Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Transformation Model With Constraints For High Accuracy Of 2d-3d Building Registration In Aerial Imagery, Guoqing Zhou, Qingli Luo, Wenhan Xie, Tao Yue, Jingjin Huang, Yuzhong Shen Jan 2016

Transformation Model With Constraints For High Accuracy Of 2d-3d Building Registration In Aerial Imagery, Guoqing Zhou, Qingli Luo, Wenhan Xie, Tao Yue, Jingjin Huang, Yuzhong Shen

Computational Modeling & Simulation Engineering Faculty Publications

This paper proposes a novel rigorous transformation model for 2D-3D registration to address the difficult problem of obtaining a sufficient number of well-distributed ground control points (GCPs) in urban areas with tall buildings. The proposed model applies two types of geometric constraints, co-planarity and perpendicularity, to the conventional photogrammetric collinearity model. Both types of geometric information are directly obtained from geometric building structures, with which the geometric constraints are automatically created and combined into the conventional transformation model. A test field located in downtown Denver, Colorado, is used to evaluate the accuracy and reliability of the proposed method. The comparison …


Stability And Sensitivity Measures For Solutions In Complex, Intelligent, Adaptive And Autonomous Systems, Andreas Tolk Jan 2016

Stability And Sensitivity Measures For Solutions In Complex, Intelligent, Adaptive And Autonomous Systems, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

Simulation has become a pivotal tool for the design, analysis, and control of complex, intelligent, adaptive and autonomous systems and its components. However, due to the nature of these systems, traditional evaluation practices are often not sufficient. As the components follow adaptive rules, the cumulative events often exploit bifurcation enabling events, leading to clusters of solutions that do not follow the usual rules for standard distributed events. When using simulation for design, analysis, and control of such systems, the evaluation needs to be richer, applying bifurcation and cluster analysis to understand the distribution, applying factor analysis to understand the important …