Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2016 Issue 21
oracle shu ju ku wan zheng xing yue shu qian xi
chen yan qun ; wang hai yan ;
..............page:1-2
Fast Query and Implementation of Massive Data Based on Hadoop Platform
CHU Fu-yin;ZHANG Lin;HE Kun-peng;School of Computer Science;Southwest Petroleum University;
..............page:3-5
oracle zhong lob dui xiang cun chu fang wen yan jiu
dong zuo ;
..............page:6+8
shu ju ku an quan ji shu yu guan li tao lun
hua zuo ; yu zi ya ;
..............page:7-8
Key Technologies Research on Privacy Protection of the Era of Big Data
WANG Jing-ting;SUN Ya-hong;XIAO Shu-ping;Xi’an Fanyi University;
..............page:9-10+12
wa ye xing ye da shu ju ping tai de ying yong yan jiu
yan sun ; ye bai long ; tan yi yun ;
..............page:13-15
xu ni ji ju yu wang zu jian ji shu ying yong chu tan
yang yun hai ;
..............page:16-17
The Realization of A Lightweight Virtualization Firewall based on SOP Architecture
BU Tian-ran;Anhui Business College;
..............page:20-21+45
Research and Exploration of the Security Management of Information Websites in Universities
CHEN Ying;Network Research Center;South China University of Technology;
..............page:22-23
ji yu java kai fa ping tai de an quan xing yan jiu
dong xiao yan ;
..............page:24-25
Security System Construction of the Campus Network under the Background of Information Classified Protection
HE Lei;Network Information Center of WanNan Medica College;
..............page:26-27
shu ju zhong xin wang luo tuo pu jie gou yan jiu
wan hai tao ;
..............page:43-45
The Conceptual Design of Spam Assassin Based on Homomorphic Encryption
WEI Shao-lin;Shandong University of Science and Technology Institute of Information Science and Engineering;
..............page:46-47+50
Based on Association Rules Computer Intrusion Detection
XIANG Ling-ling;Pingdingshan Industry Vocational and Technical College;
..............page:51-52
ethercat wang luo ji shu ban dao ti zhi zao she bei ling yu de xin chong
xie wen ; luo hua ; zhou sheng yue ;
..............page:53-54
nei bu gong ji shi yan shu ju ji qian xi
yang guang ; wu zuo ;
..............page:55-56
ji yu ip178ch de kuang yong duo jie kou guang duan ji she ji
yao chao xiu ;
..............page:57-58
qian tan liao yang yuan wang luo an quan guan li dui ce
zhang hua gui ; wang hai yan ;
..............page:61-62
ji yu b/s jia gou de gao xiao shi yan guan li ping tai de she ji yu shi xian
ding ru gen ; wang zhong bin ; zhu zheng hong ;
..............page:70-71
yi dong ban jiao xue du dao ting ke ping jia xi tong jian she chu tan
chen zhao wen ; zuo rong xin ;
..............page:74-75
Typical Case Analysis of Software Defects Related to Memory Access
MENG Hong-wei;CEPREI;
..............page:76-80
ji yu yi dong xue xi de zi dong wen da xi tong she ji
qian qiang ;
..............page:81-82+84
ji yu j2ee he ionic de iter xue xi app she ji yu kai fa
tang zhong ping ; li ya wen ; zheng le yi ; shen bo ;
..............page:85-86
ju yu wang tong xun ruan jian de she ji he shi xian
tian mao qing ;
..............page:87-88
Mobile Learning Design Based on Mobile Cloud Computing
WU Yu-kun;Zhejiang Technical College of Posts & Telecom;
..............page:89-90
tu biao zai vb zhong de ying yong
xu bin ;
..............page:91-95
web fu wu qi ri zhi fen xi yu ke shi hua yan jiu
zou wei feng ;
..............page:96-97
xin xi hua rong he jiao yu zhuo yue ji xiao guan li mo shi tan jiu
lu rui ; yang de qin ;
..............page:98-99
eda ji suan ji fang zhen ji shu zai dian zi ji shu jiao xue de ying yong yan jiu
xie yu fei ; xi cong ling ; wang zhi yu ; zhu su qin ;
..............page:102-103+114
xin jian ben ke gao xiao java ke cheng gai ge yan jiu yu shi jian
deng hai sheng ;
..............page:106-107
The Tips of College Teacher Engaged in Work of Student Processing Student Affairs Data
FU You-ping;WANG Bin;GU Hang-jing;Hangzhou Wanxiang Polytechnic;
..............page:112-114
office zuo ye zi dong pi yue xi tong tan tao
han zuo ; zhang hong wei ;
..............page:115-116
guan yu wo guo ji suan ji jiao yu mooc fa zhan de si kao
zuo jun ;
..............page:119-120
zhong zhi yuan xiao photoshop ke cheng jiao xue qian tan
jin yu jun ;
..............page:124-125
suan fa de an li jiao xue tan xi
liu xiao qing ; chen shi hong ;
..............page:134-135+137
Research on Problems of College Students’ Management Under the Network Condition
WANG Xiao-ying;Department of management;Anhui Economic Management Institute;
..............page:142-143+153
wang luo huan jing xia da xue sheng zi zhu xue xi neng li pei yang ce lue
wu yao yu ; wu fan chen ;
..............page:144-145
Some thoughts on Higher Vocational Software Technology Education
XU Xiu-qin;Nanjing College of Information Technology;
..............page:150-151
qian tan c yu yan cheng xu she ji ke cheng de jiao xue gai ge
xu yun juan ;
..............page:152-153
On the Daily Management and Maintenance of University Electronic Laboratory
XU Zhuan-xia;WEN Sheng-qiang;Anhui Sanlian University;Special Education Secondary School in Anhui Province;
..............page:154-155
hu lian wang + bei jing xia yi xue xin xi xue ke cheng jiao xue gai ge
ye ming quan ; yang zhi cheng ; lu xiao jie ;
..............page:156-157
gao zhi shang pin xue ke cheng shi xun jiao xue tan tao
zhong zuo ;
..............page:160-161
flash dong hua zhi zuo as3 jiao ben jiao xue tan tao
sun hong long ;
..............page:162-163
Research on Algorithm of Wolves
CHEN Jian-yun;WEI Dao-xi;CHEN Jian-feng;Information Engineering Institute;East China University of Technology;
..............page:164-166
image-pro plus zai duo kong jie zhi jie gou te zheng tu xiang fen xi yan jiu zhong de ying yong
pang run fang ; zheng kun can ; pei yi fei ;
..............page:169+173
Research on Classical Restoration Technique of Uniform Linear Motion Blurred Image
WANG Xin;TIAN Yi-min;XANG Hong-feng;Institute of Information Engineering;Beijing Institute of Graphic Communication;
..............page:170-173
The New Teaching Media Stationed in the Digital Classroom——The Application’s Analysis of Electronic Schoolbag
MA Hai-jiao;Tianjin University of Technology and Education;
..............page:176-178
pu tong tai ji ti dai gong kong ji cheng gong ying yong
yang rui zuo ; liu yang ;
..............page:182-183
mei kuang wa si fen ji bao jing xi tong she ji
zuo dong qin ;
..............page:186-187
internet yi xue xin xi zi yuan jian suo yu li yong de tan tao
chen bin bin ;
..............page:188-189
shu zi tu xiang ya suo ji shu de xian zhuang ji fa zhan qian jing
chen shao feng ;
..............page:190-191+194
ti gao lfmcw lei da ce ju jing du suan fa yan jiu yu shi xian
dong chun yang ;
..............page:195-196
The Finite Element Calculation Method for the Two-dimensional Convection-Diffusion Equation
FENG Li-wei;ZHANG Cheng;QU Fu-zhi;Mathematics and Physics Department;Shenyang University of Chemical Technology;Planning Department of Subject Development;Shenyang University of Chemical Technology;
..............page:197-199+202
soa ji shu zai gao xing neng ji suan ling yu de ying yong
fu qiang ;
..............page:200-202
yi zhong ying yong yu yi liao ying xiang lcd de jian yi qu xian shu ju ya suo suan fa
jin zhong hua ; ma jia jia ; xu hong jie ; ma bing lin ; he xiao long ;
..............page:213
duo tong dao cai mei ji zhuang tai jian ce yu fen xi zhuang zhi she ji ji ying yong
liu xiao man ; huang qi zhou ;
..............page:215-216
ji yu ju zhen lu fen jie de bing xing chu li
zhou tao ; man di ; gao wen peng ; zuo teng ; shang ze yu ;
..............page:219-221+228
yun ji suan yu xu ni hua
miao cheng ;
..............page:222-223
jiao wu xi tong zai chao rong he ji qun shang ying yong yu shi xian
wei jin ; wang rong xiang ; jia hai tian ;
..............page:234-235
xin xi shi dai de dian li xi tong xin xi hua jing yan tan
xiang hui ; chai chao ; wang cheng zhang ; ma yan ;
..............page:238-239
zhi yuan fu wu yu hu lian wang + jie he mo shi tan jiu
xing cui xia ; fu hai zuo ;
..............page:240-241
A Research Of AP Select Algorithm in Wi Fi-Based Indoor Localization
YI Hai-bo;WEI Wen-xue;College of Information Science and Engineering;Shandong University of Science and Technology;
..............page:242-244
qian tan gong you zhi qi ye zhong xiao xing ruan jian tuan dui de xiang mu guan li shi jian
di hui liang ; zhang xiao yi ;
..............page:247-248+255
Research on Risk Evaluation of Long Distance Oil and Gas Transportation Pipelines Based on AHP and TOPSIS
ZHANG Hao-ran;XU Lu;WU Qiong;School of Computer Science;Xi’an Shiyou University;No.61741 Troops of PLA;
..............page:249-252
Clustering Analysis on the Application of Academic Evaluation
ZHAO fan;School of Science;Chongqing University of Posts and Telecommunications;
..............page:256-258
Cloud Computing Environment of Information Resource Cloud Service Model Research
ZHAO Lei;SU Hui;School of Information;Xi’an University of Finance and Econimics;
..............page:259-260
na mi cmos dian lu zai dan li zi xiao ying xia ke kao xing fen xi
zhao zhi chao ; wu tie feng ;
..............page:261-262
Multi-fusion tracking algorithm based on Bayesian decision
ZHOU Xu;MA Yu-liang;Institute of Intelligent Control and Robotics;Hangzhou Dianzi University;
..............page:265-268
ji yu ji he fang fa de wei zhi xin yuan ding wei suan fa yan jiu
cui li ; li zuo ;
..............page:269-271
Research on Enterprise Information Service Model Based on G2B
CHEN Guo-hua;Economic and Information Bureau;Youxi County;Fujian Province;
..............page:272-273+280
da shu ju shi dai xia de dian zi zheng wu ji qi an quan yan jiu
chen jia zuo ; yang xiao hui ; bai yang ; zhou zuo ;
..............page:274-275
Entrepreneurial Orientation Construction Practice of Campus Flea Market Trading Platform based on O2O
LIU Shu-ting;WANG Juan;YANG Xiao-ming;Xi’an Fan Yi University;
..............page:276-277
The Application of ETL in the Field of E-government
WANG Xiao-bo;Anhui Economic Information Centre;
..............page:278-280