column
The On-chip Prefetch Memory System for Digital Signal Stream Processor
LIU Hua-jie, XIE Jing, MAO Zhi-gang,
2014, 31(6):1-4.
Abstract PDF
Low Power Data Cache Design Based on Load Reuse
LI Quan-quan, XUE Zhi-yuan, ZHANG Tie-jun, WANG Dong-hui, HOU Chao-huan,
2014, 31(6):5-7,11.
Abstract PDF
Research and Hardware Implementation of Particle Filter for Spatial Localization
LEI Jian-ming, HUANG Di, WANG Zhen, ZOU Zhi-ge,
2014, 31(6):8-11.
Abstract PDF
An Identification Method Based on Analysis of Dissimilarity Degree for Network Communication Behavior
JING Tao, LI Jun,
2014, 31(6):12-15.
Abstract PDF
Access of Data Secure Based on ORAM in Cloud Storage
LI Hong-wei, GU Chun-sheng, JING Zheng-jun, YU Zhi-min,
2014, 31(6):16-20.
Abstract PDF
An Entropy-weighted Multi-attribute Combination Method for Software Trustworthiness Classification Assessment
WANG Ben, ZHOU Xing-she, YANG Ya-lei,
2014, 31(6):21-24.
Abstract PDF
Study on the Memory Cell TID/SEL Hardening by Design Technology Area Cost
WANG Wen, SANG Hong-shi, SHEN Xu-bang,
2014, 31(6):25-29.
Abstract PDF
Multi-channel Parallel Signal Acquisition and 10G High-speed Transmission System
HU Sheng-ze, BAO Wei-dong,
2014, 31(6):30-35.
Abstract PDF
Design on Data Privacy Protection Model for Cloud Environment
SHAO Bi-lin, ZHAO Hua-long, BIAN Gen-qing, WANG Hui,
2014, 31(6):36-39.
Abstract PDF
A Stream Based Memory Access Control System of an On-Chip Clustered Processor for Multi-task Application
HU Kai, XIE Jing, MAO Zhi-gang,
2014, 31(6):40-43.
Abstract PDF
Design of a Digital Decimation Filter for Σ-Δ ADC in 0.18 CMOS
LIU Zhong-chao, ZHANG Zhang-chun, LI Wei, GUO Yu-feng, LIU Lei-lei,
2014, 31(6):44-47.
Abstract PDF
Quantitative Approaches to Temporal and Spatial Locality Strength
HOU Fang, HUANG Cheng-hui, LU Ji-yuan,
2014, 31(6):48-52,56.
Abstract PDF
Two-step Denoising Algorithm to High Density Salt &Pepper Noisy Image
WANG Ji-chao, LI Kui-ping, QIAO Tian-tian,
2014, 31(6):53-56.
Abstract PDF
Adaptive De-blocking Algorithm for the Wedgelets Reconstructed Image
XIE Fang, DUAN Chang, CAO Jian-shu,
2014, 31(6):57-59,63.
Abstract PDF
Multilevel Block CRC′s Fast Configuration
LIANG Hai-hua, PAN Li-na,
2014, 31(6):60-63.
Abstract PDF
Search Framework in Social Network Based on Mining Content
WANG Wen, WANG Shu-feng, ZHUANG Yan-bin,
2014, 31(6):64-67.
Abstract PDF
Research on Domain Ontology Concept Hyponymy Relation Extraction
TANG Qing, LU: Xue-qiang, LI Zhuo,
2014, 31(6):68-71.
Abstract PDF
A Test Pattern Selection Method for Static Burn-In of ICs
CUI Xiao-le, LI Hong, SHI Xin-ming, CHENG Zuo-lin,
2014, 31(6):72-76.
Abstract PDF
A Two-dimensional Image Adaptive Algorithm Based on Recursive Inversion
LAI Jin-hui, LIANG Song,
2014, 31(6):77-80.
Abstract PDF
The Improvement and Study of AODV Routing Table
YU Ben-gong, MENG Fan-li,
2014, 31(6):81-83,90.
Abstract PDF
Design of Low Phase Noise Voltage Controlled Oscillator with Low Tuning-gain Change and Wide Linear Range
ZHENG Jin-wang, CHEN Hua, NI Kan, GUO Gui-liang, ZHANG Run-xi, LIU Sheng-you, LAI Qiang-tao, YAN Yue-peng,
2014, 31(6):84-90.
Abstract PDF
PaaS Compositing Mode Selection of Cloud Computing Based on Model Simulation
XU Xing, ZHOU Jian-xiong, WANG Ming-zhe,
2014, 31(6):91-96.
Abstract PDF
Cache-Efficient Parallel Solving(l,d)-Motif Finding Problem
ZHANG Jing, ZHONG Cheng, LI Zhi,
2014, 31(6):97-102.
Abstract PDF
Design of a 3~5 GHz LNA with the Function of Both a Single-end Input and Differential Output is Achieved
ZHENG Yu, DUAN Ji-hai, XU Shi-chao,
2014, 31(6):103-106.
Abstract PDF
A Novelty Method for Bayesian Reliability Assessment of Electronic Equipment
YIN Zong-run, LI Jun-shan, SU Dong,
2014, 31(6):107-110.
Abstract PDF
Designing of an Energy-Efficient Routing Protocol Based on Genetic Algorithm for Mobile Wireless Sensor Networks
WANG Jian-ping, QU Pei-xin, CHEN Wei, LIU Quan,
2014, 31(6):111-116.
Abstract PDF
A Keywords Search Method over Relational Databases Based on Join Tree
MO Hong-zhi, GAN Jing-zhong, LU: Jie,
2014, 31(6):117-120,124.
Abstract PDF
An Improved Symmetry-Based Hough Transform Algorithm for Circle Detection
WANG Hong-ru, DING Wen,
2014, 31(6):121-124.
Abstract PDF
A DC/DC Converter Inductor Current Observer Based on Improved EKF
CHEN Chen, TONG Qiao-ling, XIE Wen, LIU Zheng-lin,
2014, 31(6):125-128,132.
Abstract PDF
Design of a 600 V VDMOS Termination Structure
HU Yu-song, FENG Quan-yuan, CHEN Xiao-pei,
2014, 31(6):129-132.
Abstract PDF
Design of a Programmable Gain Amplifier with High Accuracy for UHF RFID Transmitters
SHANG Long, ZHANG Zhang-chun, FANG Yu-ming, GUO Yu-feng, LIU Lei-lei,
2014, 31(6):133-136.
Abstract PDF
The Implementation of a High-Performance Blind Oversampling Clock Data Recovery Circuit
GAO Ning, ZHANG Zhang-chun, FANG Yu-ming, GUO Yu-feng, LIU Lei-lei,
2014, 31(6):137-140.
Abstract PDF
An Energy Optimization Strategy of Wireless Sensor Networks Based on Hybrid Mechanism Algorithm
GUO Rui, XU Guang-lu,
2014, 31(6):141-144.
Abstract PDF
CMOS RF Class AB Amplifier Design with High Linearity
CHEN Xiao-fei, SHEN Jun, ZHANG Li, LIN Shuang-xi,
2014, 31(6):145-148.
Abstract PDF
An Improved Otsu Image Segmentation Algorithm Based on Fuzzy Judgement
ZHANG Jian-ming, LI Yu-peng,
2014, 31(6):149-151,157.
Abstract PDF
CT-RBAC:An Access Control Model in Cloud Computing
CHANG Ling-xia, WANG Feng-ying, ZHAO Lian-jun, JIA Yong-xin, CHENG Zhen,
2014, 31(6):152-157.
Abstract PDF
Research on Trust Evaluation of Supplier Based on Double Sliding Windows in Cloud Computering
YANG Wan-lu, WANG Lei,
2014, 31(6):158-161.
Abstract PDF
Combination of Network Topology Control Simulation Modeling and Robustness Analysis
HAN Hong-zhang,
2014, 31(6):162-165,170.
Abstract PDF
Research on MIS Algorithm of SINR Model in Wireless Sensor Networks
FENG Wen-feng, HUANG Yun-cai,
2014, 31(6):166-170.
Abstract PDF
Key Site Evaluation Considering Cascading Effect Behaviors and Security Optimization on Traffic Network
CAO Juan, ZHANG Ying-chun,
2014, 31(6):171-175.
Abstract PDF
A Multi-swarm Co-evolutionparticle Swarm Optimization Algorithm Combined with the Extremal Optimization Algorithm
GE Peng, LIU Hong-yi,
2014, 31(6):176-179.
Abstract PDF
Design and Modelsim Verification of a 16-bit-fixed-point DSP Core
XIN Xiao-ning, LI Meng,
2014, 31(6):180-183,188.
Abstract PDF
Number of Auxiliary Lift Platform Under Visual Overload Intelligent Detection Method
LIU Zai-ying, ZHOU Ming-sheng,
2014, 31(6):184-188.
Abstract PDF
Based on the Fuzzy Recognition of Malicious Code Detection Technology Research
WANG Xiao-ying, CHEN Dan-qi, LIU Qing-jie, PAN Zhi-an,
2014, 31(6):189-192.
Abstract PDF