Chapter 14: Simulation, Graphics, and Other Applications Chapter 14 Simulation, Graphics, and Other Applications Page 148 In order to gain insight into.

Slides:



Advertisements
Similar presentations
IS 376 NOVEMBER 5, DATA BREACH INVESTIGATIONS REPORT By The Verizon RISK Team Research Investigations Solutions Knowledge.
Advertisements

Ray tracing. New Concepts The recursive ray tracing algorithm Generating eye rays Non Real-time rendering.
Presented by: Melissa Dark CERIAS, Purdue University.
Computer graphics & visualization Global Illumination Effects.
Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
3D Graphics Rendering and Terrain Modeling
Lecturer: Fadwa Tlaelan
 Engineering Graphics & Introductory Design 3D Graphics and Rendering REU Modeling Course – June 13 th 2014.
COMPUTER GRAPHICS CS 482 – FALL 2014 OCTOBER 6, 2014 TEXTURE MAPPING TEXTURES BUMP MAPPING ENVIRONMENT MAPPING PROCEDURAL TEXTURING.
Unit 18 Data Security 1.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Rasterization and Ray Tracing in Real-Time Applications (Games) Andrew Graff.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
3D Graphics Processor Architecture Victor Moya. PhD Project Research on architecture improvements for future Graphic Processor Units (GPUs). Research.
Viruses, Malicious Code, & Other Nasty Stuff Presented by: Melissa Dark K-12 Outreach Coordinator CERIAS, Purdue University
Paper by Alexander Keller
SET09115 Intro Graphics Programming
Shadows Computer Graphics. Shadows Shadows Extended light sources produce penumbras In real-time, we only use point light sources –Extended light sources.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
1 Perception and VR MONT 104S, Spring 2008 Lecture 22 Other Graphics Considerations Review.
Jeopardy Computer Technology Vocabulary 2 Template By Carl Lyman © September 2001.
COMPUTER GRAPHICS CS 482 – FALL 2014 AUGUST 27, 2014 FIXED-FUNCTION 3D GRAPHICS MESH SPECIFICATION LIGHTING SPECIFICATION REFLECTION SHADING HIERARCHICAL.
Technology and Historical Overview. Introduction to 3d Computer Graphics  3D computer graphics is the science, study, and method of projecting a mathematical.
Computer Visualization BIM Curriculum 03. Topics  History  Computer Visualization Methods  Visualization Workflow  Technology Background.
Chapter 10: Computer Graphics
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 10: Computer Graphics Computer Science: An Overview Tenth Edition.
Today More raytracing stuff –Soft shadows and anti-aliasing More rendering methods –The text book is good on this –I’ll be using images from the CDROM.
Shading. What is Shading? Assigning of a color to a pixel in the final image. So, everything in shading is about how to select and combine colors to get.
Computer Graphics An Introduction. What’s this course all about? 06/10/2015 Lecture 1 2 We will cover… Graphics programming and algorithms Graphics data.
09/09/03CS679 - Fall Copyright Univ. of Wisconsin Last Time Event management Lag Group assignment has happened, like it or not.
CS 376 Introduction to Computer Graphics 04 / 16 / 2007 Instructor: Michael Eckmann.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
Week 10 - Wednesday.  What did we talk about last time?  Shadow volumes and shadow mapping  Ambient occlusion.
Chapter 14 Simulation and Other Applications. 2 What Is Simulation? Simulation A model of a complex system and the experimental manipulation of the model.
1 Perception and VR MONT 104S, Fall 2008 Lecture 21 More Graphics for VR.
Topic 5: Basic Security.
Image Synthesis Rabie A. Ramadan, PhD 4. 2 Review Questions Q1: What are the two principal tasks required to create an image of a three-dimensional scene?
Marwan Al-Namari 1 Digital Representations. Bits and Bytes Devices can only be in one of two states 0 or 1, yes or no, on or off, … Bit: a unit of data.
© GCSE Computing Computing Hardware Starter. Creating a spreadsheet to demonstrate the size of memory. 1 byte = 1 character or about 1 pixel of information.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
UV Mapping After a 3D object has been modeled it must be prepared for texturing. 3D surfaces can be “unwrapped” into a 2D representation with. This process.
COMP135/COMP535 Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 2 Lecture 2 – Digital Representations.
COMPUTER GRAPHICS CS 482 – FALL 2015 SEPTEMBER 29, 2015 RENDERING RASTERIZATION RAY CASTING PROGRAMMABLE SHADERS.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
RENDERING : Global Illumination
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
CS 376 Introduction to Computer Graphics 04 / 13 / 2007 Instructor: Michael Eckmann.
1© 2009 Autodesk Hardware Shade – Presenting Your Designs Hardware and Software Shading HW Shade Workflow Tessellation Quality Settings Lighting Settings.
CS Chapter 11.5 – Computer GraphicsPage 145 Computer Graphics Recent advances in processor power, display technology, memory capacity, and rendering.
CS Chapter 3 – Operating SystemsPage 49 Operating Systems An operating system is a set of programs through which a computer manages its resources.
The Graphics Rendering Pipeline
Chapter 10: Computer Graphics
Viruses, Malicious Code, & Other Nasty Stuff
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
(c) 2002 University of Wisconsin
Chapter I Introduction
Chap 10 Malicious Software.
Malicious Program and Protection
Presentation transcript:

Chapter 14: Simulation, Graphics, and Other Applications Chapter 14 Simulation, Graphics, and Other Applications Page 148 In order to gain insight into complex systems, scientists often build computer models to simulate their performance. Continuous Dynamic Simulation Elaborate equations representing the different aspects of the model are periodically solved to generate a sequence of snapshots of its performance (e.g., flight simulators). Discrete Event Simulation The system is represented as a chronological sequence of events, each of which subtly impacts the overall state of the system (e.g., network modeling).

Computer Graphics Chapter 14 Simulation, Graphics, and Other Applications Page 149 Recent advances in processor power, display technology, memory capacity, and rendering algorithms have made it possible to produce dazzling images using relatively inexpensive computers.

Drawing Lines and Circles Chapter 14 Simulation, Graphics, and Other Applications Page 150 Pixel-based display technologies cause inherent problems when displaying circles or non-vertical/non-horizontal lines.

Antialiasing Chapter 14 Simulation, Graphics, and Other Applications Page 151 Complex scenes lose their integrity when using single- colored pixels. Jagged Profiles Loss Of Detail Disintegrating Textures A common way to address this problem is with antialiasing algorithms, which combine the colors affecting a particular pixel into a “blended” color that will minimize these negative effects.

3D Shading Chapter 14 Simulation, Graphics, and Other Applications Page 152 The easiest way to store information about most 3D objects is as a set of polygons. Unfortunately, smooth objects aren’t necessarily polyhedral, so the resulting image looks bad. The common solution to this problem is to use a shading algorithm, which progressively blends the shading of adjacent polygons to smooth out the reflection of the virtual light across the surface.

Lighting Effects Chapter 14 Simulation, Graphics, and Other Applications Page 153 In order to accurately model lighting effects, the shading algorithm must take into account the position of the graphical scene’s virtual light source and the rendered objects’ locations with respect to it. More sophisticated lighting models take into account radiosity, the fact that light reflects off the surface of some objects and, in turn, illuminates other objects.

Ray Tracing Chapter 14 Simulation, Graphics, and Other Applications Page 154 Rays are cast from the viewer’s position through each pixel; the first object that’s hit is the one that’s rendered in that pixel. To calculate shadows, the ray is bounced from the hit object to the scene’s light source, if another object is hit on the way to the light, then the original object is in shadow. To calculate reflections, the ray is bounced from the hit object (if it’s shiny) at the opposite angle at which it hit the object; if another object is hit, then the second object will be reflected on the surface of the first object.

Texture Mapping Chapter 14 Simulation, Graphics, and Other Applications Page 155 To give a greater sense of realism to 3D graphical objects, texture mapping provides an inexpensive means of placing 2D “wallpaper” around the objects. Bump mapping can make the results even more visually striking, by adding a displacement factor across the surface of the objects, giving the illusion of 3D texture in the resulting lighting effects.

Character Animation Chapter 14 Simulation, Graphics, and Other Applications Page 156 By strategically manipulating specific vertices comprising an animated model, a graphics artist can make the model behave in a lifelike manner.

Embedded Systems Chapter 14 Simulation, Graphics, and Other Applications Page 157 Special-purpose computer systems are often designed to perform a specific list of dedicated tasks. Embedded systems: are often built into the devices they control, rather than being separate devices. are often built into the devices they control, rather than being separate devices. frequently have real-time performance constraints. frequently have real-time performance constraints. often have low performance requirements, allowing cheaper hardware to be used. often have low performance requirements, allowing cheaper hardware to be used. use software called firmware, usually stored in ROM or flash memory. use software called firmware, usually stored in ROM or flash memory.

Electronic Commerce Chapter 14 Simulation, Graphics, and Other Applications Page 158 As networking capabilities have become ubiquitous, the ability to conduct financial business electronically has soared.

Computer Security Chapter 14 Simulation, Graphics, and Other Applications Page 159 A computer virus piggybacks on another file to “infect” a system. When a user runs an infected program, the computer starts by copying the program from the disk, where it is stored and inactive, into RAM, where it can be executed. The viral code begins running first, while the infected program is still quiescent. The virus copies itself in a part of RAM separate from the program so that it can continue its work even after the user starts running other software. Its initial work done, the virus passes control back to the infected program. When the user runs a different program, the dormant virus begins running again. It inserts a copy of itself into the previously uninfected software so that the cycle of virulence can repeat.

Worms and Trojan Horses Chapter 14 Simulation, Graphics, and Other Applications Page 160 Worms are parasitic computer programs that replicate, but unlike viruses, do not infect other computer program files. Worms can create copies on the same computer, or can send the copies to other computers via a network. Worms often spread via e- mail or chat applications. A Trojan horse is a malicious program that pretends to be a benign application. A Trojan horse program purposefully does something the user does not expect. Trojan horses are not viruses since they do not replicate, but they can be just as destructive. One type of Trojan horse, known as a logic bomb, is set to execute whenever a specific event occurs (e.g., a change in a file, a particular series of keystrokes, a specific time or date).

Fighting Viruses Chapter 14 Simulation, Graphics, and Other Applications Page 161 Various techniques have been developed to combat computer viruses. Generic Antiviral Program Flags activities--such as the alteration of critical sites in RAM or particular files on disk--that are likely to arise from a virus in action. Preventing these illicit acts will not eliminate the virus but can stop it from infecting additional programs or interfering with the computer's normal operation. Signature Scanner Searches a user's disks looking for fragments of program code that appear in known viruses. Antiviral Snapshots Capture mathematical "fingerprints" of crucial programs and data. Subsequent changes strongly suggest viral infection. Advanced algorithms can use the original fingerprints to recover a pristine program from the virus-altered version.