16,377 research outputs found
B\'ezier curves that are close to elastica
We study the problem of identifying those cubic B\'ezier curves that are
close in the L2 norm to planar elastic curves. The problem arises in design
situations where the manufacturing process produces elastic curves; these are
difficult to work with in a digital environment. We seek a sub-class of special
B\'ezier curves as a proxy. We identify an easily computable quantity, which we
call the lambda-residual, that accurately predicts a small L2 distance. We then
identify geometric criteria on the control polygon that guarantee that a
B\'ezier curve has lambda-residual below 0.4, which effectively implies that
the curve is within 1 percent of its arc-length to an elastic curve in the L2
norm. Finally we give two projection algorithms that take an input B\'ezier
curve and adjust its length and shape, whilst keeping the end-points and
end-tangent angles fixed, until it is close to an elastic curve.Comment: 13 pages, 15 figure
Visualizing the dynamics of London's bicycle hire scheme
Visualizing ïŹows between origins and destinations can be straightforward when dealing with small numbers of journeys or simple geographies. Representing ïŹows as lines embedded in geographic space has commonly been used to map transport ïŹows, especially when geographic patterns are important as they are when characterising cities or managing transportation. However, for larger numbers of ïŹows, this approach requires careful design to avoid problems of occlusion, salience bias and information overload. Driven by the requirements identiïŹed by users and managers of the London Bicycle Hire scheme we present three methods of representation of bicycle hire use and travel patterns. Flow maps with curved ïŹow symbols are used to show overviews in ïŹow structures. Gridded views of docking station location that preserve geographic relationships are used to explore docking station status over space and time in a graphically eïŹcient manner. Origin-Destination maps that visualise the OD matrix directly while maintaining geographic context are used to provide visual details on demand. We use these approaches to identify changes in travel behaviour over space and time, to aid station rebalancing and to provide a framework for incorporating travel modelling and simulation
Employing Pythagorean Hodograph curves for artistic patterns
In this paper we present a novel design element creator tool for the digital artist. The purpose of our tool is to support the creation of vines, swirls, swooshes and floral components. To create visually pleasing and gentle curves we employ Pythagorean Hodograph quintic spiral curves to join a hierarchy of control circles defined by the user. The control circles are joined by spiral segments with at least G2 continuity, ensuring smooth and seamless transitions. The control circles give the user a fast and intuitive way to define the desired curve. The resulting curves can be exported as cubic Bezier curves for further use in vector graphics applications
Still Wrong Use of Pairings in Cryptography
Several pairing-based cryptographic protocols are recently proposed with a
wide variety of new novel applications including the ones in emerging
technologies like cloud computing, internet of things (IoT), e-health systems
and wearable technologies. There have been however a wide range of incorrect
use of these primitives. The paper of Galbraith, Paterson, and Smart (2006)
pointed out most of the issues related to the incorrect use of pairing-based
cryptography. However, we noticed that some recently proposed applications
still do not use these primitives correctly. This leads to unrealizable,
insecure or too inefficient designs of pairing-based protocols. We observed
that one reason is not being aware of the recent advancements on solving the
discrete logarithm problems in some groups. The main purpose of this article is
to give an understandable, informative, and the most up-to-date criteria for
the correct use of pairing-based cryptography. We thereby deliberately avoid
most of the technical details and rather give special emphasis on the
importance of the correct use of bilinear maps by realizing secure
cryptographic protocols. We list a collection of some recent papers having
wrong security assumptions or realizability/efficiency issues. Finally, we give
a compact and an up-to-date recipe of the correct use of pairings.Comment: 25 page
anamorphic projection analogical digital algorithms
The study presents the first results of a wider research project dealing with the theme of "anamorphosis", a specific technique of geometric projection of a shape on a surface. Here we investigate how new digital techniques make it possible to simplify the anamorphic applications even in cases of projections on complex surfaces. After a short excursus of the most famous historical and contemporary applications, we propose several possible approaches for managing the geometry of anamorphic curves both in the field of descriptive geometry (by using interactive tools such as Cabri and GeoGebra) and during the complex surfaces realization process, from concept design to manufacture, through CNC systems (by adopting generative procedural algorithms elaborated in Grasshopper)
Recommended from our members
Survey of unified approaches to integrated-service networks
The increasing demand for communication services, coupled with recent technological advances in communication media and switching techniques, has resulted in a proliferation of new and expanded services. Currently, networks are needed which can transmit voice, data, and video services in an application-independent fashion. Unified approaches employ a single switching technique across the entire network bandwidth, thus, allowing services to be switched in an application-independent manner. This paper presents a taxonomy of integrated-service networks including a look at N-ISDN, while focusing on unified approaches to integrated-service networks.The two most promising unified approaches are burst and fast packet switching. Burst switching is a circuit switching-based approach which allocates channel bandwidth to a connection only during the transmission of "bursts" of information. Fast packet switching is a packet switching-based approach which can be characterized by very high transmission rates on network links and simple, hardwired protocols which match the rapid channel speed of the network. Both approaches are being proposed as possible implementations for integrated-service networks. We survey these two approaches, and also examine the key performance issues found in fast packet switching. We then present the results of a simulation study of a fast packet switching network
Integration between Creativity and Engineering in Industrial Design
The objective of the paper is to illustrate which are the key issues today in the industrial design workflow, paying particular attention to the most creative part of the workflow, highlighting those nodes which still make hard the styling activities and giving a brief survey of the researches aimed at smoothing the transfer of the design intent along the whole design cycle and at providing tools even more adhering at the mentality of creative people. Based on the experience gained working in two different European projects, through the collaboration with industrial designers in the automotive and the household supplies fields, a general industrial design workflow will be depicted, highlighting the main differences between the automotive and non-automotive sectors; the problems still present in the design activity will be also illustrated. The paper includes short surveys, in relation to the aesthetic design, in matter of research activities aimed at - identifying the links between shape characteristics of a product and the transmitted emotions - better supporting, in a digital way, the 2D sketching phase and the automatic interpretation and transfer of the 2D sketches into a 3D surface model - improving the 3D Modeling phase
Security Measures in Mobile Commerce: Problems and Solutions
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as well. Today, new technologies that allow mobile (cellular) phones and other handheld devices to access the Internet have made wireless business transactions possible. This phenomenon is known as mobile commerce or M-Commerce. It has been predicted that the number of mobile phones connected to the mobile Internet will exceed the number of Internet-connected PCs before 2007. The mobile phone will therefore become the most prevalent device for accessing the Internet. Several industry analysts predict that Mcommerce will constitute a multibillion dollar business by 2005. However, M-Commerce brings new challenges in providing information security as information travels through multiple networks often across wireless links. What must be done to secure financial transactions via mobile commerce? Generally speaking, M-Commerce creates more security concerns than traditional E-Commerce. In this paper, security measures in M-Commerce, wireless security, and the application of cryptography for key generation, authentication, digital signature and digital certificate are discussed
- âŠ