Search results for "RDW"

showing 10 items of 1401 documents

Optimized Parallel Implementation of Face Detection based on GPU component

2015

Display Omitted An algorithm for face detection has been implemented on CPU.An acceleration of this algorithm on GPU migration.Performance of GPU implementation shows the effectiveness of this implementation.Another optimization method on GPU are operated. Face detection is an important aspect for various domains such as: biometrics, video surveillance and human computer interaction. Generally a generic face processing system includes a face detection, or recognition step, as well as tracking and rendering phase. In this paper, we develop a real-time and robust face detection implementation based on GPU component. Face detection is performed by adapting the Viola and Jones algorithm. We hav…

Parallel computingBiometricsComputer Networks and CommunicationsComputer science02 engineering and technologyParallel computing[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingFace detectionRendering (computer graphics)CUDACUDA optimizationArtificial Intelligence0202 electrical engineering electronic engineering information engineeringGraphics processorsAdaBoost[ INFO.INFO-ES ] Computer Science [cs]/Embedded SystemsGraphicsWaldBoostFace detectionComputingMilieux_MISCELLANEOUS[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processingViola and Jones algorithmAdaBoostGrid020202 computer hardware & architectureShared memoryHardware and Architecture020201 artificial intelligence & image processing[INFO.INFO-ES]Computer Science [cs]/Embedded Systems[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingSoftware
researchProduct

A distributed genetic algorithm for restoration of vertical line scratches

2008

This paper reports a distributed algorithm for the restoration of still frames corrupted by vertical line scratches. The restoration is here approached as an optimisation problem, and is solved using an ad-hoc Genetic Algorithm. The distributed algorithm is designed following a pipeline logical structure. The front end is a network of standard workstations with heterogeneous operating systems. The quality of image is appreciable and the computational time is quite low with respect the sequential version.

Parallel computingOptimisation problemGeneticalgorithmBrooks–Iyengar algorithmSettore INF/01 - InformaticaComputer Networks and CommunicationsComputer sciencePipeline (computing)Parallel algorithmLinescratch removalParallel computingComputer Graphics and Computer-Aided DesignTheoretical Computer ScienceImage (mathematics)Artificial IntelligenceHardware and ArchitectureDistributed algorithmGenetic algorithmDistributed systemParallel Programming Scratch Detection Image AnalysisSoftwareParallel Computing
researchProduct

PenRed: An extensible and parallel Monte-Carlo framework for radiation transport based on PENELOPE

2021

Monte Carlo methods provide detailed and accurate results for radiation transport simulations. Unfortunately, the high computational cost of these methods limits its usage in real-time applications. Moreover, existing computer codes do not provide a methodology for adapting these kind of simulations to specific problems without advanced knowledge of the corresponding code system, and this restricts their applicability. To help solve these current limitations, we present PenRed, a general-purpose, stand-alone, extensible and modular framework code based on PENELOPE for parallel Monte Carlo simulations of electron-photon transport through matter. It has been implemented in C++ programming lan…

Parallel computingPhysics - Instrumentation and DetectorsAtomic Physics (physics.atom-ph)FortranRadiation transportFOS: Physical sciencesGeneral Physics and AstronomyParallel computingcomputer.software_genre01 natural sciencesPhysics - Atomic Physics010305 fluids & plasmasElectron-photon showers0103 physical sciencesCIENCIAS DE LA COMPUTACION E INTELIGENCIA ARTIFICIAL010306 general physicsMonte Carlo simulationcomputer.programming_languageMPICHbusiness.industryInstrumentation and Detectors (physics.ins-det)Construct (python library)Computational Physics (physics.comp-ph)Modular designPhysics - Medical PhysicsShared memoryHardware and ArchitectureProgramming paradigmDistributed memoryMPIMedical Physics (physics.med-ph)CompilerMedical physicsbusinessPhysics - Computational Physicscomputer
researchProduct

Parallel simulation of dense two-dimensional polymer systems

1990

Abstract We present a parallel algorithm for the simulation of dense lattice polymer systems. The algorithm will be given for a two-dimensional system although the algorithm can be generalized to higher dimensions. We discuss timing results and applications.

Parallel simulationHardware and ArchitectureLattice (order)Parallel algorithmGeneral Physics and AstronomyTwo-dimensional polymerStatistical physicsStatistical mechanicsTiming resultsTopologyMathematicsComputer Physics Communications
researchProduct

VBFNLO: A parton level Monte Carlo for processes with electroweak bosons

2009

VBFNLO is a fully flexible parton level Monte Carlo program for the simulation of vector boson fusion, double and triple vector boson production in hadronic collisions at next-to-leading order in the strong Coupling constant. VBFNLO includes Higgs and vector boson decays with full spin correlations and all off-shell effects. In addition, VBFNLO implements CP-even and CP-odd Higgs boson via gluon fusion, associated with two jets, at the leading-order one-loop level with the full top- and bottom-quark mass dependence in a generic two-Higgs-doublet model. A variety of effects arising from beyond the Standard Model physics are implemented for selected processes. This includes anomalous coupling…

Particle physics530 PhysicsPhysics beyond the Standard ModelMonte Carlo methodGeneral Physics and AstronomyFOS: Physical sciencesPartonVector bosonHigh Energy Physics - Phenomenology (hep-ph)Electroweak bosonsloop QCD correctionsVBFNLOOne-loop QCD correctionsBosonPhysics1708 Hardware and ArchitectureHadronic collisionsElectroweak interactionHigh Energy Physics::Phenomenology3100 General Physics and AstronomyGluonHigh Energy Physics - PhenomenologyNLO Monte Carlo programHardware and Architecture10231 Institute for Computational ScienceHiggs bosonOneHigh Energy Physics::Experiment
researchProduct

Flavour Les Houches Accord: Interfacing Flavour related Codes

2010

14 páginas, 2 tablas.-- arXiv:1008.0762v2.-- Mahmpudi, F. et al.

Particle physicsHigh Energy Physics::LatticeFlavourGeneral Physics and AstronomyFOS: Physical sciences01 natural sciencesHigh Energy Physics - ExperimentHigh Energy Physics - Experiment (hep-ex)High Energy Physics - LatticeHigh Energy Physics - Phenomenology (hep-ph)0103 physical sciences[PHYS.HEXP]Physics [physics]/High Energy Physics - Experiment [hep-ex]010306 general physicsParticle Physics - PhenomenologyPhysics010308 nuclear & particles physics[PHYS.HLAT]Physics [physics]/High Energy Physics - Lattice [hep-lat]High Energy Physics - Lattice (hep-lat)High Energy Physics::PhenomenologyObservableSupersymmetryLes Houches AccordHigh Energy Physics - PhenomenologyStandard Model (mathematical formulation)Hardware and ArchitectureInterfacing[PHYS.HPHE]Physics [physics]/High Energy Physics - Phenomenology [hep-ph]High Energy Physics::ExperimentFlavour physicsComput.Phys.Commun.
researchProduct

LeptonInjector and LeptonWeighter: A neutrino event generator and weighter for neutrino observatories

2021

We present a high-energy neutrino event generator, called LeptonInjector, alongside an event weighter, called LeptonWeighter. Both are designed for large-volume Cherenkov neutrino telescopes such as IceCube. The neutrino event generator allows for quick and flexible simulation of neutrino events within and around the detector volume, and implements the leading Standard Model neutrino interaction processes relevant for neutrino observatories: neutrino-nucleon deep-inelastic scattering and neutrino-electron annihilation. In this paper, we discuss the event generation algorithm, the weighting algorithm, and the main functions of the publicly available code, with examples.

Particle physicsPhysics::Instrumentation and DetectorsComputer scienceAstrophysics::High Energy Astrophysical PhenomenaFOS: Physical sciencesGeneral Physics and AstronomyCHERENKOV LIGHT YIELDWeighting01 natural sciencesHigh Energy Physics - Experiment010305 fluids & plasmasStandard ModelHigh Energy Physics - Experiment (hep-ex)Neutrino interactionHigh Energy Physics - Phenomenology (hep-ph)0103 physical sciences010306 general physicsCherenkov radiationEvent generatorEvent generator; Neutrino generator; Neutrino interaction; Neutrino simulation; WeightingGenerator (computer programming)hep-exEvent (computing)ICEHigh Energy Physics::PhenomenologyDetectorhep-phComputational Physics (physics.comp-ph)Quantitative Biology::GenomicsHigh Energy Physics - Phenomenologyphysics.comp-phHardware and ArchitectureHigh Energy Physics::ExperimentNeutrino simulationNeutrino generatorEvent generatorNeutrinoPhysics - Computational PhysicsLeptonComputer Physics Communications
researchProduct

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

Embedded access points for trusted data and resources access in HPC systems

2010

Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…

PasswordAuthenticationBiometricsbusiness.industryComputer scienceAccess controlInformation SystemFingerprint recognitionTrusted authenticationTheoretical Computer ScienceSoftwareHardware and ArchitectureEmbedded systemEmbedded biometric authentication systemSmart cardSecurity solutions for user authenticationbusinessReplay attackSoftwareInformation SystemsThe Journal of Supercomputing
researchProduct

Percolation and Schramm–Loewner evolution in the 2D random-field Ising model

2011

Abstract The presence of random fields is well known to destroy ferromagnetic order in Ising systems in two dimensions. When the system is placed in a sufficiently strong external field, however, the size of clusters of like spins diverges. There is evidence that this percolation transition is in the universality class of standard site percolation. It has been claimed that, for small disorder, a similar percolation phenomenon also occurs in zero external field. Using exact algorithms, we study ground states of large samples and find little evidence for a transition at zero external field. Nevertheless, for sufficiently small random-field strengths, there is an extended region of the phase d…

Percolation critical exponentsRandom fieldStatistical Mechanics (cond-mat.stat-mech)Schramm–Loewner evolutionCondensed matter physicsFOS: Physical sciencesGeneral Physics and AstronomyPercolation thresholdDisordered Systems and Neural Networks (cond-mat.dis-nn)Condensed Matter - Disordered Systems and Neural NetworksDirected percolationHardware and ArchitecturePercolationIsing modelContinuum percolation theoryStatistical physicsCondensed Matter - Statistical MechanicsMathematicsComputer Physics Communications
researchProduct