Study on Scattered Data Points Interpolation Method Based on Multi-line Structured Light
نویسندگان
چکیده
منابع مشابه
Calibration method for line-structured light multi-vision sensor based on combined target
Calibration is one of the most important technologies for line-structured light vision sensor. The existing calibration methods depend on special calibration equipments, whose accuracy determines the calibration accuracy. It is difficult to meet the requirements of universality and field calibration with those methods. In order to solve these problems, a new calibration method based on the comb...
متن کاملScattered data approximation of fully fuzzy data by quasi-interpolation
Fuzzy quasi-interpolations help to reduce the complexity of solving a linear system of equations compared with fuzzy interpolations. Almost all fuzzy quasi-interpolations are focused on the form of $widetilde{f}^{*}:mathbb{R}rightarrow F(mathbb{R})$ or $widetilde{f}^{*}:F(mathbb{R})rightarrow mathbb{R}$. In this paper, we intend to offer a novel fuzzy radial basis function by the concept of so...
متن کاملNotes on Scattered-Data Radial-Function Interpolation
where α = (α1, . . . , αn) is an n-tuple of nonnegative integers and |α| = ∑n j=1 |αj |. If every polynomial p ∈ πm−1(R) is determined by its values on X, then we will say that the data set X is unisolvent (for πm−1(R )). This condition can also be rephrased in terms of matrices. Order the monomials x in some convenient way. Form the matrix P for which the rows are an x evaluated at xj , j = 1,...
متن کاملA Novel Triangle-based Method for Scattered Data Interpolation
Local numerical methods for scattered data interpolation often require a smart subdivision of the domain in geometrical polyhedral structures. In particular triangulations in the plane (2D) and tetrahedrizations in the space (3D) are widely used to define interpolation models. In this paper we give a short survey on the main methods for the scattered data problem and we recall preliminaries on ...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2006
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/48/1/071