Adaptive surface mesh remeshing based on a sphere packing method and a node insertion/deletion method

Author(s):  
Yufei Guo ◽  
Yongqing Hai
2013 ◽  
Vol 724-725 ◽  
pp. 1723-1726
Author(s):  
Xue Jun Wang ◽  
Bin Hua ◽  
Bin Hu ◽  
Yi Lin Chi ◽  
Yan Fang Ding

Ballast degradation and unrecoverable deformation are emerged on the railway ballast track under the loads of high-speed and heavy loading locomotive. With the change of tamping frequency, a better understanding of the physics of compactness degree is important for long-time stability of ballast. This paper presented a numerical investigation of the bulk materials dynamics and the transient impaction of a system of irregular polyhedral particles confined with a rectangular box with a retaining wall subjected to cyclic tamping loading. Sphere packing method was being used in this study to simulate typical full-sized ballast particles. This paper aimed to establish firm-soft coupling particle-flow tamping operation simulation numerical model based on contact dynamics theory. This study checked the validity of the model while different tamping working conditions and out-loads was being implemented. The study shows that discrete element method (DEM) is an efficient method to reveal the rearrangement rule of railway ballast after the process of tamping operation.


2020 ◽  
Vol 37 (9) ◽  
pp. 3361-3385
Author(s):  
YuFei Guo ◽  
YongQing Hai ◽  
JianFei Liu

Purpose During the industrial design process, a product is usually modified and analyzed repeatedly until reaching the final design. Modifying the model and regenerating a mesh for every update during this process is very time consuming. To improve efficiency, it is necessary to circumvent the computer-aided design modeling stage when possible and directly modify the meshes to save valuable time. The purpose of this paper is to develop a method for mesh modifications. Design/methodology/approach In contrast to existing studies, which focus on one or a class of modifications, this paper comprehensively studies mesh union, mesh gluing, mesh cutting and mesh partitioning. To improve the efficiency of the method, the paper presents a fast and effective surface mesh remeshing algorithm based on a ball-packing method and controls the remeshing regions with a size field. Findings Examples and results show that the proposed mesh modification method is efficient and effective. The proposed method can be also applied to meshes with different material properties, which is very different with previous work that is only suitable for the meshes with same material property. Originality/value This paper proposes an efficient and comprehensive tetrahedral mesh modification method, through which engineers can directly modify meshes instead of models and save time.


2019 ◽  
Vol 1 (2) ◽  
Author(s):  
Xiqiang Zheng

We first introduce several sphere packing ways such as simple cubic packing (SC), face-centered cubic packing (FCC), body-centered cubic packing (BCC), and rectangular body-centered cuboid packing (recBCC), where the rectangular body-centered cuboid packing means the packing method based on a rectangular cuboid whose base is square and whose height is  times the length of one side of its square base such that the congruent spheres are centered at the 8 vertices and the centroid of the cuboid. The corresponding lattices are denoted as SCL, FCCL, BCCL, and recBCCL, respectively. Then we consider properties of those lattices, and show that FCCL and recBCCL are the same. Finally we point out some possible applications of the recBCC lattices.


Cryptography ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 2
Author(s):  
Tushar Kanti Saha ◽  
Takeshi Koshiba

Conjunctive queries play a key role in retrieving data from a database. In a database, a query containing many conditions in its predicate, connected by an “and/&/∧” operator, is called a conjunctive query. Retrieving the outcome of a conjunctive query from thousands of records is a heavy computational task. Private data access to an outsourced database is required to keep the database secure from adversaries; thus, private conjunctive queries (PCQs) are indispensable. Cheon, Kim, and Kim (CKK) proposed a PCQ protocol using search-and-compute circuits in which they used somewhat homomorphic encryption (SwHE) for their protocol security. As their protocol is far from being able to be used practically, we propose a practical batch private conjunctive query (BPCQ) protocol by applying a batch technique for processing conjunctive queries over an outsourced database, in which both database and queries are encoded in binary format. As a main technique in our protocol, we develop a new data-packing method to pack many data into a single polynomial with the batch technique. We further enhance the performances of the binary-encoded BPCQ protocol by replacing the binary encoding with N-ary encoding. Finally, we compare the performance to assess the results obtained by the binary-encoded BPCQ protocol and the N-ary-encoded BPCQ protocol.


2012 ◽  
Vol 35 (1) ◽  
pp. 30-37 ◽  
Author(s):  
Stefan M. Gold ◽  
Mary-Frances O'Connor ◽  
Raja Gill ◽  
Kyle C. Kern ◽  
Yonggang Shi ◽  
...  

2019 ◽  
Vol 12 (05) ◽  
pp. 1950069
Author(s):  
Mahdieh Hakimi Poroch

In this paper, we propose the Sphere-packing bound, Singleton bound and Gilbert–Varshamov bound on the subspace codes [Formula: see text] based on totally isotropic subspaces in symplectic space [Formula: see text] and on the subspace codes [Formula: see text] based on totally isotropic subspace in extended symplectic space [Formula: see text].


Sign in / Sign up

Export Citation Format

Share Document