Author of the publication

Synthesis and Characterization of Eco-friendly Composite: Poly(Ethylene Glycol)-Grafted Expanded Graphite/Polyaniline.

, , , , , , , , , and . CSEE (1), volume 214 of Communications in Computer and Information Science, page 501-506. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Qing, Xin
add a person with the name Qing, Xin
 

Other publications of authors with the same name

Synthesis and Characterization of Eco-friendly Composite: Poly(Ethylene Glycol)-Grafted Expanded Graphite/Polyaniline., , , , , , , , , and . CSEE (1), volume 214 of Communications in Computer and Information Science, page 501-506. Springer, (2011)Classification of Cetacean Whistles Based on Convolutional Neural Network., , , , and . WCSP, page 1-5. IEEE, (2018)Response of cerebral tissue oxygenation and arterial blood pressure to postural change assessed by wavelet phase coherence analysis., , , , and . BMEI, page 373-377. IEEE, (2014)Assessing the prefrontal functional connectivity using wavelet coherence analysis of oxygenation signals., , , , and . BMEI, page 273-277. IEEE, (2014)A knowledge-based problem solving method in GIS application., , and . Knowl.-Based Syst., 24 (4): 542-553 (2011)Knowledge Induction for Injection Mould Repairs Based on Rough Set., , and . FSKD (2), page 166-171. IEEE Computer Society, (2008)978-0-7695-3305-6.Fusion of reverse hierarchical alignment for Web-based English-Chinese bilingual dictionary construction., , , , and . ICMLC, page 1288-1293. IEEE, (2010)Efficiently determining a locally exact shortest path on polyhedral surfaces., and . Computer-Aided Design, 39 (12): 1081-1090 (2007)The Design and Implementation of a Novel Distributed Multi-Sensor Information Fusion Simulation System., , and . JSW, 9 (5): 1081-1088 (2014)Infection, imitation and a hierarchy of computer viruses., , and . Computers & Security, 25 (6): 469-473 (2006)