Applied Mechanics and Materials
Vols. 190-191
Vols. 190-191
Applied Mechanics and Materials
Vol. 189
Vol. 189
Applied Mechanics and Materials
Vol. 188
Vol. 188
Applied Mechanics and Materials
Vol. 187
Vol. 187
Applied Mechanics and Materials
Vol. 186
Vol. 186
Applied Mechanics and Materials
Vols. 184-185
Vols. 184-185
Applied Mechanics and Materials
Vols. 182-183
Vols. 182-183
Applied Mechanics and Materials
Vols. 178-181
Vols. 178-181
Applied Mechanics and Materials
Vols. 174-177
Vols. 174-177
Applied Mechanics and Materials
Vols. 170-173
Vols. 170-173
Applied Mechanics and Materials
Vols. 166-169
Vols. 166-169
Applied Mechanics and Materials
Vol. 165
Vol. 165
Applied Mechanics and Materials
Vol. 164
Vol. 164
Applied Mechanics and Materials Vols. 182-183
Paper Title Page
Abstract: The paper proposes a fast method that uses the lips color information in the Lab color space and the pre-knowledge of geometric characteristics around lip areas to extract the lip contour and visual speech features from color images or video sequences with front talking faces. In our method, the Adaboost algorithm is utilized to realize the face detection. Then, the mouth area is segmented based on the face shape attribution. According to the relative position of the trough and crest of the histogram, we can get an adaptive threshold. The A-component in the Lab color space was used to extract the outer lip and the L-component is used to extract the inner lip. From the contour image, we obtain the feature by searching twice the points of the contour. The experimental results show that obtained visual feature values in our approach are approximate to that with AAM algorithm but with less computation complexity.
2040
Abstract: WMN is the abbreviations of Wireless mesh networks. Along with the evolution of WMN, there appears single-radio mode WMN ,dual-radio mode WMN ,multi-radio mode WMN and their mixed mode WMN. Single-radio mode WMN network has the lowest capacity and the lowest cost, dual-radio and multi-radio mode WMN are better than single-radio mode WMN, multi-radio mode WMN has the largest bandwidth and flexibility, and has obtained the large-scale application.
2045
Abstract: In order to decrease the flight delays caused by the airspace congestion, and ensure the flight safety, airspace congestion prediction technology based on evidence theory is researched and the airspace congestion prediction steps are given. An example is carried out. The result indicates that prediction technology is feasible.
2050
Abstract: Ant Colony Optimization is an intelligent optimization algorithm from the observations of ant colonies foraging behavior. However, ACO usually cost more searching time and get into early stagnation during convergence Process. We design the improved ant colony algorithm using perturbation method to avoid early stagnation, adjusting volatilization coefficient to increase the exploration of tours at first phase and searching speed at second phase, using hortation method to improved searching efficiency. We apply the improved algorithm on traveling salesman problem showing that the improved algorithm finds the best values more quickly and more stability than Max-Min Ant System algorithm.
2055
Abstract: Trusted Computing technique can be applied to alleviate the concerns for the security of virtual machines (VMs), accompanying the increase in the use of virtualization technology. This paper aims to provide for guest para-virtualized machine (GPVM) applications a complete trusted chain from the physical TPM in a flexible way. We propose a robust and fast method for measuring the integrity of the system booting files of a GPVM. This method integrated with the existing integrity measure software such as Trusted Grub and Integrity Measurement Architecture (IMA) can provide the complete trusted chain. Compared to the existing method of measuring the GPVM integrity, our method is very flexible and fast.
2059
Abstract: This paper puts forward a suitable channel estimation scheme for multiple input multiple output and orthogonal frequency division multiplexing system (MIMO-OFDM) based on discrete wavelet transform. According to the least-squares standard (LS), this plan uses pilot to estimate the unit impulse response of MIMO channel firstly, then does wavelet denoising in changing domain, in order to reduce the frequency spectrum leakage and improve the estimation precision. At the same time, this method does not need to know channel information in advance, and can follow up the changes of channel on time with good error rate performance.
2066
Abstract: This paper proposed a mathematical model called Multi-objective Production System Design (MOPSD) model solved by Ant Colony Optimization (ACO). The MOPSD model placed a production system under the constrained factory space to achieve the minimal total material transportation flow cost. This paper discussed 2-phase pheromone layout procedure that we proposed how to transform the best design information into and the relationship and tracing technology. After modeling experiment we proved it can be put the best design information into 2-phase pheromone layout procedure and achieved the minimal total material transportation flow cost by simply tracing technology.
2071
Abstract: This paper proposes a three-party authenticated key exchange protocol using two-factor including a password and a token. The proposed protocol allows two users to establish a session key through a trusted server with whom they both share a human-memorable password and a token. Over the past years, many three-party authenticated key exchange protocols have been proposed. However, many proposed protocols use smart cards with tamper-resistance property as tokens. It is not practical by using smart cards because of the high cost and the infrastructure requirements. Therefore, the proposed paper only uses a common storage device such as a USB memory stick. We believe the proposed protocol is suitable for practical scenarios.
2075
Abstract: Auto white balance (AWB) is an important function of digital camera. The purpose of white balance is to adjust the image to make it look like taken under standard light conditions. We present a new technique to detect the reference white point of image in this paper. This technique detects the white point of image by using dynamic threshold method, thus making it more flexible and more applicable compared to other algorithms. We test 50 images which were taken under different light sources, and find that this algorithm is better than or comparable to other algorithms both in subjective and objective aspects. At the same time, this algorithm has low complexity, and it can be easily applied to hardware implementation.
2080
Abstract: In the internet age, the high efficiency and high profit activities must incorporate with the internet. Web Application (Web App) is an important IT product in the internet age. However, the network intrusions and security vulnerabilities have continued to threaten the operation of Web App. Penetration Testing (PT) is a critical step to identify security vulnerabilities. However, PT can not provide specific and effective follow-up work. For this, combining corrective maintenance with Web App repair operation will be discussed in this paper. And based on corrective maintenance, proposes a Web App Secure Repair Procedures (WASRP). Applying WASRP, the misjudgment ratio of security vulnerabilities and defects can be reduced. And assist to repair the security vulnerabilities and defects, effectively and concretely enhance the Web App security.
2085