Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Gil-Han Kim"'
Autor:
Hye Rin Jeong, Jong Min Kim, Jong Hyun Moon, Min Ji Kim, Gil Han Kim, Uk Lee, Seon Kyeong Park, Hyo Won Park, Jin Yong Kang, Hyo Lim Lee, Ho Jin Heo
Publikováno v:
Journal of the Korean Society of Food Science and Nutrition. 50:445-455
Autor:
Chulwoo Kim, Shineunjin, Jong Hyun Moon, Jin Yong Kang, Heo Ho Jin, kim jongmin, Seon Kyeong Park, Lee Uk, Hyun-Jin Kim, Gil Han Kim
Publikováno v:
Journal of the Korean Society of Food Science and Nutrition. 49:907-918
Autor:
Chulwoo Kim, Jong-Hyun Moon, Eui-Cheol Shin, kim jongmin, Lee Uk, Kang Jin Yong, Shineunjin, Heo Ho Jin, Seon Kyeong Park, Gil Han Kim, Han Hye Ju
Publikováno v:
Journal of the Korean Society of Food Science and Nutrition. 49:608-616
Autor:
Selvaraj Poonguzhali, Tongmin Sa, Munusamy Madhaiyan, Gil-Han Kim, P. Indiragandhi, Venkatakrishnan Sivaraj Saravanan, Rangasamy Anandham
Publikováno v:
Journal of Applied Microbiology. 103:2664-2675
Aims: To evaluate whether the gut bacteria of insecticide-resistant, insecticide-susceptible and field-caught populations of the lepidopteran insect pest diamondback moth (DBM) –Plutella xylostella (L.) – are variable and their role in host prote
Publikováno v:
Journal of Asia-Pacific Entomology. 9:275-280
Mating behavior of the pine sawyer, Monochamus saltuarius Gebier (Cerambycidae: Lamiinae) was observed on pine trees in an outdoor net cage kept in one healthy pine tree and a cluster of pinelogs (cut over one month) to attract the beetles. When sawy
Autor:
Pandiyan Indira Gandhi, Tongmin Sa, Kulaiyappa Gunasekaran, Keun-Yook Chung, Rangasamy Anandham, Selvaraj Poonguzhali, Gil-Han Kim
Publikováno v:
Journal of Asia-Pacific Entomology. 8:381-386
Laboratory experiment was conducted to compare the relative toxicity of biopesticides like Pseudomonas fluorescens strain pfl and neem oil with imidacloprid, quinalphos, and endosulfan against an egg parasitoid, Trichogramma chilonis, and a predatory
Autor:
Gil-Han Kim, Hyung-Woo Lee
Publikováno v:
Computational Science and Its Applications-ICCSA 2006 ISBN: 9783540340799
ICCSA (5)
ICCSA (5)
The existing well-known network based intrusion detection / prevention techniques such as the misuse detection technique, etc., are widely used. However, because the misuse detection based intrusion prevention system is proportionally depending on th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::389837f40a4488df103587c897539019
https://doi.org/10.1007/11751649_31
https://doi.org/10.1007/11751649_31