Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Surface Flattening using Discrete Harmonic Map, Morphing, and Texture Mapping.

1. Solve discrete harmonic mapping of a given surface patch (suppose the surface is genus-0 and with one boundary)

1.1. Map the boundary loop onto a unit rectangle using chord-length parameterization:

a) Pick a random starting point B0, trace the boundary loop L, compute its total length |L|;

b) Starting from B0, find vertices B1, B2, B3 on L, such that the lengths of the boundary paths from B0 to B1, B2, and B3 , are (or just passed) |L|/4, |L|/2, and 3|L|/4, respectively;

c) Map B0, B1, B2, and B3, to (0,0), (1,0), (1,1), and (0,1) respectively, map curve segments (B0, B1), (B1, B2), (B2, B3), (B3, B0) to four boundaries of the unit square accordingly using chord-length parameterization. This fixes the boundary mapping: all boundary vertices are mapped.

1.2. For every interior vertex, map it to the weighted average center of its one-rings. The weight is the harmonic weight, i.e., the cotangent weight defined on the original mesh.

Initially, map all interior vertices to (0.5,0.5), then use one of the following two ways to find the solution:

A easier but slower way:

Iteratively move the mapping position of each vertex:

Uik+1 = (Uik+(Σj≡n(i) wij ujk j≡n(i) wij )/2,

Here u denotes the coordinates on the plane, and we use k and k+1 to indicate the position before and after the (k+1)-th iteration.

You may need to do a few thousand iterations until you see the movement is small.

A faster way:

Assemble the coefficient matrix and solve the linear system (check slides)

2. Use your keyboard to control a linear interpolation between the original mesh and its planar target shape

a. Each vertex vi has its original 3D coordinates pi and 2D coordinates ui, its current position is xi = (1-t) pi+t ui

b. Use “-“ and “+” to decrease/increase the value of t, which should be restricted to [0,1]

3. Do a texture mapping using your computed coordinates.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91809

Have any Question? 


Related Questions in Computer Engineering

What are the three main goals of the cia security triad and

What are the three main goals of the CIA Security Triad and what are the most common gaps you see exploited today? You may want to consider issues regarding access control in your answer.

Briefly examine the impact of trade barriers on market

Briefly examine the impact of trade barriers on market access and strategies to counter trade barriers.

Research project relational programming and transactions a

(Research project) Relational programming and transactions. A transaction can do an abort, which cancels the current calculation (see section 8.5). A relational program can do a fail, which says that the current calculat ...

Text book - algorithm design by jon kleinberg and eva

Text Book - Algorithm Design by Jon Kleinberg and Eva Tardos Chapter 1 - Introduction: Some Representative Problems Exercises- Q1. Decide whether you think the following statement is true or false. If it is true, give a ...

To what extent could configuration-management tools support

To what extent could configuration-management tools support the gathering of quantitative project data? To what extent could such tools support project control?

Why is risk management so important for any project what

Why is risk management so important for any project? What strategy is adopted to minimize the risk of changing requirements?

Assignmentnbsp information technology strategic planimagine

Assignment:   Information Technology Strategic Plan Imagine that a company has recently hired you as a senior business consultant. The company is seeking to gain better traction with regard to customer satisfaction and l ...

Select an older ood method presented in section 2213 and

Select an older OOD method presented in Section 22.1.3 and prepare a onehour tutorial for your class. Be sure to show all important diagrammatic modeling conventions that the authors suggest.

What is a software design what constraints are considered

What is a software design? What constraints are considered while making the software design? What techniques can be used for making a software design? How can quality of a software design be ensured? What is a design lif ...

A what is the advantage of using different types of

a. What is the advantage of using different types of cursors? b. Explain forward-only cursors. Give an example of their use. c. Explain static cursors. Give an example of their use. d. Explain keyset cursors. Give an exa ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate