Search > Reference Search
Search Result
학술지
No Reference Title /Author/Journal Title Citing Article
1 Chen, C.-H., T.-K. Liu, J.-H. Chou, C.-H. Tasi, and H. Wang, "Optimization of teacher volunteer transferring problems using greedy genetic algorithms", Expert Systems with Applications, Vol.42, No.1(2015), 668-678./   DOI View Article
2 Esen, I. and M. A. Koc, "Optimization of a passive vibration absorber for a barrel using the genetic algorithm", Expert Systems with Applications, Vol.42, No.2(2015), 894-905./   DOI View Article
3 Huang, H.-X., J.-C. Li, and C.-L. Xiao, "A proposed iteration optimization approach integrating backpropagation neural network with genetic algorithm", Expert Systems with Applications, Vol.42, No.1(2015), 146-155./   DOI View Article
4 Statistics Korea, "E-commerce and Cyber Shopping," Statistics Korea, 2014./ View Article
5 Indeed.com, Slideshare (2014) http://www.indeed.com/cmp/Slideshare/ View Article
6 Kim, T. H., Threat of Mobile Payment Security in Chaina, Boannews, 2014.05.01. Available at http://www.boannews.com/media/view.asp?idx=40843&kind=0/ View Article
7 Insight Report: Investors in Cards and Payments, Timetric, 2014. Available at http://marketreportsstore.com/insight-report-investors-in-cards-and-payments// View Article
8 Jang, S. H., J. H. Lee, G. Y. Seung, and J. M. Oh, M-Payment: All about Mobile Payments, Cloud Nine, 2014/ View Article
9 Jo, H. K., Security Threats around the Mobile Card, AsiaToday, 2014.05.12. Available at http://www.asiatoday.co.kr/view.php?key=20140512010003357/ View Article
10 Ghazanfar, M. A. and A. Prügel-Bennett, "Leveraging Clustering Approaches to Solve the Gray-Sheep Users Problem in Recommender Systems," Expert Systems with Applications, Vol.41, No.7 (2014): 3261-3275./   DOI   Ndsl View Article