Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Information Technology
1009-2552
2010 Issue 2
Encryption technology for hologram of optical system
zhang qiu xia
..............page:33-35
Programming and realization of Chinese segmentation plug on Nutch
cai xiao yan ; shen wei ; hu zuo zuo ; cao yong gang
..............page:97-100,103
Discussion on application of PDA in oil wells management
wang yuan zuo ; xie wei ; zu shi qiang ; li chun yan ; wang yi ming ; chen lei
..............page:94-96
Implementation of VoIP system based on Asterisk
su kai rong ; qiu lei
..............page:56-58
Research on petroleum industry system integration based on ESB
liu yan ming ; li jian ; yang jing
..............page:15-17
Analysis of network information security
wang zuo ; xi zhong
..............page:125-128
Research on relay selection scheme
yuan zhu yuan
..............page:49-51
Study on agent-based simulation of task collaboration of a small-satellite network
long gang ; gou xian tai ; yi feng ; sun yan jun
..............page:8-10,14
Simulation of microcomputer principles experiments based on Proteus
ji xiang dong ; li xin e
..............page:36-39,44
An algorithm of main road detection from remote sensing image based on mathematic morphology
yang wen zuo ; wang mao zhi ; guo ke
..............page:4-7
Design of wide gap FH code sequence based on m-sequence
yang guang xuan ; wu qian ; gou xian tai ; jin zuo dong
..............page:1-3,7
Research on real-time ETL system model based on multi-Agent
zhang jun ; chen hong gang
..............page:71-73
Prevention and analysis on development of mobile phone virus
zheng chang xing
..............page:122-124
Three development patterns of database
wang peng ; wu qiang ; wang si yuan
..............page:112-114
Wireless monitoring system based on GPRS and its implementation
song zuo ; jiang fu chun
..............page:59-60,64
A pipelined loop array architecture
yang chao ; xie zuo ; mao zhi gang
..............page:23-27
Application of SRTM DEM to phase unwrapping problem in InSAR data processing
wang zuo lin ; xiang zheng ; liu xing zuo
..............page:83-87
Implementation of program of encryption and decryption of Vigenere cipher
xu xiao hua ; li min ying
..............page:115-117
Bluetooth-based design of gateway in intelligent home network
pu dong bing ; zhao dong lai ; zhang xue ; zhang xue jing ; ma zhi qiang
..............page:11-14
Design of intelligent car system based on MC9S12
kang xiao sheng ; wang bing
..............page:18-22,27
Embedded system design for electrochemical detector of biochip
lu xiu li ; wang hui
..............page:40-44
Virtual burst switching in optical burst switched networks
wei cheng ying
..............page:45-48,51
Design of interactive database system based on SQL and Dreamwaver
sun yuan ; li hong hong ; yu ping ; cao wei ; zhao wan guang
..............page:101-103
xin xi tian di
..............page:目次2
A semantic searching system model based on ontology
li yu ; luo jun
..............page:52-55
Design of automobile instrument based on CAN bus
xiao chu hai ; liang jie shen ; huang zuo zhong
..............page:80-82,87
Research on information integration dynamic management analysis software
zhong gui ling
..............page:118-119,124
System analysis and Matlab simulation of OFDM
jing min ying
..............page:77-79
Application of noise source fault signals separation with ICA
zhang chao zhong ; bai xiao li ; hu zuo qing
..............page:91-93
Design and implementation of a miniature human resources management system based on C/S
ma chong ; zhao zuo ; fan zan
..............page:104-107
Database injection attacks and strategy for coping with it
wang xi zhong ; wang zhi ; huang jun qiang
..............page:120-121,124