An Ellipsoidal 3D Shape Representation and Wavelet Transform Feature Descriptor for 3D Shape Retrieval
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
For the year of past most three-dimensional objects are represented and mapped with spherical function. Since the mapping preserves important criteria such as geometrical information of a 3D object, the representation of a 3D shape in a suitable way is an important matter for 3D object retrieval. In many circumstances, spherical surface fitting to a 3D shape does not approximate very well, because of their limited degree of divergence by their radius only. Whereas, in the case of ellipsoid definition we get three axes, which gives us a free mapping along each of x, y and z axes . Due to higher degree of freedom ellipsoid give better approximation for a given 3D shape than sphere which lead to a less rror and higher discriminant shape descriptor for retrieval of 3D shape. In this paper, we describe a new 3D shape representation method based on ellipsoid for the purpose of 3D shape retrieval. And we demonstrate our experimental result tested on standard 3D shape Princeton Shape Benchmark (PSB) database, inferring new wavelet shape descriptor of the represented 3D shape function on ellipsoid. Our experimental results support our expectation of our proposed hypothesis.
Authors and Affiliations
Asma Khatun , Md. Rabiul Islam , Prof. Wang Yin Chai
Scalable Overlay Multicasting in Mobile Ad Hoc Networks (SOM
Many crucial applications of MANETs like the battlefield, onference and disaster recovery defines the needs for group communications either one-to-many or many-to-many form. Multicast plays an important role in bandwidt...
Noise Control in Industries by Adaptive MDCT Method
Industrial noise induced hearing loss is an increasingly prevalent disorder that is the result of exposure to high intensity sounds, especially over a long period of time. .Noises of industry can cause partial deafness,...
Signature Analysis of UDP Streams for Intrusion Detection using Data Mining Algorithms
with the increased use of internet for a wide range of activity from simple data search to online commercial transactions, securing the network is extremely important for any organization. Intrusion detection becomes ex...
AN OVERVIEW OF BIOMETRICS
The term biometrics is derived from the Greek words bio eaning “life” and metrics meaning “ to measure” . Biometrics refers to the identification or verification of a person based on his/her physiological and/or behavio...
An Analysis of Q-Learning Algorithms with Strategies of Reward Function
Q-Learning is a Reinforcement Learning technique that works by learning an action-value function that gives the expected utility of taking a given action in a given state and following a fixed policy thereafter. One of t...