Gallery — Math

Gallery Items tagged Math

Show all Gallery Items

Übung: Lineare Gleichungsysteme
Übung: Lineare Gleichungsysteme
Übung: Lineare Gleichungssysteme
Dmitrij Moreinis
Proof of function's representation with Taylor Series
Proof of function's representation with Taylor Series
Proof of a function's representation with Taylor Series
Adrian D'Costa
The Parallelization and Optimization of the N-Body Problem using OpenMP and Cuda
The Parallelization and Optimization of the N-Body Problem using OpenMP and Cuda
This research paper aims at exploiting efficient ways of implementing the N-Body problem. The N-Body problem, in the field of physics, predicts the movements and planets and their gravitational interactions. In this paper, the efficient execution of heavy computational work through usage of different cores in CPU and GPU is looked into; achieved by integrating the OpenMP parallelization API and the Nvidia CUDA into the code. The paper also aims at performance analysis of various algorithms used to solve the same problem. This research not only aids as an alternative to complex simulations but also for bigger data that requires work distribution and computationally expensive procedures.
Tushaar Gangarapu
CT Problem Set
CT Problem Set
CT problem set for undergraduate Medical Physics course.
David Rigie
Th\'eorie cin\'etique des gaz parfaits.
Th\'eorie cin\'etique des gaz parfaits.
Chapitre 2, Peip2, Polytech'Nice Sophia, sans les sch\'emas et applications sch\'ematis\'ees
Rémy Collie
Càlcul 1. Parcial 2014p
Càlcul 1. Parcial 2014p
Solucions del parcial del día 9/4/2015.
Jordi Saludes
Convolution Image-based Watermarking for 2D Greyscale Image
Convolution Image-based Watermarking for 2D Greyscale Image
Watermarking technique for the image is an efficient method for protecting copyright image, and also a huge topic in cryptography. In this paper, two spread spectrum watermarking scheme, the Convolution Image-based Model (CIM) and the Exponential Convolution Image-based Model (ECIM) are going to be formulated and discussed. The watermarking experiment result will be shown and discussed, focusing on the attack scheme, protectability, and the information encryption of the watermark. We will show that the convolution image-based model for invisible watermark is weak of protectability, but it is able to hide the information (the size of watermark must be less than the original image) and store inside the image.
Homer

Related Tags

PortugueseRésumé / CVPosterNewsletterHandoutTufteBosnianResearch DiaryInternational LanguagesTikZCommentingBibliographyUniversityFontsHomework AssignmentQuiz, Test, ExamAlgorithmTablesCzechDynamic FiguresConference PaperConference PresentationElectronicsTutorialPhysicsSource Code ListingSwedishFrenchPortuguese (Brazilian)GreekGetting StartedePubEssayExamSpanishGermanLuaLaTeXBrochurePresentationAcademic JournalThesisProject / Lab ReportBookCambridge UniversityKoreanNorwegianPolishMatricesBoise State UniversityFinnishBeamerXeLaTeXArabicChartsMATLABTwo-columnUniversity of Texas at AustinRomanianUniversity of ReadingJapaneseIEEE (all)Worcester Polytechnic Institute (WPI)Universidade Federal do Rio Grande do SulVietnameseChineseFractalsIndian Institute of Technology MadrasUniversidade de São PauloCatalanCardiff UniversityFlorida State UniversityBloomsburg University of PennsylvaniaPontificia Universidad Católica de ChileRussianMoscow Aviation InstitutediacrTechResearch ProposalUniversidad Tecnológica de BolívarAmerican Physical Society (APS)PuzzleJournal of Statististical SoftwareLecture NotesUniversidad Nacional Autónoma de HondurasInstituto de Matemática e Estatística (IME-USP)DutchCheat sheetAdelphi UniversityWileyIcelandicUniversidade Federal de Ouro PretoAstronomy & AstrophysicsMasaryk UniversityWelshDePaul UniversityBahasa IndonesiaTurkishRoyal Statistical SocietySlovakUniversity of PennsylvaniaHungarianUniversity of WaterlooSociety for Industrial and Applied MathematicsTeaching Plan & SyllabusUniversity of OsloMongolianNortheastern UniversityManchester Metropolitan University