The AES 35th internationalconference, Audio for Games was the first computer game-oriented conference organized by the Audio Engineering Society on 11-19 February, 2009, at London, UK. The keynote speech of the confe...
详细信息
The AES 35th internationalconference, Audio for Games was the first computer game-oriented conference organized by the Audio Engineering Society on 11-19 February, 2009, at London, UK. The keynote speech of the conference was delivered by Steve Root of Codemasters, which was focused on the development of game audio by involving different people from different backgrounds. He said that musicians, academics, students, industry research and development, middleware vendors, audio programmers, and audio designers need to work together for better sound development. The conference covered various topics related to audio for games and audio for linear media like television and film. A paper presented on the introduction of sound design for games focusing on non-music audio. A paper on the creative use of game audio technology for music composition was also presented.
Our research is to develop a system of effectively visualizing large scale geographically related data sets and demonstrate to the industry the advantages of integrating topographic, geological, geophysical and mine p...
详细信息
Along with uninterrupted progress of computer network technology, the application of Internet is increasingly abroad. Due to the variety of Internet environment, the corresponding software systems are more complex, an...
详细信息
ISBN:
(纸本)9781424439294
Along with uninterrupted progress of computer network technology, the application of Internet is increasingly abroad. Due to the variety of Internet environment, the corresponding software systems are more complex, and present many new characteristics. The development of complex software systems has not applied the development mode of object-oriented and component-oriented Therefore people bring forward Agent-oriented software engineering (AOSE) and software development methodology based on self-adaptive multi-Agent systems. AOSE adopts the software engineering mechanism and method, including high level abstract, natural modeling, system organization and problem decompounding, etc. It can manage and control the complexity of software system, and is a kind of novel software development pattern. The paper discusses the self-adaptive mechanism of self-adaptive multi-Agent systems, the software development process of self-adaptive multi-Agent systems, the modeling method of self-adaptive Agent modeling language and Agent UML. Taking "internationalconference Management System" as a case, and describes the development process of self-adaptive multi-Agent systems.
Robot software components, which can be accessed through their interface, are reusable and replaceable software modules used in composing robotic services. Using robot software components in developing a robot, develo...
详细信息
ISBN:
(纸本)9781424452446
Robot software components, which can be accessed through their interface, are reusable and replaceable software modules used in composing robotic services. Using robot software components in developing a robot, developers can expect shortening of developing times, reduction of maintenance cost and improvement of program reusability, because interoperability among components is guaranteed. We have developed a component framework assisting robot developers to make robot application with ease. The component framework consists of a specification of component model, a component authoring tool, a component composer, and a component container. In this paper, we will not only show the developed component framework, but also demonstrate its usability by applying to commercial robots.
The Multi-purpose BCI Output Device (MBOD), emulates a USB keyboard and/or mouse, as well as producing switch closures, thus allowing BCI2000 to output to various assistive technology (AT) devices. The MBOD should all...
详细信息
ISBN:
(纸本)9781424420728
The Multi-purpose BCI Output Device (MBOD), emulates a USB keyboard and/or mouse, as well as producing switch closures, thus allowing BCI2000 to output to various assistive technology (AT) devices. The MBOD should allow researchers easy access to the many advantages of commercial AT in addition to providing continuity of service for patients. The system's keyboard interface was tested in three environments (one dedicated AT device, one computer program, and within BCI2000 itselo. All subjects were able to type in all three environments with comparable accuracy.
Active database systems integrate event-based rule processing with traditional database functionality. The model most widely used to represent event-based rules is the event-condition-action rule (ECA rule) model. How...
详细信息
Active database systems integrate event-based rule processing with traditional database functionality. The model most widely used to represent event-based rules is the event-condition-action rule (ECA rule) model. However, the relationships among rules in the development of a base of ECA rules can fall in an infinite rule triggering: the No termination problem. In this article, an approach based in Petri net theory is proposed. This approach detects cyclic paths in the base of ECA rules. Furthermore, it can analyze the relationships among ECA rule components.
Security challenges of application software that are about 70 percent of monthly discovered vulnerability of this kind are one of the most important concerns of managers. In this article, after the introduction of bri...
详细信息
Network-in-the-loop is the direction that the military training simulation is advancing forward. Dynamic networking modeling is the key issue for constructing the network-in-the-loop training simulation. For this purp...
详细信息
Network-in-the-loop is the direction that the military training simulation is advancing forward. Dynamic networking modeling is the key issue for constructing the network-in-the-loop training simulation. For this purpose, the fundamental architecture for the network-in-the-loop training simulation was analyzed and presented. Several features of dynamic networking modeling were researched. Based on a general view of the network, a set of networking models suitable for the network-in-the-loop training simulation were constructed, including the aggregated vehicle node model and latent link model. Now, these models are working well in a certain training simulation.
The aim of this paper is to introduce the application of an S-shaped transition curve in designing and generating a spur gear. In engineering field, the spur gear usually designed by using an involute curve where this...
详细信息
The aim of this paper is to introduce the application of an S-shaped transition curve in designing and generating a spur gear. In engineering field, the spur gear usually designed by using an involute curve where this curve needs to use a tracing point method to obtain a curve while an S-shaped curve can obtain a curve directly. The comparative study between an S-shaped method and direct method in computer aided design (CAD) tool also covered.
In order to describe traffic operation characteristics of bi-directional pedestrian flow in urban pedestrian walkways and work for walking safe, authors proposed an improved cellular automaton bi-directional pedestria...
详细信息
ISBN:
(纸本)9780769535838
In order to describe traffic operation characteristics of bi-directional pedestrian flow in urban pedestrian walkways and work for walking safe, authors proposed an improved cellular automaton bi-directional pedestrian flow model. This model takes into account many basic pedestrian behaviors, forward move, side stepping, position exchange, lateral-move and step back, and, using MOORE Neighborhood method, provides rules of pedestrian movement combining with the characteristics of walking process, for instance, intelligent, flexible and complicated. With computer simulation, authors studied the influence of position exchange and lateral-move on the model, the parameters of bi-directional pedestrian flow such as velocity and volume were discussed also. The results demonstrated that position exchange and lateral-move make the pedestrian behavior more comprehensive;the model could be better applied to simulate the high-density bi-directional pedestrian flow and provided reasonable traffic operation parameters of bi-directional pedestrian flow.
暂无评论