16,377 research outputs found

    B\'ezier curves that are close to elastica

    Full text link
    We study the problem of identifying those cubic B\'ezier curves that are close in the L2 norm to planar elastic curves. The problem arises in design situations where the manufacturing process produces elastic curves; these are difficult to work with in a digital environment. We seek a sub-class of special B\'ezier curves as a proxy. We identify an easily computable quantity, which we call the lambda-residual, that accurately predicts a small L2 distance. We then identify geometric criteria on the control polygon that guarantee that a B\'ezier curve has lambda-residual below 0.4, which effectively implies that the curve is within 1 percent of its arc-length to an elastic curve in the L2 norm. Finally we give two projection algorithms that take an input B\'ezier curve and adjust its length and shape, whilst keeping the end-points and end-tangent angles fixed, until it is close to an elastic curve.Comment: 13 pages, 15 figure

    Visualizing the dynamics of London's bicycle hire scheme

    Get PDF
    Visualizing ïŹ‚ows between origins and destinations can be straightforward when dealing with small numbers of journeys or simple geographies. Representing ïŹ‚ows as lines embedded in geographic space has commonly been used to map transport ïŹ‚ows, especially when geographic patterns are important as they are when characterising cities or managing transportation. However, for larger numbers of ïŹ‚ows, this approach requires careful design to avoid problems of occlusion, salience bias and information overload. Driven by the requirements identiïŹed by users and managers of the London Bicycle Hire scheme we present three methods of representation of bicycle hire use and travel patterns. Flow maps with curved ïŹ‚ow symbols are used to show overviews in ïŹ‚ow structures. Gridded views of docking station location that preserve geographic relationships are used to explore docking station status over space and time in a graphically eïŹƒcient manner. Origin-Destination maps that visualise the OD matrix directly while maintaining geographic context are used to provide visual details on demand. We use these approaches to identify changes in travel behaviour over space and time, to aid station rebalancing and to provide a framework for incorporating travel modelling and simulation

    Employing Pythagorean Hodograph curves for artistic patterns

    Get PDF
    In this paper we present a novel design element creator tool for the digital artist. The purpose of our tool is to support the creation of vines, swirls, swooshes and floral components. To create visually pleasing and gentle curves we employ Pythagorean Hodograph quintic spiral curves to join a hierarchy of control circles defined by the user. The control circles are joined by spiral segments with at least G2 continuity, ensuring smooth and seamless transitions. The control circles give the user a fast and intuitive way to define the desired curve. The resulting curves can be exported as cubic Bezier curves for further use in vector graphics applications

    Still Wrong Use of Pairings in Cryptography

    Get PDF
    Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies. There have been however a wide range of incorrect use of these primitives. The paper of Galbraith, Paterson, and Smart (2006) pointed out most of the issues related to the incorrect use of pairing-based cryptography. However, we noticed that some recently proposed applications still do not use these primitives correctly. This leads to unrealizable, insecure or too inefficient designs of pairing-based protocols. We observed that one reason is not being aware of the recent advancements on solving the discrete logarithm problems in some groups. The main purpose of this article is to give an understandable, informative, and the most up-to-date criteria for the correct use of pairing-based cryptography. We thereby deliberately avoid most of the technical details and rather give special emphasis on the importance of the correct use of bilinear maps by realizing secure cryptographic protocols. We list a collection of some recent papers having wrong security assumptions or realizability/efficiency issues. Finally, we give a compact and an up-to-date recipe of the correct use of pairings.Comment: 25 page

    anamorphic projection analogical digital algorithms

    Get PDF
    The study presents the first results of a wider research project dealing with the theme of "anamorphosis", a specific technique of geometric projection of a shape on a surface. Here we investigate how new digital techniques make it possible to simplify the anamorphic applications even in cases of projections on complex surfaces. After a short excursus of the most famous historical and contemporary applications, we propose several possible approaches for managing the geometry of anamorphic curves both in the field of descriptive geometry (by using interactive tools such as Cabri and GeoGebra) and during the complex surfaces realization process, from concept design to manufacture, through CNC systems (by adopting generative procedural algorithms elaborated in Grasshopper)

    Integration between Creativity and Engineering in Industrial Design

    Get PDF
    The objective of the paper is to illustrate which are the key issues today in the industrial design workflow, paying particular attention to the most creative part of the workflow, highlighting those nodes which still make hard the styling activities and giving a brief survey of the researches aimed at smoothing the transfer of the design intent along the whole design cycle and at providing tools even more adhering at the mentality of creative people. Based on the experience gained working in two different European projects, through the collaboration with industrial designers in the automotive and the household supplies fields, a general industrial design workflow will be depicted, highlighting the main differences between the automotive and non-automotive sectors; the problems still present in the design activity will be also illustrated. The paper includes short surveys, in relation to the aesthetic design, in matter of research activities aimed at - identifying the links between shape characteristics of a product and the transmitted emotions - better supporting, in a digital way, the 2D sketching phase and the automatic interpretation and transfer of the 2D sketches into a 3D surface model - improving the 3D Modeling phase

    Security Measures in Mobile Commerce: Problems and Solutions

    Get PDF
    Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as well. Today, new technologies that allow mobile (cellular) phones and other handheld devices to access the Internet have made wireless business transactions possible. This phenomenon is known as mobile commerce or M-Commerce. It has been predicted that the number of mobile phones connected to the mobile Internet will exceed the number of Internet-connected PCs before 2007. The mobile phone will therefore become the most prevalent device for accessing the Internet. Several industry analysts predict that Mcommerce will constitute a multibillion dollar business by 2005. However, M-Commerce brings new challenges in providing information security as information travels through multiple networks often across wireless links. What must be done to secure financial transactions via mobile commerce? Generally speaking, M-Commerce creates more security concerns than traditional E-Commerce. In this paper, security measures in M-Commerce, wireless security, and the application of cryptography for key generation, authentication, digital signature and digital certificate are discussed
    • 

    corecore