共查询到20条相似文献,搜索用时 62 毫秒
1.
杨怀义 《数字社区&智能家居》2014,(3):1516-1518
小波分析多尺度特征可以替代B样条基,将多尺度特性带入到曲面之中。这样就可以将分辨率较高的曲面分解成小波系数组和分辨率较低的曲面。运用离散内积和非均匀B样条节点插入算法,根据整体光顺度,从曲面对应的最坏节点进行局部光顺,选择最坏节点的光顺区域,运用约束方程,在光顺界面边界基本不变的条件下,对细节部分迭代进行分解,控制误差。在光顺时又可以保持曲面的连续性。 相似文献
2.
杨怀义 《数字社区&智能家居》2014,(7):1516-1518
小波分析多尺度特征可以替代B样条基,将多尺度特性带入到曲面之中。这样就可以将分辨率较高的曲面分解成小波系数组和分辨率较低的曲面。运用离散内积和非均匀B样条节点插入算法,根据整体光顺度,从曲面对应的最坏节点进行局部光顺,选择最坏节点的光顺区域,运用约束方程,在光顺界面边界基本不变的条件下,对细节部分迭代进行分解,控制误差。在光顺时又可以保持曲面的连续性。 相似文献
3.
针对基于图像的植物叶片真实感建模进行了研究, 提出对植物叶片图像的轮廓特征点进行三次均匀B样条曲线插值的算法。该方法提取出标本叶片图像的角点作为特征点, 采用三次均匀B样条曲线进行初步插值拟合, 并根据拟合误差采用改进的节点插入算法进行反复迭代, 直到达到要求的拟合精度。与传统方法相比, 该方法能够更快地达到逼近精度, 并且具有良好的模拟效果, 有一定的实际应用价值。 相似文献
4.
5.
由一组平行轮廓线重构三维闭合表面是三维可视化研究的主要内容之一。文中通过对B样条插值算法的研究,提出了一种新的公共节点矢量确定方法,利用该方法首先对经过预处理的CT牙齿图片提取轮廓线获得三维数据点,之后对轮廓线数据点进行B样条曲线的拟合,在每条拟合曲线上根据所确定的节点矢量值重新采样,由重新采样的三维数据点利用B样条曲面插值算法构造闭合曲面.所构造的闭合曲面是对原始轮廓数据的拟合。通过实例验证可看出该方法可获得较好的拟合曲面,经过误差分析检测,满足拟合条件,因此该方法可以保证几何重建的准确性。 相似文献
6.
基于B样条的平面轮廓重构闭合曲面算法 总被引:5,自引:2,他引:3
由一组平行轮廓线重构三维闭合表面是三维可视化研究的主要内容之一.文中通过对B样条插值算法的研究,提出了一种新的公共节点矢量确定方法,利用该方法首先对经过预处理的CT牙齿图片提取轮廓线获得三维数据点,之后对轮廓线数据点进行B样条曲线的拟合,在每条拟合曲线上根据所确定的节点矢量值重新采样,由重新采样的三维数据点利用B样条曲面插值算法构造闭合曲面,所构造的闭合曲面是对原始轮廓数据的拟合.通过实例验证可看出该方法可获得较好的拟合曲面,经过误差分析检测,满足拟合条件,因此该方法可以保证几何重建的准确性. 相似文献
7.
《计算机辅助设计与图形学学报》2017,(2)
受每个节点区间应该具有相同建模能力的启发,提出一种基于几何信息均分的B样条曲线节点设置算法.首先放置少量节点,以每个节点区间具有相等的几何信息量准则来确定节点的位置;为了提高样条的建模能力,根据上一次迭代中的拟合误差确定加细节点区间并使新节点均分该节点区间的几何信息.该算法可以快速有效地得到用户指定精度的逼近曲线.通过对一些具有不同几何复杂度的实例进行实验的结果表明,文中算法是有效的;与现有的2种算法相比,该算法在相同控制顶点的情况下能够得到更高精度的逼近结果. 相似文献
8.
9.
为了得到收敛速度更快的几何迭代法,提出带形状参数的三次均匀B样条扩展曲线的(加权)渐进迭代逼近法.首先基于三次均匀B样条扩展曲线提出(加权)渐进迭代逼近法的迭代格式;然后通过分析迭代矩阵的谱半径,探讨迭代法的最优形状参数及加权渐进迭代逼近法的最优权系数;最后指出双三次均匀B样条扩展曲面同样具有(加权)渐进迭代逼近性质.数值实例结果表明,所求的最优形状参数及权系数使得迭代法具有最快的收敛速度. 相似文献
10.
针对均匀和准均匀B样条小波多分辨率建模表示能力和适应性的不足,基于离散内积和非均匀B样条节点插入算法建立了一种非均匀半正交B样条小波,并进一步论述了其在非均匀B样条曲线曲面中的多分辨率设计.最后通过实例对非均匀B样条曲线曲面中的多分辨率建模进行了说明和验证. 相似文献
11.
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China. 相似文献
12.
张涛 《计算机测量与控制》2015,23(1):86-89
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值. 相似文献
13.
本文分析了法律数据库的结构和特点,介绍了采用面向对象设计方法和超文本数据库技术开发和实现法律信息库系统将作为重要网络资源之一为不同用户进行法律咨询服务。 相似文献
14.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times. 相似文献
15.
16.
17.
《中国科学:信息科学(英文版)》2014,(8)
正SCIENCE CHINA Information Sciences(Sci China Inf Sci),cosponsored by the Chinese Academy of Sciences and the National Natural Science Foundation of China,and published by Science China Press,is committed to publishing highquality,original results of both basic and applied research in all areas of information sciences,including computer science and technology;systems science,control science and engineering(published in Issues with odd numbers);information and communication engineering;electronic science and technology(published in Issues with even numbers).Sci China Inf Sci is published monthly in both print and electronic forms.It is indexed by Academic OneFile,Astrophysics Data System(ADS),CSA,Cabells,Current Contents/Engineering,Computing and Technology,DBLP,Digital Mathematics Registry,Earthquake Engineering Abstracts,Engineering Index,Engineered Materials Abstracts,Gale,Google,INSPEC,Journal Citation Reports/Science Edition,Mathematical Reviews,OCLC,ProQuest,SCOPUS,Science Citation Index Expanded,Summon by Serial Solutions,VINITI,Zentralblatt MATH. 相似文献
18.
正Erratum to:J Zhejiang Univ-Sci C(ComputElectron)2014 15(7):551-563doi:10.1631/jzus.C1300320The original version of this article unfortunately contained mistakes.Algorithm 6 should be as follows:Algorithm 6 FGKFCM-F clustering Input:(1)X={x_1,x_2,…,x_N},,x_iR~d,i=1,2,…,N,the dataset;(2)C,1C≤N,the number of clusters;(3)ε0,the stopping criterion; 相似文献
19.
20.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice. 相似文献