UPDATING ALGORITHMS FOR CONSTRAINT DELAUNAY TIN

Size: px
Start display at page:

Download "UPDATING ALGORITHMS FOR CONSTRAINT DELAUNAY TIN"

Transcription

1 UPDATING ALGORITMS FOR CONSTRAINT DELAUNAY TIN WU LiXin a,b WANG YanBing a, c a Institute for GIS/RS/GPS & Subsidence Engineering Research, China Uni Mining & Technology, Beijing, China, awulixin@263.net, awulixin@yahoo.com b Institute for GIS/RS/GPS & Digital Mine Research, Northeastern University, Shenyang, China, c Laboratory of 3D Information Acquisition & Alication, Caital Normal University, Beijing, China - cnuwyb@yahoo.com.cn, wybing@cumtb.edu.cn KEY WORDS: Udating Algorithm, Constraint Delaunay TIN, Integral Ear Elimination, Influence Domain Re-Triangulation, Polymorhism ABSTRACT: Present algorithms for D-TIN are far insufficient for the dynamic udating of CD-TIN in different alications. This aer, based on imrovement to resent insertion and deletion algorithms for D-TIN, a grou of algorithms for CD-TIN udating are resented. 1) According to the olymorhism of the constraints in CD-TIN, virtual oint is adoted to describe the cross between constraint edges in CD-TIN; 2) Imroved from the EE algorithm for D-TIN, an algorithm namely Integral Ear Elimination (IEE) is resented for oint deletion in CD-TIN; 3) Considering the olymorhism of constraint edges in CD-TIN, an algorithm namely Influence Domain Re-triangulation for Virtual oint (IDRVP) is also resented for deleting constraint lines. An examle is shown to test the algorithms. 1. INTRODUCTION Delaunay triangular irregular networks (D-TIN) and nonstraint delaunay triangular irregular networks (CD-TIN) are two basic concets in comutational geometry, and have many ractical alications in several fields including geograhic information systems (GIS), finite element methods (FEM), comuter grahics and 3D reconstruction (Aurenhammer, 1987; Mostafavi, et al. 2003; Zhu, 2000). The method to construct a D-TIN based on a set of given oints has been widely studied, and many construction algorithms for D-TIN were roosed, such as divide-and-conquer (Dwyer, 1987; Guibas, 1985), sweeline (Fortune, 1987), incremental (Prearata, 1985; Green, 1977; Guibas, 1992; Ohya, 1984), asymtotically otimal algorithm (Chew, 1987). Furthermore, the udating algorithms for D-TIN insertion and deletion are studied. Devillers (1999) resented ear elimination (EE) algorithm to delete single oint in 2D delaunay triangulations (DT). Mostafavi (2003) imroved the EE algorithm for deleting oint in D-TIN and Voronoi diagram. Marc (2002) resented a method for a set of oints to be dynamically udated in regular triangulations (RT). Li (2000) suggested delete some inside oints during cliing the boundary of a D-TIN. Giving a grou of endoints and some non-crossing edges to a D-TIN, a CD-TIN following the criterion of Visibility and Constraint Emty Circle is obtained (ao, 2003). The resented udating algorithms for inserting vertices and segments in CD-TIN are constraint grah algorithm (Lee, 1986), divide-and-conquer (Dwyer, 1987; Guibas, 1985), incremental (Prearata, 1985; Mostafavi, 2003) and shell triangulation (Piegl, 1993). owever, the udating of CD-TIN not only includes the insertion of contained oint and constraint edges, but also includes the deletion of constraint edges. Based on the imrovement and extension to resent algorithms, this aer roosed integral ear elimination (IEE) algorithm for oint deletion, and influence domain re-triangulation for virtual oint (IDRVP) algorithm for the insertion and deletion of constraint edges. 2 ALGORITM FOR CONSTRAINT EDGE INSERTION The insertion of constraint edges is a basic oeration for CD-TIN construction. Tsai and Vonderohe resented Convex ull algorithm that inserting constraint edges before Convex ull calculating and data dividing for D-TIN (Li, 2000). Marc (2000) imroved the asymtotically otimal algorithm for direction constraint CD-TIN construction, which recursive re-triangulated the influence domain of constraint segments. owever, the mentioned algorithms can be alied for the intersection of two intersected constraint edges. Virtual oint is introduced to solve the roblem. 2.1 The Introduction of Virtual Point If a new constraint segment A 1 intersects with A 2 in CD-TIN, the oint v of intersection would be added in A 1 and A 2 as a new oint for udating CD-TIN. The intersection oint v is called virtual oint, and it will be deleted while delete A 1 or A 2, i.e., virtual oint v is only an interolated inner oint of the constraint segments. The broken lines are comosed of several segments, and constraint olygons are comosed of constraint segments end to end. The insertion and deletion of broken lines and olygon can be conducted as segments insertion and deletion in order. 2.2 Influence Domain and CD-TIN Re-Triangulation Without the consideration for olymorhism, the influence domain re-triangulation resented by Marc (2000) for inserting constraint segments cannot be alied directly for the intersection of constraint. Based on the introduction of virtual oint, it is extended for constraint edge with olymorhism being considered. 135

2 Let, be the two endoints of constraint segment (, V), the rocedures for insertion into CD-TIN can be summarized as the following: 1) to insert constraint segment in original CD-TIN: all edges e i (i=1, 2, n) which are crossed by are saved in an edge stack. If an edge e i is a constraint segment, then e i is marked e' i and the virtual oint v i intersected between e' i and is inserted. 2) to delete all the non-constraint edges e i crossed by so that a olygon that we called Influence Domain of constraint edge without triangulation is left. Clearly, the influence domain contains some constraint edges intersected with. 3) to recursively re-triangulate the uer and lower influence domain (V Ui, V Di, i=1, 2, n) that is cut by constraint segment and e' i following constraint emty circle criterion. Figure 1 shows the insertion rocess of a constraint segment in original CD-TIN. For the intersection of constraint segment, and, the intersecting oint and are interolated into as virtual oints so that is comosed of three constraint segments, and. To search all the edges crossed by and to remove all the non-constraint edges to form the influence domain olygon, and then to re-triangulate the uer and lower olygons (V Ui, V Di, i=1, 2, 6) cut by, and. In each recursive re-triangulation, the emty circle criterion with resect to the bounding oints of the olygon is tested, and the constraint segments,,,,,, is visible. ence, anyone of the olygons is re-triangulated according to the constraint emty circle criterion. V U2 V U3 V D2 V D3 6 V U1 1 V D1 Figure 1. Virtual oint insertion and re-triangulation. original CD-TIN before inserting constrained edge. Influence domain of and the intersect oint between and other constrained edges. udated CD-TIN after inserting constrained edge. The interior of the influence domain V Ui and V Di are re-triangulated by using of recursive algorithm ( as in figure 2). As for the re-triangulation of V U1, the triangulation of V U1 must contain a triangle with constraint segment being its edges. The recursive algorithm searches a oint ' 0 in the bounding of V U1 that forms a triangle T (,, ' 0 ) with vertices,. The triangle meets the constraint emty circle criterion, that is to say, the circumcircle of T (,, ' 0 ) cannot contain any oint of V U1 excet for its three vertices. After inserting T (,, ' 0 ), the V U1 is divided into two sub-domains, F E (, ' 1, ' 0 ) and F D (' 0, ' i,, ). To aly the algorithm recursively to re-triangulate the sub-domains of F E and F D until the entire domain be triangulated. ' 1 F E ' 2 ' i ' i+1 ' 0 F D V U1 Figure 2. The reconstruct of influence domain 3. ALGORITM FOR CONSTRAINT POINT DELETION oints in CD-TIN must take the constraint edges into consideration. In other words, the oint to be deleted refers to both non-constraint oint and constraint oint. To delete a non-constraint oint, there may be constraint edges, which should be ket invariable during fliing edges, in the influence domain boundary of this oint. While to delete a constraint oint, the constraint segment that contains the oint would be deleted while the other endoint of this segment should ket be invariable. 3.1 Integral Ear Elimination (IEE) Algorithms The first rocess of non-constraint oint deletion can be shown in figure 3, where is a non-constraint oint and is a constraint segment. When deleting, is one edge of the influence domain boundary of, and the constraint roerty of must be ket in re-triangulating the influence domain. owever, the deletion of constraint oint is different as in figure 4, where the constraint segment must be deleted and kee oint invariable. Furthermore, a constraint condition is reduced because of the deletion of, and the diagonal fliing test has to be done according to constraint Delaunay criterion for. As comared to the oint deletion in D-TIN, the deletion of 136

3 Figure 3. Deletion of non-constraint oint 7 7 Figure 4. Deletion of constraint oint q 3.2 Integral Ear Elimination (IEE) Algorithm Integral ear elimination (IEE) algorithm must not only meet Delaunay criterion, but also kee toological comleteness. The rocedures are: 1) to search the influence domain of oint to be deleted, and to identify whether is constraint or not; 2) to select three oints in the boundary of as a otential triangle T so as to test if it is an ear or not. If T is an ear, to fli the diagonals of quadrilateral formed by T and and to delete T; if not, to return to the second ste. Note that in the ste of fliing diagonal, it is needed to test the ear and its adjoining triangles referring to constraint emty criterion if is constraint. Let CD-TIN grah be G = (V { }, A), to delete. The algorithm goes as in the following: 1) to identify and the other constraint oint ' connected with along the constraint segment (as in Figure 4) if oint to be deleted is a constraint oint, else go to next ste. 2) to search out all the oints {,, n-1, n } connected with to form the influence domain = {,, n-1, n = } of in anticlockwise order. 3) to check if T( i, i+1, i+2 ) is an ear. Each trile of oints of is considered as a otential ear T( i, i+1, i+2 ). If T meets any one of the following conditions: a) D( i, i+1, i+2 ) is negative (means that T forms a re-entrant, not an ear, of the olygon formed by the adjoining of ); b) D( i, i+2, ) is negative (means that T encloses ) and c) ( i, i+1, i+2, j ) is ositive (means that one or more remaining oints j of fall inside the circumcircle of T), T is not an ear and is rejected immediately. If T meets all of these conditions, T is an ear, and may be removed by switching the diagonals i+1 and i i+2 of quadrilateral formed by T and. 4) if the oint i+1 of T( i, i+1, i+2 ) equal to ', e.g., i+1 =' (means that i+1 ' is a constraint segment), it is needed to test whether T meets the constraint emty circle criterion. That is to say, if another oint q of the triangles adjoining to segment i i+1 or i+1 i+2 is in the circumcircle of T, it is needed to switch the diagonals of quadrilateral formed by T and q (as in figure 4). 5) to reeat ste) and ste) until only three adjoining oints in remained, in which case the three oints are merged into one triangle and is deleted. 4. ALGORITM FOR CONSTRAINT EDGE DELETION The deletion of constraint edge in CD-TIN is an inverse oeration of constraint edge insertion, i.e. to remove all the segments of the constraint edge one by one. If delete a constraint edge with a virtual oint, the deletion must meet the constraint emty circle criterion, and another constraint edge crossing the virtual oint cannot be deleted in considering the toological comleteness of CD-TIN. Therefore, the deletion of constraint edge falls into two kinds of situations that with virtual oint or without virtual oint. 4.1 Constraint Edge Deletion without Virtual Point If there is no virtual oint in constraint edge, the constraint oint of this edge can be deleted one by one by using of IEE algorithm (as in figure 5). Figure 5. To delete constraint edges without virtual oint delete constraint broken line ; delete constraint triangular T( ); the reconstructed CD-TIN 137

4 4.2 Constraint Edge Deletion with Virtual oint If there is virtual oint in the edge, another algorithm called influence domain re-triangulation for virtual oint (IDRVP) is resented. Given a CD-TIN grah G={V, A A'}, to delete a constraint edge C with virtual oint v. Firstly, the influence domain of v is searched out, which is a olygon of the boundary of all the triangles connected with v. Secondly, is divided into two arts, L and R, by the other constraint edge C i crossing v. Thirdly, L and R are re-triangulated individually referring to the constraint emty circle criterion. Finally, the virtual oint v is deleted. As shown in figure 6, is a constraint edge to be deleted, and are two oints where ' 1 ' 2 and ' 3 ' 4 intersected with. Edge is comosed of three constraint segments, and. When delete, and will be deleted too, but ' 1 ' 2 and ' 3 ' 4 are left in the CD-TIN. The detailed oerations are: 1) to delete the constraint oint and by using of IEE algorithm, and the constraint segments and will be deleted simultaneously (as in figure 6a); 2) to search the influence domain of and to divide it into two arts L and R by ' 1 ' 2, and then L and R are re-triangulated individually, and to delete (as in figure 6b); 3) to reeat ste) to delete. Finally, a new CD-TIN is constructed where the constraint edge is deleted (Figure 6c). ' 3 ' 1 ' 3 ' 1 ' 3 ' 1 ' 4 ' 2 ' 4 ' 2 ' 4 ' 2 Figure 6. To delete constraint edges with virtual oint the original CD-TIN and constraint edge with virtual oints and ; the reconstructed CD-TIN after deleting constraint oints, ; the final CD-TIN after deleting virtual oints and. The algorithm rocedures for the deletion of constraint edges are as in the following: 1) to search all the segments e i (i=1,2, n-1) of constraint edge C = { n }; 2) to identify the constraint oints i (i=1,2, n) and virtual oints ' j (j=1,2, m) and to store it into two oint lists L C and L V ; 3) to delete all the oints i (i=0,1, n) in L C by of using IEE algorithms; 4) to delete all the oints ' j (j=0,1, m) in L V by using of IDRVP algorithms. 5. A CASE FOR ALGORITMS TESTING A rototye system with VC++ is develoed to test roerties of the algorithms. Figure 7 shows the test results for shae reconstruction, where the dynamic deletion and insertion of constraint edges in CD-TIN is illustrated with the letters modification for RS to GIS. Shae of letter RS as constraint edge Delete R and insert GI as constraint edge Figure 7. The shae reconstruction with dynamic deletion and insertion of letters in a CD-TIN 6. CONCLUSION The CD-TIN is a widely used structure in GIS and comuter geometry, and the insertion and deletion oeration of oints and constraint edges are the basis of CD-TIN dynamic udating. By introducing virtual oint, this aer has made imrovements and extensions to resent udating algorithms for D-TIN and had reached a grou of new algorithms in consideration of olymorhism. The new algorithms include the integral ear elimination (IEE) algorithms for constraint oint deletion in CD-TIN and the influence domain re-triangulation for virtual oint (IDRVP) algorithms for constraint edge deletion in CD-TIN. The test shows that the algorithms are efficient and could be widely alied for the udating of DEM, DTM and other integral vector models of digital city and digital mine. 138

5 ACKNOWLEDGMENTS The author is grateful for the jointly suort of the National Outstanding Youth Funds of China (No ), the National Natural Science Funds of China (No ), National igh-tech Project (No.2006AA12Z216) and the Science Develoment Plan Awarded by Beijing Municial Commission of Education Science (No. KM ). REFERENCES Aurenhammer, F., 1987, Power diagrams: criterion algorithms and alications. SIAM Journal of Comuting, 16: Chew, L. P., 1987, Constraint Delaunay Triangulations. In: Proceedings of the Annual Symosium on Comutational Geometry ACM: Devillers, O., 1999, On deletion in Delaunay triangulations. In: 15th Annual ACM Symosium on Comutational Geometry: Dwyer, R. A., 1987, A fast divide-and-conquer algorithm for constructing delaunay triangulations. Algorithmica, 2: Fortune, S., 1987, A Sweeline Algorithm for Voronoi Diagrams. Algorithmica, 2: Green, E., R. Sibson, 1977, Comuting Dirichlet tessellations in the lane, Comut. J. 21: Guibas, L., D. Knuth, M. Sharir, 1992, Randomized incremental construction of Delaunay and Voronoi diagrams, Algorithmica. 7: Guibas, L., J. Stolfi, 1985, Primitives for the maniulation of general subdivisions and the comutation of Voronoi diagrams, ACM Trans. Grahics. 4 (2): ao,. S., Wu LiXin, 2003, 3D-Geosciences Modeling and Visualization Based on Strongly Constraint Delaunay TIN. Geograhy and Geo-Information Science(in Chinese), 19(2): Lee, D. T., Lin. K., 1986, Genaeralized Delaunay Triangulation for lanar grahs. Discrete Comutational Geometry. 1: Li, Z. L., Zhu Qing, 2000, Digital Elevation Model (in Chinese). Wuhan, Wuhan Surveying And Maing University Press. Marc, V., Nuria Pla., 2000, Comuting directional constraint Delaunay triangulations. Comuters & Grahics, 24: Marc, V., Núria Pla, Jose Cotrina., 2002, Regular triangulations of dynamic sets of oints. Comuter Aided Geometric Design, 19: Mostafavi, M. A., Christoher Gold, Maciej Dakowicz, 2003, Deletion and insert oerations in Voronoi/Delaunay methods and alications. Comuters & Geosciences, 23: Ohya, T., M. Iri and K. Murota, 1984, Imrovements of the incremental method for the Voronoi diagram with comutational comarison of various algorithms, J. Oer. Res. Soc. Jaan 27: Piegl, L. A., Arnaud M. Richard, 1993, Algorithm and Data Structure for Triangulation Multily Connected Polygonal Domains [J]. Comuter and Grahics, 17(5): Prearata, F. P., Shamos M. I., (editors), 1985, Comutational Geometry, An Introduction. (New Yerk: Sringer-Verlag). Zhu, X. X., 2000, Free curved lines and face modeling technology(in Chinese). Beijing, Science Press,

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points.

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points. Voronoi Diagram and Delaunay Triangulation 1 Introduction The Voronoi Diagram (VD, for short) is a ubiquitious structure that aears in a variety of discilines - biology, geograhy, ecology, crystallograhy,

More information

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1,

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1, CHAPTER 33 Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter

More information

The Edge-flipping Distance of Triangulations

The Edge-flipping Distance of Triangulations The Edge-fliing Distance of Triangulations Sabine Hanke (Institut für Informatik, Universität Freiburg, Germany hanke@informatik.uni-freiburg.de) Thomas Ottmann (Institut für Informatik, Universität Freiburg,

More information

Constrained Empty-Rectangle Delaunay Graphs

Constrained Empty-Rectangle Delaunay Graphs CCCG 2015, Kingston, Ontario, August 10 12, 2015 Constrained Emty-Rectangle Delaunay Grahs Prosenjit Bose Jean-Lou De Carufel André van Renssen Abstract Given an arbitrary convex shae C, a set P of oints

More information

Image Segmentation Using Topological Persistence

Image Segmentation Using Topological Persistence Image Segmentation Using Toological Persistence David Letscher and Jason Fritts Saint Louis University Deartment of Mathematics and Comuter Science {letscher, jfritts}@slu.edu Abstract. This aer resents

More information

Study on Delaunay Triangulation with the Islets Constraints

Study on Delaunay Triangulation with the Islets Constraints Intelligent Information Management, 2010, 2, 375-379 doi:10.4236/iim.2010.26045 Published Online June 2010 (http://www.scirp.org/journal/iim) Study on Delaunay Triangulation with the Islets Constraints

More information

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets An imroved algorithm for Hausdorff Voronoi diagram for non-crossing sets Frank Dehne, Anil Maheshwari and Ryan Taylor May 26, 2006 Abstract We resent an imroved algorithm for building a Hausdorff Voronoi

More information

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

Cross products Line segments The convex combination of two distinct points p

Cross products Line segments The convex combination of two distinct points p CHAPTER Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

COT5405: GEOMETRIC ALGORITHMS

COT5405: GEOMETRIC ALGORITHMS COT5405: GEOMETRIC ALGORITHMS Objects: Points in, Segments, Lines, Circles, Triangles Polygons, Polyhedra R n Alications Vision, Grahics, Visualizations, Databases, Data mining, Networks, GIS Scientific

More information

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101 Convex Hulls Helen Cameron Helen Cameron Convex Hulls 1/101 What Is a Convex Hull? Starting Point: Points in 2D y x Helen Cameron Convex Hulls 3/101 Convex Hull: Informally Imagine that the x, y-lane is

More information

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com

More information

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification Using Rational Numbers and Parallel Comuting to Efficiently Avoid Round-off Errors on Ma Simlification Maurício G. Grui 1, Salles V. G. de Magalhães 1,2, Marcus V. A. Andrade 1, W. Randolh Franklin 2,

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

level 0 level 1 level 2 level 3

level 0 level 1 level 2 level 3 Communication-Ecient Deterministic Parallel Algorithms for Planar Point Location and 2d Voronoi Diagram? Mohamadou Diallo 1, Afonso Ferreira 2 and Andrew Rau-Chalin 3 1 LIMOS, IFMA, Camus des C zeaux,

More information

A Morphological LiDAR Points Cloud Filtering Method based on GPGPU

A Morphological LiDAR Points Cloud Filtering Method based on GPGPU A Morhological LiDAR Points Cloud Filtering Method based on GPGPU Shuo Li 1, Hui Wang 1, Qiuhe Ma 1 and Xuan Zha 2 1 Zhengzhou Institute of Surveying & Maing, No.66, Longhai Middle Road, Zhengzhou, China

More information

Curve Reconstruction taken from [1]

Curve Reconstruction taken from [1] Notes by Tamal K. Dey, OSU 47 Curve Reconstruction taken from [1] The simlest class of manifolds that ose nontrivial reconstruction roblems are curves in the lane. We will describe two algorithms for curve

More information

Swift Template Matching Based on Equivalent Histogram

Swift Template Matching Based on Equivalent Histogram Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:

More information

CMSC 754 Computational Geometry 1

CMSC 754 Computational Geometry 1 CMSC 754 Comutational Geometry 1 David M. Mount Deartment of Comuter Science University of Maryland Fall 2002 1 Coyright, David M. Mount, 2002, Det. of Comuter Science, University of Maryland, College

More information

THE COMPARISON OF DRAINAGE NETWORK EXTRACTION BETWEEN SQUARE AND HEXAGONAL GRID-BASED DEM

THE COMPARISON OF DRAINAGE NETWORK EXTRACTION BETWEEN SQUARE AND HEXAGONAL GRID-BASED DEM The International Archives of the Photogrammetry, Remote Sensing and Satial Information Sciences, Volume XLII-4, 208 ISPRS TC IV Mid-term Symosium 3D Satial Information Science The Engine of Change, 5

More information

DYNAMIC CARTOGRAPHY USING VORONOI/DELAUNAY METHODS

DYNAMIC CARTOGRAPHY USING VORONOI/DELAUNAY METHODS DYNAMIC CARTOGRAPHY USING VORONOI/DELAUNAY METHODS Chris Gold, Maciej Dakowicz Department of Computing and Mathematics, University of Glamorgan, Pontypridd, Wales, CF37 1DL, UK cmgold@glam.ac.uk; mdakowic@glam.ac.uk

More information

Earthenware Reconstruction Based on the Shape Similarity among Potsherds

Earthenware Reconstruction Based on the Shape Similarity among Potsherds Original Paer Forma, 16, 77 90, 2001 Earthenware Reconstruction Based on the Shae Similarity among Potsherds Masayoshi KANOH 1, Shohei KATO 2 and Hidenori ITOH 1 1 Nagoya Institute of Technology, Gokiso-cho,

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,

More information

Kinetic Voronoi/Delaunay Drawing Tools

Kinetic Voronoi/Delaunay Drawing Tools Kinetic Voronoi/Delaunay Drawing Tools Chris Gold and Maciej Dakowicz School of Computing University of Glamorgan Pontypridd, Wales, CF37 1DL, UK cmgold@glam.ac.uk; mdakowic@glam.ac.uk Abstract We describe

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,

More information

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll Reort No. 94.60 A new Linear Time Algorithm for Comuting the Convex Hull of a Simle Polygon in the Plane by W. Hochstattler, S. Kromberg, C. Moll 994 W. Hochstattler, S. Kromberg, C. Moll Universitat zu

More information

CS335 Fall 2007 Graphics and Multimedia. 2D Drawings: Lines

CS335 Fall 2007 Graphics and Multimedia. 2D Drawings: Lines CS335 Fall 007 Grahics and Multimedia D Drawings: Lines Primitive Drawing Oerations Digital Concets of Drawing in Raster Arras PIXEL is a single arra element at x, - No smaller drawing unit exists Px,

More information

COMPUTING CONSTRAINED DELAUNAY

COMPUTING CONSTRAINED DELAUNAY COMPUTING CONSTRAINED DELAUNAY TRIANGULATIONS IN THE PLANE By Samuel Peterson, University of Minnesota Undergraduate The Goal The Problem The Algorithms The Implementation Applications Acknowledgments

More information

Improved Symmetric Lists

Improved Symmetric Lists Imroved Symmetric Lists Prerint February, 24 Christian Bachmaier and Marcus Raitner University of Passau, 943 Passau, Germany {bachmaier,raitner}@fmi.uni-assau.de Abstract. We introduce a new data structure

More information

2010 First International Conference on Networking and Computing

2010 First International Conference on Networking and Computing First International Conference on Networking and Comuting Imlementations of Parallel Comutation of Euclidean Distance Ma in Multicore Processors and GPUs Duhu Man, Kenji Uda, Hironobu Ueyama, Yasuaki Ito,

More information

A navigation mesh for dynamic environments

A navigation mesh for dynamic environments COMPUTER ANIMATION AND VIRTUAL WORLDS Com. Anim. Virtual Worlds 2012; 23:535 546 Published online 12 June 2012 in Wiley Online Library (wileyonlinelibrary.com)..1468 SPECIAL ISSUE PAPER A navigation mesh

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

521493S Computer Graphics Exercise 3 (Chapters 6-8)

521493S Computer Graphics Exercise 3 (Chapters 6-8) 521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Silvania Avelar, Matthias Muller. Swiss Federal Institute of Technology Zurich, Switzerland. Abstract

Silvania Avelar, Matthias Muller. Swiss Federal Institute of Technology Zurich, Switzerland. Abstract Generating Toologically Correct Schematic Mas Silvania Avelar, Matthias Muller Deartment of Comuter Science Swiss Federal Institute of Technology 8092 Zurich, Switzerland favelar,muellermg@inf.ethz.ch

More information

Recognizing Convex Polygons with Few Finger Probes

Recognizing Convex Polygons with Few Finger Probes Pattern Analysis and Alications manuscrit No. (will be inserted by the editor) Recognizing Convex Polygons with Few Finger Probes Sumanta Guha Kiêu Trọng Khánh Received: date / Acceted: date Abstract The

More information

A Simple and Robust Approach to Computation of Meshes Intersection

A Simple and Robust Approach to Computation of Meshes Intersection A Simle and Robust Aroach to Comutation of Meshes Intersection Věra Skorkovská 1, Ivana Kolingerová 1 and Bedrich Benes 2 1 Deartment of Comuter Science and Engineering, University of West Bohemia, Univerzitní

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

CS 532: 3D Computer Vision 14 th Set of Notes

CS 532: 3D Computer Vision 14 th Set of Notes 1 CS 532: 3D Computer Vision 14 th Set of Notes Instructor: Philippos Mordohai Webpage: www.cs.stevens.edu/~mordohai E-mail: Philippos.Mordohai@stevens.edu Office: Lieb 215 Lecture Outline Triangulating

More information

3D Surface Simplification Based on Extended Shape Operator

3D Surface Simplification Based on Extended Shape Operator 3D Surface Simlification Based on Extended Shae Oerator JUI-LIG TSEG, YU-HSUA LI Deartment of Comuter Science and Information Engineering, Deartment and Institute of Electrical Engineering Minghsin University

More information

Deformable Free Space Tilings for Kinetic Collision Detection

Deformable Free Space Tilings for Kinetic Collision Detection Deformable Free Sace Tilings for Kinetic Collision Detection Pankaj K. Agarwal Julien Basch Leonidas J. Guibas John Hershberger Li Zhang Abstract We resent kinetic data structures for detecting collisions

More information

Compatible 4-Holes in Point Sets

Compatible 4-Holes in Point Sets CCCG 2018, Winnieg, Canada, August 8 10, 2018 Comatible 4-Holes in Point Sets Ahmad Biniaz Anil Maheshwari Michiel Smid Abstract Counting interior-disjoint emty convex olygons in a oint set is a tyical

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

Computational Geometry: Proximity and Location

Computational Geometry: Proximity and Location 63 Comutational Geometry: Proximity and Location 63.1 Introduction Proximity and location are fundamental concets in geometric comutation. The term roximity refers informally to the uality of being close

More information

Geometric Dilation. A polygonal chain C. detour of C on the pair (p, q): where C q p the path on C connecting p and q. detour of C

Geometric Dilation. A polygonal chain C. detour of C on the pair (p, q): where C q p the path on C connecting p and q. detour of C Geometric Dilation A olygonal chain C detour of C on the air (, ): δ(, ) = C, where C the ath on C connecting and. detour of C δ C = max, C δ(, ). More general: A connected lanar grah G(V, E) Gemetric

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)

More information

The Spatial Skyline Queries

The Spatial Skyline Queries The Satial Skyline Queries Mehdi Sharifzadeh Comuter Science Deartment University of Southern California Los Angeles, CA 90089-078 sharifza@usc.edu Cyrus Shahabi Comuter Science Deartment University of

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

Construction Of The Constrained Delaunay Triangulation Of A Polygonal Domain

Construction Of The Constrained Delaunay Triangulation Of A Polygonal Domain Construction Of The Constrained Delaunay Triangulation Of A Polygonal Domain Reinhard Klein 1 A fast and easy to implement divide-and-conquer algorithm is presented for the construction of the Constrained

More information

The Spatial Skyline Queries

The Spatial Skyline Queries Coffee sho The Satial Skyline Queries Mehdi Sharifzadeh and Cyrus Shahabi VLDB 006 Presented by Ali Khodaei Coffee sho Three friends Coffee sho Three friends Don t choose this lace is closer to each three

More information

Graduate Algorithms CS F-19 Computational Geometry

Graduate Algorithms CS F-19 Computational Geometry Graduate Algorithms CS673-016F-19 Comutational Geometry David Galles Deartment of Comuter Science University of San Francisco 19-0: Cross Products Given any two oints 1 = (x 1,y 1 ) and = (x,y ) Cross

More information

Fundamentals of Restricted-Orientation Convexity

Fundamentals of Restricted-Orientation Convexity Fundamentals of Restricted-Orientation Convexity Eugene Fink Derick Wood Abstract A restricted-orientation convex set, also called an O-convex set, is a set of oints whose intersection with lines from

More information

arxiv: v1 [math.gt] 1 May 2018

arxiv: v1 [math.gt] 1 May 2018 CIRCUIT PRESENTATION AND LATTICE STICK NUMBER WITH EXACTLY 4 z-sticks HYOUNGJUN KIM AND SUNGJONG NO arxiv:805.0023v [math.gt] May 208 Abstract. The lattice stick number s L(L) of a link L is defined to

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

THE METHODS OF TRIANGULATION

THE METHODS OF TRIANGULATION THE METHODS OF TRIANGULATION Abstract M. Varshosaz, Assistant Professor, Faculty of Geodesy & Geomatics Eng., K.N. Toosi University of Technology K.N. Toosi University of Technology, Vali_Asr St, Tehran,

More information

CS 428: Fall Introduction to. Geometric Transformations. Andrew Nealen, Rutgers, /15/2010 1

CS 428: Fall Introduction to. Geometric Transformations. Andrew Nealen, Rutgers, /15/2010 1 CS 428: Fall 21 Introduction to Comuter Grahics Geometric Transformations Andrew Nealen, Rutgers, 21 9/15/21 1 Toic overview Image formation and OenGL (last week) Modeling the image formation rocess OenGL

More information

I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ).

I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). 1 I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). Data structures Sorting Binary heas are imlemented using a hea-ordered balanced binary tree. Binomial heas use a collection

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

High Order Accurate Curved-element Implementation in OpenFOAM for Discontinuous Galerkin Method

High Order Accurate Curved-element Implementation in OpenFOAM for Discontinuous Galerkin Method ,.47-52 htt://dx.doi.org/10.14257/astl.2016.142.08 High Order Accurate Curved-element Imlementation in OenFOAM for Discontinuous Galerkin Method Li-Yang Xu 1, Shuai Ye 1, Yong-Quan Feng 1, Hao Li 1, Xin-Hai

More information

Building Polygonal Maps from Laser Range Data

Building Polygonal Maps from Laser Range Data ECAI Int. Cognitive Robotics Worksho, Valencia, Sain, August 2004 Building Polygonal Mas from Laser Range Data Longin Jan Latecki and Rolf Lakaemer and Xinyu Sun and Diedrich Wolter Abstract. This aer

More information

Chapter 3: Graphics Output Primitives. OpenGL Line Functions. OpenGL Point Functions. Line Drawing Algorithms

Chapter 3: Graphics Output Primitives. OpenGL Line Functions. OpenGL Point Functions. Line Drawing Algorithms Chater : Grahics Outut Primitives Primitives: functions in grahics acage that we use to describe icture element Points and straight lines are the simlest rimitives Some acages include circles, conic sections,

More information

New Results on Abstract Voronoi Diagrams

New Results on Abstract Voronoi Diagrams New Results on Abstract Voronoi Diagrams Dissertation Zur Erlangung des Doktorgrades (Dr. rer. nat.) der Mathematisch-Naturwissenschaftlichen Fakultät der Rheinischen Friedrich-Wilhelms-Universität Bonn

More information

Efficient Algorithms for Computing Conservative Portal Visibility Information

Efficient Algorithms for Computing Conservative Portal Visibility Information EUROGRAPHICS 2000 / M. Gross and F.R.A. Hogood (Guest Editors) Volum9 (2000), Number 3 Efficient Algorithms for Comuting Conservative Portal Visibility Information W. F. H. Jiménez, C. Eserança and A.

More information

Shape from Second-bounce of Light Transport

Shape from Second-bounce of Light Transport Shae from Second-bounce of Light Transort Siying Liu 1, Tian-Tsong Ng 1, and Yasuyuki Matsushita 2 1 Institute for Infocomm Research Singaore 2 Microsoft Research Asia Abstract. This aer describes a method

More information

13.472J/1.128J/2.158J/16.940J COMPUTATIONAL GEOMETRY

13.472J/1.128J/2.158J/16.940J COMPUTATIONAL GEOMETRY 13.472J/1.128J/2.158J/16.940J COMPUTATIONAL GEOMETRY Lecture 23 Dr. W. Cho Prof. N. M. Patrikalakis Copyright c 2003 Massachusetts Institute of Technology Contents 23 F.E. and B.E. Meshing Algorithms 2

More information

Constrained Path Optimisation for Underground Mine Layout

Constrained Path Optimisation for Underground Mine Layout Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground

More information

Triangulation Based Volume Calculation Andrew Y.T Kudowor and George Taylor Department of Geomatics University of Newcastle

Triangulation Based Volume Calculation Andrew Y.T Kudowor and George Taylor Department of Geomatics University of Newcastle Triangulation Based Volume Calculation Andrew Y.T Kudowor and George Taylor Department of Geomatics University of Newcastle ABSTRACT Delaunay triangulation is a commonly used method for generating surface

More information

The degree constrained k-cardinality minimum spanning tree problem: a lexisearch

The degree constrained k-cardinality minimum spanning tree problem: a lexisearch Decision Science Letters 7 (2018) 301 310 Contents lists available at GrowingScience Decision Science Letters homeage: www.growingscience.com/dsl The degree constrained k-cardinality minimum sanning tree

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

Node Filtering and Face Routing for Sensor Network

Node Filtering and Face Routing for Sensor Network UNLV Theses, Dissertations, Professional Paers, and Castones 8-1-2012 Node Filtering and Face Routing for Sensor Network Umang Amatya University of Nevada, Las Vegas, umangama@hotmail.com Follow this and

More information

Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments

Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments Proceedings of 0 4th International Conference on Machine Learning and Comuting IPCSIT vol. 5 (0) (0) IACSIT Press, Singaore Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

Surface Contents Author Index

Surface Contents Author Index Surface Contents Author Index Christopher Gold, Maciek Dakowicz & Rebecca Tse VISUALIZATION AND DECISION SUPPORT FOR WATERSHED MANAGEMENT Christopher Gold, Maciek Dakowicz and Rebecca Tse Hong Kong Polytechnic

More information

Chapter 8: Adaptive Networks

Chapter 8: Adaptive Networks Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

METHOD OF LANDSLIDE MEASUREMENT BY GROUND BASED LIDAR

METHOD OF LANDSLIDE MEASUREMENT BY GROUND BASED LIDAR METHOD OF LANDSLIDE MEASUREMENT BY GROUND BASED LIDAR Ryo INADA* and Masataka TAKAGI** Kochi University of Technology, Kami-shi, Kochi, 782-8502, Jaan *135082@gs.kochi-tech.ac.j **takagi.masataka@kochi-tech.ac.j

More information

BUILDING RECONSTRUCTION USING LIDAR DATA

BUILDING RECONSTRUCTION USING LIDAR DATA BUILDING RECONSTRUCTION USING LIDAR DATA R. O.C. Tse, M. Dakowicz, C.M. Gold, and D.B. Kidner GIS Research Centre, School of Computing, University of Glamorgan, Pontypridd, CF37 1DL, Wales, UK. rtse@glam.ac.uk,mdakowic@glam.ac.uk,cmgold@glam.ac.uk,

More information

Week 8 Voronoi Diagrams

Week 8 Voronoi Diagrams 1 Week 8 Voronoi Diagrams 2 Voronoi Diagram Very important problem in Comp. Geo. Discussed back in 1850 by Dirichlet Published in a paper by Voronoi in 1908 3 Voronoi Diagram Fire observation towers: an

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

Voronoi Diagrams and Delaunay Triangulation slides by Andy Mirzaian (a subset of the original slides are used here)

Voronoi Diagrams and Delaunay Triangulation slides by Andy Mirzaian (a subset of the original slides are used here) Voronoi Diagrams and Delaunay Triangulation slides by Andy Mirzaian (a subset of the original slides are used here) Voronoi Diagram & Delaunay Triangualtion Algorithms Divide-&-Conquer Plane Sweep Lifting

More information

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model. U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture

More information

How Do Computers Solve Geometric Problems? Sorelle Friedler, University of Maryland - College Park

How Do Computers Solve Geometric Problems? Sorelle Friedler, University of Maryland - College Park How Do Computers Solve Geometric Problems? Sorelle Friedler, University of Maryland - College Park http://www.cs.umd.edu/~sorelle Outline Introduction Algorithms Computational Geometry Art Museum Problem

More information

GRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL

GRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL GRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL Noha El Zehiry 1,2, Steve Xu 2, Prasanna Sahoo 2 and Adel Elmaghraby 1 1 Deartment of Comuter Engineering and Comuter Science, University of Louisville,

More information

EFFICIENT STOCHASTIC GRADIENT SEARCH FOR AUTOMATIC IMAGE REGISTRATION

EFFICIENT STOCHASTIC GRADIENT SEARCH FOR AUTOMATIC IMAGE REGISTRATION ISSN 76-459 Int j simul model 6 (7), 4-3 Original scientific aer EFFICIENT STOCHASTIC GRADIENT SEARCH FOR AUTOMATIC IMAGE REGISTRATION Li, Q.; Sato, I. & Murakami, Y. GSJ/AIST - National Institute of Advanced

More information

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1 Bayesian Oil Sill Segmentation of SAR Images via Grah Cuts 1 Sónia Pelizzari and José M. Bioucas-Dias Instituto de Telecomunicações, I.S.T., TULisbon,Lisboa, Portugal sonia@lx.it.t, bioucas@lx.it.t Abstract.

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information