-
1
-
2
Study on the REV Size of Fractured Rock in the Non-Darcy Flow Based on the Dual-Porosity Model
Published 2018-01-01Get full text
Article -
3
Multi-strategy QoS-aware service selection and ranking model
Published 2012-09-01Get full text
Article -
4
5G OFDM channel estimation method based on complex-valued generative adversarial network
Published 2024-03-01Get full text
Article -
5
RESEARCH ON THE PRESSURE SHELL STRUCTURAL STRENGTH CHARACTERISTIC OF MARINE DETECTOR
Published 2015-01-01Get full text
Article -
6
A J-INTEGRAL MEASUREMENT METHOD BASED ON DIGITAL IMAGE CORRELATION
Published 2018-01-01Get full text
Article -
7
Small bowel evisceration through the vagina after transvaginal mesh surgery for genital prolapse
Published 2025-01-01Get full text
Article -
8
Connectivity on fixed air route in aeronautical ad hoc networks
Published 2014-09-01Get full text
Article -
9
Anti-frequency-shift packet detection for D2D power-saving communications over Wi-Fi network
Published 2016-10-01Get full text
Article -
10
DAMAGE TOLERANCE EXPERIMENT AND ANALYSIS OF STIFFENED FUSELAGE PANEL WITH LONGITUDINAL CRACK
Published 2017-01-01Get full text
Article -
11
Neural Mechanisms of Autonomic Dysfunction in Neurological Diseases
Published 2017-01-01Get full text
Article -
12
-
13
Edwards curves based security authentication protocol for mobile RFID systems
Published 2014-11-01Get full text
Article -
14
-
15
Multiscale admission control algorithm for statistical QoS guarantee
Published 2011-11-01Get full text
Article -
16
-
17
Adaptive distributed cloud edge collaborative load control strategy for load management
Published 2024-08-01Get full text
Article -
18
-
19
Access control model based on trusted computing for integrated avionics system
Published 2009-01-01Get full text
Article -
20
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Get full text
Article