Results 11 to 20 of about 145,870 (284)

Research and application of Boolean operation for triangular mesh model of underground space engineering—Boolean operation for triangular mesh model

open access: yesEnergy Science & Engineering, 2019
This study is aiming at the problems of slow collision detection speed of bounding box, low efficiency of triangle intersection detection, and triangulation in regions where complex intersecting lines are segmented that exist in Boolean operation of ...
Yaguang Qin   +6 more
doaj   +2 more sources

Quadstable logical stochastic resonance-based reconfigurable Boolean operation subjected to heavy noise floor

open access: yesResults in Physics, 2022
Logical stochastic resonance (LSR) is a paradigm to realize reconfigurable robust Boolean operations using specific nonlinearity in the presence of background noise.
Zhiqiang Liao   +5 more
doaj   +3 more sources

Visible watermarking for 3D models based on 3D Boolean operation

open access: yesEgyptian Informatics Journal
With the continuous expansion of the application field of 3D models and the convenience of model storage, transmission, and replication, the problems of illegal reproduction, illegal modification, and embezzlement faced by 3D models are gradually ...
An-Bo Li, Hao Chen, Xian-Li Xie
doaj   +3 more sources

Significant Secret Image Sharing Scheme Based on Boolean Operation

open access: yesCybernetics and Information Technologies, 2017
Traditionally, (k, n) secret image sharing is an approach of breaking down a secret image into n number of shadow images to assign them to n number of users, so that any k or more then k users can bring back the secret image.
Verma Monu, Rani Rajneesh
doaj   +1 more source

Discernibility Matrix and Its Application in Logical Optimization

open access: yesJisuanji kexue yu tansuo, 2021
The simplification of truth table is of great significance to the analysis and design of logic circuits. In this paper, the simplification of truth table is studied, and a method of GDM (granular discernibility matrix) that uses discernibility matrix is ...
YAN Xinyi, WEN Xin, CHEN Zehua
doaj   +1 more source

A heuristic method for bi-decomposition of partial Boolean functions

open access: yesInformatika, 2020
The problem of decomposition of a Boolean function is to represent a given Boolean function in the form of a superposition of some Boolean functions whose number of arguments are less than the number of given function.
Yu. V. Pottosin
doaj   +1 more source

Memristive Stateful Logic for Edge Boolean Computers

open access: yesAdvanced Intelligent Systems, 2021
Memristive stateful logic enables complete in‐memory computing, allowing low‐power and low‐cost Boolean computing. Its characteristics are consistent with the requirements of edge computing devices, which will occupy a considerable segment in the coming ...
Young Seok Kim   +2 more
doaj   +1 more source

Secret Image Sharing Scheme Based on a Boolean Operation

open access: yesCybernetics and Information Technologies, 2014
Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction
Nag Amitava   +3 more
doaj   +1 more source

A Graph-theoretic Method to Define any Boolean Operation on Partitions [PDF]

open access: yes, 2019
The lattice operations of join and meet were defined for set partitions in the nineteenth century, but no new logical operations on partitions were defined and studied during the twentieth century. Yet there is a simple and natural graph-theoretic method
Ellerman, David
core   +3 more sources

Boolean Differential Operators

open access: yes, 2012
We consider four combinatorial interpretations for the algebra of Boolean differential operators. We show that each interpretation yields an explicit matrix representation for Boolean differential operators.
Catumba, Jorge, Díaz, Rafael
openaire   +3 more sources

Home - About - Disclaimer - Privacy