Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (1-2): 67-69    DOI:
Current Issue | Archive | Adv Search |
The Secondary Development of Accessing to AutoCAD BOM data Based on NET
Zhang Ning
Suzhou Institue of Trade & Commerce, Suzhou
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  AutoCAD is one of today's most popular drawing software. Users are used to log the schedule of drawings in Excel for statistical processing, which is slow and inaccurate. So the author completes the secondary develop of AutoCAD with C language in NET, loading the DWG form data to Excel sheet rapidly and accurately.
Key wordsNet      AutoCAD      C#      BOM     
Published: 08 November 2017
:  TP319  

Cite this article:

Zhang Ning. The Secondary Development of Accessing to AutoCAD BOM data Based on NET. Computer & Telecommunication, 2015, 1(1-2): 67-69.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2015/V1/I1-2/67

[1] LI Gai GUO Ze-hao. TrustOCCR: Social One Class Collaborative Ranking Recommendation Algorithm by Trust[J]. 电脑与电信, 2024, 1(6): 7-10.
[2] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[3] LI Jing-feng QIAO Gao-xue . Research on Intelligent Elevator Blocking System Based on Mobile Internet of Things[J]. 电脑与电信, 2024, 1(6): 78-83.
[4] XU Jian-lin JIANG Jing WANG Kai-gui ZHAO Ping-zhong. Research on the Optimization Measures and Application of High-speed Railway Private Network [J]. 电脑与电信, 2024, 1(6): 85-94.
[5] ZENG Hao,  YANG Cheng, . An Algorithm for Identifying X-ray Pulsar Signals[J]. 电脑与电信, 2024, 1(5): 6-.
[6] REN Hao. Expression Recognition Method Combined with Attention Feature Fusion[J]. 电脑与电信, 2024, 1(5): 71-.
[7] WANG Jin WANG Rui. Facial Expression Recognition Algorithm Based on Multi-scale Feature Deep Learning[J]. 电脑与电信, 2024, 1(5): 75-.
[8] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[9] YUAN Li-ning, XING Zhong-yu, YANG Guo-yi LUO Heng-yu.
Crime Organization Member Relationship Prediction Based on Graph Embedding Model
[J]. 电脑与电信, 2024, 1(4): 1-5.
[10] RU Chun-rui  DANG Xiao-chao. CSI-based Indoor Localization Method Using IDW Interpolation and Amplitude-phase Fusion Network[J]. 电脑与电信, 2024, 1(3): 1-6.
[11] WU Guo-song. The Implementation of IPv6 Network Deployment and IPv4 Network Security Reinforcement for Web Application Systems Based on Intelligent DNS and Reverse Proxy[J]. 电脑与电信, 2024, 1(3): 7-.
[12] LIU Ping WANG Shi-wei JIANG Meng-yun. Research on the Ideological and Political Education in the Courses of Embedded System in Applied Undergraduate[J]. 电脑与电信, 2024, 1(3): 24-.
[13] YOU Dan-dan LUO Shao-ye. The Literature Review about Sentiment Analysis in Network Public Opinion Research in China[J]. 电脑与电信, 2024, 1(3): 64-.
[14] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[15] WANG Fang. A Wireless Local Area Network Intrusion Signal Detection Method Based on GA-SVM Algorithm[J]. 电脑与电信, 2024, 1(1): 47-49.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd