Cyber Graphics. Abstract. 1. What is cyber graphics? 2. An incrementally modular abstraction hierarchy of shape invariants



Similar documents
Oracle8i Spatial: Experiences with Extensible Databases

A CONSTRUCTION OF THE UNIVERSAL COVER AS A FIBER BUNDLE

AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC

Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective

Sets of Fibre Homotopy Classes and Twisted Order Parameter Spaces

Removing Even Crossings

Project Knowledge Management Based on Social Networks

Extracting Business. Value From CAD. Model Data. Transformation. Sreeram Bhaskara The Boeing Company. Sridhar Natarajan Tata Consultancy Services Ltd.

Verifying Semantic of System Composition for an Aspect-Oriented Approach

Draft Martin Doerr ICS-FORTH, Heraklion, Crete Oct 4, 2001

Comments on Quotient Spaces and Quotient Maps

Mathematical Research Letters 1, (1994) MAPPING CLASS GROUPS ARE AUTOMATIC. Lee Mosher

Surface bundles over S 1, the Thurston norm, and the Whitehead link

Topological Data Analysis Applications to Computer Vision

A Contribution to Expert Decision-based Virtual Product Development

A STRATEGIC PLANNER FOR ROBOT EXCAVATION' by Humberto Romero-Lois, Research Assistant, Department of Civil Engineering

FIXED POINT SETS OF FIBER-PRESERVING MAPS

Binary Space Partitions

MA651 Topology. Lecture 6. Separation Axioms.

Big Ideas in Mathematics

3 Extending the Refinement Calculus

Visualization Techniques in Data Mining

How To Understand And Understand The Theory Of Computational Finance

Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 269 Class Project Report

Modeling the User Interface of Web Applications with UML

Enterprise Organization and Communication Network

Visual Analysis Tool for Bipartite Networks

A NOTE ON TRIVIAL FIBRATIONS

Shortcut sets for plane Euclidean networks (Extended abstract) 1

CODING THE NATURE OF THINKING DISPLAYED IN RESPONSES ON NETS OF SOLIDS

COSC 6344 Visualization

Mathematics Cognitive Domains Framework: TIMSS 2003 Developmental Project Fourth and Eighth Grades

COMPARING MATRIX-BASED AND GRAPH-BASED REPRESENTATIONS FOR PRODUCT DESIGN

THE ALGORITHMIC AUDITORIUM. A computational model for auditorium design. 1. Introduction

Unpacking Division to Build Teachers Mathematical Knowledge

Performance Assessment Task Which Shape? Grade 3. Common Core State Standards Math - Content Standards

Matthias F.M. Stallmann Department of Computer Science North Carolina State University Raleigh, NC

International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14

A Structured Methodology For Spreadsheet Modelling

What is Visualization? Information Visualization An Overview. Information Visualization. Definitions

Spatio-Temporal Mapping -A Technique for Overview Visualization of Time-Series Datasets-

Geometry: Unit 1 Vocabulary TERM DEFINITION GEOMETRIC FIGURE. Cannot be defined by using other figures.

How To Prove The Cellosauric Cardinal Compactness (For A Cardinal Cardinal Compact)

CROSS-EFFECTS OF HOMOTOPY FUNCTORS AND SPACES OF TREES. WARNING: This paper is a draft and has not been fully checked for errors.

Integrated Modeling for Data Integrity in Product Change Management

Automated Test Approach for Web Based Software

TOPOLOGY OF SINGULAR FIBERS OF GENERIC MAPS

Section 3-3 Approximating Real Zeros of Polynomials

o-minimality and Uniformity in n 1 Graphs

P. Lu, Sh. Huang and K. Jiang

A Social Network perspective of Conway s Law

APPLICATIONS AND RESEARCH ON GIS FOR THE REAL ESTATE

A Dynamic Programming Approach for Generating N-ary Reflected Gray Code List

Interactive Data Mining and Visualization

Computational Geometry. Lecture 1: Introduction and Convex Hulls

USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS

Information Visualization of Attributed Relational Data

VRSPATIAL: DESIGNING SPATIAL MECHANISMS USING VIRTUAL REALITY

Towards better understanding Cybersecurity: or are "Cyberspace" and "Cyber Space" the same?

VDI 2206 Prof. Dr. Magdy M. Abdelhameed

Barcode Based Automated Parking Management System

Glencoe. correlated to SOUTH CAROLINA MATH CURRICULUM STANDARDS GRADE 6 3-3, , , 4-9

ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search

Information and Media Literacy Accessing and managing information. Integrating and creating information. Evaluating and analyzing information.

Methodological Issues for Interdisciplinary Research

feature requirements engineering

Protracted Network: Quality of Service

Spring 2014: Graphic Design

Development of Specialized Modelling Tools for Crystal Growth Processes

VISUALIZATION APPROACH FOR SOFTWARE PROJECTS

Outline 2.1 Graph Isomorphism 2.2 Automorphisms and Symmetry 2.3 Subgraphs, part 1

MEng, BSc Applied Computer Science

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Frsq: A Binary Image Coding Method

Information and Communications Technology Courses at a Glance

WORKSHOP ON TOPOLOGY AND ABSTRACT ALGEBRA FOR BIOMEDICINE

Dedekind s forgotten axiom and why we should teach it (and why we shouldn t teach mathematical induction in our calculus classes)

ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION

1 Local Brouwer degree

Chap 1. Introduction to Software Architecture

Course Syllabus For Operations Management. Management Information Systems

BUILDING THREE-DIMENSIONAL (3D) STRUCTURES

An Object Oriented Role-based Access Control Model for Secure Domain Environments

Crimp Tooling Where Form Meets Function

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

Prentice Hall Algebra Correlated to: Colorado P-12 Academic Standards for High School Mathematics, Adopted 12/2009

Basic Understandings

COMBINING MODIFIED DIAMOND MODEL AND SYSTEM IMPLEMENTATION STAGE TO EXPLORE THE ERP AND MES SYSTEM INTEGRATION CRITICAL FACTORS

DATA QUALITY AND SCALE IN CONTEXT OF EUROPEAN SPATIAL DATA HARMONISATION

DELAWARE MATHEMATICS CONTENT STANDARDS GRADES PAGE(S) WHERE TAUGHT (If submission is not a book, cite appropriate location(s))

IMPROVING PRODUCTIVITY USING STANDARD MATHEMATICAL PROGRAMMING SOFTWARE

Transcription:

Preprint of the Keynote Paper: Tosiyasu L. Kunii, Cyber Graphics, Proceedings of the First International Symposium on Cyber Worlds (CW2002), November 6-8 2002 Tokyo, Japan, in press, IEEE Computer Society Press, Los Alamitos, California, November 2002. Cyber Graphics Tosiyasu L. Kunii Graduate School of Computer and Information Sciences, Hosei University 3-7-2 Kajino-cho, Koganei City, Tokyo 184-8584 Japan; IT Institute, Kanazawa Institute of Technology 1-15-13 Jingumae, Shibuya-ku, Tokyo 150-0001 Japan; Open Source Institute, Linux Café Inc. Linux Bldg. 3-12-2 Sotakanda, Chiyoda-ku, Tokyo 101-0021 Japan tosi@kunii.com; http://www.kunii.com/ Abstract Cyber graphics as an emerging technology has been playing key roles as human interfaces of cyber worlds. With the ever increasing roles of cyber worlds in the real world, as seen in e-financial trading that deals GDP-equivalent in a day, understanding of cyber graphics is becoming essential. To this end, scientific research 1. What is cyber graphics? Before going into the subject of cyber graphics, we need to clarify the meaning of cyber worlds. When we talk on cyber worlds, there are always discussed in connection with activities on the Web such as e-commerce, e-business, e-manufacturing and e-finance. Particularly, having e-financial trading reach to the amount GDP-equivalent, the roles of cyber worlds in the real world have been established. Thus, cyber worlds are quite different from virtual reality and also from augmented reality where virtuality is the emphasis. Cyber graphics stands for computer graphics in cyber worlds. Computer graphics displays objects on computer screens for human cognition. Thus, computer graphics serves as a type of human interfaces to identify cognitive objects in human cognitive spaces with cyber objects in computational spaces on the Web called cyber spaces. In both spaces, objects change through cognitive processes and through computational processes. The identification is established through invariants through such changes. "Seeing is believing". Human interfaces heavily rely on visualizing objects by cyber graphics as shapes for display on the screens. Then what are shape invariants and what is an abstraction hierarchy of shape invariants? This issue is the essence of science of cyber graphics and also of science of cyber worlds. Investigations on cognitive spaces and cognitive worlds are left as different researches. has been conducted to grasp the foundation as invariants. Cellular modeling has been found to be of key importance. The adjunction spaces and cell attaching functions of cyber graphics are investigated through varieties of examples to find out the invariants successfully. Keywords: adjunction spaces, cell attaching functions, a hierarchy of invariants, cellular spatial structures 2. An incrementally modular abstraction hierarchy of shape invariants In terms of the abstraction of invariants hierarchically organized from general to specific to realize incrementally modular shape design of objects, the following is a reasonable case of an incrementally modular abstraction hierarchy: 1 An Extension Level, a Homotopy Level as a special case; 2 A Set Level; 3 A Topology Level, a Graph Theoretical Level as a special case; 4. A Cellular Structured Space Level; 5 A Geometry Level; 6 A Visualization Level. For web graphics, "A Cellular Structured Space Level" based on cellular spatial structures [1, 2, 4] that include CW-complexes as a special case provides web graphics with a far more versatile theoretical foundation than that based on a graph theoretical level that is common in conceptual- and data- modeling [5,6], allowing cyber graphics to specify objects in cognitive- and computational- spaces as cells and their cellular attachment to form adjunction spaces (also called attaching spaces, glued spaces, and adjoining spaces). Cellular modeling also allows cellular composition and decomposition while maintaining cell dimensions and cell connectivity as invariants by preserving the homotopy. Object identification is carried out systematically through

an identification mapping (often called a quotient mapping) [3]. Here, cell dimensions mean the degrees of freedom, generally called inductive dimensions. For instance, on a point we have no degree of freedom to move and hence the dimension of a point is 0. On a line we can move on it from one point to another in any direction and hence the dimension of a line is 1. Likewise, the dimensions of a surface and a ball are 2 and 3. The cell connectivity is defined by a continuous mapping called a cell attaching map. 3. Adjunction spaces as shape invariants in geometrically changing situations and in geometrically indefinable situations Cyber graphics relates various situations with the reality in the real world. As a simple example, Figure 1 shows the situation of wearing a hat. Our question is how to represent the situation by cyber graphics? The shape of the hat deforms after wearing at least a little bit. Also how deep the hat is worn varies on the occasions. Such situations and occasions make geometry inapplicable to represent the situation of Figure 1 by cyber graphics. This means that in the incrementally modular abstraction hierarchy, this situation has to be represented at above the geometry level. Before wearing a hat. After the hat is worn. Figure 1. Wearing a hat. Since the hat needs to be on and off, it cannot be joined to the head at the set theoretical level and hence the hat and the head have to be disjoint. This statement may sounds trivial, but actually when I submit papers that include this statement, I always get the reviews back saying that both are set theoretically joined. Then, how the hat is related to the head after the hat is worn? Figure 2 illustrates the relation by an attaching map f, and the situation the cap is worn as an adjunction space of two disjoint topological spaces X (the head) and Y (the cap), obtained by starting from the head X and by attaching the cap Y to the head via a continuous function f by identifying each point y œ Y 0 Y 0 Œ Y with its image f(y) œ X. Here Y 0 is the inside of the hat that touches the head, and the part of the head touched by the hat is f(y 0 ) Œ X. After the hat is worn, thus, f(y 0 ) ~ Y 0 f(y 0 ) Œ X, Y 0 Œ Y. Theorem 3.1 Given topological spaces X and Y, and an adjunction space Y f = X f Y = X Y/~= X Y / (x ~ f (y) " y œ Y 0 ) obtained by attaching Y to X via a continuous function f by identifying each point y œ Y 0 Y 0 Œ Y with its image f(y) œ X, then f(y 0 ) ~ Y 0 f(y 0 ) Œ X, Y 0 Œ Y. Proof The proof is trivial. Y is assumed to be partitioned into a disjoint union of two equivalence classes such that Y= Y 0 (Y-Y 0 ). The attaching function f partitions X into a disjoint union of two equivalence classes such that X= f(y 0 ) (X-f(Y 0 )). Hence, the reflexivity holds. The symmetry and transitivity is obvious from the continuity of the attaching function f. QED After laying out the fundamental framework as explained above, we can see that the framework is quite general and applicable to versatile cases. To see this, let us look at another situation where geometrical representation cannot properly preserve invariants. It is a frill consisting of tucks [3, 7]. Usually a frill and tucks change shapes geometrically during the manufacturing processes and while being worn. Therefore, geometrical definition is not applicable. This means we have to find geometrical invariants to specify a frill and tucks. The geometrical invariants are being preserved and inherited while geometrical shape changes are taking place homotopically. What then are the geometrical invariants? This stands for a case of science of cyber graphics. The geometrical invariants are briefly sketched as follows and shown in Figure 3. A case of real tucked objects, coat sleeves, is shown in Figure 4. Each tuck consists of a particular type of fold, actually a pair of folds. The tuck is then attached to the other part through a cell attaching (also called adjoining or adjunction) operation. Before the cell attachment, the tuck is decomposed into three 1-cells and one 2-cell. The cell attachment here is a surjective and continuous function that maps a line on the collar to the three 1-cells of the tuck. The three 1-cells are topologically equivalent, and form an equivalence class.

Disjoint topological spaces X Y Y Y 0 An attaching map f f: Y 0 Y 0 An adjunction space Y f Y f = X f Y = X Y/~ = X Y / (x ~ f (y) " y œ Y 0 ) X f(y 0 ) An identification map f(y 0 ) g: X X 0 Figure 2. An adjunction space of two disjoint topological spaces X and Y, obtained by starting from X and by attaching Y to it via a continuous function f by identifying each point y œ Y 0 Y 0 Œ Y with its image f(y) œ X. B 2 collar : a frill attaching line Fig. 3 Frill composition = Collar attachment to tucks via the attaching map f: B 2 collar Ø + i (B 1 i + B 1 i + B 1 I) tuck edge i. Fig. 4 Coat sleeve tucks. A further example is attaching a button as in Figure 5. As in Figure 6, we define button attachment similarly by

two attaching functions and the result as two adjunction spaces. A button B 2 button as a 2-cell is attached to a garment B 2 garment, a 2- cell, by a thread B 1 thread, a 1-cell. First, an endpoint of the thread is attached to the button B 2 button via an attaching map: f : B 2 button Ø B 1 thread to get an adjunction space B 2 button + f B 1 thread /~. The other end of the thread is attached to a specified point of the garment via g: B 2 garment Ø B 1 thread to obtain an adjunction space B 2 garment + g B 1 thread /~. 4. Glossary of adjunction space photos For your interest, a collection of photos is shown here so that you enjoy formulating adjunctions spaces by finding attaching functions. Figure 5. A button attached to a garment. A button B 2 button A thread B 1 thread An adjunction space B 2 button + f B 1 thread /~ via an attaching map f f : B 2 button Ø B 1 A garment B 2 garment An adjunction space B 2 garment + g B 1 thread /~ via an attaching map g g: B 2 garment Ø B 1 Figure 6. Adjunction spaces of button attachment.

look at it from a scientific viewpoint. The meaning of science is its validity in modeling varieties of problems systematically. Therefore, we researched on invariants of cyber graphics here. In real world applications, the scientific findings recorded have big impacts. For example, industrial products such as copiers and fax machines process paper sheets that change geometry, making geometrical shape modeling invalid while cellular modeling is valid. In business graphics, we have to display business structures such as corporate M&A structures, business relationships, and electronic financial trading. They are time variants but still their cellular structures are invariants. Science of cyber graphics is here to be advanced in knowledge. References [1] J. H. C. Whitehead, Combinatorial Homotopy I, Bulletin of American Mathematical Society, vol. 55, pp. 213-245, 1949. [2] H. J. Baues, Homotopy Types and Homology, Oxford University Press, Oxford, 1996. [3] T. L. Kunii, Homotopy Modeling as World Modeling, Proceedings of Computer Graphics International '99 (CGI99), (June 7-11, 1999, Canmore, Alberta, Canada) pp. 130-141, IEEE Computer Society Press, Los Alamitos, California, U. S. A. [4] F. Fritsch and R. A. Piccinini, Cellular Structures in Topology, Cambridge University Press, Cambridge, 1990. [5] P. P. T. Chen, The Entity-Relationship Model - toward a unified view of data -, ACM Trans. Database Systems, Vol. 1, No. 1, pp. 223-234, 1976. [6] H. S. Kunii, Graph Data Model, Springer-Verlag, Tokyo, Berlin, New York, 1990. [7] Tosiyasu L. Kunii, Discovering Cyberworlds, IEEE Computer Graphics and Applications, Vol. 20, No. 1, pp. 64-65, (January/February 2000, IEEE Computer Society Press, Los Alamitos, California, U. S. A.). 5. Consequences of science of cyber graphics Cyber graphics is an emerging key area as critical human interfaces in the Web era where cyber worlds are playing major roles in the real world as seen in e-financial trading that trades a GDP-equivalent amount a day. Still it is in its infancy as an academic discipline. Here we