In this paper we present a general FEM (finite element method) solution that enables fast dynamic deformation simulation on the newly available GPU (graphics processing unit) hardware with compute unified device archi...
详细信息
In this paper we present a general FEM (finite element method) solution that enables fast dynamic deformation simulation on the newly available GPU (graphics processing unit) hardware with compute unified device architecture (CUDA) from NVIDIA. CUDA-enabled GPUs harness the power of 128 processors which allow data parallel computations. Compared to the previous GPGPU, it is significantly more flexible with a C language interface. We not only implement FEM deformation computation algorithms with CUDA but also analyze the performance in detail. Our test results indicate that the GPU with CUDA enables about 4 times speedup for FEM deformation computation on an Intel(R) Core 2 Quad 2.0 GHz machine with GeForce 8800 GTX.
TTM is a type of multivariate public key cryptosystem. In 2007, the inventor of TTM proposed two new instances of TTM to resist the existing attack, in particular, the Nie et al attack. The two instances are claimed t...
详细信息
TTM is a type of multivariate public key cryptosystem. In 2007, the inventor of TTM proposed two new instances of TTM to resist the existing attack, in particular, the Nie et al attack. The two instances are claimed to achieve a security of 2 109 against Nie et al attack. In this paper, we show that the instance I is still insecure, and in fact, it do not achieve a better design in the sense that we can find a ciphertext-only attack utilizing the First Order Linearization Equations while for the previous version of TTM, only Second Order Linearization Equations can be used in the beginning stage of the previous attack. Different from previous attacks, we use an iterated linearization method to break the instances I. For any given valid ciphertext, we can find its corresponding plaintext within 2 31 F 2 to power of 8 -computations after performing once for any public key a computation of complexity less than 2 44 . Our experiment result shows we have unlocked the lock polynomials after several iterations, though we do not know the detailed construction of lock polynomials.
Video object segmentation is important for video surveillance, object tracking, video object recognition and video editing. An adaptive video segmentation algorithm based on hidden conditional random fields (HCRFs) is...
详细信息
Video object segmentation is important for video surveillance, object tracking, video object recognition and video editing. An adaptive video segmentation algorithm based on hidden conditional random fields (HCRFs) is proposed, which models spatio-temporal constraints of video sequence. In order to improve the segmentation quality, the weights of spatio-temporal con- straints are adaptively updated by on-line learning for HCRFs. Shadows are the factors affecting segmentation quality. To separate foreground objects from the shadows they cast, linear transform for Gaussian distribution of the background is adopted to model the shadow. The experimental results demonstrated that the error ratio of our algorithm is reduced by 23% and 19% respectively, compared with the Gaussian mixture model (GMM) and spatio-temporal Markov random fields (MRFs).
Large scale matrix inversion has been used in many domains and block-based Gauss-Jordan (G-J) algorithm as a classical method of large matrix inversion has become the focus of many researchers. Many people show us the...
详细信息
ISBN:
(纸本)9781424432806;9780769534497
Large scale matrix inversion has been used in many domains and block-based Gauss-Jordan (G-J) algorithm as a classical method of large matrix inversion has become the focus of many researchers. Many people show us their parallel version of G-J. But the large parallel granularity in those algorithms restricts the performance of parallel block-based G-J algorithm, especially in the cluster environment consisting of PCs or workstations. This paper presents a fine-grained parallel G-J algorithm to settle the problem presented above. Experiments are made based on YML a framework which enables using different middleware to make large scale parallel computing for its feathers of components reuse, easy programmability for noncomputer professionals. Cluster and Grid environments are based on Grid'5000 platform, France. Experiments show us that the better performance of fine-grained parallel G-J algorithm and YML though overhead existing is a good solution for large scale parallel computing.
In this paper we present a robust adaptive control for a class of uncertain continuous time multiple input multiple output (MIMO) nonlinear systems. Multiple multi-layer neural networks are employed to approximate t...
详细信息
In this paper we present a robust adaptive control for a class of uncertain continuous time multiple input multiple output (MIMO) nonlinear systems. Multiple multi-layer neural networks are employed to approximate the uncertainty of the nonlinear functions, and robustifying control terms are used to compensate for approximation errors. All parameter adaptive laws and robustifying control terms are derived based on Lyapunov stability analysis so that, under appropriate assumptions, semi-global stability of the closed-loop system is guaranteed, and the tracking error asymptotically converges to zero. Simulations performed on a two-link robot manipulator illustrate the approach and its performance.
Texture optimization is a texture synthesis method that can efficiently reproduce various features of exemplar textures. However, its slow synthesis speed limits its usage in many interactive or real time applications...
详细信息
Texture optimization is a texture synthesis method that can efficiently reproduce various features of exemplar textures. However, its slow synthesis speed limits its usage in many interactive or real time applications. In this paper, we propose a parallel texture optimization algorithm to run on GPUs. In our algorithm, k-coherence search and principle component analysis (PCA) are used for hardware acceleration, and two acceleration techniques are further developed to speed up our GPU-based texture optimization. With a reasonable precomputation cost, the online synthesis speed of our algorithm is 4000+ times faster than that of the original texture optimization algorithm and thus our algorithm is capable of interactive applications. The advantages of the new scheme are demonstrated by applying it to interactive editing of flow-guided synthesis.
The image projection has been proven to be an effective method for extracting image features. This paper utilizes multiple facial cues extracted by the projection function for driver vigilance monitoring. To measure v...
详细信息
ISBN:
(纸本)1595934804;9781595934802
The image projection has been proven to be an effective method for extracting image features. This paper utilizes multiple facial cues extracted by the projection function for driver vigilance monitoring. To measure vigilance, we calculate two metrics: PERCLOS and PERROTAT from facial state estimation. The main advantage of the presented system in contrast to existing ones is the usage of cheap equipment (only one monocular camera) to achieve a good cost-performance ratio and fast computation time. Copyright 2007 ACM.
The camera extrinsic parameters are composed of 3 rotation angles and a translation vector, which has 3 components, and the calibration process identifies these 6 parameters. It is proved that at least 3 corresponding...
详细信息
The camera extrinsic parameters are composed of 3 rotation angles and a translation vector, which has 3 components, and the calibration process identifies these 6 parameters. It is proved that at least 3 corresponding points should be given for the process and when more than 3 points are given, the system is over determined and has to be solved by minimizing the RMS error. In this paper, a camera extrinsic parameters calibration algorithm or camera pose estimation algorithm is studied. The algorithm ensures its efficiency (20 milliseconds if no more than 9 corresponding points are given) and robustness by a good initial value guess and an omnidirectional search for poor input data. It has been successfully used in texture mapping for cultural relics such as a jade chisel from Jinsha (an archaeological site in the western suburbs of Chengdu) and a Buddha statue from Zhejiang Provincial Museum.
Most texture synthesis algorithms explicitly or implicitly adopt Markov Random Field or similar distribution as their basic model to guide the synthesis process. However, MRF-like models can't handle textures well...
详细信息
This paper describes an autonomous virtual human evacuation model in a fire accident scene. Based on the human's specific psychological and behavior response to the fire accident scene, we give the perceptions and...
详细信息
This paper describes an autonomous virtual human evacuation model in a fire accident scene. Based on the human's specific psychological and behavior response to the fire accident scene, we give the perceptions and describe details of the rules in which behavior planning is presented. We also show how the non-leadership agents' path planning method can be applied to virtual human evacuation model. Finally experiment results are presented to evaluate the proposed model.
暂无评论