column
Algorithm of Affinity Propagation Clustering Based on Density Similarity Measurement
CHANG Rui-hua,
2015, 32(5):1-5. DOI:10.19304/j.cnki.issn1000-7180.2015.05.001
Abstract PDF
Research of Storage Outsourcing Security Access Based on ORAM
LI Hong-wei, SHANGGUAN Jing-lun, GU Chun-sheng,
2015, 32(5):6-10,15. DOI:10.19304/j.cnki.issn1000-7180.2015.05.002
Abstract PDF
Acoustic-Ranging-Based Indoor Peer-Assisted Localization
ZHU Rong, BAI Guang-wei, SHEN Hang, CAO Lei, JI Zheng-bo,
2015, 32(5):11-15. DOI:10.19304/j.cnki.issn1000-7180.2015.05.003
Abstract PDF
Design and Implementation of SM4 Block Cipher Based on Composite Field
LIANG Hao, WU Li-ji, ZHANG Xiang-min,
2015, 32(5):16-20. DOI:10.19304/j.cnki.issn1000-7180.2015.05.004
Abstract PDF
Research on Sub-pixel Coordinates Extraction of Image Corner
XIA Shu-lan, SUN Ming-ze, ZHANG Wei-yu, ZHAO Li,
2015, 32(5):21-24,30. DOI:10.19304/j.cnki.issn1000-7180.2015.05.005
Abstract PDF
The Mechanism and Implementation of Sampling Rapid Serial Signal in SerDes Technique
HU Feng-Lin, LIU Zong-lin, CHEN Hai-yan, CHEN Ji-hua,
2015, 32(5):25-30. DOI:10.19304/j.cnki.issn1000-7180.2015.05.006
Abstract PDF
Task Scheduling Algorithm Based on Load Balancing Ant Colony Optimization in Cloud Computing
ZHANG Huan-qing, ZHANG Xue-ping, WANG Hai-tao, LIU Yan-han,
2015, 32(5):31-35,40. DOI:10.19304/j.cnki.issn1000-7180.2015.05.007
Abstract PDF
Efficient Implementation for Digital Part of 24 Bit Audio Sigma-Delta DAC with Low Power
LIANG Shuai, WEI Bao-yue, LIU Yu, ZHANG Hai-ying,
2015, 32(5):36-40. DOI:10.19304/j.cnki.issn1000-7180.2015.05.008
Abstract PDF
Design and Performance Analysis of a Three-Operand Leading-one Prediction Algorithm Based on FPGA
LUO Shu-zhen, FU Kun, GAO Yan, SUN Hao-sai, GENG Yue-hua,
2015, 32(5):41-45,50. DOI:10.19304/j.cnki.issn1000-7180.2015.05.009
Abstract PDF
An Active Protection Approach for the Intellectual Property of Network-on-Chip
JI Wen-qing, LIU Qiang, CHEN Qi,
2015, 32(5):46-50. DOI:10.19304/j.cnki.issn1000-7180.2015.05.010
Abstract PDF
Key Frame Extraction of Road Monitoring Video Based on Inter-Frame Correlation
LAN Zhang-li, SHUAI Dan, LI Yi-cai,
2015, 32(5):51-54. DOI:10.19304/j.cnki.issn1000-7180.2015.05.011
Abstract PDF
The WSN Damaged Nodes Detection Algorithm Based on the Level of Residual Energy
WANG Yan, YANG Xiao-wei, MU Hao-nan,
2015, 32(5):55-58,62. DOI:10.19304/j.cnki.issn1000-7180.2015.05.012
Abstract PDF
Underwater Sensor Networks Routing Strategy Based on the Improved Ant Colony Optimization Algorithm
TAO Qiang, HUANG You-rui, LING Liu-yi, QU Li-guo, YANG Zai-fu,
2015, 32(5):59-62. DOI:10.19304/j.cnki.issn1000-7180.2015.05.013
Abstract PDF
Research on the Repair Technology of Embedded Memory
YANG Bin, WANG Xiao-li, LI Dong,
2015, 32(5):63-67. DOI:10.19304/j.cnki.issn1000-7180.2015.05.014
Abstract PDF
A Hardened SRAM Cell-DDICE and Peripheral Circuits Design
ZHOU Heng, LI Lei,
2015, 32(5):68-72. DOI:10.19304/j.cnki.issn1000-7180.2015.05.015
Abstract PDF
A Probabilistic Neural Network Classification Algorithm Based on PLS
CHEN Gang, YANG Zhi-qiang, LIU Bing-quan,
2015, 32(5):73-78,83. DOI:10.19304/j.cnki.issn1000-7180.2015.05.016
Abstract PDF
An Improved MIC Corner Detection Algorithmbased on Adaptive Threshold
SUN Liang, WANG Shuang-qing, XING Jian-chun,
2015, 32(5):79-83. DOI:10.19304/j.cnki.issn1000-7180.2015.05.017
Abstract PDF
Minimal Path and Token Based Routing Algorithm for 3D NoC
ZHOU Wen-qiang, ZHANG Jin-yi, ZHOU Duo, LIU Jiang,
2015, 32(5):84-90. DOI:10.19304/j.cnki.issn1000-7180.2015.05.018
Abstract PDF
Design of Intra Communication Module for the Pipelined Task Scheme in the Cluster-based Stream Processor
HANG Yun, XIE Jing, MAO Zhi-gang,
2015, 32(5):91-94. DOI:10.19304/j.cnki.issn1000-7180.2015.05.019
Abstract PDF
An Approach to Process XML Twig Query Based on Semantics
HE Zhi-xue, LIAO Hu-sheng,
2015, 32(5):95-98,103. DOI:10.19304/j.cnki.issn1000-7180.2015.05.020
Abstract PDF
An Improved Scheme of Scalar Multiplication Based on Comb Method for Ellipse Curve Cryptography
TIAN Yi, LIU Ai-jun, SHEN Wei-chang,
2015, 32(5):99-103. DOI:10.19304/j.cnki.issn1000-7180.2015.05.021
Abstract PDF
A Clustering Approach Based on Cuckoo Search Algorithm
YE Zhi-wei, YIN Yu-jie, WANG Ming-wei, ZHAO Wei,
2015, 32(5):104-110. DOI:10.19304/j.cnki.issn1000-7180.2015.05.022
Abstract PDF
Adaptive Hybrid Bacterial Foraging Optimization Algorithm Based on Cloud Theory
CHENG Xiang, LIU Sheng,
2015, 32(5):111-116,121. DOI:10.19304/j.cnki.issn1000-7180.2015.05.023
Abstract PDF
A Parallel Immune Genetic Algorithm for Multimodal Function Optimization Problem
CHENG Lin-hui, ZHONG Luo,
2015, 32(5):117-121. DOI:10.19304/j.cnki.issn1000-7180.2015.05.024
Abstract PDF
Routing Protocol of Wireless Sensor Networks Based on Link-tree Topology Structure
SHEN Ji-nan, LIANG Fang,
2015, 32(5):122-125,129. DOI:10.19304/j.cnki.issn1000-7180.2015.05.025
Abstract PDF
Strong Motion Railway Communication Signal Environment Accurately Collect Research and Simulation Method
DOU Xiao-lei, WANG Jia-xin,
2015, 32(5):126-129. DOI:10.19304/j.cnki.issn1000-7180.2015.05.026
Abstract PDF
Single Event Transient Propagation and Soft Error Rate Analysis for Combinational Logic
JIN Li-na, LIAO Jia-xuan, ZHOU Wan-ting, LI Lei,
2015, 32(5):130-133. DOI:10.19304/j.cnki.issn1000-7180.2015.05.027
Abstract PDF
Error Control of Serial Data High Speed One Way Transmission
WU Yuan-liang, XU Yong, MA Li-mei, DING Wei,
2015, 32(5):134-137,142. DOI:10.19304/j.cnki.issn1000-7180.2015.05.028
Abstract PDF
Research of Image Denoising Algorithm Based on Non-local Priori Constraints
LEI Yun,
2015, 32(5):138-142. DOI:10.19304/j.cnki.issn1000-7180.2015.05.029
Abstract PDF
Bad Data Detection Method for Large High Visual Multimedia Network
ZHANG Jie,
2015, 32(5):143-146. DOI:10.19304/j.cnki.issn1000-7180.2015.05.030
Abstract PDF
Clustering Algrothrim of WSN Based on Binary Particle Swarm Optimization
CAO Yu-xiao, LI Yan-bing, XU Meng-xi, PENG Huan-feng,
2015, 32(5):147-151. DOI:10.19304/j.cnki.issn1000-7180.2015.05.031
Abstract PDF
A Novel Method for RDP Acceleration Based on Dual Gateway
REN Zhi, LIU Dong-yuan, LIU Wen-hui, DENG Ke,
2015, 32(5):152-156. DOI:10.19304/j.cnki.issn1000-7180.2015.05.032
Abstract PDF
Non-rigid image Reconstruction of 3 d Motion Simulation Optimization Model
WU Yue, WENG Xiao-lan,
2015, 32(5):157-160. DOI:10.19304/j.cnki.issn1000-7180.2015.05.033
Abstract PDF
Hide Large Size Files Based on Flash Memory's Bad Block Table
LI Kai, MA Hang-fei, ZHANG Mei-jing,
2015, 32(5):161-164. DOI:10.19304/j.cnki.issn1000-7180.2015.05.034
Abstract PDF