Advanced Materials Research
Vols. 805-806
Vols. 805-806
Advanced Materials Research
Vol. 804
Vol. 804
Advanced Materials Research
Vol. 803
Vol. 803
Advanced Materials Research
Vol. 802
Vol. 802
Advanced Materials Research
Vol. 801
Vol. 801
Advanced Materials Research
Vol. 800
Vol. 800
Advanced Materials Research
Vols. 798-799
Vols. 798-799
Advanced Materials Research
Vol. 797
Vol. 797
Advanced Materials Research
Vol. 796
Vol. 796
Advanced Materials Research
Vol. 795
Vol. 795
Advanced Materials Research
Vol. 794
Vol. 794
Advanced Materials Research
Vols. 791-793
Vols. 791-793
Advanced Materials Research
Vol. 790
Vol. 790
Advanced Materials Research Vols. 798-799
Paper Title Page
Abstract: The popularity of 3D content is on the rise since it provides an immersive experience to viewers. In this paper, we present a new approach to watermarking 3D models based on optimization statistics. Through choosing the vertexes, we are able to obtain to the embedded watermark that has the least modified to topology transform of the 3D geometry model, and then project the watermark to the space that has the least mean square error value. So, we obtain that the robustness of the approach lies in hiding a watermark in the space that is least susceptible to the 3D model potential modification. Through analysis and constraint the conditions, we can obtain a high detection probability, a low false alarm probability. The robustness of our method is demonstrated by various attacks through computer simulation.
708
Abstract: Time delay phenomenon of nonlinear system is the objective phenomenon exists in nature. Because the control inputs also contain time delays, the presence of the time delay makes the system current input and time delay input exist coupling. The derivative of the performance index function can not be directly derived display expressions of optimal control. Using the adaptive dynamic programming (ADP) iterative algorithm to solve time delay equation, and the convergence proof is given. The optimal control law of the system can be obtained by the performance index function approximate solution.
712
Abstract: Regarding the teaching of the course Computer Network, this article analyzes the MAC frame format and the structure of ARP message, designs a virtual machine test environment, and tries to structure the concept of ARP Messages in the virtual network environment which can be realized into practical methods. This method is conducive to the learning of the theories of the structure of ARP messages, providing a new way of thinking to explore from theories to the practice of the computer network courses.
716
Abstract: Study the basic theory and process of chaos particle swarm optimization (PSO) algorithm, improve the basic PSO algorithm by introducing the self-adaptive inertia weighting factor method. Construct the mathematical model of basic logistics scheduling to complete the simulation analysis experiments. Experiment results show that self-adaptive chaos particle swarm optimization algorithm is effective and feasible to solve the logistics scheduling model problem.
720
Abstract: Insulator pollution flashover can bring about great damage to electric power system. At present, experimental results evaluation system is needed by all practicable and efficient methods for insulator state inspection, such as leakage current method, pulse current method, UV detection, and visible light analysis method. This thesis focused on the evaluation theory and implementation method of fuzzy mathematical method to insulator state inspection results. In addition, it introduced several basic methods, as well as the definition and rules of fuzzy mathematical method, and then proved the possibility of realizing this evaluation system.
728
Abstract: Transparency and robustness are two conflicting requirements demanded by digital image watermarking for copyright protection and many other purposes. In this paper, a robust and transparent watermarking scheme for color images is proposed. The color features for the human visual system are utilized to design the color watermarking algorithm. The basic idea is to embed the invisible watermark into the color image by brightness adjustment and feature component choice. And through analysis and constraint the conditions, we can obtain a high detection probability and security, a low false alarm probability. In the same time, because we use different matrix operation to embed (secret key) and extract (public key) a watermark, we are able to release all information for the public, except the secret key. Our method can extract the embedded watermark without reference image. The robustness of our method is demonstrated by various attacks through computer simulation.
733
Abstract: Sparse representation is a new image representation theory. It can accurately represent the image information. In this paper, a novel fusion scheme using sparse representation is proposed. The sparse representation is conducted on overlapping patches. Each source image is divided into patches, and all the patches are transformed into vectors. Decompose the vectors into theirs sparse representations using orthogonal matching pursuit. Sparse coefficients are fused with the maximum absolute. The simulation results show that the proposed method can provide high-quality images.
737
Abstract: With the continuous improvement of society and science technology, information technique and network technology obtains great development and widely applied in various fields. The teaching resource library has been one of the most important parts of education networking and informationization development. This article will under the B/S mode architecture to design the teaching resources library of engineering chemistry through resource library and other advanced information technologies. Moreover, this article will operate the digital processing and classification for the current mass and excellent teaching resources. The above details can help us to realize the maximum sharing and usage of the teaching resources library then achieves service functions such as communication between teachers and students.
741
Abstract: This project aimed to make a research on code lock containing algorithm and dynamic random code based on the existing intelligent lock. This code lock can control the door lock through software program, which was to draw random digit into MD5 program of single chip microcomputer, allow the same data being processed by MD5 encryption program to present different results, such that, the encryption program can keep dynamics, so the MD5 encryption program being amended by pseudo-random number existed separately in key and lock, then this program would be the identity card for key to open the door and only the program of key was identical with that of the lock can the door open, which largely improved the safety.
745
Abstract: Information transmission in the network is more and more accepted due to the fast and convenient of the network access. The MVC (Model-View-Controller) could be a very good solution to solve the problems as separating between user interface logic and business logic that developers found. We describe and explore ASP (Active Server Pages), PHP (Hypertext Preprocessor) and robustness analysis method, and we implement MVC architecture in ASP.Net framework and PHP framework respectively. With the comparison between ASP.Net framework and PHP framework, in this study, our findings show that PHP framework is more difficult than ASP.Net framework to implement MVC architecture, and the ASP.Net framework is better than PHP framework under the same environment.
749