Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of North China Institute of Science and Technology
1672-7169
2004 Issue 1
The Requirements of Mining Talent Persons' Basic Capability
Li Yongjun
..............page:107-108
Study on the Work of Academic Exchanges of our InsItitute
Zhang Cuirong
..............page:119-120
Study of Merchandise Marketing Mode in Great Economic Age
Li Hualong;Xu Wei;Jing laiwang
..............page:101-103
VAT Tax planning of Coal corporation
Xi Weihua
..............page:98-100
On the data backup of windows 2000
Dong Ximing
..............page:93-94
Analysis and Renovation on the Dense Medium Recovery Process of Yueliangtian Coal Preparation Plant
Li Yuanxin;Ren Xiaode;Guo De;Zhang Xiumei
..............page:38-40
The Development of Longwall Technology for Thick Coalseam Mining in China
Jiao Hongbin;Zhao Aiguo
..............page:34-37
Analyzing of The Adaptability of Lean Production in Coal Production
Zhou Yanhu;Zhang Lin;Weng Yifei
..............page:31-33
Key Theorem of Learning Theory Based on Fuzzy Samples
Ha Minghu;Zhou Caili
..............page:11-15
Study on Social Health and Security
Yao Weiping
..............page:25-27
Probe into the modes in the development of network's media
Fang Liping;Fang Yueping
..............page:87-89
The Access of Graph Information in Auto CAD
Wang Zhengzheng
..............page:84-86
Discussion on application of computer serial communication ports
Zhang Jin;Li Fuling
..............page:81-83
Digital Watermark Technique
Gu Tao;Wang Rulin
..............page:77-80
The design of high-speed data acquisition card
Ma Kai;Liu Yaowen
..............page:74-76
Design and Implementation of Banking Integrated Front System Based on Message-Oriented Middleware
Wei Youhua;Wang Chengyao;Zhang Dongquan;Lei Weibin
..............page:70-73
Research on the Security of JSP Applications
Sun Mei;Wang Junyi
..............page:66-69
Nettork Security of Internet Information Services Server
Ma yanchun
..............page:62-65
Analysis on Lawbreaking and Crime Related to E-Mail
Luo Jianguo
..............page:59-61