Zobrazeno 1 - 10
of 81
pro vyhledávání: '"Pei Jun Ma"'
Autor:
Xue-Feng Zheng, Guan-Jun Chen, Xiao-Hu Wang, Ying-Zhe Wang, Chong Wang, Wei Mao, Yang Lu, Bin Hou, Min-Han Mi, Ling Lv, Yan-Rong Cao, Qing Zhu, Gang Guo, Pei-Jun Ma, Xiao-Hua Ma, Yue Hao
Publikováno v:
AIP Advances, Vol 10, Iss 6, Pp 065111-065111-5 (2020)
The effect of 3 MeV proton irradiation on interface traps under a Schottky contact in an AlGaN/GaN heterostructure has been investigated in this work. Utilizing the frequency-dependent conductance technique, the detailed information about interface t
Externí odkaz:
https://doaj.org/article/ed243482bb06497e8689afeb8cbfcdb2
Publikováno v:
IEEE Transactions on Circuits and Systems II: Express Briefs. 68:2152-2156
To counteract logic-testing methods and trust verification methods for hardware Trojan (HT) detection, two HT design strategies based on high-low probability and partitioned combinational logic with a malicious reset signal are proposed. Using these
Publikováno v:
Biomedicine & Pharmacotherapy. 155:113810
The human gut microbiota is a complex ecosystem involved in the metabolism, immunity, and health of the host. The microbiome plays a key role in the development of the host's innate and adaptive immune system, while the immune system orchestrates the
Publikováno v:
IEICE Electronics Express. 17:20200297-20200297
Publikováno v:
Journal of Signal Processing Systems. 81:227-247
The Arithmetic encoder (AE) is a throughput bottleneck of the entire JPEG2000 encoding system. But its sequential nature leads to a difficulty to improve its throughput. To overcome this bottleneck, a high-throughput AE capable of encoding one symbol
Publikováno v:
Microelectronics Journal. 45:1103-1117
This paper proposes a novel Shared-Resource routing scheme, SRNoC, that not only enhances network transmission performance, but also provides a high efficient load-balance solution for NoC design. The proposed SRNoC scheme expands the NoC design spac
Publikováno v:
Advanced Materials Research. :1782-1785
Instruction traces are essential for dynamic analysis in reverse engineering. Code in instruction traces is often obfuscated to hinder analysts from understanding and analyzing in malware and binaries that protected by packers. Non-returning calls an
Publikováno v:
Applied Mechanics and Materials. 577:1022-1025
Path-based fault-localization technique is proved to be more effective than coverage-based fault localization because of analyzing the semantics of a program. Most previous work focused on investigating coverage-based test-suite reduction approach fo
Publikováno v:
Applied Mechanics and Materials. 577:917-920
The pointer alias is indispensable for program analysis. Comparing to point-to set, it’s more efficient to formulate the alias as the context free language (CFL) reachability problem. However, the precision is limited to flow-insensitivity. To solv
Publikováno v:
Applied Mechanics and Materials. :6102-6105
Software testing run through the entire software development cycle, which consumes more than 50% of the development and maintenance effort. Fault localization is the most difficult and time-consuming task in software testing. Aimed at locating faults