Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Huazhong University of Science and Technology(Nature Science)
1671-4512
2002 Issue 1
Analysis of stress field of finite plates weakened by holes
zhang tao ; liu tu guang ; zhao yao ; liu jing xi
..............
page:87-89
Compression of bonded circular rubber bearing and its shearing behaviors
zuo xiao bin ; zhu jing sun ; zhu hong ping
..............
page:90-92
The impact of the particle sizes of the pulverized-coal on desulfurization by microwave radiation
cheng rong ; qiu ji hua ; you jun
..............
page:93-95
Quasi-constant temperature combustion & its effects on performances of coal-fired boiler
chen dong lin ; zheng chu guang
..............
page:96-99
SO2 formation characteristics of coal in O2/CO2 mixture
wang hong ; qiu jian rong ; zheng chu guang
..............
page:100-102
(Q,r) inventory model with random lead time and partial backlogging
mao xiao li
..............
page:103-105
Growth option value of target companies in M&A
liu yan ; yu li feng ; liu ying ; zou shan gang
..............
page:106-108
Comparison theorem of infinite horizon backward stochastic differential equation
zhou shao fu ; wei zheng hong
..............
page:109-110,113
Evaluation regulations on designing prefilters for multiwavelet transforms
li hong ; xu yong bing
..............
page:111-113
Comparing general relativistic effective potential with pseudo-newtonian effective potential
xiao kan ; wang ding xiong ; lei wei hua
..............
page:114-116
Dynamic interactions among a moving train, its supporting railway track structure and bridge structure
cheng yuan sheng
..............
page:84-86
Analysis of dynamic response of multi-span beams caused by moving vehicles
cheng yuan sheng
..............
page:81-83
Ductile damage model and its experimental validation
fan jian ping ; zhang jian jun ; chen chuan yao
..............
page:78-80
Measurement and compensation of the volumetric errors of CNC machine tools without the use of an error model
zhang hu ; zhou yun fei ; tang xiao zuo ; shi han min
..............
page:74-77
Investigation on optimizing inventory for work-in-process among operations
zhang jie ; wang yu ; liu shi ping ; li pei gen
..............
page:71-73
Research and development of a multi-user virtual reality system
ren ai hua ; li shi qi ; zheng jian ming
..............
page:68-70
Modeling and solution for layout design in cellular manufacturing system
zhou yi bo ; li zhi hua ; dai tong ; zhong yi fang
..............
page:65-67
The analysis of failure of PDC well bits
li guo an ; song quan sheng
..............
page:62-64
Arithmetic for NURBS curve fitting of STL slice data
han ming ; kong ya zhou ; yu hong ; huang shu huai
..............
page:59-61
Computer control technology for laser rapid prototyping system
xiong xiao hong ; huang shu huai
..............
page:56-58
Automatic test system for PTCR voltage-withstanding
li bu yin ; zhou dong xiang ; pan wu fei ; zeng yi ke
..............
page:53-55
Pattern discrimination by using joint haar wavelet transform correlator
song hong bo ; chen hai qing
..............
page:50-52
Customer audit mode based on integrative EDI system
luo jia jun ; ming de lie
..............
page:47-49
An energy model of automatic fire detection and its application
li jian ; wang shu ; zuo shu ; zuo zheng
..............
page:44-46
Fusion method state target on infinite normal number
xu zuo ; jin yi hui ; zhou yan ; yang rui juan
..............
page:41-43
Principal axes method for three-dimensional image registration
hu jiu xiang ; ding guo zhi
..............
page:38-40
Internet image download system via multi-agent
wang zuo ; zhou cheng ping ; ding ming yue
..............
page:35-37
Indexing mobile object′s position
wang yuan zhen ; tu xiao ming ; li dong
..............
page:32-34
Study on attribute certificates-based access control based on web workflow system
chen chuan bo ; yuan zuo
..............
page:29-31
Analysis and amendment of the internet key exchange protocol based on pre-share-key
qin lei hua ; yu sheng sheng ; zhou jing li
..............
page:26-28
Analyzing and improving the Epckpt:truly-transparent checkpointing
deng xiao bing ; pang li ping
..............
page:23-25
A research on hiberarchy architecture and algorithmic description in battlefield simulations
xiong wei ; chen xue guang
..............
page:12-14
A new scheme for integration transmission based on PRMA wireless networks
wen yuan bao ; rao bo
..............
page:15-16,22
Task-based access control model and its implementation
hong fan ; zhao xiao zuo
..............
page:17-19
Authorization model for multilevel security workflow
hong fan ; li jing
..............
page:20-22
Studying and modeling MIMO pseudolinear neural networks
li yu yun ; wang yong zuo ; liu zuo ; wu qing
..............
page:1-3
A neural network algorithm for pole assignment in linear systems
wang zhong sheng ; he han lin ; liao xiao zuo
..............
page:4-5,8
Impulsive controller design and robust stability of quasilinear differential systems
liu bin ; zeng zuo li ; liao xiao zuo ; liu xin zhi
..............
page:6-8
Partner selection of virtual enterprise in network environment
lu hong yan ; chen xue guang
..............
page:9-11