column
An Hyper-sphere Support Vector Machine with Hybrid Decision Strategy
LIU Shuang, CHEN Peng, LI Ke-qiu,
2014, 31(7):1-5,9.
Abstract PDF
Parallel Architecture for DoG Scale-space Construction
ZHANG Jing, SANG Hong-shi,
2014, 31(7):6-9.
Abstract PDF
The Application of Hypercube Method in S Box of SM4
WANG Yue, LI Shu-guo,
2014, 31(7):10-13,17.
Abstract PDF
A New Method of Selecting Reference Vector for Fast Search Algorithm Using Triangle Inequality in Subspace
MA Xiao-xiao, PAN Zhi-bin, LI Yang, FANG Jie,
2014, 31(7):14-17.
Abstract PDF
The Single Event Function Error Analysis of CPU in High/Low Speed Modes
ZHENG Hong-chao, YUE Su-ge, DONG Pan, CHEN Li-ming, CHEN Mao-xin,
2014, 31(7):18-21.
Abstract PDF
Two Improved Harmony Search Algorithms for Solving Numerical Optimization Problems
LI Yong-lin, YE Chun-ming,
2014, 31(7):22-26.
Abstract PDF
A Novel and High Performance SEU/SET-tolerant Latch Design
LIANG Hua-guo, WANG Xu-ming, HUANG Zheng-feng,
2014, 31(7):27-31,36.
Abstract PDF
The Key Technology Research on Distributed LVC Simulation System
MA Neng-jun, WANG Li-fang,
2014, 31(7):32-36.
Abstract PDF
Anonymous Authentication Scheme Design for Heterogeneous Clouds
WANG Chong-xia, GAO Mei-zhen, LIU Qian, ZHOU Xian-wei,
2014, 31(7):37-41.
Abstract PDF
Design of Step-up Controller for WLED Driver
LIU Zhen, SHAO Zhi-biao,
2014, 31(7):42-46,51.
Abstract PDF
Design of Digital Radio Call Control Interface Based on dPMR
YANG Zhen, ZHAO Yi, LIN Xiao-kang,
2014, 31(7):47-51.
Abstract PDF
Design and Implementation of a Novel 2.45 GHz Frequency Synthesizer
MA Xiao-xia, WAN Mei-lin, BAI Chuang, DAI Kui,
2014, 31(7):52-57.
Abstract PDF
Leakage Power Optimization Based on 55 nm Technology SoC Design
LI Lin,
2014, 31(7):58-60,64.
Abstract PDF
Study on Reversible Hiding Technology for Images in DCT Field
LIN Chun, WU Xiao-xin, GUO Xiao-li, DAI Wei, LU Guo-ping,
2014, 31(7):61-64.
Abstract PDF
The Improvment Backdoor Sets for SAT
LI Shu-xia, GONG Qian-ru, GU Wen-xiang,
2014, 31(7):65-68.
Abstract PDF
Application of Improved Genetic Algorithm in PID Control for Robot
ZHOU Hua-qiang, HU Guang-ping,
2014, 31(7):69-72.
Abstract PDF
The System-level Design and Simulation of Digital Self-calibrating 12-bit SAR-ADC
CHEN Xiao, WEI Ting-cun, LIU Wei,
2014, 31(7):73-76,83.
Abstract PDF
Research on Network Security Risk Assessment Based on Attack Graph Model
XIE Li-xia, CHOU Xiao-rui, LI Xue-fei,
2014, 31(7):77-83.
Abstract PDF
Design of a Charge Pump Applied in Double Power Systems
LI Ke, JUAN Yang, GU Fei,
2014, 31(7):84-87,92.
Abstract PDF
Discernibility Matrix-Based Attribute Reduction under the Algebra View and Information View
HUANG Zhi-guo, LIU Gang,
2014, 31(7):88-92.
Abstract PDF
Parallel Radix-2×K FFT Architecture with Conflict-Free Parallel Memory Accessing
HOU Ning, ZHAO Hong-mei, ZHAO Zhang-fei, ZHANG Duo-li,
2014, 31(7):93-97.
Abstract PDF
A Design of Authentication and Key Agreement Protocol for Secure Gateways in IoTs
DU Da-hai, FAN Hong, WANG Guan, LI Cheng-yuan,
2014, 31(7):98-100,104.
Abstract PDF
Community Division Method in Networks Based on Moderately Greedy Algorithm
WU Peng, WANG Heng-shan,
2014, 31(7):101-104.
Abstract PDF
The Design of Distributed and Real-time Game Server Cluster Architecture
XU Deng-yuan, WANG Peng,
2014, 31(7):105-108,112.
Abstract PDF
Anintrusion Prevention Model Based on Combination of Danger Theory and Negative Selection
WEI Meng, JIA Sui-min, HU Ming-sheng,
2014, 31(7):109-112.
Abstract PDF
A Method for Resisting SRAM SEU Accumulation with Scrubbing
CHEN Qing-yu, WU Long-sheng, HAO Kui, AI Diao,
2014, 31(7):113-117.
Abstract PDF
Design of the Network Communication in the Master-Slave Machine Based on the Embedded Linux System
TIAN Lei,
2014, 31(7):118-120,124.
Abstract PDF
Real-time Compression Algorithm for Spatial Data Based on Self-Adaptive Interval Run Length Coding
YAO Dan-dan, CHEN Jun, LU Han-yu, MIAO Fang,
2014, 31(7):121-124.
Abstract PDF
Study on Improving the Efficiency for Dealing with Hadoop Small Files
FAN Chao, LING Jie,
2014, 31(7):125-128,132.
Abstract PDF
Community Identification Based on Multivariate Properties and Utilizing It to Identify Network Opinion Leader
SHEN Yan-guang, LI Jin-wei,
2014, 31(7):129-132.
Abstract PDF
Network Data Model of Joint Damage of Channel Estimation
CHEN Hong-ming, ZHANG Hui,
2014, 31(7):133-136.
Abstract PDF
The Research of SaaS Application Development Model Based on Cloud Computing
JI Wen-li, LI Xiang-jun, CHEN Xia-yu,
2014, 31(7):137-141,146.
Abstract PDF
Identification of Dynamics Model and Self-control for Intelligent Vehicle
WANG Meng, SHI Zhong-ke,
2014, 31(7):142-146.
Abstract PDF
Scheduling Model Cloud Computing Resource Based on Improved Artificial Bee Colony Algorithm
ZHUO Tao, ZHAN Ying,
2014, 31(7):147-150,155.
Abstract PDF
Improved Reconstruction Algorithm Based on Subspace Pursuit
WANG Lu-cai, ZHAO Yan-sheng, LIN Hai-jun, LIU Wen-wei,
2014, 31(7):151-155.
Abstract PDF
A Sub-Pixel Ellipse Detection Algorithm Based on Improved Template Matching
WEI Yang, HUO Guang, ZHOU Chao-chao, SUN Guo-ming, CAO Yang, XIE Liang-ping,
2014, 31(7):156-160,166.
Abstract PDF
Image Editing Based on Improved Spatiograms Transfer
LIU Wen-hui, XU Rui,
2014, 31(7):161-166.
Abstract PDF
Relay Neurons Radial Automatic Control Algorithm and Application in WSN Nodes Localization
WU Jun-sheng, WANG Wei, REN Zhi-yong,
2014, 31(7):167-171,176.
Abstract PDF
The Cache Management Strategy Research on RAID Controller System
CHEN Yun-xiao, WANG Li-fang, JIANG Ze-jun,
2014, 31(7):172-176.
Abstract PDF
A LC Voltage-Controlled Oscillator Design and Simulation
LIANG Shuang, CAO Juan,
2014, 31(7):177-180.
Abstract PDF