AUTOMATIC REPAIR OF CITYGML LOD2 BUILDINGS USING SHRINK-WRAPPING

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automatically enhancing CityGML LOD2 models with a corresponding indoor geometry

The international standard CityGML defines five levels of detail (LODs) for 3D city models, but only the highest of them (LOD4) supports modelling the indoor geometry of a building, which must be acquired in correspondingly high detail and therefore at a high cost. Whereas simple 3D city models of the exterior of buildings (e.g. CityGML LOD2) can be generated largely automatically, and are thus...

متن کامل

Shrink-Wrapping trajectories for Linear Programming

Hyperbolic Programming (HP) –minimizing a linear functional over an affine subspace of a finite-dimensional real vector space intersected with the so-called hyperbolicity cone– is a class of convex optimization problems that contains well-known Linear Programming (LP). In particular, for any LP one can readily provide a sequence of HP relaxations. Based on these hyperbolic relaxations, a new Sh...

متن کامل

Generalising 3D Buildings from LoD2 to LoD1

The increasing popularity of 3D city models in navigation, urban planning, etc., necessitates application-specific and geometrically accurate and valid models. The concept of Levels of Detail (LoDs) indicate a model’s scale of adherence to its real-world counterpart. Highly detailed datasets often contain errors or require an exorbitant level of computing power. Given the high availability of L...

متن کامل

Sacks Forcing and the Shrink Wrapping Property

We consider a property stronger than the Sacks property which holds between the ground model and the Sacks forcing extension. 1. The Shrink Wrapping Property Suppose that V is a Sacks forcing extension of a model M . Then the Sacks property holds between V and M . That is, for each x ∈ ω, there exists a tree T ⊆ ω in M such that x ∈ [T ] and each level of T is finite. The following is a stronge...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences

سال: 2013

ISSN: 2194-9050

DOI: 10.5194/isprsannals-ii-2-w1-309-2013