By Topic

2010 Seventh International Conference on Computer Graphics, Imaging and Visualization

7-10 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 40
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (746 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (83 KB) | HTML iconHTML
    Freely Available from IEEE
  • Acknowledgments

    Publication Year: 2010, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (42 KB) | HTML iconHTML
    Freely Available from IEEE
  • Symposium Organizing & Liaison Committee

    Publication Year: 2010, Page(s):x - xii
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • A Robust Multiple Object Tracking Algorithm under Highly Occlusion

    Publication Year: 2010, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    We describe a real-time multiple face-tracking algorithm under highly occlusion. In order to resolve the occlusion and temporal lost problem, a robust data association + filtering procedure is proposed. The mechanism combines the census transform based block-by-block strategy to infer the occlusion state via concerning observation changes of two faces. And a robust and straightforward filtering ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expressive MPEG-4 Facial Animation Using Quadratic Deformation Models

    Publication Year: 2010, Page(s):9 - 14
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3508 KB) | HTML iconHTML

    In this paper we propose an approach compliant with the MPEG-4 standard to synthesize and control facial expressions generated using 3D facial models. This is achieved by establishing the MPEG-4 facial animation standard conformity with the quadratic deformation model representations of facial expressions. This conformity allows us to utilize the MPEG-4 facial animation parameters (FAPs) with the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Principles of Photorealism to Develop Photorealistic Visualisation for Interface Design: A Review

    Publication Year: 2010, Page(s):17 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (437 KB) | HTML iconHTML

    With the mindset of merging both aesthetics and technical knowledge to create believable 3D visualisation, a new set of refined Principles of Photorealism are applied to enhance the 3D rendering approach consequently creating realistic yet quick to create 3D visualisation for Interface Design. This paper discusses the importance of applying the principles with consideration of interface visualisat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Polygonisation of Non-manifold Implicit Surfaces Using a Dual Grid and Points

    Publication Year: 2010, Page(s):26 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1970 KB) | HTML iconHTML

    Our polygons/points method is octree based, uses interval and point sampling of the surface curvature to drive the subdivision, and uses a pruning algorithm to generate points that are rendered where the surface curvature is high, or around non-manifold features. This approach allows us to visualise both manifold and non-manifold implicit surfaces of high complexity. We discuss necessary modificat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual Computer Game Features for Teaching Relativity

    Publication Year: 2010, Page(s):35 - 40
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    In this paper we describe incorporating Einstein's Special Theory of Relativity into an interactive computer game intended for learning and teaching purposes in Australian senior high school and tertiary education. The game, which is based on emph{Asteroids}, embeds either a classical or relativistic model of physics in the game environment such that players interact directly with the physics in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Character Skin Deformation: A Survey

    Publication Year: 2010, Page(s):41 - 48
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1262 KB) | HTML iconHTML

    Skin deformation plays a very important role in creating realistic character animation. A lot of research efforts have been devoted to the development of skin deformation techniques. The paper provides a survey of various techniques and classify them into three major categories; surface-based, volume-based and curve-based techniques. Surface based techniques are divided into purely geometric and p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Caching Scheme for Handheld Device in Mobile Video-on-Demand System

    Publication Year: 2010, Page(s):49 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Mobile Video on demand (VOD) system is that allows mobile clients to browse and watch videos anywhere and anytime. In this system, the video server employs staggered broadcasting protocol to disseminate video to mobile clients within the MANET environment. In this protocol, video is divided into small segments and are repeatedly broadcasted within server's channel in periodic basis. Clients can jo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reviewing Principles and Elements of Animation for Motion Capture-Based Walk, Run and Jump

    Publication Year: 2010, Page(s):55 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    This study aims to study the detail of human motion by experimenting and extracting the subjects' core motions for analysis based on Principles of animation and Elements of animation. Sampling various subjects of physical differences, this study attempts to acquire various motion parameters based on certain predefined actions. In addition, this study also applies enhanced motion editing techniques... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Interpolation Rational Bezier Curve

    Publication Year: 2010, Page(s):63 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2578 KB) | HTML iconHTML

    Recently, interpolation methods especially in curves design are widely used for modeling data points. In this paper a new interpolation method for modeling fuzzy data using fuzzy interpolation rational Bezier curves is introduced based on fuzzy set theory. This method is able to model uncertainty data with definition of fuzzy data via fuzzy number concept. The fuzzy interpolation method is modeled... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differential Evolution Optimization for Bezier Curve Fitting

    Publication Year: 2010, Page(s):68 - 72
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    In this study, we propose an alternative solution for Bezier curve fitting with Differential Evolution (DE) algorithm. DE algorithm is conducted by randomly generating the control points of the Bezier curve. These generated control points are used to calculate the Bezier curve point. The fitness function of DE algorithm is computed to search for the minimum error. From the experiments, we found th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NURBS Curve Approximation Using Particle Swarm Optimization

    Publication Year: 2010, Page(s):73 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (827 KB) | HTML iconHTML

    This paper presents curve approximation problem using Particle Swarm Optimization (PSO). The proposed algorithm will be used to develop a skinning surface with PSO to keep the number of surface control points minimum. The experiments are conducted on various parameterization methods for approximating the curves. By implementing PSO on NURBS curve approximation, the weights of the curve can be adju... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interpolation with PH Quintic Spirals

    Publication Year: 2010, Page(s):80 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    This paper finds a spiral segment matching G2 Hermite conditions for a single Pythagorean hodograph quintic polynomial. We have significantly simplified the existing methods with computationally stable spiral conditions and discovers more spiral regions for the existence of unsolved problems in the past. A spiral is free of local curvature extrema, making spiral design an interesting ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximating Boundary of Bitmap Characters Using Genetic Algorithm

    Publication Year: 2010, Page(s):86 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    This paper presents an algorithm to capture outline of bitmap characters. In order to obtain outline, a cubic function with one shape parameter is used. Genetic algorithm is applied to find the value of shape parameter. The procedure of capturing outline consists of the steps: boundary detection, detection of corner points, break points and fitting the curve. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating Elliptic Curves Modulo p for Cryptography Using Mathematica Software

    Publication Year: 2010, Page(s):92 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    This paper discussed basic concepts of elliptic curves, from the definition of the elliptic curve defined by the Weierstrass equation up to its application to cryptography. The discussion includes the group operations on the curves, the addition law as well as the doubling formulas and how to generate a good curve cryptographically. These important properties come with some examples with the direc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low Complexity Weighted Two-Bit Transforms Based Multiple Candidates Motion Estimation Exploiting the Redundant Computations

    Publication Year: 2010, Page(s):101 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    A low complexity weighted two-bit transforms (2BT) based multiple candidates motion estimation algorithm is proposed in this paper. By exploiting almost the identical operations in two different matching error criteria, we can efficiently determine two best motion vectors according to the respective matching criteria and can enhance the overall motion estimation accuracy. Experimental results show... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.