In this paper we discuss computer simulations of de Sitter and anti de Sitter spacetimes, which are maximally symmetric, relativistic analogs of non-Euclidean geometries. We present prototype games played in these spa...
详细信息
ISBN:
(纸本)9783031637483;9783031637490
In this paper we discuss computer simulations of de Sitter and anti de Sitter spacetimes, which are maximally symmetric, relativistic analogs of non-Euclidean geometries. We present prototype games played in these spacetimes;such games and visualizations can help the players gain intuition about these spacetimes. We discuss the technical challenges in creating such simulations, and discuss the geometric and relativistic effects that can be witnessed by the players.
Recently, many constructions of curves aim to implement different kinds of proof systems efficiently. For the protocol to be efficient, one must generate particular forms of prime numbers. This article prese...
详细信息
This paper introduces a novel application of frequency and amplitude formulation to determine the frequency of nonlinear Duffing oscillations. The formulation represents one of the simplest methods for estimating the ...
详细信息
The inherent security threat of public key encryption with keyword search (PEKS) is the inside guessing attack since the ciphertext of keyword is generated publicly. Sever-aided schemes and keyword search with authent...
详细信息
This paper investigates the potential of integrating visual object states for developing methods addressing complex visual intelligence tasks such as Long-Term Action anticipation (LTAA) and proposes that this to achi...
详细信息
Medical image segmentation is a critical component of clinical practice, and the state-of-the-art MedSAM model has significantly advanced this field. Nevertheless, critiques highlight that MedSAM demands substantial c...
详细信息
Boolean Control Networks (BCNs) are extensively employed for modelling biological systems, attracting considerable attention from biologists and systems scientists, in particularly, on the control theory of BCNs. This...
详细信息
Unmanned Aerial Vehicles (UAVs) serve as highly versatile and efficient tools utilized across diverse industries for data collection purposes. However, they face vulnerabilities associated with wireless communication ...
详细信息
With the rapid development of deep learning in the field of computer vision, the performance of core vision tasks such as image recognition has achieved significant improvement. In nighttime environment, due to the lo...
详细信息
Reversible data hiding in encrypted images (RDHEI) can simultaneously achieve secure transmission of images and secret storage of embedded additional data, which can be used for cloud storage and privacy protection. I...
详细信息
暂无评论