搜索筛选:
搜索耗时2.9208秒,为你在为你在102,285,761篇论文里面共找到 170 篇相符的论文内容
类      型:
[期刊论文] 作者:LI Jianhua, 来源:中南工业大学学报:英文版 年份:2001
The dynamical theory was utilized to probe into the law of the excited response of granular ores generated by the exciting action of exciter and the influence o...
[会议论文] 作者:Li Jianhua,李建华, 来源:2012国际传输与覆盖研讨会 年份:2012
在三网融合持续推进的大背景下,如何构建传统广电运营商的IDC,发挥自身内容的优势,减少宽带出口的依赖,是当前广电运营商的热点话题,也是本文抛砖引玉所重点讨论的专题。...
[期刊论文] 作者:Changqing Li,Jianhua Gu, 来源:软件工程与应用(英文) 年份:2018
As more and more application systems related to big data were developed, NoSQL (Not Only SQL) database systems are becoming more and more popular. In order to a...
[期刊论文] 作者:LI Jianhua,SUN Qingchi, 来源:稀有金属:英文版 年份:2008
有 Pb1.04Zr0.52Ti0.48O3 + z wt.% Cr2O3 的陶艺用传统的技术被准备。在阶段结构,微观结构,和陶艺的电的性质上做的 Cr2O3 的效果被调查。同时,反响的频率(fr ) 的温度稳定性被...
[期刊论文] 作者:Jia Zhong Li Jianhua, 来源:中国人口.资源与环境:英文版 年份:2009
Contrast with artificial environment, the multi-level self-organizational system of nature has great gain. Sustain-able material environment should respect natu...
[期刊论文] 作者:Denghui LI,Jianhua XIE, 来源:应用数学和力学:英文版 年份:2016
The symbolic dynamics of a Belykh-type map(a two-dimensional discontinuous piecewise linear map) is investigated. The admissibility condition for symbol sequenc...
[期刊论文] 作者:LI Jianhua,SUN Jianguo, 来源:世界地质:英文版 年份:2018
Remigration is an imaging method that maps migrated image fields of different migration velocity fields to each other.It is mainly used for migration velocity a...
[期刊论文] 作者:SHI Yijuan LI Jianhua, 来源:武汉大学学报:自然科学英文版 年份:2007
无证书的公钥密码学被介绍克服基于身份的密码学的 keyescrow 限制。它联合基于 theidentity 的密码学和传统的 PKI 的优点。许多无证书的公钥加密 andsignature 计划被建议...
[会议论文] 作者:Yang Changming,Li Jianhua, 来源:第三届世界生态高峰会(Eco Summit 2007) 年份:2007
[会议论文] 作者:Fangyi Li,Jianhua Rong, 来源:ASMDO 2012(Forth International Conference on Multidisciplina 年份:2012
  An uncertain multi-objective multidisciplinary design optimization (MDO) is suggested, which is based on the multidisciplinary feasible method (MDF).The unc...
[会议论文] 作者:Xinguo Li,Jianhua Ge, 来源:第八届中国密码学学术会议 年份:2004
本文对2002年提出的自证明签名方案实施了一种伪造攻击。在这种攻击下CA可以对其用户的任意消息伪造自证明签名。本文提出了能抵抗该攻击的改进方案,并给出了安全性分析。...
[会议论文] 作者:Yang Changming,Li Jianhua, 来源:第三届世界生态高峰会(Eco Summit 2007) 年份:2007
[期刊论文] 作者:Li Jianhua,Ding Xiangqian,Wang, 来源:系统工程与电子技术:英文版 年份:2006
[期刊论文] 作者:Xianghong LI,Jianhua TANG,Yanl, 来源:应用数学和力学:英文版 年份:2020
A simple,yet accurate modi?ed multi-scale method(MMSM)for an approximately analytical solution in nonlinear oscillators with two time scales under forced harmon...
[期刊论文] 作者:Xiaomei Li,Jianhua Zhu,Pingpin, 来源:中国癌症研究:英文版 年份:2014
Objective: To observe the adjuvant analgesic efficacy of Han’s Acupoint Nerve Stimulator(HANS) in opioid tolerant patients with cancer pain. Methods: A prospec...
[期刊论文] 作者:Linhong Xu,Xiangnan Li,Jianhua, 来源:北京理工大学学报:英文版 年份:2019
Aiming to increase the efficiency of gem design and manufacturing, a new method in computer-aided-design (CAD) of convex faceted gem cuts (CFGC) based on Half-e...
[期刊论文] 作者:Wang Mingzheng,Li Jianhua,Zhan, 来源:高技术通讯(英文版) 年份:2004
Based on the linearized model of the TCP connections through the congested routers, this paper puts forward an active queue management algorithm (FVS-T). The al...
[期刊论文] 作者:Li Jianhua,Ding Xiangqian,Wang, 来源:系统工程与电子技术(英文版) 年份:2006
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7...
[期刊论文] 作者:Wei Li,Jianhua Zhang,Xiaochuan, 来源:中国通信:英文版 年份:2019
Internet of Things(IoT)is one of the targeted application scenarios of fifth generation(5G)wireless communication.IoT brings a large amount of data transported...
[期刊论文] 作者:Zhu Qingguang,Li Jianhua,Fang, 来源:中医杂志(英文版) 年份:2016
相关搜索: