Please wait a minute...
New Technology of Library and Information Service  2001, Vol. 17 Issue (1): 82-83    DOI: 10.11925/infotech.1003-3513.2001.01.25
article Current Issue | Archive | Adv Search |
How to Edit ISAPL DLL That is Used to Search the Database of the Library Collection with Delphi 4
Ma Linzi
(Library of Qufu Normal University, Qufu)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

One of the most essentia1 and important functions that the 1ibrary web site should provide is to revea1 the database of the library s collection. To edit ISAPL DLL with Delphi 4 is a simple and quick way to realize this function. Basing on his own experience, the author introduced in details how to edit ISAPL DLL with Delphi 4 in order to develop the applied program of web database.

Key wordsLibrary      Delphi      Web      Database     
Received: 08 May 2000      Published: 25 February 2001
ZTFLH: 

G354

 
Corresponding Authors: Ma Linzi   
About author:: Ma Linzi

Cite this article:

Ma Linzi. How to Edit ISAPL DLL That is Used to Search the Database of the Library Collection with Delphi 4. New Technology of Library and Information Service, 2001, 17(1): 82-83.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2001.01.25     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2001/V17/I1/82

1 [美]Steve Teixeire Xavier Pacheco 著.徐心华译. Delphi 4 开发大全(上、下). 北京: 人民邮电出版社, 1999
2 Protpag 98

 

[1] Lu Linong,Zhu Zhongming,Zhang Wangqiang,Wang Xiaochun. Cross-database Knowledge Integration and Fingerprint of Institutional Repositories with Lingo3G Clustering Algorithm[J]. 数据分析与知识发现, 2021, 5(5): 127-132.
[2] Li Xiao, Qu Jiansheng. Review of Application and Evolution of Meta-Analysis in Social Sciences[J]. 数据分析与知识发现, 2021, 5(11): 1-12.
[3] Chen Shiji, Qiu Junping, Yu Bo. Topic Analysis of LIS Big Data Research with Overlay Mapping[J]. 数据分析与知识发现, 2021, 5(10): 51-59.
[4] Shen Zhe, Wang Yi, Yao Yifan, Cheng Ying. Author Name Disambiguation Techniques for Academic Literature: A Review[J]. 数据分析与知识发现, 2020, 4(8): 15-27.
[5] Shen Zhihong,Zhao Zihao,Wang Haibo. Big Data Technology Stack Shifting: From SQL Centric to Graph Centric[J]. 数据分析与知识发现, 2020, 4(7): 50-65.
[6] Zhu Fu,Yuefen Wang,Xuhui Ding. Semantic Representation of Design Process Knowledge Reuse[J]. 数据分析与知识发现, 2019, 3(6): 21-29.
[7] Bi Datian,Wang Fu,Xu Pengcheng. Analyzing Mobile Library Users and Recommending Services with VSM[J]. 数据分析与知识发现, 2018, 2(9): 100-108.
[8] Sun Haixia,Wang Lei,Wu Yingjie,Hua Weina,Li Junlian. Matching Strategies for Institution Names in Literature Database[J]. 数据分析与知识发现, 2018, 2(8): 88-97.
[9] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[10] Guo Chonghui,Li Minqian. Evaluating Web Information for Ancient Villages Based on Rank Aggregation[J]. 数据分析与知识发现, 2018, 2(4): 10-19.
[11] Chen Yuan,Wang Chaoqun,Hu Zhongyi,Wu Jiang. Identifying Malicious Websites with PCA and Random Forest Methods[J]. 数据分析与知识发现, 2018, 2(4): 71-80.
[12] Shi Yutian,Zhu Qinghua,Zhao Yuxiang,Chen Xiaowei. Evaluating the Influence of China’s Webcast Platforms Based on Link Analysis[J]. 数据分析与知识发现, 2017, 1(9): 40-48.
[13] Zhang Xuanhui,Zhao Yuxiang. Evolution Path and Hot Topics of Citizen Science Studies[J]. 数据分析与知识发现, 2017, 1(7): 22-34.
[14] Hu Zhongyi,Wang Chaoqun,Wu Jiang. Identifying Phishing Websites with Multiple Online Data Sources[J]. 数据分析与知识发现, 2017, 1(6): 47-55.
[15] Li Baozhen,Wang Ya,Zhou Ke. Measuring Credibility of Social Media Contents Based on Bayesian Theory[J]. 数据分析与知识发现, 2017, 1(6): 83-92.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn