|
Issue |
Title |
|
Vol 2, Issue 1 |
A Summary of Research on computer Network attack and Defense Modeling and Simulation |
Abstract
PDF
|
Ali J Harriman |
|
Vol 1, Issue 1 |
Application and Development of PTN Technology |
Abstract
PDF
|
Yang Zhang |
|
Vol 1, Issue 1 |
Application of Cloud Computing in Telecom Operators |
Abstract
PDF
|
Zhou Wenhao |
|
Vol 3, No 1: (Published) |
Blockchain-Based Voting System |
Abstract
PDF
|
Jiayang Yao, Lan Wei, Tianqi Liu |
|
Vol 1, Issue 1 |
Computer Network Management Software |
Abstract
PDF
|
Honglei Qi |
|
Vol 3, No 1: (Published) |
Explore Data Mining and Application Based on Association Rules |
Abstract
PDF
|
Jialei Shao |
|
Vol 3, No 1: (Published) |
MPC of Sewage Treatment Process |
Abstract
PDF
|
Jiahui Meng, Qingyuan Zhao, Yu Zhang, Guanglei Wen, Huimin Ge, Hongpeng Li |
|
Vol 3, No 1: (Published) |
On the Application of Embedded Computer System in Radar Scanning System |
Abstract
PDF
|
Jia Ai |
|
Vol 3, No 1: (Published) |
Realization of Linear Neural Network Based on MATLAB Neural Network Toolbox |
Abstract
PDF
|
Lei Wang |
|
Vol 1, Issue 1 |
Realization of Time Synchronization Server Based on C/S |
Abstract
PDF
|
Jidong Zhou |
|
Vol 1, Issue 1 |
Research and Exploration of Future Optical Communication Technology |
Abstract
PDF
|
Hongbin Gu |
|
Vol 2, Issue 1 |
Research on Enterprise Computer Network Information Management and Security Protection Strategy |
Abstract
PDF
|
Stephanie Bert |
|
Vol 2, Issue 1 |
Research on Security and Protection Strategy of Computer Communication Network |
Abstract
PDF
|
Setlla Bowman |
|
Vol 2, Issue 1 |
Teaching exploration of computer network courses for non-computer specialty in the background of "new engineering" |
Abstract
PDF
|
Rupert Marion |
|
Vol 2, Issue 1 |
The opportunities and challenges brought by the Internet to Democracy |
Abstract
PDF
|
Burgess Austin |
|
1 - 15 of 15 Items |
|