Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Bulletin of Science and Technology
1001-7119
2012 Issue 6
Ticket Optimization Algorithm Database Query Method Based on the Ball Vector Machine
WANG Aimin;HAN Fang;CHEN Xiaofei
..............page:166-167,170
New Algorithm of the Number System Transition
WEI Yitang
..............page:177-178,181
Simulation Research on Web Text categorization Based on Intelligence Algorithm
LI Jianjun;SONG Zhizhang
..............page:152-154
Alter and Implement Passing Parameters by Cookie Base on ASP.NET
ZHANG Quanyou
..............page:117-118,121
Deteciton and Defence of Low-rate Denial of Service Attack
AN Junke
..............page:106-108,111
Research of Bamboo Slips Image Segmentation Method Based on Threshold Value Segmentation
LIN Jinquan;ZHANG Na;WANG Xuben
..............page:128-129,132
Wireless Sensor Network Path Optimization Based on Improved ant Colony Algorithm
DING Wei;BAO Jiancheng
..............page:101-102,105
On the Harm and Protection of Metro Stray Current
YUE Lei
..............page:130-132
Java Web Application Development Based on the Struts Framework
ZHOU Huiqiang
..............page:114-116
Fuzzy Hierarchical Selection Approach Based on Virtual Enterprise Partner
YU Lifeng;GAO Huming
..............page:141-143
Forecast Intrusion Detection Methods Based on the Characteristics of Network Attack Variation
LI Guannan;ZHAO Yanli;LI Qiang
..............page:112-113,116
Design and Implementation of Digital Audio Decoder System Based on ARM
SONG Zhizhang;MA Li;LIU Xiaohua
..............page:161-162,165
Design and Implement of Two-level Bootloader for DM642
ZHANG Hong
..............page:197-198,201
Real-time Detection and Recovery of ARP Attack Based on SNMP and WinPcap
WANG Li;LI Yusheng;HU Lewei
..............page:78-79
A New Design of 1-bit Full Adder Based on Majority Function
ZHOU Dapeng;ZHANG Ziyou;HE Guangpu
..............page:155-157,160
Improved Multi Sensor Image Fusion Algorithm
WANG Zhijie;WU Na
..............page:80-81
Character Circular Motion Animation Ideas and Methods of Implementation Based on Maya Technology
NONG Juan;CHEN Hongxia;HUANG Yongkang
..............page:168-170
The Curtain Control System Design Based on AT89C51
YANG Yarang
..............page:43-46
Research and Application on Digitalization of Zhou-yi
WU Liang;GUAN Yongtao
..............page:82-84
Research on Image Fusion Based on the IHS Transform
LU Yongfang;LU Ke;HOU Xiangwen
..............page:212-214
Based on Sensor Network Node Localization Technology
ZHENG Liping;ZHAO Xiaoliang;LI Ge
..............page:87-88
Minimally Invasive Operation Image System Research Based on SOPC
HE Yongjun;ZENG Wenquan;YU Aimin
..............page:98-100
Solving Test Set Optimization Problem
FU Xin;FU Shuai
..............page:96-97,100
Application of CY7C68013 For Communication Verification Device in Theodolite
LI Xinghong;ZHAO Yue;XIE Bin;ZHANG Dong
..............page:138-140
The Discussion and Research about the A/D Modula Based on the Ethernet
WANG Guojun;LIN Bifen
..............page:220-222
Analysis of Seismic Performance of Steel Frames
LI Cheng;GU Qiang
..............page:122-124,127
An Improved Face Detection Algorithm Based on Ada-Boost
ZHANG Jing
..............page:174-176
An Improved Wavelet Transforms Image Digital Watermarking Technology
LIU Liang;CHEN Changzhi;SUN Hao
..............page:144-145,148
Least Squares Line Loss Rate Prediction Technology Research
CHEN Zongmei
..............page:109-111
Test Case Reuse and Its Supporting Management Processes Framework
LI Xuexiang;ZHANG Wenning
..............page:62-64
Study on Properties of Vector Spaces over Finite Fields
LI Youguo;YANG Yanhua;HONG Liang
..............page:215-216,219
Research on E-business Process Modeling Using Reo
XIE Min;LU Shujuan
..............page:182-185
The Design and Application of Reuseable ⅡRcore
DENG Yonghai
..............page:16-18
Study on Bacterial Endotoxin Test in Kitasamycin Tartrate for Injection
SUN Tingting;SUN Li
..............page:11-12,15
Improved Support Vector Machine DNA Sequence Classification Method
GONG Futing
..............page:136-137,140
The Study on Network Security Incidents Prediction Based on Data Mining
LU Keda;WAN Li;WU Jieming
..............page:37-39