Digitizing real-life objects via range scanners, stereo vision or tactile sensors usually requires the composition of multiple range images. In this paper we exploit intensity images often recorded with the range data...
详细信息
MSC Codes Primary: 60K05, 92D25, Secondary: 60K10, 60K35, 60J70We consider a population with two types of individuals, distinguished by the resources required for reproduction: type-0 (small) individuals need a fracti...
详细信息
Despite recent advances in finding efficient LOD-representations for gigantic 3D objects, rendering of complex, gigabyte-sized models and environments is still a challenging task, especially under real-time constraint...
详细信息
In this paper, we propose a novel free-form deformation (FFD) technique, RDMS-FFD (Rational DMS-FFD), based on rational DMS-spline volumes. RDMS-FFD inherits some good properties of rational DMS-spline volumes and...
详细信息
In this paper, we propose a novel free-form deformation (FFD) technique, RDMS-FFD (Rational DMS-FFD), based on rational DMS-spline volumes. RDMS-FFD inherits some good properties of rational DMS-spline volumes and combines more deformation techniques than previous FFD methods in a consistent framework, such as local deformation, control lattice of arbitrary topology, smooth deformation, multiresolution deformation and direct manipulation of deformation. We first introduce the rational DMS-spline volume by directly generalizing the previous results related to DMS-splines. How to generate a tetrahedral domain that approximates the shape of the object to be deformed is also introduced in this paper. Unlike the traditional FFD techniques, we manipulate the vertices of the tetrahedral domain to achieve deformation results. Our system demonstrates that RDMS-FFD is powerful and intuitive in geometric modeling.
Trimmed NURBS models are the standard representation used in CAD/CAM systems and accurate visualization of large trimmed NURBS models at interactive frame rates is of great interest for industry. To visualize the qual...
详细信息
In this paper we present a novel integrated 3D editing environment that combines recent advantages in various fields of computergraphics, such as shape modelling, video-based Human computer Interaction, force feedbac...
详细信息
When modeling in 3D CAD, architects often search for already existing 3D content to complete their own design, e.g. environmental models, furniture models or detailed window profiles. 3D models are normally indexed an...
详细信息
ISBN:
(纸本)9789068141818
When modeling in 3D CAD, architects often search for already existing 3D content to complete their own design, e.g. environmental models, furniture models or detailed window profiles. 3D models are normally indexed and accessed based on textual metadata. As this metadata is expensive to obtain, PROBADO3D aims to develop workflows and tools for semi-automatic indexing of 3D models. Another goal is the development of intuitive visual search and presentation interfaces that face the needs of architects looking for 3D content. PROBADO3D is a part of the PROBADO framework designed to support multimedia objects of different domains.
In this paper, we address the semantic interpretation of urban environments on the basis of multi-modal data in the form of RGB color imagery, hyperspectral data and LiDAR data acquired from aerial sensor platforms. W...
详细信息
Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive *** access control means that multiple subjects s...
详细信息
Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive *** access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of *** approaches to access control cannot satisfy the requirements of collaborative access *** address this concern,we propose an authorization model for collaborative access *** central notions of the model are collaborative permission,collaboration constraint,and collaborative authorization policy,which make it possible to define the collaboration among multiple subjects involved in gaining a *** implementation architecture of the model is also ***,we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies.
The growing prevalence of smartphones and the increasing dependence on digital services have made it crucial to have authentication techniques that are both secure and user-friendly. This study examines the effectiven...
详细信息
The growing prevalence of smartphones and the increasing dependence on digital services have made it crucial to have authentication techniques that are both secure and user-friendly. This study examines the effectiveness and usability of graphical passwords named GPNST as an alternative authentication method on mobile devices. Graphical passwords use users’ capacity to remember visuals or patterns, offering a possible equilibrium between security and user pleasure. GPNST is a two-factor authentication technique that requires users to remember content and style images, or stylized images, as portfolio images. Additionally, a unique key token is assigned to each user device and securely sent to the server using the reversible data hiding approach, therefore mitigating several potential attacks. The research uses a combination of quantitative analysis to evaluate the strength of passwords and qualitative evaluations to measure user satisfaction and memorability. We investigate the influence of several design elements in graphical passwords, such as the intricacy of images and the layout of grids, on both the level of security and ease of use. In addition, the study evaluates the robustness of graphical passwords against popular forms of attacks, such as shoulder surfing and brute-force efforts. The findings provide valuable insights regarding the practicality of incorporating graphical passwords into smartphone authentication systems. This has implications for designers, developers, and users who are looking for secure and user-friendly solutions in the constantly changing field of mobile technology. The GPNST scheme demonstrates outstanding performance in our assessment test, with an accuracy rate of up to 94.80% and a login time of 9.61 seconds.
暂无评论