Subdivision surfaces were applied to the entire meshes in order to produce smooth surfaces refinement from coarse mesh. Several schemes had been introduced in this area to provide a set of rules to converge smooth sur...
详细信息
Subdivision surfaces were applied to the entire meshes in order to produce smooth surfaces refinement from coarse mesh. Several schemes had been introduced in this area to provide a set of rules to converge smooth surfaces. However, to compute and render all the vertices are really inconvenient in terms of memory consumption and runtime during the subdivision process. It will lead to a heavy computational load especially at a higher level of subdivision. Adaptive subdivision is a method that subdivides only at certain areas of the meshes while the rest were maintained less polygons. Although adaptive subdivision occurs at the selected areas, the quality of produced surfaces which is their smoothness can be preserved similar as well as regular subdivision. Nevertheless, adaptive subdivision process burdened from two causes;calculations need to be done to define areas that are required to be subdivided and to remove cracks created from the subdivision depth difference between the selected and unselected areas. Unfortunately, the result of adaptive subdivision when it reaches to the higher level of subdivision, it still brings the problem with memory consumption. This research brings to iterative process of adaptive subdivision to improve the previous adaptive method that will reduce memory consumption applied on triangular mesh. The result of this iterative process was acceptable better in memory and appearance in order to produce fewer polygons while it preserves smooth surfaces.
The Web service composition has received much attention recently to support business-to-business enterprise applications integration. Many composition approaches, languages, platforms, and patents have been proposed t...
详细信息
Effective health education and awareness initiatives are essential in a world facing growing concerns about children's well-being and rising unhealthy behaviours. This research presents a Narrative Game-Based Lear...
详细信息
Social media platforms have proven to be effective for information gathering during emergency events caused by natural or human-made *** response authorities,law enforcement agencies,and the public can use this inform...
详细信息
Social media platforms have proven to be effective for information gathering during emergency events caused by natural or human-made *** response authorities,law enforcement agencies,and the public can use this information to gain situational awareness and improve disaster *** case of emergencies,rapid responses are needed to address victims’requests for *** research community has developed many social media platforms and used them effectively for emergency response and coordination in the ***,most of the present deployments of platforms in crisis management are not automated,and their operational success largely depends on experts who analyze the information manually and coordinate with relevant humanitarian agencies or law enforcement authorities to initiate emergency response *** seamless integration of automatically identifying types of urgent needs from millions of posts and delivery of relevant information to the appropriate agency for timely response has become *** research project aims to develop a generalized informationtechnology(IT)solution for emergency response and disaster management by integrating social media data as its core *** this paper,we focused on text analysis techniques which can help the emergency response authorities to filter through the sheer amount of information gathered automatically for supporting their relief *** specifically,we applied state-of-the-art Natural Language Processing(NLP),Machine Learning(ML),and Deep Learning(DL)techniques ranging from unsupervised to supervised learning for an in-depth analysis of social media data for the purpose of extracting real-time information on a critical event to facilitate emergency response in a *** a proof of concept,a case study on the COVID-19 pandemic on the data collected from Twitter is presented,providing evidence that the scientific and operational goals have been achieved.
The advancement in digital image tampering has encouraged studies in the image forensics fields. The image tampering can be found over various image formats such as Joint Photographic Experts Group (JPEG). JPEG is the...
详细信息
This paper gives an empirical study to estimate the performance of our proposed optimization method called Sperm Swarm Optimization (SSO). The SSO is evaluated frequently with different mathematical benchmark models u...
详细信息
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t...
详细信息
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj...
详细信息
Multimode fibers hold great promise to advance data rates in optical communications but come with the challenge to compensate for modal crosstalk and mode-dependent losses,resulting in strong *** holographic measureme...
详细信息
Multimode fibers hold great promise to advance data rates in optical communications but come with the challenge to compensate for modal crosstalk and mode-dependent losses,resulting in strong *** holographic measurement of the transmission matrix enables not only correcting distortions but also harnessing these effects for creating a confidential data connection between legitimate communication parties,Alice and *** feasibility of this physical-layer-security-based approach is demonstrated experimentally for the first time on a multimode fiber link to which the eavesdropper Eve is physically *** the proper structured light field is launched at Alice’s side,the message can be delivered to Bob,and,simultaneously,the decipherment for an illegitimate wiretapper Eve is *** a real communication scenario,we implement wiretap codes and demonstrate confidentiality by quantifying the level of *** to an uncoded data transmission,the amount of securely exchanged data is enhanced by a factor of *** complex light transportation phenomena that have long been considered limiting and have restricted the widespread use of multimode fiber are exploited for opening new perspectives on information security in spatial multiplexing communication systems.
With the growth of World Wide Web and increasing human demand on trading, e-commerce becomes an inseparable part of business. In the past decade a huge number of researches have been done in order to develop optimal n...
详细信息
暂无评论