..............page:4579-4580
..............page:4477,4481
..............page:4420-4421
..............page:4360-4362
..............page:4391-4392
..............page:4356-4357
..............page:4381-4382
..............page:4366-4367
..............page:4422-4423
The Matlab Code of Born
yu dan; sun yan; dai yu-yin(basic course department of aviation university of air force; changchun 130022; china)
..............page:4576-4577
Non-Binary LDPC Codes Design Based on Euclidean Geometries
huang cheng-rong1; 2; guo ying1; 3; zeng gui-hua3(1.department of computer and engineering; guangxi economic trade polytechnic; nanning 530021; china; 2.school of information science and engineering; central south university; changsha 410083; china; 3.department of electronic engineering; shanghai jiaotong university; shanghai 200240; china)
..............page:4520-4522
..............page:4388-4390
..............page:4547-4548,4551
..............page:4581-4582,4584
..............page:4368-4370
..............page:4542-4543
..............page:4518-4519
..............page:4590,4592
..............page:4371-4373
..............page:4535-4537
..............page:4339-4341
..............page:4408-4409,4415
..............page:4487-4489
..............page:4461-4462
..............page:4385-4387,4411
..............page:4500-4501
..............page:4349-4351
..............page:4396-4398
..............page:4544-4546
..............page:4516-4517
..............page:4383-4384
..............page:4337-4338,4362
..............page:4565-4566
..............page:4509-4510,4513
..............page:4347-4348
..............page:4556-4557
..............page:4525-4527
..............page:4560-4561
..............page:4504-4506
..............page:4514-4515
Experimental Course of the Operating System and Improvement
song-yu1; he xiao-li2; zhou yu-jie3(1.network center; sichuan university of science & engineering; zigong 643000; china; 2.school of computing; sichuan university of science & engineering; zigong 643000; china; 3.school of economics and management; sichuan university of science & engineering; zigong 643000; china)
..............page:4585-4586
..............page:4578,4580
..............page:4410-4411
..............page:4523-4524,4534
..............page:4416-4417
..............page:4441-4442
..............page:4482-4484
..............page:4443-4445
..............page:4414-4415
..............page:4502-4503,4506
..............page:4452-4453
..............page:4376-4378
..............page:4448-4449
..............page:4388-4390
..............page:4450-4451
..............page:4463-4464
..............page:4587-4589
..............page:4482-4484
..............page:4542-4543
..............page:4578,4580
Experimental Course of the Operating System and Improvement
song-yu1; he xiao-li2; zhou yu-jie3(1.network center; sichuan university of science & engineering; zigong 643000; china; 2.school of computing; sichuan university of science & engineering; zigong 643000; china; 3.school of economics and management; sichuan university of science & engineering; zigong 643000; china)
..............page:4585-4586
Non-Binary LDPC Codes Design Based on Euclidean Geometries
huang cheng-rong1; 2; guo ying1; 3; zeng gui-hua3(1.department of computer and engineering; guangxi economic trade polytechnic; nanning 530021; china; 2.school of information science and engineering; central south university; changsha 410083; china; 3.department of electronic engineering; shanghai jiaotong university; shanghai 200240; china)
..............page:4520-4522
The Matlab Code of Born
yu dan; sun yan; dai yu-yin(basic course department of aviation university of air force; changchun 130022; china)
..............page:4576-4577
..............page:4514-4515
..............page:4504-4506
..............page:4560-4561
..............page:4347-4348
..............page:4509-4510,4513
..............page:4565-4566
..............page:4441-4442
..............page:4478-4481
..............page:4574-4575
..............page:4454,4456
..............page:4473-4474
..............page:4424-4425
..............page:4572-4573
Data and Information Viewpoint
li xue-ping1; luo qiang-yi2(1.pla university of science and technology; nanjing 210007; china; 2.institute of electronic equipment system engineering company; beijing 100141; china)
..............page:4532-4534
..............page:4493-4494
..............page:4342-4344
Visual Basic Making Stopwatch
yang ji; wang chun-hong; chang jing(mathematical office; aviation university of air force; changchun 130022; china)
..............page:4440
..............page:4467-4468
..............page:4455-4456
..............page:4471-4472
..............page:4403-4405
..............page:4393-4395
..............page:4345-4346
..............page:4549-4551
..............page:4465-4466
..............page:4587-4589
..............page:4569,4571
..............page:4446-4447
..............page:4406-4407
..............page:4352-4353
..............page:4412-4413
..............page:4429-4430
..............page:4511-4513
..............page:4363-4365
..............page:4469-4470
..............page:4498-4499
..............page:4414-4415
..............page:4443-4445
..............page:4412-4413
..............page:4410-4411
..............page:4383-4384
..............page:4516-4517
..............page:4547-4548,4551
..............page:4581-4582,4584
..............page:4368-4370
..............page:4518-4519
..............page:4590,4592
..............page:4371-4373
..............page:4463-4464
..............page:4493-4494
..............page:4342-4344
Visual Basic Making Stopwatch
yang ji; wang chun-hong; chang jing(mathematical office; aviation university of air force; changchun 130022; china)
..............page:4440
..............page:4467-4468
..............page:4455-4456
..............page:4511-4513
..............page:4363-4365
..............page:4469-4470
..............page:4498-4499
..............page:4471-4472
..............page:4403-4405
..............page:4393-4395
..............page:4554-4555
..............page:4352-4353
..............page:4452-4453
..............page:4376-4378
..............page:4523-4524,4534
..............page:4416-4417
..............page:4478-4481
..............page:4554-4555
..............page:4374-4375,4405
..............page:4562-4564
..............page:4358-4359
..............page:4495-4496
..............page:4528-4529
..............page:4379-4380
..............page:4418-4419
..............page:4552-4553
..............page:4435-4436
..............page:4570-4571
Phishing Attacks and Countermeasures Research
liu ke1; lu han-yu1; 2; wang hua-jun1(1.college of information engineering; chengdu university of technology; chengdu 610059; china; 2.department of computer and information engineering; guizhou university; guiyang 550003; china)
..............page:4399-4400
..............page:4530-4531
..............page:4567-4568
..............page:4497,4501
..............page:4507-4508
..............page:4558-4559
..............page:4457-4458
..............page:4354-4355
..............page:4475-4476
..............page:4401-4402
..............page:4459-4460
..............page:4485-4486,4489
..............page:4426-4428
..............page:4583-4584
..............page:4591-4592
..............page:4431-4432,4445
..............page:4538-4541
..............page:4437-4439
..............page:4490-4492
..............page:4433-4434
..............page:4450-4451
..............page:4473-4474
..............page:4345-4346
..............page:4549-4551
..............page:4569,4571
..............page:4429-4430
..............page:4465-4466
..............page:4446-4447
..............page:4574-4575
..............page:4454,4456
..............page:4406-4407
..............page:4502-4503,4506
..............page:4424-4425
..............page:4572-4573
Data and Information Viewpoint
li xue-ping1; luo qiang-yi2(1.pla university of science and technology; nanjing 210007; china; 2.institute of electronic equipment system engineering company; beijing 100141; china)
..............page:4532-4534
..............page:4448-4449
..............page:4535-4537
..............page:4339-4341
..............page:4408-4409,4415
..............page:4487-4489
..............page:4461-4462
..............page:4385-4387,4411
..............page:4579-4580
..............page:4422-4423
..............page:4525-4527
..............page:4556-4557
..............page:4366-4367
..............page:4381-4382
..............page:4356-4357
..............page:4337-4338,4362
..............page:4391-4392
..............page:4360-4362
..............page:4420-4421
..............page:4477,4481
..............page:4544-4546
..............page:4433-4434
..............page:4401-4402
..............page:4500-4501
..............page:4396-4398
..............page:4349-4351
..............page:4530-4531
..............page:4528-4529
..............page:4418-4419
..............page:4426-4428
..............page:4591-4592
..............page:4431-4432,4445
..............page:4552-4553
..............page:4435-4436
..............page:4570-4571
Phishing Attacks and Countermeasures Research
liu ke1; lu han-yu1; 2; wang hua-jun1(1.college of information engineering; chengdu university of technology; chengdu 610059; china; 2.department of computer and information engineering; guizhou university; guiyang 550003; china)
..............page:4399-4400
..............page:4567-4568
..............page:4497,4501
..............page:4507-4508
..............page:4558-4559
..............page:4459-4460
..............page:4374-4375,4405
..............page:4562-4564
..............page:4457-4458
..............page:4485-4486,4489
..............page:4354-4355
..............page:4379-4380
..............page:4583-4584
..............page:4538-4541
..............page:4437-4439
..............page:4358-4359
..............page:4495-4496
..............page:4490-4492
..............page:4475-4476