نتایج جستجو برای: signed distance method

تعداد نتایج: 1833325  

Journal: :J. Comput. Physics 2008
Li-Tien Cheng Yen-Hsi Richard Tsai

Construction of signed distance to a given interface is a topic of special interest to level set methods. There are currently, however, few algorithms that can efficiently produce highly accurate solutions. We introduce an algorithm for constructing an approximate signed distance function through manipulation of values calculated from flow of time dependent eikonal equations. We provide operati...

2003
Neil Molino Robert Bridson Ronald Fedkiw

Motivated by the simulation of deformable bodies, we propose a new tetrahedral mesh generation algorithm that produces both high quality elements and a mesh that is well conditioned for subsequent large deformations. We use a signed distance function defined on a grid in order to represent the object geometry. After tiling space with a uniform lattice based on crystallography, we identify a sub...

2012
Huey-Ming Lee Ching-Fen Fuh Jin-Shieh Su

In this paper, we examine the reliability of a parallel system. We use the level (λ, ρ) interval-valued fuzzy numbers to find the fuzzy reliability of parallel systems and obtain the estimated reliability of the systems in the fuzzy sense by employing the signed distance method.

2006
Yogesh Rathi Oleg Michailovich James Malcolm Allen Tannenbaum

An efficient method for separating an object from the background in an image is presented. The segmenting curve, corresponding to the object boundary, is represented as the zero level set of a signed distance function. Most existing region based methods in the geometric active contour framework perform segmentation by maximizing the separation of intensity moments inside and outside the evolvin...

2017
Laxminarayan Sahoo

The goal of this paper is to solve a matrix game with fuzzy payoffs. In this paper, a fuzzy matrix game has been considered and its solution methodology has been proposed. In this paper, fuzzy payoff values are assumed to be trapezoidal fuzzy numbers. Then the corresponding matrix game has been converted into crisp game using defuzzification of fuzzy number. Here, widely known signed distance m...

1999
Sergio Curilef

Molecular dynamic simulations for systems with D = 2, 3 Lennard-Jones-like interactions are studied. In the model, we assume that, at long distances, the two-body attractive potential decays as r−α. Thermodynamic extensivity (nonextensivity) is observed for α > D (0 ≤ α ≤ D). Particular attention is payed to the liquid-gas critical point located, in the temperature-pressure plane, at (Tc, Pc). ...

Journal: :CoRR 2017
Cheng-Shang Chang Duan-Shin Lee Li-Heng Liou Sheng-Min Lu

In this paper, we consider the community detection problem in signed networks, where there are two types of edges: positive edges (friends) and negative edges (enemies). One renowned theorem of signed networks, known as Harary’s theorem, states that structurally balanced signed networks are clusterable. By viewing each cycle in a signed network as a parity-check constraint, we show that the com...

2005
Pierre-Alain Fayolle Alexander Pasko Benjamin Schmitt Nikolay Mirenkov

We introduce a smooth approximation of the min / max operations, called SARDF (Signed Approximate Real Distance Function), for maintaining an approximate signed distance function in constructive shape modeling. We apply constructive distance-based shape modeling to design objects with heterogeneous material distribution in the constructive hypervolume model framework. The introduced distance ap...

Journal: :iranian journal of fuzzy systems 2013
saeid abbasbandy rahele nuraei mojtaba ghanbari

recently, abbasbandy and asady have been proposed a modificationof the distance based approach, namely ``sign distance method''.however, in this paper, it is shown that this method has some drawbacks, i.e.,the result is not consistent with human intuition for specialcases and this method cannot always logically infer rankingorder of the images of the fuzzy numbers. in this paper, wepresent a re...

2006
Emma Tonkin Julie Allinson

As metadata providers increase in number and diversity, and additional contexts for metadata use are identified, issues of trust, provenance and identity gain in relevance. Use of a public-key infrastructure (PKI) is discussed for digital signature of metadata records, providing evidence of the identity of the signer and the authenticity of the information within the record. Two methods are sug...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید