• 제목/요약/키워드: Implicit methods

검색결과 287건 처리시간 0.032초

IMPLICITIZATION OF RATIONAL CURVES AND POLYNOMIAL SURFACES

  • Yu, Jian-Ping;Sun, Yong-Li
    • 대한수학회보
    • /
    • 제44권1호
    • /
    • pp.13-29
    • /
    • 2007
  • In this paper, we first present a method for finding the implicit equation of the curve given by rational parametric equations. The method is based on the computation of $Gr\"{o}bner$ bases. Then, another method for implicitization of curve and surface is given. In the case of rational curves, the method proceeds via giving the implicit polynomial f with indeterminate coefficients, substituting the rational expressions for the given curve and surface into the implicit polynomial to yield a rational expression $\frac{g}{h}$ in the parameters. Equating coefficients of g in terms of parameters to 0 to get a system of linear equations in the indeterminate coefficients of polynomial f, and finally solving the linear system, we get all the coefficients of f, and thus we obtain the corresponding implicit equation. In the case of polynomial surfaces, we can similarly as in the case of rational curves obtain its implicit equation. This method is based on characteristic set theory. Some examples will show that our methods are efficient.

부분 내재적 조화 균형법을 이용한 주기적인 2차원 비정상 유동 해석 (2-D Periodic Unsteady Flow Analysis Using a Partially Implicit Harmonic Balance Method)

  • 임동균;박수형;권장혁
    • 한국항공우주학회지
    • /
    • 제38권12호
    • /
    • pp.1153-1161
    • /
    • 2010
  • 본 연구에서는 주기적 비정상 유동 해석을 위해 푸리에 변환을 이용하는 조화 균형법의 효율적인 해법을 제안한다. 내재적으로 유속항을 처리하고 외재적으로 조화 원천항을 처리하였다. 외재적 조화 균형법 보다 더 빠르게 수렴 시킬 수 있으며 내재적 조화 균형법을 적용할 때 추가되는 자코비안 행렬을 처리할 필요가 없다. 또한 완전 내재적 기법에 상응하는 수준의 수렴안정성을 확인할 수 있었다. 2차원 비정상 유동 문제로 피칭하는 NACA0012 익형에 적용하였으며 이중 시간 적분법 및 외재적 Runge-Kutta기법의 해와 매우 일치하는 결과를 얻었다.

Stereo Calibration Using Support Vector Machine

  • Kim, Se-Hoon;Kim, Sung-Jin;Won, Sang-Chul
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.250-255
    • /
    • 2003
  • The position of a 3-dimensional(3D) point can be measured by using calibrated stereo camera. To obtain more accurate measurement ,more accurate camera calibration is required. There are many existing methods to calibrate camera. The simple linear methods are usually not accurate due to nonlinear lens distortion. The nonlinear methods are accurate more than linear method, but it increase computational cost and good initial guess is needed. The multi step methods need to know some camera parameters of used camera. Recent years, these explicit model based camera calibration work with the development of more precise camera models involving correction of lens distortion. But these explicit model based camera calibration have disadvantages. So implicit camera calibration methods have been derived. One of the popular implicit camera calibration method is to use neural network. In this paper, we propose implicit stereo camera calibration method for 3D reconstruction using support vector machine. SVM can learn the relationship between 3D coordinate and image coordinate, and it shows the robust property with the presence of noise and lens distortion, results of simulation are shown in section 4.

  • PDF

Preconditioned Jacobian-free Newton-Krylov fully implicit high order WENO schemes and flux limiter methods for two-phase flow models

  • Zhou, Xiafeng;Zhong, Changming;Li, Zhongchun;Li, Fu
    • Nuclear Engineering and Technology
    • /
    • 제54권1호
    • /
    • pp.49-60
    • /
    • 2022
  • Motivated by the high-resolution properties of high-order Weighted Essentially Non-Oscillatory (WENO) and flux limiter (FL) for steep-gradient problems and the robust convergence of Jacobian-free Newton-Krylov (JFNK) methods for nonlinear systems, the preconditioned JFNK fully implicit high-order WENO and FL schemes are proposed to solve the transient two-phase two-fluid models. Specially, the second-order fully-implicit BDF2 is used for the temporal operator and then the third-order WENO schemes and various flux limiters can be adopted to discrete the spatial operator. For the sake of the generalization of the finite-difference-based preconditioning acceleration methods and the excellent convergence to solve the complicated and various operational conditions, the random vector instead of the initial condition is skillfully chosen as the solving variables to obtain better sparsity pattern or more positions of non-zero elements in this paper. Finally, the WENO_JFNK and FL_JFNK codes are developed and then the two-phase steep-gradient problem, phase appearance/disappearance problem, U-tube problem and linear advection problem are tested to analyze the convergence, computational cost and efficiency in detailed. Numerical results show that WENO_JFNK and FL_JFNK can significantly reduce numerical diffusion and obtain better solutions than traditional methods. WENO_JFNK gives more stable and accurate solutions than FL_JFNK for the test problems and the proposed finite-difference-based preconditioning acceleration methods based on the random vector can significantly improve the convergence speed and efficiency.

Using Keystroke Dynamics for Implicit Authentication on Smartphone

  • Do, Son;Hoang, Thang;Luong, Chuyen;Choi, Seungchan;Lee, Dokyeong;Bang, Kihyun;Choi, Deokjai
    • 한국멀티미디어학회논문지
    • /
    • 제17권8호
    • /
    • pp.968-976
    • /
    • 2014
  • Authentication methods on smartphone are demanded to be implicit to users with minimum users' interaction. Existing authentication methods (e.g. PINs, passwords, visual patterns, etc.) are not effectively considering remembrance and privacy issues. Behavioral biometrics such as keystroke dynamics and gait biometrics can be acquired easily and implicitly by using integrated sensors on smartphone. We propose a biometric model involving keystroke dynamics for implicit authentication on smartphone. We first design a feature extraction method for keystroke dynamics. And then, we build a fusion model of keystroke dynamics and gait to improve the authentication performance of single behavioral biometric on smartphone. We operate the fusion at both feature extraction level and matching score level. Experiment using linear Support Vector Machines (SVM) classifier reveals that the best results are achieved with score fusion: a recognition rate approximately 97.86% under identification mode and an error rate approximately 1.11% under authentication mode.

ALTERNATING DIRECTION IMPLICIT METHOD FOR TWO-DIMENSIONAL FOKKER-PLANCK EQUATION OF DENSE SPHERICAL STELLAR SYSTEMS

  • Shin, Ji-Hye;Kim, Sung-Soo
    • 천문학회지
    • /
    • 제40권4호
    • /
    • pp.91-97
    • /
    • 2007
  • The Fokker-Planck (FP) model is one of the commonly used methods for studies of the dynamical evolution of dense spherical stellar systems such as globular clusters and galactic nuclei. The FP model is numerically stable in most cases, but we find that it encounters numerical difficulties rather often when the effects of tidal shocks are included in two-dimensional (energy and angular momentum space) version of the FP model or when the initial condition is extreme (e.g., a very large cluster mass and a small cluster radius). To avoid such a problem, we have developed a new integration scheme for a two-dimensional FP equation by adopting an Alternating Direction Implicit (ADI) method given in the Douglas-Rachford split form. We find that our ADI method reduces the computing time by a factor of ${\sim}2$ compared to the fully implicit method, and resolves problems of numerical instability.

Multiscale Implicit Functions for Unified Data Representation

  • Yun, Seong-Min;Park, Sang-Hun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권12호
    • /
    • pp.2374-2391
    • /
    • 2011
  • A variety of reconstruction methods has been developed to convert a set of scattered points generated from real models into explicit forms, such as polygonal meshes, parametric or implicit surfaces. In this paper, we present a method to construct multi-scale implicit surfaces from scattered points using multiscale kernels based on kernel and multi-resolution analysis theories. Our approach differs from other methods in that multi-scale reconstruction can be done without additional manipulation on input data, calculated functions support level of detail representation, and it can be naturally expanded for n-dimensional data. The method also works well with point-sets that are noisy or not uniformly distributed. We show features and performances of the proposed method via experimental results for various data sets.

On Calculating Eigenvalues In Large Power Systems Using Modified Arnoldi Method

  • 이병준
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1996년도 하계학술대회 논문집 B
    • /
    • pp.734-736
    • /
    • 1996
  • This paper presents a method of calculating a selective number of eigenvalues in power systems, which are rightmost, or are largest modulus. The modified Arnoldi method in conjunction with implicit shift OR-algorithm is used to calculate the rightmost eigenvalues. Algorithm requires neither a prior knowledge of the specified shifts nor the calculation of inverse matrix. The key advantage of the algorithm is its ability to converge to the wanted eigenvalues at once. The method is compared with the modified Arnoldi method combined with S-matrix transformation, where the eigenvalues having the largest modulus are to be determined. The two methods are applied to the reduced Kansai system. Convergence characteristics and performances are compared. Results show that both methods are robust and has good convergence properties. However, the implicit shift OR method is seen to be faster than the S-matrix method under the same condition.

  • PDF

무자각 지속인증 기술 동향 (Trends in Implicit Continuous Authentication Technology)

  • 김승현;김수형;진승헌
    • 전자통신동향분석
    • /
    • 제33권1호
    • /
    • pp.57-67
    • /
    • 2018
  • Modern users are intensifying their use of online services every day. In addition, hackers are attempting to execute advanced attacks to steal personal information protected using existing authentication technologies. However, existing authentication methods require an explicit authentication procedure for the user, and do not conduct identity verification in the middle of the authentication session. In this paper, we introduce an implicit continuous authentication technology to overcome the limitations of existing authentication technology. Implicit continuous authentication is a technique for continuously authenticating users without explicit intervention by utilizing their behavioral and environmental information. This can improve the level of security by verifying the user's identity during the authentication session without the burden of an explicit authentication procedure. In addition, we briefly introduce the definition, key features, applicable algorithms, and recent research trends for various authentication technologies that can be used as an implicit continuous authentication technology.