Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Applied Science and Technology
1009-671X
2003 Issue 2
Particle Size Measurement System Based on Digital Image Process
miao chun wei ; li yu xiang ; wang ke jia ; wang jun feng
..............page:1-3
Design of Digital Modulator Based on Software Radio
guo li li ; li chuan qing ; tian ye
..............page:7-10
Leaky Bucket Algorithm in ATM Network
yu peng ; li min ; yang ge wen
..............page:11-13
De-noising Method Based on Wavelet Analyse
li chuan qing ; xu min ; zhang shu
..............page:14-17
Large-area Path Planning Based on GA for AUV
peng yan ; gu guo chang
..............page:18-21
Using ADO to Manage SQL Server Database in VC
dong rui ; yu fei
..............page:25-27
Developing Web Application with UML
du long zuo ; li shang hui
..............page:28-31
Research and Analysis of VxWorks Real-time Kernel Scheduling
dang ji hong ; li dong ming ; yuan gan nan
..............page:34-36
Design of the Intelligent Integrated Control System of Laboratory Instruments
peng mei lan ; wang bin zuo
..............page:37-39
Disposal of Data Overrun in CAN Bus
you jiang ; liu hong da ; ma zhong li ; luo yao hua
..............page:40-43
Study of Utilizing DSP for Designing Arithmetic of Digital Controller
liu zhuo fu ; li fu yi ; peng xia fu
..............page:44-46
Application of Water-soluble Carboxymethyl Chitosan in Cosmetics
zhang si qun ; xu yi
..............page:47-50
Progress in the Research on Synthesis of Nipagin Ester
deng xu zhong ; yang hui rong ; zhou jia hua ; li hong
..............page:51-55
Study of Corrosion-resistance of ESP in CO2 Well
pang xiang dong ; liu jun ; mei si jie ; chi yi
..............page:56-58,55
Research on Creating the Vulnerability Database in Intrusion Detection
peng jing ; chen bo ; wu jian
..............page:32-33,31