Showing 1 - 20 results of 68 for search 'ZHANG Hong', query time: 0.02s
Refine Results
-
1
Research on smart authentication authorization and accounting in next generation network by ZHANG Hong
Published 2006-01-01
Article -
2
Study of Bed Deformation Trend of Wakouzi-Majiazui Section in the Upper Jingjiang Reach of Yangtze River by ZHANG Hong, LIU Qihang
Published 2021-01-01
Article -
3
-
4
Analysis of the Fluid Cavitation Effect of Friction Pair on Double Arc Groove Hydro-viscous Drive by Ren Zhong, Zhang Hong, Liu Qiuzu
Published 2017-01-01
Article -
5
Vibration Analysis and Design of the Oilcan Spraying Robot by Zhang Hong, Chen Lei, Ding Shiyong
Published 2017-01-01
Article -
6
Evaluating model and simulation analyzing for P2P Churn by YANG Dong, DONG Ping, ZHANG Hong-ke
Published 2007-01-01
Article -
7
Pump Station Water Intake Forebay Flow Pattern Study by ZHANG Hong-yong, WANG Xin, WANG Wei
Published 2008-01-01
Article -
8
New mapping approach based on reputation model under locator/ID separation protocol by WAN Ming, LIU Ying, ZHANG Hong-ke
Published 2011-01-01
Article -
9
Target sampling based on routing behavior analysis in network topology measurement by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2009-01-01
Article -
10
Analysis of Two-phase Flow Field and Oil Injection Lubrication Characteristics of High-speed Gears by Shi Dong, Zhang Yuzhe, Zhang Hong, Hou Xiangying
Published 2024-07-01
Article -
11
RESEARCH OF KC CHARACTERISTIC OF SUSPENSION SYSTEM OF VEHICLE WITH RIGID-FLEXIBLE COUPLING MODEL by LI Cheng, ZHANG HongTao, JIANG NengHui
Published 2022-01-01
Article -
12
"07· 6" Upstream and Mid - stream Huanjiang River Storm Flood Water Characteristic Analysis by ZHANG Hong-qing, JIANG Ping, LUO Bi-yu
Published 2007-01-01
Article -
13
Chinese IP-level network topology measurement and analysis by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2007-01-01
Article -
14
Study on network performance evaluation method based on measurement by ZHANG Dong-yan, HU Ming-zeng, ZHANG Hong-li
Published 2006-01-01
Article -
15
Encryption based on reversible cellular automata by PING Ping, ZHOU Yao, ZHANG Hong, LIU Feng-yu
Published 2008-01-01
Article -
16
Analysis of Subway Shield Engineering Influence on Upside House and Reinforcement Effect by ZHANG Hong-bin, SU Bu-kun, SHI Yu-hua
Published 2010-01-01
Article -
17
DDoS attacks detection based on link character by SUN Hong-jie, FANG Bin-xing, ZHANG Hong-li
Published 2007-01-01
Article -
18
-
19
Approach to remote routing computation and lookup in parallel network simulation by HAO Zhi-yu, YUN Xiao-chun, ZHANG Hong-li
Published 2007-01-01
Article -
20
Task urgency-based resource allocation algorithm in industrial Internet of things by ZOU Hong, ZHUO Sai, ZHANG Hong, ZHANG Mingxing, WU Dapeng
Published 2024-03-01
Article