UPDATING ALGORITHMS FOR CONSTRAINT DELAUNAY TIN
|
|
- Ronald Johnston
- 5 years ago
- Views:
Transcription
1 UPDATING ALGORITMS FOR CONSTRAINT DELAUNAY TIN WU LiXin a,b WANG YanBing a, c a Institute for GIS/RS/GPS & Subsidence Engineering Research, China Uni Mining & Technology, Beijing, China, awulixin@263.net, awulixin@yahoo.com b Institute for GIS/RS/GPS & Digital Mine Research, Northeastern University, Shenyang, China, c Laboratory of 3D Information Acquisition & Alication, Caital Normal University, Beijing, China - cnuwyb@yahoo.com.cn, wybing@cumtb.edu.cn KEY WORDS: Udating Algorithm, Constraint Delaunay TIN, Integral Ear Elimination, Influence Domain Re-Triangulation, Polymorhism ABSTRACT: Present algorithms for D-TIN are far insufficient for the dynamic udating of CD-TIN in different alications. This aer, based on imrovement to resent insertion and deletion algorithms for D-TIN, a grou of algorithms for CD-TIN udating are resented. 1) According to the olymorhism of the constraints in CD-TIN, virtual oint is adoted to describe the cross between constraint edges in CD-TIN; 2) Imroved from the EE algorithm for D-TIN, an algorithm namely Integral Ear Elimination (IEE) is resented for oint deletion in CD-TIN; 3) Considering the olymorhism of constraint edges in CD-TIN, an algorithm namely Influence Domain Re-triangulation for Virtual oint (IDRVP) is also resented for deleting constraint lines. An examle is shown to test the algorithms. 1. INTRODUCTION Delaunay triangular irregular networks (D-TIN) and nonstraint delaunay triangular irregular networks (CD-TIN) are two basic concets in comutational geometry, and have many ractical alications in several fields including geograhic information systems (GIS), finite element methods (FEM), comuter grahics and 3D reconstruction (Aurenhammer, 1987; Mostafavi, et al. 2003; Zhu, 2000). The method to construct a D-TIN based on a set of given oints has been widely studied, and many construction algorithms for D-TIN were roosed, such as divide-and-conquer (Dwyer, 1987; Guibas, 1985), sweeline (Fortune, 1987), incremental (Prearata, 1985; Green, 1977; Guibas, 1992; Ohya, 1984), asymtotically otimal algorithm (Chew, 1987). Furthermore, the udating algorithms for D-TIN insertion and deletion are studied. Devillers (1999) resented ear elimination (EE) algorithm to delete single oint in 2D delaunay triangulations (DT). Mostafavi (2003) imroved the EE algorithm for deleting oint in D-TIN and Voronoi diagram. Marc (2002) resented a method for a set of oints to be dynamically udated in regular triangulations (RT). Li (2000) suggested delete some inside oints during cliing the boundary of a D-TIN. Giving a grou of endoints and some non-crossing edges to a D-TIN, a CD-TIN following the criterion of Visibility and Constraint Emty Circle is obtained (ao, 2003). The resented udating algorithms for inserting vertices and segments in CD-TIN are constraint grah algorithm (Lee, 1986), divide-and-conquer (Dwyer, 1987; Guibas, 1985), incremental (Prearata, 1985; Mostafavi, 2003) and shell triangulation (Piegl, 1993). owever, the udating of CD-TIN not only includes the insertion of contained oint and constraint edges, but also includes the deletion of constraint edges. Based on the imrovement and extension to resent algorithms, this aer roosed integral ear elimination (IEE) algorithm for oint deletion, and influence domain re-triangulation for virtual oint (IDRVP) algorithm for the insertion and deletion of constraint edges. 2 ALGORITM FOR CONSTRAINT EDGE INSERTION The insertion of constraint edges is a basic oeration for CD-TIN construction. Tsai and Vonderohe resented Convex ull algorithm that inserting constraint edges before Convex ull calculating and data dividing for D-TIN (Li, 2000). Marc (2000) imroved the asymtotically otimal algorithm for direction constraint CD-TIN construction, which recursive re-triangulated the influence domain of constraint segments. owever, the mentioned algorithms can be alied for the intersection of two intersected constraint edges. Virtual oint is introduced to solve the roblem. 2.1 The Introduction of Virtual Point If a new constraint segment A 1 intersects with A 2 in CD-TIN, the oint v of intersection would be added in A 1 and A 2 as a new oint for udating CD-TIN. The intersection oint v is called virtual oint, and it will be deleted while delete A 1 or A 2, i.e., virtual oint v is only an interolated inner oint of the constraint segments. The broken lines are comosed of several segments, and constraint olygons are comosed of constraint segments end to end. The insertion and deletion of broken lines and olygon can be conducted as segments insertion and deletion in order. 2.2 Influence Domain and CD-TIN Re-Triangulation Without the consideration for olymorhism, the influence domain re-triangulation resented by Marc (2000) for inserting constraint segments cannot be alied directly for the intersection of constraint. Based on the introduction of virtual oint, it is extended for constraint edge with olymorhism being considered. 135
2 Let, be the two endoints of constraint segment (, V), the rocedures for insertion into CD-TIN can be summarized as the following: 1) to insert constraint segment in original CD-TIN: all edges e i (i=1, 2, n) which are crossed by are saved in an edge stack. If an edge e i is a constraint segment, then e i is marked e' i and the virtual oint v i intersected between e' i and is inserted. 2) to delete all the non-constraint edges e i crossed by so that a olygon that we called Influence Domain of constraint edge without triangulation is left. Clearly, the influence domain contains some constraint edges intersected with. 3) to recursively re-triangulate the uer and lower influence domain (V Ui, V Di, i=1, 2, n) that is cut by constraint segment and e' i following constraint emty circle criterion. Figure 1 shows the insertion rocess of a constraint segment in original CD-TIN. For the intersection of constraint segment, and, the intersecting oint and are interolated into as virtual oints so that is comosed of three constraint segments, and. To search all the edges crossed by and to remove all the non-constraint edges to form the influence domain olygon, and then to re-triangulate the uer and lower olygons (V Ui, V Di, i=1, 2, 6) cut by, and. In each recursive re-triangulation, the emty circle criterion with resect to the bounding oints of the olygon is tested, and the constraint segments,,,,,, is visible. ence, anyone of the olygons is re-triangulated according to the constraint emty circle criterion. V U2 V U3 V D2 V D3 6 V U1 1 V D1 Figure 1. Virtual oint insertion and re-triangulation. original CD-TIN before inserting constrained edge. Influence domain of and the intersect oint between and other constrained edges. udated CD-TIN after inserting constrained edge. The interior of the influence domain V Ui and V Di are re-triangulated by using of recursive algorithm ( as in figure 2). As for the re-triangulation of V U1, the triangulation of V U1 must contain a triangle with constraint segment being its edges. The recursive algorithm searches a oint ' 0 in the bounding of V U1 that forms a triangle T (,, ' 0 ) with vertices,. The triangle meets the constraint emty circle criterion, that is to say, the circumcircle of T (,, ' 0 ) cannot contain any oint of V U1 excet for its three vertices. After inserting T (,, ' 0 ), the V U1 is divided into two sub-domains, F E (, ' 1, ' 0 ) and F D (' 0, ' i,, ). To aly the algorithm recursively to re-triangulate the sub-domains of F E and F D until the entire domain be triangulated. ' 1 F E ' 2 ' i ' i+1 ' 0 F D V U1 Figure 2. The reconstruct of influence domain 3. ALGORITM FOR CONSTRAINT POINT DELETION oints in CD-TIN must take the constraint edges into consideration. In other words, the oint to be deleted refers to both non-constraint oint and constraint oint. To delete a non-constraint oint, there may be constraint edges, which should be ket invariable during fliing edges, in the influence domain boundary of this oint. While to delete a constraint oint, the constraint segment that contains the oint would be deleted while the other endoint of this segment should ket be invariable. 3.1 Integral Ear Elimination (IEE) Algorithms The first rocess of non-constraint oint deletion can be shown in figure 3, where is a non-constraint oint and is a constraint segment. When deleting, is one edge of the influence domain boundary of, and the constraint roerty of must be ket in re-triangulating the influence domain. owever, the deletion of constraint oint is different as in figure 4, where the constraint segment must be deleted and kee oint invariable. Furthermore, a constraint condition is reduced because of the deletion of, and the diagonal fliing test has to be done according to constraint Delaunay criterion for. As comared to the oint deletion in D-TIN, the deletion of 136
3 Figure 3. Deletion of non-constraint oint 7 7 Figure 4. Deletion of constraint oint q 3.2 Integral Ear Elimination (IEE) Algorithm Integral ear elimination (IEE) algorithm must not only meet Delaunay criterion, but also kee toological comleteness. The rocedures are: 1) to search the influence domain of oint to be deleted, and to identify whether is constraint or not; 2) to select three oints in the boundary of as a otential triangle T so as to test if it is an ear or not. If T is an ear, to fli the diagonals of quadrilateral formed by T and and to delete T; if not, to return to the second ste. Note that in the ste of fliing diagonal, it is needed to test the ear and its adjoining triangles referring to constraint emty criterion if is constraint. Let CD-TIN grah be G = (V { }, A), to delete. The algorithm goes as in the following: 1) to identify and the other constraint oint ' connected with along the constraint segment (as in Figure 4) if oint to be deleted is a constraint oint, else go to next ste. 2) to search out all the oints {,, n-1, n } connected with to form the influence domain = {,, n-1, n = } of in anticlockwise order. 3) to check if T( i, i+1, i+2 ) is an ear. Each trile of oints of is considered as a otential ear T( i, i+1, i+2 ). If T meets any one of the following conditions: a) D( i, i+1, i+2 ) is negative (means that T forms a re-entrant, not an ear, of the olygon formed by the adjoining of ); b) D( i, i+2, ) is negative (means that T encloses ) and c) ( i, i+1, i+2, j ) is ositive (means that one or more remaining oints j of fall inside the circumcircle of T), T is not an ear and is rejected immediately. If T meets all of these conditions, T is an ear, and may be removed by switching the diagonals i+1 and i i+2 of quadrilateral formed by T and. 4) if the oint i+1 of T( i, i+1, i+2 ) equal to ', e.g., i+1 =' (means that i+1 ' is a constraint segment), it is needed to test whether T meets the constraint emty circle criterion. That is to say, if another oint q of the triangles adjoining to segment i i+1 or i+1 i+2 is in the circumcircle of T, it is needed to switch the diagonals of quadrilateral formed by T and q (as in figure 4). 5) to reeat ste) and ste) until only three adjoining oints in remained, in which case the three oints are merged into one triangle and is deleted. 4. ALGORITM FOR CONSTRAINT EDGE DELETION The deletion of constraint edge in CD-TIN is an inverse oeration of constraint edge insertion, i.e. to remove all the segments of the constraint edge one by one. If delete a constraint edge with a virtual oint, the deletion must meet the constraint emty circle criterion, and another constraint edge crossing the virtual oint cannot be deleted in considering the toological comleteness of CD-TIN. Therefore, the deletion of constraint edge falls into two kinds of situations that with virtual oint or without virtual oint. 4.1 Constraint Edge Deletion without Virtual Point If there is no virtual oint in constraint edge, the constraint oint of this edge can be deleted one by one by using of IEE algorithm (as in figure 5). Figure 5. To delete constraint edges without virtual oint delete constraint broken line ; delete constraint triangular T( ); the reconstructed CD-TIN 137
4 4.2 Constraint Edge Deletion with Virtual oint If there is virtual oint in the edge, another algorithm called influence domain re-triangulation for virtual oint (IDRVP) is resented. Given a CD-TIN grah G={V, A A'}, to delete a constraint edge C with virtual oint v. Firstly, the influence domain of v is searched out, which is a olygon of the boundary of all the triangles connected with v. Secondly, is divided into two arts, L and R, by the other constraint edge C i crossing v. Thirdly, L and R are re-triangulated individually referring to the constraint emty circle criterion. Finally, the virtual oint v is deleted. As shown in figure 6, is a constraint edge to be deleted, and are two oints where ' 1 ' 2 and ' 3 ' 4 intersected with. Edge is comosed of three constraint segments, and. When delete, and will be deleted too, but ' 1 ' 2 and ' 3 ' 4 are left in the CD-TIN. The detailed oerations are: 1) to delete the constraint oint and by using of IEE algorithm, and the constraint segments and will be deleted simultaneously (as in figure 6a); 2) to search the influence domain of and to divide it into two arts L and R by ' 1 ' 2, and then L and R are re-triangulated individually, and to delete (as in figure 6b); 3) to reeat ste) to delete. Finally, a new CD-TIN is constructed where the constraint edge is deleted (Figure 6c). ' 3 ' 1 ' 3 ' 1 ' 3 ' 1 ' 4 ' 2 ' 4 ' 2 ' 4 ' 2 Figure 6. To delete constraint edges with virtual oint the original CD-TIN and constraint edge with virtual oints and ; the reconstructed CD-TIN after deleting constraint oints, ; the final CD-TIN after deleting virtual oints and. The algorithm rocedures for the deletion of constraint edges are as in the following: 1) to search all the segments e i (i=1,2, n-1) of constraint edge C = { n }; 2) to identify the constraint oints i (i=1,2, n) and virtual oints ' j (j=1,2, m) and to store it into two oint lists L C and L V ; 3) to delete all the oints i (i=0,1, n) in L C by of using IEE algorithms; 4) to delete all the oints ' j (j=0,1, m) in L V by using of IDRVP algorithms. 5. A CASE FOR ALGORITMS TESTING A rototye system with VC++ is develoed to test roerties of the algorithms. Figure 7 shows the test results for shae reconstruction, where the dynamic deletion and insertion of constraint edges in CD-TIN is illustrated with the letters modification for RS to GIS. Shae of letter RS as constraint edge Delete R and insert GI as constraint edge Figure 7. The shae reconstruction with dynamic deletion and insertion of letters in a CD-TIN 6. CONCLUSION The CD-TIN is a widely used structure in GIS and comuter geometry, and the insertion and deletion oeration of oints and constraint edges are the basis of CD-TIN dynamic udating. By introducing virtual oint, this aer has made imrovements and extensions to resent udating algorithms for D-TIN and had reached a grou of new algorithms in consideration of olymorhism. The new algorithms include the integral ear elimination (IEE) algorithms for constraint oint deletion in CD-TIN and the influence domain re-triangulation for virtual oint (IDRVP) algorithms for constraint edge deletion in CD-TIN. The test shows that the algorithms are efficient and could be widely alied for the udating of DEM, DTM and other integral vector models of digital city and digital mine. 138
5 ACKNOWLEDGMENTS The author is grateful for the jointly suort of the National Outstanding Youth Funds of China (No ), the National Natural Science Funds of China (No ), National igh-tech Project (No.2006AA12Z216) and the Science Develoment Plan Awarded by Beijing Municial Commission of Education Science (No. KM ). REFERENCES Aurenhammer, F., 1987, Power diagrams: criterion algorithms and alications. SIAM Journal of Comuting, 16: Chew, L. P., 1987, Constraint Delaunay Triangulations. In: Proceedings of the Annual Symosium on Comutational Geometry ACM: Devillers, O., 1999, On deletion in Delaunay triangulations. In: 15th Annual ACM Symosium on Comutational Geometry: Dwyer, R. A., 1987, A fast divide-and-conquer algorithm for constructing delaunay triangulations. Algorithmica, 2: Fortune, S., 1987, A Sweeline Algorithm for Voronoi Diagrams. Algorithmica, 2: Green, E., R. Sibson, 1977, Comuting Dirichlet tessellations in the lane, Comut. J. 21: Guibas, L., D. Knuth, M. Sharir, 1992, Randomized incremental construction of Delaunay and Voronoi diagrams, Algorithmica. 7: Guibas, L., J. Stolfi, 1985, Primitives for the maniulation of general subdivisions and the comutation of Voronoi diagrams, ACM Trans. Grahics. 4 (2): ao,. S., Wu LiXin, 2003, 3D-Geosciences Modeling and Visualization Based on Strongly Constraint Delaunay TIN. Geograhy and Geo-Information Science(in Chinese), 19(2): Lee, D. T., Lin. K., 1986, Genaeralized Delaunay Triangulation for lanar grahs. Discrete Comutational Geometry. 1: Li, Z. L., Zhu Qing, 2000, Digital Elevation Model (in Chinese). Wuhan, Wuhan Surveying And Maing University Press. Marc, V., Nuria Pla., 2000, Comuting directional constraint Delaunay triangulations. Comuters & Grahics, 24: Marc, V., Núria Pla, Jose Cotrina., 2002, Regular triangulations of dynamic sets of oints. Comuter Aided Geometric Design, 19: Mostafavi, M. A., Christoher Gold, Maciej Dakowicz, 2003, Deletion and insert oerations in Voronoi/Delaunay methods and alications. Comuters & Geosciences, 23: Ohya, T., M. Iri and K. Murota, 1984, Imrovements of the incremental method for the Voronoi diagram with comutational comarison of various algorithms, J. Oer. Res. Soc. Jaan 27: Piegl, L. A., Arnaud M. Richard, 1993, Algorithm and Data Structure for Triangulation Multily Connected Polygonal Domains [J]. Comuter and Grahics, 17(5): Prearata, F. P., Shamos M. I., (editors), 1985, Comutational Geometry, An Introduction. (New Yerk: Sringer-Verlag). Zhu, X. X., 2000, Free curved lines and face modeling technology(in Chinese). Beijing, Science Press,
We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points.
Voronoi Diagram and Delaunay Triangulation 1 Introduction The Voronoi Diagram (VD, for short) is a ubiquitious structure that aears in a variety of discilines - biology, geograhy, ecology, crystallograhy,
More informationCross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1,
CHAPTER 33 Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter
More informationThe Edge-flipping Distance of Triangulations
The Edge-fliing Distance of Triangulations Sabine Hanke (Institut für Informatik, Universität Freiburg, Germany hanke@informatik.uni-freiburg.de) Thomas Ottmann (Institut für Informatik, Universität Freiburg,
More informationConstrained Empty-Rectangle Delaunay Graphs
CCCG 2015, Kingston, Ontario, August 10 12, 2015 Constrained Emty-Rectangle Delaunay Grahs Prosenjit Bose Jean-Lou De Carufel André van Renssen Abstract Given an arbitrary convex shae C, a set P of oints
More informationImage Segmentation Using Topological Persistence
Image Segmentation Using Toological Persistence David Letscher and Jason Fritts Saint Louis University Deartment of Mathematics and Comuter Science {letscher, jfritts}@slu.edu Abstract. This aer resents
More informationStudy on Delaunay Triangulation with the Islets Constraints
Intelligent Information Management, 2010, 2, 375-379 doi:10.4236/iim.2010.26045 Published Online June 2010 (http://www.scirp.org/journal/iim) Study on Delaunay Triangulation with the Islets Constraints
More informationAn improved algorithm for Hausdorff Voronoi diagram for non-crossing sets
An imroved algorithm for Hausdorff Voronoi diagram for non-crossing sets Frank Dehne, Anil Maheshwari and Ryan Taylor May 26, 2006 Abstract We resent an imroved algorithm for building a Hausdorff Voronoi
More informationLecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)
Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual
More informationCross products Line segments The convex combination of two distinct points p
CHAPTER Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter
More informationTexture Mapping with Vector Graphics: A Nested Mipmapping Solution
Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie
More informationLecture 2: Fixed-Radius Near Neighbors and Geometric Basics
structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric
More informationCOT5405: GEOMETRIC ALGORITHMS
COT5405: GEOMETRIC ALGORITHMS Objects: Points in, Segments, Lines, Circles, Triangles Polygons, Polyhedra R n Alications Vision, Grahics, Visualizations, Databases, Data mining, Networks, GIS Scientific
More informationConvex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101
Convex Hulls Helen Cameron Helen Cameron Convex Hulls 1/101 What Is a Convex Hull? Starting Point: Points in 2D y x Helen Cameron Convex Hulls 3/101 Convex Hull: Informally Imagine that the x, y-lane is
More informationAUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY
AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com
More informationUsing Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification
Using Rational Numbers and Parallel Comuting to Efficiently Avoid Round-off Errors on Ma Simlification Maurício G. Grui 1, Salles V. G. de Magalhães 1,2, Marcus V. A. Andrade 1, W. Randolh Franklin 2,
More informationAn Efficient Coding Method for Coding Region-of-Interest Locations in AVS2
An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China
More informationGrouping of Patches in Progressive Radiosity
Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate
More informationlevel 0 level 1 level 2 level 3
Communication-Ecient Deterministic Parallel Algorithms for Planar Point Location and 2d Voronoi Diagram? Mohamadou Diallo 1, Afonso Ferreira 2 and Andrew Rau-Chalin 3 1 LIMOS, IFMA, Camus des C zeaux,
More informationA Morphological LiDAR Points Cloud Filtering Method based on GPGPU
A Morhological LiDAR Points Cloud Filtering Method based on GPGPU Shuo Li 1, Hui Wang 1, Qiuhe Ma 1 and Xuan Zha 2 1 Zhengzhou Institute of Surveying & Maing, No.66, Longhai Middle Road, Zhengzhou, China
More informationCurve Reconstruction taken from [1]
Notes by Tamal K. Dey, OSU 47 Curve Reconstruction taken from [1] The simlest class of manifolds that ose nontrivial reconstruction roblems are curves in the lane. We will describe two algorithms for curve
More informationSwift Template Matching Based on Equivalent Histogram
Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:
More informationCMSC 754 Computational Geometry 1
CMSC 754 Comutational Geometry 1 David M. Mount Deartment of Comuter Science University of Maryland Fall 2002 1 Coyright, David M. Mount, 2002, Det. of Comuter Science, University of Maryland, College
More informationTHE COMPARISON OF DRAINAGE NETWORK EXTRACTION BETWEEN SQUARE AND HEXAGONAL GRID-BASED DEM
The International Archives of the Photogrammetry, Remote Sensing and Satial Information Sciences, Volume XLII-4, 208 ISPRS TC IV Mid-term Symosium 3D Satial Information Science The Engine of Change, 5
More informationDYNAMIC CARTOGRAPHY USING VORONOI/DELAUNAY METHODS
DYNAMIC CARTOGRAPHY USING VORONOI/DELAUNAY METHODS Chris Gold, Maciej Dakowicz Department of Computing and Mathematics, University of Glamorgan, Pontypridd, Wales, CF37 1DL, UK cmgold@glam.ac.uk; mdakowic@glam.ac.uk
More informationEarthenware Reconstruction Based on the Shape Similarity among Potsherds
Original Paer Forma, 16, 77 90, 2001 Earthenware Reconstruction Based on the Shae Similarity among Potsherds Masayoshi KANOH 1, Shohei KATO 2 and Hidenori ITOH 1 1 Nagoya Institute of Technology, Gokiso-cho,
More informationA Novel Iris Segmentation Method for Hand-Held Capture Device
A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,
More informationA Model-Adaptable MOSFET Parameter Extraction System
A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313
More informationSpace-efficient Region Filling in Raster Graphics
"The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich
More informationCENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE
CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,
More informationKinetic Voronoi/Delaunay Drawing Tools
Kinetic Voronoi/Delaunay Drawing Tools Chris Gold and Maciej Dakowicz School of Computing University of Glamorgan Pontypridd, Wales, CF37 1DL, UK cmgold@glam.ac.uk; mdakowic@glam.ac.uk Abstract We describe
More informationsplit split (a) (b) split split (c) (d)
International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering
More informationA Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems
A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,
More informationComputing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll
Reort No. 94.60 A new Linear Time Algorithm for Comuting the Convex Hull of a Simle Polygon in the Plane by W. Hochstattler, S. Kromberg, C. Moll 994 W. Hochstattler, S. Kromberg, C. Moll Universitat zu
More informationCS335 Fall 2007 Graphics and Multimedia. 2D Drawings: Lines
CS335 Fall 007 Grahics and Multimedia D Drawings: Lines Primitive Drawing Oerations Digital Concets of Drawing in Raster Arras PIXEL is a single arra element at x, - No smaller drawing unit exists Px,
More informationCOMPUTING CONSTRAINED DELAUNAY
COMPUTING CONSTRAINED DELAUNAY TRIANGULATIONS IN THE PLANE By Samuel Peterson, University of Minnesota Undergraduate The Goal The Problem The Algorithms The Implementation Applications Acknowledgments
More informationImproved Symmetric Lists
Imroved Symmetric Lists Prerint February, 24 Christian Bachmaier and Marcus Raitner University of Passau, 943 Passau, Germany {bachmaier,raitner}@fmi.uni-assau.de Abstract. We introduce a new data structure
More information2010 First International Conference on Networking and Computing
First International Conference on Networking and Comuting Imlementations of Parallel Comutation of Euclidean Distance Ma in Multicore Processors and GPUs Duhu Man, Kenji Uda, Hironobu Ueyama, Yasuaki Ito,
More informationA navigation mesh for dynamic environments
COMPUTER ANIMATION AND VIRTUAL WORLDS Com. Anim. Virtual Worlds 2012; 23:535 546 Published online 12 June 2012 in Wiley Online Library (wileyonlinelibrary.com)..1468 SPECIAL ISSUE PAPER A navigation mesh
More informationA CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH
A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu
More information521493S Computer Graphics Exercise 3 (Chapters 6-8)
521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of
More informationEE678 Application Presentation Content Based Image Retrieval Using Wavelets
EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective
More informationSilvania Avelar, Matthias Muller. Swiss Federal Institute of Technology Zurich, Switzerland. Abstract
Generating Toologically Correct Schematic Mas Silvania Avelar, Matthias Muller Deartment of Comuter Science Swiss Federal Institute of Technology 8092 Zurich, Switzerland favelar,muellermg@inf.ethz.ch
More informationRecognizing Convex Polygons with Few Finger Probes
Pattern Analysis and Alications manuscrit No. (will be inserted by the editor) Recognizing Convex Polygons with Few Finger Probes Sumanta Guha Kiêu Trọng Khánh Received: date / Acceted: date Abstract The
More informationA Simple and Robust Approach to Computation of Meshes Intersection
A Simle and Robust Aroach to Comutation of Meshes Intersection Věra Skorkovská 1, Ivana Kolingerová 1 and Bedrich Benes 2 1 Deartment of Comuter Science and Engineering, University of West Bohemia, Univerzitní
More informationSensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network
1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann
More informationCS 532: 3D Computer Vision 14 th Set of Notes
1 CS 532: 3D Computer Vision 14 th Set of Notes Instructor: Philippos Mordohai Webpage: www.cs.stevens.edu/~mordohai E-mail: Philippos.Mordohai@stevens.edu Office: Lieb 215 Lecture Outline Triangulating
More information3D Surface Simplification Based on Extended Shape Operator
3D Surface Simlification Based on Extended Shae Oerator JUI-LIG TSEG, YU-HSUA LI Deartment of Comuter Science and Information Engineering, Deartment and Institute of Electrical Engineering Minghsin University
More informationDeformable Free Space Tilings for Kinetic Collision Detection
Deformable Free Sace Tilings for Kinetic Collision Detection Pankaj K. Agarwal Julien Basch Leonidas J. Guibas John Hershberger Li Zhang Abstract We resent kinetic data structures for detecting collisions
More informationCompatible 4-Holes in Point Sets
CCCG 2018, Winnieg, Canada, August 8 10, 2018 Comatible 4-Holes in Point Sets Ahmad Biniaz Anil Maheshwari Michiel Smid Abstract Counting interior-disjoint emty convex olygons in a oint set is a tyical
More informationDistributed Estimation from Relative Measurements in Sensor Networks
Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.
More informationComputational Geometry: Proximity and Location
63 Comutational Geometry: Proximity and Location 63.1 Introduction Proximity and location are fundamental concets in geometric comutation. The term roximity refers informally to the uality of being close
More informationGeometric Dilation. A polygonal chain C. detour of C on the pair (p, q): where C q p the path on C connecting p and q. detour of C
Geometric Dilation A olygonal chain C detour of C on the air (, ): δ(, ) = C, where C the ath on C connecting and. detour of C δ C = max, C δ(, ). More general: A connected lanar grah G(V, E) Gemetric
More informationEfficient Parallel Hierarchical Clustering
Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore
More informationAN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS
AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)
More informationThe Spatial Skyline Queries
The Satial Skyline Queries Mehdi Sharifzadeh Comuter Science Deartment University of Southern California Los Angeles, CA 90089-078 sharifza@usc.edu Cyrus Shahabi Comuter Science Deartment University of
More informationCMSC 425: Lecture 16 Motion Planning: Basic Concepts
: Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).
More informationConstruction Of The Constrained Delaunay Triangulation Of A Polygonal Domain
Construction Of The Constrained Delaunay Triangulation Of A Polygonal Domain Reinhard Klein 1 A fast and easy to implement divide-and-conquer algorithm is presented for the construction of the Constrained
More informationThe Spatial Skyline Queries
Coffee sho The Satial Skyline Queries Mehdi Sharifzadeh and Cyrus Shahabi VLDB 006 Presented by Ali Khodaei Coffee sho Three friends Coffee sho Three friends Don t choose this lace is closer to each three
More informationGraduate Algorithms CS F-19 Computational Geometry
Graduate Algorithms CS673-016F-19 Comutational Geometry David Galles Deartment of Comuter Science University of San Francisco 19-0: Cross Products Given any two oints 1 = (x 1,y 1 ) and = (x,y ) Cross
More informationFundamentals of Restricted-Orientation Convexity
Fundamentals of Restricted-Orientation Convexity Eugene Fink Derick Wood Abstract A restricted-orientation convex set, also called an O-convex set, is a set of oints whose intersection with lines from
More informationarxiv: v1 [math.gt] 1 May 2018
CIRCUIT PRESENTATION AND LATTICE STICK NUMBER WITH EXACTLY 4 z-sticks HYOUNGJUN KIM AND SUNGJONG NO arxiv:805.0023v [math.gt] May 208 Abstract. The lattice stick number s L(L) of a link L is defined to
More informationApplying the fuzzy preference relation to the software selection
Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN
More informationIMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model
IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,
More informationTHE METHODS OF TRIANGULATION
THE METHODS OF TRIANGULATION Abstract M. Varshosaz, Assistant Professor, Faculty of Geodesy & Geomatics Eng., K.N. Toosi University of Technology K.N. Toosi University of Technology, Vali_Asr St, Tehran,
More informationCS 428: Fall Introduction to. Geometric Transformations. Andrew Nealen, Rutgers, /15/2010 1
CS 428: Fall 21 Introduction to Comuter Grahics Geometric Transformations Andrew Nealen, Rutgers, 21 9/15/21 1 Toic overview Image formation and OenGL (last week) Modeling the image formation rocess OenGL
More informationI ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ).
1 I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). Data structures Sorting Binary heas are imlemented using a hea-ordered balanced binary tree. Binomial heas use a collection
More informationAn empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs
An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science
More informationBrief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION
IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE
More informationA BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION
Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University
More informationHigh Order Accurate Curved-element Implementation in OpenFOAM for Discontinuous Galerkin Method
,.47-52 htt://dx.doi.org/10.14257/astl.2016.142.08 High Order Accurate Curved-element Imlementation in OenFOAM for Discontinuous Galerkin Method Li-Yang Xu 1, Shuai Ye 1, Yong-Quan Feng 1, Hao Li 1, Xin-Hai
More informationBuilding Polygonal Maps from Laser Range Data
ECAI Int. Cognitive Robotics Worksho, Valencia, Sain, August 2004 Building Polygonal Mas from Laser Range Data Longin Jan Latecki and Rolf Lakaemer and Xinyu Sun and Diedrich Wolter Abstract. This aer
More informationChapter 3: Graphics Output Primitives. OpenGL Line Functions. OpenGL Point Functions. Line Drawing Algorithms
Chater : Grahics Outut Primitives Primitives: functions in grahics acage that we use to describe icture element Points and straight lines are the simlest rimitives Some acages include circles, conic sections,
More informationNew Results on Abstract Voronoi Diagrams
New Results on Abstract Voronoi Diagrams Dissertation Zur Erlangung des Doktorgrades (Dr. rer. nat.) der Mathematisch-Naturwissenschaftlichen Fakultät der Rheinischen Friedrich-Wilhelms-Universität Bonn
More informationEfficient Algorithms for Computing Conservative Portal Visibility Information
EUROGRAPHICS 2000 / M. Gross and F.R.A. Hogood (Guest Editors) Volum9 (2000), Number 3 Efficient Algorithms for Comuting Conservative Portal Visibility Information W. F. H. Jiménez, C. Eserança and A.
More informationShape from Second-bounce of Light Transport
Shae from Second-bounce of Light Transort Siying Liu 1, Tian-Tsong Ng 1, and Yasuyuki Matsushita 2 1 Institute for Infocomm Research Singaore 2 Microsoft Research Asia Abstract. This aer describes a method
More information13.472J/1.128J/2.158J/16.940J COMPUTATIONAL GEOMETRY
13.472J/1.128J/2.158J/16.940J COMPUTATIONAL GEOMETRY Lecture 23 Dr. W. Cho Prof. N. M. Patrikalakis Copyright c 2003 Massachusetts Institute of Technology Contents 23 F.E. and B.E. Meshing Algorithms 2
More informationConstrained Path Optimisation for Underground Mine Layout
Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground
More informationTriangulation Based Volume Calculation Andrew Y.T Kudowor and George Taylor Department of Geomatics University of Newcastle
Triangulation Based Volume Calculation Andrew Y.T Kudowor and George Taylor Department of Geomatics University of Newcastle ABSTRACT Delaunay triangulation is a commonly used method for generating surface
More informationThe degree constrained k-cardinality minimum spanning tree problem: a lexisearch
Decision Science Letters 7 (2018) 301 310 Contents lists available at GrowingScience Decision Science Letters homeage: www.growingscience.com/dsl The degree constrained k-cardinality minimum sanning tree
More informationDirected File Transfer Scheduling
Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was
More informationStereo Disparity Estimation in Moment Space
Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University
More informationNode Filtering and Face Routing for Sensor Network
UNLV Theses, Dissertations, Professional Paers, and Castones 8-1-2012 Node Filtering and Face Routing for Sensor Network Umang Amatya University of Nevada, Las Vegas, umangama@hotmail.com Follow this and
More informationVehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments
Proceedings of 0 4th International Conference on Machine Learning and Comuting IPCSIT vol. 5 (0) (0) IACSIT Press, Singaore Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments
More informationAn Efficient Video Program Delivery algorithm in Tree Networks*
3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh
More informationShuigeng Zhou. May 18, 2016 School of Computer Science Fudan University
Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions
More informationSurface Contents Author Index
Surface Contents Author Index Christopher Gold, Maciek Dakowicz & Rebecca Tse VISUALIZATION AND DECISION SUPPORT FOR WATERSHED MANAGEMENT Christopher Gold, Maciek Dakowicz and Rebecca Tse Hong Kong Polytechnic
More informationChapter 8: Adaptive Networks
Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and
More informationRelations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.
Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may
More informationMETHOD OF LANDSLIDE MEASUREMENT BY GROUND BASED LIDAR
METHOD OF LANDSLIDE MEASUREMENT BY GROUND BASED LIDAR Ryo INADA* and Masataka TAKAGI** Kochi University of Technology, Kami-shi, Kochi, 782-8502, Jaan *135082@gs.kochi-tech.ac.j **takagi.masataka@kochi-tech.ac.j
More informationBUILDING RECONSTRUCTION USING LIDAR DATA
BUILDING RECONSTRUCTION USING LIDAR DATA R. O.C. Tse, M. Dakowicz, C.M. Gold, and D.B. Kidner GIS Research Centre, School of Computing, University of Glamorgan, Pontypridd, CF37 1DL, Wales, UK. rtse@glam.ac.uk,mdakowic@glam.ac.uk,cmgold@glam.ac.uk,
More informationWeek 8 Voronoi Diagrams
1 Week 8 Voronoi Diagrams 2 Voronoi Diagram Very important problem in Comp. Geo. Discussed back in 1850 by Dirichlet Published in a paper by Voronoi in 1908 3 Voronoi Diagram Fire observation towers: an
More informationLearning Motion Patterns in Crowded Scenes Using Motion Flow Field
Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical
More informationVoronoi Diagrams and Delaunay Triangulation slides by Andy Mirzaian (a subset of the original slides are used here)
Voronoi Diagrams and Delaunay Triangulation slides by Andy Mirzaian (a subset of the original slides are used here) Voronoi Diagram & Delaunay Triangualtion Algorithms Divide-&-Conquer Plane Sweep Lifting
More informationLecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.
U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture
More informationHow Do Computers Solve Geometric Problems? Sorelle Friedler, University of Maryland - College Park
How Do Computers Solve Geometric Problems? Sorelle Friedler, University of Maryland - College Park http://www.cs.umd.edu/~sorelle Outline Introduction Algorithms Computational Geometry Art Museum Problem
More informationGRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL
GRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL Noha El Zehiry 1,2, Steve Xu 2, Prasanna Sahoo 2 and Adel Elmaghraby 1 1 Deartment of Comuter Engineering and Comuter Science, University of Louisville,
More informationEFFICIENT STOCHASTIC GRADIENT SEARCH FOR AUTOMATIC IMAGE REGISTRATION
ISSN 76-459 Int j simul model 6 (7), 4-3 Original scientific aer EFFICIENT STOCHASTIC GRADIENT SEARCH FOR AUTOMATIC IMAGE REGISTRATION Li, Q.; Sato, I. & Murakami, Y. GSJ/AIST - National Institute of Advanced
More informationBayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1
Bayesian Oil Sill Segmentation of SAR Images via Grah Cuts 1 Sónia Pelizzari and José M. Bioucas-Dias Instituto de Telecomunicações, I.S.T., TULisbon,Lisboa, Portugal sonia@lx.it.t, bioucas@lx.it.t Abstract.
More informationEfficient Processing of Top-k Dominating Queries on Multi-Dimensional Data
Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of
More information