Author of the publication

Analyzing disaster-forming environments and the spatial distribution of flood disasters and snow disasters that occurred in China from 1949 to 2000.

, , , , , , and . Mathematical and Computer Modelling, 54 (3-4): 1069-1078 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hadoop-based approach for efficient web service management., , , and . IJWGS, 9 (1): 18-34 (2013)Simulating the optimal land-use pattern in the farming-pastoral transitional zone of Northern China., , , and . Computers, Environment and Urban Systems, 32 (5): 407-414 (2008)Design of a New Practical Expert Fuzzy Controller in Central Air Conditioning Control System., , , and . PACIIA (2), page 431-435. IEEE Computer Society, (2008)978-0-7695-3490-9.OFDM Modulation Classification and Parameters Extraction., , , , and . CrownCom, page 1-6. IEEE, (2006)The Investigation and Realization of IPSec Strategy Based on Linux for IPv6., and . BIC-TA, volume 212 of Advances in Intelligent Systems and Computing, page 809-814. Springer, (2013)Partner Selection and Production-distribution Planning for Optimal Supply Chain Formation., and . World Congress on Engineering, page 1123-1128. Newswood Limited, (2007)HR: Hedging Redundancy of data in Content Centric Network., , , and . WOCC, page 388-393. IEEE, (2013)A Web-Based Mathematical User Interface for E-Science System., , , , and . GCC, page 176-181. IEEE Computer Society, (2009)Faulty chip identification in a multi chip module system., , , and . VTS, page 254-259. IEEE Computer Society, (1996)A new approach to detect radio jamming attacks in wireless networks., , , and . ICNSC, page 721-726. IEEE, (2010)