Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Heejun, Kwon"'
Autor:
Dongkyoung Chwa, Heejun Kwon
Publikováno v:
IEEE Access, Vol 10, Pp 35410-35421 (2022)
In this study, nonlinear robust control of robot manipulator systems with completely unknown manipulator dynamics using a system identification and integral sliding mode disturbance observer (SI-ISMDOB)-based sliding mode control (SMC) method is prop
Externí odkaz:
https://doaj.org/article/32a0c4c8a78945af9def9d7b06cb9b94
Publikováno v:
Biotechnology and Bioprocess Engineering. 22:327-338
Fermented milk products were made using a probiotic strain of human origin, Lactobacillus acidophilus n.v. Er2 317/402 strain Narine. The effects of the strain on the texture, rheology, microstructure, and volatile profiling of fermented milk product
Publikováno v:
Korean Journal for Food Science of Animal Resources. 36:635-640
Lactobacillus acidophilus n.v. Er2 317/402 strain Narine is known as a health beneficial functional probiotic culture and supplementary source of nutrition for newborns. In this study, in vitro antimicrobial activities of Narine-lyophilized (Narine-L
Autor:
Myunghee Kim, Heejun Kwon
Publikováno v:
The Korean Journal of Food And Nutrition. 28:728-736
Autor:
Haykuhi, Charchoghlyan, Heejun, Kwon, Dong-Ju, Hwang, Jong Suk, Lee, Junsoo, Lee, Myunghee, Kim
Publikováno v:
Korean Journal for Food Science of Animal Resources
Lactobacillus acidophilus n.v. Er2 317/402 strain Narine is known as a health beneficial functional probiotic culture and supplementary source of nutrition for newborns. In this study, in vitro antimicrobial activities of Narine-lyophilized (Narine-L
Publikováno v:
RACS
With the wide spread uses of the Internet, the number of Internet attacks keeps increasing, and malware is the main cause of most Internet attacks. Malware is used by attackers to infect normal users' computers and to acquire private information as w
Publikováno v:
RACS
As attackers make variants of existing malware, it is possible to detect unknown malware by comparing with already-known malware's information. Control flow graphs have been used in dynamic analysis of program source code. In this paper, we proposed