Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Information Technology
1009-2552
2007 Issue 7
Modern time series analysis method in data mining
LIU Jin-song
..............page:100-101,149
A TCP performance evaluation of MIPv6 in wireless network
LIU Xiao-bo;WANG Sheng-kun;ZHANG Jun-wei
..............page:98-99,118
Application of EBG structure in Archimedean antenna
JIANG Nan;YANG Shen-yuan;WU Kai
..............page:95-97,152
Error analysis of Euler method for ordinary differential equation based on C++
CUI Jun-liang;DENG Yi-dong;XU Hong-kun
..............page:92-94
Error control schemes for VSAT satellite communication system
YAN Hua;HE Ying-min
..............page:90-91,94
Design of networking market management system
NA Li-hui;LIU Da-xin;TAN You-ping
..............page:87-89
A method of improving image binarization quality in face identification
LIN He-ping;PAN Han;WANG Shu-hua;JIANG Chun-yan;LI Hong-zhi
..............page:84-86,115
Application and analysis about some arithmetics for image denoising
HU Lei;ZHANG Wei;QIN Qing-yan
..............page:81-83
Implementation of radar MTD based on ADSP- TS101
HUANG Cheng-dong;WU Lin-yong;HE Yong-hong
..............page:78-80
Hybrid error concealment with scene cut detection
LIAO Bin;HU Jin-long;HU Jie
..............page:74-77
A new approach to improve the performance of query- by- humming
LUO Kai;WEI Wei;XIE Qing-song
..............page:71-73,77
An approach for mobile robot SLAM in indoor environment
SHEN Li-man;CAI Zi-xing
..............page:4-7
Research on block DCT hardware structure and its ISE implementation
ZHANG Rong-fen;TIAN Zhi-jin;YANG Lu-ping;LIU Yu-hong
..............page:8-11
Research on congestion control in complex computer network and some new idea
DONG Hong-can;LIU Tao;LU Jing-rong;LIU Hui-ming
..............page:12-15,19
Analysis of TS and MP4 formats in the application of streaming media
ZHOU Jin;ZHI Cheng;SONG Li
..............page:16-19
Research on XML encryption and XML signature technology
QIAO Jia-xin
..............page:23-24,144
Research on particle swarm algorithm of intelligent optimization
YUAN Ping;WANG Hao;BAI Yu
..............page:25-28
A multi - classification intrusion detection system based on KPCA and SVM
SUN Zong-bao;SUN Ming-song
..............page:29-31
Computing analysis of failure rate for multistate node acyclic network system
ZHANG Yu-li;LIU Yan-qiu
..............page:32-33,80
Plasma antenna and its applications in complicated electromagnetic environment
SUN Jie;YUAN Bin;JIANG Lei;LIN Hua
..............page:34-37,64
Backend porting for ARM based on LLVM infrastructure
DONG Feng;FU Yu-zhuo
..............page:38-41
Application and simulation of LDPC code in OFDM system
ZHANG Kai;MA Ben;LIANG Zhao
..............page:42-45,89
Design of frequency control circuit of a uncorrelated frequency agility radar signal source
WANG Chun-hua;WANG Ge-si;XIE Guang-hui
..............page:46-48,112
Performance analysis of TMS320DM320 video accelerator IMX
SUN Yao;LIU Pei-lin;ZHOU Hui
..............page:49-51,146
Algorithm of maneuvering target tracking based on interactive multiple model
ZHANG Miao-hui;XIN Ming
..............page:52-53,128
Application of AD HOC technology in the wireless sensor network
ZHU Yi-chuan;XU Chang-qing
..............page:54-58
Design of 5.8 GHz WLAN CMOS active dual balanced mixer
ZHAO Liang;HUANG Feng-yi;JIANG Dong-ming;ZHU Yu-feng;SHEN Yi
..............page:59-61
A design of dual frequency dual mode radio frequency circuit
CHEN Jun-jie;JIN Rong-hong;GENG Jun-ping
..............page:65-67
Routing problem in delay tolerant network
ZHENG Wei;WANG Cheng
..............page:68-70
Gathering geographic information data based on MAPGIS
SUN Zhi-feng
..............page:104-105
Office research based on man - machine engineering principle
SHAN Ru-bo
..............page:106-108
Community medical treatment long- distance warding system
JIN Jing;HUANG Hong-guang;FENG Juan
..............page:109-112
Realization of IF digital receiver system based on FPGA
WANG Min;HU Ze;XIAO Bin
..............page:113-115
Workflow modeling based on ECA rules
REN Zhi-kao;HU Qiang
..............page:116-118
Application of fuzzy data mining in CRM
YANG Wen-jun;SONG Yan
..............page:119-121
Research on water quality monitoring system based on GPRS technology
DONG Jia-bin;WANG Jin-xin;Li Ling;WANG Chun-hong;WU Qiu-lan
..............page:122-124,138
Wireless communication system based on USB interface technology
ZHAO Yan-xu;GUO Ya-sha
..............page:125-128
On digital and networking of medium assets storage system
gao ru jie ; wang jie ; zhao xin yu
..............page:129-130
Application of information security risk estimation criterion in E - government affairs
liang hong tao ; wang da meng ; huang jun qiang ; ma yao
..............page:133-135
On firewall technology
LI Ning
..............page:136-138
Analysis of third- stage exchange technology
LIU fu-li
..............page:139-140
Security technic of wireless local area network
WANG Wen-bin
..............page:143-144
New technology of computer network
TANG YU
..............page:150-152
News Field
..............page:插1