Advanced Search

column
A Cost-Effective Scheme for Network-on-Chip Router and Interconnect Testing
XIANG Dong
2013, 2(6): 1-7. DOI: 10.12146/j.issn.2095-3135.201312001
Abstract PDF
Clustering Organizational Atmosphere Perception with Quantum Genetic Algorithm
YU Jiayuan
2013, 2(6): 8-10. DOI: 10.12146/j.issn.2095-3135.201312002
Abstract PDF
Research on Design of HEF Power System and Simulation
SUN Jun, HU Yue, XU Hui, LI Weimin
2013, 2(6): 11-17. DOI: 10.12146/j.issn.2095-3135.201312003
Abstract PDF
Analysis and Research of Public-Key Cryptosystems Based on Lattice
BAI Jian, YANG Yatao, LI Zichen
2013, 2(6): 18-21. DOI: 10.12146/j.issn.2095-3135.201312004
Abstract PDF
On Isomorph Judgement of Graph
CHEN Xinquan
2013, 2(6): 22-26. DOI: 10.12146/j.issn.2095-3135.201312005
Abstract PDF
Multimodal Ensemble Classification of Alzheimer’s Disease and Mild Cognitive Impairment
CHENG Bo, ZHONG Jing, XIONG Jiang
2013, 2(6): 27-30. DOI: 10.12146/j.issn.2095-3135.201312006
Abstract PDF
Power Optimization Method Based on DSP Software Fault Tolerance
YAO Tianwen, ZHOU Haifang, FANG Minquan, SHEN Xiaolong
2013, 2(6): 31-35. DOI: 10.12146/j.issn.2095-3135.201312007
Abstract PDF
Study on Local Dynamic Reconfiguration of FPGA
WANG Yijie, WANG Lie, XU Xiaojie
2013, 2(6): 36-40. DOI: 10.12146/j.issn.2095-3135.201312008
Abstract PDF
Research on Education Management System Model Based on Immune Multi-Agent Collaboration
MA Jianhong, GU Baoping
2013, 2(6): 41-45. DOI: 10.12146/j.issn.2095-3135.201312009
Abstract PDF
Extraction of Evaluation Rules of Network Security Based on Rough Set
LIU Xiaoling, XIE Xianbin, ZHANG Jialu, LIU Lingli
2013, 2(6): 46-50. DOI: 10.12146/j.issn.2095-3135.201312010
Abstract PDF
Extraction of Railway Track Edge Based on Top Hat Transform and Otsu Thresholding
LI Mengxin, HOU Dingding, XIA Xinghua, XU Weijing, FAN Jingjing
2013, 2(6): 51-53. DOI: 10.12146/j.issn.2095-3135.201312011
Abstract PDF
Review on Delay Testing of Digital Circuits Considering Delay Variations
LI Huawei
2013, 2(6): 54-64. DOI: 10.12146/j.issn.2095-3135.201312012
Abstract PDF
Review on Deterministic Languages
CHEN Haiming, LU Ping
2013, 2(6): 65-70. DOI: 10.12146/j.issn.2095-3135.201312013
Abstract PDF
Challenges and Opportunities of Building Datacenters for Application’s Quality-of-Service
BAO Yungang
2013, 2(6): 71-81. DOI: 10.12146/j.issn.2095-3135.201312014
Abstract PDF
Short Survey on Design for Fault Tolerance of Computer Systems
YAN Guihai, LI Xiaowei
2013, 2(6): 82-88. DOI: 10.12146/j.issn.2095-3135.201312015
Abstract PDF
A Survey on the Hatpic Interaction Models in Virtual Orthopedic Surgery
WANG Qiong, CHEN Hui, HENG Pheng Ann
2013, 2(6): 89-93. DOI: 10.12146/j.issn.2095-3135.201312016
Abstract PDF
Review on the Technique to Obtain Depth Information Using Kinect and Its Application to Three Dimensional Object Recognition
YIN Panlong, XU Guangzhu, LEI Bangjun, CAO Weihua
2013, 2(6): 94-99. DOI: 10.12146/j.issn.2095-3135.201312017
Abstract PDF
Survival Rate for Critically Ill Patients Will Be Increased from Improved Emergency Ambulance System: A Trend That Ambulance Is Outfitted withPortable Endotracheal Intubation and Ventilator System
ZHONG Nanshan, GU Jia
2013, 2(6): 100-102. DOI: 10.12146/j.issn.2095-3135.201312018
Abstract PDF