Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Huazhong University of Science and Technology(Nature Science)
1671-4512
2006 Issue 7
Numerical simulation of wind pressure distribution on a gymnasium
Wei Jun;Huang Ying
..............page:100-103
Dynamic response analysis of an asymmetric two-tower tall storeyed building with enlarged base
Zhu Hongping;Chen Xiaoqiang;Zhang Shishun
..............page:104-107
Intelligent self-rescue system for underwater vehicles
Xiang Xianbo;Xu Guohua;Cai Tao;Mao Jiyu
..............page:111-114
Implementation of boolean operations on STL models
Guo Kaibo;Zhang Lichao;Wang Congjun;Huang Shuhuai
..............page:96-99
Simulation and evaluation of load effects in smart CFRP-strengthened RC beams
Lu Shaowei;Xie Huaiqin
..............page:93-95,114
Fuzzy set-based schema matching algorithm for geographic information
Zhang Qin;Sun Sheng;Yuan Pingpeng
..............page:46-48
A general fault-tolerance framework for grid computing
Shi Xuanhua;Jin Hai;Qiang Weizhong
..............page:42-45
Grid workflow model based on colored Petri net
Jin Hai;Wang Shuzhen
..............page:39-41
Context-aware reflective middleware suitable for mobile computing
Yin Xianliang;Song Jin;Xu Liping
..............page:36-38
An improved method for session identification in Web usage mining
Yin Xianliang;Zhang Wei
..............page:33-35
A complex Hadamard-based blind watermarking for digital image
Wang Zhenfei;Zhang Yufeng;Shi Baochang;Wang Nengchao
..............page:30-32
Risk assessment for P2P network vulnerabilities
Tang Zhuo;Lu Zhengding;Li Ruixuan;Li Hongping
..............page:27-29
CFD numerical simulation of the vortex in the draft tube of Three Gorges' turbine
Zhang Shuangquan;Fu Jianping;Duan Kailin;Wan Peng
..............page:19-20,23
A PMI role model for implementation of role-based access control
Xu Lanfang;Wang Fei
..............page:24-26
Research and implementation of 3D assembly animate based on B/S structure
Liu Yunhua;Liu Jun;Chen Lipin
..............page:115-117
On Roman domination number
Li Shuchao;Zhu Zhongxun
..............page:118-119
3N+1 and 3N+3k conjectures equivalence and some properties
Li Xiaochun;Liu Jun
..............page:120-121
Detection of submarines by air borne IR imaging system
Jiang Chuanfu;Yang Kuntao;Wang Jiang'an;Liu Chaolong
..............page:90-92
Circuit design of low voltage charge pump with high performance
Ying Jianhua;Liu Yi;Zhang Xi;Guo Yan
..............page:88-89,107
Study of a simple space vector pulse width modulation based on IPM
Zhang Weifeng;Yu Yuehui;Liu Lu;Peng Yabin
..............page:82-84
Function development of USB host in embedded system
Yang Xiaofei;Deng Jian;Liao Junqing
..............page:79-81
Application of data mining to cathode structure design by using finite element analysis
Wang Wei;Yin Guofu;Long Jianzhong
..............page:76-78
Design and implementation of DAC circuit for gigabit ethernet chips
Zhu Quanqing;Zhang Daoli;Shen Xubang;Li Haihua
..............page:74-75,103
Marginal self-adaptation to downlink transmission of multi-user MIMO-OFDM
Li Li;Zhu Guangxi;Liu Yingzhuang;He Yejun
..............page:71-73
A study of shift invariant image fusion and application for battle damage assessment
Li Lingling;Wang Hongqun;Lou Liantang;Ding Mingyue
..............page:67-70
Pyrolysis of 1-L-proline-1-deoxy-D-fructose
He Jiawen;Zhang Duntie;Yin Faqiang
..............page:122-124
Experimental research of removing mercury from flue gas by activated carbon fibers
Zeng Hancai;Wang Xin;Li Songliu;Xu Lusi
..............page:1-4
Influence of labyrinth seal teeth shape on sealed flow field and leakage
Ding Xuejun;Xiao Guojun;Yang Yanlei;Li Zhe
..............page:9-10
Experimental study of local heat transfer in round-impinging jet from nozzle array
Zhang Yongheng;Zhou Yong;Wang Liangbi
..............page:11-14
Effect of air jet flow on the convective mass transfer upon a rotating cylinder surface
Ma Hongting;Zhang Yufeng;Zhang Ximin
..............page:15-18
Analysis and implementation of Mathematica-based algorithm for source management
Zhou Kang;Tong Xiaojun;Gao Zunhai;Gao Quansheng
..............page:57-59
Mobile Agent-based distributed DSS model
Chen Xueguang;Wei Qianqian;Wu Tiezhou
..............page:53-56
Application of access control technology to SSL VPN system and its implementation
Yu Shengsheng;Ouyang Changchun;Zhou Jingli;Ouyang Kai
..............page:49-52