Search

Your search keyword '"Liu Limin"' showing total 3,458 results

Search Constraints

Start Over You searched for: Author "Liu Limin" Remove constraint Author: "Liu Limin"
3,458 results on '"Liu Limin"'

Search Results

1. Experimental and theoretical study on the natural circulation characteristics of humid air in the fuel assembly of a full-scale pressurized water reactor

2. Research on the core ability cultivation mechanism of college students returning to their hometowns for innovation and entrepreneurship under the strategy of rural revitalization

3. Development and analysis of passive residual heat-removal system on secondary side of small reactor

4. Key Technologies and Equipment for Smart Orchard Construction and Prospects

5. Autonomous Navigation and Automatic Target Spraying Robot for Orchards

6. Overview of image-based 3D reconstruction technology

7. Photophysical and electrochemical properties of perylene monoimide alcohol ester derivatives

8. News Image-Text Matching With News Knowledge Graph

9. Improved Memory Truncation Scheme for Quasi-Adiabatic Propagator Path Integral via Influence Functional Renormalization

10. An Innovative Balanced-Yielding Support Method for Tunnel in Deep Inclined Strata

11. Research on Rural Comprehensive Energy Service Operation Based on Data-driven of Electric Power Internet of Things

12. Transient analysis on the thermal-mechanical characteristics of a heat pipe cooled reactor core

14. Coaching doctors to improve ethical decision-making in adult hospitalized patients potentially receiving excessive treatment. The CODE stepped-wedge cluster randomized controlled trial

21. DESIGN AND FINITE ELEMENT ANALYSIS FOR MOVING SYSTEM STRUCTURE OF NC FORMING MACHINE

22. Publisher Correction: Coaching doctors to improve ethical decision-making in adult hospitalized patients potentially receiving excessive treatment. The CODE stepped-wedge cluster randomized controlled trial

35. Mask Reference Image Quality Assessment

36. Design of Computer Network Security Defense System Based on Big Data

37. JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications

38. Clustering-Induced Generative Incomplete Image-Text Clustering (CIGIT-C)

39. Self-supervised Image Clustering from Multiple Incomplete Views via Constrastive Complementary Generation

Catalog

Books, media, physical & digital resources