Proper
Home
Journals
About Us
Contact
About this Journal
|
Author Guidelines
|
Submit a Manuscript
Journal Menu
» About this Journal
» Aim and Scope
» Bibliographic Information
» Journal Editors
» Authors Guidelines
» Ethical Policy
» Editorial Review Policy
» Online Submission
» Special Issue Guidelines
» Call for Papers
» Contact Information
Browse Issue
Vol.14, No.2, 2020
Vol.14, No.1, 2020
Vol.13, No.2, 2019
Vol.13, No.1, 2019
Vol.12, No.4, 2018
Vol.12, No.3, 2018
Vol.12, No.2, 2018
Vol.12, No.1, 2018
Vol.11, No.11, 2017
Vol.11, No.10, 2017
Vol.11, No.9, 2017
Vol.11, No.8, 2017
Vol.11, No.7, 2017
Vol.11, No.6, 2017
Vol.11, No.5, 2017
Vol.11, No.4, 2017
Vol.11, No.3, 2017
Volumes 2007-2017
Vol. 6, No. 2, 2012
Contents
Cover Page
Inside Cover Page
Editorial Board
Table of Contents
Copyright
A Design of the Intelligent Black Box using Mining Algorithm
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.01
by: Hwase Park and Daesik Ko
A New Platform to Easily Experiment Activity Recognition Systems based on Passive RFID Tags: Experimentation with Data Mining Algorithms
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.02
by: P-O. Rocher, B. Bouchard and A. Bouzouane
Effective Interface Design Using Face Detection for Augmented Reality Interaction of Smart Phone
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.03
by: Young Jae Lee
An Analysis on the Degree of 3D Sense Following Distance and Location through 3D Depth Level Change
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.04
by: Jeong-Hoon Shin and Sung-Jun Lee
EDMAS -A Latency Minimization Protocol with Low Ducy-Cycle for Wireless Sensor Networks
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.05
by: Chun-Chi Lo and Yu-Chen Hu
Security Enhancement of Chang-Lee Anonymous E-Voting Scheme
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.06
by: Chun-Ta Li and Min-Shiang Hwang
Face Detector using Network-based Services for a Remote Robot Application
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.07
by: Yong-Ho Seo
Implementation of a Handheld Compute Engine for Personal Health Devices
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.08
by: KeeHyun Park and JuGeon Pak
Study on Use of a Clustering Technique with Zone-Based Multi-hop Communication in Wireless Sensor Networks
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.09
by: Choon-Sung Nam, Kyung-Soo Jang, Gyoo-Seok Choi and Dong-Ryeol Shin
Lightweight Message Logging Protocol for Distributed Sensor Networks
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.10
by: Jinho Ahn
Mobility-Aware QoS Provisioning in LED-ID Networks
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.11
by: Tuan Nguyen, Mostafa Zaman Chowdhury and Yeong Min Jang
Systematic Design of High-Performance Smart Card with HF/UHF Dual-Band RFID Tag
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.12
by: Gi-Hyun Hwang and Dae-Ki Kang
Tracing Similarity within Strongly Connected Components for Intelligent Web Crawling
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.13
by: Yong-Jin Tee and Lay-Ki Soon
Virtual Cognitive MAC for Visible Light Communication System
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.14
by: Nam-Tuan Le and Yeong Min Jang
Speech Emotion Recognition Using Support Vector Machine
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.15
by: Yixiong Pan, Peipei Shen and Liping Shen
Context Inference for Predicting Cause of Protection Wall Deformation
DOI:
http://dx.doi.org/10.14257/ijsh.2012.6.2.16
by: Donghyok Suh, Junghwa Song and Kunsoo Oh
Contact Us
PO Box 5074, Sandy Bay Tasmania 7005, Australia
Phone:
+61 3 9028 5994