Advanced Materials Research Vols. 926-930

Paper Title Page

Abstract: This paper proposes an information hiding method based on word text, according to the theory of the human eye cones for the color sensitivity; the human eye is least sensitive to blue. I change the lowest two bits of G component in the carrier text character RGB color value, change the lowest two bits of R component in the carrier text character RGB color value, and change the lowest four bits of B component in the carrier text character RGB color value, So that each carrier text character can hide 8 bits binary information. RGB color value of character underline can hide 24 bits information; the combination of these two methods can hide 32 bits binary information. After testing, the results show that the algorithm hiding rate is high, the algorithm is stable and easy to implement, has a certain application value.
2815
Abstract: Network security and identity authentication is confirmed the true identity whether the user and the claimed identity is consistent or not, in order to prevent the illegal user access the system for resources by identity fraud. The one-time password authentication technology with high safety, convenient for using, easy for management and lower cost is applied widely and has bright prospection. The one-time password authentication technology support to add uncertain factors in the login process, so that the login authentication informations are not the same each time. It is useful to improve the security of the login process. In this paper, a new system which is based on the the one-time password authentication technology called biometric system is first introduced. Then the framework of multi-biometric system is presented, and several examples are also shown. The prospect about multi-biometric fusion is also given.
2819
Abstract: With the rapid development of the domestic curtain industry and higher pursue that people have about the architectural aesthetics, curtain wall has developed into a good direction of multiple component and complicated modelling little by little. Especially for the hyperboloidal modelling, it has increased engineered difficulty. For solving many problems in the engineering construction, we have introduced BIM technology to make the complicated problems simplify. This paper took an example of a certain center curtain case in Shanghai to introduce the application of complicated curtain execution stage with BIM technology.
2823
Abstract: Computer software is an information product [2]. Since the rising of the computer software industry during the 1960’s, the dispute into the best way to protect computer software has never stopped. Human society has already entered the information age, the development of the computer software industry is happening more rapidly than ever before. The application of using legal means to effectively protect computer software, is not only crucial to the development of the computer software industry, but also for national science and technology, the development of the economy is of great significance. This paper summarizes the present situation of international protection of computer software, based on the analysis of the quality of copyright law, patent law, and trade secret law to protect computer software and the analysis of the protected mode all over the world, put forward the author’s suggestions for the legal protection model.
2827
Abstract: An intelligent public transportation system is developed in this article depending upon the technology of computer, wireless communications and electronics. The system involves the buses operation and serve the bus information for the passengers.
2832
Abstract: Web design is the new art design combined the art and technology, and Chinese ink painting is a traditional drawing with long history. With the rapid progress of globalization, web design complies with the western design principles with simple and standard designing styles. However, the wonderful works should both meet the world’s design trends and inherit national culture. Integrated the traditional ink-and-wash features, the paper has analyzed the applicable ways of ink-and-wash with fine web design works and discussed how to create a good web design works in national and modern way.
2836
Abstract: This paper proposes a method of buzzwords extraction for micro-blogs using buzzwords word-formation features and event correlation. This method includes four important steps. The first step finds out all the candidate words from micro-blog topics by using repeated string searching algorithm. The second step filters the candidate words based on the repeat string properties and language model. The third step extracts the candidate buzzwords through the constraint of words role relationship and special structure model. The last step is to filter the buzzwords according to the words event correlation. The experiments show that the method is accurately and efficiently to extract buzzwords.
2840
Abstract: Aiming at the problems existing NC machining, combining with the existing advanced manufacturing mode, and cloud computing, application integration, new technologies such as service-oriented technology, based on cloud resources in manufacturing, manufacturing services in the cloud, the relationship between manufacturing cloud are expounded. On this basis, the design of the NC machining of cloud services management prototype system function structure, based on whole life cycle of application integration operation of the cloud service portfolio requirements are expounded, and the implementation is based on application integration and cloud service platform of CNC processing key technology are studied, for the future to realize efficient intelligent cloud manufacturing services management to provide theoretical support.
2845
Abstract: with the rapid development of computer and network, computer graphic design is widely used in various industries, and the demand graphic design skills in computer is higher and higher, particularly important in the quickly design and skilled operation of the computer software. This paper introduces the use of three professional software such as Photoshop, CorelDraw, Illustrator and their respective advantages and disadvantages, providing a more in-depth understanding of the designers, effectively shortening the learning time, having strong realistic meaning and reference value.
2849
Abstract: The Simulation technology of OTV based on HLA was researched in this essay. Based on the technology, a distributed visual simulation system is established on the basis of HLA and STK, in which the space orbit transferring vehicle can fly around the low-orbit target, while hovering under the high-orbit target. The real time interactive simulation among the members that are located in different physical nodes of the system is implemented via their cooperation, and the scope of using the visual simulation is expanded as well.
2853

Showing 661 to 670 of 1117 Paper Titles