Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Huazhong University of Science and Technology(Nature Science)
1671-4512
2010 Issue 12
Erected antenna height of radars for searching over seaunder evaporation duct
Tian Shusen1 Cha Hao1 Ke Bin2 Zhou Mo1
..............page:16-19
Study on modeling of dynamic NBTI effect in PMOSFET
Li Bin1 Song Fangfang1 Xie Jiang2 Zhang Xiaowen2
..............page:24-27
An improved preferences guideline based on stability of FAST TCP
Chen Xiaolong1;2 Zhang Yun2 Liu Zhi2
..............page:81-84
Research on the diameter of bidirectional double-loop networks G(N;±r,±s)
Liu Hui Fang Muyun Hang Tingting Hou Haijin
..............page:77-80
Design of tracking control systems with zerosteady-state errors for ship course control
Zhang Huajun Geng Tao Zhao Jin
..............page:57-60
Spatial non-blocking join algorithm for improvedthe query response time on data stream
Chen Gang1 Gu Jinguang1 Liu Lingrui2
..............page:44-47
Adaptive graphics display processing the conversion of MapInfo to SVG
Li Dong Huang Zhenghua
..............page:9-11
High-efficiency mode decision algorithm for surveillance video coding
Gong Junbin;Zheng Chenglin;Liu Fuxue;Tian Jinwen
..............page:5-8
A node localization algorithm for WSN using a mobile anchor node
Bao Han Zhang Shuai Huang Heqing Shen Jie
..............page:28-31
Random greed incremental SVDD algorithm and its application
Zhuang Jinfa1;2a Chen Ruifeng1 Cao Langcai3 Lan Julong2b
..............page:94-97
Optimal time scheduling of three-dimensional space packing
Huang Wenqi He Kun
..............page:102-104
Experiment research on ultrasound cast-rolling AZ31 alloy strip
Li Jianping;Hu Jianbing;Mao Daheng;Zhao Guanzhong
..............page:126-128,132
Curve inverse kinematics algorithm in joint animation
Xu Haiyin Hu Li’an Fang Xiongbing Wan Qiliang
..............page:105-108
Impossible differential attacks on 7-round AES-192
Liu Jingmei1;2 Zhao Linsen3
..............page:73-76
Research on a five-fingered prosthetic hand and controlledby pattern recognition method
Wang Xinqing Liu Yiwei Sun Chao Liu Hong
..............page:109-112
A hierarchical key management scheme using Chinese remainder theorem
Xu Yanyan1 Xu Zhengquan1 Chen Xi2
..............page:65-68
An optimized digital control of single-phase boost-PFC systems
Chen Xiaofei1 Wang Tao1 Zou Xuecheng1 Lin Shuangxi2
..............page:36-39
Optimal tracking performance of networked control systems
Zhan Xisheng1;2 Guan Zhihong1 Wu Bo1
..............page:48-51
Mobile robot path planning based on wireless sensor networks
Zhu Qidan Wu Yebin Cai Chengtao Wang Dongyang
..............page:113-116
A bandgap reference power supply with high precisionpiecewise curvature compensation
Lai Xinquana;b Zhang Shashaa;b Yuan Binga Zeng Hualia
..............page:40-43
Influences of density error on gravity gradient forward results
Liu Fanming Qian Dong Li Yan Zhang Yingfa
..............page:89-93
Grinding force models of profile grinding with axial feed in cut-in phase
Wang Junming Xiang Keshun Tang Yangping Bin HongzanCorporation;Wuhan 430080;china)
..............page:117-120
Adaptive double-threshold spectrum sensing algorithm
Feng Wenjiang1 Qin Chunling1 Li Lin2
..............page:20-23
Bioluminescence tomography by truncated total least squares method
Yu Jingjing1a;b Liu Fang1a;b Jiao Licheng1b;c He Xiaowei2
..............page:12-15
Calibration of vector network analyzers usinggeneral two-port error model
Qin Hongbo1 Zhao Wei2 Ren Huorong1 Zhan Jingsong1
..............page:32-35
A grey estimator for spatiotemporal database selective queries
Bao Lei1 Qin Xiaolin2
..............page:61-64
Digital implementation approach a class of differential game guidance law
Hua Wenhua Chen Xinglin
..............page:85-88
A unified multi-parent combination algorithm
Jiang Dazhi1 Lin Jiali2
..............page:98-101
Thermomechanical modeling and simulation analysis of orthogonal cutting
Li Binglin Wang Xuelin Hu Yujin Li Chenggang
..............page:121-125
Information flow-based integrity protection model
Qiu Gang1 Wang Yulei2 Zhang Xingang3 Deng Miaolei4
..............page:69-72