Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wenyong Wang is active.

Publication


Featured researches published by Wenyong Wang.


international conference on computer science and network technology | 2013

Study on algorithm for fireworks simulation based on particle system

Shi Lei; Wenyong Wang

This paper is based on the theory of particle system, researching the basic model and principle of setting off fireworks, based on the basis original model, we add some new constraints, such as wind-force, temperature, buoyancy force, at last the model of fireworks is realized. The simulation of fireworks is distinctly and real-time at last.


international conference on computer science and network technology | 2015

The status quo and realization of Waterfall simulation based on particle system

Lei Shi; Wenyong Wang

This paper is aiming at the application of Virtual realization technology, based on the theory of particle system, introducing the basic principle of the particle system and the whole process of the motion about the particles of water in the Waterfall, and the process is accompanied by dying and producing continuously with movement of particles. In this paper, we also introduce some techniques such as collision detection to improve the simulation. Finally an example is given to realize the waterfall simulation.


international conference on computer science and network technology | 2016

The status of fireworks simulation based on particle system

Lei Shi; Wenyong Wang; Jinghui Wang

This paper introduces the basic theory based on particle system and expounds the basic principle, definition, model and existing problems of firework particle system. At the same time, in order to achieve more realistic simulation results, this paper mainly introduces the factors that affect the display effect and the exercise effect of the fireworks, such as the effects of constraint conditions, brightness, temperature and wind power. On the basis of this, the flow chart of the fireworks particles is given, and the simulation of the effect of fireworks is finally realized.


international conference on computer science and network technology | 2016

Water pouring effect simulation based on SPH

Shicao Li; Wenyong Wang

Realistic fluid simulation plays an important role in interactive applications. In this paper, the Lagrangian particle-based approach is used to simulate the motion state of water pouring based on smoothed particle hydrodynamics (SPH). In order to make the particle system more in line with the physical principles, the kernel functions and field quantity equations are reasonably chosen to approximate the reality of the behavior of fluids. The interaction between particles and the interaction between particles and solid surface are implemented, and the realistic scenario can be well simulated. Then the particle system is optimized for real time simulation. The experiments show that the fluid simulation effect of our SPH-based approach is more real and has more details than Müllers.


international conference on computer science and network technology | 2016

Body-structure-based cartoon character modeling from multi-view hand-drawings

Yingze Liu; Wenyong Wang

Hand-drawn cartoon has the characteristics of flexibility, natural expression and so on. We present a multi-viewpoint hand-drawn character modeling method based on the human body structure, which is used to express the cartoon character model of hand-drawn style. Firstly, the two-dimensional skeleton is extracted, the skeleton depth is acquired and the three-dimensional skeleton is generated by the human body structure model. Then, combined with the expansion algorithm and the surface optimization and subdivision algorithm, the local networks matched with the multi-view hand-drawn contour lines are created and combined into the whole network model. Finally, the skeleton subspace deformation is established by using the thermal diffusion algorithm. Thereby a three-dimensional character model is generated. The experimental results show that this method can effectively generate cartoon character model with hand-drawn style.


international conference on computer science and network technology | 2015

A novel age interval identification method based on Gait monitoring

Chang Yang; Wenyong Wang

With the development of society, Gait recognition, as an emerging biometric identification technology, has been paid more and more attention for its unique advantages of non-aggression, uniqueness, remote identification, easy to collect, and difficult to fake and hide. In this article, the gait and the recognition of the age range are combined together. A method of extracting gait features based on the information of lower limb joint angles is presented to identify the age interval. Due to occlusion caused by human walking, according to cycle of movement gait, generating feature is vectored by Fourier series and genetic algorithm. The occlusion has been solved to some degree.


international conference on computer science and network technology | 2015

Compiling the program for the elemental analyzer of cement raw material by C

Xin Li; Jian-xiong Lv; Lu Wang; Dao-wen Cheng; Man-lin Chen; Wenyong Wang

In the elemental analyzer based on neutron induced prompt gamma-ray analysis, the master program is compiled by C#. It can not only compute the elemental contents of Si, Al, Fe and Ca, but also can control the hardware of the analyzer, such as BGO gamma ray detector, Multi-channel pulse analyzer, neutron detector, and D-D neutron generator. The results indicate that the equipment failure rate caused by the master program is almost zero which can meet the requirement of cement plants.


international conference on computer science and network technology | 2015

Natural constant computed by excel according to human method

Xin Li; Dao-wen Cheng; Jian-xiong Lv; Lu Wang; Man-lin Chen; Wenyong Wang

In order to compute the natural constant, three calculation methods were designed by Excel. The result can be accurate to 9 or 13 digits after the decimal point which is computed by limit or series. But the one computed by Excel according to human method can be accurate to more than 50,000 digits after the decimal point.


international conference on computer science and network technology | 2013

Contrast and study on binary AprioriAll sequence mining algorithm of IOT massive information processing

Jia Ji; Wenyong Wang; Wang Yan; Zhao Tong

This paper introduced the concept and the Technical architecture system of IOT, Analysis the current development of IOT and the relative shortage of relying on technology influences the development of IOT, studied on the technology of data mining applications with IOT massive information processing, improved the original AprioriAll sequence mining algorithm, created a new Binary AprioriAll sequence mining algorithm. The improved algorithm improves the efficiency of the algorithm by reducing the number of sequences in the database.


international conference on computer science and network technology | 2012

Study on algorithm for water spraying simulation base on Particle System

Shi Lei; Wang Yan; Wenyong Wang; Ai Ting

This paper is based on Principles of Physics and the theory of Particle System in order to study the movement of water-spraying-particles, we set some parameters, such as position, lifecycle, speed, number of particles, shape, gravity, then we create the physical model. At the same time, new particles of water are produced and old are dead, after that we create the model of motion. We uses collision-testing in order to simulate the real effect. The model of water-spraying is realized on the computer at last.

Collaboration


Dive into the Wenyong Wang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lu Wang

Changchun University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xin Li

Changchun University

View shared research outputs
Top Co-Authors

Avatar

Chang Yang

Northeast Normal University

View shared research outputs
Top Co-Authors

Avatar

Jia Ji

Northeast Normal University

View shared research outputs
Top Co-Authors

Avatar

Shicao Li

Northeast Normal University

View shared research outputs
Top Co-Authors

Avatar

Yingze Liu

Northeast Normal University

View shared research outputs
Top Co-Authors

Avatar

Zhao Tong

Changchun University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge