Browse Definitions :
Definition

3-D scanner

A 3-D scanner is an imaging device that collects distance point measurements from a real-world object and translates them into a virtual 3-D object.

3-D scanners are used for creating life-like images and animation in movies and video games. Other applications of 3-D scanning include reverse engineering, prototyping, architectural and industrial modeling, medical imaging and medical device modeling. 3-D printers can use data from 3-D scans to create physical objects.

Contact-based 3-D scanners work in a number of ways. One type has a carriage system and a control flat bed on which the object rests, while arms take measurements. Another type has articulated arms, and measurements are calculated from the joint angles of those arms.

Optical 3-D scanners use photographic, stereoscopic cameras, lasers or structured or modulated light. Optical scanning often requires many angles or sweeps.

Laser-based methods use a low-power, eye-safe pulsing laser working in conjunction with a camera. The laser illuminates a target, and associated software calculates the time it takes for the laser to reflect back from the target to yield a 3-D image of the scanned item.

Non-laser light-based scanners use either light that is structured into a pattern or a constantly modulated light and then record the formation the scanned object makes. Some medical tomographic scanners use X-rays to create a 3-D X-ray scan image.

Commercial desktop and hand held 3-D scanners vendors include Digitizer, NextEngine, Go!SCAN and Fuel3-D. Most products use a combination of the techniques to make a faster and more accurate device that can capture color as well as form.

See a 3-D scanner demonstration:

This was last updated in October 2013

Continue Reading About 3-D scanner

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • whaling attack (whaling phishing)

    A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets...

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close