From shape variation to topological changes in constrained minimization: a velocity method-based concept
نویسندگان
چکیده
منابع مشابه
From Shape Variation to Topology Changes in Constrained Minimization: a Velocity Method Based Concept
The ability of velocity methods to describe changes of topology by creating defects like holes is investigated. For the shape optimization energy-type objective functions are considered, which depend on the geometry by means of state variables. The state system is represented by abstract, quadratic, constrained minimization problems stated over domains with defects. The velocity method provides...
متن کاملISOGEOMETRIC TOPOLOGY OPTIMIZATION OF STRUCTURES USING LEVEL SET METHOD INCORPORATING SENSITIVITY ANALYSIS
This study focuses on the topology optimization of structures using a hybrid of level set method (LSM) incorporating sensitivity analysis and isogeometric analysis (IGA). First, the topology optimization problem is formulated using the LSM based on the shape gradient. The shape gradient easily handles boundary propagation with topological changes. In the LSM, the topological gradient method as ...
متن کاملچگونگی تاثیر ابعاد نمونه بر ویژگی های الاستیک دینامیک سنگ
Wave propagation is used as an advanced tool of determining elastic properties of rocks. In spite of being cheap and non destructive tests of rock mechanics, due to its modernity method is not yet replacing the traditional dear and destructive tests. In order to pave ways of replacing this test and making best use of it all effective factors of such method are to be assessed. One fundamental fa...
متن کاملDiscrete Geodesic Regression in Shape Space
A new approach for the effective computation of geodesic regression curves in shape spaces is presented. Here, one asks for a geodesic curve on the shape manifold that minimizes a sum of dissimilarity measures between given twoor three-dimensional input shapes and corresponding shapes along the regression curve. The proposed method is based on a variational time discretization of geodesics. Cur...
متن کاملA particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Optimization Methods and Software
دوره 26 شماره
صفحات -
تاریخ انتشار 2011