Author of the publication

Gene duplication and adaptive evolution of the CHS-like genes within the genus Rheum (Polygonaceae)

, , and . Biochemical systematics and ecology. - Kidlington, Oxford, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Efficient Battery Swapping Service Operation Under Battery Heterogeneity., , , , and . IEEE Trans. Veh. Technol., 69 (6): 6107-6118 (2020)Driving behaviour recognition based on orientation and position deviations., , , , and . Int. J. Sens. Networks, 30 (3): 161-171 (2019)Bibliometric analysis of complementary and alternative medicine research over three decades., , , , and . Scientometrics, 88 (2): 617-626 (2011)Robust Analysis and Parameters Identification of the Nonlinear Multistage Dynamical System in Batch Fermentation of Glycerol., , , and . J. Appl. Math., (2014)Robust optimization for nonlinear time-delay dynamical system of dha regulon with cost sensitivity constraint in batch culture., , , , , , , and . Commun. Nonlinear Sci. Numer. Simul., (2016)Optimal Design of Conic-Cylindrical Gear Reduction Unit Using Fuzzy Physical Programming., , , , and . Intelligent Information Processing, volume 163 of IFIP, page 191-200. Springer, (2004)Simulation analysis of conduction block in myelinated axons induced by high-frequency biphasic rectangular pulses., , , and . IEEE Trans. Biomed. Eng., 53 (7): 1433-1436 (2006)iMetaLab 1.0: a web platform for metaproteomics data analysis., , , , , , and . Bioinform., 34 (22): 3954-3956 (2018)Drug-target interaction prediction: databases, web servers and computational models., , , , , , and . Briefings Bioinform., 17 (4): 696-712 (2016)MinimaLT: minimal-latency networking through better security., , , , and . ACM Conference on Computer and Communications Security, page 425-438. ACM, (2013)