Protective Mechanism of Gandou Decoction in a Copper-Laden Hepatolenticular Degeneration Model: In Vitro Pharmacology and Cell Metabolomics
Yin, Fengxia, Nian, Mengnan, Wang, Na, Wu, Hongfei, Wu, Huan, Zhao, Wenchen, Cao, Shijian, Wu, Peng, Zhou, An
Published in Frontiers in pharmacology (23.03.2022)
Published in Frontiers in pharmacology (23.03.2022)
Get full text
Journal Article
In vivo and in vitro development of Tibetan antelope ( Pantholops hodgsonii) interspecific cloned embryos
SU, Guanghua, CHENG, Lei, GAO, Yu, LIU, Kun, WEI, Zhuying, BAI, Chunling, YIN, Fengxia, GAO, Li, LI, Guangpeng, BOU, Shorgan
Published in Frontiers of Agricultural Science and Engineering (01.02.2014)
Published in Frontiers of Agricultural Science and Engineering (01.02.2014)
Get full text
Journal Article
Metabolomic and biochemical changes in the plasma and liver of toxic milk mice model of Wilson disease
Liu, Qiao, Wu, Xiaoyuan, Liu, Cuicui, Wang, Ni, Yin, Fengxia, Wu, Huan, Cao, Shijian, Zhao, Wenchen, Wu, Hongfei, Zhou, An
Published in Journal of pharmaceutical and biomedical analysis (15.08.2024)
Published in Journal of pharmaceutical and biomedical analysis (15.08.2024)
Get full text
Journal Article
Document similarity calculation model of CSLN
Weiling Chen, Gang Wang, Fengxia Yin
Published in 2014 IEEE 5th International Conference on Software Engineering and Service Science (01.06.2014)
Published in 2014 IEEE 5th International Conference on Software Engineering and Service Science (01.06.2014)
Get full text
Conference Proceeding
Community Discovery Algorithm of Citation Semantic Link Network
Weiling Chen, Fengxia Yin, Gang Wang
Published in 2013 Sixth International Symposium on Computational Intelligence and Design (01.10.2013)
Published in 2013 Sixth International Symposium on Computational Intelligence and Design (01.10.2013)
Get full text
Conference Proceeding
Study on Service Selections Based on Ontology and Qos
Wang Gang, Yin Fengxia
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding