|
Issue |
Title |
|
Vol 3, No 1 |
A Research on Text Analysis of Telecommunication Network Fraud Information |
Abstract
PDF
|
Jiazhen Sheng, Weiwei Wang, Kuiyi Liu |
|
Vol 1, No 1 |
Analysis and Application of Frame Relay |
Abstract
PDF
|
Dongyue Cheng, Guoyou Han, Yuanguo Pan |
|
Vol 1, No 1 |
Analysis of Computer Network and Communication System |
Abstract
PDF
|
Jingdong Wang, Sujia Luo, Jie Yuan |
|
Vol 2, No 1 |
Analysis of Computer Network Security and Preventive Measures in the Data Age |
Abstract
PDF
|
Zhi Li |
|
Vol 3, No 1 |
Analysis of Hot Spots and Trends of Cultural Security Research Based on Citespace |
Abstract
PDF
|
Xuchen Sun, Shuo Jing, Jinkai Sun |
|
Vol 5, No 1 |
Application of Optical Network Transmission Technology in Telecommunication Network |
Abstract
PDF
|
Guande Luo |
|
Vol 3, No 1 |
Application Research of Computer Technology in Office Automation |
Abstract
PDF
|
Xiuli Lu, Zhou Yang, Yan Wang, Yongli Liu |
|
Vol 4, No 1 |
Application Research of Deep Convolutional Neural Network in Computer Vision |
Abstract
PDF
|
Lei Wang |
|
Vol 4, No 1 |
Data and Information Security Technology in Network Communication |
Abstract
PDF
|
Mengqi Li |
|
Vol 5, No 1 |
Data Augmentation Technology for Improving the Recognition Accuracy of Target Image |
Abstract
PDF
|
Feng Ling, Rajamohan Parthasarathy, Ye Wang, Sokchoo Ng |
|
Vol 3, No 1 |
Design of Human-Computer Interaction Control System Based on Steady-state Visual Evoked Encephalography (SSVEP) |
Abstract
PDF
|
Leipo Liu |
|
Vol 2, No 1 |
Design of Smart Card Chip Reader Based on STM32 |
Abstract
PDF
|
Zebin Tan, Yong Zuo, Hongwei Cao, Jiahao Huang |
|
Vol 3, No 1 |
Design Optimization and Application Analysis of Embedded C Program |
Abstract
PDF
|
Yi Jiang |
|
Vol 5, No 1 |
Discussion on the Security Protection of Telecommunication Network |
Abstract
PDF
|
Chen Chen |
|
Vol 4, No 1 |
Evaluating on Topology Survivability Based on Largest Number of Node-Disjoint Paths |
Abstract
PDF
|
Qiurong Chen |
|
Vol 1, No 1 |
On the Relationship Between Internet and Traditional Communication Industry |
Abstract
PDF
|
Junlong Fang, Jintao Wu, Wei Tian |
|
Vol 1, No 1 |
Partial Overlapping Channels Are Not Damaging |
Abstract
PDF
|
Jing Fu, Dongsheng Chen, Jiafeng Gong |
|
Vol 5, No 1 |
Practice of Autonomous Learning Mode in the Course of “Web Design and Production” |
Abstract
PDF
|
Yao Li |
|
Vol 3, No 1 |
Python-Based Little Dinosaur Game Design |
Abstract
PDF
|
Laihao Huang |
|
Vol 4, No 1 |
Reflection on Prevention and Control of Telecommunication Network Fraud in Big Data Era |
Abstract
PDF
|
Xingrui Wang |
|
Vol 2, No 1 |
Research and Application of Code Similarity Based on Submission |
Abstract
PDF
|
Yu Lang |
|
Vol 5, No 1 |
Research on Computer Applications Based on Management of Network Information Security Technology |
Abstract
PDF
|
Xiaofeng Ma, Norriza Hussin |
|
Vol 2, No 1 |
Research on Telecom Fraud Detection Model Based on Cellular Network Data |
Abstract
PDF
|
Kaiyuan Guo, Wenbo Wang |
|
Vol 5, No 1 |
Research on the Application of Power Communication Technology in Smart Grid |
Abstract
PDF
|
Qian Zhou |
|
Vol 2, No 1 |
Research on Topoloty Reconstruction Mechanism Based on Traffic Identification |
Abstract
PDF
|
Qishuang Zhu, Hongxiang Guo, Ceng Wang, Yong Zhu |
|
Vol 4, No 1 |
Research on Trust Evaluation Model Based on Statistical Data in E-Commerce |
Abstract
PDF
|
Yushui Xiao, Norriza Binti Hussin |
|
Vol 5, No 1 |
SDL Trados and Tmxmall: A Comparative Study of Computer-Aided Translation Tools |
Abstract
PDF
|
Ran Cheng |
|
Vol 4, No 1 |
Signal Processing from the First Exploration of Big Data Horizon |
Abstract
PDF
|
Jin Shi |
|
Vol 3, No 1 |
Simple Analysis of Pipeline Performance and Cycle Optimization in Computer Architecture |
Abstract
PDF
|
Shaoshao Xu |
|
Vol 1, No 1 |
Talking about 5G Mobile Communication Technology |
Abstract
PDF
|
Binbin Xiao, Zongze Tang, Zixiang Zeng |
|
1 - 30 of 30 Items |
|