<p>Voronoi Diagram and Microstructure of Weldment; J. Cho, M. Choi.</p><p>High-SNR Approximate Closed-Form Formulas for the Average Error Probability of M-ary Modulation Schemes over Nakagami-q Fading Channels; H. Lee.</p><p>Performance Evaluation of IEEE 802.15.6 MAC with User Priorities for Medical Applications; L.Yang, et al.</p><p>Using Dead Reckoning, GPS and Fingerprinting for Ubiquitous Positioning; H.-H. Chiu, et al.</p><p>Multi-core Scheduling Scheme for Wireless Sensor Nodes with NVRAM-based hybrid memory; S. Oh, Y. Ryu.</p><p>Security Scheme for LTE Initial Attach; U. Jang, et al.</p><p>ASiPEC: An Application Specific Instruction-Set Processor for High Performance Entropy Coding; S.-H. Choi, et al.</p><p>An Enhanced Cooperative Spectrum Sensing Scheme based on New Rule of Combining Evidences in Cognitive Radio; M. Sajjad Khan, I.Koo.</p><p>A Design of an Intrusion-Tolerant System based on Effective Resource Conversion; S. Heo, et al.</p><p>An Adaptive Mobile Service Execution Framework in the Cloud Computing Environment; X. Yin, et al.</p><p>Trajectory Prediction for using real Data and real meteorological data; Y. Kim, et al.</p><p>The ADS-B Protection Method for Next-Generation Air Traffic Management System; S.-H. Lee, et al.</p><p>Interactive drawing Based on Hand Gesture; T.-E. Kim.</p><p>Nullifying Malicious Users for Cooperative Spectrum Sensing in Cognitive Radio Networks Using Outlier Detection Methods; P. Prasain, et al.</p><p>A Study on Electronic-Money Technology using Near Field Communication; M.-S. Jung.</p><p>A Novel Android Memory Management Policy Focused on Periodic Habits of a User; J. H. Kim, et al.</p><p>Care Record Summary Validation Tool with Social Network Service; J. W. Sin, et al.</p><p>Performance Study of an Adaptive Trickle Scheme for Wireless Sensor Networks; Y.-W. Lin, P.-H. Wang.</p><p>A New Distributed Grid Scheme utilizing Node-based Preprocessing Technique for Supporting k-NN Queries; H. Lee, et al.</p><p>A Cooperative GPS Approach for Improving Positioning Accuracy in a Location Based System; R. Islam, J. Kim.</p><p>Intelligent Evaluation Models based on Different Routing Protocols in Wireless Sensor Networks; N. Cao, et al.</p><p>Implementation of Personalized Wellness Service; M. Kim, et al.</p><p>SOM Clustering Method using user’s features to classify profitable customer for Recommender Service in u-Commerce; C. Y. Sung, et al.</p><p>A Performance Improvement Scheme for Discovery Service; P. Liu, et al.</p><p>A Cross Cloud Authorization Mechanism Using NFC and RBAC Technology; H.-S. Jan, et al.</p><p>A Study on High Security Authentication Mechanism for 3G/WLAN Networks; W.-C. Wu, H.-T. Liaw.</p><p>A Simple Authentication Scheme and Access Control Protocol for VANETs; W.-C.Wu, Y.-M. Chen.</p><p>Decision Tree Approach to Predict lung Cancer the Data Mining Technology; J.-H. Kao, et al.</p><p>Study of Customer Value and Supplier Dependence with the RFM Model; J.-H. Kao, et al.</p><p>An assistance mechanism bsed on active RFID and RSSI tracking technology for monitoring rehabilitation patients; C.-S. Wang, et al.</p><p>Feature Selection for Support Vector Machines base on Modified Artificial Fish Swarm Algorithm; K.-C. Lin, et al.</p><p>A new Remote Desktop Approach with Mobile Devices: Design and Implementation; T.-Y. Huang, et al.</p><p>Mitigating DoS Attacks based on Recovery-based ITS in Cloud; B. Jang, et al.</p><p>A Databases Strategy in Redundant Web Servers with Fault-Resilience for a Computing Grid; M.-h. Ok.</p><p>Implementation of Low Power LED Display Controller using Adiabatic Operation; K.-R. Lee, et al.</p><p>Hand Gesture Recognition using 8-Directional Vector Chains in Quantization Space; S. Lee, et al.</p><p>Forensic Artifacts in Network Surveillance Systems; K.-S. Lim et al.</p><p>Routing Protocol for Hierarchical Clustering Wireless Sensor Networks; A. Ali, et al.</p><p>The Design of a New Virtualization-based Server Cluster System Targeting for Ubiquitous IT Systems;<br>J. Lim, et al.</p><p>A Conceptualisation of a Strategy to Optimise Shiftwork Scheduling in an Emergency Department; M. N. Azhar, et al.</p><p>The Evaluation of Pen Gestures in a Digital Painting Environment; C.-H. Ko.</p><p>Disease Pattern Analysis Using Electronic Discharge Summary of EMR in HL7 for Computerized Treatment Plan of Cancer Patients in Korea; C. Y. Sung, et al.</p><p>Research on the Network Assisted Teaching System of College Physics Experiments; Y. Du, et al.</p><p>Scheduling Model and Algorithm of Vertical Replenishment; S. Liu, B. Li.</p><p>Assisted Lung Ventilation Control System as a Human Centered Application: The Project and Its Educational Impact on the Course of Embedded Systems; D. Cabezas, et al.</p><p>Research of SSO Based on the Fingerprint Key in Cloud Computing; Z. Yongsheng, et al.</p><p>Study of Local Monitoring System Based on SMS under the Cloud Environment; Z. Yongsheng, et al.</p><p>Effects of meal size on the SDA of the taimen; G. Yang, et al.</p><p>Management Information Systems; L. Ogiela, M. Ogiela.</p><p>Security in Management of Distributed Information; M. Ogiela, et al. </p><p>Research of ABAC Mechanism Based on the Improved Encryption Algorithm under Cloud Environment; Z. Longxiang, Z. Jiashun.</p><p>A novel design of education video personalized recommendation system based on collaborative filtering recommendation technology; J. Xiao, M. Wang.</p><p>The Design of a Medical Rules Synchronization System; Y.-H. Chang, et al.</p><p>Associative Recommendation of Learning Contents Aided by Eye-tracking in a Social Media Enhanced Environment ; G. PIAO, et al.</p><p>A Novel Strategy for Colonies recognition and Classification in Super-Resolution Images; Q. Zhang, et al.</p><p>Study on Intelligent Course Scheduling System; T. Li, X. Li.</p><p>The Study and Research on Chinese Sports Network Marketing Strategy; J. Yong.</p><p>Interactive visualization of enrollment data using parallel coordinates; W. Xinglei, L. Xueqing.</p><p>The Effect of Peer’s Progress on Learning Achievement in e-Learning: A Social Facilitation Perspective; P.-S. Chiu, et al.</p><p>An Integration Framework for Clinical Decision Support Applications; Z. Xiang, et al.</p><p>Method of Generating Intelligent Group Animation by Fusing Motion Capture Data; J. Song, et al.</p><p>Histogram-Based Masking Technique for Retinal Fundus Images; R. Chong, J. Suniel.</p><p>Effect of electronic Scoring System for Scenario Group Tutorial implementation for supporting medical student studies; P. Khumrin, V. Supajatura.</p><p>Perceived Risk of Anti-Corruption e-Learning, Email Phishing Literacy, and Anomia; J. Abraham, S. Sharron.</p><p>A Model of Business Intelligence Systems for School: A Case Study (Perception Applications and Benefits); Y. Kurniawan.</p><p>A Surveillance Platform of Antimicrobial Use in Hospital Based on DDD(Defined Daily Dose); G.Liang, et al.</p><p>Identification of Adverse Drug Events in Chinese Clinical Narrative Text; C. Ge, et al.</p><p>Control system and control method for automatic adjustment of outdoor LED display brightness; F. YANG, et al.</p><p>A Novel Quantitative Evaluation Metric of 3D Mesh Segmentation; X. Sun, et al.</p><p>A Survey Analysis of Chinese Virtues Questionnaire in Medical Postgraduates; M. Yu, et al.</p><p>Practice and Exploration of All-in-English Teaching of Compiler Principles; X. Liu, H. Xu.</p><p>An Application of Ant Colony Optimization Clustering Approach for Primary Headache Diagnosis; Y. WU, H. Duan.</p><p>Analysis and Comparisons of Iterative Closest Point Algorithms; L. Wang, X. Sun.</p><p>Study on the effectiveness of distance education in the judicial examination training; R. x. Zhang, W.s. Wang.</p><p>Greedy Strategy Based Self-adaption Ant Colony Algorithm for 0/1 Knapsack Problem; D.-p. DU, Y.-r.ZU.</p><p>Non-Chinese students speak: sectional and clinical anatomy learning in a Chinese medical school; X. He, et al.</p><p>Dynamic and Efficient Search System of Digital Encyclopedia of Intangible Cultural Heritage: The Case Study of ICHPEDIA; J. S. Lee, et al.</p><p>On the Performance of Quasi-Orthogonal Space Time Block Coded Massive MIMO with up to 16 Antennas; K. Z. Chi Winn, et al.</p><p>Encrypted data group authentication for outsourced databases; M. Jang, et al.</p><p>De-word Classification Algorithm Based on the Electric Power of Large Data Library Retrieval; X. Guo, et al.</p>