2011天线年会论文目录(共4篇)
篇1:2011天线年会论文目录
天线第一部分目录:
一种新颖的中心开孔单脉冲毫米波缝隙阵列天线的设计 王 杰 王 卓 李 巍 一种带反射腔的超宽带阿基米德螺旋天线的分析与设计 姜焕斌
车载移动台用X波段高增益双极化抛物面天线设计 丁 霄 王秉中 黄海燕 一种宽频带微带阵列天线 张军平轶君
一种新型宽带反射阵单元及其应用 李瑞华 史小卫 张海伟 陈 蕾
一种新颖的结构紧凑型超宽带单极子天线设计 李 莉 周治立 洪劲松 王秉中 一种用于WLAN/WiMAX的三频印刷天线 李 鑫 王雅芳 史小卫 张 娜 顾新桃 一种新型双频圆极化微带天线 顾新桃 史小卫 李 鑫 一种宽带双圆极化微带天线 曲晓云
一种应用于WLAN的小型化双频偶极子天线的设计 张 娜 史小卫 李瑞华 李 鑫 一种新型圆极化微带天线的分析与设计 张 申 刘淑芳 史小卫 赵志超 用于移动通信的新型宽带全向圆极化天线研究 全旭林 靳贵平李融林 结合基片集成波导和波纹喇叭的混合式单脉冲馈源 陈 敏 何山红 车文荃 一种新颖的结构紧凑型谐波抑制天线 周治立 李莉 洪劲松 王秉中 基于魔T的准八木天线的设计 林洪潮 陈蕾 史小卫 新型C波段宽带小型化全向天线 钟玲玲 李鹏 李永翔 S波段双极化单脉冲雷达天线的设计 张建强 戴国荣 一种ka波段平板裂缝天线阵 宗 耀 张 军
基于耦合线左右手复合传输线的频扫天线阵设计 李 晨 张安学 蒋延生 徐 卓 基于左右手复合传输矩形波导扫频漏波天线设计 杨文丽 蒋延生 张安学 一种小型化宽带双极化天线 李 越 张志军 冯正和 一种双馈正交极化天线阵的设计 叶 倩 王丹萍 汪 敏 Ka波段频率选择表面传输特性分析 徐 立 贾云峰 一种双面印刷偶极子天线 许启林
天线第二部分目录:
一种IFF天线的设计 陈文俊 常徳杰 简 玲 UHF宽波束天线研究 高 飞 张福顺
平面单极子天线馈电方法的设计与研究 廖梦婷 朱守正 一种小型化的负介电常数零阶谐振天线
唐明春 肖绍球 柏艳英 王 多 刘昌荣 刘元柱 王秉中
基于方向图可重构天线的共形圆弧阵列研究 柏艳英 肖绍球 唐明春 王秉中 一种周期性短路结构的半宽度微带漏波天线 李元新 龙云亮
一种小型共面波导馈电H型枝节超宽带天线设计 王 锋 黄丘林 史小卫 庞 诚 小型化盘锥天线的设计与仿真 徐耀鑫 斯丹燕 朱守正
具有低带内RCS特性的单极子天线 洪 涛 刘 英 龚书喜 姜 文 低副瓣有源相控阵天线测试方法研究 孟明霞 丁晓磊 丁克乾 赵英华 一种适用于GSM和DCS的小型双频段PIFA天线
何 剑 官雪辉 陈 鹏 邓 辉 刘海文 张晓燕 朱 路平面互补锥削渐开螺旋天线的仿真研究 李道铁 毛军发
基于印刷工艺的小型化超宽带平面对数周期天线设计 闫丕贤 刘 埇 吕 昕 X波段宽带微带阵列天线设计 卫 盟 孙厚军 刘 埇 新型S频段宽带平面准八木天线设计 卢宏达 刘 埇 李 镇 基于混合左右手微带结构的宽波束圆极化天线研究 路志勇 李 迎 朱 旗 新型宽带双频全向天线的设计 吴 琦 郭元元
小型化超宽带多复合螺旋天线设计与仿真 杨鹏飞 刘 踊 孙厚军 张 伟 一种新型UHF水平极化的全向宽带接收天线 杨茂清 李民权 用于GSM天线小型化的反射板设计 邹江林 代喜望 张呈斌 陈 晖 3mm波天线罩的设计研究 王 雷
天线第三部分目录:
毫米波赋形偏馈双反射面天线技术研究 陈 鑫 屈 劲 余 川 HE11准光模式激励器研制 屈 劲 陈 鑫 余 川
95GHz TE62准光模式转换器研究 屈 劲 余 川 薛长江 陈 鑫 潘文武 一种具有改进陷波特性的超宽带陷波天线 黄天贵 褚庆昕
一种应用于WiFi和WiMAX的加载零谐振单元的三频单极子天线 于洪泽 褚庆昕 欧阳霄 一种UHF频段RFID读写器天线的小型化设计 高清敏 廖 成 星载SAR天线波束指向偏差探讨 齐美清 汪 伟 金谋平宋小弟
一种同频方向图可重构平面折合偶极子微带天线 王丽萍 廖 成 常 雷 高清敏 波导窄边缝隙天线一种新型串馈方法的研究与设计 伍捍东 任宇辉 白彦平潘云飞 采用印刷振子的赋形天线阵 伍捍东 李 渭
毫米波焦面阵成像新型二元衍射微透镜阵列研究 张祖存 窦文斌
基于EBG结构的方向图可重构天线设计 孙为昭 王 昊 王倞婧 马晓峰 盛卫星 低损耗混合馈电波导慢波线频扫阵列设计 王 昊 倪 晶 葛平马晓峰 盛卫星 基于分形技术的超宽带天线 张学勇 刘少斌 李春早 卞博锐平面行波串馈宽带频扫天线 丁德志 徐金平碳纳米管束天线性能分析 黎 想 黄 一 毛军发 方向回溯阵波束指向误差研究 郭玉春
非交叉馈电的印刷对数周期天线的频域特性 林 澍 张雪莹 蔡润南 黄冠龙 张效衡 高 巨 方向回溯阵列的波束指向误差分析 陈蕾 史小卫 李 蕊 张天龄 一种新型宽带反射式背腔天线研究 赵 旭 王一笑 王伟光 李 明平板端射天线阵馈电特性的研究 程文昕 薛正辉 李伟明 任 武
60-GHz LTCC 圆极化螺旋阵列天线 刘昌荣 肖绍球 郭永新 唐明春 王秉中 Ku/Ka三频共用馈源喇叭设计 张天龄 鄢泽洪 李 铂
一种毫米波切割抛物面天线的设计和仿真 张德春 华 光 洪 伟 一种三角形贴片的方向图可重构天线 张 建 杨雪松 李家林 王秉中
篇2:2011天线年会论文目录
我国改革开放以来,随着经济的发展,我国会计体制不断改革,理论不断创新。《会计研究》是由我国财政部主管,中国会计学会主办的国家一级学术期刊,笔者通过阅读近三年以来的《会计研究》目录分析我国会计研究的热点领域和发展趋势。
本文拟从三个方面进行分析:会计研究热点领域,会计研究发展趋势。
一会计研究热点领域
1对会计理论发展史的研究
刘玉廷、刘永泽、葛家澍等学者对中国自改革开放以来的会计理论的发展史、会计教育的改革史以及会计法规和会计监督的发展进行了回顾与展望。对公允价值计量模式的研究
笔者在撰写本科论文的时候就阅读过大量有关公允价值计量模式研究的文献,如《公允价值计量与实务》就专门对公允价值计量进行了论述。自上世纪80年代以来,随着衍生金融工具在西方发达国家的迅速发展,传统的历史成本计量模式受到了挑战,公允价值计量开始逐渐受到人们的关注。在我国,公允价值的应用也历尽坎坷。从1998年,开始引入这一计量模式,但2001年修订的准则又取消了公允价值计量,回到了历史成本的计量属性。06年2月颁布的新准则中,有十八项准则都涉及到公允价值。据统计,在近三年《会计研究》的目录里,企业财务会计板块共98篇论文,有关公允价值计量的文章就占到17.3%,共有17篇。09年所占比例为21%,10年为35%。伍中信、葛家澍等知名学者对计量模式的选择、公允价值与产权保护的关系以及公允价值模式对会计信息质量的影响等问题进行了深入研究,为推动我国公允价值计量模式的广泛应用做出了巨大贡献。对会计信息披露的研究
近三年来的《会计研究》目录中发现,关于会计信息披露的研究也占据相当比例,近三年中共有14篇,从不同角度对会计信息披露进行了研究。高强、伍丽娜对兼任董秘的组织架构与信息披露质量关系进行了实证研究。王斌、梁欣欣利用深交所的经验数据也对信息披露质量进行了实证研究。另外,在以下信息披
露中学者进行了大量探讨:ERP投资关键信息披露、内部控制信息披露、公司环境信息披露、会计报表信息披露、商业银行市场风险披露、非经营性损益信息披露、企业社会责任披露等。会计信息的透明性、完整性、相关性、真实性对经济的健康运行起着十分重要的作用,所以学者对会计信息披露做了大量研究。
另外,罗富碧、张正堂等学者在高管薪酬的公平性问题、管理层股权激励与企业业绩问题等方面进行了研究,另外,盈余管理、内部控制的相关问题的研究也是热点。
二会计研究发展趋势
在《会计研究》的09年、10年目录里,有相当比例文章在研究金融危机背景下的会计计量和财务处理问题,例如于承生的《金融危机背景下的公允价值会计问题研究》以及陈志斌、刘静的《金融危机背景下企业现金流运行中的正常影响研究》。未来的会计研究热点必是与当下经济环境紧密结合在一起的。经济业务逐渐复杂,相应会计的职能也在多样化。针对国际对我国的反倾销诉讼出现了反倾销会计,针对保险合同的复杂性出现了保险合同会计,还有社会责任会计,环境会计,人力资本会计等。
篇3:2011天线年会论文目录
技术探讨
3美国信息安全发展对中国发展战略的启示·········································郝文江马晓明
8数据通信产品制造企业研发体系的建立与探索·············································时培昕
12网络数据库应用系统安全研究··············································王烽
14试论基于免疫思想终端安全系统的设计思路······································于大春于大鹏杨世松
18最新网络钓鱼:单次攻击多个实体·······································RSA反欺诈指挥中心
20基于网络安全的入侵容忍技术研究·············································闫秋冬
22城市无线网络安全技术与威胁浅析··············································杨哲
30浅谈计算机网络的安全隐患问题与应对措施·············································陈庆伟
技术应用
32采用VLAN技术优化环保系统网络建设与管理·············································徐淑彩
35 VPN技术在企业远程办公中的研究与应用·············································朱祥华
39南方电网公司计量数据平台系统设计研究·············································杨淼锋
41浅谈宽带客户双路由接入模式的保障与实现·············································刘晓青
43浅谈GSM-R系统调度命令传送的工作流程··············································尹镝
46浅谈人脸识别技术·············································何嘉锐
48基于ASP的网络办公系统设计与实现·············································李大永
50浅谈智能建筑综合布线系统··············································李剑
52防喷器密封性能自动化检测技术的研究与应用·············································王利华
55网络安全防范体系及设计?理分析·············································陈家迁
57网络环境下的计算机病毒及防范··············································彭俊
解决之道
60终端安全管理系统的研究与应用············································胡吉吉骞
62浅析西南石油大学校园一卡通············································向海昀
63《全国碘盐监测信息管理系统》的使用与实现·············································刘英
66单点登录与统一认证解决方案·············································张敏
68电子文档加密系统实施过程中的组织体系重组············································林雄飞
测试分析
84国产办公软件可扩展性测试研究···········································简炜陈磊
87 NTCIP协议一致性测试工具研究及实现····································陈磊周润松翟艳芬简炜
91深入理解gtest:C/C++单元测试经验谈·············································杨玚
教学培养
73浅谈精品课特色数据库的构建与安全············································李伟鸿
76高校实验室管理与维护的经验············································周淑君
77信息技术与课程整合的若干误区············································赵佩民
80职业院校校园网络平台安全问题及应对方法探析············································石红春
82浅谈信息系统监理师考试与培训现状·············································闫军
2011.2-3.
技术探讨
3 TD-LTE技术对信息安全影响分析初探··········································郝文江武捷
6浅谈如何保证网络安全············································胡卫红
8信息安全技术的两种大胆思维·············································马绍民
11浅析高校网络安全存在的问题及对策··············································黄彬
13校园网网络事件源定位技术研究·············································诸葛涛
16 Magento Block设计分析·············································蒋子恒
17“震网”引发网络安全新思考·············································严霄凤
20“大保定”格局下的数字化城市管理模式研究········································张彬吴姣刘劲松
22一种支持网格的信誉管理机制·········································罗雅丽石红春
24云计算与云安全··············································徐刚
27虚拟环境中的安全威胁·············································冯麦川
30基于Linux的ARM芯片嵌入式视频监控终端设计·············································高一久
32 IPv4/IPv6混合组网下的网络管理技术研究·············································李志奇
34无线传感器网络中负载均衡的s ink节点移动策略·········································孟凡伟关新平
38数字电视的关键技术与发展趋势探讨·············································李建海
49基于CBS模式的档案管理数字化系统的研究·············································何晓琴
42浅谈U盘装XP系统·············································闫晓丽
技术应用
44漏洞扫描系统设计与应用··············································王良
47建设企业计算机网络安全审计系统的必要性及其技术要求·············································伍闽敏
50浅谈集团公司应用系统的安全管理·············································于素梅
52 IP Qo S技术探讨及应用部署·············································赵云栋
57基于Fle x+J 2EE多层架构的RIA在线考试系统·······································张艺向才凤刘玉慧
61基于ITIL理念的信息科呼叫中心管理系统在三级甲等专科医院的应用···········································孙瑜冯迟
63 VMwa re虚拟机的虚拟网络拓扑结构和配置··········································杨媛媛肖阳
67提高业务技能对无线列调设备维护的重要性···········································令狐昌朗
70程控交换机的维护与管理·············································王瑾
72一种基于MAS的入侵检测方法········································彭滨章颖袁庆霓
75基于规模化无线网络技术架构解决方案的思考·············································刘鑫
77泰州市中医院计算机网络系统防ARP攻击的构建············································潘荣成
教学培养
80媒体教室设备软件控制系统的设计与开发············································张永春
82基于网络教学模式的计算机教育改革探讨············································黄朝有
85校企共建实验室模式浅析·······································李超柴文磊尚开雨
87网络对抗训练研究·······································张立洪白成刚杜丹
测试分析
91嵌入式软件测试的数据获取技术······································郭永振周润松翟艳芬
专题报道
95互联网向IPv6过渡进入实施阶段············································仝培杰
96中国信息安全技术大会 (CISTC 2011) 征文通知
2011.4.
技术探讨
3关于国家网络信任体系建设的思考············································严霄凤
5面向蜜罐技术的企业网络防御系统研究·············································沈煜
8基于VMwa re的高校数据中心虚拟化设计····································张彬吴姣刘劲松柴文磊
10基于网络检测平台应对网络灾害探讨·············································韩占柱
12本体化可信完整性度量策略匹配模型··············································于璐
15基于SOA网格访问控制模型的研究··············································刘蓉
17高绩效政府网站的潜在安全威胁浅析·············································姚孝明
21 OSPF的区域类型、路由类型和末梢区域的配置···········································肖阳杨媛媛
24 RSA算法的改进··············································陈磊
27现场总线与以太网嵌入式网关设计·············································高一久
30校园网络的安全问题分析与对策·············································杨宇红
33浅谈We b安全技术·············································谢厚亮
35浅谈计算机网络安全与防范策略·············································吴丽娟
38基于智能防火墙的网络安全设计·············································戴莲芬
技术应用
42 VPDN在虚拟校园网的应用·······································柴文磊胡轶董方旭
44数字证书与电子病案的安全··············································孙瑜
46运用负载均衡技术保障医院信息系统安全·············································巩东虎
49产房电子病历安全与应用·············································聂海鑫
52基于IPv6流量监测自适应采样算法研究应用·············································张忠伟
56多源遥感信息融合技术在土地沙化监测中的应用研究···········································赵树源徐瞾
59数据网与传输网在实际中的运用·············································张炜琨
63在VC环境下对位图图像的处理过程·············································张敏杰
66光传输网络系统在实际中的应用··············································钟立
69 GPRS与智能家居系统·············································杨立宏
71信息安全技术在电子商务中的应用············································李征兵
74包头市机械行业数据库的建立及专利战略分析系统应用···································赵庆华杨英周玉梅史金彪
76微波监控远程传输在?林防火中的应用······································刘晓丽胡朝晖吴玉英
79基于ASP的企业人力资源管理系统的设计············································来晓俊
教学培养
82建构主义理论在信息隐藏课程教学中的运用······································任俊玲康海燕马志峰
84高职院校计算机类专业师资队伍建设的研究与实践········································凌云朱火金徐华
87基于教学平台的学习活动设计·············································郑珠
91信息技术与学科整合的途径·············································王源
94基于We b的网络教学平台的开发与设计·············································汪洁
2011.5.
技术探讨
3数字图像LSB隐写分析统计模型初探············································姚孝明
6基于免疫赦免机制的智能分布式入侵检测系统·········································匡志科王国才
10关于第三方支付平台的安全·······································张宏伟朱信铭朱璇
13云计算时代对信息安全的影响及对策分析············································杜经纬
15基于We b Se rvic e实现跨域网站一次登录············································邓树芳
19基于混合密码技术的网络安全传输系统设计与实现············································石宏宇
23 Wind ows平台下的WDM分层驱动模型·············································庞周
26光进铜退的网络信息安全建设·············································曹亮
28加密文件的“外发”交流模式············································林雄飞
31网络数据库应用系统安全研究··········································张亚楠郝倩
33一种集成化网络安全事件关联分析模型··············································涂豫
36浅析校园网络防病毒体系·············································李聪慧
39一种3G网络下的LBS架构研究及实现··············································郭盈
44基于My SQL的负载均衡的搭建与研究·············································李海兵
46基于B/S模式的企业管理信息系统的设计··········································唐婧聂志华
技术应用
49基于RFID的煤矿安全保障系统设计·············································庞桂林
52基于A-Sta r算法警用地图查询系统的设计与实现··········································徐伟孙士兵
54基于气象机房设备软硬件控制系统研究···········································应迪韩超
57福建海域溢油应急处置辅助决策系统设计和实现·············································林新宇
59关于区域医疗信息化建设的思考·············································龚希若
62浅谈博物馆的安全技术防范措施·············································俞炳扬
解决之道
64制造业内网安全解决之策········································王利刘畅贾弘毅
67规避网络钓鱼给证券行业带来的安全风险········································朱红刘宝成张开
70网上证券交易系统安全机制的研究···········································陈静马丽
教学培养
74第三方服务培训市场现状浅析·········································刘小平邓金花
78项目经理培训“七年之痒”·········································邓金花刘小平
81中等职业学校网络辅助教学模式的探索与思考·············································邱直天
测试分析
84敏捷测试管理探讨···········································周波郭盈
87计算机实现基于正交试验的测试用例自动生成···········································陈磊简炜
90基于国标《会计核算软件数据接口》的软件测试··········································赵亮罗文兵
93基准测试在服务器选型中的研究分析与实践·······································翟艳芬周润松陈磊
95中国信息安全技术大会征文通知
96《信息安全与技术》杂志文稿要求
2011.6.
技术探讨
3网络空间的信息安全治理模型浅析············································张玉芳
6试论网络安全访问的规划与建设············································钟伟杰
9基于IPv6网络安全研究·············································蔡玥
11计算机网络安全性问题探析············································余光华
13云计算引发的安全风险·········································肖新斌史召臣
15计算机网络信息安全及对策研究·········································周观民李荣会
17部署服务器虚拟化的安全风险············································姚雪玲
19人脸图像年龄估计模型综述·············································金波
22浅析SQL Se rve r数据库的安全和管理策略············································吴丽娟
25基于Qt/E嵌入式GUI设计的研究与实现··········································雷鸿吴慧婷
30基于Ha d oop云计算模型探究·············································李珺
33 ARP欺骗的防御策略···········································刘捷张琦
35数据库应用系统性能优化研究与实践············································韩竞锋
38企业网信息安全建设方案·······································孙学员鲍雷孙建猛
技术应用
40 IPv6校园网中IPSe c VPN安全分析与应用研究·······································刘劲松李超柴文磊
42浅谈医院信息化建设与系统风险·············································曾姗姗
44在线会议管理系统中Cookie s安全应用的研究·······································陈畅孙士兵唐一韬
47医院网络安全的技术实现与改进·············································毛晔沁
49浅析交换机端口隔离在校园网防范ARP攻击中的应用·············································莫洪林
51 We b搜索结果组织与展示的一种机制··············································李优
54 SSH协议及OpenSSH的安装··············································李颖
57编目研究的直观与扩展———基于影像的文物研究系统·············································石秀敏
61管理信息系统与企业管理发展关系探讨···········································方力姜明
64科技资源调查信息系统的构建·············································邓树芳
67项目管理的八个有效步骤···········································肖艳编译
69大学校园一卡通的研究与实现·············································吴铭心
73智能布线系统在现代化生产流水线中的应用思考·············································史风琴
77短信息辅助办公自动化系统的分析与设计·············································高在山
81 SDH专网的接入网网络管理系统设计·············································蒋步云
83用Access数据库开发出租车管理信息系统的设计与实现··············································陈通
87双线路热备的数据传输系统··········································黄开明应迪
教学培养
90基于RFID技术高校学生考勤管理方案··········································孟波张宝龙
93基于J SP计算机在线考试系统的设计与实现······································随顺科滕春阳孙长江
96中国信息安全技术大会 (CISTC 2011) 征文通知
2011.7.
技术探讨
3网络社会秩序建设探析············································张玉芳
6党政机关网站面临的主要安全问题············································刘淑鹤
8涉密载体安全管理模式的研究与实践··································陈海波严芳邢广厂李建长
12网络系统安全技术的分类及其适用性分析·····································刘彦姝孙士兵姜建良
14基于3G的RFID身份识别系统的信息安全研究············································郭广明
18浅析We b应用系统的安全及防护策略············································吴丽娟
21物联网中RFID节点通信安全研究············································何伟刚
25一种改进的KNN文本分类算法··········································刘辉应培培
28基于灰色系统预测威胁赋值方法············································余明辉
技术应用
32浅析高校校园网安全现状与管理策略··········································魏智灵钟帅
34校园网安全问题及防范策略·············································陈莹
37信息时代医院数字化及其信息安全问题探讨·············································华骏
40基于Window Server 2003小型办公局域网的安全搭建············································龚尚今
43计算机网络安全故障分析与排除······································陶崇福罗旭勃钱洁
46基于DSP和MSP430双核交通监控终端的设计·····································孙长江随顺科滕春阳
48基于OpenGL的三维建模可视化软件开发············································欧中亚
51基于可视化技术的油田企业信息整合系统探讨·····································张婷婷童亮铭龙飞
54基于802.1X和动态VLAN实现企业园区网多种接入方式的统一管理············································傅俊皓
56“基于LBS的社交网络”在城市公共空间管理与运营中的应用·····································梁力予任露凌万艳华
60对变电站自动化系统中通信管理的研究与设计·············································邢春德
64自适应遗传算法在智能组卷中的应用·····································叶长芳雷继呈高卫斌
67浅谈地籍管理数据库技术与设计··············································白羽
69基于.ne t的图书馆信息管理系统分析·············································唐国献
72基于FPGA实现模拟雷达工作的一种方法·············································高影嘉
教学培养
75浅谈政府网站规划与建设培训······································杨京周周亮刘小平
78基于数据挖掘高职院校学生技能考证系统的研究·············································陆渊章
81 R-C4.5决策树模型在高职就业分析中的应用·········································张继美桂红兵
解决之道
85浅谈基于J XTA的P2P应用开发··········································景晓军赵伟
88一种基于KAD对等网络的互联网视听节目监测系统···········································范娜梁潇
测试分析
91桌面操作系统评测指标体系研究······································李艳波蒋发群陈磊
新书推介
94《黑客》———中国第一部揭秘黑客小说·············································窦海军
95中国信息安全技术大会 (CIST 2011) 征文通知
96《信息安全与技术》杂志文稿要求
2011.8.
技术探讨
3计算机网络数据库安全策略探讨············································韩竞锋
5公安信息网络安全保障策略研究·············································何姗
8基于We b的数据库安全技术研究·········································吴慧丽方加娟
11计算机中安全可信UPS设计············································任爱芝
14 3G通信网络的安全分析·············································陈超
17浅谈环境信息系统建设············································沈红军
20 Vo IP的发展与现状探析············································林佳涛
23浅谈多媒体通信技术的应用与未来发展研究············································李云芳
25基于以太网技术的网络智能传感器研究············································刘亮平
技术应用
28车联网技术中的信息安全研究·············································冯涛
31公安消防计算机网络安全隐患与防范策略探讨············································田湘霞
33基于防火墙技术对高校网络建设的研究·········································张文辉祁富燕
36运营商级云计算数据中心发展研究············································赵雷霆
40集团财务公司数字证书应用模式研究············································高建峰
43车辆运输证件管理系统的设计与实现············································任华新
46多校区校园网络安全策略研究············································雷树梅
48浅谈图书馆计算机网络系统的安全管理问题及其防范措施·············································刘征
51校园服务器的安全与防范措施·········································钟帅魏智灵
53基于TPM的安全路由器设计············································倪红彪
56油田区域站通信应急保障体系建设与实践·············································曲进明
59试析计算机数据库的备份及恢复技术··············································胡晶
62浅谈企业网站的设计与建设·············································王淑云
65数据联邦技术在系统集成中的应用与研究········································徐元根黎勇李捷
69浅述高校无线信息解决方案·············································张国梁
72通信技术在电力中的应用分析··············································黄强
75基于ASP.NET办公自动化管理系统的开发设计··············································刘辉
77基于仿真的P2P直播系统的研究·············································苗邯军
81基于单片机系统的液体点滴速度监控装置的设计·····································滕春阳孙长江随顺科
84基于STC12C5A08AD教室节能控制系统的设计··············································周燕
教学培养
87基于J 2EE的学生就业信息管理系统的分析与设计·············································凌宗云
90基于CMS的高校网站群安全体系研究·············································朱烜璋
93基于B/S结构的高职院校课程评审系统的分析与设计·············································罗旭东
2011.9.
技术探讨
5关于国家电子签名证书策略管理中心建设的思考·····································朱璇严霄凤张博高炽扬
8澳大利亚信息安全保障体系建设及对我国的启示··············································孙星
12美国联邦桥认证中心策略对我国的启示·············································严霄凤
15移动存储介质防护管控技术及评价方法·············································汤放鸣
21基于ATL逻辑的公平多方不可否认协议的分析与改进·········································汪学明翁立晨
26一种安全的高可靠性P2P云存储备份模型初探·········································魏东泽来学嘉
32基于纠删编码P2P存储系统的数据维护算法··········································林旭来学嘉
36基于Bit Torre nt网络实现大规模DDos攻击的策略研究····································付蔚李强李舟军
41基于二进制动态插装程序执行路径追踪································常达李舟军杨天放忽朝俭
47图像纹理区检测及分割算法研究······································范郭亮李光王春霞
50支持密文索引的数据库透明加密方法································朱继锋戴林杜顶李鹏辉段晶晶
56 We b应用程序中SQL注入攻防策略的研究··································王希忠黄俊强周长利方舟
62浅谈云计算的安全隐患及防护策略····································薄明霞陈军王渭清陈伟
65云平台信息安全整体保护技术研究···································李程远范红李海涛韩煜
71面向相似度的多维异构数据比对模型研究·································孙喜来王欣葛昂郑家民邓宏斌
77异构系统协同性及方法研究···································孙兴中陈阳郑家民邓宏斌
技术应用
83物联网信息安全整体保护实现技术研究····································邵华范红张冬芳张琪
89一种实现笔记本电脑防盗的方法··········································刘西贤
91计算机网络及网站的安全性研究··········································石红光
93电信网络运维阶段风险评估方法研究······································薄明霞陈军王渭清
99 Ora c le数据库备份与恢复研究············································李锁雷
103电信基础运营商网络安全验收体系及策略探讨·······································王渭清陈军薄明霞
106 Padding Oracle攻击浅析············································何伊圣
110搜索引擎的网络信息审计系统········································张剑孙鹏张电
113基于无盘网络的重要信息系统安全应用研究··································张剑钟王丹王玲东亮陈亮
118利用社会工程学的渗透技术············································何伊圣
122构筑企业信息安全的堡垒············································王拥军
125对APT攻击的检测与防御···········································张帅
专题报道
128防火墙“三全”标准迎合“线速”时代
2011.10.
技术探讨
5物联网发展中的信任模型缺失··································龚洁中陈恭亮李林森李建华
9一种密钥延长DES算法的FPGA实现···········································李莉张磊
13基于云计算的安全数据存储研究与设计·············································杨振贤
16数据库系统的建立方法和参考模型··············································吴蓓
19基于ARP协议的局域网访问控制··············································李卓
22基于PKI的CA认证系统的研究··············································赵琛
25网络信息安全传输系统的设计和实现·············································王雪莉
28基于混合神经网络的异常信息流检测模型·········································朱献文李景富
31云计算时代对信息安全的影响及对策分析·········································柯行斌宋媛媛
33基于SIP协议Vo IP软终端的研究与实现·············································刘习义
36基于信息安全的现代信息加密技术研究··············································潘芳
39计算机网络风险防范措施及策略研究····································李旺彦马芳芳邢学生
42网络安全中入侵检测算法研究·············································吉文龙
47基于SSL协议的VPN技术研究··············································张宁
49多级安全关系数据库管理系统·············································赵建成
52信息网络安全评估方法探讨··············································徐华
55无线网络中密钥管理技术概述···········································何邓徐敏
58计算机网络安全的基本安全问题和解决方法············································魏洪雷
61浅析移动终端信息安全问题···········································张像孙轶
63安全套接层分析及研究·············································王懿
技术应用
66基于自然语言处理的多级网页过滤器研究··································康海燕任俊玲陈昕王鹤沩
70内网安全管理平台研究与实践··········································应洪波林萱
75政府网站安全防护体系的分析和研究·············································刘梁
78计算机网络及政府网站的安全性探讨·············································石辉
80物联网中嵌入式TCP/IP协议栈的设计技巧·········································王金华李允俊
83 GPS在船岸信息交互中的应用··········································乔俊张先华
87高校公共机房ARP病毒及防范策略············································柴继贵
90局域网交换机安全管理研究············································谭呈祥
93地面气象测报业务计算机系统的管理与维护··········································贺继荣万慧
96反洗钱监测分析系统安全控制的研究与实现·············································刘军
99计算机数据库的入侵检测技术实现············································常红梅
102数据库服务中的安全隐私与保护············································高振清
105基于风险管理的软件开发过程模型············································杨亚萍
108 C#开发数据库应用系统技术实现问题············································高德立
111计算机硬件管理与维护探讨··········································郝帅蔡宗慧
114信息技术在建筑防火安全中的应用·············································白芳
117政府网站运行的安全性问题研究·············································李杰
119卷烟厂综合安保系统的设计与实现············································朱永东
教学培养
123基于We b的网络选修课程教学平台设计··············································吴莉
126论远程教育网络信息安全建设·············································马东宇
2011.11.
技术探讨
3基于多属性层次分析的信息安全风险评估方法········································潘平杨平何朝霞
7 802.11i中的四次握手协议安全性分析及改进·····································王玉柱何定养郑贤路
11基于蓝牙的安全身份认证技术研究·············································迟晓燕
14数字图像的增强方法研究······································马青华吕书强蔡春
16基于NS2的队列管理算法研究···········································凌云韩冬
20基于OpenCV人脸检测算法在嵌入式系统上的实现··············································刘爽
23可控安全Web的研究探讨·············································罗乐霞
26邮件系统信息安全现状及对策分析··············································郑毅
28 VLAN技术在网络安全管理中的应用·············································常红梅
31网络环境中的信息安全技术··············································郑伟
34恶意代码特征及其危害·············································王雨隽
36浅析高校校园网的安全设计·····································雷继呈叶长芳高卫斌
38 DB2数据库设计及优化技术研究··············································刘姝
41 C/S模式与B/S模式相结合的数据库系统技术研究·············································丁智刚
45基于工作流管理技术的研究··········································张敏辉刘燕
47.NET数据绑定技术的分析与研究··············································马娟
49 ASP网站防止SQL注入策略研究————————————————————————————————————————————冯现永
52计算机网络信息安全面临的问题和对策—————————————————————————————————————————王淑萍付金荣
54计算机网络信息技术安全及防范对策研究————————————————————————————————————————————杜常青
技术应用
56“校园卫士”平台的实现及应用————————————————————————————————————————————佘新建
58 IT运维管理解决方案——————————————————————————————————————————侯毅孙波
61虹桥220k V智能变电站设计与应用——————————————————————————————————————刘青胜潘卓周燕飞
63条码技术与U8ERP集成应用研究————————————————————————————————————————————王永振
66基于小波能双重自恢复的音频数字水印算法————————————————————————————————————————————张天星
69综合监控系统在高性能计算中心的应用——————————————————————————————————————晁阳程世清马迅飞
72校园网站灾难处置———校园网站被入侵、数据被篡改后的思考—————————————————————————————————————————————江鑫
75建立电力企业IT服务管理体系————————————————————————————————————————————陈建新
78基于双PLC矿井提升控制系统的研究与应用—————————————————————————————————————————————姜宁
81基于剩余推力法对某排土场稳定性分析—————————————————————————————————————————————许畅
84基于地政监察的信息管理系统—————————————————————————————————————————————高杰
86三网融合下广电网络的发展思考————————————————————————————————————————————李国贤
88试论办公自动化系统中群集技术的运用————————————————————————————————————————————李宗慧
90煤质常规项目数据自动处理系统研究————————————————————————————————————————————皮中原
92基于J SP的电子商务网站开发————————————————————————————————————————————闻永萍
95基于环境因素的网站分析研究———陕西省标准质量信息网——————————————————————————————————————————种芳白洁
98安全可靠的视频监控系统的设计————————————————————————————————————————————武士涛
101浅谈Grid Vie w控件在学生管理系统中的应用————————————————————————————————————————————曹宏钦
教学培养
104高校科研管理信息化平台设计与实施研究········································胡轶李超温玉
106基于聚类的教学资源管理系统·············································杨志彬
108探讨多媒体教室计算机系统维护策略及技巧··············································王斌
111构建中职J 2ME教学模式的研究与实践·············································黄罗辉
2011.12.
技术探讨
3我国电子认证服务业发展回顾及“十二五”发展对策研究··········································刘权陈月华
8基于TEMU动态二进制分析平台的程序控制流转移指令追踪·········································杨天放李舟军
15 TCP/IP协议与信息安全·············································陈彦君
17多端口过压安全保护电路设计与研究······································李春飞张勇赵述涛
21中小企业计算机网络安全与防护措施··············································杨戈
24蒙特·卡罗方法的现状和展望·············································王建秋
26加强IDC网络安全实现信息社会和谐·············································张初光
30网络安全态势感知在网络安全监控中的作用··············································刘超
33浅谈基于过滤器与拦截器的用户访问控制·············································郑志娴
36基于虚拟仪器的通信系统通用检测平台设计······································张增董保良王晓波
39浅析传真加密的现状及发展趋势·············································张小莉
41基于防火墙的内网信息发布探讨··············································石伟
44浅谈企业计算机网络安全与防护·············································朱永东
46数据中心平台的一种设计与实现···········································张锦珠
50简述三种私有数据库云模型············································刘娟
52 We b网络模型演化下的信息技术············································沈思
55数字岩心领域中的公式发现研究············································于雷
58网络数据库安全技术···········································刘卫星
61网上书城的设计与实现········································曹萌萌史江波
64基于DOC的嵌入式远程数据采集系统开发···········································洪艳伟
技术应用
66证券行业信息系统备份能力现状浅析··································王淼郭晓晖许向军赵勇
70利用虚拟化技术进行信息系统应用级容灾的建设·····································王晓磊李少勤钱涛
72医院信息化建设与系统风险分析············································孔轶
75虚拟桌面技术应用与研究···········································杨智楠
78基于GSM远程心电自动监控系统的研究·······································陈千伟张亚君
81智能楼宇中MS SQL数据库研究及设计···········································高天哲
84基于μC/OS-III实时操作系统的血糖仪应用层程序设计············································成洁
89公交线路查询系统的数据库设计············································王军
92关于广电网络EPON+EOC系统分析报告·······································曹卫军樊建农
95 FA16接入网设备在肇庆供电局通信网的应用···········································周浩庭
教学培养
103计算机专业课程评价方案的思考与对策·····································於跃成生佳根华伟
106《C语言程序设计》教学策略的探索与实践·········································卢凤韩艳
篇4:2011天线年会论文目录
2.杨虎,肖阳著:《中国书业》,北京:五洲传播出版社,2011.1
3.彭卫国,胡建强著:《民国刻本经眼录》,石家庄:河北教育出版社,2011.1
4.李滨著:《中国近代报刊角色的发展和演变》,长沙:岳麓书社,2011.1
5.颜湘茹著:《层叠的现代:〈现代〉杂志研究》,广州:中山大学出版社,2011.1
6.沈毅著:《论政与启蒙:近代同人报刊研究——以〈努力周报〉为例》,北京:中国传媒大学出版社,2011.1
7. 孙会著:《〈大公报〉广告与近代社会(1902—1936)》,北京:中国传媒大学出版社,2011.1
8.张人凤,柳和城编著:《张元济年谱长编(上,下)》,上海:上海交通大学出版社,2011.1
9.[日]石仓武四郎等编摄:《旧京书影:一九三三年北平图书馆善本书目》,北京:人民文学出版社,2011.1
10.郭孟良著:《晚明商业出版》,北京:中国书籍出版社,2011.1
11.李润波著:《老报刊说党史》,北京:中央文献出版社,2011.1
12.傅柒生,李贞刚编著:《红色记忆:中央苏区报刊图史》,北京:解放军出版社,2011.1
13.刘文峰著:《中国体育图书出版研究》,北京:中国体育大学出版社,2011.1
14.章宏伟著:《十六—十九世纪中国出版研究》,上海:上海人民出版社,2011.1
15.黄裳著:《笔祸史谈丛》,北京:北京出版社,2011.1
16.沈津著:《书丛老蠹鱼》,北京:中华书局,2011.1
17.姜德明著:《寻书偶存》,南京:南京师范大学出版社,2011.1
18.马贵斌等编著:《简明中国印钞史》,北京:印刷工业出版社,2011.1
19.[美国]安德烈·伯纳德编;陈荣彬译写:《退稿信:出版史上编辑们看走眼的重大时刻》,北京:新星出版社,2011.1
20.龚晏邦著:《方寸书香:早期中国题材藏书票》,北京:新华出版社,2011.1
21.云南人民出版社编:《60年记忆:云南人民出版社60周年献礼》,昆明:云南人民出版社,2011.1
22.山西省图书馆,山西省古籍保护中心编:《第一批山西省珍贵古籍名录图录》,太原:山西人民出版社,2011.1
23.上海图书馆编:《江南制造局翻译馆图志》,上海:上海科技文献出版社,2011.1
24.王培元著:《永远的朝内166号:与前辈灵魂相遇》,北京:人民文学出版社,2011.1
25.吴禾编:《书痴范用》,北京:人民出版社,生活·读书·新知三联书店,2011.1
26.张冠生著:《远古的纸草》,广州:花城出版社,2011.1
27.香港城市大学中国文化中心,出版博物馆编:《出版文化的新世界:香港与上海》,上海:上海人民出版社,2011.2
28.戈公振著:《中国报学史》,长沙:岳麓书社,2011.2
29.谭旭东著:《中国少儿出版文化地图》,长春:吉林美术出版社,2011.2
30.汪家熔辑注:《中国出版史料(近代部分)》补卷(上,下),武汉:湖北教育出版社,2011.2
31.元青主编;王建明,王晓霞等著:《中国近代出版史稿》,天津:南开大学出版社,2011.2
32.魏向清著:《中国外语类辞书编纂出版30年回顾与反思(1978—2008)》,上海:上海辞书出版社,2011.2
33.焦扬主编:《世博书香:2010上海书展综览》,上海:上海人民出版社,2011.2
34.张守仁著:《永远的十月:我的编辑生涯》,北京:北京出版社,2011.2
35.郑纳新著:《新时期的〈人民文学〉与“人民文学”》,上海:东方出版中心,2011.3
36.王增如著:《丁玲办〈中国〉》,北京:人民文学出版社,2011.3
37.杨玲著:《高等教育教材出版研究》,北京:首都师范大学出版社,2011.3
38.人民文学出版社编;王海波辑录:《人民文学出版社六十年图书总目(1951—2011)》,北京:人民文学出版社,2011.3
39.人民文学出版社编:《怀念集》,北京:人民文学出版社,2011.3
40.季剑青著:《北平的大学教育与文学生产(1928—1937)》,北京:北京大学出版社,2011.3
41.《王云五文集(六):八十岫庐自述》,南昌:江西教育出版社,2011.4
42.谢清国著:《中国近代科技传播史》,北京:科学出版社,2011.4
43.白岱玉著:《甘肃出版史略》(增订本),兰州:甘肃教育出版社,2011.4
44.刘思佳著:《爱国志士 民主先锋:新闻出版家邹韬奋》,长春:吉林人民出版社,2011.4
45.陈挥著:《邹韬奋》,长春:吉林文史出版社,2011.4
46.张美芳著:《毕生为文化而奋斗:中国第一出版家张元济》,长春:吉林人民出版社,2011.4
47.[美]巴斯贝恩著;杨传纬译:《为了书籍的人:坚忍与刚毅之一》,上海:上海人民出版社,2011.4
48.人民文学出版社编:《王笠耘纪念集》,北京:人民文学出版社,2011.4
49.沈昌文等著;郭凤岭编:《编书记》,北京:金城出版社,2011.4
50.张均著:《中国当代文学制度研究(1949—1976)》,北京:北京大学出版社,2011.4
51.胡汝骏著:《编辑工作三十年》,兰州:甘肃教育出版社,2011.4
【2011天线年会论文目录】相关文章:
智能天线毕业论文05-27
智能天线研究论文04-16
天线相关的论文题目05-05
天线技术论文范文05-09
天线技术论文提纲11-15
发射天线广播电视论文04-18
天线技术移动通信论文04-20
天线安装测量技术论文07-03
激光天线语音通信分析论文04-23
智能天线研究论文提纲11-15