Results 51 to 60 of about 616,005 (189)

Generation of Triangular Meshes for Complex Domains on the Plane [PDF]

open access: yesComputer Science, 2001
Many physical phenomena can be modeled by partial differential equations. The development of numerical methods based on the spatial subdivision of a domain into finite elements immediately extended interests to the tasks of generating a mesh.
Barbara Glut, Tomasz Jurczyk
doaj  

4K-DMDNet: diffraction model-driven network for 4K computer-generated holography

open access: yesOpto-Electronic Advances, 2023
Deep learning offers a novel opportunity to achieve both high-quality and high-speed computer-generated holography (CGH). Current data-driven deep learning algorithms face the challenge that the labeled training datasets limit the training performance ...
Kexuan Liu   +3 more
doaj   +1 more source

Statistical Study of the Bias and Precision for Six Estimation Methods for the Fractal Dimension of Randomly Rough Surfaces

open access: yesFractal and Fractional
The simulation and characterisation of randomly rough surfaces is an important topic in surface science, tribology, geo- and planetary sciences, image analysis and optics.
Jorge Luis Flores Alarcón   +4 more
doaj   +1 more source

Proof–Based Synthesis of Sorting Algorithms Using Multisets in Theorema [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2019
Using multisets, we develop novel techniques for mechanizing the proofs of the synthesis conjectures for list-sorting algorithms, and we demonstrate them in the Theorema system.
Isabela Drămnesc, Tudor Jebelean
doaj   +1 more source

LLMs for Domain Generation Algorithm Detection

open access: yes
This work analyzes the use of large language models (LLMs) for detecting domain generation algorithms (DGAs). We perform a detailed evaluation of two important techniques: In-Context Learning (ICL) and Supervised Fine-Tuning (SFT), showing how they can improve detection.
La O, Reynier Leyva   +2 more
openaire   +2 more sources

PetroSurf3D - A Dataset for high-resolution 3D Surface Segmentation

open access: yes, 2017
The development of powerful 3D scanning hardware and reconstruction algorithms has strongly promoted the generation of 3D surface reconstructions in different domains.
Bellandi, Giovanna   +7 more
core   +1 more source

A domain splitting algorithm for the mathematical functions code generator [PDF]

open access: yes2014 48th Asilomar Conference on Signals, Systems and Computers, 2014
The general approach to mathematical function implementation consists of three stages: argument reduction, approximation and reconstruction. The argument reduction step is needed to reduce the degree of the approximation polynomial and to simplify the error analysis. For some particular functions (e.g. exp) it is done using its algebraic properties. In
Kupriianova, Olga, Lauter, Christoph
openaire   +2 more sources

A New Proposed GPS Satellite Signals Acquisition Algorithm Based on the Fast Fourier Transform [PDF]

open access: yesJournal of Electrical and Electronics Engineering, 2018
Due to the Doppler Effect caused by the high line-of-sight velocity of satellites and in some cases receivers, the frequency of the Global Positioning System (GPS) satellites signals at the receivers’ level will be transformed into new ones. In the worst
BELDJILALI Bilal, BENADDA Belkacem
doaj  

Video summary generation and coding using temporal scalability [PDF]

open access: yes, 2009
In this paper two algorithms for video summary generation and coding are proposed. Two distortion metrics used in the video summary generation algorithm are compared and an algorithm with reduced computational complexity is presented.
Assunção, Pedro A. Amado   +2 more
core  

A Survey of Adversarial Attacks on SAR Target Recognition: From Digital Domain to Physical Domain

open access: yesLeida xuebao
Deep Neural Network (DNN)-based Synthetic Aperture Radar (SAR) image target recognition has become a prominent area of interest in SAR applications. However, deep neural network models are vulnerable to adversarial example attacks.
Hang RUAN   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy