No abstract available.
Study on the Virtual Natural Landscape Walkthrough by Using Unity 3D
This paper describes the use of this 3D virtual reality engine of making natural landscape walkthrough. It explains the methods of making the sky, topography, trees and flowers, water of nature common things in Unity 3D, and expound Unity 3D software ...
Landscape Image Composition Analysis Based on Image Processing and Curve Fitting
The composition of the landscape image can convey the emotion of cameramen. Proposed in this article is one novel technique for landscape image composition analysis, which could lay the foundation for the further analysis of image emotion. This method ...
Design and Simulation of an Optimum Service Selection Arithmetic in Pervasive Computing
After analyzing the essence of service selection, an optimum service selection genetic algorithm with multi-objective constraints is proposed. The algorithm includes a matrix-coding scheme of chromosomes that expresses the relationship between service ...
A Security Framework for Internet of Things Based on SM2 Cipher Algorithm
This thesis puts forward a security framework for internet of things based on SM2 cipher algorithm agreement. In TLS1.1 handshake agreement, SM2 and IBC authentication modes, key exchange mode have been employed; DH key negotiation manner will be ...
Characterization of Synonymous Codon Usage Bias in the UL19 Gene of Duck Plague Virus (DPV)
The codon usage bias of DPV UL19 gene and 25 reference herpesviruses have been analyzed in this study. This work was performed by program CodonW 1.4, and CUSP and CHIPS of EMBOSS. The results indicated that codons of DPV UL19 gene were strong bias ...
Research on WAP Browsing Mobile Learning Mode Based on 3G Technology
Mobile learning is a new stage of distance education, and is the product of the stage in which wireless mobile communication device and wireless mobile communication network technology are developed to be mature. Its main characteristic is the 4A"Anyone ...
Simulation of Airborne Radar Real Beam Ground Map Based on Digital Terrain
In order to resolve the problem of loading mass terrain data in airborne radar real beam ground map (RBGM), multi-resolution terrain database and data loading tactic is designed, which meets the demand of terrain resolution in different range and ...
Denoise Investigation on Prestack Reverse time Migration Based on GPU/CPU Collaborative Parallel Accelerating Computation
Based on two-way wave equation, prestack reverse time migration (RTM) overcomes dip limitation, and can image complicated geological body with high precision. However, since the massy storage, large amount of computation, low frequency noise, the ...
Research for the Morphological Awareness of Different Subtypes of Chinese Dyslexia Children
To explore the characteristics of morphological awareness in different subtypes of Chinese dyslexia children.[Methods] The one cognitive test was used to compare the characteristics of morphological awareness of different subtypes of Chinese dyslexia ...
A New Ionic Pair Potential for Evaluation the Thermal Properties of Uranium Dioxide by Molecular Dynamics
Inter-atomic potential parameters of uranium dioxide, for a new partially ionic model (PIM), were found out by fitting method using experimental lattice parameter data in an improvised way. Thermodynamics properties of solid uranium dioxide that have ...
Fiber Optic Gyroscope Output Signal Processing Based on Multiwavelet Denoising
The effect is limited that in single-wavelet noise reduction. A new multiwavelet denoising method is available to inhibit the noise interference in the gyroscope output signals of an inertial navigation system. It will be an important Breakthrough that ...
Surface-Related Multiples Prediction Based on Wave Equation
Multiples prediction and adaptive subtraction are two important aspects for surface-related multiples suppression method based on wave-equation. In this paper, only the prediction part is discussed. GPU (graphic processing unit) with parallel ...
Long Core Simulation of Advanced CO2 Injection in Ultra-Low Permeability Reservoir
CO2 flooding is a promising enhanced oil recovery method both on technical and environmental bases, especially for ultra-low permeability reservoir, because this reservoir is characterized by low porosity, ultra-low permeability, low deliverability, ...
Research On Embedded Streaming Media Real-Time Transmission Synchronization Control Strategy
For the real-time transmission of stream media, a novel synchronization control strategy is proposed in this paper. The strategy includes the layer-based flow control algorithm and the delay jitter compensating algorithm. In order to avoid the network ...
Network Intrusion Classification Based on Probabilistic Neural Network
In order to improve the performance of network intrusion classification, the probabilistic neural network is applied to the field of intrusion detection. Analyzing the theory of probabilistic neural network, a kind of network intrusion classification ...
JPEG Image Encryption by Shuffling DCT Coefficients in Defined Block
This paper proposes the Coefficients Shuffling in Defined Block (CSDB) JPEG image encryption algorithm, which encrypts the quantized DCT coefficients. CSDB algorithm mainly decomposes the DC coefficients and shuffles the decomposed DC coefficients and ...
Data Adapter Technology Based on Multi-Agent Applied to Secure Access Platform
Due to the lack of an effective integrated information platform, there are the heterogeneous problems of electric information systems in secure access platform. This paper presents a multi-agent-based data adapter technology, and designs an adapter ...
Stinfinitesimal Simulation Method on Baking Sheet
The main purpose of this paper is to solve the heat distribution on the pan and find a better pan type by optimizing the weighted average of heat distribution and pan number. For the heat distribution problem, we first work out and solve a differential ...
Research on the Formalization of AADL Model
In the embedded system modeling field, the AADL has gradually become the industry standard because of the characteristics of modeling hardware/software collaborative. Based on the AADL formal characteristics, many domestic and foreign scholars launched ...
Using Seasonal Time Series Analysis to Predict China's Demand of Electricity
Time series analysis is to explain correlation and the main features of the data in chronological order by using appropriate statistical models. Since the past electricity generated sequence in China shows a strong seasonal variations and several values ...
Research on the Electronic Signature System with Credible Fusion Verification and its Application
Aiming at the deficiencies in the traditional electronic signature system and biological information characteristics randomizing signature system, we propose an electronic signature system with credible fusion verification, which was equipped with not ...
Design and Implementation of a Graphics Display System Based on RTOS
With the development of the embedded application demand, embedded real-time operating system (RTOS) for its outstanding performance in real-time, stability, reliability, and are widely used in the field of high-tech, such as communications, military ...
Face Recognition Based on Fusion of 2DLDA and Points of Interest
The application of face recognition, two-dimensional linear discriminant analysis ( 2DLDA ) method has good classification results. Density of the interest point detection is based on weighted calculation on the image. The characteristics of the target ...
A Novel Method to Save and Reuse Virtual Computing Environment
The VM (Virtual Machine) incremental image is not fit for saving virtual computing environment because it may cause crazy disk space increase of virtual machines. This paper analyzes the process of constructing user-specific virtual computing ...
Index Terms
- Proceedings of the 2013 International Conference on Computational and Information Sciences