Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Human-Nature Science Studies
1006-9062
2011 Issue 5
Research on Equipment Scheduling Model in Manufacturing Execution System
cui jie kun ; liu yong
..............page:20-21
yi zhong tong xin jian she gong cheng guan li xi tong de she ji
xiao zuo ; tan pei
..............page:22-23
Research and Development of Web Crawlers Software
li lin zhuo
..............page:142-144
bo ke zai jing pin ke cheng zhong de ying yong yan jiu
wen lian bo
..............page:96-97
Research on Practical Teaching System in Network Engineering Speciality
liu xiao hua ; zheng geng sheng ; zhao qing song
..............page:197-199
Application of Time Series Data Mining in the Medical Field
wang xiao feng
..............page:123-124
yi zhong fen bu shi gong zuo liu yin qing fu zai jun heng de diao du suan fa
deng guang ming ; bai shang wang
..............page:89-91
wang zhan nei rong guan li xi tong de she ji yan jiu
lu xiao dan ; bai shang wang ; dang wei chao ; yu lei
..............page:17-19
qi che bang chuan kou lian xu shu chu shu ju de cai ji fang fa
liu tao ; he wei ; cheng ping wen
..............page:3-4
wu xian mesh wang fu zai jun heng ji shu
luo jiang ying
..............page:147-149
Application of RFID Technology in Wisdom Campus
zhang yong bo
..............page:132-134
pu su bei ye si fen lei suan fa zai shu ju yu ce zhong de ying yong
feng xian kun ; liu yu ; jiang xi fang
..............page:65-66
Design of the Laser Power Control System Based on FPGA
wang bin ; wang xiu cui
..............page:52-54
Application of Web Development Based on Webkit in Mobile Internet
chen juan ; liu dong fei
..............page:105-107
Mobile IP Security Technology Based on IPSec
shang jian yong ; chen zheng xia
..............page:42-43
Digital Band-Pass Modulation System Simulation Based on MATLAB
xu pei wen ; hao juan
..............page:57-59
ji yu shu zi shi pin ji shu yan fa jian kong xi tong
jiang xiao jun
..............page:156-157
yun huan jing xia de ge ren zhi shi guan li tan tao
gan peng fei
..............page:101-102
ji yu virtools xu ni xiao yuan man you xi tong she ji ji shi xian
ming hui ; li jin ; ren ying ; chen zhou
..............page:39-42
bi ye sheng li xiao shi wu xie tong chu li xi tong de she ji yu shi xian
zhu ya li ; liu ya bin
..............page:36-38
matlab zai gao deng shu xue jiao xue zhong de ying yong
yin yun hui
..............page:173-174
rfid xi tong fang peng zhuang suan fa she ji
tang yong ; wang dan ping
..............page:81-83
zhi neng guan ji mo kuai de she ji yu shi xian
mo yu qing
..............page:97-98
ji yu vc yu matlab hun he bian cheng de shi pin jing tou zhuan chang jian ce xi tong
wei zhi qiang ; li hua ; huang dong
..............page:11-13
ji yu soa de fu wu qi yue jia gou she ji
wang hui ; xie hai hui ; dong dan dan
..............page:27-28
ji yu ahp de lms ping tai xuan xing suan fa yan jiu
ye zuo ; li pei guo
..............page:62-64
c yu yan cheng xu she ji shi yan jiao xue gai ge tan suo yu shi jian
lin dong mei ; xiao xiang hui
..............page:179-180
Discuss the Research and Formulation of Network Course's Evaluation Form
zhu ju ying ; jia xiao hai
..............page:170-172
wang luo huan jing xia yan jiu xing xue xi de zu zhi yu shi shi
zhu lang xian ; zou xia
..............page:181-183
The Teaching Software electronic technology in vocational schools
zhang yao feng
..............page:175-176
lun duo mei ti xue xi de kong jian jie jin yuan ze
xu qun
..............page:192-193
ji suan ji dao lun shuang yu jiao xue tan tao
cai qiu ru ; zhu ming fang
..............page:184-185
Research on Image Transmission Based on Windows CE
zhang heng yuan
..............page:162-163
Application of Digital Signature in E-commerce
li qing
..............page:111-112
Optimization of Network Technology by Project Approach
feng xin zuo
..............page:140-141
ji yu yun ji suan de fu wu xin ren ping gu mo xing
liu liang ; zhou de jian ; xie xiao lan ; li jing
..............page:75-77
Design and Realization of Identity Authentication Methods on On-Line Exam System Based on Web
guo cheng xiang ; peng ru kuan ; lin shu gang
..............page:92-93
ji yu shi jian xu lie de tu shu guan ge xing hua fu wu yan jiu
jiang xi fang ; liu yu ; feng xian kun
..............page:125-126
wu han da xue guo ji ruan jian xue yuan
..............page:F0004-F0004
Summary on Content Networking
xu peng ; wang yu zuo ; li jian
..............page:50-52
Research on Embedded Fingerprint Identification System Algorithm
fan zuo ; huang wei
..............page:67-70
mian xiang fa dian qi ye de bao jia jiao yi diao du xi tong she ji
he li ; liao jia ping ; wang shu qing ; quan zuo
..............page:121-122
Application of Multimedia Technology in Modern Teaching
li peng xiao
..............page:177-178
Analysis on Demand Management of Software Project
ni ai yin
..............page:24-26
ogsa-dai he flex kai fa shu ju wang ge ying yong tan tao
jiang xue shu ; dai jian wei ; tan ai quan
..............page:94-95
Design and Simulation of Fuzzy PID-Smith Controller Based on MATLAB
li jing ; zhou de jian ; liu dian zuo ; liu liang
..............page:31-33
she zhi wang luo jing ying yu guan li xin zhuan ye de tan suo
gao guo zhong
..............page:195-197
ji yu pu shi ji suan he dijkstra suan fa fu zhu bo che de she ji
xu chao ; sun dao qing
..............page:129-131
tong cang xing dian zi qi che heng cheng zhong guan li xi tong de she ji yan jiu
ma shu fang ; bai shang wang ; shi yong feng
..............page:117-119
ji yu ahp fang fa de pdm xi tong xuan xing
gao yuan ; wang jing ; jiang feng
..............page:8-10
Application of the Firewall technology in the Computer Network Security
wang xiu cui ; wang bin
..............page:152-153
yi zhong wu xian mesh wang luo zhong de lu you suan fa
wu hui zuo
..............page:60-61