column
Research on Chaotic Pseudo Random Bit Generator Based on Logistic Map
XU Dong, CUI Xiao-xin, WANG Tian, XU Xiao-qian, YU Dun-shan, CUI Xiao-le, CHENG Yu-fang,
2016, 33(2):1-6.
Abstract FullText HTML PDF
Design of an ADC Based on Compressed Sensing Theory
HAN Chen-xi, WEI Jing-wei, LI Dong-mei,
2016, 33(2):7-11, 17.
Abstract FullText HTML PDF
A Reliable Sleep Scheduling Algorithm for Opportunistic Networks Based on Adaptive Time Adjustment
REN Zhi, WU Yang, ZHANG Jian-bo, LI Ji-bi,
2016, 33(2):12-17.
Abstract FullText HTML PDF
Signal Processing Circuit for Vision-Based Tactile Sensor
ZHANG Gui-xiang, ZHONG Yi, ZHANG Chun,
2016, 33(2):18-21.
Abstract FullText HTML PDF
Hierarchical Caching Mechanism Study for Content-Centric Network
XIA Lei, WANG Lei, ZHANG Cheng-chen, LV Wei,
2016, 33(2):22-26.
Abstract FullText HTML PDF
A Multi-Layer Hadoop Platform
LI Zhao-xing, MA Zi-tang,
2016, 33(2):27-30.
Abstract FullText HTML PDF
A Linearization Method for 4T-APS Pixel Circuit in CMOS Image Sensor
WEN Chao, HAN Ben-guang, WANG Xi-hu, GUO Zhong-jie,
2016, 33(2):31-33, 38.
Abstract FullText HTML PDF
A Trusted Access Cloud Security Protocol
CHANG Ya-nan, ZHANG Zhi-yong, HAN Lin-qian,
2016, 33(2):34-38.
Abstract FullText HTML PDF
Research on Fault Tolerance Based on Self-Adaptive Backup Strategy in Cloud Training System
CHEN Zhi-jia, ZHU Yuan-chang, DI Yan-qiang, FENG Shao-chong,
2016, 33(2):39-43.
Abstract FullText HTML PDF
Design of Acquisition Front-end and Σ-ΔADC in Battery Management SoC
YUE Tai, WU Li-ji, ZHANG Xiang-min, TIAN Guang-yu,
2016, 33(2):44-48, 53.
Abstract FullText HTML PDF
An Dual Clustering Algorithm for Data in Wireless Sensor Networks Based on Data-field Model
SHI Mei-hong, ZHAO Hui, JIA Zheng-lei, LEI Yan, ZHANG Xiang-jun,
2016, 33(2):49-53.
Abstract FullText HTML PDF
Research on Fuzzy Neural Network Modeling Method Based on PSO Clustering Algorithm
WANG Liang-jun, LI Guo-ning, LIU Yu-jia,
2016, 33(2):54-57, 63.
Abstract FullText HTML PDF
An Improved DV-HOP Algorithm Based on RSSI and Fuzzy Evaluation
YANG Xiang, LIU Mei-feng, DENG Deng-teng,
2016, 33(2):59-63.
Abstract FullText HTML PDF
Segmented Filtering Circuit for SET Pulse in Flash-based FPGAs
SHI Fang-xian, ZENG Li, WANG Miao, CAO Jian-xun, QUAN Miao-jing,
2016, 33(2):64-68.
Abstract FullText HTML PDF
The Boot Method for the Application Program of TI5416
ZHANG Mei-juan, SHI Qiao-lin, YU Guang-yao, LI Xiao-lei,
2016, 33(2):69-72.
Abstract FullText HTML PDF
Network Traffic Chaotic Forecasting Based on Jointly Solving Forecasting Parameters of Model
ZHANG Zhi-hua, PAN Wei-sheng,
2016, 33(2):73-77, 83.
Abstract FullText HTML PDF
GPU-Based Hybrid Algorithm of All-pairs Shortest Paths
LI Yin, DENG Yang-dong,
2016, 33(2):78-83.
Abstract FullText HTML PDF
Simulation of Fault Data Recognition Method in Underwater Ship Communication Network
PENG Hui,
2016, 33(2):84-87.
Abstract FullText HTML PDF
Huge Amounts of Data Under the Interference of Dangerous Web Data Mining Technology Research
WANG Shu-xia, XIONG Zeng-gang,
2016, 33(2):88-92.
Abstract FullText HTML PDF
Motion State Recognition Method Based on 3d Dynamic Characteristics Research
LIU Ling-xia, SONG Qiang,
2016, 33(2):93-96, 101.
Abstract FullText HTML PDF
Incomplete Data Filling Mining Algorithm Based on the Improved Genetic Algorithm
ZHENG Bin,
2016, 33(2):98-101.
Abstract FullText HTML PDF
The Path Optimization Method on Underwater Robots Getting Rid of Obstales
ZHAI Yan, GUO Xiao-bo,
2016, 33(2):102-105.
Abstract FullText HTML PDF
Database Access Query Optimization Design Based on the Analysis of the Semantic Directivity
MA Xiao-jun, LIU Ling-xia,
2016, 33(2):106-110.
Abstract FullText HTML PDF
Research on the Calculation Method of Network Data Invasion Route Map
HE Xiao-li, SONG Yu,
2016, 33(2):111-114.
Abstract FullText HTML PDF
Under the Optimal Channel Selection of Network Load Balancing Technology Research
LIU Yuan-chao, ZHENG Jin-fang,
2016, 33(2):115-117.
Abstract FullText HTML PDF
Invade Estimation Research Based on Network Attack Graph Mode
WANG Ji-gang,
2016, 33(2):118-121.
Abstract FullText HTML PDF
Image Monitoring Method Research Based on the Internet of Things Crowded Areas Tourism Trampling Risk
ZHU Wen-zhong, JIANG Hua-long, ZHOU Shu-wen,
2016, 33(2):122-126.
Abstract FullText HTML PDF
A Data Reduction Algorithm Based on K-L Feature Compression for Cloud Computing
NIE Jun,
2016, 33(2):127-131.
Abstract FullText HTML PDF
Design of Remote Control System Based on PLC in the Internet of Things
ZHANG Yan, LI Wu-song, ZAHNG Jing-sha, HAN Dan,
2016, 33(2):132-136.
Abstract FullText HTML PDF
Trust Evaluation Control Algorithm Based on Differential Evolution
REN Xue-lian,
2016, 33(2):137-141.
Abstract FullText HTML PDF
Rapid Data Location Model Simulation of Abnomal Database of Large Network
ZHU Bao-feng, SU Xiao-ling,
2016, 33(2):142-145.
Abstract FullText HTML PDF
Risk Analysis of the Information System by Using Factor Analysis and Support Vector Machine
WU Liu-yang,
2016, 33(2):146-150.
Abstract FullText HTML PDF