scholarly journals SIMPLIPOLY: CURVATURE-BASED POLYGONAL CURVE SIMPLIFICATION

2011 ◽  
Vol 21 (04) ◽  
pp. 417-429 ◽  
Author(s):  
CHANSOPHEA CHUON ◽  
SUMANTA GUHA ◽  
PAUL JANECEK ◽  
NGUYEN DUC CONG SONG

A curvature-based algorithm to simplify a polygonal curve is described, together with its implementation. The so-called SimpliPoly algorithm uses Bézier curves to approximate pieces of the input curve, and assign curvature estimates to vertices of the input polyline from curvature values computed for the Bézier approximations. The authors' implementation of SimpliPoly is interactive and available freely on-line. Additionally, a third-party implementation of SimpliPoly as a plug-in for the GNU Blender 3D modeling software is available. Empirical comparisons indicate that SimpliPoly performs as well as the widely-used Douglas-Peucker algorithm in most situations, and significantly better, because it is curvature-driven, in applications where it is necessary to preserve local features.

2013 ◽  
Vol 341-342 ◽  
pp. 704-708 ◽  
Author(s):  
Alexey Demin ◽  
Tian Rui Zhang ◽  
Hong Sheng Geng ◽  
Xin Li ◽  
Wan Shan Wang

With a growing popularity of web applications, new technology can be adopted to create a 3D application for robotics simulation without plug-ins or third party components based on HTML5 and WebGL. By the use of 3D modeling software Remo3D, the three-dimensionally geometric model of robots links is built up. The standard COLLADA is used as a file format for storing the scene graph structure of robot model. The application uses open standards and can be run in any modern browser on PC or any smart device without installation.


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 345
Author(s):  
Pyung Kim ◽  
Younho Lee ◽  
Youn-Sik Hong ◽  
Taekyoung Kwon

To meet password selection criteria of a server, a user occasionally needs to provide multiple choices of password candidates to an on-line password meter, but such user-chosen candidates tend to be derived from the user’s previous passwords—the meter may have a high chance to acquire information about a user’s passwords employed for various purposes. A third party password metering service may worsen this threat. In this paper, we first explore a new on-line password meter concept that does not necessitate the exposure of user’s passwords for evaluating user-chosen password candidates in the server side. Our basic idea is straightforward; to adapt fully homomorphic encryption (FHE) schemes to build such a system but its performance achievement is greatly challenging. Optimization techniques are necessary for performance achievement in practice. We employ various performance enhancement techniques and implement the NIST (National Institute of Standards and Technology) metering method as seminal work in this field. Our experiment results demonstrate that the running time of the proposed meter is around 60 s in a conventional desktop server, expecting better performance in high-end hardware, with an FHE scheme in HElib library where parameters support at least 80-bit security. We believe the proposed method can be further explored and used for a password metering in case that password secrecy is very important—the user’s password candidates should not be exposed to the meter and also an internal mechanism of password metering should not be disclosed to users and any other third parties.


2020 ◽  
Author(s):  
Jaimie Krems ◽  
Keelah Williams ◽  
Douglas Kenrick ◽  
Athena Aktipis

Friendships can foster happiness, health, and reproductive fitness. But friendships end—even when we might not want them to. A primary reason for this is interference from third parties. Yet little work has explored how people meet the challenge of maintaining friendships in the face of real or perceived threats from third parties, as when our friends inevitably make new friends or form new romantic relationships. In contrast to earlier conceptualizations from developmental research, which viewed friendship jealousy as solely maladaptive, we propose that friendship jealousy is one overlooked tool of friendship maintenance. We derive and test—via a series of 11 studies (N = 2918) using hypothetical scenarios, recalled real-world events, and manipulation of on-line emotional experiences—whether friendship jealousy possesses the features of a tool well-designed to help us retain friends in the face of third-party threats. Consistent with our proposition, findings suggest that friendship jealousy is (1) uniquely evoked by third-party threats to friendships (but not the prospective loss of the friendship alone), (2) sensitive to the value of the threatened friendship, (3) strongly calibrated to cues that one is being replaced, even over more intuitive cues (e.g., the amount of time a friend and interloper spend together), and (4) ultimately motivates behavior aimed at countering third-party threats to friendship (“friend guarding”). Even as friendship jealousy may be negative to experience, it may include features designed for beneficial—and arguably prosocial—ends: to help maintain friendships.


2012 ◽  
Vol 482-484 ◽  
pp. 2148-2152
Author(s):  
Cong Wei Yang ◽  
Hai Tao Wu ◽  
Hong Bin Liu

Established the model of dual-purpose move-assistant device of wheelchair and crutch, using 3D modeling software SolidWorks, finished the 3D model of parts and parts assembly according to the design requirements of dual-purpose move-assistant device of wheelchair and crutch. Verified the accuracy of designing the project. With the software to carry on a 3D model design can save work time and economize the design budget, providing the theoretical feasibility of realizing the dual-purpose move-assistant device of wheelchair and crutch.


Diagnostics ◽  
2019 ◽  
Vol 10 (1) ◽  
pp. 15 ◽  
Author(s):  
Giuseppe Marongiu ◽  
Roberto Prost ◽  
Antonio Capone

Periprosthetic acetabular fractures after total hip arthroplasty (THA) are mostly related to low energy trauma reduced bone quality. CT-scan is widely used to evaluate acetabular fractures, however, metal artifacts produced prosthetic implants limit the visualization of the articular surface and bone loss assessment. 3D modeling software allows us to creating tridimensional images of the bony surface, removing the metallic implants trough image segmentation. We highlight the use of 3D modeling and rapid prototyping (3D printing) for the diagnostic process of periprosthetic acetabular fracture around THA. 3D modeling software was used to improve the assessment of fracture morphology and bone quality. Moreover, the 3D images were printed in a real-life size model and used for preoperative implant templating, sizing and surgical simulation.


Author(s):  
Pokpong Amornvit ◽  
Sasiwimol Sanohkan

Face scanners promise wide applications in medicine and dentistry, including facial recognition, capturing facial emotions, facial cosmetic planning and surgery, and maxillofacial rehabilitation. Higher accuracy improves the quality of the data recorded from the face scanner, which ultimately, will improve the outcome. Although there are various face scanners available on the market, there is no evidence of a suitable face scanner for practical applications. The aim of this in vitro study was to analyze the face scans obtained from four scanners; EinScan Pro (EP), EinScan Pro 2X Plus (EP+) (Shining 3D Tech. Co., Ltd. Hangzhou, China), iPhone X (IPX) (Apple Store, Cupertino, CA, USA), and Planmeca ProMax 3D Mid (PM) (Planmeca USA, Inc. IL, USA), and to compare scans obtained from various scanners with the control (measured from Vernier caliper). This should help to identify the appropriate scanner for face scanning. A master face model was created and printed from polylactic acid using the resolution of 200 microns on x, y, and z axes and designed in Rhinoceros 3D modeling software (Rhino, Robert McNeel and Associates for Windows, Washington DC, USA). The face models were 3D scanned with four scanners, five times, according to the manufacturer’s recommendations; EinScan Pro (Shining 3D Tech. Co., Ltd. Hangzhou, China), EinScan Pro 2X Plus (Shining 3D Tech. Co., Ltd. Hangzhou, China) using Shining Software, iPhone X (Apple Store, Cupertino, CA, USA) using Bellus3D Face Application (Bellus3D, version 1.6.2, Bellus3D, Inc. Campbell, CA, USA), and Planmeca ProMax 3D Mid (PM) (Planmeca USA, Inc. IL, USA). Scan data files were saved as stereolithography (STL) files for the measurements. From the STL files, digital face models are created in the computer using Rhinoceros 3D modeling software (Rhino, Robert McNeel and Associates for Windows, Washington DC, USA). Various measurements were measured five times from the reference points in three axes (x, y, and z) using a digital Vernier caliper (VC) (Mitutoyo 150 mm Digital Caliper, Mitutoyo Co., Kanagawa, Japan), and the mean was calculated, which was used as the control. Measurements were measured on the digital face models of EP, EP+, IPX, and PM using Rhinoceros 3D modeling software (Rhino, Robert McNeel and Associates for Windows, Washington DC, USA). The descriptive statistics were done from SPSS version 20 (IBM Company, Chicago, USA). One-way ANOVA with post hoc using Scheffe was done to analyze the differences between the control and the scans (EP, EP+, IPX, and PM). The significance level was set at p = 0.05. EP+ showed the highest accuracy. EP showed medium accuracy and some lesser accuracy (accurate until 10 mm of length), but IPX and PM showed the least accuracy. EP+ showed accuracy in measuring the 2 mm of depth (diameter 6 mm). All other scanners (EP, IPX, and PM) showed less accuracy in measuring depth. Finally, the accuracy of an optical scan is dependent on the technology used by each scanner. It is recommended to use EP+ for face scanning.


2015 ◽  
Vol 815 ◽  
pp. 282-286
Author(s):  
A.F. Aiman ◽  
M.N. Salleh ◽  
K.A. Ismail

Pressure garment is a standard non-surgical treatment for hypertrophic scar caused by burn injury. However, the main problem identified was the non-uniform pressure distribution due to the complexity of the contour at the facial area. Therefore, padding was developed to produce more efficient pressure distribution. This study used 3D scanning apparatus to obtain the cross sections of the facial area. The padding was developed using 3D modeling software which act as an insert to fill the gaps at the contact area of the garment and facial areas. The result shows that by inserting the padding underneath the garment, the pressure outputs indicate an acceptable pressure range with the suitable reduction factor for the head garment fabrication.


2014 ◽  
Vol 1028 ◽  
pp. 127-133
Author(s):  
Bing Hui Wu ◽  
Jian Jun Xi

Cable-detecting robot can replace human to accomplish various dangerous works. Comparing with labor practices, the robot not only reduce costs greatly but also guarantee the safety of workers. Thus, it is of broad application prospects. To assure the reliable action of the robot on the rope, a synchronous-style plane for clamping mechanism was proposed in this paper. According to the operation requirements of the robot, design criterion of clamping-force of this lock-mechanism was prompted. Utilizing 3D modeling software Pro/E, simulation model of synchronous clamping mechanism was built. And then displacement curve, velocity curve and acceleration curve will be obtained from the clamping mechanism output.


2013 ◽  
Vol 273 ◽  
pp. 790-795
Author(s):  
Kang Sun

In this paper, we propose compound target detection and tracking method that combines Bayesian local features classification and global template tracking. During target initialization phase, we convert local features recognition problem into Semi-Naive Bayesian classification theory to avoid computing and matching complex high-dimension descriptor. During tracking, detector hands over tracking task to the template tracker, which imposes temporal continuity constraints across on-line frames in order to increase the robustness and efficiency of the results. In typical application scenarios, once the tracker loses target, it requires the detector for reinitialization. Experiment results confirm the efficiency of our approach at last.


Sign in / Sign up

Export Citation Format

Share Document