Advanced Search



17 results found in all.
index Title
1Wind-induced internal pressure response for structure with single windward opening and background leakage
Author(s):Shi-ce YU, Wen-juan LOU, Bing-nan SUN  Clicked:7478  Download:4442  Cited:8  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.3 P.313-321  DOI:10.1631/jzus.A071271
2Bubble counter based on photoelectric technique for leakage detection of cryogenic valves
Author(s):Tao JIN, Bin XU, Ke TANG, Jian-ping HONG  Clicked:6227  Download:3877  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.1 P.88-92  DOI:10.1631/jzus.A071430
3Low-leakage diode-triggered silicon controlled rectifier for electrostatic discharge protection in 0.18-μm CMOS process
Author(s):Xiao-yang DU, Shu-rong DONG, Yan HAN, Ming-xu HUO, Da-hai HUANG  Clicked:6160  Download:4818  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.7 P.1060-1066  DOI:10.1631/jzus.A0820545
4Certificateless key-insulated signature without random oracles
Author(s):Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG  Clicked:6314  Download:3714  Cited:8  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.12 P.1790-1800  DOI:10.1631/jzus.A0820714
5NUMERICAL ANALYSIS OF BURIED PIPE CHARACTERISTICS
Author(s):ZHANG Tu-qiao, SHAO Wei-yun  Clicked:4918  Download:2826  Cited:0  <Full Text>
Journal of Zhejiang University Science  2000 Vol.1 No.2 P.144-147  DOI:10.1631/jzus.2000.0144
6Rate-equation-based VCSEL thermal model and simulation
Author(s):LIU Jie, CHEN Wen-lu, LI Yu-quan  Clicked:7425  Download:3782  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.12 P.1968-1972  DOI:10.1631/jzus.2006.A1968
7High-performance low-leakage regions of nano-scaled CMOS digital gates under variations of threshold voltage and mobility
Author(s):Hossein Aghababa, Behjat Forouzandeh, Ali Afzali-Kusha  Clicked:8903  Download:3865  Cited:3  <Full Text>
Journal of Zhejiang University Science C  2012 Vol.13 No.6 P.460-471  DOI:10.1631/jzus.C1100273
8Two-dimensional pipe leakage through a line crack in water distribution systems
Author(s):Shuai Guo, Tu-qiao Zhang, Wei-yun Shao, David Z. Zhu, Yuan-yu Duan  Clicked:8061  Download:4428  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2013 Vol.14 No.5 P.371-376  DOI:10.1631/jzus.A1200227
9Optimization of the quenching method for metabolomics analysis of Lactobacillus bulgaricus
Author(s):Ming-ming Chen, Ai-li Li, Mao-cheng Sun, Zhen Feng, Xiang-chen Meng, Ying Wang  Clicked:9673  Download:4167  Cited:5  <Full Text>  <PPT> 2380
Journal of Zhejiang University Science B  2014 Vol.15 No.4 P.333-342  DOI:10.1631/jzus.B1300149
10Sub-channel shared resource allocation for multi-user distributed MIMO-OFDM systems
Author(s):Na-e Zheng, You Zhou, Han-ying Hu, Sheng Wang  Clicked:8980  Download:3344  Cited:0  <Full Text>  <PPT> 2801
Journal of Zhejiang University Science C  2014 Vol.15 No.11 P.1048-1057  DOI:10.1631/jzus.C1400049
11Adaptive robust beamformer for multi-pair two-way relay networks with imperfect channel state information
Author(s):Jin Wang, Feng Shu, Ri-qing Chen, Yu-di Cui, Yu Chen, Jun Li  Clicked:7914  Download:3274  Cited:1  <Full Text>  <PPT> 2740
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.3 P.265-280  DOI:10.1631/FITEE.1500134
12Characteristics of volumetric losses and efficiency of axial piston pump with respect to displacement conditions
Author(s):Bing Xu, Min Hu, Jun-hui Zhang, Qi Su  Clicked:6290  Download:4499  Cited:3  <Full Text>  <PPT> 2510
Journal of Zhejiang University Science A  2016 Vol.17 No.3 P.186-201  DOI:10.1631/jzus.A1500197
13Experimental investigation of wind-induced internal pressures in nominally sealed building structures
Author(s):Xian-feng Yu, Jing-xuan Gao, Zhuang-ning Xie, Xu Wang  Clicked:4641  Download:2749  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2019 Vol.20 No.7 P.487-498  DOI:10.1631/jzus.A1900091
14A leakage-resilient certificateless public key encryption scheme with CCA2 security
Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, Qing-long Wang  Clicked:7165  Download:2853  Cited:0  <Full Text>  <PPT> 2228
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.4 P.481-493  DOI:10.1631/FITEE.1601849
15Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines
Author(s):Chao Yang, Yun-fei Guo, Hong-chao Hu, Ya-wen Wang, Qing Tong, Ling-shu Li  Clicked:6667  Download:2595  Cited:0  <Full Text>  <PPT> 1973
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE