Applied Mechanics and Materials
Vol. 611
Vol. 611
Applied Mechanics and Materials
Vol. 610
Vol. 610
Applied Mechanics and Materials
Vols. 608-609
Vols. 608-609
Applied Mechanics and Materials
Vol. 607
Vol. 607
Applied Mechanics and Materials
Vol. 606
Vol. 606
Applied Mechanics and Materials
Vols. 602-605
Vols. 602-605
Applied Mechanics and Materials
Vols. 599-601
Vols. 599-601
Applied Mechanics and Materials
Vol. 598
Vol. 598
Applied Mechanics and Materials
Vol. 597
Vol. 597
Applied Mechanics and Materials
Vol. 596
Vol. 596
Applied Mechanics and Materials
Vol. 595
Vol. 595
Applied Mechanics and Materials
Vols. 592-594
Vols. 592-594
Applied Mechanics and Materials
Vol. 591
Vol. 591
Applied Mechanics and Materials Vols. 599-601
Paper Title Page
Abstract: In order to guarantee the programs play correctly and protect the digital video copyright, this paper gets a method on high-definition video (HD video) online recognition with strong robustness through analyzing the TV monitoring system requirements and video characters, based on the DCT algorithm. This method will embed the watermark after obtaining the embedding positions by analyzing video frames. It can improve the robustness to compression, noise and filtering by using Arnold scramble and spread spectrum technology. It is a real-time measure to extract watermark and recognize it in HD videos. This method shows of good performance to online recognition in HD video’s watermark extracting and recognizing in theoretical analysis and simulation experiment.
1535
Abstract: To localize and identify the noise sources of the AUV, the cylindrical NAH method was proposed. The feasibility was verified by the acoustic field simulation, the influence of the array test distance, holographic planar array position errors and the reconstruction phase errors on the accuracy of the sound field reconstruction was analyzed, which would provide some references for the engineering applications.
1539
Abstract: Super-resolution is useful for weak-target image reconstruction. The technique, however, is not yet suitable for underwater imaging implementation due to the complexity of underwater environment. In this paper, an image processing and sparse super-resolution is proposed to make it more suitable for underwater images. In this paper, image processing and image super-resolution are combined. It firstly used histogram equalization to increase local gray value and extent the gray value range to mate the details of the image texture range more distinct. By this we can raise the attention of the human eyes; then use Canny edge enhancement operator to make the edge of the image more clear; finally, by combining classical underwater point spread function (PSF) and the semi image blind restoration method, the image quality are further improved. The experimental results showed that the image recovered by this method had shaper edge and clearer textures.
1544
Abstract: This paper describes the algorithm principle of CRC-32 codes, and then proposes multiple bits parallel input to achieve CRC-32 checksum on the basis of the principle. To design modules using VHDL language in Quartus II environment based on Altera’s EP4SGX230KF40C2 chip. Compared to traditional method of serial and 8 bits parallel data input, implementation of the program integrates 16, 32 and 64 bits parallel data input modes, the user can select the appropriate modules according to their needs and environmental constraints, which will greatly enhance the ability to adapt to the system and meet the needs of a variety of environments.
1548
Abstract: The k anonymity was one of the first algorithms applied for privacy protection in location-based service(LBS).The k anonymity exhibits its disadvantages gradually, such as being easily attacked by continuous queries attacking algorithm, the larger k value for higher security level lead to more pointless cost of bandwidth and load of LBS server. This article analyzes the causes of the problems, and proposes a new idea based on clustering algorithm to improve the k anonymity algorithm.
1553
Abstract: With the issuance of 3G licenses, China enters into the 3G era formally. In the condition of 3G technology, designing effective mobile learning mode can improve learning efficiency and make learners really benefit from the convenience brought by mobile learning. The paper introduces several modes which 3G technology can be applied into mobile learning, and problems existing in the process of developing mobile learning mode based on 3G network.
1558
Abstract: To guarantee the protocol implementation is correct, protocol testing is essential. Formal specification provides a middle method for protocol testing, which can support verification and testing protocol semi-automatically or automatically. RRC is an important protocol in WCDMA system. So the paper describe RRC protocol process as a formal model based CPN modeling method, then analysis and verify the model with CPN Tools to ensure it is correct.
1562
Abstract: In this paper, an effective motion comparison method based on segmented multi-joint line graphs combined with the SIFT feature matching method is proposed. Firstly, the multi-joint 3D motion data are captured using the Kinect. Secondly, 3D motion data are normalized and distortion data are removed. Therefore, a 2D line graph can be obtained. Next, SIFT features of the 2D motion line graph are extracted. Finally, the line graphs are divided into several regions and then the comparison results can be calculated based on SIFT matching ratios between the tutor’s local line graph and the trainee’s local line graph. The experimental results show that the proposed method not only can easily deal with the several challenge problems in motion analysis, e.g., the problem of different rhythm of motions, the problem of a large amount of data, but also can provide detailed error correction cues.
1566
Abstract: Human action recognition in videos plays an important role in the field of computer vision and image understanding. A novel method of multi-channel bag of visual words and multiple kernel learning is proposed in this paper. The videos are described by multi-channel bag of visual words, and a multiple kernel learning classifier is used for action classification, in which each kernel function of the classifier corresponds to a video channel in order to avoid the noise interference from other channels. The proposed approach improves the ability in distinguishing easily confused actions. Experiments on KTH show that the presented method achieves remarkable performance on the average recognition rate, and obtains comparable recognition rate with state-of-the-art methods.
1571
Abstract: With teaching and research of campus reliance on information technology is growing; the campus information technology development is also increasingly rapidly. Information system of campus should adapt to the campus’s long-term development plan, considering the economic conditions of campus to meet the needs of teaching and research as the fundamental starting point. Network system is the support platform of information technology. The selection of equipments is an important part of network system planning, including routers, switches, servers and other network security products, and so on. This paper described the three-layer design system. Each layer has different requirements for routers and switches. Based on the classification and the performance analysis of main network devices, this paper presented the principles and programs of the campus network construction in the purchase of network equipment should be followed.
1575