نتایج جستجو برای: hole filling

تعداد نتایج: 97268  

Journal: :Computer Aided Geometric Design 1994
John A. Gregory Jianwei Zhou

Consider a bicubic rectangular patch complex which surrounds an n-sided hole in R. Then the problem of filling the hole with n bicubic rectangular patches is studied.

2007
Martin Eckstein Marcus Kollar Michael Potthoff Dieter Vollhardt

The paramagnetic phase diagram of the Hubbard model with nearest-neighbor and next-nearest-neighbor NNN hopping on the Bethe lattice is computed at half-filling and in the weakly doped regime using the self-energy functional approach for dynamical mean-field theory. NNN hopping breaks the particle-hole symmetry and leads to a strong asymmetry of the electron-doped and hole-doped regimes. Phase ...

2005
F. B. ter Haar R. C. Veltkamp

During the last decade, a number of systems and methods for the alignment, merging and hole filling of 3D range scans have been developed. However, a quantitative comparison of the accuracy of resulting 3D models is still missing. In order to make a fair comparison between these systems, we need to determine the parameter settings for each system that optimizes its performance. This work descri...

Journal: :TIIS 2012
Ran Liu Hui Xie Fengchun Tian Yingjian Wu Guoqin Tai Yingchun Tan Weimin Tan Bole Li Hengxin Chen Liang Ge

Due to sharp depth transition, big holes may be found in the novel view that is synthesized by depth-image-based rendering (DIBR). A hole-filling method based on disparity map is proposed. One important aspect of the method is that the disparity map of destination image is used for hole-filling, instead of the depth image of reference image. Firstly, the big hole detection based on disparity ma...

Journal: :Remote Sensing 2015
Michael J. Olsen Joseph Wartman Martha McAlister Hamid Mahmoudabadi Matt S. O'Banion Lisa Dunham Keith Cunningham

Monitoring unstable slopes with terrestrial laser scanning (TLS) has been proven effective. However, end users still struggle immensely with the efficient processing, analysis, and interpretation of the massive and complex TLS datasets. Two recent advances described in this paper now improve the ability to work with TLS data acquired on steep slopes. The first is the improved processing of TLS ...

2012
Marcos A Rodrigues Alan Robinson


 In this paper we discuss our approach to real-time 3D face recognition. We argue the need for real time operation in a realistic scenario and highlight the required preand postprocessing operations for effective 3D facial recognition. We focus attention to some operations including face and eye detection, and fast post-processing operations such as hole filling, mesh smoothing and noise remov...

2004
A. Bezryadin B. Pannetier

The Bitter decoration technique is used to study the trapping of single and multiple quanta vortices by a lattice of circular microholes. By keeping a thin superconducting layer (the bottom) inside each hole we are able to visualise the trapped vortices. From this we determine, for the first time, the filling factor FF, i.e. the number of vortices captured inside a hole. In all cases the sample...

2016
Hong Meng Chunxiang Wang Yong Zhang

This paper presents a novel hole-filling algorithm in reverse engineering (RE) domain that can fill holes directly from the point clouds-a hybrid PSO-BP approach: Firstly, boundary of the hole is detected and feature points on the boundary are extracted. Secondly, a hole filling method based on the commercial reverse engineering software (Gemagic and Imageware) is employed to cover the hole wit...

Journal: :Bulletin of The Australian Mathematical Society 2023

Abstract By defining and applying the restricted topology, we have investigated certain connections between boundary spectrum, exponential topological of spectrum connected hull (see Mouton Harte [‘Linking spectra via topology’, J. Math. Anal. Appl. 454 (2017), 730–745]). We now solve a remaining problem regarding hull.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید