J. KIMS Technol Search

CLOSE


Search

  • HOME
  • Search
Fuzzy Rule-Based Method for Air Threat Evaluation
Byeong Ju Choi, Ji Eun Kim, Jin Soo Kim, Chang Ouk Kim
J. KIMS Technol. 2016;19(1):57-65.
PDF    
The Design and Implementation for Efficient C2A
Cheol-Hee Kwon, Dong-Ho Hong, Dong-Yun Lee, Jong-Soon Lee, Young-Vin Kim
J. KIMS Technol. 2009;12(6):733-738.
PDF    


ABOUT
ARTICLE CATEGORY

Browse all articles >

BROWSE ARTICLES
FOR CONTRIBUTORS
Editorial Office
160 Bugyuseong-daero 488beon-gil, Yuseong-gu, Daejeon 34060, Korea
Tel: +82-42-823-4603    Fax: +82-42-823-4605    E-mail: kimst@kimst.or.kr                

Copyright © 2024 by The Korea Institute of Military Science and Technology.

Developed in M2PI

Close layer
prev next