Access Statistics

    Total visits:

    Today's visit:

    Online:

    column
    Straightness Assessment Based on Mechanical Thinking
    LIN Jia-chun, SHI Zhao-yao
    2010, 36(12): 1585-1589.
    Abstract PDF
    Wear Patterns and Mechanism of Coated Cemented Carbide Tool in High Speed Milling Superalloy GH2132
    LIU Chao, AI Xing, LIU Zhan-qiang, WAN Yi
    2010, 36(12): 1590-1594.
    Abstract PDF
    Vibration Control of the Car Roof With Wavelet Adaptive Algorithm
    DENG Guo-hong, YU Xiong-ying, OU Jian, ZHANG Guang-hui
    2010, 36(12): 1595-1598.
    Abstract PDF
    Three-dimensional Special Force and Torque Field Distribution Around Two Interactive Rectangular Permanent Magnets
    LI Xiao-yang, MA Zi-guang, LI Run-shi
    2010, 36(12): 1599-1605.
    Abstract PDF
    Feasibility Study and Activity Analysis for Fly-saw Mechanical Length
    SONG Zheng-he, JIN Jia-mei
    2010, 36(12): 1606-1612.
    Abstract PDF
    Eddy Current Field Analysis in Permanent Magnet Retarder Based on Finite Element Method
    YE Le-zhi, LI De-sheng
    2010, 36(12): 1613-1617.
    Abstract PDF
    A Numerical Simulation Study on the Settlement Laws of the High-speed Railway's Subgrade Induced by the Construction of Twin Shield Tunnel
    XU You-jun, TAO Lian-jin, LI Wen-bo, FAN Jun-yi, WANG Wen-pei
    2010, 36(12): 1618-1623.
    Abstract PDF
    Support Structure Internal Force Monitoring and Analysis for Undercut Metro Tunnel in Crossing the Existing Line
    ZHANG Ming-ju, NIU Da-wei
    2010, 36(12): 1624-1630.
    Abstract PDF
    Comparison Study of Thermal Modeling Between DeST Software and Hongye Software
    JIAN Yi-wen, WANG Rui-feng
    2010, 36(12): 1631-1636.
    Abstract PDF
    The Resonance Property of Shock Absorber System With Tilted Spring Under Foundation Displacement Excitation
    WU Xiao, LUO You-xin, YANG Li-jun
    2010, 36(12): 1637-1641.
    Abstract PDF
    Seismic Behaviors of Shear Wall With Rectangular Concrete Filled Steel Tube Columns and Concealed Bracing
    WANG Min, CAO Wan-lin, ZHANG Jian-wei, YANG Ya-bin, CENG Bin
    2010, 36(12): 1642-1649.
    Abstract PDF
    Joint Performance of Steel-concrete Composite Beam to CFST Column
    PAN Jian-rong, HUO Da, TENG Hai-wen
    2010, 36(12): 1650-1655.
    Abstract PDF
    Stress Calculation Method for Hyperstatic Deep Beams with Single Span Subjected to Linear Load
    WANG Zheng-zhong, LIU Ji-liang, HAN Yan-bao
    2010, 36(12): 1656-1662.
    Abstract PDF
    Analysis of Drinking Affecting Driving Performance Under Virtual Scenes
    OU Ju-shang, ZHAO Xiao-hua, MAO Ke-jun, RONG Jian, LIU Xiao-ming
    2010, 36(12): 1663-1668.
    Abstract PDF
    A Coordination Strategy of Guidance Sub-area in Intelligent Dynamic Route Guidance System
    ZHONG Shi-quan, MA Shou-feng
    2010, 36(12): 1669-1676.
    Abstract PDF
    Speed Limit Analysis on the First Grade Highway
    XU Ting, SUN Xiao-duan, XIE Chang-rong, WANG Wei-li
    2010, 36(12): 1677-1682.
    Abstract PDF
    Motion Targets Tracking Algorithm Based on Video Surveillance
    HU Hong-yu, WANG Dian-hai, LI Zhi-hui, YANG Xi-rui, WANG Qing-nian
    2010, 36(12): 1683-1690.
    Abstract PDF
    Effects of Laminar Shear Stress on the Differentiation of Cord Blood CD34+ Cells
    JING Qiang, CAI Hai-bo, TAN Wen-song
    2010, 36(12): 1691-1694.
    Abstract PDF
    Construction and Application of the Weighted Amino Acid Network Based on Residue Fluctuations
    QI Li-sheng, CHEN Wei-zu, WANG Cun-xin
    2010, 36(12): 1695-1699.
    Abstract PDF
    An Ontology Based Trust Model and Application in Distribution of Tasks
    MAO Guo-jun, SUN Xiao-xi, QI Jin-liang
    2010, 36(12): 1700-1705.
    Abstract PDF
    A Service-oriented Inter-organizational Collaboration Model
    LI Gang
    2010, 36(12): 1706-1710.
    Abstract PDF
    Trust Degree Evaluation Method of Composite Service Based on Fuzzy Logic
    WANG Yong, DAI Gui-ping, HOU Ya-rong, REN Xing-tian
    2010, 36(12): 1711-1716.
    Abstract PDF
    Color Face Recognition Based on 2D Linear Discriminant Analysis
    BAI Xiao-ming, WANG Cheng-zhang, SHI Qin
    2010, 36(12): 1717-1721.
    Abstract PDF
    Research and Improvement of the Performance of Embedded System-based Elliptic Curve Cryptography Algorithm
    YI Xiao-lin, YANG Feng, LU Peng-cheng
    2010, 36(12): 1722-1728.
    Abstract PDF

    Top ViewMore