Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Jing Ju Liu"'
Autor:
Han-xin Wei, Dao-fa Ying, Jing-ju Liu, Yang Lv, Yu-tao Liu, Jiang-feng Wang, Xuan-lin Gong, Mu-yang Zhou, Zuo-sheng Li, Kuo Chen, Luo-jia Chen, Chuan-ping Wu, Bao-hui Chen
Publikováno v:
Materials Today Advances, Vol 22, Iss , Pp 100502- (2024)
The LiFePO4 material continue to suffer from poor rate performance. Nanosized LFP can improve rate performance; however, nanofabrication typically requires expensive organic matter and high-pressure-resistant equipment. The current widely used solid-
Externí odkaz:
https://doaj.org/article/6f351609f60a49aba9d4030ec8613b52
Publikováno v:
International Journal of Medicinal Mushrooms. 23:27-39
We analyzed the biological activity and composition of total triterpenoids extracted from the liquid fermentation culture of the medicinal mushroom Sanghuangporus sanghuang. S. sanghuang total triterpenoid extract (STTE) had the strongest inhibitory
Publikováno v:
Archives of microbiology. 204(1)
Strain XQZ8
Publikováno v:
Mathematical Biosciences and Engineering, Vol 17, Iss 4, Pp 2950-2966 (2020)
The polynomial-based image secret sharing (ISS) scheme encodes a secret image into n shadows assigned to n participants. The secret image with high resolution is decoded by Lagrange interpolation when collecting any k or more shadows. Thus, ISS is us
Autor:
Jing-Ju Liu, Yong-jie Wang
Publikováno v:
2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control.
It is very important to study computer network intrusion effect evaluation on studying security of computer network information system and harmfulness of computer network intrusion behavior. This is a concise overview paper about main research result
Publikováno v:
2010 2nd International Conference on Computer Engineering and Technology.
Knowledge-based Fuzzing technology successfully applies in software vulnerability mining, however, current Fuzzing technology mainly focuses on fuzzing target software based on single data sample and thus the vulnerability mining results are not stab
Publikováno v:
2010 2nd International Conference on Computer Engineering & Technology (ICCET); 2010, pV2-V145, 283p