Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Shandong Electronics
1002-7505
2006 Issue 3
Research and Simulations on the OFDM Wireless Communication System
zheng jie chen wei-li zhang hai-xia yuan dong-feng
..............page:31-33
Design of the Wireless Self-operation Printer Based on GPRS Network
xu-ping mu rui-jia wang wei-bo yang zhen-wei
..............page:40-42
Search of Distributed Breath First Search Based om P2P
tao qiang gao zhong-he liu li
..............page:47-50
GPRS Monitor System of Water Supply
meng qing-long tuo ying-ying
..............page:51-52
The UML Modeling Analysis of Document Management based on Product Structment Tree
xia xiao-na cao bao-xiang
..............page:100-103
Object-Oriented System Modeling Based On UML
bai yun-hui wang hua-yu
..............page:146-148
The Analysis of Self-interference based on CDMA Mobile Communication System
yi chen-fu zhang xiao-hong chen yu-huan
..............page:36-39
gou jian gao xiao yun zhuan de xian dai liu tong ye
liu yong kui
..............page:10
ren cai shi jian zao xin xi chan ye qiang sheng de tui dong li
jing shi kuan ; guan xiao yan
..............page:8
Analyzing of the Technologies for Realizing Mobile TV
qu ming-di zhang peng
..............page:111-113,148
The Index and Method of Partner Selection for Supply Chain
han jie zhao qing-zhen
..............page:108-110,130
fu hua ic she ji pei yang eda ren cai
yan yan
..............page:9
The Method of Digital Synthesis of FM Signals
xue wen wang jian-xin wu shan
..............page:90-91
The Cross Layer Analysis and Simulationork
liu wen-qian chen wei-li yuan dong-feng liu jian wu yin-gui
..............page:27-30
Research on the Enterprise Application Integration Based on Agent and Web Service
wang zhen wang hong liu ke-fei
..............page:136-138
A Intrusion Detection Method Based on Mobile Agent Technology
wang shu-wen xu li-na
..............page:67-69
Analysis and Research for CAN Security Engineering
qi run-quan
..............page:58-59,117
Combination Application of Firewall and AAA Protocol in the News Network
xiang xiao-ping li zhi-qiang tang dai-lu
..............page:53-55
A Sofa CAD System Based on Genetic Algorithm
song jia liu hong
..............page:94-96
ye jie guan zhu
..............page:18,72
Rough Set Theory and its Use in Data Reduction
gu jian-jun wang hong-guo ding yan-hui
..............page:143-145
Application of MT8880 in the System of Watch and Control in the Elevator
long jun-yu zhang xiang-qun
..............page:81-83,145
The Implementation of an Easy Fuzzy Matching Algorithm
pan jing-chang sun yu-hui xu yi-ming
..............page:131-132
A Novel Method of Image Edge Detection Based on Wavelet Domain
zhang quan zhang jing wang xin
..............page:126-127
An Improved Method of Circle Detection Based on Randomized Hough Transform
ma wen-juan li qi-qiang
..............page:128-130
The Analysis of Factors Affect High School Students' Academic Achievements based on SPSS
dai ling-xiao ma ying-hong zhao qing-zhen
..............page:84-86,99
Security Policy and Method Of ORACLE Database
huang xin-li song xia
..............page:60-63
A DWT Domain Digital Audio Watermarking Algorithm Based on Energy Quantization
wang qing-xi zheng xiao-shi liu guang-qi zhao yan-ling li na
..............page:75-77
The Design and Implementation of Help for Web Applications
zhang hong-fei
..............page:43-46
Introduction and Comparison of Three Evolutionary-based Optimization Algorithms
li fei-fei liu xi-yu yao kun
..............page:118-120
chang shang dong tai
..............page:19
The Accounting Procedure Reforge in the Financial Informationization
zheng yun-hong zhang rui-shan li yan-hua
..............page:21-22
A New Type of Chip Is Emerging on the Horizon
sun bo
..............page:20,39
Disscussion in the Selection of Enterprise-grade Firework
li jian-jun
..............page:73-74
Enterprise Data Backup and Disaster Recovery
wang ling
..............page:64-66
The Design and Realization of Temperature Automatic Control System
qing yan-ling li-lei
..............page:78-80
Digital Image Watermarking Algorithm Based Discrete Wavelet Transform
cai yan-hong yang feng yin yan-bin
..............page:121-123
The Application of UML in Project Management Based on Workflow
xia xiao-na cao bo-xiang
..............page:133-135,138
dian xin zhuan xing chuang xin guan li shi guan jian
dang xiang yang
..............page:8
New Evolution and Development Preview of Decision Tree in Data Mining
fang xiang-fei liu xi-yu
..............page:139-142
The Application of Enhancement Techniques in Fingerprints
liu guang-lei hou de-wen
..............page:124-125,46