Individual handwriting is an important feature of a person, reflecting his personality, cultural and intellectual level. The possibility of using in the cyberspace a unique manner of writing the text, which is inherent in every person, promotes the strengthening of the personal principle, emphasizes the uniqueness of the individual. The article deals with the problem of constructing individual digital fonts based on handwriting samples. To describe the font, a "trajectory format" is used, in which characters of the font are represented by fat curves. A fat curve is a family of circles centered on a smooth curve. To build a font for a given pattern, we solve the problem of fitting the fat curves to the bitmap image of handwritten text. The article proposes the solution of this problem, based on the continuous medial representation of the object shape in binary images.
{"title":"Imitation of Handwriting for Art and Heritage in Cyberspace","authors":"S. Klimenko, L. Mestetskiy, A. Semenov","doi":"10.1109/CW.2017.57","DOIUrl":"https://doi.org/10.1109/CW.2017.57","url":null,"abstract":"Individual handwriting is an important feature of a person, reflecting his personality, cultural and intellectual level. The possibility of using in the cyberspace a unique manner of writing the text, which is inherent in every person, promotes the strengthening of the personal principle, emphasizes the uniqueness of the individual. The article deals with the problem of constructing individual digital fonts based on handwriting samples. To describe the font, a \"trajectory format\" is used, in which characters of the font are represented by fat curves. A fat curve is a family of circles centered on a smooth curve. To build a font for a given pattern, we solve the problem of fitting the fat curves to the bitmap image of handwritten text. The article proposes the solution of this problem, based on the continuous medial representation of the object shape in binary images.","PeriodicalId":309728,"journal":{"name":"2017 International Conference on Cyberworlds (CW)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123260026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas W. Day, William H. Dobson, C. Headleand, N. John, S. Pop
This paper presents recent additions to our Wheelchair-VR application, in particular the use of different drive configurations. We have previously shown that Wheelchair-VR can be used to improve driving skills. Here we consider the utility of the application in allowing users who are in the process of purchasing or upgrading a wheelchair to experience different configurations and options in a cost-effective virtual environment. A preliminary study is presented, which suggests that this approach can be effective.
{"title":"Using Virtual Reality to Experience Different Powered Wheelchair Configurations","authors":"Thomas W. Day, William H. Dobson, C. Headleand, N. John, S. Pop","doi":"10.1109/CW.2017.33","DOIUrl":"https://doi.org/10.1109/CW.2017.33","url":null,"abstract":"This paper presents recent additions to our Wheelchair-VR application, in particular the use of different drive configurations. We have previously shown that Wheelchair-VR can be used to improve driving skills. Here we consider the utility of the application in allowing users who are in the process of purchasing or upgrading a wheelchair to experience different configurations and options in a cost-effective virtual environment. A preliminary study is presented, which suggests that this approach can be effective.","PeriodicalId":309728,"journal":{"name":"2017 International Conference on Cyberworlds (CW)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127639005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaokun Wang, X. Ban, Yalan Zhang, Zhigeng Pan, Sinuo Liu
Under particle-based framework, level set is generally defined for fluid surfaces and is integrated with marching cubes algorithm to extract fluid surfaces. In these methods, anisotropic kernels method has proven successful for reconstructing fluid surfaces with high quality. It can perfectly represent smooth surfaces, thin stream and sharp features of fluids compare to other methods. In this paper, we propose a novel approach to extend it to the simulation of multiphase fluids simulation. In order to ensure fine effects for both fluid surface and multiphase interface, we modify the calculation of original anisotropic kernels and address a binary tree strategy for reconstruction. Our method can extract fluid surfaces simply and effectively for particle-based multiphase simulation. It solved the problem of overlaps and gaps at multiphase interface that exist in traditional methods. The experimental results demonstrate that our method keep a good fluid surface and interface effects.
{"title":"Anisotropic Surface Reconstruction for Multiphase Fluids","authors":"Xiaokun Wang, X. Ban, Yalan Zhang, Zhigeng Pan, Sinuo Liu","doi":"10.1109/CW.2017.30","DOIUrl":"https://doi.org/10.1109/CW.2017.30","url":null,"abstract":"Under particle-based framework, level set is generally defined for fluid surfaces and is integrated with marching cubes algorithm to extract fluid surfaces. In these methods, anisotropic kernels method has proven successful for reconstructing fluid surfaces with high quality. It can perfectly represent smooth surfaces, thin stream and sharp features of fluids compare to other methods. In this paper, we propose a novel approach to extend it to the simulation of multiphase fluids simulation. In order to ensure fine effects for both fluid surface and multiphase interface, we modify the calculation of original anisotropic kernels and address a binary tree strategy for reconstruction. Our method can extract fluid surfaces simply and effectively for particle-based multiphase simulation. It solved the problem of overlaps and gaps at multiphase interface that exist in traditional methods. The experimental results demonstrate that our method keep a good fluid surface and interface effects.","PeriodicalId":309728,"journal":{"name":"2017 International Conference on Cyberworlds (CW)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131301850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Scattered data fitting is always a challenging problem in the fields of geometric modeling and computer aided design. As the skeleton based three-dimensional solid model representation, the Ball B-Spline Curve is suitable to fit the tubular scattered data points. We study the problem of fitting the scattered data points with Ball B-spline curves (BBSCs) and propose the corresponding fitting algorithm based on the Particle Swarm Optimization (PSO) algorithm. In this process, we face three critical and difficult sub problems: (1) parameterization of the data points, (2) determination of the knot vector and (3) calculation of the control radii. All of them are multidimensional and nonlinear, especially the calculation of the parametric values. The parallelism of the PSO algorithm provides a high optimization, which is more suitable for solving nonlinear, nondifferentiable and multi-modal optimization problems. So we use it to solve the scattered data fitting problem. The PSO is applied in three steps to solve them. Firstly, we determine the parametric values of the data points with PSO. Then we compute the knot vector based on the parametric values of the data points. At last, we get the radius function. The experiments on the shell surface, the crescent surface and the real-world models verify the accuracy and flexibility of the method. The research can be widely used in the computer aided design, animation and model analysis.
散点数据拟合一直是几何建模和计算机辅助设计领域的难题。作为基于骨架的三维实体模型表示方法,球 B 样条曲线(Ball B-Spline Curve)适用于拟合管状散点数据。我们研究了用球 B 样条曲线(BBSC)拟合散乱数据点的问题,并基于粒子群优化(PSO)算法提出了相应的拟合算法。在这一过程中,我们面临三个关键和困难的子问题:(1) 数据点的参数化;(2) 节向量的确定;(3) 控制半径的计算。所有这些问题都是多维和非线性的,尤其是参数值的计算。PSO 算法的并行性提供了高优化性,更适合解决非线性、无差异和多模式优化问题。因此,我们用它来解决分散数据拟合问题。PSO 分三步进行求解。首先,我们用 PSO 确定数据点的参数值。然后,根据数据点的参数值计算节点向量。最后,得到半径函数。在贝壳表面、月牙表面和实际模型上的实验验证了该方法的准确性和灵活性。这项研究可广泛应用于计算机辅助设计、动画制作和模型分析。
{"title":"Scattered Data Points Fitting Using Ball B-Spline Curves Based on Particle Swarm Optimization","authors":"Xingce Wang, Zhongke Wu, Junchen Shen, Qianqian Jiang, Yuanshuai Zhu, Mingquan Zhou","doi":"10.1109/CW.2017.13","DOIUrl":"https://doi.org/10.1109/CW.2017.13","url":null,"abstract":"Scattered data fitting is always a challenging problem in the fields of geometric modeling and computer aided design. As the skeleton based three-dimensional solid model representation, the Ball B-Spline Curve is suitable to fit the tubular scattered data points. We study the problem of fitting the scattered data points with Ball B-spline curves (BBSCs) and propose the corresponding fitting algorithm based on the Particle Swarm Optimization (PSO) algorithm. In this process, we face three critical and difficult sub problems: (1) parameterization of the data points, (2) determination of the knot vector and (3) calculation of the control radii. All of them are multidimensional and nonlinear, especially the calculation of the parametric values. The parallelism of the PSO algorithm provides a high optimization, which is more suitable for solving nonlinear, nondifferentiable and multi-modal optimization problems. So we use it to solve the scattered data fitting problem. The PSO is applied in three steps to solve them. Firstly, we determine the parametric values of the data points with PSO. Then we compute the knot vector based on the parametric values of the data points. At last, we get the radius function. The experiments on the shell surface, the crescent surface and the real-world models verify the accuracy and flexibility of the method. The research can be widely used in the computer aided design, animation and model analysis.","PeriodicalId":309728,"journal":{"name":"2017 International Conference on Cyberworlds (CW)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127248684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Because the Internet makes human lives easier, many devices are connected to the Internet daily. The private data of individuals and large companies, including health-related data, user bank accounts, and military and manufacturing data, are increasingly accessible via the Internet. Because almost all data is now accessible through the Internet, protecting these valuable assets has become a major concern. The goal of cyber security is to protect such assets from unauthorized use. Attackers use automated tools and manual techniques to penetrate systems by exploiting existing vulnerabilities and software bugs. To provide good enough security; attack methodologies, vulnerability concepts and defence strategies should be thoroughly investigated. The main purpose of this study is to show that the patches released for existing vulnerabilities at the operating system (OS) level and in software programs does not completely prevent cyber-attack. Instead, producing specific patches for each company and fixing software bugs by being aware of the software running on each specific system can provide a better result. This study also demonstrates that firewalls, antivirus software, Windows Defender and other prevention techniques are not sufficient to prevent attacks. Instead, this study examines different aspects of penetration testing to determine vulnerable applications and hosts using the Nmap and Metasploit frameworks. For a test case, a virtualized system is used that includes different versions of Windows and Linux OS.
{"title":"Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs","authors":"Ömer Aslan, R. Samet","doi":"10.1109/CW.2017.22","DOIUrl":"https://doi.org/10.1109/CW.2017.22","url":null,"abstract":"Because the Internet makes human lives easier, many devices are connected to the Internet daily. The private data of individuals and large companies, including health-related data, user bank accounts, and military and manufacturing data, are increasingly accessible via the Internet. Because almost all data is now accessible through the Internet, protecting these valuable assets has become a major concern. The goal of cyber security is to protect such assets from unauthorized use. Attackers use automated tools and manual techniques to penetrate systems by exploiting existing vulnerabilities and software bugs. To provide good enough security; attack methodologies, vulnerability concepts and defence strategies should be thoroughly investigated. The main purpose of this study is to show that the patches released for existing vulnerabilities at the operating system (OS) level and in software programs does not completely prevent cyber-attack. Instead, producing specific patches for each company and fixing software bugs by being aware of the software running on each specific system can provide a better result. This study also demonstrates that firewalls, antivirus software, Windows Defender and other prevention techniques are not sufficient to prevent attacks. Instead, this study examines different aspects of penetration testing to determine vulnerable applications and hosts using the Nmap and Metasploit frameworks. For a test case, a virtualized system is used that includes different versions of Windows and Linux OS.","PeriodicalId":309728,"journal":{"name":"2017 International Conference on Cyberworlds (CW)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115630658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nosheen Hussain, P. Cooper, S. Shnyder, H. Ugail, A. M. Bukar, David Connah
As part of the cancer drug development process, evaluation in experimental subcutaneous tumour transplantation models is a key process. This involves implanting tumour material underneath the mouse skin and measuring tumour growth using calipers. This methodology has been proven to have poor reproducibility and accuracy due to observer variation. Furthermore the physical pressure placed on the tumour using calipers is not only distressing for the mouse but could also lead to tumour damage. Non-invasive digital imaging of the tumour would reduce handling stresses and allow volume determination without any potential tumour damage. This is challenging as the tumours sit under the skin and have the same colour pattern as the mouse body making them hard to differentiate in a 2D image. We used the pre-trained convolutional neural network VGG-16 and extracted multiple layers in an attempt to accurately locate the tumour. When using the layer FC7 after RELU activation for extraction, a recognition rate of 89.85% was achieved.
{"title":"A Non-invasive 2D Digital Imaging Method for Detection of Surface Lesions Using Machine Learning","authors":"Nosheen Hussain, P. Cooper, S. Shnyder, H. Ugail, A. M. Bukar, David Connah","doi":"10.1109/CW.2017.39","DOIUrl":"https://doi.org/10.1109/CW.2017.39","url":null,"abstract":"As part of the cancer drug development process, evaluation in experimental subcutaneous tumour transplantation models is a key process. This involves implanting tumour material underneath the mouse skin and measuring tumour growth using calipers. This methodology has been proven to have poor reproducibility and accuracy due to observer variation. Furthermore the physical pressure placed on the tumour using calipers is not only distressing for the mouse but could also lead to tumour damage. Non-invasive digital imaging of the tumour would reduce handling stresses and allow volume determination without any potential tumour damage. This is challenging as the tumours sit under the skin and have the same colour pattern as the mouse body making them hard to differentiate in a 2D image. We used the pre-trained convolutional neural network VGG-16 and extracted multiple layers in an attempt to accurately locate the tumour. When using the layer FC7 after RELU activation for extraction, a recognition rate of 89.85% was achieved.","PeriodicalId":309728,"journal":{"name":"2017 International Conference on Cyberworlds (CW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130717725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Visual Simultaneous Localization and Mapping (SLAM) has been used for markerless tracking in augmented reality applications. Distributed SLAM helps multiple agents to collaboratively explore and build a global map of the environment while estimating their locations in it. One of the main challenges in Distributed SLAM is to identify local map overlaps of these agents, especially when their initial relative positions are not known. We developed a collaborative AR framework with freely moving agents having no knowledge of their initial relative positions. Each agent in our framework uses a camera as the only input device for its SLAM process. Furthermore, the framework identifies map overlaps of agents using an appearance-based method.
{"title":"A Collaborative Augmented Reality Framework Based on Distributed Visual Slam","authors":"R. Gamage, M. Tuceryan","doi":"10.1109/CW.2017.47","DOIUrl":"https://doi.org/10.1109/CW.2017.47","url":null,"abstract":"Visual Simultaneous Localization and Mapping (SLAM) has been used for markerless tracking in augmented reality applications. Distributed SLAM helps multiple agents to collaboratively explore and build a global map of the environment while estimating their locations in it. One of the main challenges in Distributed SLAM is to identify local map overlaps of these agents, especially when their initial relative positions are not known. We developed a collaborative AR framework with freely moving agents having no knowledge of their initial relative positions. Each agent in our framework uses a camera as the only input device for its SLAM process. Furthermore, the framework identifies map overlaps of agents using an appearance-based method.","PeriodicalId":309728,"journal":{"name":"2017 International Conference on Cyberworlds (CW)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122589014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yisi Liu, Salem Chandrasekaran Harihara Subramaniam, O. Sourina, Eesha Shah, Joshua Chua, Kirill Ivanov
Neurofeedback training is one type of the biofeedback training that allows the subject do self-regulation during the training according to his/her real-time brain activities recognized from Electroencephalogram (EEG) and given to him/her through visual, audio or haptic feedback. The Neurofeedback training has been proved to be helpful in improvement of cognitive abilities not only for patients with mental illnesses but also for healthy subjects including athletes. In this paper, we proposed an experiment in which we recruited elite shooters and conducted a novel individual beta-1/theta based neurofeedback training to confirm the usage of neurofeedback training in boosting the performance of rifle shooters. The efficiency of the neurofeedback training was examined by comparing the shooting scores and results of DAUF test assessing the ability of sustained attention of the shooters before and after neurofeedback training.
{"title":"Neurofeedback Training for Rifle Shooters to Improve Cognitive Ability","authors":"Yisi Liu, Salem Chandrasekaran Harihara Subramaniam, O. Sourina, Eesha Shah, Joshua Chua, Kirill Ivanov","doi":"10.1109/CW.2017.36","DOIUrl":"https://doi.org/10.1109/CW.2017.36","url":null,"abstract":"Neurofeedback training is one type of the biofeedback training that allows the subject do self-regulation during the training according to his/her real-time brain activities recognized from Electroencephalogram (EEG) and given to him/her through visual, audio or haptic feedback. The Neurofeedback training has been proved to be helpful in improvement of cognitive abilities not only for patients with mental illnesses but also for healthy subjects including athletes. In this paper, we proposed an experiment in which we recruited elite shooters and conducted a novel individual beta-1/theta based neurofeedback training to confirm the usage of neurofeedback training in boosting the performance of rifle shooters. The efficiency of the neurofeedback training was examined by comparing the shooting scores and results of DAUF test assessing the ability of sustained attention of the shooters before and after neurofeedback training.","PeriodicalId":309728,"journal":{"name":"2017 International Conference on Cyberworlds (CW)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124231890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Classroom attendance check is a contributing factor to student participation and the final success in the courses. Taking attendance by calling out names or passing around an attendance sheet are both time-consuming, and especially the latter is open to easy fraud. As an alternative, RFID, wireless, fingerprint, and iris and face recognition-based methods have been tested and developed for this purpose. Although these methods have some pros, high system installation costs are the main disadvantage. The present paper aims to propose a face recognition-based mobile automatic classroom attendance management system needing no extra equipment. To this end, a filtering system based on Euclidean distances calculated by three face recognition techniques, namely Eigenfaces, Fisherfaces and Local Binary Pattern, has been developed for face recognition. The proposed system includes three different mobile applications for teachers, students, and parents to be installed on their smart phones to manage and perform the real-time attendance-taking process. The proposed system was tested among students at Ankara University, and the results obtained were very satisfactory.
{"title":"Face Recognition-Based Mobile Automatic Classroom Attendance Management System","authors":"R. Samet, Muhammed Tanriverdi","doi":"10.1109/CW.2017.34","DOIUrl":"https://doi.org/10.1109/CW.2017.34","url":null,"abstract":"Classroom attendance check is a contributing factor to student participation and the final success in the courses. Taking attendance by calling out names or passing around an attendance sheet are both time-consuming, and especially the latter is open to easy fraud. As an alternative, RFID, wireless, fingerprint, and iris and face recognition-based methods have been tested and developed for this purpose. Although these methods have some pros, high system installation costs are the main disadvantage. The present paper aims to propose a face recognition-based mobile automatic classroom attendance management system needing no extra equipment. To this end, a filtering system based on Euclidean distances calculated by three face recognition techniques, namely Eigenfaces, Fisherfaces and Local Binary Pattern, has been developed for face recognition. The proposed system includes three different mobile applications for teachers, students, and parents to be installed on their smart phones to manage and perform the real-time attendance-taking process. The proposed system was tested among students at Ankara University, and the results obtained were very satisfactory.","PeriodicalId":309728,"journal":{"name":"2017 International Conference on Cyberworlds (CW)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131565727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Celia Romo, Francisco A. Conde, N. John, J. Torres
Medical training systems often require the use of haptic interaction with deformable models and high visual fidelity. It is necessary to get a compromise between the geometric model and the deformation model in order to achieve the required frame rate for haptic interaction of 1000Hz. Frequently low level geometric models are used to describe the geometry of the object. This produces large data structures for which it is difficult to reach real-time force feedback.This paper proposes to use a novel model based on Bezier hyperpatches to represent the object, computing the deformation using a mass-spring system. This model can represent free form objects in a concise way. A small test application to simulate palpation with a haptic probe is presented.
{"title":"Modeling Deformable Objects for Medical Training with Haptic Devices","authors":"Celia Romo, Francisco A. Conde, N. John, J. Torres","doi":"10.1109/CW.2017.43","DOIUrl":"https://doi.org/10.1109/CW.2017.43","url":null,"abstract":"Medical training systems often require the use of haptic interaction with deformable models and high visual fidelity. It is necessary to get a compromise between the geometric model and the deformation model in order to achieve the required frame rate for haptic interaction of 1000Hz. Frequently low level geometric models are used to describe the geometry of the object. This produces large data structures for which it is difficult to reach real-time force feedback.This paper proposes to use a novel model based on Bezier hyperpatches to represent the object, computing the deformation using a mass-spring system. This model can represent free form objects in a concise way. A small test application to simulate palpation with a haptic probe is presented.","PeriodicalId":309728,"journal":{"name":"2017 International Conference on Cyberworlds (CW)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121168971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}