搜索筛选:
搜索耗时5.4425秒,为你在为你在102,285,761篇论文里面共找到 74 篇相符的论文内容
类      型:
[期刊论文] 作者:YI Ping(, 来源:华中科技大学学报:医学英德文版 年份:2001
[1]Nakamura K Rokutan K Marui N et al.Induction of heat shock proteins and their implication against ethanolinduced damage in cultured guinea pig gastric mucosal...
[期刊论文] 作者:XU Yi Ping, 来源:黑龙江科技学院学报 年份:2017
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7...
[会议论文] 作者:Yi Ping Zhang, 来源:2nd International Neural Regeneration Symposium(INRS2012)(第二 年份:2012
[期刊论文] 作者:Yi Ping,Hou Yafei,Zhong Yiping, 来源:系统工程与电子技术:英文版 年份:2006
[期刊论文] 作者:Yi Ping,Zou Futai,Jiang Xingha, 来源:系统工程与电子技术:英文版 年份:2007
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are...
[期刊论文] 作者:YI Ping,HOU Yafei,ZHONG Yiping, 来源:通讯和计算机:中英文版 年份:2005
[期刊论文] 作者:Yi Ping,Wang Qingkang,Kong Xia, 来源:地震工程与工程振动:英文版 年份:2017
一个核电厂的抑制容器是最后障碍阻止核反应堆放射。Aseismic 安全分析是适当抑制容器设计的关键。有一个半无限的有弹性的基础和腱的实际安排的一个对的具体抑制容器(PCCV )...
[期刊论文] 作者:MU Yi Ping and PENG Shu You, 来源:世界胃肠病学杂志:英文版 年份:1997
ExperimentalstudyontherelationshipofbileacidsandmyocardiumdamageinobstructivejaundiceMUYiPingandPENGShuYouSubjectheadingsc.........
[期刊论文] 作者:Yi Ping,Wu Yue,Chen Jialin, 来源:中国通信 年份:2011
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless m...
[期刊论文] 作者:YI Ping,LI Jian-jun,XIONG He-g, 来源:计算机辅助绘图.设计与制造:英文版 年份:2009
A job shop scheduling problem with a combination processing in complex production environment is proposed. Based on the defining of 'non-elastic combination...
[期刊论文] 作者:Yi Ping Zhong Yiping Zhang Shi, 来源:电子科学学刊:英文版 年份:2006
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile...
[期刊论文] 作者:Wu Yue,Yi Ping,Li Jianhua, 来源:中国通信 年份:2011
The properties of broadcast nature, high densities of deployment and severe resource limitations of sensor and mobile networks make wireless networks more vulne...
[期刊论文] 作者:Yi Ping,Wu Yue,Chen Jialin, 来源:中国通信 年份:2004
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless m...
[期刊论文] 作者:Xie Zhihong,YANG Yi,PING Shuzh, 来源:黑龙江科技学院学报 年份:2005
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7...
[期刊论文] 作者:ZOU Fu-tai,YI Ping,MA Fan-yuan, 来源:哈尔滨工业大学学报(英文版) 年份:2004
Recently some P2P systems have constructed the small world network using the small world model so as to improve the routing performance. In this paper, we propo...
[期刊论文] 作者:Yi Ping,Zou Futai,Jiang Xingha, 来源:系统工程与电子技术(英文版) 年份:2004
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are pass...
[期刊论文] 作者:Yi Ping,Hou Yafei,Zhong Yiping, 来源:系统工程与电子技术(英文版) 年份:2004
Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present...
[期刊论文] 作者:Guang Mei CHEN,Yi Ping HUANG, 来源:黑龙江科技学院学报 年份:2001
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7...
[期刊论文] 作者:Yi Ping,Zhong Yiping,Zhang Shiyong, 来源:城市道桥与防洪 年份:2006
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生、测量监控等方面人手,介绍了S226海滨大桥...
[期刊论文] 作者:Yi Ping,Wang Qingkang,Kong Xianjing,, 来源:Earthquake Engineering and Engineering Vibration 年份:2017
The containment vessel of a nuclear power plant is the last barrier to prevent nuclear reactor radiation.Aseismic safety analysis is the key to appropriate cont...
相关搜索: