Visibility in reflective environments.
dc.contributor.author | Wang, Chi-Kuo Gregory | |
dc.contributor.advisor | Woo, Anthony C. | |
dc.date.accessioned | 2016-08-30T18:05:53Z | |
dc.date.available | 2016-08-30T18:05:53Z | |
dc.date.issued | 2000 | |
dc.identifier.uri | http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:9963913 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/132491 | |
dc.description.abstract | The primary goal of this thesis is to establish fundamental algorithms for visibility in reflective environments and to propose a unified framework for locating remote objects without direct visibility. This research covers two major topics. First, we develop algorithms for visibility under reflections and propose its applications in both two and three dimensions. Visibility is considered as a piecewise-linear path that follows Snell's law of reflection, whereas traditional research concerns only the direct line-of-sight. Algorithms presented in this research are generalizations and extensions of M. E. Wang's research in two-dimensional reflective visibility[59]. Second, we introduce complex coefficients to quaternions and establish a unified formula to represent both reflections and rotation. We show that two complex quaternions (with 6 degrees of freedom and one extra bit) are sufficient to carry the information for any two-dimensional or threedimensional congruent transformations. These two topics have been rarely studied even though potential applications abound, such as ray-tracing, prediction of indoor radio propagation, computer animation, virtual reality, and locating remote objects. A data structure called <italic>Forward Bounce Tree</italic> (FBT) is employed to store visibility information in a reflective environment with respect to an omnidirectional source. <italic>O</italic>(<italic>b</italic><super> 2</super>) and <italic>O</italic>(<italic>b</italic><super>3</super>) space complexities, where <italic>b</italic> is the number of reflections, are established for special two-dimensional and three-dimensional honeycomb compatible environments, respectively. Sub-exponential growth rates are obtained empirically for three-dimensional polyhedral environments with regular faces. From the application point of view, while technologies such as the <italic> Global Positioning System</italic> are available, locating objects in a closed environment (such as libraries, factories, warehouses) without the benefit of direct lines-of-sight, remains rarely studied. A <italic> Beaconing Bar Code</italic> software system is implemented in two dimensions to locate remote objects without direct visibility. A hardware prototype of the Beaconing Bar Code system and receiver allocation issues are discussed. Heuristic algorithms are given for reducing the number of receivers yet maintaining locatability. Algorithms are extended to three-dimensional space for constructing FBTs, for testing reflective visibility, for finding the shortest path in reflective environments with obstacles, for locating remote objects, and for receiver arrangements. | |
dc.format.extent | 199 p. | |
dc.language | English | |
dc.language.iso | EN | |
dc.subject | Environments | |
dc.subject | Quaternions | |
dc.subject | Ray Tracing | |
dc.subject | Reflective | |
dc.subject | Visibility | |
dc.title | Visibility in reflective environments. | |
dc.type | Thesis | |
dc.description.thesisdegreename | PhD | en_US |
dc.description.thesisdegreediscipline | Applied Sciences | |
dc.description.thesisdegreediscipline | Computer science | |
dc.description.thesisdegreediscipline | Industrial engineering | |
dc.description.thesisdegreegrantor | University of Michigan, Horace H. Rackham School of Graduate Studies | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/132491/2/9963913.pdf | |
dc.owningcollname | Dissertations and Theses (Ph.D. and Master's) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.