首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
We present a static analysis-based technique for reverse engineering finite state machine models from a large subset of sequential Java programs. Our approach enumerates all feasible program paths in a class using symbolic execution and records execution summary for each path. Subsequently, it creates states and transitions by analyzing symbolic execution summaries. Our approach also detects any unhandled exceptions.  相似文献   

2.
An editable nonmanifold boundary representation   总被引:1,自引:0,他引:1  
  相似文献   

3.
Present CAD systems store the solid model of an object using a convenient representation. Boundary models and CSG (Constructive Solid Geometry) models are the most frequently used representations. Based on recent research findings, octree representation of an object presents a promising approach in solving problems in the areas of Computer Graphics, Manufacturing and Robotics. The most notable use of octree representations is in CAD-based robotic path planning problems. Octree models have also been used in fast rendering of 3-D solid models using ray tracing methods. This paper presents an algorithm for converting the boundary representation of polyhedral models to its octree representation. Such an algorithm would provide the link between an object generated using a solid modelling system and the application involving an octree representation of an object. The algorithm is demonstrated by converting a polyhedral boundary model of a sample object to its octree representation.  相似文献   

4.
Medial surface, the skeletal abstraction of a solid shape, can be used in applications such as shell (solid) mesh generation, robot path planning, and feature recognition. Unfortunately, computing the medical surface is very difficult. Those few algorithms proposed invariably need to solve systems of non-linear polynomial equations, which requires complicated numerical techniques. Recently, an algorithm has been proposed by the authors that is applicable to a polyhedral model. It uses voxel-bisector intersection relationships to calculate the intersection points and, from these, constructs the boundaries of the medical surface patches. Unfortunately, it does not handle the degenerate cases. This paper extends the scope of the voxel-bisector intersection algorithm by proposing a supplementary algorithm to detect the existence of the degenerate intersection curve in a specified region (voxel). An enhancement to the voxel-bisector intersection algorithm by using the Voronoi territory, which needs no polynomial root-finding scheme, is also proposed.  相似文献   

5.
Extracting and labeling boundary segments in natural scenes   总被引:1,自引:0,他引:1  
This paper describes a set of algorithms used to perform segmentation of natural scenes through boundary analysis. The techniques include preprocessing, differentiation using a very simple operator, relaxation using case analysis, and postprocessing. The system extracts line segments as connected sets of edges, labels them, and computes features for them such as length and confidence.  相似文献   

6.
Boolean set operations on non-manifold boundary representation objects   总被引:3,自引:0,他引:3  
For Boolean operations on geometric models, we have developed an intersection algorithm for non-manifold boundary models with vertices, linear edges, planar faces, and volumetric regions. The algorithm operates by intersecting entities in an ordered manner, from vertex to edge, then to face elements. Singular intersections are systematically handled by determining if an entity in one object is within a tolerance region of the entity in the other object. The algorithm performs Boolean operations between objects of different dimensionality as well as solids. An implementation of the proposed algorithm and the experimental results are briefly discussed.  相似文献   

7.
8.
In boundary representation, a geometric object is represented by the union of a ‘topological’ model, which describes the topology of the modelled object, and an ‘embedding’ model, which describes the embedding of the object, for instance in three-dimensional Euclidean space. In recent years, numerous topological models have been developed for boundary representation, and there have been important developments with respect to dimension and orientability. In the main, two types of topological models can be distinguished. ‘Incidence graphs’ are graphs or hypergraphs, where the nodes generally represent the cells of the modelled subdivision (vertex, edge, face, etc.), and the edges represent the adjacency and incidence relations between these cells. ‘Ordered’ models use a single type of basic element (more or less explicitly defined), on which ‘element functions’ act; the cells of the modelled subdivision are implicitly defined in this type of model. In this paper some of the most representative ordered topological models are compared using the concepts of the n-dimensional generalized map and the n-dimensional map. The main result is that ordered topological models are (roughly speaking) equivalent with respect to the class of objects which can be modelled (i.e. with respect to dimension and orientability).  相似文献   

9.
The behavior of three-dimensional wave packets in the boundary layer on curved surfaces is analyzed in this study based on a modification of the triple-deck theory referred to as the “criss-cross” interaction model. The equations of the criss-cross interaction describe a particular type of boundary layer instability mode that possesses underlying properties of both the Tollmien-Schlichting waves and Taylor-Görtler vortices. Previous analysis of the criss-cross interaction regime suggests a possibility for upstream propagation of perturbations in the boundary layer and possible absolute instability of the flow. However, these results cannot be considered as conclusive because the initial-value problem for the criss-cross interaction equations is ill-posed. In a recent work [Turkyilmazoglu M, Ruban AI. A uniformly valid well-posed asymptotic approach to the inviscid-viscous interaction theory. Stud Appl Math 2002;108:161-85] a regularized non-asymptotic model to describe criss-cross interaction has been proposed. Whereas in the original version of the theory, perturbations have an unbounded growth rate as the longitudinal wave number ∣k∣ → ∞, in the new model of [Turkyilmazoglu M, Ruban AI. A uniformly valid well-posed asymptotic approach to the inviscid-viscous interaction theory. Stud Appl Math 2002;108:161-85], as physically expected the amplification rate remains bounded for both spatially growing and temporally growing waves. A Fourier transform method is used in the present study to solve the linearized equations for the flow over concave roughness and humps and it is found that disturbances develop and are convected downstream as wave packets. The behavior of the wave packets is consistent with convective instability, and the upstream influence is no longer present at large times.  相似文献   

10.
11.
The Hierarchical Triangulated Irregular Network (HTIN) is a structure for representing 2½-dimensional surfaces at different levels of detail through piecewise-linear approximations based on triangulations of the surface domain. In this paper, we present two algorithms that allow extracting a representation of the surface and contour lines at a given level of detail, directly from the HTIN.  相似文献   

12.
We consider the problem of manipulating the input to a discrete-time state space linear system with the goal of obtaining information at each time about the system's current state from a record of past quantized measurements of the system's output. We find that if the system is not excessively unstable, there exist feedback control strategies that allow one to make an asymtotically perfect determination of the current stage based on the output records that result. Even if the system is too unstable to apply such strategies, there are feedback control laws that make the system's output record more informative about the system's state evolution than one might expect. In deriving these control laws, we regard quantized measurements of real numbers more as partial observations than as strict approximations, and employ techniques from information theory and the theory of Markov chains with countable state spaces.  相似文献   

13.
Floorplanning is a critical phase in physical design of VLSI circuits. The stochastic optimization method is widely used to handle this NP-hard problem. The key to the floorplanning algorithm based on stochastic optimization is to encode the floorplan structure properly. In this paper, corner block list (CBL)-a new efficient topological representation for non-slicing floorplan-is proposed with applications to VLSI floorplan. Given a corner block list, it takes only linear time to construct the floorplan. In floorplanning of typical VLSI design, some blocks are required to satisfy some constraints in the final packing. Boundary constraint is one kind of those constraints to pack some blocks along the pre-specified boundaries of the final chip so that the blocks are easier to be connected to certain I/O pads. We implement the boundary constraint algorithm for general floorplan by extending CBL. Our contribution is to find the necessary and sufficient characterization of the blocks along the boundary repre  相似文献   

14.
This paper develops an extended bi-directional evolutionary structural optimization (BESO) method for topology optimization of continuum structures with smoothed boundary representation. In contrast to conventional zigzag BESO designs and removal/addition of elements, the newly proposed evolutionary topology optimization (ETO) method, determines implicitly the smooth structural topology by a level-set function (LSF) constructed by nodal sensitivity numbers. The projection relationship between the design model and the finite element analysis (FEA) model is established. The analysis of the design model is replaced by the FEA model with various elemental volume fractions, which are determined by the auxiliary LSF. The introduction of sensitivity LSF results in intermediate volume elements along the solid-void interface of the FEA model, thus contributing to the better convergence of the optimized topology for the design model. The effectiveness and robustness of the proposed method are verified by a series of 2D and 3D topology optimization design problems including compliance minimization and natural frequency maximization. It has been shown that the developed ETO method is capable of generating a clear and smooth boundary representation; meanwhile the resultant designs are less dependent on the initial guess design and the finite element mesh resolution.  相似文献   

15.
We show how to extract plain text from PostScript files. A textual scan is inadequate because PostScript interpreters can generate characters on the page that do not appear in the source file. Furthermore, word and line breaks are implicit in the graphical rendition, and must be inferred from the positioning of word fragments. We present a robust technique for extracting text and recognizing words and paragraphs. The method uses a standard PostScript interpreter but redefines several PostScript operators, and simple heuristics are employed to locate word and line breaks. The scheme has been used to create a full-text index, and plain-text versions, of 40,000 technical reports (34 Gbytes of PostScript). Other text-extraction systems are reviewed: none offer the same combination of robustness and simplicity. © 1998 John Wiley & Sons, Ltd.  相似文献   

16.
Deepa  P.  Suganthi  M. 《The Journal of supercomputing》2020,76(8):5801-5824
The Journal of Supercomputing - An intelligent clinical decision support system is proposed classifying lung nodules for lung cancer prediction using a kernel-induced random forest classifier. A...  相似文献   

17.
Extracting View-Dependent Depth Maps from a Collection of Images   总被引:1,自引:0,他引:1  
Stereo correspondence algorithms typically produce a single depth map. In addition to the usual problems of occlusions and textureless regions, such algorithms cannot model the variation in scene or object appearance with respect to the viewing position. In this paper, we propose a new representation that overcomes the appearance variation problem associated with an image sequence. Rather than estimating a single depth map, we associate a depth map with each input image (or a subset of them). Our representation is motivated by applications such as view interpolation and depth-based segmentation for model-building or layer extraction. We describe two approaches to extract such a representation from a sequence of images.The first approach, which is more classical, computes the local depth map associated with each chosen reference frame independently. The novelty of this approach lies in its combination of shiftable windows, temporal selection, and graph cut optimization. The second approach simultaneously optimizes a set of self-consistent depth maps at multiple key-frames. Since multiple depth maps are estimated simultaneously, visibility can be modeled explicitly and disparity consistency imposed across the different depth maps. Results, which include a difficult specular scene example, show the effectiveness of our approach.  相似文献   

18.
This paper describes the processing and transformation of medical data from a clinical database to a statistical data matrix. Precise extraction and linking tools must be available for the desired data to be processed for statistical purposes. We show that flexible mechanisms are required for the different types of users, such as physicians and statisticians. In our retrieval tools we use logical queries based on operands and operators. The paper describes the method and appliance of the operators with which the desired matrix is created through a process of selection and linking. Examples with a Kaplan-Meier function and time-dependent covariables demonstrate how our model is useful for different user groups.  相似文献   

19.
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments.  相似文献   

20.
Segmented myriapod-like bodies may offer performance benefits over more common fixed body morphologies for ambulation. Here, the design of a segmented ambulatory microrobot with a flexible backbone is presented. A dynamic model describing the motion of the microrobot is used to determine body parameters. A three-segment microrobot was fabricated using the Smart Composite Microstructures process and piezoelectric bimorph actuators, and forward locomotion on a flat surface was demonstrated. The footprint of the 750 mg microrobot is 3.5 by 3.5 cm, and it has potential advantages over rigid body hexapedal microrobots in climbing, versatility, and stability.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号