Results 1 to 10 of about 4,551,358 (284)
Boolean Operation Based Visual Cryptography
A ( $k$ , $n$ )-Traditional Visual Cryptographic Scheme (VCS) based on basis matrices encoded a secret image into $n$ shadow images distributed among $n$ participants.
Zhili Zhou +3 more
doaj +2 more sources
This study is aiming at the problems of slow collision detection speed of bounding box, low efficiency of triangle intersection detection, and triangulation in regions where complex intersecting lines are segmented that exist in Boolean operation of ...
Yaguang Qin +6 more
doaj +2 more sources
Secret Image Sharing Scheme Based on a Boolean Operation
Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction
Nag Amitava +3 more
doaj +2 more sources
Memristive Stateful Logic for Edge Boolean Computers
Memristive stateful logic enables complete in‐memory computing, allowing low‐power and low‐cost Boolean computing. Its characteristics are consistent with the requirements of edge computing devices, which will occupy a considerable segment in the coming ...
Young Seok Kim +2 more
doaj +2 more sources
The Sheffer stroke operation reducts of basic algebras
In this study, a term operation Sheffer stroke is presented in a given basic algebra 𝒜 and the properties of the Sheffer stroke reduct of 𝒜 are examined. In addition, we qualify such Sheffer stroke basic algebras.
Oner Tahsin, Senturk Ibrahim
doaj +2 more sources
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [PDF]
Secret sharing schemes are ideally suited to save highly sensitive information in distributed systems. On the other hand, Zigzag-Decodable (ZD) codes are employed in wireless distributed platforms for encoding data using only bit-wise shift and XOR ...
saeideh Kabirirad +2 more
doaj +1 more source
On the distributivity of the lattice of radical submodules [PDF]
Let $R$ be a commutative ring with identity and $\mathcal{R}(_{R}M)$ denotes the bounded lattice of radical submodules of an $R$-module $M$. We say that $M$ is a radical distributive module, if $\mathcal{R}(_{R}M)$ is a distributive lattice.
Hossein Fazaeli Moghimi +1 more
doaj +1 more source
State Complexity of Catenation Combined with a Boolean Operation: A Unified Approach [PDF]
In this paper we study the state complexity of catenation combined with symmetric difference. First, an upper bound is computed using some combinatoric tools. Then, this bound is shown to be tight by giving a witness for it. Moreover, we relate this work
Pascal Caron +3 more
semanticscholar +1 more source
Arbitrary Polygons Boolean Operation Based on GPU Rasterization [PDF]
The Boolean operation of arbitrary polygons is mostly based on the CPU grid method,because of the serialization of CPU,the raster process takes a long time.In order to solve the above problem,an algorithm for polygon Boolean operations based on the ...
GAO Yi,LUO Jianxin,QIU Hangping,WU Bo
doaj +1 more source
Simple and Robust Boolean Operations for Triangulated Surfaces
Boolean operations on geometric models are important in numerical simulation and serve as essential tools in the fields of computer-aided design and computer graphics. The accuracy of these operations is heavily influenced by finite precision arithmetic,
Meijun Zhou +3 more
doaj +1 more source

