Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 5,344
1.
  • Unsupervised ground filteri... Unsupervised ground filtering of airborne-based 3D meshes using a robust cloth simulation
    Yu, Dayu; He, Lianlian; Ye, Fan ... International journal of applied earth observation and geoinformation, July 2022, 2022-07-00, Volume: 111
    Journal Article
    Peer reviewed
    Open access

    •This work proposes a primitive-oriented cloth simulation method for ground filtering of large-scale 3D meshes from airborne platforms.•This method is not affected by low and unbalanced density ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
2.
  • A 3D model encryption schem... A 3D model encryption scheme based on a cascaded chaotic system
    Gao, Suo; Wu, Rui; Wang, Xingyuan ... Signal processing, January 2023, 2023-01-00, Volume: 202
    Journal Article
    Peer reviewed
    Open access

    •A 3D model encryption algorithm (3DME-SC) is proposed.•A 2D chaotic system (2D-LAIC), which has good dynamic behavior, is proposed.•Simulation experiments show that 3DME-SC exhibits good security ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
3.
  • Generation of 3D Tumor Sphe... Generation of 3D Tumor Spheroids with Encapsulating Basement Membranes for Invasion Studies
    Nazari, Shayan S. Current protocols in cell biology, June 2020, Volume: 87, Issue: 1
    Journal Article
    Open access

    In the past, in vitro studies of invasion and tumor progression were performed primarily using cancer cells cultured on a flat, two‐dimensional (2D) surface in a monolayer. In recent years, however, ...
Full text

PDF
4.
  • View-aligned pixel-level fe... View-aligned pixel-level feature aggregation for 3D shape classification
    Xu, Yong; Pan, Shaohui; Xu, Ruotao ... Computer vision and image understanding, November 2024, 2024-11-00, Volume: 248
    Journal Article
    Peer reviewed

    Multi-view 3D shape classification, which identifies a 3D shape based on its 2D views rendered from different viewpoints, has emerged as a promising method of shape understanding. A key building ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, NLZOH, NUK, OILJ, UILJ, UL, UPCLJ, UPUK, ZRSKP
5.
Full text

PDF
6.
  • Multispectral’s Three-Dimen... Multispectral’s Three-Dimensional Model Based on SIFT Feature Extraction
    International journal of geoinformatics, 6/2023
    Journal Article

    Recently, multispectral images can be captured not only from satellite sensors but also from cameras. Hence, using the photogrammetric approach, multispectral images can be manipulated to generate a ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
7.
  • Proposal of metadata schema... Proposal of metadata schema for capturing and processing 3D models in an archaeological context
    Polo, María-Eugenia; Duran-Dominguez, Guadalupe; Felicísimo, Ángel M. Digital Applications in Archaeology and Cultural Heritage, September 2024, 2024-09-00, Volume: 34
    Journal Article
    Peer reviewed
    Open access

    The management of cultural heritage leads to the creation of digital files that contain representations of cultural heritage elements. Over the last few decades, a number of technologies designed for ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
8.
  • A 3D model encryption metho... A 3D model encryption method supporting adaptive visual effects after decryption
    Li, Shimin; Zhao, Ruoyu; Guan, Qingxiao ... Advanced engineering informatics, January 2024, 2024-01-00, Volume: 59
    Journal Article
    Peer reviewed

    3D model security protection has become increasingly essential due to its wide engineering applications. Encryption is a common method to protect 3D models. Jansent et al. recently proposed a novel ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
9.
  • Reconstruction of Personali... Reconstruction of Personalized 3D Face Rigs from Monocular Video
    Garrido, Pablo; Zollhöfer, Michael; Casas, Dan ... ACM transactions on graphics, 06/2016, Volume: 35, Issue: 3
    Journal Article
    Peer reviewed

    We present a novel approach for the automatic creation of a personalized high-quality 3D face rig of an actor from just monocular video data (e.g., vintage movies). Our rig is based on three distinct ...
Full text
Available for: NUK, UL
10.
  • Joint Local Correlation and... Joint Local Correlation and Global Contextual Information for Unsupervised 3D Model Retrieval and Classification
    Li, Wenhui; Zhao, Zhenlan; Liu, An-An ... IEEE transactions on circuits and systems for video technology, 05/2022, Volume: 32, Issue: 5
    Journal Article
    Peer reviewed

    Unsupervised 3D model analysis has attracted tremendous attentions with the increasing growth of 3D model data and the extensive human annotations. Many effective methods have been designed to ...
Full text
Available for: IJS, NUK, UL
1 2 3 4 5
hits: 5,344

Load filters