Showing 1 - 20 results of 55 for search 'Yang Geng', query time: 0.09s
Refine Results
-
1
Hippocampal Neuron Dissociation Transfection and Culture in Microfluidics Chambers by Yang Geng
Published 2012-07-01
Article -
2
Filtration and adsorption of low concentration phosphate by dolomite-biochar composite membrane by XI Huan, YANG Geng
Published 2024-07-01
Article -
3
Research Progress of Compression Heat Pump Coupled with Heat Storage of Phase Change Materials by Yang Geng, Xiao Xin, Wang Yunfeng
Published 2025-02-01
Article -
4
A privacy-preserving parallel and homomorphic encryption scheme by Min Zhaoe, Yang Geng, Shi Jingqi
Published 2017-04-01
Article -
5
Hybird group key management scheme for wireless sensor networks by CHEN Yan-li1, YANG Geng3
Published 2010-01-01
Article -
6
Hybird group key management scheme for wireless sensor networks by CHEN Yan-li1, YANG Geng3
Published 2010-01-01
Article -
7
Taxonomic notes on Sorbus megalocarpa (Rosaceae) and related taxa by Xin Chen, JianHui Ma, LiYang Geng
Published 2022-06-01
Article -
8
The role of fluid viscosity in an immersed granular collapse by Yang Geng Chao, Kwok Chung Yee, Sobral Yuri Dumaresq
Published 2017-01-01
Article -
9
-
10
Crystal structure of 2,2′-biimidazolium bis(dihydrogen phosphate), [C6H8N4][H2PO4]2 by Yang Geng-Xu, Zhang Shi-Zhen, Wang Zi-Liang
Published 2010-03-01
Article -
11
Research of connectivity for wireless sensor networks by HUANG Xiao 1, CHENG Hong-bing 1, YANG Geng1
Published 2009-01-01
Article -
12
ABE-IBS based signature-encryption method for WSN by QI Zheng-hua, YANG Geng, REN Xun-yi, WANG Hui
Published 2010-01-01
Article -
13
-
14
Research of connectivity for wireless sensor networks by HUANG Xiao 1, CHENG Hong-bing 1, YANG Geng1
Published 2009-01-01
Article -
15
Bayesian network-based video QoE assessment method using image sustained damage analysis by Yang GENG, Su-jie SHAO, Shao-yong GUO, Peng YU
Published 2017-06-01
Article -
16
ABE-IBS based signature-encryption method for WSN by QI Zheng-hua, YANG Geng, REN Xun-yi, WANG Hui
Published 2010-01-01
Article -
17
Bayesian network-based video QoE assessment method using image sustained damage analysis by Yang GENG, Su-jie SHAO, Shao-yong GUO, Peng YU
Published 2017-06-01
Article -
18
-
19
-
20
LEACH protocol based security mechanism for Sybil attack detection by CHEN Shan-shan1, YANG Geng2, CHEN Sheng-shou2
Published 2011-01-01
Article