Auswahl der wissenschaftlichen Literatur zum Thema „Point cloud recovery“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Point cloud recovery" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Point cloud recovery"

1

Barazzetti, Luigi. „Point cloud occlusion recovery with shallow feedforward neural networks“. Advanced Engineering Informatics 38 (Oktober 2018): 605–19. http://dx.doi.org/10.1016/j.aei.2018.09.007.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Liang, Yan, Ye Hua Sheng und Ka Zhang. „Method on 3D Dense Point Cloud Recovery of Geographical Scene“. Advanced Materials Research 748 (August 2013): 619–23. http://dx.doi.org/10.4028/www.scientific.net/amr.748.619.

Der volle Inhalt der Quelle
Annotation:
The object of this research is to reconstruct 3D dense point cloud of geographical scene. With the technology and method of computer vision , first affine invariant features are extracted and matched, then cameras parameters and 3D dense point cloud are recovered and united under geographical reference. The experimental results show that this method with low cost and high precision of centimeters can satisfy the requirements of measurement, modeling and virtual reality.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Kresslein, Jacob, Payam Haghighi, Jaejong Park, Satchit Ramnath, Alok Sutradhar und Jami J. Shah. „Automated cross-sectional shape recovery of 3D branching structures from point cloud“. Journal of Computational Design and Engineering 5, Nr. 3 (16.11.2017): 368–78. http://dx.doi.org/10.1016/j.jcde.2017.11.010.

Der volle Inhalt der Quelle
Annotation:
Abstract Many applications rely on scanned data, which can come from a variety of sources: optical scanners, coordinate measuring machines, or medical imaging. We assume that the data input to these applications is an unorganized point cloud or mesh of vertices. The objective may be to find particular features (medical diagnostics or reverse engineering) or comparison to some reference geometry (e.g. dimensional metrology). This paper focuses on the feature fitting of a segmented point cloud, specifically for branched, organic structures or structural frames, and targets non-monolithic geometries. In this paper, a methodology is presented for the automated recovery of cross-sectional shapes using centrally located curves. We assume a triangulated surface mesh is generated from the scanned point cloud. This surface mesh is the starting point for our methodology. We then find the curve skeleton of the part which abstractly describes the global geometry and topology. Next after segmenting the curve skeleton into non-branching segments, orthogonal planes to the curve skeleton segments, at preset or adaptive intervals, make slices through the surface mesh edges. The intersection points are extracted creating a 2D point cloud of the cross section. A number of application specific post-processing operations can be performed after obtaining the 2D point cloud cross sections and the curve skeleton paths including: calculations such as area or area moments of inertia, feature fitting or recognition, and digital shape reconstruction. Case studies are presented to demonstrate capabilities and limitations, and to provide insight into appropriate uses and adaptations for the presented methodology. Highlights Automated cross-sectional extraction for branching structures is presented. Methodology utilized skeletonization of object as reference for sampling planes. Surface mesh is sliced to extract a 2D point cloud. Filter algorithm for exclusion of peripheral slicing is presented. Several case studies demonstrate capabilities and limitations of the method.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Wongwailikhit, Kanda, Pienpak Tasakorn, Pattarapan Prasassarakich und Makoto Aratono. „Gold Recovery by pH-Switching Process via Cloud Point Extraction“. Separation Science and Technology 38, Nr. 14 (09.01.2003): 3591–607. http://dx.doi.org/10.1081/ss-120023420.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hillman, Samuel, Luke Wallace, Karin Reinke, Bryan Hally, Simon Jones und Daisy S. Saldias. „A Method for Validating the Structural Completeness of Understory Vegetation Models Captured with 3D Remote Sensing“. Remote Sensing 11, Nr. 18 (12.09.2019): 2118. http://dx.doi.org/10.3390/rs11182118.

Der volle Inhalt der Quelle
Annotation:
Characteristics describing below canopy vegetation are important for a range of forest ecosystem applications including wildlife habitat, fuel hazard and fire behaviour modelling, understanding forest recovery after disturbance and competition dynamics. Such applications all rely on accurate measures of vegetation structure. Inherent in this is the assumption or ability to demonstrate measurement accuracy. 3D point clouds are being increasingly used to describe vegetated environments, however limited research has been conducted to validate the information content of terrestrial point clouds of understory vegetation. This paper describes the design and use of a field frame to co-register point intercept measurements with point cloud data to act as a validation source. Validation results show high correlation of point matching in forests with understory vegetation elements with large mass and/or surface area, typically consisting of broad leaves, twigs and bark 0.02 m diameter or greater in size (SfM, MCC 0.51–0.66; TLS, MCC 0.37–0.47). In contrast, complex environments with understory vegetation elements with low mass and low surface area showed lower correlations between validation measurements and point clouds (SfM, MCC 0.40 and 0.42; TLS, MCC 0.25 and 0.16). The results of this study demonstrate that the validation frame provides a suitable method for comparing the relative performance of different point cloud generation processes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Fellechner, Oliver, und Irina Smirnova. „Feasibility of packed columns for continuous cloud point extraction with subsequent product recovery“. Separation and Purification Technology 258 (März 2021): 118046. http://dx.doi.org/10.1016/j.seppur.2020.118046.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Chen, Honghua, Mingqiang Wei, Yangxing Sun, Xingyu Xie und Jun Wang. „Multi-Patch Collaborative Point Cloud Denoising via Low-Rank Recovery with Graph Constraint“. IEEE Transactions on Visualization and Computer Graphics 26, Nr. 11 (01.11.2020): 3255–70. http://dx.doi.org/10.1109/tvcg.2019.2920817.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Hosseinyalamdary, S., und A. Yilmaz. „3D SUPER-RESOLUTION APPROACH FOR SPARSE LASER SCANNER DATA“. ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences II-3/W5 (19.08.2015): 151–57. http://dx.doi.org/10.5194/isprsannals-ii-3-w5-151-2015.

Der volle Inhalt der Quelle
Annotation:
Laser scanner point cloud has been emerging in Photogrammetry and computer vision to achieve high level tasks such as object tracking, object recognition and scene understanding. However, low cost laser scanners are noisy, sparse and prone to systematic errors. This paper proposes a novel 3D super resolution approach to reconstruct surface of the objects in the scene. This method works on sparse, unorganized point clouds and has superior performance over other surface recovery approaches. Since the proposed approach uses anisotropic diffusion equation, it does not deteriorate the object boundaries and it preserves topology of the object.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Materna, Katarzyna, Elzbieta Goralska, Anna Sobczynska und Jan Szymanowski. „Recovery of various phenols and phenylamines by micellar enhanced ultrafiltration and cloud point separation“. Green Chemistry 6, Nr. 3 (2004): 176. http://dx.doi.org/10.1039/b312343j.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ribeiro, Bernardo Dias, Daniel Weingart Barreto und Maria Alice Zarur Coelho. „Recovery of Saponins from Jua (Ziziphus joazeiro) by Micellar Extraction and Cloud Point Preconcentration“. Journal of Surfactants and Detergents 17, Nr. 3 (27.08.2013): 553–61. http://dx.doi.org/10.1007/s11743-013-1526-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Point cloud recovery"

1

Chen, Cong. „High-Dimensional Generative Models for 3D Perception“. Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103948.

Der volle Inhalt der Quelle
Annotation:
Modern robotics and automation systems require high-level reasoning capability in representing, identifying, and interpreting the three-dimensional data of the real world. Understanding the world's geometric structure by visual data is known as 3D perception. The necessity of analyzing irregular and complex 3D data has led to the development of high-dimensional frameworks for data learning. Here, we design several sparse learning-based approaches for high-dimensional data that effectively tackle multiple perception problems, including data filtering, data recovery, and data retrieval. The frameworks offer generative solutions for analyzing complex and irregular data structures without prior knowledge of data. The first part of the dissertation proposes a novel method that simultaneously filters point cloud noise and outliers as well as completing missing data by utilizing a unified framework consisting of a novel tensor data representation, an adaptive feature encoder, and a generative Bayesian network. In the next section, a novel multi-level generative chaotic Recurrent Neural Network (RNN) has been proposed using a sparse tensor structure for image restoration. In the last part of the dissertation, we discuss the detection followed by localization, where we discuss extracting features from sparse tensors for data retrieval.
Doctor of Philosophy
The development of automation systems and robotics brought the modern world unrivaled affluence and convenience. However, the current automated tasks are mainly simple repetitive motions. Tasks that require more artificial capability with advanced visual cognition are still an unsolved problem for automation. Many of the high-level cognition-based tasks require the accurate visual perception of the environment and dynamic objects from the data received from the optical sensor. The capability to represent, identify and interpret complex visual data for understanding the geometric structure of the world is 3D perception. To better tackle the existing 3D perception challenges, this dissertation proposed a set of generative learning-based frameworks on sparse tensor data for various high-dimensional robotics perception applications: underwater point cloud filtering, image restoration, deformation detection, and localization. Underwater point cloud data is relevant for many applications such as environmental monitoring or geological exploration. The data collected with sonar sensors are however subjected to different types of noise, including holes, noise measurements, and outliers. In the first chapter, we propose a generative model for point cloud data recovery using Variational Bayesian (VB) based sparse tensor factorization methods to tackle these three defects simultaneously. In the second part of the dissertation, we propose an image restoration technique to tackle missing data, which is essential for many perception applications. An efficient generative chaotic RNN framework has been introduced for recovering the sparse tensor from a single corrupted image for various types of missing data. In the last chapter, a multi-level CNN for high-dimension tensor feature extraction for underwater vehicle localization has been proposed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

HermawanSutanto und 陳忠胜. „Recovery of Nonionic Surfactant after Cloud Point Extraction of Polycyclic Aromatic Hydrocarbons“. Thesis, 2010. http://ndltd.ncl.edu.tw/handle/61446516836050054149.

Der volle Inhalt der Quelle
Annotation:
碩士
國立成功大學
化學工程學系碩博士班
98
Cloud point extraction (CPE) has been applied successfully to remove the 9 compounds of polycyclic aromatic hydrocarbons (PAHs) by using nonionic surfactant Tergitol 15-S-7 as separating agent. Possibly, the CPE method may be applied in treating wastewater containing PAHs pollutants. In Addition, in order to make the process more economical and efficient, the surfactant in the surfactant rich phase should be recycled and reused. Solvent extraction and adsorption using activated carbon were used to separate the surfactant rich phase into surfactant and PAHs. In our work, alcohols like 1-hexanol, 1-octanol, 1-decanol, and 1-dodecanol were used as a solvent to extract PAHs in surfactant rich phase and recycle the fresher surfactants. Besides alcohols, solvent like ethyl acetate also being used. Activated charcoal with 100-400 mesh and 4-8 mesh sizes were used to separate the nine PAHs and nonionic surfactant from the surfactant rich phase. The results show that alcohols can be used to extract PAHs from the surfactant rich phase well. It is indicated from almost no PAHs detected in the lower phase after solvent extraction. And for surfactant, only about 22% of surfactant can be recovered from the surfactant rich phase after the solvent extraction process. Besides solvent extraction, adsorption using activated carbon for recovering the surfactant also can be done to separate the nine PAHs from surfactant rich phase and recover the fresher surfactant. By using this method, the surfactant recovery is above 90%.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Point cloud recovery"

1

Jaiswal, Chetan, und Vijay Kumar. „Highly Available Fault-Tolerant Cloud Database Services“. In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 119–42. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0153-4.ch005.

Der volle Inhalt der Quelle
Annotation:
Legacy database systems manage transactions under a concurrency control and a recovery protocol. The underlying operating system creates transaction execution platform and the database executes transactions concurrently. When the database system fails then the recovery manager applies “Undo” and/or “Redo” operations (depending upon the recovery protocol) to achieve the consistent state of the database. The recovery manager performs these set of operations as required by transaction execution platform. The availability of “Virtual” machines on cloud has given us an architecture that makes it possible to eliminate the effect of system or transaction failure by always taking the database to the next consistent state. We present a novel scheme of eliminating the effect of such failure by applying transaction “roll-forward” which resumes its execution from the point of failure. We refer to our system as AAP (Always Ahead Processing). Our work enables cloud providers to offer transactional HA-DBMS as an option that too with multiple data sources not necessarily relational.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Qin, Rongjun, Shuang Song, Xiao Ling und Mostafa Elhashash. „3D Reconstruction through Fusion of Cross-View Images“. In Recent Advances in Image Restoration with Applications to Real World Problems. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.93099.

Der volle Inhalt der Quelle
Annotation:
3D recovery from multi-stereo and stereo images, as an important application of the image-based perspective geometry, serves many applications in computer vision, remote sensing, and Geomatics. In this chapter, the authors utilize the imaging geometry and present approaches that perform 3D reconstruction from cross-view images that are drastically different in their viewpoints. We introduce our project work that takes ground-view images and satellite images for full 3D recovery, which includes necessary methods in satellite and ground-based point cloud generation from images, 3D data co-registration, fusion, and mesh generation. We demonstrate our proposed framework on a dataset consisting of twelve satellite images and 150 k video frames acquired through a vehicle-mounted Go-pro camera and demonstrate the reconstruction results. We have also compared our results with results generated from an intuitive processing pipeline that involves typical geo-registration and meshing methods.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Sun, Yu, Jules White, Jeff Gray und Aniruddha Gokhale. „Model-Driven Automated Error Recovery in Cloud Computing“. In Grid and Cloud Computing, 680–700. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0879-5.ch308.

Der volle Inhalt der Quelle
Annotation:
Cloud computing provides a platform that enables users to utilize computation, storage, and other computing resources on-demand. As the number of running nodes in the cloud increases, the potential points of failure and the complexity of recovering from error states grows correspondingly. Using the traditional cloud administrative interface to manually detect and recover from errors is tedious, time-consuming, and error prone. This chapter presents an innovative approach to automate cloud error detection and recovery based on a run-time model that monitors and manages the running nodes in a cloud. When administrators identify and correct errors in the model, an inference engine is used to identify the specific state pattern in the model to which they were reacting, and to record their recovery actions. An error detection and recovery pattern can be generated from the inference and applied automatically whenever the same error occurs again.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Alkadi, Ihssan. „Assessing Security with Regard to Cloud Applications in STEM Education“. In Advances in Educational Technologies and Instructional Design, 260–76. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9924-3.ch017.

Der volle Inhalt der Quelle
Annotation:
There are many steps involved with securing a cloud system and its applications (SaaS) and developed ones in (PaaS). Security and privacy issues represent the biggest concerns to moving services to external clouds (Public). With cloud computing, data are stored and delivered across the Internet. The owner of the data does not have control or even know where their data are being stored. Additionally, in a multi-tenant environment, it may be very difficult for a cloud service provider to provide the level of isolation and associated guarantees that are possible with an environment dedicated to a single customer. Unfortunately, to develop a security algorithm that outlines and maps out the enforcement of a security policy and procedure can be a daunting task. A good security algorithm presents a strategy to counter the vulnerabilities in a cloud system. This chapter covers the complete overview, comparative analysis of security methods in Cloud Applications in STEM Education and the introduction of a new methodology that will enforce cloud computing security against breaches and intrusions. Much light will be shed on existing methodologies of security on servers used for cloud applications in STEM education and storage of data, and several methods will be presented in addition to the newly developed method of security in cloud-based servers, such as the MIST (Alkadi). Not only can cloud networks be used to gather sensitive information on multiple platforms, also there are needs to prevent common attacks through weak password recovery, retrieval, authentication, and hardening systems; otherwise hackers will spread cyber mayhem. Discussion of current security issues and algorithms in a real world will be presented. Different technologies are being created and in constant competition to meet the demands of users who are generally “busy”. The selling point of these technologies is the ability to address these demands without adding more to any workloads. One of the demands often discussed is that users want to have their digital information accessible from anywhere at any time. This information includes documents, audio libraries, and more. Users also demand the ability to manage, edit and update this information regardless of physical location. Somewhat recently, mobile devices such as laptops, tablets, and smartphones have provided these abilities. This is no small feat as vendors and providers have reduced the size of these devices to increase mobility. However, as the amount of personal information that users are wanting to access has grown exponentially, manipulation and storage of it require more capable devices. To meet increased demands, increasing the capabilities of mobile devices may be impractical. Making mobile devices more powerful without technological advancement would require that the device be larger and use more resources such as battery life and processing power to function properly. Storing all of a user's information on a mobile device that travels everywhere also adds vulnerability risks. The best technical solution to having a user's information accessible is some sort of online storage where there is the convenience to store, manipulate and retrieve data. This is one of the most practical applications for the concept of cloud computing in STEM education. As storage capabilities and Internet bandwidth has increased, so has the amount of personal data that users store online. And today, the average user has billions of bytes of data online. Access is everywhere and whenever is needed. As everyone started doing so, people want their data safe and secure to maintain their privacy. As the user base grew in size, the number of security issues of the personal data started to become increasingly important. As soon as someone's data are in the remote server, unwanted users or “hackers” can have many opportunities to compromise the data. As the online server needs to be up and running all the time, the only way to secure the cloud server is by using better passwords by every user. By the same token, the flaws in the password authentication and protection system can also help unwanted users to get their way to other people's personal data. Thus, the password authentication system should also be free from any loopholes and vulnerabilities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Alkadi, Ihssan. „Assessing Security With Regard to Cloud Applications in STEM Education“. In Cyber Security and Threats, 230–47. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch014.

Der volle Inhalt der Quelle
Annotation:
There are many steps involved with securing a cloud system and its applications (SaaS) and developed ones in (PaaS). Security and privacy issues represent the biggest concerns to moving services to external clouds (Public). With cloud computing, data are stored and delivered across the Internet. The owner of the data does not have control or even know where their data are being stored. Additionally, in a multi-tenant environment, it may be very difficult for a cloud service provider to provide the level of isolation and associated guarantees that are possible with an environment dedicated to a single customer. Unfortunately, to develop a security algorithm that outlines and maps out the enforcement of a security policy and procedure can be a daunting task. A good security algorithm presents a strategy to counter the vulnerabilities in a cloud system. This chapter covers the complete overview, comparative analysis of security methods in Cloud Applications in STEM Education and the introduction of a new methodology that will enforce cloud computing security against breaches and intrusions. Much light will be shed on existing methodologies of security on servers used for cloud applications in STEM education and storage of data, and several methods will be presented in addition to the newly developed method of security in cloud-based servers, such as the MIST (Alkadi). Not only can cloud networks be used to gather sensitive information on multiple platforms, also there are needs to prevent common attacks through weak password recovery, retrieval, authentication, and hardening systems; otherwise hackers will spread cyber mayhem. Discussion of current security issues and algorithms in a real world will be presented. Different technologies are being created and in constant competition to meet the demands of users who are generally “busy”. The selling point of these technologies is the ability to address these demands without adding more to any workloads. One of the demands often discussed is that users want to have their digital information accessible from anywhere at any time. This information includes documents, audio libraries, and more. Users also demand the ability to manage, edit and update this information regardless of physical location. Somewhat recently, mobile devices such as laptops, tablets, and smartphones have provided these abilities. This is no small feat as vendors and providers have reduced the size of these devices to increase mobility. However, as the amount of personal information that users are wanting to access has grown exponentially, manipulation and storage of it require more capable devices. To meet increased demands, increasing the capabilities of mobile devices may be impractical. Making mobile devices more powerful without technological advancement would require that the device be larger and use more resources such as battery life and processing power to function properly. Storing all of a user's information on a mobile device that travels everywhere also adds vulnerability risks. The best technical solution to having a user's information accessible is some sort of online storage where there is the convenience to store, manipulate and retrieve data. This is one of the most practical applications for the concept of cloud computing in STEM education. As storage capabilities and Internet bandwidth has increased, so has the amount of personal data that users store online. And today, the average user has billions of bytes of data online. Access is everywhere and whenever is needed. As everyone started doing so, people want their data safe and secure to maintain their privacy. As the user base grew in size, the number of security issues of the personal data started to become increasingly important. As soon as someone's data are in the remote server, unwanted users or “hackers” can have many opportunities to compromise the data. As the online server needs to be up and running all the time, the only way to secure the cloud server is by using better passwords by every user. By the same token, the flaws in the password authentication and protection system can also help unwanted users to get their way to other people's personal data. Thus, the password authentication system should also be free from any loopholes and vulnerabilities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Point cloud recovery"

1

Zhao, Weibing, Xu Yan, Jiantao Gao, Ruimao Zhang, Jiayan Zhang, Zhen Li, Song Wu und Shuguang Cui. „PointLIE: Locally Invertible Embedding for Point Cloud Sampling and Recovery“. In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/186.

Der volle Inhalt der Quelle
Annotation:
Point Cloud Sampling and Recovery (PCSR) is critical for massive real-time point cloud collection and processing since raw data usually requires large storage and computation. This paper addresses a fundamental problem in PCSR: How to downsample the dense point cloud with arbitrary scales while preserving the local topology of discarded points in a case-agnostic manner (i.e., without additional storage for point relationships)? We propose a novel Locally Invertible Embedding (PointLIE) framework to unify the point cloud sampling and upsampling into one single framework through bi-directional learning. Specifically, PointLIE decouples the local geometric relationships between discarded points from the sampled points by progressively encoding the neighboring offsets to a latent variable. Once the latent variable is forced to obey a pre-defined distribution in the forward sampling path, the recovery can be achieved effectively through inverse operations. Taking the recover-pleasing sampled points and a latent embedding randomly drawn from the specified distribution as inputs, PointLIE can theoretically guarantee the fidelity of reconstruction and outperform state-of-the-arts quantitatively and qualitatively.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Yang, Xiang, Peter Meer und Hae Chang Gea. „Robust Recovery of 3D Geometric Primitives From Point Cloud“. In ASME 2017 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/detc2017-67564.

Der volle Inhalt der Quelle
Annotation:
A robust method for surface fitting in 3D point cloud is presented as an application of the robust estimation of multiple in-lier structures algorithm [1]. The geometric primitives such as planes, spheres and cylinders are detected from the point samples in the noisy dataset, without regenerating surface normals or mesh. The inlier points of different surfaces are classified and segmented, with the tolerance of error for each surface estimated adaptively from the input data. From the segmented points, designers can interact with the geometric primitives conveniently. Direct modification of 3D point cloud and inverse design of solid model can be applied. Both synthetic and real point cloud datasets are tested for the use of the robust algorithm.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Hosseinyalamdary, Siavash, und Alper Yilmaz. „Surface Recovery: Fusion of Image and Point Cloud“. In 2015 IEEE International Conference on Computer Vision Workshop (ICCVW). IEEE, 2015. http://dx.doi.org/10.1109/iccvw.2015.32.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Alkhateeb, Mojahed, Jeremy L. Rickli und Nicholas J. Christoforou. „Error Propagation in Digital Additive Remanufacturing Process Planning“. In ASME 2019 14th International Manufacturing Science and Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/msec2019-3009.

Der volle Inhalt der Quelle
Annotation:
Abstract A point cloud is a digital representation of a part that consists of a set of data points in space. Typically point clouds are produced by 3D scanners that hover above a part and records points in a large number that represent the external surface of a part. Additive remanufacturing offers a sustainable solution to end-of-use (EoU) core disposal and recovery and requires quantification of part damage or wear that requires reprocessing. This paper proposes an error propagation approach that models the interaction of each step of the additive remanufacturing process. This proposed model is formulated, and the results of the errors generated from the parameters of the scanner and point cloud smoothing are presented. Smoothing is an important step to reduce the noises generated from scanning, knowing the right smoothing factor is important since over smoothing results in dimensional inaccuracies and errors, especially in cores with smaller degrees of damage. It is important to know the error generated from scanning and point cloud smoothing to compensate in the following steps and generate appropriate material deposition paths. Inaccuracies in the 3D model renders can impact the remainder of the additive remanufacturing accuracy, especially because there are multiple steps in the process. Sources of error from smoothing, meshing, slicing, and material deposition are proposed in the error propagation model for additive remanufacturing. Results of efforts to quantify the scanning and smoothing steps within this model are presented.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Fougeron, Gabriel, Guillaume Pierrot und Denis Aubry. „RECOVERY OF DIFFERENTIATION/INTEGRATION COMPATIBILITY OF MESHLESS OPERATORS VIA LOCAL ADAPTATION OF THE POINT CLOUD IN THE CONTEXT OF NODAL INTEGRATION“. In VII European Congress on Computational Methods in Applied Sciences and Engineering. Athens: Institute of Structural Analysis and Antiseismic Research School of Civil Engineering National Technical University of Athens (NTUA) Greece, 2016. http://dx.doi.org/10.7712/100016.1837.7211.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Saputra, I. Wayan Rakananda, und David S. Schechter. „A Temperature Operating Window Concept for Application of Nonionic Surfactants for EOR in Unconventional Shale Reservoirs“. In SPE Annual Technical Conference and Exhibition. SPE, 2021. http://dx.doi.org/10.2118/206346-ms.

Der volle Inhalt der Quelle
Annotation:
Abstract Surfactant performance is a function of its hydrophobic tail, and hydrophilic head in combination with crude oil composition, brine salinity, rock composition, and reservoir temperature. Specifically, for nonionic surfactants, temperature is a dominant variable due to the nature of the ethylene oxide (EO) groups in the hydrophilic head known as the cloud point temperature. This study aims to highlight the existence of temperature operating window for nonionic surfactants to optimize oil recovery during EOR applications in unconventional reservoirs. Two nonylphenol (NP) ethoxylated nonionic surfactants with different EO head groups were investigated in this study. A medium and light grade crude oil were utilized for this study. Core plugs from a carbonate-rich outcrop and a quartz-rich outcrop were used for imbibition experiments. Interfacial tension and contact angle measurements were performed to investigate the effect of temperature on the surfactant interaction in an oil/brine and oil/brine/rock system respectively. Finally, a series of spontaneous imbibition experiments was performed on three temperatures selected based on the cloud point of each surfactant in order to construct a temperature operating window for each surfactant. Both nonionic surfactants were observed to improve oil recovery from the two oil-wet oil/rock system tested in this study. The improvement was observed on both final recovery and rate of spontaneous imbibition. However, it was observed that each nonionic surfactant has its optimum temperature operating window relative to the cloud point of that surfactant. For both nonionic surfactants tested in this study, this window begins from the cloud point of the surfactant up to 25°F above the cloud point. Below this operating window, the surfactant showed subpar performance in increasing oil recovery. This behavior is caused by the thermodynamic equilibrium of the surfactant at this temperature which drives the molecule to be more soluble in the aqueous-phase as opposed to partitioning at the interface. Above the operating window, surfactant performance was also inferior. Although for this condition, the behavior is caused by the preference of the surfactant molecule to be in the oleic-phase rather than the aqueous-phase. One important conclusion is the surfactant achieved its optimum performance when it positions itself on the oil/water interface, and this configuration is achieved when the temperature of the system is in the operating window mentioned above. Additionally, it was also observed that the 25°F operating window varies based on the characteristic of the crude oil. A surfactant study is generally performed on a single basin, with a single crude oil on a single reservoir temperature or even on a proxy model at room temperature. This study aims to highlight the importance of applying the correct reservoir temperature when investigating nonionic surfactant behavior. Furthermore, this study aims to introduce a temperature operating window concept for nonionic surfactants. This work demonstrates that there is not a "one size fits all" surfactant design.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Yuan, Xiaocui, Qingjin Peng, Lushen Wu und Huawei Chen. „A Novel Method of Normal Estimation for 3D Surface Reconstruction“. In ASME 2015 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/detc2015-46484.

Der volle Inhalt der Quelle
Annotation:
A 3D object can be recovered from scanned point data, which requires accurate estimating normal directions of the object surface from the cloud data. Many point cloud processing algorithms rely on the accurate normal as input to generate an accurate 3D surface model. The neighborhood of a data point in its smooth region can be well approximated by a plane. However, the neighborhood of a feature point employed for the normal estimation is isotropic which would enclose points belonging to different surface patches across the sharp feature. In this paper, isotropic neighborhoods are segmented to search anisotropic neighborhoods for the accurate normal estimation. Normals and candidate feature points are first estimated by the principal component analysis (PCA) method. Neighborhoods of the feature point are then mapped into a Gaussian image. A k-means clustering algorithm is then used for the Gaussian image to identify an anisotropic sub-neighborhood for the data point. The normal of the candidate feature point is finally estimated by the anisotropic neighborhood with the PCA method. The proposed method can accurately estimate normal directions while preserving sharp features of the object surface. Applications have demonstrated the effectiveness of the proposed method.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Wang, Le, Shengquan Xie, Wenjun Xu, Bitao Yao, Jia Cui, Quan Liu und Zude Zhou. „Human Point Cloud Inpainting for Industrial Human-Robot Collaboration Using Deep Generative Model“. In ASME 2020 15th International Manufacturing Science and Engineering Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/msec2020-8353.

Der volle Inhalt der Quelle
Annotation:
Abstract In complex industrial human-robot collaboration (HRC) environment, obstacles in the shared working space will occlude the operator, and the industrial robot will threaten the safety of the operator if it is unable to get the complete human spatial point cloud. This paper proposes a real-time human point cloud inpainting method based on the deep generative model. The method can recover the human point cloud occluded by obstacles in the shared working space to ensure the safety of the operator. The method proposed in this paper can be mainly divided into three parts: (i) real-time obstacles detection. This process can detect obstacle locations in real time and generate the image of obstacles. (ii) the application of the deep generative model algorithm. It is a complete convolutional neural network (CNN) structure and introduces advanced generative adversarial loss. The model can generate the missing depth data of operators at arbitrary position in the human depth image. (iii) spatial mapping of the depth image. The depth image will be mapped to point cloud by coordinate system conversion. The effectiveness of the method is verified by filling hole of the human point cloud occluded by obstacles in industrial HRC environment. The experiment results show that the proposed method can accurately generate the occluded human point cloud in real time and ensure the safety of the operator.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Poddar, Sunrita, und Mathews Jacob. „Recovery of point clouds on surfaces: Application to image reconstruction“. In 2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI 2018). IEEE, 2018. http://dx.doi.org/10.1109/isbi.2018.8363803.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

EICH, MARKUS, MALGORZATA DABROWSKA und FRANK KIRCHNER. „3D SCENE RECOVERY AND SPATIAL SCENE ANALYSIS FOR UNORGANIZED POINT CLOUDS“. In Proceedings of the 13th International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines. WORLD SCIENTIFIC, 2010. http://dx.doi.org/10.1142/9789814329927_0005.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie