Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Shandong University(Natural Science)
1671-9352
2013 Issue 7
Chemical constituents of Curcuma xanthorrhiza Roxb.and their acetylcholinesterase inhibitory activity
ZHANG Chun-mei;WANG Ji-da;ZHANG Yong-ruisi;FAN Pei-hong
..............
page:20-23
Static output feedback stabilization for a class of nonlinear discrete-time descriptor Markov jump systems
CHEN Nai-xun;MA Shu-ping
..............
page:93-100
Security analysis of the eCK model
NI Liang;CHEN Gong-liang;LI Jian-hua
..............
page:46-50,67
Detailed level-by-level study of dielectronic recombination for neon-like xenon
YANG Jian-hui;FAN Qiang;ZHANG Jian-ping
..............
page:24-28
On Nega-Hadamard transform and negabent functions
ZHUO Ze-peng;CHONG Jin-feng;WEI Shi-min
..............
page:29-32,45
The decision models and coordination of supply chain with one manufacturers and two retailer based on CVaR criterion
XU Bing;JIA Yan-li;LIU Lu
..............
page:101-110
Experimental studies of the apoptosis-inducing effect of betaxolol on human corneal epithelial cells
SUN Qian;FAN Ting-jun;QIU Yue;GE Yuan;YU Miao-miao
..............
page:14-19,28
The RFID card reader system design based on Zigbee technology
RAO Xu-li;ZHANG Mei-ping;XU Li
..............
page:62-67
Research on multiple population genetic algorithm in security software fuzzy test
DU Xiao-jun;LIN Bo-gang;LIN Zhi-yuan;LI Ying
..............
page:79-84,100
Agrobacterium-mediated introduction of insect-resistant genes into tomato
YANG Jun-jie;YU Hui-min;HOU Bing-kai;WANG Xing-zhi
..............
page:9-13
Research on spam identification based on social computing and machine learning
DONG Yuan;XU Ya-bin;LI Zhuo;LI Yan-ping
..............
page:72-78
The location privacy protection method with dispersed sub cloaking region
ZHAO Ze-mao;LI Lin;ZHANG Fan;ZHANG Pin;ZHOU Jian-qin;WANG Jia-bo
..............
page:56-61
An expanded RBAC model of multi-granularity based on trust hierarchies
LU Qing-ping;SU Shou-bao;YU Shu-hao;YANG Liu
..............
page:51-55
Hotspot discussion on decline mechanism of replanted plantation
WANG Hua-tian;WANG Yan-ping
..............
page:1-8
Study on cover songs identification based on phrase content
XU Jie-ping;YIN Hong-yu;FAN Zi-wen
..............
page:68-71,78
Multipath interdomain routing decision verification protocol
QIU Xiu-feng;LIU Jian-wei;WU Qian-hong;LIU Jian-hua
..............
page:39-45
The measure model of environment based interaction
MA Yan-fang;CHEN Liang
..............
page:33-38
t/t-diagnosability and diagnosis algorithm on hierarchical cubic network
LIN Li-mei;ZHOU Shu-ming;XU Li
..............
page:85-92