Applied Mechanics and Materials
Vol. 248
Vol. 248
Applied Mechanics and Materials
Vols. 246-247
Vols. 246-247
Applied Mechanics and Materials
Vol. 245
Vol. 245
Applied Mechanics and Materials
Vols. 241-244
Vols. 241-244
Applied Mechanics and Materials
Vols. 239-240
Vols. 239-240
Applied Mechanics and Materials
Vol. 238
Vol. 238
Applied Mechanics and Materials
Vols. 236-237
Vols. 236-237
Applied Mechanics and Materials
Vol. 235
Vol. 235
Applied Mechanics and Materials
Vol. 234
Vol. 234
Applied Mechanics and Materials
Vol. 233
Vol. 233
Applied Mechanics and Materials
Vol. 232
Vol. 232
Applied Mechanics and Materials
Vols. 229-231
Vols. 229-231
Applied Mechanics and Materials
Vols. 226-228
Vols. 226-228
Applied Mechanics and Materials Vols. 236-237
Paper Title Page
Abstract: The Massively Multiplayer Online Role-Playing Game (MMORPG) industry is growing rapidly. A MMORPG is composed of many design attributes; therefore, the game developers cannot satisfy all of the design attributes due to the constraint of development resources and the time-to-market pressure of the product. The purpose of this study is to help game developers to make the trade-off decision of where to invest their limited resources to implement critical design attributes. To better understand the relationship between attributes performance and satisfaction, the two-dimensional quality model, Kano model, is applied to identify the key attributes in satisfaction. Results indicated that these design attributes of MMORPGs were classified into different quality categories, including attractive, one-dimensional, must-be and indifferent qualities. By applying the Kano quality classifications, the attractive and important design attributes can be identified. It also can help game designers determine the priority to resolve the trade-offs dilemma in multiple-attribute optimization of satisfaction for MMORPG design.
1095
Abstract: In allusion to the contradiction between salt-and-pepper noise attenuation and image detail-preserving, a maximum-minimum filtering algorithm base on threshold is proposed in this paper. The gray values of the pixels in the filtering windows are given firstly. If the test pixel value is the extreme value of the filtering windows, this pixel is a suspicious noise point. And then sort the absolute value of the difference between the suspicious noise point value and pixels gray value in its neighborhood. Judge the pixel is a real noise point according to the average value of the middle two values in the difference sequence. The original gray value of noise point is determined by the maximum-minimum relationship between the pixel values of the neighborhood. If the pixel is not a noise point, its value is kept. The simulation results show that the proposed algorithm has greatly impact on signal to noise ratio and mean square error which retains more image details while making sure to remove noise.
1101
The Application of 3-Colour Theorem and 4-Colour Theorem in the Problem of Repeaters’ Site Selection
Abstract: In wireless networks, implementing repeaters can improve network capacity and CCTSS systems can be used to mitigate interference. This paper discussed the selection of covering shapes in a given area, and presented an optimum scheme of channel assignment and PL allocation. Meanwhile, the 3-colour theorem and 4-colour theorem in graph theory will be given. At last, we introduce the application of 3-colour theorem and 4-colour theorem in the problem of repeaters’ site selection. By the relevant calculation, we can prove the application is reasonable.
1106
Abstract: Iris segmentation plays an important role in iris recognition system. Most of segmentation methods are affected by reflection spots, eyelash and eyelid etc. The goal of this work is to accurately segment the iris using Probable boundary (Pb) edge detector after horizontal-vertical weighted reflections removal. Experimental results on the challenging iris image database CASIA-Iris-Thousand with reflection spots sample demonstrate that the iris segmentation accuracy of the proposed methods outperforms state-of-the-art methods.
1116
Abstract: Ant colony algorithm is an intelligent optimization algorithm derives heuristically from simulating ants to seek food, the paper firstly creates the VRP model of warehouse material transportation,self-adaptive ant colony algorithm is used for solving the model. This paper gives some measures to improve the Ant colony algorithm in the procedure to seek the solution.At last, the experimental results based on MATLAB show that this algorithm is extremely effective to solve the optimal solutions of VRP. Its application in VRP has achieved good results.
1122
Abstract: RS codingandbyte interleavingin CMMB systemare jointly designed based on segment processing mechanism. The proposed scheme reduces storage space so greatly that byte interleaving can be completed inside a popular FPGA chip instead of a largeexternal memory, leading to lower cost, faster speed and higherreliability.Moreover, contraposeto the segment processing mechanism,this paper gives an optimizedRS encoder, which quickens the coding rate with almostthe same hardware implementation complexity.
1128
Abstract: We present a distributed spectrum sensing and access algorithm applied in opportunistic spectrum access (OSA) networks. It is proposed in the condition of cognitive radio (CR) users’ correct spectrum sensing. In each slot, a CR user will decide whether to sense, which channel to sense, and whether to access. However, due to the hardware and energy constraints, the CR users may not be able to sense or monitor all the channels, so we design this access algorithm derived from the theory of Partially Observable Markov Decision Process (POMDP). To simplify the analysis, we assume that the CR users will sense and access only one channel. Simulation results show that the proposed access algorithm can greatly improve the throughput of CR users than the random access algorithm. It has good access performance, and can quickly achieve stable access throughput as well. It is shown that with greater channel transition probability difference the CR users will obtain higher access throughput, and when the difference equals to zero this access algorithm becomes random access algorithm.
1133
Abstract: Since the presentation of NTRU public-key cryptosystem by Hoffstein, Pipher and Silverman, its favorable properties, such as easily created keys, high speed, excellent performance and conjectured resistance to quantum computers, have made it to be of great use. This paper proposes an enhanced scheme based on the hard learning with error over ring (R-LWE) problem to improve the security of the modified NTRUEncrypt presented by Stehle and Steinfled. We used part of the padding ideas of Fujisaki and Okamoto to obtain this scheme. It is semantically secure in strong sense of indistinguishability against adaptive chosen-ciphertext attacks in the random oracle model assuming the quantum hardness of standard worst-case problem over ideal lattices. It is also possible to arbitrarily decrease the error probability, and even to eliminate it completely. We gave the detailed analysis using the known results from classic works. Furthermore, this scheme owns many advantages such as the uniformity of public key, usual assumptions and the freedom for coding messages.
1139
Abstract: The background of images often obstructs the edge extraction.A new method of edge extraction is proposed in this paper, which combines classic edge extraction algorithms with optimal global threshold and the morphological dilation and restruction. It can accurately extract edges and eliminate fake edges and filter out the background well.
1145
Abstract: This paper presents an assessment system for evaluating artificial test effectiveness on weather modification. Algorithms that we used in the system depend on statistical test and regression analysis theory. Due to functional requirements, the system is mainly divided into two subsystems which are meteorological storage system and statistical evaluation system respectively. We implement it for handling and uploading meteorological data in special database service and making multi-index comprehensive assessment on artificial test effectiveness by rainfall and temperature materials. From the result of system test, the assessment system works efficiently and performances satisfactory fault tolerance.
1152