ﻻ يوجد ملخص باللغة العربية
This paper presents the image-quality-guided strategy for optimization of bicubic interpolation and interpolated scan conversion algorithms. This strategy uses feature selection through line chart data visualization technique and first index of the minimum absolute difference between computed scores and ideal scores to determine the image quality guided coefficient k that changes all sixteen BIC coefficients to new coefficients on which the OBIC interpolation algorithm is based. Perceptual evaluations of cropped sectored images from Matlab software implementation of interpolated scan conversion algorithms are presented. Also, IQA metrics-based evaluation is presented and demonstrates that the overall performance of the OBIC algorithm is 92.22% when compared with BIC alone, but becomes 57.22% with all other methods mentioned.
Compressed bitmap indexes are used in systems such as Git or Oracle to accelerate queries. They represent sets and often support operations such as unions, intersections, differences, and symmetric differences. Several important systems such as Elast
We present a method for the efficient processing of contact and collision in volumetric elastic models simulated using the Projective Dynamics paradigm. Our approach enables interactive simulation of tetrahedral meshes with more than half a million e
The main output of the FORCE11 Software Citation working group (https://www.force11.org/group/software-citation-working-group) was a paper on software citation principles (https://doi.org/10.7717/peerj-cs.86) published in September 2016. This paper l
The creation of high-fidelity computer-generated (CG) characters used in film and gaming requires intensive manual labor and a comprehensive set of facial assets to be captured with complex hardware, resulting in high cost and long production cycles.
This work compares the performance of software implementations of different Gabidulin decoders. The parameter sets used within the comparison stem from their applications in recently proposed cryptographic schemes. The complexity analysis of the deco