..............page:395-398
..............page:370-374
..............page:456-458
..............page:392-394
..............page:448-451
..............page:375-376,388
..............page:481-485
System Law Intrusion and Recognition
lu chang-jing1; shi kai-quan1; 2(1.department of mathematics and computer science; sanming university; sanming 365004; china; 2.school of mathematics and system science; shandong university; jinan 250100; china; )
..............page:365-369
..............page:433-438
..............page:462-465
..............page:469-472
..............page:402-404
..............page:361-364
..............page:466-468
..............page:422-425
..............page:416-421
..............page:389-391
..............page:430-432
..............page:452-455
..............page:399-401,429
..............page:410-412
..............page:405-409
..............page:473-476
..............page:426-429
..............page:439-442
..............page:413-415
..............page:385-388
..............page:477-480
..............page:443-447
..............page:377-380
..............page:381-384,398
..............page:459-461