Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Control & Automation
1008-0570
2005 Issue 11
An Encryption scheme in remote computer monitors system
Han;Mingjun Wang;Wei Hu;Guiling
..............page:69-71
The Method Comparison Between GA and HS Solving Logistics Container-loading Problem
Gong;Huili Ding;Xiangqian
..............page:147-148,113
The Application of Security Authentication Technology in "SoftMan" System
Hong;Jingmin Bna;Xiaojuan Zeng;Guangping Tu;Xuyan
..............page:72-74
The Design and Implement of Visual-talk Connection Based on Intranet
Zhang;Qingsong Yu;DapengPLA Information and Engineering University;Zhengzhou;4500020
..............page:15-16,86
client/server mo xing shu ju shi xian ji shu
han shuang xia
..............page:32-34
Design and Implementation of Network Information System Based on C/S Mode
Yang;Zanguo Gao;Jinghui
..............page:27-29
Research on a Web-based Nuclear Scale System
Wang;Aibing Li;Wei Wang;Yuqiao Guan;Lianjun
..............page:17-18,121
Development of Universal Module for Port Operation Under Windows2000/XP
Huang;Kang Jiang;Deyu
..............page:144-146
The database module design of the real-time data collection and management on industry production
Zi;Shubo Yu;Demin Xu;Zengpu Wang;Yongqiang
..............page:104-105,71
Application of the Wireless Digital Transmission Technology in Remote ECG Monitoring System
Xu;Lixin Li;Qingliang;Chen;Zhen Qi;Xinbo Zhang;Xincheng
..............page:10-12
A Controlling System of Beam Diagnoses Adopting DCOM
Gao;Shiwei Liu;Caihong Liu;Yali
..............page:1-2,23
A New Type of Watermark Attack
Zhao;Hua Yuan;Duntao Lin;Hongjun Dong;Chunli
..............page:84-86
Reliability Design of Automatic Safety Control System for XX Series UAV
Xue;Yanfeng Xue;Peng Chen;Xiangyu
..............page:80-81,34
Design and Realization of IPv6 Firewall
Chen;Lei Zhang;Zhigang Xiao;Wenshu Zhang;Yujun
..............page:63-65
A Rapid Method for Face Center Extraction
Liu;Junwei Fan;Ruixia
..............page:48-49,68
Application of Neural Network Based on Ant Colony Algorithm in Fish Disease Expert System
Hu;Liping Xu;Yongcheng Gao;Wen Hu;Liang
..............page:149-151
Application of CBR Technology in Forestry Conflagration Forecast System
Sun;Yi Zhang;Yong Chu;Yanhua
..............page:152-153,146
Study on Remote Testing and Controlling System based on Internet
Gu;Zhaobing Feng;Changjiang Zhao;Pan Lang;Bin
..............page:21-23
The Implementation of Real-time System Detecting and Defending against DDoS Attack Based on Hardware
Zhao;Hua Luo;Xiaofu Cheng;Jun Li;Tiefeng Li;Ou
..............page:75-76,98
Ear Image Edge Detection Based On Contour Composition
Qi;Shuai Mu;Zhichun Xu;Zhengguang Yuan;Li
..............page:39-41,132
SoftMODEM- An Signal Recognition and Modem System Basde on Software Radio Technology
Wen;Xiang Chen;Guojie Wang;Zhigang
..............page:125-126,79
The Research of Host Intrusion Detection System Related with Firewall
Gao;Guangyong Chi;Lejun Wang;Yanchun
..............page:66-68
Implement of New Type Lock Mechanism for Scope Consistory
Yu;Yang Kuang;Biying Shen;Jinshan Lu;deping
..............page:141-143
Design of Parasitical Transmission System for Information
Wang;Changlong Li;Deliang Wang;Jin Liu;Bing
..............page:5-6,103
The Application of SQ913 in monitor of taxies
Huang;Yuhang Tang;Long
..............page:50-52
The Design and Implementation of an Encryption Equipment for a special network
Hu;Huanjuan Li;Gang Huang;Chunsong
..............page:82-83,9
Design And Implementation Of Information Familial Wiring Gateway CGI
Ma;Jiming Cheng;Lihui Jin;Baohua
..............page:13-14,55
Concurrently controlling of data management system in network environment
Sun;Yushan Zhou;Lei Wang;Lan
..............page:30-31
The Application Analysis of BGP-4
Tan;Mingjia
..............page:24-26
The Application of Relative Edge Invariant Moment on Pattern Recogniton
Li;Lihong Miao;Jingli Wang;Jingshuang An;Qingbin
..............page:42-43
Research on Security of Win32 Ring0Privilege Protected Mechanism
Huang;Huaxing Shu;Hui Xie;Yuqiang Luo;Junhong
..............page:56-57
Data mining research based on mobile computation
Long;Yinxiang
..............page:35-38
Comparison of the Network Queue Administration Algorithm
Yin;Hongyun Wang;Zhiliang Wang;Li
..............page:3-4,9
Using The Image Gray Characteristic to Realize the Vision Detection f Translucent Product
Xie;Li Wang;Yongqiang Yu;Demin Xu;Zengpu
..............page:44-45,12
Design And Realization of UM71 Frequency-shift Capacitance Data Management System
Wu;Xueling Luo;Wenfeng Zhang;Jiashu
..............page:106-108
The Design of MPEG-4 system Based on the Multi-DSP
Liu;Zhiguo Jing;Xinxing Yang;Haiyan Yu;Shiquan
..............page:46-47
An XML-based Model and Implementation for Production Scheduling System
Qiao;Weiyi Li;Tieke
..............page:101-103
Design and Realization of PCI Arbiter
Huang;Junkai Peng;Junyi
..............page:19-20,23
The network attack and the precaution based on ICMP
Zhang;Zhenguo Zhang;Nan
..............page:77-79
The urban and rural electrical network management system based on GIS
Wang;Hongyuan Zhang;Wu Jin;Lili
..............page:96-98
Researh of Bluetooth Bottom Security Mechanism and Realization
Wu;Xi Jiang;Liehui
..............page:87-89,9
Study and Design of Intelligent CAD Based on Expert System Technology
Shi;Linxiang Ye;Jianping Wei;Shutao
..............page:133-135
The Orientatin System of the Mobile Robot Based on GPS/GIS/GSM
Cui;Feng Zhang;Minglu Ding;Chengjun Liu;Bing
..............page:99-100,55
Profibus-based Greenhouse control information management system
Chen;Qingwen Tian;Zuohua Liu;Shan
..............page:109-110,143
Software Maintenance Process Management Based on CMM and Tools Study
Wang;Xiaowei Zhu;Xiaodong Wang;Yigang
..............page:139-140,151
Feature Extraction in Human Face Recognition System
Wang;Dan Jia;Yunwei Lin; Fuyan
..............page:53-55
Multiblind Signature Scheme Based on Elliptic Curve
Chen;Zhigang Hu;Xiwei
..............page:58-59