Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Anhui Vocational College of Electronics & Information Technology
1671-802X
2004 Issue 5
dui ying yu guan li de li xing ren shi yu si kao
jia zhen gang
..............page:178-179
Discussion for society endowment insurance management innovation in county organization
zhang qi guo ; ma xiu shui ; quan ji ping
..............page:182-183
The preliminary study on localization of Chinese cartoon culture
xie xiang dong
..............page:186-186,183
ji yu ma yi suan fa de xue xiao pai ke xi tong
zhang lin
..............page:190-191
Holden Caulfield:A Problem boy In the Catcher in the Rye
fu xin mei
..............page:192-193
Alienation and cultural exchange
feng cheng yi
..............page:196-197
yi ku yi le ku le xiang sui -- zhou zuo ren ku yu jie du
sun zheng jun
..............page:198,189
lun he xun de shan shui shi
qin ya jun
..............page:199-200
Brief analysis of the definition of Tragedy in Theory of Poem
zeng li wen
..............page:201-202
mei li de su zi ci
zhuo ru
..............page:203
Thought of the informatization in higher vocational education
xiang ming hua
..............page:204-205
liang zi xin xi ji shu qian lun
huang xiong hua ; wang wei
..............page:206-207
ying han hu yi zhong kua wen hua jiao liu yi shi
wu yan ling
..............page:208,214
Discussion about the bionic sensor
dong shou yu
..............page:209-210
xi shuo qu dong cheng xu
yang ming
..............page:211
The cultural reasons of youths snoking in our country
huang li fei
..............page:213-214
wu li ke he zhuan ye ke xian jie yu zheng he de yan jiu
niu jin sheng
..............page:215
A Proposition on how to determine the point of inflection
lou zhi e
..............page:218-218
New exploration of teaching methods on the principle of welding by fusion
wang yan fang ; yang bing bing
..............page:221-221,220
jin shu xue yu re chu li xue xi fang fa qian xi
yao yong hong ; wang jian wu
..............page:222
Reflection on the opening of direct selling market after China joining WTO
peng jie ; wang feng
..............page:171-172
xing zheng fu yi qian zhi de ding xing kuang jia
lv pei han ; chen cheng
..............page:167-168,166
qian xi pin pai yan shen ce lue
ou hai yan
..............page:165-166
qian tan hua xue ti jie zhong de ji zhong tui li fang fa
wang chuan qing
..............page:228-229
A discussion about the three problems of tax - planning
shi jin huang ; han dong lin
..............page:159-160
jing zheng fa ru he dui dai zhi shi chan quan
yuan shi fen ; ren xiang dong
..............page:157-158
gao zhi sheng fa lv yi shi pei yang zhi wo jian
qian ming quan
..............page:154-155
zhong guo gu dai zhi guo jing yan ji qi shi
qi huai yang
..............page:149-151
How does the higher vocational education engage with the WTO
yuan shi xian ; tang zhi xiang
..............page:147-148
su zhi jiao yu xue feng ji xue ye kao he guan xi de si kao
chen jie ping ; xu qin ; gu kai
..............page:145-146
On the improvement of actual effect in moral education
nie xiao ming
..............page:141-142
The peculiar solution of one ordinary differential equation
zeng qing jian
..............page:234-235
Discussion on the CNC teaching in vocational education
zheng de xing ; gu kai
..............page:236-236,238
ke cheng zheng he -- yin le jiao xue de yi lv chun feng
peng chao
..............page:242,241
On Military Information Security
sun hou zuo
..............page:128-129
Information Security Risk Assessment
huang ying
..............page:126-127
The Defense Technology of Network Information
liu hang ; wang chun shui
..............page:123-125
Application of security communication based on SSL in the system of selecting courses
leng xiao yan ; han yu sheng ; yuan hong wu
..............page:121-122
The basic research for the network information security of the financial system
wang chang qing ; li jian fei ; wang jing
..............page:116-117
"ren wu xing yu yan jiao xue " de yao su fen xi
huang xia
..............page:243-245
mai chong fu du ce liang bu que ding du ping ding
hu zhong
..............page:248-249
On the exploration into the feasibility of upgrading SCM to DSP
li xiao qiang ; wei li
..............page:252-252,256
yi zhong gao fen bian lv shi bo guan xian shi qi
liu xiao zuo
..............page:253-254
lun qi ye cai wu feng xian
zhang li
..............page:162
qian tan gao deng zhi ye jiao yu yu she hui shi ying xing
gao zong yi
..............page:139-140
tu fa shi jian de yu fang yu ying dui
mi liang ; liu lei
..............page:137-138
A brief talk on education of professional ethics for teachers
song feng hua
..............page:136-136,138
dian zi fu she xin xi xie lou yu tempest
wang jun ning
..............page:132-133
The Security and Lookout of Messages in Archives Information Management
wang gui fen ; ma xiu ping ; zhang zhan feng
..............page:130-131
yong powerbuilder6 zhi zuo wang luo dian shi bo fang qi
wang hong bo
..............page:255-256
cras ji shu zai zha ji ji jia dong tai te xing ce shi zhong de ying yong
huo zheng lin ; xu xiao ping
..............page:257-258
qian yi dian zi wen jian ji qi guan li
ding ren mei
..............page:264,275
shu ju cang ku ji shu ji ying yong
zhu wen zuo
..............page:265-266
xu ni zhuan yong wang ji shu (vpn) ji qi shi xian
dai lu sheng
..............page:267-269
ph zhi de ji suan ji kong zhi xi tong
zhao gang
..............page:270-271
lun cmm2 de guo cheng gai jin
deng zi yun
..............page:272-273
The client application automatic upgrade on C/S system
luo zheng yun
..............page:274-275
A comparison of interation diagram in Rose and TogetherRealization
tang jing tian ; nie geng liang ; yi shang tan
..............page:276-277
The Integrated Campus- Wide Network Systems of the multimedia teaching
lu xue jun ; wang bang yuan
..............page:278-279
The principle and application of HT2012 HART Modem
wei min
..............page:280-280,277
An arithmetic of the radar echo signal compression
shui xiao min ; xu zuo bing ; cao hui
..............page:281-283
Improvement for automatic control of Nitrogen - system in tire's production
nie zong yao ; quan ji ping
..............page:284-284
Application of GPS technology in buses
shen hua
..............page:285-286
Research and Implementation of Backdoor Based on Windows platform
zhao jun ; sun le chang
..............page:113-115
An Intelligent System for Intrusion Detection
zhang zhi qiang ; zhu lei ming ; xu jian qiao
..............page:111-112
Intrusion Detection System(IDS) And Intrusion Prevention System(IPS)
wang song he ; ren lian xing
..............page:109-110,106
APPLICATION OF API HOOK TECHNOLOGY IN ENCRYPTED COMMUNICATION
tao ( yan ye ); sun le chang ; wang yong yi
..............page:107-108
Techniques of Firewall and Information security
qi lan lan ; sun le chang
..............page:104-106
The Application of the Honeynet system in network security
tang yang chun ; lu yu liang ; wang yong yi
..............page:101-103
sheng wu mian yi ji li zai ji suan ji an quan ling yu de ying yong yu fa zhan
yin feng ; deng xiao peng ; xu si mao
..............page:27-29
Society Emergency Replying System and It's Actualization
tang ru song
..............page:25-26
A survey of Group Key Management in Secure Multicast
liu xiao hu ; gu nai jie
..............page:22-24
A new Instruction Detection Model from Immunology
yu jing ; dai zong you
..............page:20-21,19
ji yu tuo pu tu de wang luo cui ruo xing ping gu
xia yang ; lu yu liang ; liu jin hong
..............page:17-19
ji suan ji wang luo an quan ping gu ji yan jiu xian zhuang
lu yu liang ; sun le chang ; xia yang
..............page:14-16
The Realization of Ontology - based Web Metadata Extraction System
liu jin hong ; xia yang ; lu yu liang
..............page:10-13
Research of NAT Technology and it's Security
jie she ; sun le chang ; bai zuo
..............page:7-9
Research on Security of Backbone Networks
zhang yong ; wang yong yi
..............page:5-6
Performance Analysis of Anti- Disturbance of DS - CDMA and Using in Satellite Communication
wan rong gen ; cui zuo ; li zhi gang
..............page:3-4
Encrypting the Computer Datum with m Sequence and Analyzing its Safety Performance
li zuo ; li yun zuo ; li zhi gang
..............page:1-2
zhong jian jian yu jin rong xin xi an quan
wang le
..............page:90
A Role- Based Access Control Approach
huang ying
..............page:88-89
ji suan ji ji shu zai dian lu yu xi tong de an quan xing she ji zhong de ying yong
jia chao hua ; shao zhu sheng
..............page:84-85
Multicast Security Research
dai wei guo ; sun le chang ; dan hong
..............page:41-42
e yi dai ma ji shu po xi
chen jie ; liu ke sheng ; dan hong
..............page:39-40
Building Secure Police treatment System Based On J2EE
wang tao ; wang yong yi ; liu ke sheng
..............page:37-38
The application of CORBA and AGENT in the network application simulation system
tang yang chun ; lu yu liang ; wang yong yi
..............page:35-36
ji yu xml an quan ji shu yan jiu yu ying yong
ding lian lian ; zhu xue yong
..............page:33-34
xin xi yin cang ji shu ji qi ying yong
li qiang ; guo zhen hua ; zuo bing
..............page:30-32,13
The Technology of Encryption and Its Usage
chen jian xiong ; liu ke sheng
..............page:99-100
Bluetooth technology Security Architecture and Security Measures Analysis
yan de bin ; ling yong yin
..............page:78-80
Design of a system for vulnerability scan and detection
sun zuo ren ; han yu sheng ; shao li kang
..............page:76-77
Security Research Of P2P Based On distributed Protocol
fei xin yuan ; chen qing ping
..............page:74-75
Principle analysis and system design of network scanning system
zhou jing cai ; zhu lei ming
..............page:72-73
Analysis of Snort Rule Optimizer Technology
zheng jing hua ; lu yu liang
..............page:69-71
tcp/ip xie yi cui ruo xing fen xi
yao zuo ; zhu lei ming
..............page:67-68,63
internet yu nei zu bo lu you xie yi de fen xi yu bi jiao
yang guo zheng ; lu yu liang ; dan hong
..............page:64-66
gou jian linux an quan cao zuo xi tong de guan jian ji shu yan jiu
xu jian qiao ; zhu lei ming ; zhang zhi qiang
..............page:62-63
Research on Security Polity of Oracle database
wang yong yi ; wang tao ; zhang yong
..............page:60-61
ji suan ji bing du jian ce ji shu yan jiu
tao ( yan ye ); sun le chang ; liu ke sheng
..............page:58-59
Research on a Honeypot System for Capturing Email
li jian ; liu ke sheng ; jie she
..............page:56-57
Research of Authorization on Bluetooth LM
bai zuo ; jie she
..............page:53-55
Intrusion Detection Technology and the Analysis of Its frangibility
guo hong gang ; liu ke sheng
..............page:49-50
ad hoc wang luo de an quan wei xie ji an quan ce lue
dong kun ; dan hong
..............page:43-45
jun dui ji suan ji wang luo xin xi an quan yu fang hu
hu shuang xi ; lan han ping ; jin jia cai
..............page:97-98
The research of intrusion detection technology
xu de peng
..............page:93-94,92