Wound Healing Effect by 633 nm Wavelength Using LED Irradiator (English)
- New search for: Lee, Yang-Sun
- New search for: Kim, Tae-Gon
- New search for: Cheon, Min-Woo
- New search for: Park, Jong Hyuk (James)
- New search for: Kim, Jongsung
- New search for: Zou, Deqing
- New search for: Lee, Yang Sun
- New search for: Lee, Yang-Sun
- New search for: Kim, Tae-Gon
- New search for: Cheon, Min-Woo
In:
Information Technology Convergence, Secure and Trust Computing, and Data Management
: ITCS 2012 & STA 2012
;
Chapter: 7
;
41-46
;
2012
- Article/Chapter (Book) / Electronic Resource
-
Title:Wound Healing Effect by 633 nm Wavelength Using LED Irradiator
-
Additional title:Lect. Notes Electrical Eng.
-
Contributors:Park, Jong Hyuk (James) ( editor ) / Kim, Jongsung ( editor ) / Zou, Deqing ( editor ) / Lee, Yang Sun ( editor ) / Lee, Yang-Sun ( author ) / Kim, Tae-Gon ( author ) / Cheon, Min-Woo ( author )
-
Published in:Information Technology Convergence, Secure and Trust Computing, and Data Management : ITCS 2012 & STA 2012 ; Chapter: 7 ; 41-46Lecture Notes in Electrical Engineering ; 180 ; 41-46
-
Publisher:
- New search for: Springer Netherlands
-
Place of publication:Dordrecht
-
Publication date:2012-01-01
-
Size:6 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Implementing Business/IT Projects Alignment through the Project Portfolio Approval ProcessJuiz, Carlos / Gómez, Mercedes / Isabel Barceló, M. et al. | 2012
- 2
-
A Design of IoT Based Agricultural Zone Management SystemKang, Hyunjoong / Lee, Junwook / Hyochan, Bang / Kang, Sungsoo et al. | 2012
- 3
-
A Design of Plant Factory Environment Control SystemPark, Dae-Heon / Son, Kyo-Hoon / Kim, Se-Han et al. | 2012
- 4
-
A Study on Ubiquitous Business Process Management for Real-Time Open USN Mash-Up ServicesYoo, Yoon-Sik / Yu, Jaehak / Lee, Byung-Bog / Bang, Hyo-Chan et al. | 2012
- 5
-
Adaptive Auto Bias Control in Wireless Communication SystemsLee, Yong-chul / Lee, Sok-Kyu / Cho, Woong et al. | 2012
- 6
-
Comparison of Temperature in the Deep Part of the Dummy by the Electronic Moxibustion and the Gu-Gwan MoxibustionCheon, Min-Woo / Kim, Tae-Gon / Youn, Dae-Hwan / Nam, Ki-Won / Na, Chang-Su / Kim, Young-Eok / Lee, Jung-Chul et al. | 2012
- 7
-
Wound Healing Effect by 633 nm Wavelength Using LED IrradiatorLee, Yang-Sun / Kim, Tae-Gon / Cheon, Min-Woo et al. | 2012
- 8
-
Development and Evaluation of an In-Vehicle Haptic Navigation SystemHwang, Jungsik / Chung, Kyungmi / Hyun, Jinshil / Ryu, Jeha / Cho, Kwangsu et al. | 2012
- 9
-
Modeling of Energy Consumption for K-Coverage in Wireless Sensor NetworksShah, Babar / Kim, Ki-Il et al. | 2012
- 10
-
Natural Language Processing for Modeling Stable Writing Characteristics of UsersLee, Namseok / Cho, Kwangsu et al. | 2012
- 11
-
Electronic Cane Usability for Visually Impaired PeopleKim, Sung Yeon / Cho, Kwangsu et al. | 2012
- 12
-
Solving Traffic Assignment Problem by an Improved Particle Swarm Optimization and a Segmented Impedance FunctionHongwei, Ge / Qiaoxia, Zhang / Fan, Wang et al. | 2012
- 13
-
3D Reconstruction for Internal Organs Based on Improved Gray-Coded Structured LightChen, Yanjun / Zuo, Wangmeng / Li, Zhaoxin / Wang, Kuanquan et al. | 2012
- 14
-
Adaptive Resource Control Strategy over Cognitive Networks for Multimedia ServicesKang, Moonsik / Lee, Kilhung et al. | 2012
- 15
-
Towards a Trusted Vehicular Routing in VANETChuan, Deng et al. | 2012
- 16
-
Forensic Analysis of Digsby Log Data to Trace Suspected User ActivitiesYasin, Muhammad / Abulaish, Muhammad / Elmogy, Muhammad Nour Naeem et al. | 2012
- 17
-
SDSPF: A Secure Data Storage and Processing Framework for Cloud Computing SystemsRan, Longbo / Jin, Hai et al. | 2012
- 18
-
Data Consistency for Self-acting Load Balancing of Parallel File SystemGuoying, Li / Bin, Dong / Xiuqiao, Li / Qimeng, Wu / Qianqian, Zhong / Mingfa, Zhu / Limin, Xiao / Li, Ruan et al. | 2012
- 19
-
Isomorphism Classes of Jacobi Quartic Curve over Finite FieldsWu, Hongfeng / Feng, Rongquan et al. | 2012
- 20
-
Fingerprinting Data Based on Secret MaskChoi, Heesook / Reuther, Phyllis et al. | 2012
- 21
-
Packet-Based Quality Measurement and Analysis for Mobile VoIP ServiceJoo, Hae-Jong / Hong, Bong-Hwa / Lee, Eu-Soo / Choi, Hae-Kil et al. | 2012
- 22
-
The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart PhoneChu, Hai-Cheng / Yang, Szu-Wei / Wang, Shiuh-Jeng / Park, Jong Hyuk et al. | 2012
- 23
-
Email Encryption System Using Certificateless Public Key Encryption SchemeEr, Yee-Lee / Yau, Wei-Chuen / Tan, Syh-Yuan / Goi, Bok-Min et al. | 2012
- 24
-
Methodology for Digital Investigation of Illegal Sharing Using BitTorrentPark, Sooyoung / Chung, Hyunji / Lee, Changhoon / Lee, Sangjin et al. | 2012
- 25
-
Methodology for Digital Forensic Investigation of iCloudLee, Jeehee / Chung, Hyunji / Lee, Changhoon / Lee, Sangjin et al. | 2012
- 26
-
Analysis Framework to Detect Artifacts of Portable Web BrowserChoi, Jong-Hyun / Lee, Keun-gi / Park, Jungheum / Lee, Changhoon / Lee, Sangjin et al. | 2012
- 27
-
Performance Analysis of Zone Based Routing by Varying Radius of Zone Using Ant Colony in MANETKumar, Neeraj / Kim, Jongsung et al. | 2012
- 28
-
Security Analysis of Authentication Scheme for Wireless Communications with User AnonymityJeon, Woongryul / Kim, Jeeyeon / Lee, Youngsook / Won, Dongho et al. | 2012
- 29
-
Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server EnvironmentKim, Mijin / Park, Namje / Won, Dongho et al. | 2012
- 30
-
Design of a Simple User Authentication Scheme Using QR-Code for Mobile DeviceLee, Youngsook / Kim, Jeeyeon / Jeon, Woongryul / Won, Dongho et al. | 2012
- 31
-
Customizing Data Analysis Using Forensic Approach in Personalized RFID for Access Control of Student’s Harmful ContentsKim, Youngsoo / Park, Namje et al. | 2012
- 32
-
Elementary Education of Creativity Improvement Using Rube Goldberg’s InventionKim, Yilip / Park, Namje et al. | 2012
- 33
-
Mobile RFID/NFC Linkage Based on UHF/HF Dual Band’s Integration in U-Sensor Network EraPark, Namje et al. | 2012
- 34
-
Security Balancing for IT-Enabled Service InnovationChen, Ada Hui-Chuan / Chu, Huei-Chung / Wu, Sou-Chein et al. | 2012
- 35
-
The Electronic Bidding System Based on Public Key InfrastructureChu, Huei-Chung / Chen, Ada Hui-Chuan et al. | 2012
- 36
-
High-Capacity Steganographic Method Based on Division Arithmetic and LSB ReplacementKuo, Wen-Chung / Chen, Yi-Heng / Huang, Yu-Chih et al. | 2012