Code Transformation of DF-Expression between Bintree and Quadtree

Size: px
Start display at page:

Download "Code Transformation of DF-Expression between Bintree and Quadtree"

Transcription

1 Code Transformation of DF-Expression between Bintree and Quadtree Chin-Chen Chang*, Chien-Fa Li*, and Yu-Chen Hu** *Department of Computer Science and Information Engineering, National Chung Cheng University ** Department of Computer Science and Information Management Providence University Abstract In this paper, algorithms for transforming code between bintree and quadtree are proposed. The quadtree and bintree are two commonly used representations for image manipulations. However, there exists no algorithm for transforming code between bintree and quadtree. When one receiver a DF-expression of a bintree or quadtree code and does not have the corresponding decoding program, she/he, with our new code transformation algorithms at hand, can transform the received code into a quadtree or bintree code that she/he can handle. After code transformation, the receiver can see whether the output code is smaller than the input code. From it, she/he can further decide which code is more economic in its memory space needed; therefore, she/he can store the code with smaller size for saving more memory space. Keywords: bintree, quadtree, code transformation 1. Introduction In the fields of computer graphics, geographic information systems, and image processing, the representation of spatial data, such as arbitrary regions, point data, collections of lines, curves, surfaces, volumes, and so on, is an important issue. Because of the huge storage requirements and the high computational complexity of image manipulations, the extensive study of efficient image representations has become an important research issue. Up to the present, several spatial data structures for representing compressed binary images and the related image manipulations [7,8,9,11,12] have been presented. Basically, these data structures can be classified into six categories, namely, chain-codes, run-length codes, trees, linear-trees, depth-first representation, and breadth-first representation. The first category, chain-codes [15], can be used to represent a series of numbers that record the boundary of each object with a given image. The second category, run-length codes [18], can be used to represent, for an image, a list of pixels that are ordered by rows. Trees [7] can be used to represent a tree structure and store it by using the pointer-type data structure, such as the octree, the quadtree, the bintree, and so on. Linear trees can be used to represent a set of codes which are formed by the black leaf nodes of the corresponding quadtree or bintree of the image, such as FD-locational codes, FL-locational codes, VL-locational codes [7], bincode [17], and so on. Depth-first representations can be used to represent an image by traversing the nodes of quadtree or bintree in depth-first order. Finally, breadth-first representations can be used to represent the nodes of a quadtree or bintree in breadth-first order [1,3,4,5,6,10]. Many important and efficient algorithms for these different spatial representations, for example, rotation, mirroring, hidden-surface elimination, ray tracing, bean tracing, medial axis transforms, set operations, neighbors finding, moments, connected component labeling, Euler number, area, perimeter, windowing, expansion, and dilation, have been presented in recent decades [7,8]. Thus, it is very important and interesting to design an efficient transformation among these representations. That is, if any two representations can be transformed by each other, the algorithms that were developed for transforming the two representations can be shared by the two representations. In addition, the storage space required in each representation is quite different. We can choose the one with less storage cost to save storage costs. The algorithm for converting a quadtree from chain codes [19] has been presented. In addition, the algorithm for converting a quadtree representation to its corresponding chain codes representation has been presented [14]. The algorithm for converting a quadtree representation to its corresponding run-length codes [20] has also been presented. Furthermore, the algorithm for converting a quadtree to run-length codes was presented in [21]. The transformation between chain codes and run-length codes are straightforward [7]. The code transformation between the DF linear quadtree and BF linear quadtree has already been proposed [2]. When a DF-expression code of a quadtree/bintree is received without a corresponding decoding program, this problem can be solved if the DF-expression code of a quadtree/bintree can be transformed into its corresponding DF-expression code of the bintree/quadtree. Taking advantage of this flexibility, the storage space of one image can also be reduced by changing it from one code to another. In this paper, we intend to provide the code transformation algorithm for two commonly used DF-expressions, which are the quadtree and bintree scheme. The remainder of this paper is organized as follows. In Section 2, we shall

2 review the DF-expression of a bintree and quadtree. In Section 3, our new code transformation algorithms for using the DF-expression between a bintree and quadtree will be presented. Finally, the conclusion will be given in the last section. 2. Previous Works In this section, we will review some related schemes of the DF-expression and the quadtree and the bintree algorithms. The DF-expression was introduced by Kawaguchi and Endo [16]. In Section 2.1, we will briefly describe one DF-expression quadtree representation. In Section 2.2, the proposed DF-expression bintree code will be briefly introduced. 2.1 The DF-expression Representations of a Quadtree A quadtree is a hierarchical data structure for representing a binary image. It is constructed by successively sub-dividing an image into four equal-sized sub-images in four quadrants: NW (northwest) quadrant, NE (northeast) quadrant, SW (southwest) quadrant, and SE (southeast) quadrant. A leaf node in the tree alone can represent a homogeneous quadrant of the image. On the other hand, an internal node represents a heterogeneous quadrant of the image. Each internal node is further divided into four sub-quadrants, and each sub-quadrant can be even further divided into four smaller sub-quadrants until each sub-quadrant has only one color. An external node whose color is black (white) is called a black (white) node, and an internal node is called a gray node. Fig. 1 shows an example of the quadtree segmentation process. The original binary image of pixels is shown in Fig. 1(a). The corresponding quadtree is depicted in Fig. 1(b). In 1980, Kawaguchi and Endo proposed an effective way for the DF-expression of a quadtree representation [16]. When an internal node is visited, the symbol ( is used to represent it. When a black leaf node and a white leaf node are encountered, the symbols B and W are used to represent them, respectively. The DF-expression quadtree representation of the image shown in Fig. 2 is ((BBWW((WBWWWW(BWWWB(W(WWBBBW. DF-expression codes:((bbww((wbwwww(bwwwb(w(wwbbbw Fig. 2 The DF-expression of quadtree codes for the image shown in Fig. 1(a) 2.2 The DF-expression Representations of a Bintree In this subsection, we will introduce the DF-expression of a bintree, which was proposed in [13]. A bintree is a hierarchical data structure used to represent a binary image. The root of the bintree represents the image, if the entire image is completely black or white. Otherwise, the root is grey. The image is splitted into two equal-sized sub-images, and its children corresponding to the two sub-images are added to the root. This subdivision process is then repeated recursively for each of the two sub-images until the sub-image is completely black or white. At each step, the partition alternates between the x- and y-axes. If a subdivision is either black or white, then its corresponding node is an external node; otherwise, it is an 3 3 internal node. Given a binary image of size 2 2 and shown in Fig. 1(a). Fig. 3 depicts an example of the corresponding bintree segmentation process. Some as the way for the DF-expression of a quadtree representation in[16], when an internal node is visited, the symbol ( is used to represent it. When a black leaf node and a white leaf node are encountered, the symbols B and W are used to represent them, respectively. The DF-expression for a bintree of the image shown in Fig. 1(a) is shown in Fig. 3. The result is ((((BW(BWB((((W(BWW(W((BWW((WB(((WB (WBW. (a)the binary image (b) The corresponding quadtree Fig. 1 Example of the quadtree segmentation process DF-expression:((((BW(BWB((((W(BWW(W((BWW((WB(((WB(WBW Fig. 3 The corresponding DF-expression codes of a bintree for the image in Fig. 1(a)

3 3. The Proposed Algorithms In this section, the algorithm that transforms a DF-expression of a quadtree into its corresponding DF-expression of a bintree shall be introduced. Next, the algorithms for the transformation of a DF-expression of a bintree into its corresponding DF-expression of a quadtree shall also be described. To transform the DF-expression of a quadtree into the corresponding DF-expression of a bintree, the following steps are executed. If an internal node, that is, the symbol (, is found, it will be transformed into the symbols (( S1S3(S2S4. The symbols S1, S2, S3, and S4 denote these four sub-tree expressions of a quadtree. When we scan the next quadtree symbol, we record the DF-expression expression of a bintree in reverse order, from the S2 and S3 subtree node of a quadtree. If the scanned symbol indicates that a leaf node, that is, the symbols B or W, is found, then the corresponding bintree codes, the symbols B or W, are produced. The above steps are recursively executed until all the symbols in the DF-expression of a quadtree are processed. After all the symbols of the DF quadtree expression are processed, the corresponding DF-expression of bintree is generated. (a) The 2 2 binary image (b) DF-expression of quadtree and bintree (c) DF-expression transformation from quadtree to bintree Fig. 4 A quadtree to a bintree transformation for a DF-expression A simple example of a transformation from the DF-expression of a quadtree to the DF-expression of a bintree is demonstrated in Fig. 4. The DF-expression of a bintree can be obtained by scanning the symbols in the DF quadtree expression. In Fig. 4(b), an internal node of a quadtree produces three internal nodes of a bintree. The second and third leaf nodes of a quadtree become the third and second leaf nodes of a bintree. Therefore, we must change the positions of these two nodes. In Fig. 4(c), the original DF-expression of a quadtree and its resultant DF bintree expression are given. When a DF-expression of a quadtree wants to transform into its DF-expression of bintree, the DF-expression of a quadtree is inputted and Procedure QTB is executed. Procedure QTB: /* Quadtree code to Bintree code transformation */ Step 1: Get the current DF-expression code of quadtree qc. If qc is NULL, then go to Step 6. Step 2: If qc= (, four recursive procedures of QTB are sequentially performed to process the next four expression codes, S 1, S 2, S 3, and S 4, respectively. Step 3: If qc= B or W, return qc to the caller. Step 4: If all the recursive calls generated by the current procedure are terminated, generate the DF-expression of a bintree for qc according to the following rules: (( S1S 3 ( S 2 S 4 if qc = '(', here S1, S 2, S 3, and S 4 denote the retruned results of these bintree code = four recursive calls, ' B' if qc = ' B', ' W' if qc = ' W'. Step 5: When an internal node records the symbol ( and the leaf nodes of its two children have the same color B or W, the symbol B or W is used to represent these three symbols. Step 6: Output the bintree code. A complete transformation example of the DF-expression of a quadtree to the DF-expression of a bintree code is given in Fig. 5. The DF-expression of a bintree representation is obtained by scanning the DF-expression code of a quadtree representation. In Fig. 5, the quadtree code without the underline denotes a sub-quadtree of the root node. A code with the underline is another sub-tree of the quadtree root node. When a symbol with the value ( is found in the DF-expression of a quadtree, the symbols (( ( are used to replace the previous one. At the same time, the program will start to generate four recursive procedure calls sequentially. Finally, it reads each code and appends the corresponding code to the previously output code list which gives the corresponding DF-expression of a bintree. Let us now look at the guidelines for transforming a DF-expression of a bintree into its corresponding DF-expression of a quadtree. First, if the scanned DF-expression symbols are two successive internal nodes

4 with the value ((, then the second symbol is removed to generate (. If the scanned code is a leaf node with the value B or W, then the corresponding quadtree codes are produced. The above steps are recursively processed until all the symbols in the DF-expression of the quadtree are scanned. Fig. 5 Example of a DF-expression from a quadtree to a bintree transformation (a) The 2 2 binary image (b) DF-expression of bintree and quadtree (c) DF-expression transformation from bintree to quadtree Fig. 6 A bintree to quadtree transformation for a DF-expression An example illustrating the transformation of a DF-expression of a bintree to a DF-expression of a quadtree is given in Fig. 6. In Fig. 6(b), the three internal nodes of the two-level bintree are transformed into a single level quadtree with one internal node. The second and third leaf nodes of a bintree become the third and second leaf nodes of the quadtree. For this reason, when the codes are transformed, we must change the positions of these two sub-trees. In Fig. 6(c), a DF-expression of a bintree and the resultant DF-expression of quadtree is given. When a DF-expression of a bintree wants to transform into a DF-expression of quadtree, Procedure BTQ described as follows is executed. Procedure BTQ: /* Bintree code to Quadtree code transformation */ Step 1: Get the current DF-expression code of bindtree bc. If bc is NULL, then go to Step 4. Step 2: Suppose bc= ( and the next bc= (. Four recursive procedures of BTQ are called sequentially to process the next four bintree code S 1, S 3, S 2, and S 4, respectively. Step 3: If bc= B or W, return bc to the caller. Step 4: If all the recursive calls generated by the current procedure are terminated, generate the DF-expression codes of the quadtree for the bc according to the following rules: ( S1 S 2 S 3 S 4 if bc = '(' and next bc = '(', here S1 S 2 S 3 S 4 denote the results of the quadtree code = four recursive procedures 'B' if bc = 'B', ' W' if bc = ' W'. Step 5: Output the quadtree code. A complete example for transforming the DF-expression of a bintree to the DF-expression of a quadtree is given in Fig. 7. In Fig. 7, the bintree code with a single underline is a grandchild sub-tree of the bintree root node; a code with a double underline is a grandchild sub-tree of the bintree root node. As it visits the continue symbol (( of code, the symbol ( is used to replace the previous one. At the same time, four recursive calls will be executed sequentially. 4. Conclusions Code transformation algorithms between different image representations are very important. The demand for code transformation algorithms between two different image representations is quite important because they provide flexibility for the usage of different image representations. Generally, we can choose the one requiring less storage cost to save space while transforming it to another image representation for effective image manipulation.

5 Quadtrees and bintrees are commonly used techniques to represent binary images because they can effectively reduce the required storage space. This paper presented algorithms for transforming codes between quadtree and bintree. If we receive a DF-expression code of a quadtree/bintree that we cannot handle, we can transform it into another DF-expression code of a bintree/quadtree with our algorithms. Combined with other algorithms for transforming code between a bincode [17] and a DF-expression of a bintree, the use of a quadtree and bintree representation would be very flexible. In addition, the new algorithms can also be used to reduce the storage space that an image requires, if necessary. Fig. 7 Example of a DF-expression of a bintree to quadtree transformation References [1] Chang, H. K. and Chang, J. W., The fixed binary linear quadtree coding scheme for spatial data, SPIE Proceedings -- Visual Communication and Image Processing, Vol. 2308, 1994, pp [2] Chen, P. M., Variant code transformations for linear quadtrees, Pattern Recognition Letters, Vol. 23, 2002, pp [3] Dyer, C., The space efficiency of quadtrees, Computing Graphics Image Process, Vol. 19, No. 4, 1982, pp [4] Gargantini, I., An effective way to represent quadtrees, Communications of the ACM, Vol. 25, No. 12, 1982, pp [5] Hunter, G. M. and Steiglitz, K., Operations on images using quadtrees, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 1, No. 2, 1979, pp [6] Lin, T. W., Set operations on constant bit-length linear quadtrees, Pattern Recognition, Vol. 30, No. 7, 1997, pp [7] Samet, H., Application of spatial data structures, Addison-Wesley, New York [8] Samet, H., Design and analysis of spatial data structure, Addison-Wesley, New York [9] Tsai, Y. H. and Chung K. L., Some image operations on S-tree-related spatial data structure, Image and Vision Computing, Vol. 17, 1999, pp [10] Wang, F., Relational-linear quadtree approach for two dimensional spatial representation and manipulation, IEEE Transactions on Knowledge and Data Engineering, Vol. 3, No. 1, 1991, pp [11] Wu, J. G. and Chung, K. L., The logical representation of bincode and its applications in manipulating binary images, Real-Time Imaging, Vol. 5, 1999, pp [12] Yang, Y. H., Chung K. L. and Tsai, Y. H., A compact improved quadtree representation with image manipulations, Image and Vision Computing, Vol. 18, 2000, pp [13] Jonge, W. De., Scheuermann, P. and Schijf, A., S+-trees: an efficient structure for the representation of large pictures, Computer Vision, Graphics & Image Processing: Image Understanding, Vol. 59,No. 3, 1994, pp [14] Dyer, C. R., Rosenfeld, A. and Samet, H., Region representation: boundary codes from quadtree, Communications of the ACM, Vol. 23, No. 3, 1980, pp [15] Freeman, H., Computer processing of line-drawing image, ACM Computing Surveys, Vol. 6, No. 1, 1974, pp [16] Kawaguchi, E. and Endo, T., On a method of binary picture representation and its application to data compression, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 2, No. 1, 1980, pp [17] Ouksel, M. A. and Yaagoub, A., The interpolation-based bintree and encoding of binary images, Computer Vision, Graphics & Image Processing: Graphical Models and Image Processing, Vol. 54, No. 1, 1992, pp [18] Rutovitz, D., Data structures for operations on digital images, Pattern Recognition, 1968, pp [19] Samet, H., Region representation: quadtrees from boundary codes, Communications of the ACM, Vol. 23, No. 3, 1980, pp [20] Samet, H., An algorithm for converting rasters to quadtrees, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 3, No. 1, 1981, pp [21] Samet, H., Algorithm for conversion of quadtrees to rasters, Computer Vision, Graphics, and Image Processing, Vol. 26, No. 1, 1984, pp

Linear Quadtree Construction in Real Time *

Linear Quadtree Construction in Real Time * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 26, 1917-1930 (2010) Short Paper Linear Quadtree Construction in Real Time * CHI-YEN HUANG AND YU-WEI CHEN + Department of Information Management National

More information

Organizing Spatial Data

Organizing Spatial Data Organizing Spatial Data Spatial data records include a sense of location as an attribute. Typically location is represented by coordinate data (in 2D or 3D). 1 If we are to search spatial data using the

More information

A Vertex Chain Code Approach for Image Recognition

A Vertex Chain Code Approach for Image Recognition A Vertex Chain Code Approach for Image Recognition Abdel-Badeeh M. Salem, Adel A. Sewisy, Usama A. Elyan Faculty of Computer and Information Sciences, Assiut University, Assiut, Egypt, usama471@yahoo.com,

More information

An Optimized Computational Technique for Free Space Localization in 3-D Virtual Representations of Complex Environments

An Optimized Computational Technique for Free Space Localization in 3-D Virtual Representations of Complex Environments VECIMS 2004 - IEEE International Conference on Virtual Environments, Human-Computer Interfaces, and Measurement Systems Boston, MA, USA, 12-14 July 2004 An Optimized Computational Technique for Free Space

More information

A Bintree Representation of Generalized Binary. Digital Images

A Bintree Representation of Generalized Binary. Digital Images A intree Representation of Generalized inary Digital mages Hanspeter ieri gor Metz 1 inary Digital mages and Hyperimages A d-dimensional binary digital image can most easily be modelled by a d-dimensional

More information

QUADTREE MESHES William T. Verts COINS Department University of Massachusetts Amherst, MA Professor Francis S. Hill, Jr. ECE Department ABSTRACT

QUADTREE MESHES William T. Verts COINS Department University of Massachusetts Amherst, MA Professor Francis S. Hill, Jr. ECE Department ABSTRACT QUADTREE MESHES William T. Verts COINS Department University of Massachusetts Amherst, MA 01003 Professor Francis S. Hill, Jr. ECE Department University of Massachusetts Amherst, MA 01003 ABSTRACT Quadtrees

More information

MODELING the environment in which an autonomous

MODELING the environment in which an autonomous 1734 IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. 55, NO. 5, OCTOBER 2006 A Computational Technique for Free Space Localization in 3-D Multiresolution Probabilistic Environment Models Pierre

More information

Image Rotation Using Quad Tree

Image Rotation Using Quad Tree 80 Image Rotation Using Quad Tree Aashish Kumar, Lec. ECE Dept. Swami Vivekanand institute of Engneering & Technology, Ramnagar Banur ABSTRACT This paper presents a data structure based technique of rotating

More information

UNIVERSITY OF WATERLOO Faculty of Mathematics

UNIVERSITY OF WATERLOO Faculty of Mathematics UNIVERSITY OF WATERLOO Faculty of Mathematics Exploring the application of Space Partitioning Methods on river segments S.S. Papadopulos & Associates Bethesda, MD, US Max Ren 20413992 3A Computer Science/BBA

More information

A parallel algorithm for generating chain code of objects in binary images

A parallel algorithm for generating chain code of objects in binary images Information Sciences 149 (2003) 219 234 www.elsevier.com/locate/ins A parallel algorithm for generating chain code of objects in binary images Tsorng-Lin Chia a, *, Kuang-Bor Wang a, Lay-Rong Chen b, Zen

More information

Ray Tracing Acceleration Data Structures

Ray Tracing Acceleration Data Structures Ray Tracing Acceleration Data Structures Sumair Ahmed October 29, 2009 Ray Tracing is very time-consuming because of the ray-object intersection calculations. With the brute force method, each ray has

More information

A Practical Algorithm for Computing Neighbors in Quadtrees, Octrees, and Hyperoctrees

A Practical Algorithm for Computing Neighbors in Quadtrees, Octrees, and Hyperoctrees A Practical Algorithm for Computing Neighbors in Quadtrees, Octrees, and Hyperoctrees Robert Yoder, Department of Computer Science, Siena College, 55 Loudon Road Loudonville, NY. Peter Bloniarz, Department

More information

Computer Graphics. Bing-Yu Chen National Taiwan University The University of Tokyo

Computer Graphics. Bing-Yu Chen National Taiwan University The University of Tokyo Computer Graphics Bing-Yu Chen National Taiwan University The University of Tokyo Hidden-Surface Removal Back-Face Culling The Depth-Sort Algorithm Binary Space-Partitioning Trees The z-buffer Algorithm

More information

Advanced 3D-Data Structures

Advanced 3D-Data Structures Advanced 3D-Data Structures Eduard Gröller, Martin Haidacher Institute of Computer Graphics and Algorithms Vienna University of Technology Motivation For different data sources and applications different

More information

Practical Image and Video Processing Using MATLAB

Practical Image and Video Processing Using MATLAB Practical Image and Video Processing Using MATLAB Chapter 18 Feature extraction and representation What will we learn? What is feature extraction and why is it a critical step in most computer vision and

More information

CONNECTED COMPONENT LABELING USING MODIFIED LINEAR QUADTREES

CONNECTED COMPONENT LABELING USING MODIFIED LINEAR QUADTREES - 235 - CONNECTED COMPONENT LABELING USING MODIFIED LINEAR QUADTREES Xiaoning Wang and Wayne A. Davis Department of Computing Science The University of Alberta Edmonton, Alberta, Canada T6G 2Hl Abstract!

More information

Spatial Data Structures

Spatial Data Structures CSCI 420 Computer Graphics Lecture 17 Spatial Data Structures Jernej Barbic University of Southern California Hierarchical Bounding Volumes Regular Grids Octrees BSP Trees [Angel Ch. 8] 1 Ray Tracing Acceleration

More information

Spatial Data Structures

Spatial Data Structures CSCI 480 Computer Graphics Lecture 7 Spatial Data Structures Hierarchical Bounding Volumes Regular Grids BSP Trees [Ch. 0.] March 8, 0 Jernej Barbic University of Southern California http://www-bcf.usc.edu/~jbarbic/cs480-s/

More information

Block-Based Connected-Component Labeling Algorithm Using Binary Decision Trees

Block-Based Connected-Component Labeling Algorithm Using Binary Decision Trees Sensors 2015, 15, 23763-23787; doi:10.3390/s150923763 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Block-Based Connected-Component Labeling Algorithm Using Binary Decision Trees

More information

Programming Assignment 1: A Data Structure For VLSI Applications 1

Programming Assignment 1: A Data Structure For VLSI Applications 1 Fall 2016 CMSC 420 Hanan Samet Programming Assignment 1: A Data Structure For VLSI Applications 1 Abstract In this assignment you are required to implement an information management system for handling

More information

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

User-Friendly Sharing System using Polynomials with Different Primes in Two Images User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra

More information

An improvement in the build algorithm for Kd-trees using mathematical mean

An improvement in the build algorithm for Kd-trees using mathematical mean An improvement in the build algorithm for Kd-trees using mathematical mean Priyank Trivedi, Abhinandan Patni, Zeon Trevor Fernando and Tejaswi Agarwal School of Computing Sciences and Engineering, VIT

More information

Data Structures I. C omputer graphics applications require the manipulation. Hierarchical Data Structures. Hanan Samet University of Maryland

Data Structures I. C omputer graphics applications require the manipulation. Hierarchical Data Structures. Hanan Samet University of Maryland Data Structures I Hierarchical Data Structures Hanan Samet University of Maryland Robert E. Webber Rutgers University This is the first part of a two-part overview of the use of hierarchical data structures

More information

Ray Tracing III. Wen-Chieh (Steve) Lin National Chiao-Tung University

Ray Tracing III. Wen-Chieh (Steve) Lin National Chiao-Tung University Ray Tracing III Wen-Chieh (Steve) Lin National Chiao-Tung University Shirley, Fundamentals of Computer Graphics, Chap 10 Doug James CG slides, I-Chen Lin s CG slides Ray-tracing Review For each pixel,

More information

APPLICATION OF FLOYD-WARSHALL LABELLING TECHNIQUE: IDENTIFICATION OF CONNECTED PIXEL COMPONENTS IN BINARY IMAGE. Hyunkyung Shin and Joong Sang Shin

APPLICATION OF FLOYD-WARSHALL LABELLING TECHNIQUE: IDENTIFICATION OF CONNECTED PIXEL COMPONENTS IN BINARY IMAGE. Hyunkyung Shin and Joong Sang Shin Kangweon-Kyungki Math. Jour. 14 (2006), No. 1, pp. 47 55 APPLICATION OF FLOYD-WARSHALL LABELLING TECHNIQUE: IDENTIFICATION OF CONNECTED PIXEL COMPONENTS IN BINARY IMAGE Hyunkyung Shin and Joong Sang Shin

More information

A QUAD-TREE DECOMPOSITION APPROACH TO CARTOON IMAGE COMPRESSION. Yi-Chen Tsai, Ming-Sui Lee, Meiyin Shen and C.-C. Jay Kuo

A QUAD-TREE DECOMPOSITION APPROACH TO CARTOON IMAGE COMPRESSION. Yi-Chen Tsai, Ming-Sui Lee, Meiyin Shen and C.-C. Jay Kuo A QUAD-TREE DECOMPOSITION APPROACH TO CARTOON IMAGE COMPRESSION Yi-Chen Tsai, Ming-Sui Lee, Meiyin Shen and C.-C. Jay Kuo Integrated Media Systems Center and Department of Electrical Engineering University

More information

Computer Science. Using Ordered Binary-Decision Diagrams for Compressing Images and Image Sequences

Computer Science. Using Ordered Binary-Decision Diagrams for Compressing Images and Image Sequences Computer Science Using Ordered Binary-Decision Diagrams for Compressing Images and Image Sequences Mike Star key and Randy Bryant January 1995 CMU-CS-95-105 Carnegie Mellon gültekimlifj^; Apj«o«d lev pobflb

More information

Solid Modeling. Thomas Funkhouser Princeton University C0S 426, Fall Represent solid interiors of objects

Solid Modeling. Thomas Funkhouser Princeton University C0S 426, Fall Represent solid interiors of objects Solid Modeling Thomas Funkhouser Princeton University C0S 426, Fall 2000 Solid Modeling Represent solid interiors of objects Surface may not be described explicitly Visible Human (National Library of Medicine)

More information

MODELING AND HIERARCHY

MODELING AND HIERARCHY MODELING AND HIERARCHY Introduction Models are abstractions of the world both of the real world in which we live and of virtual worlds that we create with computers. We are all familiar with mathematical

More information

PROPERTIES AND APPLICATIONS OF FORESTS OF QUADTREES FOR PICTORIAL DATA REPRESENTATION

PROPERTIES AND APPLICATIONS OF FORESTS OF QUADTREES FOR PICTORIAL DATA REPRESENTATION BIT23 (1983[ 472-486 PROPERTIES AND APPLICATIONS OF FORESTS OF QUADTREES FOR PICTORIAL DATA REPRESENTATION VASUDEVAN RAMAN * and S. SITHARAMA IYENGAR ** Department of Electrical and Computer Engineeriug,

More information

Parallel Physically Based Path-tracing and Shading Part 3 of 2. CIS565 Fall 2012 University of Pennsylvania by Yining Karl Li

Parallel Physically Based Path-tracing and Shading Part 3 of 2. CIS565 Fall 2012 University of Pennsylvania by Yining Karl Li Parallel Physically Based Path-tracing and Shading Part 3 of 2 CIS565 Fall 202 University of Pennsylvania by Yining Karl Li Jim Scott 2009 Spatial cceleration Structures: KD-Trees *Some portions of these

More information

Spatial Data Structures

Spatial Data Structures 15-462 Computer Graphics I Lecture 17 Spatial Data Structures Hierarchical Bounding Volumes Regular Grids Octrees BSP Trees Constructive Solid Geometry (CSG) April 1, 2003 [Angel 9.10] Frank Pfenning Carnegie

More information

Spatial Data Structures

Spatial Data Structures Spatial Data Structures Hierarchical Bounding Volumes Regular Grids Octrees BSP Trees Constructive Solid Geometry (CSG) [Angel 9.10] Outline Ray tracing review what rays matter? Ray tracing speedup faster

More information

Space-based Partitioning Data Structures and their Algorithms. Jon Leonard

Space-based Partitioning Data Structures and their Algorithms. Jon Leonard Space-based Partitioning Data Structures and their Algorithms Jon Leonard Purpose Space-based Partitioning Data Structures are an efficient way of organizing data that lies in an n-dimensional space 2D,

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

Computer Graphics. Bing-Yu Chen National Taiwan University

Computer Graphics. Bing-Yu Chen National Taiwan University Computer Graphics Bing-Yu Chen National Taiwan University Visible-Surface Determination Back-Face Culling The Depth-Sort Algorithm Binary Space-Partitioning Trees The z-buffer Algorithm Scan-Line Algorithm

More information

The Evolution and Trend of Chain Code Scheme

The Evolution and Trend of Chain Code Scheme The Evolution and Trend of Chain Scheme 1 Lili Ayu Wulandhari, 2 Habibolah Haron Department of Modelling and Industrial Computing Faculty of Computer Science and Information Systems Universiti Teknologi

More information

NUMERICAL COMPUTATION METHOD OF THE GENERAL DISTANCE TRANSFORM

NUMERICAL COMPUTATION METHOD OF THE GENERAL DISTANCE TRANSFORM STUDIA UNIV. BABEŞ BOLYAI, INFORMATICA, Volume LVI, Number 2, 2011 NUMERICAL COMPUTATION METHOD OF THE GENERAL DISTANCE TRANSFORM SZIDÓNIA LEFKOVITS(1) Abstract. The distance transform is a mathematical

More information

Announcements. Written Assignment2 is out, due March 8 Graded Programming Assignment2 next Tuesday

Announcements. Written Assignment2 is out, due March 8 Graded Programming Assignment2 next Tuesday Announcements Written Assignment2 is out, due March 8 Graded Programming Assignment2 next Tuesday 1 Spatial Data Structures Hierarchical Bounding Volumes Grids Octrees BSP Trees 11/7/02 Speeding Up Computations

More information

Spatial Data Structures

Spatial Data Structures 15-462 Computer Graphics I Lecture 17 Spatial Data Structures Hierarchical Bounding Volumes Regular Grids Octrees BSP Trees Constructive Solid Geometry (CSG) March 28, 2002 [Angel 8.9] Frank Pfenning Carnegie

More information

Algorithms for GIS:! Quadtrees

Algorithms for GIS:! Quadtrees Algorithms for GIS: Quadtrees Quadtree A data structure that corresponds to a hierarchical subdivision of the plane Start with a square (containing inside input data) Divide into 4 equal squares (quadrants)

More information

CSG obj. oper3. obj1 obj2 obj3. obj5. obj4

CSG obj. oper3. obj1 obj2 obj3. obj5. obj4 Solid Modeling Solid: Boundary + Interior Volume occupied by geometry Solid representation schemes Constructive Solid Geometry (CSG) Boundary representations (B-reps) Space-partition representations Operations

More information

CS535 Fall Department of Computer Science Purdue University

CS535 Fall Department of Computer Science Purdue University Spatial Data Structures and Hierarchies CS535 Fall 2010 Daniel G Aliaga Daniel G. Aliaga Department of Computer Science Purdue University Spatial Data Structures Store geometric information Organize geometric

More information

Lecture 17: Solid Modeling.... a cubit on the one side, and a cubit on the other side Exodus 26:13

Lecture 17: Solid Modeling.... a cubit on the one side, and a cubit on the other side Exodus 26:13 Lecture 17: Solid Modeling... a cubit on the one side, and a cubit on the other side Exodus 26:13 Who is on the LORD's side? Exodus 32:26 1. Solid Representations A solid is a 3-dimensional shape with

More information

Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach

Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach O. El Badawy, M. S. Kamel Pattern Analysis and Machine Intelligence Laboratory, Department of Systems Design Engineering,

More information

CMSC 425: Lecture 10 Geometric Data Structures for Games: Index Structures Tuesday, Feb 26, 2013

CMSC 425: Lecture 10 Geometric Data Structures for Games: Index Structures Tuesday, Feb 26, 2013 CMSC 2: Lecture 10 Geometric Data Structures for Games: Index Structures Tuesday, Feb 2, 201 Reading: Some of today s materials can be found in Foundations of Multidimensional and Metric Data Structures,

More information

Efficient geographic information systems: Data structures, Boolean operations and concurrency control

Efficient geographic information systems: Data structures, Boolean operations and concurrency control Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 1990 Efficient geographic information systems: Data structures, Boolean operations and concurrency control James

More information

Geometric Structures 2. Quadtree, k-d stromy

Geometric Structures 2. Quadtree, k-d stromy Geometric Structures 2. Quadtree, k-d stromy Martin Samuelčík samuelcik@sccg.sk, www.sccg.sk/~samuelcik, I4 Window and Point query From given set of points, find all that are inside of given d-dimensional

More information

LOSSLESS COMPRESSION OF LARGE BINARY IMAGES IN DIGITAL SPATIAL LIBRARIES

LOSSLESS COMPRESSION OF LARGE BINARY IMAGES IN DIGITAL SPATIAL LIBRARIES UNIVERSITY OF JOENSUU DEPARTMENT OF COMPUTER SCIENCE Report Series A LOSSLESS COMPRESSION OF LARGE BINARY IMAGES IN DIGITAL SPATIAL LIBRARIES EUGENE AGEENKO and PASI FRÄNTI Report A-999-3 ACM I.4.2 UDK

More information

Foundations of Multidimensional and Metric Data Structures

Foundations of Multidimensional and Metric Data Structures Foundations of Multidimensional and Metric Data Structures Hanan Samet University of Maryland, College Park ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE

More information

An Improved Run Length Encoding Scheme for Image Compression Ch.Samson 1, VUK Sastry 2

An Improved Run Length Encoding Scheme for Image Compression Ch.Samson 1, VUK Sastry 2 www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 3 March 2017, Page No. 20716-20720 Index Copernicus value (2015): 58.10 DOI: 10.18535/ijecs/v6i3.57

More information

Unit III - Tree TREES

Unit III - Tree TREES TREES Unit III - Tree Consider a scenario where you are required to represent the directory structure of your operating system. The directory structure contains various folders and files. A folder may

More information

Topic 5: Raster and Vector Data Models

Topic 5: Raster and Vector Data Models Geography 38/42:286 GIS 1 Topic 5: Raster and Vector Data Models Chapters 3 & 4: Chang (Chapter 4: DeMers) 1 The Nature of Geographic Data Most features or phenomena occur as either: discrete entities

More information

A New Technique of Lossless Image Compression using PPM-Tree

A New Technique of Lossless Image Compression using PPM-Tree A New Technique of Lossless Image Compression PP-Tree Shams ahmood Imam, S.. Rezaul Hoque, ohammad Kabir Hossain, William Perrizo Department of Computer Science and Engineering, North South University,

More information

Multidimensional Indexes [14]

Multidimensional Indexes [14] CMSC 661, Principles of Database Systems Multidimensional Indexes [14] Dr. Kalpakis http://www.csee.umbc.edu/~kalpakis/courses/661 Motivation Examined indexes when search keys are in 1-D space Many interesting

More information

4. References. q h-1. q h

4. References. q h-1. q h 4. References -1-2 Fig. 5 polygon on which the DSW algorithm fails. C 1 Bhattacharya B K, ElGindy H. new linear convex hull algorithm for simple polygons. IEEE Transactions on Information Theory. 1994,

More information

This research was supported in part by DOE Grant #DE-FG05-88ER25063 and JPL Contract #957721

This research was supported in part by DOE Grant #DE-FG05-88ER25063 and JPL Contract #957721 Q -TREE: A DYNAMIC STRUCTURE FOR ACCESSING SPATIAL OBJECTS WITH ARBITRARY SHAPES Ratko Orlandic John L. Pfaltz IPC-TR-9- December 6, 99 Institute for Parallel Computation School of Engineering and Applied

More information

Second degree equations - quadratics. nonparametric: x 2 + y 2 + z 2 = r 2

Second degree equations - quadratics. nonparametric: x 2 + y 2 + z 2 = r 2 walters@buffalo.edu CSE 480/580 Lecture 20 Slide 1 Three Dimensional Representations Quadric Surfaces Superquadrics Sweep Representations Constructive Solid Geometry Octrees Quadric Surfaces Second degree

More information

CS 352: Computer Graphics. Hierarchical Graphics, Modeling, And Animation

CS 352: Computer Graphics. Hierarchical Graphics, Modeling, And Animation CS 352: Computer Graphics Hierarchical Graphics, Modeling, And Animation Chapter 9-2 Overview Modeling Animation Data structures for interactive graphics CSG-tree BSP-tree Quadtrees and Octrees Visibility

More information

C E N T E R A T H O U S T O N S C H O O L of H E A L T H I N F O R M A T I O N S C I E N C E S. Image Operations II

C E N T E R A T H O U S T O N S C H O O L of H E A L T H I N F O R M A T I O N S C I E N C E S. Image Operations II T H E U N I V E R S I T Y of T E X A S H E A L T H S C I E N C E C E N T E R A T H O U S T O N S C H O O L of H E A L T H I N F O R M A T I O N S C I E N C E S Image Operations II For students of HI 5323

More information

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Tomonori Furuta, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Kyushu Institute of Technology, Dept. of Electrical, Electronic and Computer

More information

إستخدام األشجار الرباعية و تقسيم المسافة الهرمي

إستخدام األشجار الرباعية و تقسيم المسافة الهرمي إستخدام األشجار الرباعية و تقسيم المسافة الهرمي أ.م مكي ة كاظم حمد كلية العلوم جامعة بغداد م.م مها شاكر إبراهيم الثالث Abstract A quad tree :is a nonlinear data structure in which each internal node has

More information

Trees. Tree Structure Binary Tree Tree Traversals

Trees. Tree Structure Binary Tree Tree Traversals Trees Tree Structure Binary Tree Tree Traversals The Tree Structure Consists of nodes and edges that organize data in a hierarchical fashion. nodes store the data elements. edges connect the nodes. The

More information

Correspondence. Efficient Component Labeling of Images of Arbitrary Dimension Represented by Linear Bintrees HANAN SAMET AND MARKKU TAMMINEN

Correspondence. Efficient Component Labeling of Images of Arbitrary Dimension Represented by Linear Bintrees HANAN SAMET AND MARKKU TAMMINEN IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. IO, NO. 4. JULY 1988 579 Correspondence Efficient Component Labeling of Images of Arbitrary Dimension Represented by Linear Bintrees

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

Quadtrees and Meshing

Quadtrees and Meshing Computational Geometry Lecture INSTITUT FÜR THEORETISCHE INFORMATIK FAKULTÄT FÜR INFORMATIK Tamara Mchedlidze Darren Strash 14.12.2015 Motivation: Meshing PC Board Layouts To simulate the heat produced

More information

CS443: Digital Imaging and Multimedia Binary Image Analysis. Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University

CS443: Digital Imaging and Multimedia Binary Image Analysis. Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University CS443: Digital Imaging and Multimedia Binary Image Analysis Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines A Simple Machine Vision System Image segmentation by thresholding

More information

Digital Image Processing Fundamentals

Digital Image Processing Fundamentals Ioannis Pitas Digital Image Processing Fundamentals Chapter 7 Shape Description Answers to the Chapter Questions Thessaloniki 1998 Chapter 7: Shape description 7.1 Introduction 1. Why is invariance to

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

Chapter 8: Data Abstractions

Chapter 8: Data Abstractions Chapter 8: Data Abstractions Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Presentation files modified by Farn Wang Copyright 28 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

More information

Image Segmentation Techniques

Image Segmentation Techniques A Study On Image Segmentation Techniques Palwinder Singh 1, Amarbir Singh 2 1,2 Department of Computer Science, GNDU Amritsar Abstract Image segmentation is very important step of image analysis which

More information

Lecture 25 of 41. Spatial Sorting: Binary Space Partitioning Quadtrees & Octrees

Lecture 25 of 41. Spatial Sorting: Binary Space Partitioning Quadtrees & Octrees Spatial Sorting: Binary Space Partitioning Quadtrees & Octrees William H. Hsu Department of Computing and Information Sciences, KSU KSOL course pages: http://bit.ly/hgvxlh / http://bit.ly/evizre Public

More information

Spatial Data Structures and Speed-Up Techniques. Tomas Akenine-Möller Department of Computer Engineering Chalmers University of Technology

Spatial Data Structures and Speed-Up Techniques. Tomas Akenine-Möller Department of Computer Engineering Chalmers University of Technology Spatial Data Structures and Speed-Up Techniques Tomas Akenine-Möller Department of Computer Engineering Chalmers University of Technology Spatial data structures What is it? Data structure that organizes

More information

Chain Coding Streamed Images through Crack Run-Length Encoding

Chain Coding Streamed Images through Crack Run-Length Encoding Chain Coding Streamed Images through Crack Run-Length Encoding D.G. Bailey School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand. Email: D.G.Bailey@massey.ac.nz

More information

APPLICATIONS OF SPATIAL DATA STRUCTURES: COMPUTER GRAPHICS, IMAGE PROCESSING, AND GEOGRAPHIC INFORMATION SYSTEMS (REVISED)

APPLICATIONS OF SPATIAL DATA STRUCTURES: COMPUTER GRAPHICS, IMAGE PROCESSING, AND GEOGRAPHIC INFORMATION SYSTEMS (REVISED) APPLICATIONS OF SPATIAL DATA STRUCTURES: COMPUTER GRAPHICS, IMAGE PROCESSING, AND GEOGRAPHIC INFORMATION SYSTEMS (REVISED) Hanan Samet Computer Science Department University of Maryland College Park, Maryland

More information

Investigation of Algorithms for Calculating Target Region Area

Investigation of Algorithms for Calculating Target Region Area International Journal of Intelligent Engineering & Systems http://www.inass.org/ Investigation of Algorithms for Calculating Target Region Area Yueqiu Jiang 1, Hongwei Gao 2, Lei Jin 1 1 Communication

More information

Digital image steganography using LSB substitution, PVD, and EMD

Digital image steganography using LSB substitution, PVD, and EMD Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra

More information

1. Meshes. D7013E Lecture 14

1. Meshes. D7013E Lecture 14 D7013E Lecture 14 Quadtrees Mesh Generation 1. Meshes Input: Components in the form of disjoint polygonal objects Integer coordinates, 0, 45, 90, or 135 angles Output: A triangular mesh Conforming: A triangle

More information

CAR-TR-990 CS-TR-4526 UMIACS September 2003

CAR-TR-990 CS-TR-4526 UMIACS September 2003 CAR-TR-990 CS-TR-4526 UMIACS 2003-94 September 2003 Object-based and Image-based Object Representations Hanan Samet Computer Science Department Center for Automation Research Institute for Advanced Computer

More information

Spatial Data Structures for GIS Visualization. Ed Grundy

Spatial Data Structures for GIS Visualization. Ed Grundy Spatial Data Structures for GIS Visualization Ed Grundy GIS Data Elevation maps Satellite imagery (as texture data) Other data we may wish to visualise, such as temperature, population, etc In GIS terms

More information

Classification and Generation of 3D Discrete Curves

Classification and Generation of 3D Discrete Curves Applied Mathematical Sciences, Vol. 1, 2007, no. 57, 2805-2825 Classification and Generation of 3D Discrete Curves Ernesto Bribiesca Departamento de Ciencias de la Computación Instituto de Investigaciones

More information

COMP30019 Graphics and Interaction Scan Converting Polygons and Lines

COMP30019 Graphics and Interaction Scan Converting Polygons and Lines COMP30019 Graphics and Interaction Scan Converting Polygons and Lines Department of Computer Science and Software Engineering The Lecture outline Introduction Scan conversion Scan-line algorithm Edge coherence

More information

Representation Techniques for Logical Spaces

Representation Techniques for Logical Spaces Representation Techniques for Logical Spaces Mr. Wasim Khan Women's Polytechnic College,Indore wasukhan1982@gmail.com Mr. Dharmendra Gupta CDGI,Indore dharmendragupta86@gmail.com Abstract: Computer machine

More information

ECE 242 Data Structures and Algorithms. Trees IV. Lecture 21. Prof.

ECE 242 Data Structures and Algorithms.  Trees IV. Lecture 21. Prof. ECE 22 Data Structures and Algorithms http://www.ecs.umass.edu/~polizzi/teaching/ece22/ Trees IV Lecture 2 Prof. Eric Polizzi Summary previous lectures Implementations BST 5 5 7 null 8 null null 7 null

More information

Intersection Acceleration

Intersection Acceleration Advanced Computer Graphics Intersection Acceleration Matthias Teschner Computer Science Department University of Freiburg Outline introduction bounding volume hierarchies uniform grids kd-trees octrees

More information

However, m pq is just an approximation of M pq. As it was pointed out by Lin [2], more precise approximation can be obtained by exact integration of t

However, m pq is just an approximation of M pq. As it was pointed out by Lin [2], more precise approximation can be obtained by exact integration of t FAST CALCULATION OF GEOMETRIC MOMENTS OF BINARY IMAGES Jan Flusser Institute of Information Theory and Automation Academy of Sciences of the Czech Republic Pod vodarenskou vez 4, 82 08 Prague 8, Czech

More information

Heading-Based Sectional Hierarchy Identification for HTML Documents

Heading-Based Sectional Hierarchy Identification for HTML Documents Heading-Based Sectional Hierarchy Identification for HTML Documents 1 Dept. of Computer Engineering, Boğaziçi University, Bebek, İstanbul, 34342, Turkey F. Canan Pembe 1,2 and Tunga Güngör 1 2 Dept. of

More information

Segmentation of Images

Segmentation of Images Segmentation of Images SEGMENTATION If an image has been preprocessed appropriately to remove noise and artifacts, segmentation is often the key step in interpreting the image. Image segmentation is a

More information

Morphological track 1

Morphological track 1 Morphological track 1 Shapes Painting of living beings on cave walls at Lascaux [about 1500 th BC] L homme qui marche by Alberto Giacometti, 1948, NOUVELLES IMAGES Editor (1976) Les lutteurs by Honoré

More information

Module 4: Tree-Structured Indexing

Module 4: Tree-Structured Indexing Module 4: Tree-Structured Indexing Module Outline 4.1 B + trees 4.2 Structure of B + trees 4.3 Operations on B + trees 4.4 Extensions 4.5 Generalized Access Path 4.6 ORACLE Clusters Web Forms Transaction

More information

Geometric Algorithms. Geometric search: overview. 1D Range Search. 1D Range Search Implementations

Geometric Algorithms. Geometric search: overview. 1D Range Search. 1D Range Search Implementations Geometric search: overview Geometric Algorithms Types of data:, lines, planes, polygons, circles,... This lecture: sets of N objects. Range searching Quadtrees, 2D trees, kd trees Intersections of geometric

More information

Lecture 06. Raster and Vector Data Models. Part (1) Common Data Models. Raster. Vector. Points. Points. ( x,y ) Area. Area Line.

Lecture 06. Raster and Vector Data Models. Part (1) Common Data Models. Raster. Vector. Points. Points. ( x,y ) Area. Area Line. Lecture 06 Raster and Vector Data Models Part (1) 1 Common Data Models Vector Raster Y Points Points ( x,y ) Line Area Line Area 2 X 1 3 Raster uses a grid cell structure Vector is more like a drawn map

More information

Identifying those parts of a scene that are visible from a chosen viewing position, and only process (scan convert) those parts

Identifying those parts of a scene that are visible from a chosen viewing position, and only process (scan convert) those parts Visible Surface Detection Identifying those parts of a scene that are visible from a chosen viewing position, and only process (scan convert) those parts Two approaches: 1. Object space methods 2. Image

More information

A PROBABILISTIC ANALYSIS OF TRIE-BASED SORTING OF LARGE COLLECTIONS OF LINE SEGMENTS IN SPATIAL DATABASES

A PROBABILISTIC ANALYSIS OF TRIE-BASED SORTING OF LARGE COLLECTIONS OF LINE SEGMENTS IN SPATIAL DATABASES SIAM J. COMPUT. Vol. 35, No., pp. 58 c 005 Society for Industrial and Applied Mathematics A PROBABILISTIC ANALYSIS OF TRIE-BASED SORTING OF LARGE COLLECTIONS OF LINE SEGMENTS IN SPATIAL DATABASES MICHAEL

More information

University of Illinois at Urbana-Champaign Department of Computer Science. Second Examination

University of Illinois at Urbana-Champaign Department of Computer Science. Second Examination University of Illinois at Urbana-Champaign Department of Computer Science Second Examination CS 225 Data Structures and Software Principles Fall 2011 9a-11a, Wednesday, November 2 Name: NetID: Lab Section

More information

Programming Assignment 1: A Data Structure For VLSI Applications 1

Programming Assignment 1: A Data Structure For VLSI Applications 1 Fall 2014 CMSC 420 Hanan Samet Programming Assignment 1: A Data Structure For VLSI Applications 1 Abstract In this assignment you are required to implement an information management system for handling

More information

BMVC 1996 doi: /c.10.41

BMVC 1996 doi: /c.10.41 On the use of the 1D Boolean model for the description of binary textures M Petrou, M Arrigo and J A Vons Dept. of Electronic and Electrical Engineering, University of Surrey, Guildford GU2 5XH, United

More information

Compressing 2-D Shapes using Concavity Trees

Compressing 2-D Shapes using Concavity Trees Compressing 2-D Shapes using Concavity Trees O. El Badawy 1 and M. S. Kamel 2 1 Dept. of Systems Design Engineering. 2 Dept. of Electrical and Computer Engineering. Pattern Analysis and Machine Intelligence

More information

A New Progressive Lossy-to-Lossless Coding Method for 2.5-D Triangle Mesh with Arbitrary Connectivity

A New Progressive Lossy-to-Lossless Coding Method for 2.5-D Triangle Mesh with Arbitrary Connectivity A New Progressive Lossy-to-Lossless Coding Method for 2.5-D Triangle Mesh with Arbitrary Connectivity Dan Han University of Victoria October 31, 2016 New Mesh-Coding Method Dan Han 1 Outline 1 Introduction

More information

Solutions to Midterm 2 - Monday, July 11th, 2009

Solutions to Midterm 2 - Monday, July 11th, 2009 Solutions to Midterm - Monday, July 11th, 009 CPSC30, Summer009. Instructor: Dr. Lior Malka. (liorma@cs.ubc.ca) 1. Dynamic programming. Let A be a set of n integers A 1,..., A n such that 1 A i n for each

More information