4,725 results on '"Chen LIN"'
Search Results
102. KCRS: A Blockchain-Based Key Compromise Resilient Signature System
103. Structure Optimization of Antenna System in Airborne Radar
104. Frame Synchronization Method for BDS B2a Signal Under the Constraint of Non-binary LDPC Code
105. Pseudorandom Code Error Monitoring Method for GNSS Signal
106. The Influence of a Certain Type of Radar Operator’s Operating Ability on the Operational Effectiveness of Equipment
107. Analysis of Intelligent Heating Strategy and Energy-Saving Potential of Campus Buildings
108. Pinch-Point Temperature Difference Analysis of Dual-Loop Organic Rankine Cycle
109. Quality Standards of Stem Cell Sources for Clinical Treatment of Neurodegenerative Diseases
110. An Overview of the Dynamics of Supercritical Natural Circulation Loops
111. Fracture Failure Analysis on 35VB Steel High-Strength Bolt Used in Bridge
112. Fracture Failure Analysis on 20MnTiB Steel High-Strength Bolt Used in Bridges
113. Construction and Empirical Research on the Competency Model of Rural E-commerce Innovation and Entrepreneurship
114. An Ensemble Learning Approach to Detect Malwares Based on Static Information
115. Cluster-Based Basic Safety Message Dissemination in VANETs
116. Computational Complexity Characterization of Protecting Elections from Bribery
117. Scheduling Many Types of Calibrations
118. Conclusion and Perspective
119. Optical Fiber Microfluidic Sensors Based on Opto-physical Effects
120. Competitive Analysis of 'Buy Online and Pick Up in Store' Channel
121. Dynamic Attribute Package: Crowd Behavior Recognition in Complex Scene
122. The Analysis and Countermeasures of Mobile Terminal RE or RSE Problem
123. Cross Chain Bribery Contracts: Majority vs Mighty Minority
124. Understanding the Motivation for Exercise Through Smart Bracelets: The Importance of a Healthy Lifestyle
125. Examining the Impact of Exercise Tracking Data on Promoting Regular Exercise Among University Students
126. On Block-Structured Integer Programming and Its Applications
127. Advances in Understanding, Diagnosis, and Treatment of Tinnitus
128. Multiple S-Box Correlation Energy Analysis Model Based on Particle Swarm Optimization
129. The Game Among Bribers in a Smart Contract System
130. Spatial-temporal Fusion Network with Residual Learning and Attention Mechanism: A Benchmark for Video-Based Group Re-ID
131. A Security-Sensitive Function Mining Framework for Source Code
132. Cooperative BSM Dissemination in DSRC/WAVE Based Vehicular Networks
133. Research and Implementation of an Aquaculture Monitoring System Based on Flink, MongoDB and Kafka
134. Coarse-to-Fine: A RNN-Based Hierarchical Attention Model for Vehicle Re-identification
135. A General Framework for Handling Commitment in Online Throughput Maximization
136. Heat Transfer Characteristics of Near-Critical Microchannel Flows
137. Summary and Outlook
138. Challenges in Near-Critical Microchannel Flows
139. Numerical Formulation of Near-Critical CO2 Flow in Microchannels
140. Theoretical Analysis of Near-Critical Stability Behaviors
141. Discussion on Near-Critical Heat Transfer Flow Experiment
142. Design and Realization of Near-Critical Visualization Experiment
143. Temperature Variation and Distribution in Tobacco Casing Cylinder Based on Infrared Thermal Imaging Detection
144. Experimental Validation of Constraint Effects on Toughness Test of Pipeline Girth Welds
145. Toughness Scatter About FCAW-S Girth Weld for X80 Pipeline Steel
146. Managing Security Risks Interdependencies Between ICT and Electric Infrastructures: A Game Theoretical Analysis
147. In Defense of Fully Connected Layers in Visual Representation Transfer
148. Recognizing Potential Runtime Types from Python Docstrings
149. Spatial Invariant Person Search Network
150. PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.