuk Ham, Ju-Hyung Kim, Yoon-Su...