2. Shandong Normal University Windows version of the general question bank construction. In 2005, Shandong Normal University won the second prize for outstanding teaching achievements, ranking third.
Research and experiment on teaching content reform of computer course in primary and secondary schools. In 2005, Shandong Normal University won the third prize for outstanding teaching achievements, ranking 1.
Publish a paper:
Research on 1 XML and its application in network teaching. Journal of Shandong Normal University (Natural Science Edition) No.2, 2003. The third author.
2- rings and grids embedded in RP(k) networks. China Science Series E, Volume 34, No.8, 2004, P939-950. The third author.
3 rings and chaos embedded in RP (k) network, China Science, 2004, Vol.47, No.5, pp.669-680. The third author.
Research on the application of authentication and authorization mechanism based on. Computer Application, Volume 24, No.8, 2004, P 133- 136. Author 1.
Analysis of the role of UML use cases in system documents. Shandong science, 2004, vol. 17, No.4, P 1-3. Author 1.
Research and application of multi-thread synchronous control in 6 C# language. Shandong science, No.4, vol. 17, 2004, P 127- 130. Second author.
7 Access SQL Server technology under Visual C #. Computer system application. No 1 1 of 2004, P66-69. Second author.
Analysis and research of XPath, XLink and XPointer. Microcomputer Development, Vol. 15,No. 10, 2005, P 19-22. Second author.
Research on workflow management system model based on UML. Computer system application, number 10, 2005, P26-29. Second author.
Conversion between 10 relational schema and XML schema. Computer System Application,No. 10, P83-86, second author.
1 1 Analysis and comparison of enterprise application frameworks based on Web services. Journal of Shandong Agricultural Management Cadre College, Volume 2, 2 1, 2005, P 14 1- 142. Second author.
12 Web service and its security mechanism. Shandong Science, 2005, Vol. 18,No. 1, P57-6 1. Second author.
An efficient intrusion detection method for 13 high-speed network. Information Technology and Informatization, No.6, 2005, P38-40. Author 2.
Research on 14 XML encryption and its implementation tools. Shandong Science, 2005, Volume 18, No.3, P96- 100. Author 2.
Advantages and applications of XTR public key cryptosystem in secure e-commerce. Computer security, 1, 2006, P25-28. Second author.
The application of 16 XML encryption and signature in Web service security. Computer Security, No.7, 2006, P20-23. Author 2.
E-government information security analysis 17. E-government, No.7 of 2006, P8- 12. Author 1.
The application of 18 XML in network education. Fujian Computer, No.9, 2006, P30-3 1. Second author.
19 Ajax technology and its application. Computer Age, No.3, 2007, P56-58. Second author.