Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Shandong Electronics
1002-7505
2006 Issue 6
An Attribute Reduction Approach for Decision Table Based on Reduction Tree
bai yun-hui wang hua-yu
..............page:98-99,104
The Design and Realization of RF Wireless Conference System Based on nRF24E1
shao min li guo-xin gao xiao-fang tang xiao-dong
..............page:100-104
Workflow Management System in ShanHua Group
du meng ; wu chang
..............page:108-109,112
Network Monitor System Based on Microcontroller and LabVIEW
jin hui huang ming-jian liu min
..............page:113-114,119
An Digital Watermarking Algorithm Based on DWT
lin rui-juan hou de-wen
..............page:75-76,79
Research on Model Selection of Support Vector Machine
zhou hong-li liu pei-yu
..............page:62-63
Co-evolutionary Multi-agent System
fan ying qiu zhao-lei zhao qing-zhen
..............page:89-91
An Adaptive Document Image Watermarking Algorithm Based on DCT Domain
wang ting wang xi-chang liu jang
..............page:64-65,84
Analysis and Ponder on the Service Quality of our Government Web Sites
xu xiao-bin song jun-hua tang mu-tao li guo-feng
..............page:39-40,43
chang shang dong tai
..............page:30
Research and Application on Workflow Modeling Based on UML
wang hua-yu hua fan gao shou-bai
..............page:80-81
Review of Artistic Style Translation
ren shi qin mao-ling
..............page:77-79
建好科技(研究)型实验室 服务学校学科专业建设
chen yong-jun wang yu
..............page:127-128
Tracking Botnets
liu dong-mei
..............page:47-49
A Realization of JAVA Ping based on JNI Technology
ma kun yang bo jni java ping icmp
..............page:35-38
Security Analysis and Prevention Based on DNS Attack
wang qi-jian gao zhong-he
..............page:58-59,38
shan dong xin xi hua tu po yi ka tong
han xu dong
..............page:4-5
PKI and the Application in E-mail System
gou yan-jun zhao heng wang ning-ning
..............page:50-51,57
Study on Strategy of Personal Credit Scoring on Support Vector Machines
wei zhi-jing liu xi-yu wei zhi-xu
..............page:110-112
Analysis of Methods for Network Attack and Recovery Strategy
wang kun chu dong-sheng wang ji-zhi
..............page:60-61,69
The Methord of Solving the Exercises of Motors by Simulation Based on the Multisim7
wang song chu wen-sheng liu jie
..............page:120-121,124
Implementation of an Advanced ECC Algorithm in Mobile Authentication
wang xue-juan liu pei-yu ma feng-yun
..............page:41-43
A Reduction Algorithm Based on Differentiability Matrix
dai ling-xiao han ye-hong ma yinghong
..............page:92-94,97
The Forbidden of Management of Websites
chu fan-jing liu fang-ai sun xiao-ling
..............page:55-57
Envirenment Protection, Enegy Saving and Automation of City Hoting System
qi xiu-hui dou jian-hua zhang zao-fu zhang yue
..............page:117-119
Pervasive computing on dynamic measurement
cong jie sun zhong-zhou
..............page:115-116
Realization of BP Networks Based on VB and Mideva
wang feng wang xiao-hong quan yue jin hui
..............page:95-97
Reaserch of Data Integration in E-comerce Based on Web Service
gao pi-lian hou de-wen cai xiao-fang
..............page:66-69
Research on Security of Wireless Sensor Networks
li hong-yan
..............page:44-46