Zobrazeno 1 - 10
of 59
pro vyhledávání: '"Zhu Yan-Qin"'
Autor:
Chen, Hui, Cheng, Meng-Cheng, Sun, You, Zhu, Yan-Qin, Sun, Li-Xin, Zhang, Yu-Xuan, Feng, Bin-Bin, Wu, Guo-Cui
Publikováno v:
In Heliyon 15 July 2024 10(13)
Publikováno v:
In Journal of Photochemistry & Photobiology, A: Chemistry 1 March 2017 336:115-122
Publikováno v:
Tongxin xuebao, Vol 31, Pp 64-71 (2010)
Scalability is the mainly problem that impedes the extensive deployment of multicast in MPLS networks. An aggregation algorithm for multicast flow based on bidirectional shared tree was proposed in order to resolve the problem. The aggregated degrees
Externí odkaz:
https://doaj.org/article/649dc427351244319d39747be828f1f3
Publikováno v:
In Journal of Molecular Catalysis. B, Enzymatic 2006 43(1):80-85
Publikováno v:
Research on Chemical Intermediates. Apr2014, Vol. 40 Issue 4, p1641-1653. 13p.
Publikováno v:
Acta Physico-Chimica Sinica. 27:2887-2892
Autor:
Feng, Suyin1,2,3,4,5 (AUTHOR), Zhu, Long2,4,5 (AUTHOR), Qin, Yan6 (AUTHOR), Kou, Kun2 (AUTHOR), Liu, Yongtai2 (AUTHOR), Zhang, Guangmin2 (AUTHOR), Wang, Ziheng7,8 (AUTHOR) zihengwang@um.edu.mo, Lu, Hua1 (AUTHOR) luhua1969@hotmail.com, Sun, Runfeng4,5 (AUTHOR) 13851211100@139.com
Publikováno v:
Biology Direct. 11/12/2024, Vol. 19 Issue 1, p1-19. 19p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Zuo, Xiaoqiong1 (AUTHOR) zxq20150927@163.com, Pan, Lixia1 (AUTHOR) panlixia@gxas.cn, Zhang, Wenchao1 (AUTHOR) seven_0807@163.com, Zhu, Jing2 (AUTHOR) zj39330@163.com, Qin, Yan1 (AUTHOR) flyswallow2001@163.com, Xu, Xiuying1 (AUTHOR) xuxiuyingchina@163.com, Wang, Qingyan1 (AUTHOR) qingyanw@126.com
Publikováno v:
Molecules. Jul2024, Vol. 29 Issue 13, p3242. 15p.
Autor:
Zhu Yan-qin, Xie Juan
Publikováno v:
2010 Second International Conference on Computer Engineering and Applications.
The purpose of association rule mining is to reveal patterns of kinds of knowledge that are not easy to find. However, it may constitute a threat to privacy and information security, even more, seriously limit the development of the application of da