Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Applied Science and Technology
1009-671X
2003 Issue 2
Particle Size Measurement System Based on Digital Image Process
miao chun wei ; li yu xiang ; wang ke jia ; wang jun feng
..............
page:1-3
Research on Highly Efficient Programming of the TMS320C54X Fixed-point DSP Family
wang gong yi ; si xi cai
..............
page:4-6
Design of Digital Modulator Based on Software Radio
guo li li ; li chuan qing ; tian ye
..............
page:7-10
Leaky Bucket Algorithm in ATM Network
yu peng ; li min ; yang ge wen
..............
page:11-13
De-noising Method Based on Wavelet Analyse
li chuan qing ; xu min ; zhang shu
..............
page:14-17
Large-area Path Planning Based on GA for AUV
peng yan ; gu guo chang
..............
page:18-21
Programmeing of Signal Phases of Virtual Instrument during Measuring Period
cai chun e
..............
page:22-24
Using ADO to Manage SQL Server Database in VC
dong rui ; yu fei
..............
page:25-27
Developing Web Application with UML
du long zuo ; li shang hui
..............
page:28-31
Research and Analysis of VxWorks Real-time Kernel Scheduling
dang ji hong ; li dong ming ; yuan gan nan
..............
page:34-36
Design of the Intelligent Integrated Control System of Laboratory Instruments
peng mei lan ; wang bin zuo
..............
page:37-39
Disposal of Data Overrun in CAN Bus
you jiang ; liu hong da ; ma zhong li ; luo yao hua
..............
page:40-43
Study of Utilizing DSP for Designing Arithmetic of Digital Controller
liu zhuo fu ; li fu yi ; peng xia fu
..............
page:44-46
Application of Water-soluble Carboxymethyl Chitosan in Cosmetics
zhang si qun ; xu yi
..............
page:47-50
Progress in the Research on Synthesis of Nipagin Ester
deng xu zhong ; yang hui rong ; zhou jia hua ; li hong
..............
page:51-55
Study of Corrosion-resistance of ESP in CO2 Well
pang xiang dong ; liu jun ; mei si jie ; chi yi
..............
page:56-58,55
duo gu dao xian bian hao zhuang zhi deng 9 ze
..............
page:59-60
wei xing " zhi zhu ji qi ren " deng 14 ze
..............
page:61-62
Research on Creating the Vulnerability Database in Intrusion Detection
peng jing ; chen bo ; wu jian
..............
page:32-33,31