Search

Your search keyword '"Do‐Hyeon Lee"' showing total 73 results

Search Constraints

Start Over You searched for: Author "Do‐Hyeon Lee" Remove constraint Author: "Do‐Hyeon Lee"
73 results on '"Do‐Hyeon Lee"'

Search Results

1. Surface morphology engineering of metal oxide-transition metal dichalcogenide heterojunction

2. Effect of Cosmetics Use on the In Vitro Skin Absorption of a Biocide, 1,2-Benzisothiazolin-3-one

5. Development of Real-Time Maneuver Library Generation Technique for Implementing Tactical Maneuvers of Fixed-Wing Aircraft

10. Disposition of Aerosols of Isothiazolinone-Biocides: BIT, MIT and OIT

21. Development of Unified High-Fidelity Flight Dynamic Modeling Technique for Unmanned Compound Aircraft

22. Surface Passivation of Layered MoSe

25. Factors influencing patterns of recurrence following pancreaticoduodenectomy for patients with distal bile duct cancer and ampulla of Vater cancer

26. Implementation of tactical maneuvers with maneuver libraries

28. Efficient and Robust Inverse Simulation Techniques Using Pseudo-Spectral Integrator with Applications to Rotorcraft Aggressive Maneuver Analyses

30. Local Toxicity of Biocides after Direct and Aerosol Exposure on the Human Skin Epidermis and Airway Tissue Models

31. A Study on the Flight Path Generation Using Polynomials and Tracking Control

34. Fast and accurate analyses of spacecraft dynamics using implicit time integration techniques

36. Enhanced selective forwarding scheme for alert message propagation in vehicular ad hoc networks

37. Analysis of Packet Forwarding Approaches for QoS Routing in Ad Hoc Wireless Networks

38. An Enhanced Selective Forwarding Scheme for Real-Time Applications in MANETs

39. Enhanced Selective Forwarding Scheme for Alert Message Propagation in VANETs

40. Routing Algorithm Limiting Next Hop Selection Distance in Multi Hop Ad Hoc Networks

41. Derivation and Analysis of Link/Route Maintenance Probability In Multi Hop Mobile Ad Hoc Networks

42. WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks

43. Multi-Stage Intrusion Detection System Using Hidden Markov Model Algorithm

44. An Enhanced Next Hop Selection Scheme for Ad Hoc Wireless Networks

45. An Algorithm for Acquiring Reliable Path in Abnormal Traffic Condition

50. An Access Control Using SPKI Certificate in Peer-to-Peer Environment.

Catalog

Books, media, physical & digital resources