Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Shandong Electronics
1002-7505
2007 Issue 2
The Application of AES-Rijndael in IPSec VPN
wang min wang wen-de
..............page:114-116
The Noise Analysis of Sampling Circuits in meridian dynamic impedance testing
bian yong-sheng wang ya-sheng li hui-jun
..............page:121-123
chan ye dong tai
..............page:8-9
The Application of RSS in E-learning Platform
shi lin-lin chen jie
..............page:42-44
The Study on the Standards of Information Security Risk Assessment
wang feng feng feng wang cheng li lei
..............page:69-70,84
The Contrast Analyzing and Application of Neural Network Model
liu jing liu hong
..............page:75-78
Design and Development of Business Decision Simulation Platform
yin tie-yan wang zhao
..............page:124-125,128
Data Mining Techniques in Business Process Reengineering
li shan-shan
..............page:54-55,65
The Analysis of the Technique and Application of Data Mining
zhao hong-yan liu hong
..............page:47-48,51
qu wei zhi yi xing lai lu kao cha xin xi hua jian she qing kuang
zhao shu ling ; guan xiao yan
..............page:1
The Design of Intelligent Function Signal Generator
zong rong-fang
..............page:109-110,113
The Research and Enforcement about Practice Teaching of University Information Management Speciality
dong ping-ping guo feng zhu shao-hong qin hui-lin
..............page:89-90
Research and Design of Examination System Based on C/S and B/S
wang hong-hai liu zheng-min
..............page:82-84
chang shang dong tai
..............page:19
Routing policy, policy routing and it's implement
yang feng
..............page:23-28
Discussion and Improvement of the Incompatibility Between LPsec and NAT
xiao ling zhou jun xiao qing
..............page:66-68
The Application of Rough Set Theory in Data Mining for Personal Demand
ding jun gao xue-dong
..............page:56-58,68
2006 nian du shan dong xin xi chan ye jing ji yun xing fen xi
lu ping ; zhang
..............page:10-12
The Development of the Local Area Network Monitoring System
qin yu-hua
..............page:111-113
The Discussing and Studying of SQL Database's Query Optimization
zhang chuan-hong li jin
..............page:52-53
The Wireless Modules Monitor System Based on PXA270
guo ning chen xin-hua
..............page:106-108
The method of teaching《Designing and making webpage》
shi ke-lei gao yong-xin
..............page:129-131
zheng wu xin xi hua jian she yu guan li mo shi tan tao
yuan qing chang ; liu chang ; qiu dong
..............page:12-14
Risks and Control of Information Systems
wan xiao-yan
..............page:73-74
The Experience of Software Testing Work
zhang jie-hong
..............page:132-134
Probe into the Realization Way of B/S Remote Control
wang qiang
..............page:29-30,131
The Design and Realization of QMC Driver on MPC860T
guo zhen-jun yang zheng-chun zhang lei zhang jian-feng
..............page:31-34
A Study on Practice teaching of Database System Theory
chen yu xu liang
..............page:59-60
The Discussion of Multimedia Database and Content-Based Retrieval
zhang zhi-gang
..............page:61-62,78
Training Model of Experimental Teaching for the Management Innovation
yao guo-quan wang jue-hui yin tie-yan qiao wen-tian
..............page:96-97,100
SAQL: A New Approach for Sequence Alignment base on Q-learning
hou feng-cheng liu hong
..............page:85-88
A Novel Scheme of Fast Handoff for Mobile IPv6
hu bin liu hui
..............page:20-22
Simple Statement of Optimizing CDMA Wireless Network
liu hui zhang you-zhi
..............page:35-36,39
On Integrated Model of Enterprise Informationization
wang liang-yuan
..............page:93-95
Improved Genetic Algorithm Applied to the Knapsack Problem
pan yu-qi luan hong zhang qian
..............page:119-120
shang ye zhi neng yu shu ju cang ku shi yan shi jian she gou xiang
you chi-ji li wen-yao
..............page:63-65