你好,欢迎来到电脑编程技巧与维护杂志社! 杂志社简介广告服务读者反馈编程社区  
合订本订阅
 
 
您的位置:下半月刊 / 双月
2019年2月目录
 

·专题论坛·

基于AES加密算法的USBKey解锁方案 邓明荣,刘进,李宇平,蔡梅松,孙玄,孟凡

·软件研发与应用·

从一个经典问题的解决过程看计算思维的特点············································· 陈前永

多应用型计算机程序的设计开发·································································· 刘新军

边远及山区输变电设施的综合防护研究与应用·········· 陈伟,李琪,王克谦,王鹏展

基于TextRank算法的微博个人关键词云提取的设计与实现················ 杨雁莹,姜莹

Fortran代码高效重用的一种方法····································· 贾继军,王昌宏,刘社平

C语言可视化编程软件的设计和实现·················· 尤嘉洵,徐兆楠,卜志鹏,苏柏仲

高铁转向架失稳检测装置研究················································ 刘灿,李鹏,郝洪伟

基于Python对网络爬虫系统的设计与实现··················································· 陆树芬

数据驱动编程······························································································ 贾红健

计算机软件Java编程特点与技术研究·························································· 董朝贤

高校数字化智慧校园网络建设的研究与分析························ 邢丽,李桂兰,王刃峰

基于COMArcGIS跨版本复用组件构建技术···································· 齐志飞,杨波

一种基于Markdown语言的静态博客生成程序················································· 王浩

·移动应用·

试析大学社交系统app的设计与实现····················· 曾照,邬少飞,潘珍茹,袁敦胜

基于Python库的微信通讯录特性分析·························································· 杨旭东

基于4G移动车站系统设计与实现·················································· 赵圣鲁,余燕萍

基于BaaS开发微信支付小程序···································································· 朱先忠

图解手机定位信息转换为点、线和面的技术与方法······································ 闫海忠

Cordova-APP软件及其插件开发···································································· 怯肇乾

·数据库与信息管理·

大数据环境下基于NoSQL数据库的查询技术研究与应用······························· 宋俊苏

基于Java EE的固定资产信息管理系统························································· 高新凯

基于RFID技术的学生管理系统研究································································· 吕玮

Wireshark抓包QQ信息分析············································································ 肖彬

Vue+Springboot+Mybatis开发消费管理系统········································ 何军,陈倩怡

基于SuperMap的全国GIS高校信息查询系统设计与实现········· 丁娟,于书媛,王义

基于Hadoop云平台的文本复合主题词抽取···································· 王晓龙,张婉琳

基于Moodle平台的信息化教学平台的研究·················································· 郝淑颖

微服务在云计算中的应用探索········································· 马玉洁,闫明明,王亚星

试析媒资系统在军事在线课程应用······························································ 闫仁勋

网络爬虫与KNN算法在房价分析中的应用··················································· 朱熙曈

基于大数据的智慧校园平台设计与应用······················································· 冯知岭

Java报表功能的三种实现方法······················································· 邱泸谊,黄俊杰

·人工智能与应用·

人脸识别系统在高校宿舍管理中的应用研究···················· 端木珂珂,刘婷,孙陆鹏

智慧校园的弹性虚拟化基础设施研究················································ 李文骞,蔡都

现代图书馆服务的智能化发展····································································· 刘文钊

物联网技术用于智能家居中的应用和开发···················································· 周鹏梅

基于物联网的无线智能锁设计与实现·································· 郭辉,甘智鑫,熊永江

基于公共科学计算的AIHPC应用研究······················································ 黄石平

基于知识图谱的智能客服系统研究······························································ 廖美红

基于51单片机控制的智能车系统··············· 马世中,刘畅,王铎,孙思贤,于复兴

·图形处理与多媒体技术·

Vray渲染器在3D效果图中的应用··································································· 王猛

Bayesian-MCMC算法在计算机图像处理中的应用研究·································· 米向荣

交互式益智游戏在虚幻引擎4上的界面和逻辑实现·········································· 彭瑾

基于Python的图形化服务器监控的设计和实现············································ 贾云斌

物体检测算法综述············································································ 蔡路,刘怡俊

基于C++Builder6.0和组播技术的遥测图像转发软件设计······ 肖明,荣为君,李晶晶

·网络通信与安全维护·

基于LH公司的内网安全管理的分析与实践······················································ 庾佳

采用socket和多线程实现网络高并发服务器················································ 牟综磊

浅析机械硬盘与固态硬盘················································································ 程彪

基于CC2530的通用无线加速度传感器的硬件设计······································· 陈红卫

计算机组装与维护的虚拟仿真环境的搭建······················································· 黄铮

浅谈计算机病毒历史重大事件及其防范措施··························· 金晶,杨晨,左容麟

校园网环境下立体网络安全防御系统的研究··························· 刘静,王剑,田学志

计算机网络安全中数据加密技术的应用······················································· 王建树

基于包捕获技术的网络监听工具应用与实践················································ 陈志伟

基于fortify的源代码安全测试规则自定义研究······· 张超永,张玉中,浮明军,刘沛

试析计算机网络工程现状及对策····································································· 滕飞

大数据背景下的计算机信息安全及其防护对策············································· 陈淑明

  推荐精品文章

·2024年9月目录 
·2024年8月目录 
·2024年7月目录 
·2024年6月目录 
·2024年5月目录 
·2024年4月目录 
·2024年3月目录 
·2024年2月目录 
·2024年1月目录
·2023年12月目录
·2023年11月目录
·2023年10月目录
·2023年9月目录 
·2023年8月目录 

  联系方式
TEL:010-82561037
Fax: 010-82561614
QQ: 100164630
Mail:gaojian@comprg.com.cn

  友情链接
 
Copyright 2001-2010, www.comprg.com.cn, All Rights Reserved
京ICP备14022230号-1,电话/传真:010-82561037 82561614 ,Mail:gaojian@comprg.com.cn
地址:北京市海淀区远大路20号宝蓝大厦E座704,邮编:100089