scholarly journals NEW CUBIC TIMMER TRIANGULAR PATCHES WITH C¹ AND G¹ CONTINUITY

2019 ◽  
Vol 81 (6) ◽  
Author(s):  
Fatin Amani Mohd Ali ◽  
Samsul Ariffin Abdul Karim ◽  
Sarat Chandra Dass ◽  
Vaclav Skala ◽  
Azizan Saaban ◽  
...  

In this study, a new cubic Timmer triangular patch is constructed by extending the univariate cubic Timmer basis functions. The best scheme that lies towards the control polygon is cubic Timmer curve and surface compared to the other methods. From the best of our knowledge, nobody has extended the univariate cubic Timmer basis to the bivariate triangular patch. The construction of the proposed cubic Timmer triangular patch is based on the main idea of the cubic Ball and cubic Bezier triangular patches construction. Some properties of the new cubic Timmer triangular patch are investigated. Furthermore, the composite cubic Timmer triangular patches with parametric continuity (C1) and geometric continuity (G1) are discussed. Simple error analysis between the triangular patches and one test function is provided for each continuity type. Numerical and graphical results are presented by using Mathematica and MATLAB.

2020 ◽  
Vol 2020 ◽  
pp. 1-25 ◽  
Author(s):  
Sidra Maqsood ◽  
Muhammad Abbas ◽  
Gang Hu ◽  
Ahmad Lutfi Amri Ramli ◽  
Kenjiro T. Miura

Adopting a recurrence technique, generalized trigonometric basis (or GT-basis, for short) functions along with two shape parameters are formulated in this paper. These basis functions carry a lot of geometric features of classical Bernstein basis functions and maintain the shape of the curve and surface as well. The generalized trigonometric Bézier (or GT-Bézier, for short) curves and surfaces are defined on these basis functions and also analyze their geometric properties which are analogous to classical Bézier curves and surfaces. This analysis shows that the existence of shape parameters brings a convenience to adjust the shape of the curve and surface by simply modifying their values. These GT-Bézier curves meet the conditions required for parametric continuity (C0, C1, C2, and C3) as well as for geometric continuity (G0, G1, and G2). Furthermore, some curve and surface design applications have been discussed. The demonstrating examples clarify that the new curves and surfaces provide a flexible approach and mathematical sketch of Bézier curves and surfaces which make them a treasured way for the project of curve and surface modeling.


Author(s):  
Norhazlina Husin ◽  
Nuranisah Tan Abdullah ◽  
Aini Aziz

Abstract The teaching of Japanese language as third language to foreign students has its own issues and challenges. It does not merely involve only teaching the four language skills. Japanese language has its own unique values. These unique values also tend to differentiate the teaching of Japanese language as a third language from other third language acquisitions. The teaching of Japanese language as third language to foreign students also involves the teaching of its writing system. This makes the teaching of Japanese language rather complicated because Japanese language has three forms of writings, namely: Hiragana, Katakana and Kanji. Students are required to fully understand the Hiragana system of writing first before proceeding to learn the other two forms of writings. The main challenge in the teaching of Japanese writing systems is the time allocated that can be considered as very limited as other language aspects need to be taught too. This, which relates directly to students’ factor very much contribute to the challenges foreseen. Students are likely to face problems in understanding and using the writings as they simultaneously need to adhere to the findings teaching and learning schedules. This article discusses on the analysis conducted in terms of the learning of the Hiragana and Katagana systems of writing among foreign students. The discussion in this article is based on the teaching of Japanese language to students of Universiti Teknologi MARA(UiTM), Shah Alam. Keywords: Third language, Hiragana, Katakana, Kanji


Author(s):  
José Endoença Martins

This article compares two different Brazilian translated versions of Toni Morrison's novel Beloved: the first published in 1994, the other in 2007, both as Amada. The analysis concentrates on the speech delivered by Baby Suggs, in which she exhorts her listeners to care for their bodies. The main idea behind this article is that Beloved and the Amadas converse or talk, thus performing signifyin(g), a concept which, in Henry Louis Gates's words, explains how intertextual conversation happens through “repetition and revision, or repetition with a signal of difference” (xxiv). Its general theoretical foundations include interconnections involving several instantiations of signifyin(g): between Black nationalism and negritude, postcolonialism and African Americanism. In its specific concern with translation, the conversation that the source keeps with the target texts involves two translation theories: fluency and resistance; two kinds of translating interventions: omission and addition; and three types of strategies: syntactic, semantic, and pragmatic. These distinct categories help readers grasp translation as a continuum by means of which a specific source text encounters its target equivalents and, then, returns to its origin. The original article is in English.


2014 ◽  
Vol 2014 ◽  
pp. 1-8
Author(s):  
Feng-Gong Lang ◽  
Xiao-Ping Xu

We mainly present the error analysis for two new cubic spline based methods; one is a lacunary interpolation method and the other is a very simple quasi interpolation method. The new methods are able to reconstruct a function and its first two derivatives from noisy function data. The explicit error bounds for the methods are given and proved. Numerical tests and comparisons are performed. Numerical results verify the efficiency of our methods.


Author(s):  
И.В. Нечта

Предложен новый метод передачи скрытых сообщений в социальных сетях на примере сети “Вконтакте”, позволяющий через структуру графа друзей пользователя внедрять секретные сообщения. Получены количественные оценки объема внедряемого сообщения в графы различного размера. Показана необходимость добавления избыточности во внедряемое сообщение. Представленный метод позволяет использовать другие графоподобные структуры социальной сети для внедрения скрытых сообщений. Purpose. This article addresses the construction of a new method for transmission of hidden messages in social networks. Methodology. The research employs methods of information theory, probability theory and mathematical statistics The Shannon entropy is used as the statistics for the analysis of an embedded message. Findings. The author proposed using the graphical structures of social networks as a container for the secret message transmission for the first time. As an example, the popular Vkontakte network is considered. The main idea of the method involves using the structure of the user’s friends graph to embed a secret message. Based on the available vertices (friends’ accounts), a complete graph is constructed, and its edges are enumerated. Each edge of the graph corresponds to one bit of the message being embedded: the bit is “1”, if the edge is present in the graph (one account in friends of the other), the bit is “0” if the edge is missing. To transfer the graph from one person to another, a key vertex is used. The specified vertex is connected by an edge with each connected component of the graph, which allows the graph to be transmitted using a single node and take into account all the vertices (including isolated ones). When retrieving a message, the key vertex and the edges connected to it are not considered. Conclusions. During the experimental research, it was shown that messages extracted from an empty container differ from the encrypted message by the probability distribution of bits. The necessity of adding redundancy to transmitted secret messages is shown with the purpose of “leveling” the statistical properties of an empty and filled container. The results of the experiment have showed that this method of steganography allows embedding a large amount of information into various social network structures represented in the form of a graph. It was noted in the paper that potentially “narrow” place of the algorithm is registration of new accounts. The restrictions imposed by the administration of some social networks for security purposes do not always allow automatic registration of new accounts, which makes the process of message embedding more difficult.


Mathematics ◽  
2020 ◽  
Vol 8 (8) ◽  
pp. 1359 ◽  
Author(s):  
Gang Hu ◽  
Huinan Li ◽  
Muhammad Abbas ◽  
Kenjiro T. Miura ◽  
Guoling Wei

The S-λ model is one of the most useful tools for shape designs and geometric representations in computer-aided geometric design (CAGD), which is due to its good geometric properties such as symmetry, shape adjustable property. With the aim to solve the problem that complex S-λ curves and surfaces cannot be constructed by a single curve and surface, the explicit continuity conditions for G1 connection of S-λ curves and surfaces are investigated in this paper. On the basis of linear independence and terminal properties of S-λ basis functions, the conditions of G1 geometric continuity between two adjacent S-λ curves and surfaces are proposed, respectively. Modeling examples imply that the continuity conditions proposed in this paper are easy and effective, which indicate that the S-λ curves and surfaces can be used as a powerful supplement of complex curves and surfaces design in computer aided design/computer aided manufacturing (CAD/CAM) system.


Author(s):  
Yassine El Borji ◽  
Mohammed Khaldi

This chapter aims to strengthen the integration of serious games in the educational field by providing tools to monitor and assist the progress of learners/players. The main idea is to address the integration aspects and the deployment of serious games in adaptive e-learning systems based on the automatic package and the export of serious games as reusable learning objects (LO). This integration will allow SGs to benefit from the tracking and support features offered by the LMS. On the other hand, LMS can supplement their training offer and reach a certain maturity. The approach aims to meet the specific needs of SGs in terms of metadata so that they can be described, indexed, and capitalized. This is a new application profile of the IEEE LOM standard entitled “SGLOM” integrating fields to describe SGs not only in a technical sense but also by examining the pedagogical and playful criteria. The authors also focus on the integration and extraction aspects of SGs in an LMS using the ADL SCORM 2004 data model that defines how content can be packaged as a SCORM PIF (package interchange file).


2018 ◽  
Vol 21 (02) ◽  
pp. 1850012
Author(s):  
INE MARQUET ◽  
WIM SCHOUTENS

Constant proportion portfolio insurance (CPPI) is a structured product created on the basis of a trading strategy. The idea of the strategy is to have an exposure to the upside potential of a risky asset while providing a capital guarantee against downside risk with the additional feature that in case the product has since initiation performed well more risk is taken while if the product has suffered mark-to-market losses, the risk is reduced. In a standard CPPI contract, a fraction of the initial capital is guaranteed at maturity. This payment is assured by investing part of the fund in a riskless manner. The other part of the fund’s value is invested in a risky asset to offer the upside potential. We refer to the floor as the discounted guaranteed amount at maturity. The percentage allocated to the risky asset is typically defined as a constant multiplier of the fund value above the floor. The remaining part of the fund is invested in a riskless manner. In this paper, we combine conic trading in the above described CPPIs. Conic trading strategies explore particular sophisticated trading strategies founded by the conic finance theory i.e. they are valued using nonlinear conditional expectations with respect to nonadditive probabilities. The main idea of this paper is that the multiplier is taken now to be state dependent. In case the algorithm sees value in the underlying asset the multiplier is increased, whereas if the assets is situated in a state with low value or opportunities, the multiplier is reduced. In addition, the direction of the trade, i.e. going long or short the underlying asset, is also decided on the basis of the policy function derived by employing the conic finance algorithm. Since nonadditive probabilities attain conservatism by exaggerating upwards tail loss events and exaggerating downwards tail gain events, the new Conic CPPI strategies can be seen on the one hand to be more conservative and on the other hand better in exploiting trading opportunities.


2012 ◽  
Vol 49 (No. 8) ◽  
pp. 369-374 ◽  
Author(s):  
Ž. Hacherová ◽  
R. Hulík ◽  
I. Pribilovičová

The main idea of the paper is to evaluate the state and development of financial structure of selected agricultural co-operatives in accounting periods from 1994 till 2001. Assets financial stability constitutes an ability of an enterprise to create and balance an accurate relation between assets and their financial sources. The results of the research work document a positive tendency in financial structure in favour of equity capital (Table 1). On the other hand, there have been problems with borrowed capital mainly with the liabilities from business relation. An increasing level of earnings can be assessed positively as well as the participation of new loans in the financial basis of enterprises (Table 3).


Pythagoras ◽  
2014 ◽  
Vol 35 (2) ◽  
Author(s):  
Eunice K. Moru ◽  
Makomosela Qhobela ◽  
Poka Wetsi ◽  
John Nchejane

The study investigated teacher knowledge of error analysis in differential calculus. Two teachers were the sample of the study: one a subject specialist and the other a mathematics education specialist. Questionnaires and interviews were used for data collection. The findings of the study reflect that the teachers’ knowledge of error analysis was characterised by the following assertions, which are backed up with some evidence: (1) teachers identified the errors correctly, (2) the generalised error identification resulted in opaque analysis, (3) some of the identified errors were not interpreted from multiple perspectives, (4) teachers’ evaluation of errors was either local or global and (5) in remedying errors accuracy and efficiency were emphasised more than conceptual understanding. The implications of the findings of the study for teaching include engaging in error analysis continuously as this is one way of improving knowledge for teaching.


Sign in / Sign up

Export Citation Format

Share Document