Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2012 Issue 15
Based on DSP Online Detection System for Products Defect
LI Bai-yan;ZHANG Jian
..............page:3572-3573,3576
Briefly to the Flash Animation Advertising Design
SUN Ying;SUN Guo-gang
..............page:3711-3712,3715
yi gou shu ju ku xin xi gong xiang ji shu yan jiu
qiu yan ling
..............page:3484-3485,3502
Accounting Information of the Computer Network Environment
ZHENG Zhao-le
..............page:3532-3533
Research of Feature Selection in Hyperlipidemia Classification
HUANG Zhi-Hang;ZHANG Qi-Rui
..............page:3656-3658
qi ye wang zhan wei hu wen ti tan tao
xue wan zhen
..............page:3600-3601
Thoughts on Subject Construction After the Restructuring of Independent Colleges
WANG Fang;ZHAO Shao-lin
..............page:3629-3631
Research and Development on Mobile Application in AutoCAD
SU Xing
..............page:3708-3710
wlan kang gan rao fen xi yi ji bi mian he xiao chu
li xin hong zhang min ju
..............page:3538-3541,3545
Student Cadres Information Management System
CHEN Gang1;LIU Li2
..............page:3486-3490,3493
Management and Maintenance of the College Computer Room
LUO Zhu-qin
..............page:3622-3624,3635
Big Data Background: Studies,Analysis and Forecasts of the Highway Toll System Data
DU Yu-hui1;JIANG Jiao-li2
..............page:3752-3754
Method of Vocational Computer Skills Competitions
SUN Yao-qin
..............page:3605-3606
Based on Data Mining Study on Employment Situation of Higher Vocational Students
ZHOU Liu-jun1;WANG Jing2
..............page:3505-3509
zai xian wen da xi tong de she ji yu zhi zuo
kong wei hong li wen jie
..............page:3569-3571
Design of Online Shopping System Based on Struts and J2EE
REN Zi-ting
..............page:3590-3591,3597
Personal Data security Protection Mechanism in Cloud Storage
QIU Bo-yun
..............page:3549-3551,3565
ji yu .net ping tai shi xian zip wen jian cao zuo
li wei
..............page:3574-3576
Design and Implementation of Practical Signal Generator
ZHANG Kai
..............page:3733-3736
xiao yuan wang shi pin fa bu xi tong yan jiu yu shi xian
zhao ning jiang zuo zuo ze yin jun
..............page:3713-3715
Design of Servo Control System Based on Arduino
CAI Rui-yan
..............page:3719-3721
Point-to-point Information Transmission in the Daily Management of the Office
YU Kai-rong1;ZHU Jian-guo1;SHEN Jian2
..............page:3748-3751
gong gong zhi wen guan li ping tai zai yi yuan de ying yong yu tan tao
xu qin xie qiong xu zuo
..............page:3684-3685
yi zhong ji yu qi yi zhi fen jie de lu bang shui yin suan fa
xu zuo lei lv hong wei
..............page:3686-3688,3695
tan xi ji suan ji wang luo an quan lou dong ji jie jue cuo shi
yang ming sheng
..............page:3530-3531,3537
Long Term Prediction Scoring System Architecture Design and Realization Method of the Research
QI Xin;DOU Hai-wei;REN Shu-xia;YANG Hong-mei;HU Dong-li;BAN Xin;CAO De-yu;ZHANG Hua-rong
..............page:3586-3589
Research of Security Control Technology of SQL Server 2005
WU Nai-xin1;LI Ping2
..............page:3503-3504,3513
The Value of Post-production in Photoshop
LV Xin
..............page:3703-3704,3710
zhong wen zi you duan wen ben xin xi chou qu fang fa de yan jiu
zhu ling ling yang ai qin wei xiao ning
..............page:3691-3692
Data Compression Method Realization Based on the Folding Method
FAN Hai-bo
..............page:3494-3496
qian tan bi ji ben dian nao dian chi de bao hu dian lu
wang xiao ling
..............page:3728-3730
li yong qinq ji shu gou jian bian ping hua wang luo
ma an long
..............page:3528-3529
jiao huan ji zai xiao yuan wang guan li zhong de ying yong
shi cong zheng
..............page:3552-3553,3563
Heritrix Architecture-based Vertical Search Engine
CHEN Hao;GUAN Wei
..............page:3662-3664
qian tan qi ye xin xi an quan ji shu
xiao wei
..............page:3491-3493
Image Enhancement of License Plate Recognition System on Foggy Days
ZHANG Fei
..............page:3659-3661,3673
How to Solve the Position Offset of APDIV Layer in the Web Browser
TIAN Yan
..............page:3592-3593,3601
Digital Encryption Technology and Daily Application
SU Zhi-zhong
..............page:3668-3669,3678
Vehicle Detection Algorithm Based on Spatial and Temporal Filtering of Motion Vector Field
SUN Li-hu;XIONG Lin;FAN Zhi-qiang;HUANG Yi;GAO Zi-feng
..............page:3670-3673
The Interaction and Applications of Delphi and Flash
JIN Jie
..............page:3566-3568
The Design of Video Monitoring System Based on GPRS
HUANG Qing
..............page:3698-3700,3707
Machine Learning in Multi Objective Optimization Algorithm
ZHENG Xiu-lian
..............page:3689-3690,3697
The Development and Design of Office Automation systems
JI Wei
..............page:3746-3747
ji yu shu ju ku de oa ban gong xi tong de yan jiu
huang jian guo
..............page:3497-3499,3496
yun cun chu zai qi ye ying yong de wei lai qu shi tan xi
zhang hua yan
..............page:3558-3560
ji yu owc de kao shi xi tong cheng ji tong ji tu biao de shi xian
lv xiu qin
..............page:3577-3578,3582
Exploring Integrated Teaching of the Course“Wireless Network Technology”
LI Hong-bin;ZHANG Ai-qing
..............page:3653-3655
The Practice of Autonomous Learning Model in Fundamentals of Computers
ZHENG Wei-dong;JIANG Geng-hao
..............page:3645-3646,3650
The Probe of Basic Computer Education in Architecture Colleges
SUN Guang-ling
..............page:3627-3628
Practice Research about Computer Fundamental Education Based on Computational Thinking
WANG Li-na;DU Mei-fang;ZHAO Yan-li
..............page:3632-3633,3641
Teaching Embedded System of Internet of Things
ZANG Jin-mei
..............page:3636-3637
Access the HTML5 Video Site Based on a Proxy Service
LIANG Hong-bo
..............page:3514-3517,3527
Termination of Serial linear Assignment Loop Programs
ZHAO Xiao-yan
..............page:3737-3738
zhi neng yi dong shi pin jian kong fu wu qi ying jian she ji yu shi xian
wang hong ge cao jing tai
..............page:3716-3718
lun wang luo an quan xi tong she ji de guan jian
qiu zi lun
..............page:3546-3548
delphi7.0 shu ju ku kai fa shi yong ji qiao
zhong ming
..............page:3481-3483
The Software Anti-interference Design of MCS-51
LI Li
..............page:3725-3727
The Application of Computer Image Processing Technology in Medicine
ZHANG Gui-ying
..............page:3696-3697
The Implementation of UI Auto-generate for Remote Controller Based on XML
CAI Rui1;PENG Wen-kui2
..............page:3739-3741,3743
qian tan ji suan ji bing du yu fang zhi
zhang peng liu feng jie
..............page:3561-3563
Online Examination System Security Policy Analysis
ZHOU Xiu-yuan
..............page:3564-3565
guang mo kuai nei zhi guang fen lu qi de ke xing xing fen xi
wang wei liu wan hui du wen long
..............page:3742-3743
A New Intrusion Detection Method Research
LIU Qi-chen1;2;SHI Rong-hua1
..............page:3542-3545
Algorithm Design of Subjective Question Auto Assessment
MU Wei-wei1;2;WANG Guo-cai1
..............page:3579-3582
Regional Network Teaching Platform Function Research
SHA Sheng-hong
..............page:3625-3626
Moodle-based Informational Course Design Practice——Taking Camera Basis for Example
ZHU Ai-fen;ZHAO Li-na
..............page:3651-3652,3655