跟高手学编程
企业网络云建设研究·············································································· 刘浩5
软件研发与应用
使用CMOS分析UEFI BIOS Long Run 问题的技术应用················· 顾长利10
基于正交小波分解的光纤熔接缺陷检测 杨亚,陈秀国,杨连营,章洪贤11
基于LPC1788微处理器USB驱动和应用程序设计 龚智,赵翠,徐林杰,范月霞13
编程语言在计算机应用软件开发中的选择········································ 刘琴16
ASP.Net+AJAX系统设计及解决中文乱码问题方法的探讨············· 黎帝兴18
高校体育部新闻发布系统的设计与实现················ 高莺,王春华,周晨20
基于MVC的Web平台快速搭建····················································· 朱珊娜22
用字符串编辑距离算法筛选相似试题················································ 王禄24
个人所得税计算器程序设计···························································· 张国团31
精品课程网络教学平台的研究与设计············ 段红义,王惠惠,折如义33
移动应用
Android 移动终端数据安全系统设计································· 时光,刘云恒35
基于数据挖掘的4G客户识别系统模型研究·································· 魏建兵37
移动APP安全及等级保护测评实践研究···························· 王坤,张腾标40
数据库与信息管理
基于codeigniter开发题库系统···························································· 许衍42
人员动态分布管理系统的设计与实现 牛余朋,关放,陈晓阳,霍文彪44
一种移动存储介质分级权限管理系统的实现································ 闫彦博45
基于VFP6.0的体育考试成绩录入系统的设计······················· 武江,云芹48
互联网云计算技术的应用实践与管理模式探析···························· 王兴野50
会议纪要管理系统的开发和实现···················································· 郭广顺52
基于JSP的党校培训管理信息系统研究········································· 黄更红54
信息资源综合管理平台在电力信息系统中的应用 郑辉,刘骁,史文琪,言娟56
医院信息系统体系框架与分类规范的探讨········································ 安鹏58
用Delphi XE10实现数据库的实时备份和恢复 张存平,罗郁霞,吴铁堤,梁宁,卢英杰60
面向职称评审和绩效评定的教师成果管理系统设计与实现 韦远航,董红岩,于雪涛,徐笑涵,赵海阔,彭豆豆,张鹏63
用Excel VBA开发及时算平均分程序·············································· 张贻忠67
网络与通信
基于GPRS的发电机远程遥控启动及实时监测系统······················ 徐荣峰72
PPPoE和IPoE在高校宿舍宽带接入中的探索和研究························ 包科74
Python实现简单的Web服务器··························· 叶子平,高远宁,刘聪76
浅析使用SNMP对企业网络设备集中管理的项目教学法············ 叶远锋77
基于蚁群算法的无线传感器网络路由算法优化分析···················· 莫涛涛79
图形处理与多媒体
基于Ajax3d的网页三维场景互操作探究··········································· 赵迪81
打台球游戏开发···················································································· 江洪83
计算机安全与维护
校园网站入侵攻击的查找与防范···················································· 欧阳林88
DDOS案中涉案木马(DbSecuritySpt)的深入分析····················· 戴华,方莉90
新互联网环境下计算机病毒行为分析与防治···································· 代强93
|