1 |
Chen, C.-H., T.-K. Liu, J.-H. Chou, C.-H. Tasi, and H. Wang, "Optimization of teacher volunteer transferring problems using greedy genetic algorithms", Expert Systems with Applications, Vol.42, No.1(2015), 668-678./
|
|
2 |
Esen, I. and M. A. Koc, "Optimization of a passive vibration absorber for a barrel using the genetic algorithm", Expert Systems with Applications, Vol.42, No.2(2015), 894-905./
|
|
3 |
Huang, H.-X., J.-C. Li, and C.-L. Xiao, "A proposed iteration optimization approach integrating backpropagation neural network with genetic algorithm", Expert Systems with Applications, Vol.42, No.1(2015), 146-155./
|
|
4 |
Statistics Korea, "E-commerce and Cyber Shopping," Statistics Korea, 2014./
|
|
5 |
Indeed.com, Slideshare (2014) http://www.indeed.com/cmp/Slideshare/
|
|
6 |
Kim, T. H., Threat of Mobile Payment Security in Chaina, Boannews, 2014.05.01. Available at http://www.boannews.com/media/view.asp?idx=40843&kind=0/
|
|
7 |
Insight Report: Investors in Cards and Payments, Timetric, 2014. Available at http://marketreportsstore.com/insight-report-investors-in-cards-and-payments//
|
|
8 |
Jang, S. H., J. H. Lee, G. Y. Seung, and J. M. Oh, M-Payment: All about Mobile Payments, Cloud Nine, 2014/
|
|
9 |
Jo, H. K., Security Threats around the Mobile Card, AsiaToday, 2014.05.12. Available at http://www.asiatoday.co.kr/view.php?key=20140512010003357/
|
|
10 |
Ghazanfar, M. A. and A. Prügel-Bennett, "Leveraging Clustering Approaches to Solve the Gray-Sheep Users Problem in Recommender Systems," Expert Systems with Applications, Vol.41, No.7 (2014): 3261-3275./
|
|