Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2012 Issue 3
Teaching Study on the University Computer Foundation Course
LI Chun-hong
..............page:631-633
The Research and Design of Police Command and Dispatch System Based on the WebGIS and 3G
QIAO Qiao1;ZHUO Lin2;LUO Wei1;LUO Yu1
..............page:562-565
li yong labview de cin jie kou shi xian shu zhi ji fen yun suan
gou yan na ma nuan
..............page:691-692,710
Intrusion Detection System Model Based on Data Mining
LUO Yun;LU Lan
..............page:560-561,585
qian xi ju yu wang zi yuan gong xiang
zhou jun
..............page:584-585
dian nao dian yuan chu tan
huang guang cai
..............page:689-690
The Management Innovation of Oil Sales Company Based on SCM of ERP
WANG Yun-jin;FENG Shu-wen
..............page:522-523,533
Economic Analysis on the Cloud Computing Terminal Architecture Model of E-reading Room and its Practice
HAN Zhi-hong;ZENG Qing-yan;DU Yan-tao;WANG Zi-hu;ZHANG Huan-le
..............page:530-533
Typical Application of Multisim10 in Teaching Circuit
WU Ping;LI Xin-hui
..............page:649-651,656
gao zhi yuan xiao gong gong ji fang guan li yu wei hu tan suo
wang qing wei
..............page:720-721,731
An Analysis of Aspect Oriented Programming in Software Design
DENG Fang-lin
..............page:595-596,598
NCRE Two VFP Examination Paper on Computer Analysis
LI Ai-hua
..............page:629-630
Skillfully IF and vlookup Function and its Nested Realize Employee Wages Management
LIAO Ming-mei;SHU Qing-lu
..............page:601-603,607
Challenge of Campus WLAN by Wireless Intelligent Terminal
WANG Ji;ZHOU Chi-jia;JIANG Xiao-qiang
..............page:576-578
The Test System Design and Implementation
HE Ning;LIU Jian-yu
..............page:734-735,738
she bao shu ju ji cheng xi tong etl yan jiu yu kai fa
lin hai
..............page:506-507
qian tan hu lian wang luo de tong xin yu wormhole xun jing
lu li zuo
..............page:558-559,591
Web Verification Code Technology and Implementation Based on ASP
WEN Wei-fang
..............page:552-554,557
c++ he java zhong oop ji zhi zhi cha yi xing fen xi
feng gao feng feng yan ru yuan pei jian
..............page:599-600
ipv4 xiang ipv6 guo du de sui dao ji shu yan jiu
he jun
..............page:539-540
dian zi shang wu xin xi xi tong xu qiu te dian fen xi
gu yan ding
..............page:527-529
Information on Non-traditional Security Thinking
HUANG Song
..............page:541-542,545
The Practice of Case Method in Photoshop Course Teaching
WANG Qiu-ling
..............page:644-646
Library of Personalized Service
LI Jing
..............page:711-712,733
ji yu jiao xue zi yuan ku de wang luo ke cheng jian she fang fa
luo ming shan huang ai qing
..............page:640-642
A Dynamic Feedback Measurement Mechanism for Three-layer Network
GAO Wei;XIAO Xiao-qiang;HE Jing
..............page:707-710
The Application of XML-based Data Exchange Technology in Universities Information
LIN Li;FU Xiao-juan;CHEN Li-li
..............page:713-715
Application of Network Teaching Decision Support Platform Based on Data Mining
CAO Zhi-yong1;LU Han-yu2
..............page:534-535,538
Investigate for QoS Solution Based on IPv6
CHEN Hua-shan;WANG Yi
..............page:536-538
Study on Teaching of Word Experiment
XIA Yun
..............page:652-653,658
dian da jiao xue kao he xi tong yan jiu yu she ji
zhang jing
..............page:661-662
The E-card System in the Digital Campus
BAO Ke1;2
..............page:736-738
Lianliankan Simulation Program Based on Vb2005
CHEN Wei-Kang
..............page:597-598
ji yu gong zuo guo cheng de dian gong xue jiao xue gai ge de tan tao
dai yue mei yuan hui jie
..............page:624,635
On Campus Network Service Management
SHANG Fei;WANG Jun-jie
..............page:566-567,589
jian shu ads-bin ji shu zai zhong guo de ying yong qian jing
liu guo feng
..............page:704-706
The Analysis Model of the Bank Customer Churn Based on Artificial Neural Network
LIN Rui1;2;CHI Xue-zhi3
..............page:665-667,676
nong ye xin xi hua yu xin nong cun jian she
xu ming li zhang pu xiu
..............page:718-719
CRM Design and Implementation Based on Open Source Frameworks
ZHAO Yong-hui; DENG Wen-xin
..............page:617-619
The Study in Integrating of Information Technology with Curriculum
ZHANG Yun-jiang
..............page:727-728,740
SVN Application in the Campus Network Server Storage
LIU Shu-Lin;LI Li-rong;WANG Tian-ming
..............page:548-549
Game Program Development and Implementation Based on QT4.7 of ARM Embedded Linux
WANG Ru;SONG Wei;ZHOU Xing-yi
..............page:614-616
Realization of Software Changing Skins Based on USkin
LUO Ru-juan
..............page:608-610,613
ren lian tu xiang de yu chu li
fang fen qi bian xue jun
..............page:663-664
tu xiang jian kong ji shu de yan jiu yu ying yong
chai ji gui
..............page:677-678
On How to Optimize the Performance of Several SQL Database Analysis
SHEN Hai-feng1;2
..............page:517-518
On Quality-control of Two-way Evaluation System
HUANG Ying-tang;GAO Yong-feng;MEI Lin
..............page:627-628,633
Application of an Improved FCM Algorithm in Medical Science
XU Li-jia;TANG De-yu
..............page:668-672,683
zhong zhi xue xiao ji suan ji ji chu jiao xue gai ge yan jiu
ye sheng qiang
..............page:739-740
A Comparison of Different Database Access Systems
BAI Peng;ZHAO Xiang-ling
..............page:497-498
Acquisition and Analysis of Noise Signal Based on MATLAB and Soundcard
ZHOU Chang-min;TANG Lin-hai
..............page:684-686
ju yu wang ji shi tong xin ruan jian de yan jiu yu shi xian
zhang guo zheng hong kai
..............page:579-581
Research and Simulation of Worm Propagation Model Based on Bot-Honeynet
LI Xue;ZHU Cheng-rong
..............page:586-589
Talking about the Cloud Computing in Medical Information
LI Yue1;SUN Chao2;WU Jie3
..............page:504-505
Remez Algorithm on the Voice Separation
XU Fang-xin
..............page:698-699
ACCESS Design Method Overview of Calculation Query
LU Yang;LI Han
..............page:515-516
san ge jiao wang gong ju yu shi xian ren cai pei yang mu biao zhi jian de guan xi
liu dong shan zhou xian chun
..............page:636-637
Easy Making Cataloged Album
DONG Ya1;FANG Shao-hong2
..............page:679-680,686
qian tan wang luo xin xi an quan yu fang fan yan jiu
liu yi dan
..............page:550-551
wang luo lun tan pa chong de she ji
tang yong
..............page:570-572
On the Construction of Home LAN
TIAN Lu1;LAN Jin-feng2;ZHANG Qiang2
..............page:573-575,581
Computer Network Intrusion Detection Technology Analysis
ZHANG Jing
..............page:582-583,594
Students’Score Analysis Based on Clustering Method
SONG Xiang-hong1;BAI Ming-yue2
..............page:519-521
Design and Realization of a Kind of Camera Calibration System
WANG Jian-hua1;2;FENG Fan1;LIANG Wei2;WANG Hui-ping1
..............page:681-683
The Design and Realization of Network Examination System Based on the AJAX
YU Sheng;ZHANG Han-wei;WANG Du-xiang
..............page:743-744