Advanced Materials Research
Vol. 769
Vol. 769
Advanced Materials Research
Vol. 768
Vol. 768
Advanced Materials Research
Vols. 765-767
Vols. 765-767
Advanced Materials Research
Vol. 764
Vol. 764
Advanced Materials Research
Vol. 763
Vol. 763
Advanced Materials Research
Vols. 760-762
Vols. 760-762
Advanced Materials Research
Vols. 756-759
Vols. 756-759
Advanced Materials Research
Vols. 753-755
Vols. 753-755
Advanced Materials Research
Vols. 750-752
Vols. 750-752
Advanced Materials Research
Vol. 749
Vol. 749
Advanced Materials Research
Vol. 748
Vol. 748
Advanced Materials Research
Vol. 747
Vol. 747
Advanced Materials Research
Vol. 746
Vol. 746
Advanced Materials Research Vols. 756-759
Paper Title Page
Abstract: This paper proposed a new structural overlay model HChord. This model employs layered structure, and when constructing the network logical topology of peer nodes, it can detect rock-bottom physical network logical topology fast and efficiently and make it suitable to the rock-bottom network environment, and make the former be consistent to the latter as much as possible and then improve the whole performance of the systems. The goal is to construct a topology-aware overlay network, and improve the finding speed of information, and reduce unnecessary data transmission in networks.
1916
Abstract: There are problems like high operation and maintenance cost, equipment costly, resources redundant construction and information difficult to share in the college computer rooms. It is proposed to introduce the most advanced Cloud Computing Technology to the construction of the college computer room cloud platform based on private Cloud Computing Model can solve these problems effectively.
1921
Abstract: Propose a digital watermark algorithm that can be resisted geometric attack, in order to enhance the capacity to resist attacks such as rotation, use the 0° angle Randon transformation as the reference vector, estimate and correct the rotation transformation of the carrier image, recover the watermark synchronization. when watermark is embedded, perform wavelet transform on original image and blocked the LF sub-band, perform the Ridgelet transformation on each block; change two-value watermark to one-dimension, embedded the watermark bit into the Maximum energy direction of Ridgelet. The simulation results show that the algorithm can effective resist various attacks such as noise, filtering, compression, rotation, shearing and scaling etc, and the ability of resist various attacks is robust.
1925
Abstract: With the increase in the number of online payment, online payment system, the problems exposed, and with the use of the promotion and hacking technology development, the key technology of the online payment system proposed higherrequirements. One of the most important core key technical issues is the security issue.
1930
Abstract: This thesis adopts B/S-based three layers of structural model, takes JSP technology as Web development platform, database MySQL as the basis. The modular design of using lightweight J2EE framework Struts+Spring+Hibernate for solution is adopted to achieve Management Information System for Departments of Colleges and Universities. The system solves the problem of manual teaching information management, heavy workload, low efficiency, poor security and so on, so as to improve the efficiency and level of management.
1933
Abstract: Aiming at the shortcomings of hand gestures segmentation based on fixed threshold and the problem of the interference of background color, this paper proposes a research on hand gestures segmentation based on skin color detection. The captured image is translated to YCgCr color space from RGB color space, and then skin color segmentation is done by using dynamic threshold method, so the hand gestures segmentation is completed. Finally segmentation results are verified by experiments and the method is summarized.
1938
Abstract: With the development of Mobile Internet, more and more people read news through Native App on their mobile equipment. The shortage of Native App news client is that it cant assemble news from different sources. This paper presented mobile application named TopNews, which is built based on Yahoo Pipes. It combines top news from several popular news websites. Building with HTML5 and jQuery mobile, it is no longer necessary for user to install any Native App in order to read news.
1943
Abstract: In order to adopt mobile terminal in realtime browing and query informationon tourist attractions better. The paper proposed a method of using Mobile GIS technology, which achieves realtime browsing and querying of tourist attractions. Taking Tibet Potala Palace for example, the querying indicates that: the mobile terminal can meet the realtime demanding for browsing digital map on mobile phone, it can realize functions such as display, positioning, find the target, achieving zoom the map. The technology changes the traditional service mechanism based location, realizes interaction without limitation of time and space, and provides convenient for peoples self-help travel, which can query attractions information fast, accurately and in real-time.
1948
Abstract: The Internet has changed the computing world in a drastic way from the advent of the Internet in 1990. The concepts of distributed computing, parallel computing, grid computing and cloud computing have been proposed successively. Although cloud computing is generally recognized as a technology which will has a significant impact on IT in the future. But cloud computing is still in its infancy. In this paper we will discuss the architecture and the key technologies of the cloud computing.
1953
Abstract: A non-uniform distribution of virtual machine resources in the cloud environment,in order to solve the Virtual Machine (VM) resources in the use of a large number of idle or bottleneck problem,this paper analyzes several load balancing algorithm,and presents a non-hashs dynamic feedback load balancing algorithm.Experimental results show that the algorithm can achieve good load balancing effect.
1957