Search results for "RDW"
showing 10 items of 1401 documents
Optimized Parallel Implementation of Face Detection based on GPU component
2015
Display Omitted An algorithm for face detection has been implemented on CPU.An acceleration of this algorithm on GPU migration.Performance of GPU implementation shows the effectiveness of this implementation.Another optimization method on GPU are operated. Face detection is an important aspect for various domains such as: biometrics, video surveillance and human computer interaction. Generally a generic face processing system includes a face detection, or recognition step, as well as tracking and rendering phase. In this paper, we develop a real-time and robust face detection implementation based on GPU component. Face detection is performed by adapting the Viola and Jones algorithm. We hav…
A distributed genetic algorithm for restoration of vertical line scratches
2008
This paper reports a distributed algorithm for the restoration of still frames corrupted by vertical line scratches. The restoration is here approached as an optimisation problem, and is solved using an ad-hoc Genetic Algorithm. The distributed algorithm is designed following a pipeline logical structure. The front end is a network of standard workstations with heterogeneous operating systems. The quality of image is appreciable and the computational time is quite low with respect the sequential version.
PenRed: An extensible and parallel Monte-Carlo framework for radiation transport based on PENELOPE
2021
Monte Carlo methods provide detailed and accurate results for radiation transport simulations. Unfortunately, the high computational cost of these methods limits its usage in real-time applications. Moreover, existing computer codes do not provide a methodology for adapting these kind of simulations to specific problems without advanced knowledge of the corresponding code system, and this restricts their applicability. To help solve these current limitations, we present PenRed, a general-purpose, stand-alone, extensible and modular framework code based on PENELOPE for parallel Monte Carlo simulations of electron-photon transport through matter. It has been implemented in C++ programming lan…
Parallel simulation of dense two-dimensional polymer systems
1990
Abstract We present a parallel algorithm for the simulation of dense lattice polymer systems. The algorithm will be given for a two-dimensional system although the algorithm can be generalized to higher dimensions. We discuss timing results and applications.
VBFNLO: A parton level Monte Carlo for processes with electroweak bosons
2009
VBFNLO is a fully flexible parton level Monte Carlo program for the simulation of vector boson fusion, double and triple vector boson production in hadronic collisions at next-to-leading order in the strong Coupling constant. VBFNLO includes Higgs and vector boson decays with full spin correlations and all off-shell effects. In addition, VBFNLO implements CP-even and CP-odd Higgs boson via gluon fusion, associated with two jets, at the leading-order one-loop level with the full top- and bottom-quark mass dependence in a generic two-Higgs-doublet model. A variety of effects arising from beyond the Standard Model physics are implemented for selected processes. This includes anomalous coupling…
Flavour Les Houches Accord: Interfacing Flavour related Codes
2010
14 páginas, 2 tablas.-- arXiv:1008.0762v2.-- Mahmpudi, F. et al.
LeptonInjector and LeptonWeighter: A neutrino event generator and weighter for neutrino observatories
2021
We present a high-energy neutrino event generator, called LeptonInjector, alongside an event weighter, called LeptonWeighter. Both are designed for large-volume Cherenkov neutrino telescopes such as IceCube. The neutrino event generator allows for quick and flexible simulation of neutrino events within and around the detector volume, and implements the leading Standard Model neutrino interaction processes relevant for neutrino observatories: neutrino-nucleon deep-inelastic scattering and neutrino-electron annihilation. In this paper, we discuss the event generation algorithm, the weighting algorithm, and the main functions of the publicly available code, with examples.
CORMORANT
2019
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…
Embedded access points for trusted data and resources access in HPC systems
2010
Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…
Percolation and Schramm–Loewner evolution in the 2D random-field Ising model
2011
Abstract The presence of random fields is well known to destroy ferromagnetic order in Ising systems in two dimensions. When the system is placed in a sufficiently strong external field, however, the size of clusters of like spins diverges. There is evidence that this percolation transition is in the universality class of standard site percolation. It has been claimed that, for small disorder, a similar percolation phenomenon also occurs in zero external field. Using exact algorithms, we study ground states of large samples and find little evidence for a transition at zero external field. Nevertheless, for sufficiently small random-field strengths, there is an extended region of the phase d…