Showing 1 - 20 results of 45 for search 'Rong Gong', query time: 0.09s
Refine Results
-
1
Calciphylaxis in patient with peritoneal dialysis: A case report by Yunlei Deng, Ying Shu, Rong Gong
Published 2020-01-01
Article -
2
-
3
Chaos Elite Harris Hawk Optimization Algorithm to Solve Chemical Dynamic Optimization Problems by Lila Hong, Yuanbin Mo, Dongxue Bao, Rong Gong
Published 2022-01-01
Article -
4
-
5
Ghd8 controls rice photoperiod sensitivity by forming a complex that interacts with Ghd7 by Peng Wang, Rong Gong, Ying Yang, Sibin Yu
Published 2019-11-01
Article -
6
-
7
The $$Z_c(3900)$$ Zc(3900) peak does not come from the “triangle singularity” by Qin-Rong Gong, Jing-Long Pang, Yu-Fei Wang, Han-Qing Zheng
Published 2018-03-01
Article -
8
-
9
-
10
-
11
-
12
Bankline extraction in remote sensing images using principal curves by Yun GUO, Yi-huai WANG, Chun-ping LIU, Sheng-rong GONG, Yi JI
Published 2016-11-01
Article -
13
Bankline extraction in remote sensing images using principal curves by Yun GUO, Yi-huai WANG, Chun-ping LIU, Sheng-rong GONG, Yi JI
Published 2016-11-01
Article -
14
Local density-based similarity matrix construction for spectral clustering by Jian WU, Zhi-ming CUI, Yu-jie SHI, Sheng-li SHENG, Sheng-rong GONG
Published 2013-03-01
Article -
15
Penetration test method using blind SQL injection based on second-order fragment and reassembly by De-guang LE, Sheng-rong GONG, Shao-gang WU, Feng XU, Wen-sheng LIU
Published 2017-10-01
Article -
16
Research on OLE object vulnerability analysis for RTF file by De-guang LE, Liang ZHANG,Li-xin ZHENG, Sheng-rong GONG, Shao-gang WU
Published 2016-01-01
Article -
17
Research on OLE object vulnerability analysis for RTF file by De-guang LE, Liang ZHANG, Sheng-rong GONG, Li-xin ZHENG, Shao-gang WU
Published 2016-01-01
Article -
18
Quantification and Distribution of Thiols in Fermented Grains of Sauce-Aroma Baijiu Production Process by Danhua Xiang, Peiqi Li, Rong Gong, Yanbin Sun, Xiangmei Chen, Heli Wei, Yan Xu
Published 2023-07-01
Article -
19
-
20
Penetration test method using blind SQL injection based on second-order fragment and reassembly by De-guang LE, Sheng-rong GONG, Shao-gang WU, Feng XU, Wen-sheng LIU
Published 2017-10-01
Article