Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Weinan Teachers College
1009-5128
2006 Issue 2
On TV Signal Digitalized and Code Compressed
LIN Guan-cheng
..............page:27-31
The Rotated Index Signs of the Cluster and the Theories of Polya
LU Guo-liang;CHEN Bin
..............page:24-26
Factors and a Method of Selecting a Site for a Logistical Centre
CHEN Si-yun;LIU Xin-bin
..............page:20-23
Unusual Differential Equation and Semi-odd Number Rank Unusual Bessel Equation
JI Xiao-long;DUAN Zhi-xia
..............page:17-19
Relative Strong T1 and Hausdorff Separation in L-fuzzy Topological Space
LI Yao-long;ZHAO Zheng-bo
..............page:7-10
Robust H∞ Control of 2-D Roesser Models with New Uncertainties
ZHANG Yan;WU Bao-wei
..............page:3-6,10
Service and Education in University's Dormitory Management
WANG Xiao-long;WEI Song
..............page:93-96
On Back-style High Jump Speed
MU Feng;LIU Zheng-wu
..............page:81-83
On Course Reform of Track and Field in Universities
SONG He-ping
..............page:78-80
Thoughts on Modern Accounting Teaching
Wang Da-jiang
..............page:75-77
A Survey: Higher Educational Cyber-Enrollment
LEI Jian-ping
..............page:72-74
Application of Modern Educational Technologies in Physical Education
LUO Wei-liang;WANG Hong-yan
..............page:66-68
Research and Development of Green Foods Additive
SUN Jing-xuan
..............page:63-65
Development and Application of Ceramic Matrix Composite
JIAO Geng-sheng;LI He-jun;LI Ke-zhi;WANG Chuang
..............page:58-62
Determination of the Ketamine Hydrochloride by Linear-Sweep Polarography
WANG Fu-min;LIU Juan
..............page:55-57
Comparison and Choice of B/S and C/S Mode
CAI Chang-an;WANG Ying-ying
..............page:47-50,74
Reformation of Elimination of ε-consequence
SUO Hong-jun;XI Jian-rong
..............page:44-46
Application of ECC Arithmetic in Digital Signature
PANG Wen
..............page:41-43
Testing For Embedded Memory
LI Yun-fei;LI De-shui
..............page:37-40
Analysis of Security Protocol System in the Network Based On IPv6
ZHANG Guo-jun;RENG Hong
..............page:35-36