IEEE Trans Vis Comput Graph
December 2023
Creating 3D shapes from 2D drawings is an important problem with applications in content creation for computer animation and virtual reality. We introduce a new sketch-based system, CreatureShop, that enables amateurs to create high-quality textured 3D character models from 2D drawings with ease and efficiency. CreatureShop takes an input bitmap drawing of a character (such as an animal or other creature), depicted from an arbitrary descriptive pose and viewpoint, and creates a 3D shape with plausible geometric details and textures from a small number of user annotations on the 2D drawing.
View Article and Find Full Text PDFHumankind is generating digital data at an exponential rate. These data are typically stored using electronic, magnetic or optical devices, which require large physical spaces and cannot last for a very long time. Here we report the use of peptide sequences for data storage, which can be durable and of high storage density.
View Article and Find Full Text PDFMobile sensor networks (MSNs) are utilized in many sensing applications that require both target seeking and tracking capabilities. Dynamics of mobile agents and the interactions among them introduce new challenges in designing robust cooperative control mechanisms. In this paper, a distributed semiflocking algorithm inspired by Temnothorax albipennis migration model is proposed to address the above issues.
View Article and Find Full Text PDFNeighbor discovery is a crucial operation frequently executed throughout the life cycle of a Wireless Sensor Network (WSN). Various protocols have been proposed to minimize the discovery latency or to prolong the lifetime of sensors. However, none of them have addressed that all the critical concerns stemming from real WSNs, including communication collisions, latency constraints and energy consumption limitations.
View Article and Find Full Text PDFRecently, the increasing demand for telemedicine services has raised interest in the use of medical image protection technology. Conventional block ciphers are poorly suited to image protection due to the size of image data and increasing demand for real-time teleradiology and other online telehealth applications. To meet this challenge, this paper presents a novel chaos-based medical image encryption scheme.
View Article and Find Full Text PDFPhys Rev E Stat Nonlin Soft Matter Phys
August 2005
The effect of the user network on the telephone network traffic is studied in this paper. Unlike classical traffic analysis, where users are assumed to be connected uniformly, our proposed method employs a scale-free network to model the behavior of telephone users. Each user has a fixed set of acquaintances with whom the user may communicate, and the number of acquaintances follows a power-law distribution.
View Article and Find Full Text PDF