Spelling suggestions: "subject:"delaunay triangle"" "subject:"delaunays triangle""
1 |
Effective techniques for generating Delaunay mesh models of single- and multi-component imagesLuo, Jun 19 December 2018 (has links)
In this thesis, we propose a general computational framework for generating mesh models of single-component (e.g., grayscale) and multi-component (e.g., RGB color) images. This framework builds on ideas from the previously-proposed GPRFSED method for single-component images to produce a framework that can handle images with any arbitrary number of components. The key ideas embodied in our framework are Floyd-Steinberg error diffusion and greedy-point removal. Our framework has several free parameters and the effect of the choices of these parameters is studied. Based on experimentation, we recommend two specific sets of parameter choices, yielding two highly effective single/multi-component mesh-generation methods, known as MED and MGPRFS. These two methods make different trade offs between mesh quality and computational cost. The MGPRFS method is able to produce high quality meshes at a reasonable computational cost, while the MED method trades off some mesh quality for a reduction in computational cost relative to the MGPRFS method.
To evaluate the performance of our proposed methods, we compared them to three highly-effective previously-proposed single-component mesh generators for both grayscale and color images. In particular, our evaluation considered the following previously-proposed methods: the error diffusion (ED) method of Yang et al., the greedy-point-removal from-subset (GPRFSED) method of Adams, and the greedy-point removal (GPR) method of Demaret and Iske. Since these methods cannot directly handle color images, color images were handled through conversion to grayscale as a preprocessing step, and then as a postprocessing step after mesh generation, the grayscale sample values in the generated mesh were replaced by their corresponding color values. These color-capable versions of ED, GPRFSED, and GPR are henceforth referred to as CED, CGPRFSED, and CGPR, respectively.
Experimental results show that our MGPRFS method yields meshes of higher quality than the CGPRFSED and GPRFSED methods by up to 7.05 dB and 2.88 dB respectively, with nearly the same computational cost. Moreover, the MGPRFS method outperforms the CGPR and GPR methods in mesh quality by up to 7.08 dB and 0.42 dB respectively, with about 5 to 40 times less computational cost. Lastly, our MED method yields meshes of higher quality than the CED and ED methods by up to 7.08 and 4.72 dB respectively, where all three of these methods have a similar computational cost. / Graduate
|
2 |
Location inaccuracies in WSAN placement algorithmsNicholls, Gareth Michael 26 July 2010 (has links)
The random deployment of Wireless Sensor and Actuator Network (WSAN) nodes in areas often inaccessible, results in so-called coverage holes – i.e. areas in the network that are not adequately covered by nodes to suit the requirements of the network. Various coverage protocol algorithms have been designed to reduce or eliminate coverage holes within WSANs by indicating how to move the nodes. The effectiveness of such coverage protocols could be jeopardised by inaccuracy in the initial node location data that is broadcast by the respective nodes. This study examines the effects of location inaccuracies on five sensor deployment and reconfiguration algorithms – They include two algorithms which assume that mobile nodes are deployed (referred to as the VEC and VOR algorithms); two that assume static nodes are deployed (referred to as the CNPSS and OGDC algorithms); and a single algorithm (based on a bidding protocol) that assumes a hybrid scenario in which both static and mobile nodes are deployed. Two variations of this latter algorithm are studied. A location simulation tool was built using the GE Smallworld GIS application and the Magik programming language. The simulation results are based on three above-mentioned deployment scenarios; mobile, hybrid and static. The simulation results suggest the VOR algorithm is reasonably robust if the location inaccuracies are somewhat lower than the sensing distance and also if a high degree of inaccuracy is limited to a relatively small percentage of the nodes. The VEC algorithm is considerably less robust, but prevents nodes from drifting beyond the boundaries in the case of large inaccuracies. The bidding protocol used by the hybrid algorithm appears to be robust only when the static nodes are accurate and there is a low degree of inaccuracy within the mobile nodes. Finally the static algorithms are shown to be the most robust; the CPNSS algorithm appears to be immune to location inaccuracies whilst the OGDC algorithm was shown to reduce the number of active nodes in the network to a better extent than that of the CPNSS algorithm. Copyright / Dissertation (MSc)--University of Pretoria, 2010. / Computer Science / unrestricted
|
Page generated in 0.071 seconds