Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Curves and Surfaces for Computer Graphics

Buy

Images are all around us. We see them in color and in high resolution. In fact, the natural images we see with our eyes seem perfectly smooth, with no jagged edges and no graininess. Computer graphics, on the other hand, deals with images that consist of small dots, pixels. When we first hear of this feature of computer graphics, we tend to dismiss the entire field as trivial. It seems intuitively obvious that an image that consists of dots would always look artificial, rough, and inferior to what we see with our eyes. Yet state-of-the-art computer-generated images are often difficult or impossible to distinguish from their real counterparts, even though they are discrete, made of pixels, and not continuous.

Computer graphics is important in many areas including engineering design, architecture, education, and computer art and animation. This book examines a wide array of current methods used in creating real-looking objects in the computer, one of the main aims of computer graphics.

Key features:

* Good foundational mathematical introduction to curves and surfaces; no advanced math required

* Topics organized by different interpolation/approximation techniques, each technique providing useful information about curves and surfaces

* Exposition motivated by numerous examples and exercises sprinkled throughout, aiding the reader

* Includes a gallery of color images, Mathematica code listings, and sections on curves & surfaces by refinement and on sweep surfaces

* Web site maintained and updated by the author, providing readers with errata and auxiliary material

This engaging text is geared to a broad and general readership of computer science/architecture engineers using computer graphics to design objects, programmers for computer gamemakers, applied mathematicians, and students majoring in computer graphics and its applications. It may be used in a classroom setting or as a general reference.

(HTML tags aren't allowed.)

Developing More-Secure Microsoft  ASP.NET 2.0 Applications (Pro Developer)
Developing More-Secure Microsoft ASP.NET 2.0 Applications (Pro Developer)
Get hands-on, expert guidance for developing more secure Web applications with ASP.NET 2.0 with this in-depth reference. The nature of the Web and its underlying communication protocols make Web applications harder to secure and, therefore, primary targets for hacking attacks and other kinds of compromises. This book guides you through the possible...
Applied Natural Language Processing with Python: Implementing Machine Learning and Deep Learning Algorithms for Natural Language Processing
Applied Natural Language Processing with Python: Implementing Machine Learning and Deep Learning Algorithms for Natural Language Processing
Learn to harness the power of AI for natural language processing, performing tasks such as spell check, text summarization, document classification, and natural language generation. Along the way, you will learn the skills to implement these methods in larger infrastructures to replace existing code or create new...
Online Dating as A Strategic Game: Why and How Men in Hong Kong Use QQ to Chase Women in Mainland China
Online Dating as A Strategic Game: Why and How Men in Hong Kong Use QQ to Chase Women in Mainland China

Based on a study using online ethnography as the major research method, this book explains why and how men in Hong Kong use QQ—an online instant messenger—to “chase” women in mainland China, especially in the neighboring city of Shenzhen. Chasing women through QQ is a reciprocal exchange process during which the...


Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Like the animal it's named for, Mac OS X Panther is beautiful, sleek, superbly efficient, dangerously alluring, and all muscle under the surface. Beneath its appealing interface, it's a hard-working machine. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh they're used...
IEEE 802 Wireless Systems: Protocols, Multi-Hop Mesh/Relaying, Performance and Spectrum Coexistence
IEEE 802 Wireless Systems: Protocols, Multi-Hop Mesh/Relaying, Performance and Spectrum Coexistence
Throughout the next decade, 802 wireless systems will become an integral part of fourth generation (4G) cellular communication systems, where the convergence of wireless and cellular networks will materialize through support of interworking and seamless roaming across dissimilar wireless and cellular radio access technologies. IEEE 802 Wireless...
JUNOS Enterprise Routing: A Practical Guide to JUNOS Software and Enterprise Certification
JUNOS Enterprise Routing: A Practical Guide to JUNOS Software and Enterprise Certification
The world of enterprise routing with Juniper Networks devices is getting very exciting—new technologies, products, and network developments are making the enterprise network environment one of the most dynamic places to be. However, we, the authors, hope to focus that energy by providing you with a detailed and practical foundation that...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy