Search

Your search keyword '"Xiaoqi Ma"' showing total 126 results

Search Constraints

Start Over You searched for: Author "Xiaoqi Ma" Remove constraint Author: "Xiaoqi Ma"
126 results on '"Xiaoqi Ma"'

Search Results

51. Pulsed ultrasound prevents lipopolysaccharide-induced muscle atrophy through inhibiting p38 MAPK phosphorylation in C2C12 myotubes

52. Damaged mechanism analysis of FET under lightning

53. Early summer hydroclimatic signals are captured well by tree-ring earlywood width in the eastern Qinling Mountains, central China

54. Analysis on corona discharge electrical characteristics of wind turbine blades

55. Analysis of transistor damage mechanism and protection measures under lightning voltage

57. ARID3A enhances chemoresistance of pancreatic cancer via inhibiting PTEN-induced ferroptosis

58. Cascading implications of a single climate change event for fragile ecosystems on the Qinghai‐Tibetan Plateau

59. A bibliometric analysis of comparative research on the evolution of international and Chinese green supply chain research hotspots and frontiers

60. A novel model of liquid film flow and evaporation for thermal protection to a chamber with high temperature and high shear force

61. Analysis on lightning electromagnetic fields received by antenna and electric field change instrument

62. Defective Anatase TiO2−x Mesocrystal Growth In Situ on g-C3 N4 Nanosheets: Construction of 3D/2D Z-Scheme Heterostructures for Highly Efficient Visible-Light Photocatalysis

64. Finite element method on Shishkin mesh for a singularly perturbed problem with an interior layer

65. Influence of surface pinning in the domain on the magnetization dynamics in permalloy striped domain films

66. Multiple order spin-wave resonance in composition gradient sputtering FeCoB thin films

67. December-March temperature reconstruction from tree-ring earlywood width in southeastern China during the period of 1871-2016

68. Identifying influential spreaders by gravity model

69. NHL pathological image classification based on hierarchical local information and GoogLeNet-based representations

70. Transfer Learning and Fusion Model for Classification of Epileptic PET Images

71. Tree-ring δ18O from Southeast China reveals monsoon precipitation and ENSO variability

72. Time series of Inland Surface Water Dataset in China (ISWDC) for 2000–2016 derived from MODIS archives

73. Warm-season hydroclimate variability in Central China since 1866 AD and its relations with the East Asian Summer Monsoon: evidence from tree-ring earlywood width

74. Defective Anatase TiO

75. The polycomb group protein Yaf2 regulates the pluripotency of embryonic stem cells in a phosphorylation-dependent manner

77. Construction of Pancreatic Cancer Classifier Based on SVM Optimized by Improved FOA

79. Metabolic reprogramming of cancer-associated fibroblasts in pancreatic cancer contributes to the intratumor heterogeneity of PET-CT

80. Implementation of Hybrid Artificial Intelligence Technique to Detect Covert Channels Attack in New Generation Internet Protocol IPv6

81. Circular partially coherent flattened Gaussian beam

82. Numerical simulations of the discontinuous progression of cerebral aneurysms based on fluid-structure interactions study

83. A new biometric ID-based cryptography protocol and security analysis using Petri nets

84. Analysis of Security Protocols using Finite-State Machines

85. Formal verification of the Merchant Registration phase of the SET protocol

86. Biometric identity-based cryptography for e-Government environment

87. The Research and Application of The Hard Roofs Forced Caving Technology in Short Wall Stopes

88. Modelling and Simulation of a Biometric Identity-Based Cryptography

89. Crosstalk between cancer-associated fibroblasts and immune cells in the tumor microenvironment: new findings and future perspectives

90. Warm-season hydroclimate variability in Central China since 1866 AD and its relations with the East Asian Summer Monsoon: evidence from tree-ring earlywood width.

91. Analysing the EAP-TLS handshake and the 4-way handshake of the 802.11i standard

92. Analysing and attacking the 4-way handshake of IEEE 802.11i standard

93. Security Concerns in Cloud Computing

94. Database Deductive Access Control

95. Mechanical Verification of Cryptographic Protocols

96. On the Secure Sharing of Legacy Data

97. A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries

98. Verifying security protocols by knowledge analysis

99. A Mobile Agent Based Spam Filter System

100. NiCo2S4 on yeast-templated porous hollow carbon spheres for supercapacitors

Catalog

Books, media, physical & digital resources