Search results for "angulation"
showing 10 items of 70 documents
Changing the strategy formation process in a service cooperative
2010
PurposeThe purpose of this paper is to concern the strategic changes a firm needs to incorporate in order to deliver a complex service such as providing assistance to the socially disadvantaged. The paper seeks to analyze the development of such a process considering the ability of managers to exploit resources and foster new opportunities for the firm.Design/methodology/approachThe qualitative methodology applied is that of a case study. The organization analyzed was a service cooperative. A semi‐structured questionnaire was used to gather the information along with documents and additional information thereafter, thus facilitating the triangulation process.FindingsNon‐profit service organ…
Copy–Move Forgery Detection by Matching Triangles of Keypoints
2015
Copy-move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to find similar ones, or point-based approaches, in which relevant keypoints are extracted and matched to each other to find similar areas. In this paper, we present a very novel hybrid approach, which compares triangles rather than blocks, or single points. Interest points are extracted from the image, and objects are modeled as a set of connected triangles built onto these points. Triangles are matched according to their shapes (inner angles), their content (c…
Analysing Student Performance using Sparse Data of Core Bachelor Courses
2015
Curricula for Computer Science (CS) degrees are characterized by the strong occupational orientation of the discipline. In the BSc degree structure, with clearly separate CS core studies, the learning skills for these and other required courses may vary a lot, which is shown in students' overall performance. To analyze this situation, we apply nonstandard educational data mining techniques on a preprocessed log file of the passed courses. The joint variation in the course grades is studied through correlation analysis while intrinsic groups of students are created and analyzed using a robust clustering technique. Since not all students attended all courses, there is a nonstructured sparsity…
3D shape extraction of internal and external surfaces of glass objects
2013
Three-dimensional (3D) digitization of manufactured objects has been investigated for several years and consequently, many techniques have been proposed. Even if some techniques have been successfully commercialized, most of them assume a diffuse or near diffuse reflectance of the object’s surface, and difficulties remain for the acquisition of “optically non cooperative” surfaces, such as transparent or specular ones. To address such surfaces, we propose a non conventional technique, called “Scanning from Heating” (SfH). In contrast to classical active triangulation techniques that acquire the reflection of visible light, we measure the thermal emission of the heated surface. The aim of th…
3D reconstruction of transparent objects exploiting surface fluorescence caused by UV irradiation
2010
In this paper, we present a novel approach exploiting fluorescence imaging to estimate the shape of transparent objects. Classical inspection systems require users to coat transparent objects with some powder before measurement. Methods suggested in literature through non contact measurement do not effectively deal with the refraction problem, thus, providing inaccuracies. The proposed method handles the scanning of transparent objects without using any powder and solving the refraction problem using UV environment. A classical triangulation method based on stereovision scheme using fixed stereoscopic visible range cameras with a fixed UV (Ultra Violet) laser source is implemented. Transpar…
Mesh connectivity compression using convection reconstruction
2007
International audience; During a highly productive period running from 1995 to about 2002, the research in lossless compression of 3D meshes mainly consisted in a hard battle for the best bitrates. But for a few years, compression rates seem stabilized around 1.5 bit per vertex for the connectivity coding of usual meshes, and more and more work is dedicated to remeshing, lossy compression, or gigantic mesh compression, where memory and CPU optimizations are the new priority. However, the size of 3D models keeps growing, and many application fields keep requiring lossless compression. In this paper, we present a new contribution for single-rate lossless connectivity compression, which first …
Annealed Invariance Principle for Random Walks on Random Graphs Generated by Point Processes in R-d
2016
International audience; We consider simple random walks on random graphs embedded in R-d and generated by point processes such as Delaunay triangulations, Gabriel graphs and the creek-crossing graphs. Under suitable assumptions on the point process, we show an annealed invariance principle for these random walks. These results hold for a large variety of point processes including Poisson point processes, Matern cluster and Matern hardcore processes which have respectively clustering and repulsiveness properties. The proof relies on the use the process of the environment seen from the particle. It allows to reconstruct the original process as an additive functional of a Markovian process und…
Runāšanas prasmju pilnveide, izmantojot stāstus
2016
Runāšanas prasmes tiek izmantotas katru dienu. Runa ir valodas prasme, kas palīdz komunicēt. Tas ir sarežģīts process, kas iekļauj citas valodu prasmes un runas orgānus. Tāpēc ir svarīgi attīstīt runāšanas prasmes. Bakalaura darba tēma ir "Runāšanas prasmju pilnveide, izmantojot stāstus". Darba mērķis ir pierādīt, ka, izmantojot stāstu metodi mācīšanā, var uzlabot runāšanas prasmes. Darbā izmantotās pētniecības metodes ir literatūras apskats, gadījumu izpēte un triangulācijas metode. Izvirzītā hipotēze tika pierādīta ar gadījuma izpētes metodi, balstoties uz iegūtajiem datiem no studentu aptaujām un iegūtajiem rezultātiem mācību stundas novērošanas laikā, un apstrādāti sekojošos izpētes dar…
Inverse problems and invisibility cloaking for FEM models and resistor networks
2013
In this paper we consider inverse problems for resistor networks and for models obtained via the finite element method (FEM) for the conductivity equation. These correspond to discrete versions of the inverse conductivity problem of Calderón. We characterize FEM models corresponding to a given triangulation of the domain that are equivalent to certain resistor networks, and apply the results to study nonuniqueness of the discrete inverse problem. It turns out that the degree of nonuniqueness for the discrete problem is larger than the one for the partial differential equation. We also study invisibility cloaking for FEM models, and show how an arbitrary body can be surrounded with a layer …