AUTOMATIC REPAIR OF CITYGML LOD2 BUILDINGS USING SHRINK-WRAPPING
نویسندگان
چکیده
منابع مشابه
Automatically enhancing CityGML LOD2 models with a corresponding indoor geometry
The international standard CityGML defines five levels of detail (LODs) for 3D city models, but only the highest of them (LOD4) supports modelling the indoor geometry of a building, which must be acquired in correspondingly high detail and therefore at a high cost. Whereas simple 3D city models of the exterior of buildings (e.g. CityGML LOD2) can be generated largely automatically, and are thus...
متن کاملShrink-Wrapping trajectories for Linear Programming
Hyperbolic Programming (HP) –minimizing a linear functional over an affine subspace of a finite-dimensional real vector space intersected with the so-called hyperbolicity cone– is a class of convex optimization problems that contains well-known Linear Programming (LP). In particular, for any LP one can readily provide a sequence of HP relaxations. Based on these hyperbolic relaxations, a new Sh...
متن کاملGeneralising 3D Buildings from LoD2 to LoD1
The increasing popularity of 3D city models in navigation, urban planning, etc., necessitates application-specific and geometrically accurate and valid models. The concept of Levels of Detail (LoDs) indicate a model’s scale of adherence to its real-world counterpart. Highly detailed datasets often contain errors or require an exorbitant level of computing power. Given the high availability of L...
متن کاملSacks Forcing and the Shrink Wrapping Property
We consider a property stronger than the Sacks property which holds between the ground model and the Sacks forcing extension. 1. The Shrink Wrapping Property Suppose that V is a Sacks forcing extension of a model M . Then the Sacks property holds between V and M . That is, for each x ∈ ω, there exists a tree T ⊆ ω in M such that x ∈ [T ] and each level of T is finite. The following is a stronge...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences
سال: 2013
ISSN: 2194-9050
DOI: 10.5194/isprsannals-ii-2-w1-309-2013