• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Li, Ge Xianyu, Tan Jieqing. Free Form Deformation Method of Parametric Surfaces on Rectangular Region[J]. Journal of Computer Research and Development, 2016, 53(5): 1118-1127. DOI: 10.7544/issn1000-1239.2016.20148312
Citation: Zhang Li, Ge Xianyu, Tan Jieqing. Free Form Deformation Method of Parametric Surfaces on Rectangular Region[J]. Journal of Computer Research and Development, 2016, 53(5): 1118-1127. DOI: 10.7544/issn1000-1239.2016.20148312

Free Form Deformation Method of Parametric Surfaces on Rectangular Region

More Information
  • Published Date: April 30, 2016
  • According to free form deformation of parametric surfaces, a new method based on extension function is proposed. It is made by piecewise polynomials and defined on rectangular region. Based on these, the new extension factor we constructed not only possesses perfect properties such as symmetry, single peak, linear peak and region peak, but also holds some parameters which have obvious geometric meanings. In real applications, the extension factor is very suitable for interactive design due to these properties and extraordinary parameters. Furthermore, the new extension factor is easy to construct and convenient to control because of its simple polynomial forms. Applying the deformation matrix constructed by the new extension factor to the original surfaces’ equations, plentiful deformation surfaces can be achieved. Deformation effects such as shearing, concave & convex, expand & contract and changing of deformation center can be obtained. With the help of superimposing, more complex deformation effects can be realized. Lots of numerical experiments are given at the end of paper which illustrate different kinds of deformation effects and plentiful adjusting effects of different parameters.
  • Related Articles

    [1]Chen Ruoxi, Chen Jinyin, Zheng Haibin, Yang Xueyan, Ji Shouling, Chen Tieming. Security of Deep Neural Network Supply Chains: A Survey[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440327
    [2]Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751
    [3]Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin. Security Issues and Privacy Preserving in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
    [4]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [5]Lin Hui, Tian Youliang, Xu Li, Hu Jia. A Novel Privacy Aware Secure Routing Protocol for HWMN[J]. Journal of Computer Research and Development, 2015, 52(8): 1883-1892. DOI: 10.7544/issn1000-1239.2015.20140606
    [6]Ma Zhuo, Zhang Junwei, Ma Jianfeng, and Ji Wenjiang. Provably Secure Certificateless Trusted Access Protocol for WLAN Without Pairing[J]. Journal of Computer Research and Development, 2014, 51(2): 325-333.
    [7]Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    [8]Wang Shaohui, Liu Sujuan, Chen Danwei. Scalable RFID Mutual Authentication Protocol with Backward Privacy[J]. Journal of Computer Research and Development, 2013, 50(6): 1276-1284.
    [9]Zhang Xiaoliang, Tu Yongce, Ma Hengtai, Yang Zhian, Hu Xiaohui. An End-to-End Authentication Protocol for Satellite Communication Network[J]. Journal of Computer Research and Development, 2013, 50(3): 540-547.
    [10]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

Catalog

    Article views (1362) PDF downloads (644) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return