Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2548816guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
ICCIS '13: Proceedings of the 2013 International Conference on Computational and Information Sciences
2013 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
June 21 - 23, 2013
ISBN:
978-0-7695-5004-6
Published:
21 June 2013

Reflects downloads up to 17 Jan 2025Bibliometrics
Abstract

No abstract available.

Article
Article
Article
Article
Article
Preface
Article
Reviewers
Article
Study on the Virtual Natural Landscape Walkthrough by Using Unity 3D

This paper describes the use of this 3D virtual reality engine of making natural landscape walkthrough. It explains the methods of making the sky, topography, trees and flowers, water of nature common things in Unity 3D, and expound Unity 3D software ...

Article
Landscape Image Composition Analysis Based on Image Processing and Curve Fitting

The composition of the landscape image can convey the emotion of cameramen. Proposed in this article is one novel technique for landscape image composition analysis, which could lay the foundation for the further analysis of image emotion. This method ...

Article
Design and Simulation of an Optimum Service Selection Arithmetic in Pervasive Computing

After analyzing the essence of service selection, an optimum service selection genetic algorithm with multi-objective constraints is proposed. The algorithm includes a matrix-coding scheme of chromosomes that expresses the relationship between service ...

Article
A Security Framework for Internet of Things Based on SM2 Cipher Algorithm

This thesis puts forward a security framework for internet of things based on SM2 cipher algorithm agreement. In TLS1.1 handshake agreement, SM2 and IBC authentication modes, key exchange mode have been employed; DH key negotiation manner will be ...

Article
Characterization of Synonymous Codon Usage Bias in the UL19 Gene of Duck Plague Virus (DPV)

The codon usage bias of DPV UL19 gene and 25 reference herpesviruses have been analyzed in this study. This work was performed by program CodonW 1.4, and CUSP and CHIPS of EMBOSS. The results indicated that codons of DPV UL19 gene were strong bias ...

Article
Research on WAP Browsing Mobile Learning Mode Based on 3G Technology

Mobile learning is a new stage of distance education, and is the product of the stage in which wireless mobile communication device and wireless mobile communication network technology are developed to be mature. Its main characteristic is the 4A"Anyone ...

Article
Simulation of Airborne Radar Real Beam Ground Map Based on Digital Terrain

In order to resolve the problem of loading mass terrain data in airborne radar real beam ground map (RBGM), multi-resolution terrain database and data loading tactic is designed, which meets the demand of terrain resolution in different range and ...

Article
Denoise Investigation on Prestack Reverse time Migration Based on GPU/CPU Collaborative Parallel Accelerating Computation

Based on two-way wave equation, prestack reverse time migration (RTM) overcomes dip limitation, and can image complicated geological body with high precision. However, since the massy storage, large amount of computation, low frequency noise, the ...

Article
Research for the Morphological Awareness of Different Subtypes of Chinese Dyslexia Children

To explore the characteristics of morphological awareness in different subtypes of Chinese dyslexia children.[Methods] The one cognitive test was used to compare the characteristics of morphological awareness of different subtypes of Chinese dyslexia ...

Article
A New Ionic Pair Potential for Evaluation the Thermal Properties of Uranium Dioxide by Molecular Dynamics

Inter-atomic potential parameters of uranium dioxide, for a new partially ionic model (PIM), were found out by fitting method using experimental lattice parameter data in an improvised way. Thermodynamics properties of solid uranium dioxide that have ...

Article
Fiber Optic Gyroscope Output Signal Processing Based on Multiwavelet Denoising

The effect is limited that in single-wavelet noise reduction. A new multiwavelet denoising method is available to inhibit the noise interference in the gyroscope output signals of an inertial navigation system. It will be an important Breakthrough that ...

Article
Surface-Related Multiples Prediction Based on Wave Equation

Multiples prediction and adaptive subtraction are two important aspects for surface-related multiples suppression method based on wave-equation. In this paper, only the prediction part is discussed. GPU (graphic processing unit) with parallel ...

Article
Long Core Simulation of Advanced CO2 Injection in Ultra-Low Permeability Reservoir

CO2 flooding is a promising enhanced oil recovery method both on technical and environmental bases, especially for ultra-low permeability reservoir, because this reservoir is characterized by low porosity, ultra-low permeability, low deliverability, ...

Article
Research On Embedded Streaming Media Real-Time Transmission Synchronization Control Strategy

For the real-time transmission of stream media, a novel synchronization control strategy is proposed in this paper. The strategy includes the layer-based flow control algorithm and the delay jitter compensating algorithm. In order to avoid the network ...

Article
Network Intrusion Classification Based on Probabilistic Neural Network

In order to improve the performance of network intrusion classification, the probabilistic neural network is applied to the field of intrusion detection. Analyzing the theory of probabilistic neural network, a kind of network intrusion classification ...

Article
JPEG Image Encryption by Shuffling DCT Coefficients in Defined Block

This paper proposes the Coefficients Shuffling in Defined Block (CSDB) JPEG image encryption algorithm, which encrypts the quantized DCT coefficients. CSDB algorithm mainly decomposes the DC coefficients and shuffles the decomposed DC coefficients and ...

Article
Data Adapter Technology Based on Multi-Agent Applied to Secure Access Platform

Due to the lack of an effective integrated information platform, there are the heterogeneous problems of electric information systems in secure access platform. This paper presents a multi-agent-based data adapter technology, and designs an adapter ...

Article
Stinfinitesimal Simulation Method on Baking Sheet

The main purpose of this paper is to solve the heat distribution on the pan and find a better pan type by optimizing the weighted average of heat distribution and pan number. For the heat distribution problem, we first work out and solve a differential ...

Article
Research on the Formalization of AADL Model

In the embedded system modeling field, the AADL has gradually become the industry standard because of the characteristics of modeling hardware/software collaborative. Based on the AADL formal characteristics, many domestic and foreign scholars launched ...

Article
Using Seasonal Time Series Analysis to Predict China's Demand of Electricity

Time series analysis is to explain correlation and the main features of the data in chronological order by using appropriate statistical models. Since the past electricity generated sequence in China shows a strong seasonal variations and several values ...

Article
Research on the Electronic Signature System with Credible Fusion Verification and its Application

Aiming at the deficiencies in the traditional electronic signature system and biological information characteristics randomizing signature system, we propose an electronic signature system with credible fusion verification, which was equipped with not ...

Article
Design and Implementation of a Graphics Display System Based on RTOS

With the development of the embedded application demand, embedded real-time operating system (RTOS) for its outstanding performance in real-time, stability, reliability, and are widely used in the field of high-tech, such as communications, military ...

Article
Face Recognition Based on Fusion of 2DLDA and Points of Interest

The application of face recognition, two-dimensional linear discriminant analysis ( 2DLDA ) method has good classification results. Density of the interest point detection is based on weighted calculation on the image. The characteristics of the target ...

Article
A Novel Method to Save and Reuse Virtual Computing Environment

The VM (Virtual Machine) incremental image is not fit for saving virtual computing environment because it may cause crazy disk space increase of virtual machines. This paper analyzes the process of constructing user-specific virtual computing ...

Index Terms

  1. Proceedings of the 2013 International Conference on Computational and Information Sciences
    Index terms have been assigned to the content through auto-classification.

    Recommendations