• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Daolun, Lu Detang, Kong Xiangyan, Wu Gang. Implicit Surfaces Based on BP Neural Networks[J]. Journal of Computer Research and Development, 2007, 44(3).
Citation: Li Daolun, Lu Detang, Kong Xiangyan, Wu Gang. Implicit Surfaces Based on BP Neural Networks[J]. Journal of Computer Research and Development, 2007, 44(3).

Implicit Surfaces Based on BP Neural Networks

More Information
  • Published Date: March 14, 2007
  • Neural networks, combined with implicit polynomials, can be employed to represent 3D surfaces which are described by the zero-set of a neural network. First, an explicit function is constructed based on the implicit function. Then the explicit function is approximated by a BP neural network. Finally, the zero-set of the neural network which is the implicit surface is extracted from the simulation surface. The method is not sensitive to the error, the number of the constraint points, and the distance between the boundary points and inner/extern points. Experimental results are given to verify the effectiveness of surface reconstruction.
  • Related Articles

    [1]Xiang Chaocan, Cheng Wenhui, Zhang Zhao, Jiao Xianlong, Qu Yuben, Chen Chao, Dai Haipeng. Intelligent Edge Computing-Empowered Adaptive Urban Traffic Sensing Data Recovery[J]. Journal of Computer Research and Development, 2023, 60(3): 619-634. DOI: 10.7544/issn1000-1239.202110962
    [2]Shen Yijie, Zeng Dan, Xiong Jin. A Benefit Model Based Data Reuse Mechanism for Spark SQL[J]. Journal of Computer Research and Development, 2020, 57(2): 318-332. DOI: 10.7544/issn1000-1239.2020.20190563
    [3]Shi Weisong, Zhang Xingzhou, Wang Yifan, Zhang Qingyang. Edge Computing: State-of-the-Art and Future Directions[J]. Journal of Computer Research and Development, 2019, 56(1): 69-89. DOI: 10.7544/issn1000-1239.2019.20180760
    [4]Zhang Qi, Hu Yupeng, Ji Cun, Zhan Peng, Li Xueqing. Edge Computing Application: Real-Time Anomaly Detection Algorithm for Sensing Data[J]. Journal of Computer Research and Development, 2018, 55(3): 524-536. DOI: 10.7544/issn1000-1239.2018.20170804
    [5]Xie Heng, Wang Mei, Le Jiajin, Sun Li. Calculation Results Characteristics Extract and Reuse Strategy Based on Hive[J]. Journal of Computer Research and Development, 2015, 52(9): 2014-2024. DOI: 10.7544/issn1000-1239.2015.20140548
    [6]Zhang Qi, Wang Mei, Le Jiajin, Liu Guohua. Scheduling Algorithm for the Reuse Buffers in Column-Store Data Warehouse Query Execution[J]. Journal of Computer Research and Development, 2011, 48(10): 1942-1950.
    [7]Zhong Liang, Hu Chunming, Wo Tianyu, Li Jianxin, and Kang Junbing. Prefetching Mechanism for On-demand Software Streaming[J]. Journal of Computer Research and Development, 2011, 48(7): 1178-1189.
    [8]Hu Xiao and Chen Shuming. Code Layout for Phase Prefetch on Instruction Cache[J]. Journal of Computer Research and Development, 2009, 46(5): 747-755.
    [9]Ban Zhijie, Gu Zhimin, Jin Yu. A Survey of Web Prefetching[J]. Journal of Computer Research and Development, 2009, 46(2): 202-210.
    [10]Wu Jiajun, Feng Xiaobing, Zhang Zhaoqing. Data Prefetching Technique of Nonlinear Memory Access[J]. Journal of Computer Research and Development, 2007, 44(2): 355-360.

Catalog

    Article views (501) PDF downloads (764) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return