Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Information Technology
1009-2552
2010 Issue 3
Design and implementation of fault tree method to the rules in expert system
chen zuo bin ; ke qing
..............page:149-151
Discussion on external network security of E-government affairs
meng zuo ; zhao xi yang
..............page:165-167
Application of time-frequency analysis in gear failure diagnosis
an zuo ; zuo da zuo ; guo hai tao ; yang zhi min
..............page:103-107
"OA system" system test strategies and methods
jiang yong tao
..............page:173-174,178
Design issues of ROM based on FPGA
li su mei
..............page:87-89,93
Fuzzy control based on neural network
li hui ; chen dao lin ; cai min
..............page:61-63
Research on radar C4 I system spare parts cost optimization
wang lei ; tian kang sheng
..............page:44-47
Method of association rules mining based on genetic-ant algorithm
lu zuo ; li xiao lin
..............page:9-13
News Field
..............page:目次2,29,67,79,102,162
Development of planar optical waveguide materials
chen zuo
..............page:175-178
Word semantic relevancy computation based on HowNet
zhao ying qiu ; luo jun ; zhang jun yan
..............page:90-93
Role of security audit in information security strategies
wang xi zhong ; wang zhi ; huang jun qiang
..............page:171-172
Research and design of on-line system based on Java
chen guang
..............page:163-164,167
A research and design of SIP-based mobile learning system
dai zu cheng ; wang yu jiao ; lin hai yun
..............page:52-54
Using switchboard\'s examination order well
dong xiao hong
..............page:119-120
Control points of ultra-supercritical boiler burner installation
li shi gang
..............page:124-125,158
Introduction to security and countermeasures of VoIP network
hou zuo ; sun ti quan ; lu juan ; shi qin
..............page:133-136
Management scheme over conic curve cryptology in large-scale network
cai chang xu ; cai chang shu ; zhou zhou
..............page:128-130
Application of digital signature in hospital information system
ma xing cheng ; zuo xing jian
..............page:112-114,118
A new hardware implementation of DCT based on H.264 standard
zhang xiao chen ; wang qin ; mao zhi gang
..............page:68-71
Design of an efficient ALU based on reused logic structure
zhang jia zuo ; jiang jian fei ; mao zhi gang
..............page:58-60,63
An improved adaptive video tracking method based on mean-shift
li tong zuo ; xiong hong kai
..............page:40-43
Design of wireless frequency-hopping communication system based on nRF905
lin jing ; li xin chao
..............page:99-102
Introduction to ultra-supercritical boiler blowpipe program
yang wen gui
..............page:139-141,145
Overview on routing techniques in LEO satellite networks
tian bin ; liang jun ; yu jiang ming
..............page:6-8,13
Design of virtual maintenance training and examination system for equipment based on B/S
shi zuo ke ; tian kang sheng ; jin hong bin
..............page:76-79
Research on highly effective multiplier/divider
hu zhen bo ; zeng qiang hui ; mao zhi gang ; zhang xue peng
..............page:48-51
An attribute weighting K-means algorithm based on mean-square-deviation
feng rong yao ; shang guan ting hua ; liu hong chuan
..............page:55-57
Consistent control method for spare part based on fuzzy neural network
zhuang en gui ; lei shan yu ; su jing qin
..............page:33-39
Analysis of automated software testing
xu jin
..............page:152-155
Application research on sybase stored procedure in FMIS
song yu cheng ; jin shao li ; han hong yan
..............page:142-145
Research on search engine optimization method for ASP.NET based website
zhang wen sheng ; sun yong zhong
..............page:146-148
Characteristics of campus cyber culture in college and its construction
dong qing shuang ; ma xiu feng ; zhou wei
..............page:30-32,71
Speed estimation of moving target in SAR imaging
geng liu ; wang jun feng
..............page:84-86
The BP neural network used in power load
chen yao wu
..............page:179-180
Web database access technology based on ASP
sun zuo long
..............page:159-162
Research on association rules mining algorithm in Web log
meng qing chuan ; chen xiao ming
..............page:96-98
Research on fast algorithm for intra-prediction mode selection in H.264/AVC
chen xin yu ; rong meng tian ; li ping ; liu wen jiang
..............page:14-16
PLC control system and its application in potato process industry
zhao zhen gang ; sha yan qiu
..............page:131-132,136
Research on K-Means clustering algorithm and realization of graphical representation
jiang qing feng ; li zuo ; cheng xiao xu
..............page:23-25
Analysis of curriculum system construction of mobile communication technology
cao lei ; xin chun hong ; tang yan ru
..............page:168-170
Oracle database full-text search based on Lucene
ge zhen guo ; li jian ; he lin kang ; wu jun
..............page:156-158
Wind turbine vibration monitoring system based on MSP430
chen chang zheng ; zhou yang
..............page:72-75