[1] |
SUN Yuyang, OU Yun, FENG Songlyu, ZHOU Kaiqing.
String Similarity Detection Based on Improved GST Algorithm
[J]. Journal of Jishou University(Natural Sciences Edition), 2021, 42(5): 34-37.
|
[2] |
FANG Hailian, LIU Meiling, LI Shiyao, XIAO Zhuping.
Inhibitory Activity Screening of Extract from Lithocarpus Polystachyus Rehd. Against α-Glucosidase
[J]. Journal of Jishou University(Natural Sciences Edition), 2020, 41(2): 54-57.
|
[3] |
YIN Jie,TANG Pengcheng,LEI Kejun,HU Li,WANG Fang.
Design of Dormitory Security Monitoring System Based on ZigBee and 3G Technology
[J]. Journal of Jishou University(Natural Sciences Edition), 2017, 38(6): 25-31.
|
[4] |
WANG Chengcai, ZHAN Jie, HE Cong.
Design of Visual Door Security System Based on Mobile Phone APP
[J]. Journal of Jishou University(Natural Sciences Edition), 2017, 38(5): 51-58.
|
[5] |
LI Xiao,YU Ji,YU Zhaoshuo,L Wenjiao,ZHONG Xing,MA Chengjin.
Ultrasound-Assisted Extraction of Bighead Carp Viscera Oil and Its Physiochemical Properties
[J]. Journal of Jishou University(Natural Sciences Edition), 2017, 38(1): 49-55.
|
[6] |
LEI Yanjin,SHUAI Hong.
Ecological Security Evaluation of Land in Nan County Based on Entropy
[J]. Journal of Jishou University(Natural Sciences Edition), 2016, 37(4): 40-44.
|
[7] |
LI Ya-Ping, ZHOU Wei-Liang.
Risk of Personal Information Security in the Limited Real-Name Network
[J]. journal6, 2015, 36(6): 30-34.
|
[8] |
ZHANG Guo-Wen, WANG Ya-Ping.
Interaction of Dibutyl Phosphate with Trypsin
[J]. journal6, 2015, 36(1): 46-51.
|
[9] |
ZHU Shao-Ping.
Intrusion Detection of Network Security Based on Semi-Supervision
[J]. journal6, 2014, 35(5): 33-36.
|
[10] |
CHEN Hong-Jiang, PENG Xiao-Lan.
Security Evaluation of Organic Heat Transfer Based on FBF Method
[J]. journal6, 2014, 35(3): 88-92.
|
[11] |
ZHOU Tie, DUAN Ming-Xiu.
Design of Web Content Monitoring System for Intranet Users
[J]. journal6, 2013, 34(2): 36-40.
|
[12] |
HOU Chun-Ming, WANG Ling.
Research on Security Monitor of the Library Network System Based on Filter Drive
[J]. journal6, 2011, 32(4): 46-49.
|
[13] |
LUO Wan-Wen, GAO Fei, ZHOU Xue-Guang.
Survey of Keyword Filtering for Anti-Active Jamming in Chinese
[J]. journal6, 2011, 32(3): 30-35.
|
[14] |
XIAO Min.
Analyses Our system of Housing Accumulation Fund Management Issues
[J]. Journal of Jishou University(Natural Sciences Edition), 2011, 32(2): 118-119.
|
[15] |
XIANG Jin.
Security Analysis of RSA Encryption Algorithm
[J]. journal6, 2011, 32(1): 42-44.
|