Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Nanjing University(Natural Sciences)
0469-5097
2010 Issue 4
Characteristics of tritium distribution in precipitation in Nanjing
yang jing ; zhang yan hong ; ye shu jun ; wu ji chun
..............page:432-439
Research on the architecture of modeling languages for model driven development
li jin ; zhan de chen ; nie lan shun ; xu xiao fei
..............page:464-475
A numerical analysis on the distribution of temperatures in the double-cladding fiber laser
shen yue guo ; lv xu liang ; zhu hong tao ; tang hou chao ; wu chao
..............page:412-418
A numerical simulation of ocean wave and sea spray\'s effect on typhoon intensity and structure
sun yi mei ; fei jian fang ; cheng xiao ping ; huang xiao gang ; liu lei
..............page:419-431
Free way integrated management system based on distribution monitor data unit series
chen zuo zheng ; li bo ; chen qi mei ; yang zhong yue ; zhou qing zuo
..............page:394-406
Modeling and analysis of application server rejuvenation based on periodical system performance inspection
meng hai ning ; qi yong ; hou di ; liu liang
..............page:440-447
Transverse velocity estimation based on Wigner-Hough transform
bai ye chao ; zhang xing gan ; tang zuo
..............page:366-371
Investigations of the walk termination effect in the self-avoiding walk model
zhang jin lu ; jiang jian guo ; zhang li li ; zhao xing yu ; huang yi neng
..............page:407-411
A study on the acoustic impedance model of perforated panels
ge jun ; qiu xiao jun
..............page:379-386
A portable and online programmable radar signal simulator
zhang zuo ; zhang xing gan ; bai ye chao ; zhang wei
..............page:359-365
A cognitive-based evidence model for software trustworthiness evaluation
lu gang ; wang huai min ; mao xiao guang
..............page:456-463
Broadband common-collector output buffer with resistance and capacitance compensation network
wang zhong ; yan wei min ; zhang xiao dong ; wu hao dong ; gao huai
..............page:372-378
Design of a scalable security model for enterprise application system
liu yu hui ; liu de hui ; zhao da zhe
..............page:448-455