Local Lagrange Interpolation on Powell-Sabin Triangulations and Terrain Modelling

Author(s):  
Günther Nürnberger ◽  
Frank Zeilfelder
Crime Science ◽  
2021 ◽  
Vol 10 (1) ◽  
Author(s):  
James Hunter ◽  
Bethany Ward ◽  
Andromachi Tseloni ◽  
Ken Pease

AbstractExpected crime rates that enable police forces to contrast recorded and anticipated spatial patterns of crime victimisation offer a valuable tool in evaluating the under-reporting of crime and inform/guide crime reduction initiatives. Prior to this study, police forces had no access to expected burglary maps at the neighbourhood level covering all parts of England and Wales. Drawing on analysis of the Crime Survey for England and Wales and employing a population terrain modelling approach, this paper utilises household and area characteristics to predict the mean residential burglary incidences per 1000 population across all neighbourhoods in England and Wales. The analysis identifies distinct differences in recorded and expected neighbourhood burglary incidences at the Output Area level, providing a catalyst for stimulating further reflection by police officers and crime analysts.


Sensors ◽  
2016 ◽  
Vol 16 (11) ◽  
pp. 1952 ◽  
Author(s):  
Affan Shaukat ◽  
Peter Blacker ◽  
Conrad Spiteri ◽  
Yang Gao

2015 ◽  
Vol 133 (4) ◽  
pp. 685-705 ◽  
Author(s):  
Wolfgang Erb ◽  
Christian Kaethner ◽  
Mandy Ahlborg ◽  
Thorsten M. Buzug

2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.


2010 ◽  
Vol 162 (3) ◽  
pp. 494-511 ◽  
Author(s):  
Michael A. Matt ◽  
Günther Nürnberger

SIAM Review ◽  
2004 ◽  
Vol 46 (3) ◽  
pp. 501-517 ◽  
Author(s):  
Jean-Paul Berrut ◽  
Lloyd N. Trefethen

Sign in / Sign up

Export Citation Format

Share Document