Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Engineering

Three Dimensional Modeling And Animation Of Facial Expressions, Alice J. Lin Jan 2011

Three Dimensional Modeling And Animation Of Facial Expressions, Alice J. Lin

University of Kentucky Doctoral Dissertations

Facial expression and animation are important aspects of the 3D environment featuring human characters. These animations are frequently used in many kinds of applications and there have been many efforts to increase the realism. Three aspects are still stimulating active research: the detailed subtle facial expressions, the process of rigging a face, and the transfer of an expression from one person to another. This dissertation focuses on the above three aspects.

A system for freely designing and creating detailed, dynamic, and animated facial expressions is developed. The presented pattern functions produce detailed and animated facial expressions. The system produces realistic …


Computer Simulation Of A Hollow-Fiber Bioreactor: Heparan Regulated Growth Factors-Receptors Binding And Dissociation Analysis, Changjiang Zhang Jan 2011

Computer Simulation Of A Hollow-Fiber Bioreactor: Heparan Regulated Growth Factors-Receptors Binding And Dissociation Analysis, Changjiang Zhang

University of Kentucky Doctoral Dissertations

This thesis demonstrates the use of numerical simulation in predicting the behavior of proteins in a flow environment.

A novel convection-diffusion-reaction computational model is first introduced to simulate fibroblast growth factor (FGF-2) binding to its receptor (FGFR) on cell surfaces and regulated by heparan sulfate proteoglycan (HSPG) under flow in a bioreactor. The model includes three parts: (1) the flow of medium using incompressible Navier-Stokes equations; (2) the mass transport of FGF-2 using convection-diffusion equations; and (3) the cell surface binding using chemical kinetics. The model consists of a set of coupled nonlinear partial differential equations (PDEs) for flow and …


Single View Modeling And View Synthesis, Miao Liao Jan 2011

Single View Modeling And View Synthesis, Miao Liao

University of Kentucky Doctoral Dissertations

This thesis develops new algorithms to produce 3D content from a single camera. Today, amateurs can use hand-held camcorders to capture and display the 3D world in 2D, using mature technologies. However, there is always a strong desire to record and re-explore the 3D world in 3D. To achieve this goal, current approaches usually make use of a camera array, which suffers from tedious setup and calibration processes, as well as lack of portability, limiting its application to lab experiments.

In this thesis, I try to produce the 3D contents using a single camera, making it as simple as shooting …


Real-Time 3-D Reconstruction By Means Of Structured Light Illumination, Kai Liu Jan 2010

Real-Time 3-D Reconstruction By Means Of Structured Light Illumination, Kai Liu

University of Kentucky Doctoral Dissertations

Structured light illumination (SLI) is the process of projecting a series of light striped patterns such that, when viewed at an angle, a digital camera can reconstruct a 3-D model of a target object's surface. But by relying on a series of time multiplexed patterns, SLI is not typically associated with video applications. For this purpose of acquiring 3-D video, a common SLI technique is to drive the projector/camera pair at very high frame rates such that any object's motion is small over the pattern set. But at these high frame rates, the speed at which the incoming video can …


Novel Approaches In Structured Light Illumination, Yongchang Wang Jan 2010

Novel Approaches In Structured Light Illumination, Yongchang Wang

University of Kentucky Doctoral Dissertations

Among the various approaches to 3-D imaging, structured light illumination (SLI) is widely spread. SLI employs a pair of digital projector and digital camera such that the correspondences can be found based upon the projecting and capturing of a group of designed light patterns. As an active sensing method, SLI is known for its robustness and high accuracy. In this dissertation, I study the phase shifting method (PSM), which is one of the most employed strategy in SLI. And, three novel approaches in PSM have been proposed in this dissertation. First, by regarding the design of patterns as placing points …


Efficient And Scalable Network Security Protocols Based On Lfsr Sequences, Saikat Chakrabarti Jan 2008

Efficient And Scalable Network Security Protocols Based On Lfsr Sequences, Saikat Chakrabarti

University of Kentucky Doctoral Dissertations

The gap between abstract, mathematics-oriented research in cryptography and the engineering approach of designing practical, network security protocols is widening. Network researchers experiment with well-known cryptographic protocols suitable for different network models. On the other hand, researchers inclined toward theory often design cryptographic schemes without considering the practical network constraints. The goal of this dissertation is to address problems in these two challenging areas: building bridges between practical network security protocols and theoretical cryptography. This dissertation presents techniques for building performance sensitive security protocols, using primitives from linear feedback register sequences (LFSR) sequences, for a variety of challenging networking applications. …


Matrix Decomposition For Data Disclosure Control And Data Mining Applications, Jie Wang Jan 2008

Matrix Decomposition For Data Disclosure Control And Data Mining Applications, Jie Wang

University of Kentucky Doctoral Dissertations

Access to huge amounts of various data with private information brings out a dual demand for preservation of data privacy and correctness of knowledge discovery, which are two apparently contradictory tasks. Low-rank approximations generated by matrix decompositions are a fundamental element in this dissertation for the privacy preserving data mining (PPDM) applications. Two categories of PPDM are studied: data value hiding (DVH) and data pattern hiding (DPH). A matrix-decomposition-based framework is designed to incorporate matrix decomposition techniques into data preprocessing to distort original data sets. With respect to the challenge in the DVH, how to protect sensitive/confidential attribute values without …