|
Conference
|
2009 |
Friend Identification and Localization Method based on Mesh Network of IR-UWB
Seong Yun Cho
European Navigation Conference - Global Navigation Satellite Systems (ENC-GNSS) 2009, pp.251-260 |
|
|
|
Conference
|
2009 |
Fabrication of Moth-Eye Anti-Reflective Nanostructures in the Range of Near-IR
Young Hun Kang
International Conference on Molecular Electronics and Devices (IC ME&D) 2009, pp.1-2 |
|
|
|
Conference
|
2009 |
Fabrication of CIGS Nano-Particle and CIGS Films by Using Chemical Bath Fabrication: Potential Applications of CIGS Solar Cell
Ki Bong Song
International Conference on Materials for Advanced Technologies (ICMAT) 2009, pp.1-1 |
|
|
|
Conference
|
2009 |
NCR Recovery Mechnism Supporting ACM/VCM Mode in Two-Way Satellite Communication Environment
Nam Kyung Lee
IET and AIAA International Communications Satellite Systems Conference (ICSSC) 2009, pp.1-3 |
0 |
|
|
Conference
|
2009 |
Fast Detection of Avian Influenza A(H5N1) Hemagglutinin (IN) Peptide using Field Effect Transistor (FET)-based Biosensor
Hyo Bong Hong
한국바이오칩 학술 대회 (춘계) 2009, pp.1-1 |
|
|
|
Conference
|
2009 |
LED Lighting Control for Beverage Service
Ji Hyun Youk
International Conference on Computer and Communications Security (ICCCS) 2009, pp.1-4 |
|
|
|
Conference
|
2009 |
The Implementation of 1Gbps Downstream Digital Cable Transmission and Receive System
Tae Kyoon Kim
International Conference on Computer and Communications Security (ICCCS) 2009, pp.1-5 |
|
|
|
Conference
|
2009 |
A Study of Classifying the Objectionable Content by using the MFCCsbased Audio Feature Set
Jae Deok Lim
International Conference on Computer and Communications Security (ICCCS) 2009, pp.1-2 |
|
|
|
Conference
|
2009 |
A Centralized Management Framework of Remote Universal Serial Bus Devices for SoD (System on-Demand) Service
Dong Oh Kang
International Conference on Computer and Communications Security (ICCCS) 2009, pp.1-4 |
|
|
|
Conference
|
2009 |
The Simulation and Performance of Upper Channel MAC Function and Algorithm
Tae Kyoon Kim
International Conference on Computer and Communications Security (ICCCS) 2009, pp.301-304 |
|
|