Showing 1 - 20 results of 39 for search 'YU Long', query time: 0.02s
Refine Results
-
1
-
2
Study on the REV Size of Fractured Rock in the Non-Darcy Flow Based on the Dual-Porosity Model by Yuan Wang, Yu-long Niu, Qiang Feng
Published 2018-01-01
Article -
3
Multi-strategy QoS-aware service selection and ranking model by Lei WU, Yu-long LIU, Shi-jun LIU
Published 2012-09-01
Article -
4
5G OFDM channel estimation method based on complex-valued generative adversarial network by LU Yuanzhi, WEI Xianglin, YU Long, YAO Changhua
Published 2024-03-01
Article -
5
RESEARCH ON THE PRESSURE SHELL STRUCTURAL STRENGTH CHARACTERISTIC OF MARINE DETECTOR by ZHANG Liang, LIU DaXing, CHEN YuLong
Published 2015-01-01
Article -
6
A J-INTEGRAL MEASUREMENT METHOD BASED ON DIGITAL IMAGE CORRELATION by JIANG Wei, JIANG XianFeng, HUANG YuLong
Published 2018-01-01
Article -
7
Small bowel evisceration through the vagina after transvaginal mesh surgery for genital prolapse by Yi-Chieh Chen, Cheng-Yu Long, Chia-Yen Huang
Published 2025-01-01
Article -
8
Connectivity on fixed air route in aeronautical ad hoc networks by Chang-yuan LUO, Yu-long SONG, Zhan-zhan GAO
Published 2014-09-01
Article -
9
Anti-frequency-shift packet detection for D2D power-saving communications over Wi-Fi network by Fan YANG, Xi LIANG, Ke-yu LONG, Li JIANG
Published 2016-10-01
Article -
10
DAMAGE TOLERANCE EXPERIMENT AND ANALYSIS OF STIFFENED FUSELAGE PANEL WITH LONGITUDINAL CRACK by CHEN An, WEI YuLong, LIAO JiangHai, DONG DengKe
Published 2017-01-01
Article -
11
Neural Mechanisms of Autonomic Dysfunction in Neurological Diseases by De-Pei Li, Yu-Long Li, Jianhua Li, Sheng Wang
Published 2017-01-01
Article -
12
-
13
Edwards curves based security authentication protocol for mobile RFID systems by Yu-long YANG, Chang-gen PENG, Zhou ZHOU, Xiao-pei ZHANG
Published 2014-11-01
Article -
14
-
15
Multiscale admission control algorithm for statistical QoS guarantee by Yan-ping CHEN, Hui-qiang WANG, Guang-sheng FENG, Yu-long GAO
Published 2011-11-01
Article -
16
Survey of wireless sensor network security techniques by PEI Qing-qi1, SHEN Yu-long1, MA Jian-feng1
Published 2007-01-01
Article -
17
Adaptive distributed cloud edge collaborative load control strategy for load management by LI Siwei, JIN Li, YU Long, DU Lishi, YUE Liang, ZHANG Xirun
Published 2024-08-01
Article -
18
-
19
Access control model based on trusted computing for integrated avionics system by CUI Xi-ning1, 2, SHEN Yu-long1, MA Jian-feng1
Published 2009-01-01
Article -
20
Universally composable secure trusted access protocol for WLAN Mesh networks by MA Zhuo1, MA Jian-feng1, ZENG Yong1, SHEN Yu-long1
Published 2008-01-01
Article