Applied Mechanics and Materials
Vol. 470
Vol. 470
Applied Mechanics and Materials
Vol. 469
Vol. 469
Applied Mechanics and Materials
Vol. 468
Vol. 468
Applied Mechanics and Materials
Vol. 467
Vol. 467
Applied Mechanics and Materials
Vols. 465-466
Vols. 465-466
Applied Mechanics and Materials
Vol. 464
Vol. 464
Applied Mechanics and Materials
Vols. 462-463
Vols. 462-463
Applied Mechanics and Materials
Vol. 461
Vol. 461
Applied Mechanics and Materials
Vol. 460
Vol. 460
Applied Mechanics and Materials
Vol. 459
Vol. 459
Applied Mechanics and Materials
Vols. 457-458
Vols. 457-458
Applied Mechanics and Materials
Vol. 456
Vol. 456
Applied Mechanics and Materials
Vol. 455
Vol. 455
Applied Mechanics and Materials Vols. 462-463
Paper Title Page
Abstract: The HEVC standard is mainly for high-definition and ultra-high-definition video images. The compression performance of HEVC has been further improved, but at the same time coding complexity is also higher than the existing standard. This paper firstly analyzed the architecture of HEVC decoding process and its mainly algorithm components. Then this paper designed how to use the Android NDK to transplant the HM decoding library, and then take the java native interface to resolve the HEVC stream. After decoding the data, this paper converts the YUV data into RGB format for display. The experiment results show that the design scheme is feasible and the HEVC player achieves the basic functions in the Android platform.
1127
Abstract: First the entire host audio is decomposed by wavelet to several frequency bands, then Select an frequency band which is insensitivity to the human ear hearing and its corresponding wavelet coefficients to hide information. Those coefficients are separated to some segments, and at the same time convert those segments to DCT domain. The watermark can be embedded to the DCT direct current coefficients. Experimental results show that the watermarked audio has good imperceptibility. By contrast with other algorithms in DCT domain, this algorithm has better robust performance, which is robust against different kinds of attacks, such as noise, low-pass filtering, resampling, echo, Mp3 compression.The robustness and the imperceptibility about watermarked audio reach a good balance.
1131
Abstract: The traditional classroom teaching has lots of disadvantages, implement of network-aided teaching brings new hope to the development of special education. By comparing and analyzing the three forms of network-aided teaching for deaf students in colleges, a new approach of improving classroom teaching quality is explored according to their own characteristics.
1136
Abstract: The run-time infrastructure (RTI) is a kind of software that is developed by the interface specification of high level architecture (HLA), which can offer a universal and comparatively independent service for simulation applications in the HLA simulation system. The RTI is the key underpinning software for the HLA simulation system. The quality of the RTI software is very important, and it will directly affect the system running. In order to guarantee the quality of the RTI software, it should be tested and evaluated roundly. The test and evaluation involve the functional and the performance aspects. The former can certify the RTI software correctness, and the latter can check the efficiency for the RTI software. Three editions of RTI software will be tested and evaluated in this paper. Both the function and the performance are tested, and the performance aspect is emphasized. The results show that the three editions of RTI software not only can meet software performance requirements, but can be used in generic real time simulation. Moreover, on the aspect of performance, the KD-RTI has some virtues, such as fast data-exchange velocity, low data loss and low latency.
1140
Abstract: Trust problem is a key issue for Mobile P2P (MP2P) network security. In MP2P network, terminals addressing mode, communication way and display identifier are different to traditional P2P network. Some security issues such as: malicious slander and collusion, free ride phenomenon, are even more serious compared to traditional P2P network. Aimed at these above issues, a Proxy-based Security-Feedback Trust Model (PSTM) is proposed. Different types of terminals access to different proxy servers to shield the discrepancy between different terminal equipments on MP2P equipment access network layer. Meanwhile, proxy servers can reduce the problem of single point failure with method of trust related tables backup and recovery. Certificate Feedback Raters identification and qualification through security resource-selection protocol then integrate trust information according to similarity of terminal and resource types with weight. Furthermore, set global contribution value and evaluation value in multi-granularity trust computation to motivate mobile peers honest feedbacks. Divide mobile peers direct trust value into peer-oriented and resource-oriented values to make trust feedbacks more authentic. Simulation experiments show that PSTM can reduce malicious slander and collusion effectively. It also can restrain self-ish peers free ride behaviors and increase successful cooperation rate of high-contributed nodes in MP2P network.
1144
Abstract: On the basis of introducing the development of WebRTC technology and the application type of traditional video communication, this paper proposed a new video communication system based on WebRTC and discussed the frame designing and working process in detail. This system can overcome the shortcomings of complicated deployment, cockamamie operations for users, protocol without openness or standard, etc. It does have a better user experience.
1152
Abstract: Cross-language plagiarism detection identifies and extracts plagiarized text in a multilingual environment. In recent years, there has been a significant amount of work done involving English and European text. However, somewhat less attention has been paid to Asia languages. We compared a number of different strategies for Chinese-English bilingual plagiarism detection. We present methods for candidate document retrieval and compare four methods: (i) document keywords based, (ii) intrinsic plagiarism based, (iii) headers based, and (iv) machine translation queries. The results of our evaluation indicated that keywords based queries, the simplest and most efficient approach, gives acceptable results for newspaper articles. We also compared different percentage of keywords based query, and the results indicated that putting 50% keywords into queries can obtain the satisfied candidate documents set.
1158
Abstract: E-Learning facilitats enterprise human resource management. Therefore enterprises must attach importance to build their own E - Learning platform in such information society. This paper first analyzes the meaning of enterprise digital learning. Then fusion and trends of digital learning and knowledge management is discussed from the perspective of theory level. Key problems are discussed towards the construction of digital learning system for the enterprise. Including the basic components and building process of digital learning system of the enterprise. The design process of digital curriculum system for PetroChina Changqing oilfield company have been collected and analyzed. The Result Show That E - Learning system can improve the level of corporate profits, lean enterprise management and improve the market strain capacity of the enterprise.
1163
Abstract: Currently, the campus card technology has docked with most departments of school, but all campus card payments are contact-based consumptions, in order to adapt to the future development, the solution is proposed that the SET protocol improved was applied to the campus card.
1168