Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Huazhong University of Science and Technology(Nature Science)
1671-4512
2002 Issue 9
Parameters of the fuel injection in the diesel engine based on the evolutionary RBF neural network
huang qiang ; liu yong chang ; liu hui meng ; zhang jun
..............
page:94-96
An expanding-contracting virtual boundary element method for solving the vibration and sound radiation from a cavity with an arbitrary shape
xiang yu ; huang yu ying
..............
page:97-100
An experimental study of the auger bored cast-with-pressure concrete pile on soft ground
zheng jun jie ; zhu feng ; yuan nei zhen
..............
page:101-103
A study on the algorithm for DEM generation and terrain trim
jiang hong zuo
..............
page:104-107
Increasing the production of arachidonic acid from Mortierella alpina by regulating the hexose monophosphate pathway
zhou peng peng ; qin wen min ; yu long jiang ; zhu min
..............
page:108-110
The high pH enduring ability and enhancement of white rot fungi by cultured domestically in high pH media
zhang xiao zuo ; wang hong xun ; wei mei ; chen jian wei
..............
page:111-113
On the synthesis of polymer of carbon nanotubes-vinyl pyrrolidone
guan wen chao ; wu chun zuo ; lu hai feng
..............
page:114-116
Numerical simulation of problems in heat conduction using MATLAB
li can ; gao yan dong ; huang su yi
..............
page:91-93
An experimental investigation on the pressure drop of flow boiling through narrow annular channels
su shun yu ; wang xiao mo ; huang su yi
..............
page:88-90
An experimental study of bed material regeneration with the multi-sieving method
zhang shi hong ; liu de chang ; zheng chu guang
..............
page:85-87
The development of a motor-driven shock tank type wave generator
wang huan wen ; wang dian qing
..............
page:82-84
The application of UML in the col electrical energy measuring system
xie ri xing ; chen he ping ; liu xin xiong
..............
page:79-81
The design of a model for the substation management system based on component technology
wu hai yang ; liu xin xiong ; chen he ping
..............
page:76-78
An interactive simulation system of mechanism based on VRML
li sheng qiang ; yang jia jun ; zeng kai
..............
page:73-75
A reflector-based mechanical switch
he jian feng ; huang de xiu ; lin shou feng ; wu zuo
..............
page:70-72
An analysis of static gain saturation in semiconductor optic amplifiers
hong wei ; huang de xiu
..............
page:67-69,72
An analysis of the CAN field bus MAC protocol
guo zhao nan ; xue lei ; lei feng zhong ; wang jian yong
..............
page:64-66
A table-form document recognizing method based on mesh distribution of feature points
li hai tao ; liu jian ; ming de lie ; zhang xiao hui
..............
page:60-63
An algorithm for salience-based local recursive OTSU segmentation
wang guo you ; zou yu lan ; ling yong
..............
page:57-59
Exit decision for R&D project with uncertainty
xue ming gao ; li chu lin
..............
page:54-56
Smoothness of exit time in Brownian motion
hu ji hui
..............
page:51-53
An empirical study of the volatility on China's stock markets
zhou shao fu ; chen qian li
..............
page:48-50
An approach to risk analysis of project bidding based on Rough sets
zhang jin long ; sun zuo ; chi jia zuo
..............
page:45-47
Design of data warehouse based on telecom service
liu ying zi ; cui nan fang ; ma shi hua
..............
page:42-44
Implementation of an integrated intelligent universal fuzzy evaluation support system
wang zong jun ; cui zuo ; shao zuo
..............
page:39-41
Web server design patterns of complicated enterprise nets
chen chuan bo ; wang zuo
..............
page:37-38
A scheme for certificate revocation using random treaps
cheng li ; lu zheng ding ; li juan
..............
page:34-36
The architecture of the distributed micro-firewall for cluster
xian feng ; han zong fen ; jin hai ; chen ying
..............
page:31-33
The mining of the association rules from auditing data
cui guo hua ; hou cheng zhi ; hong fan
..............
page:28-30
A formal analysis of NPKI
yu xiang xuan ; fu cai ; fu xiao qing
..............
page:25-27
A predicted load balancing strategy for distributed and parallel systems
li qing hua ; yin she hong
..............
page:21-24
A note of Sen libertarian impossibility theorem
tang zuo fen ; luo yun feng
..............
page:1-2,5
Singled-peaked and singled-troughed preference
wang jing yu ; luo yun feng
..............
page:3-5
An analysis of the correlation between the choice function and consistency condition
xiao hong mei ; luo yun feng
..............
page:6-7
The absolute stability of the neutral type Lurie indirect control system
tian feng ; xu bing ji ; liao xiao zuo
..............
page:8-10
The absolute stability of the neutral type Lurie system with time-delay in control input
tian feng ; xu bing ji ; liao xiao zuo
..............
page:11-13
Analysis of intension and extension of uncertainty information
wang qing yin ; ma an li ; yuan yu zhen
..............
page:14-17
An RTP-based algorithm for quality control of multimedia transaction
zhou jing li ; zhang chao ; yu sheng sheng ; gu jian
..............
page:18-20