Can a Cubic Spline Curve Be G3

2021 ◽  
Vol 39 (2) ◽  
pp. 178-191
Author(s):  
Wujie Liu & Xin Li
Author(s):  
Takayuki OKABE ◽  
Takanori YAMAZAKI ◽  
Atsumasa OZAWA ◽  
Shinichi MORITA ◽  
Shigeo HORIUCHI ◽  
...  

2013 ◽  
Vol 27 (5) ◽  
pp. 683-692 ◽  
Author(s):  
Zi-fan Fang ◽  
Qing-song He ◽  
Bing-fei Xiang ◽  
Hua-pan Xiao ◽  
Kong-de He ◽  
...  

2016 ◽  
Vol 08 (02) ◽  
pp. 1650019 ◽  
Author(s):  
Chenbing Ni ◽  
Gaofeng Wei

In this paper, the three-dimensional (3D) four-step ([Formula: see text]) rectangular braided composites are analyzed, the internal yarn spatial topology and mechanical model are determined, a new geometric model, which uses a cubic spline curve to fit yarn trajectory, is presented. The new geometric model can be divided into three types of unit cell models which are the interior, surface and corner unit cell. Based on the new proposed geometric model and the stiffness averaging theory, the corresponding elastic constants are predicted. The predicted numerical results are calculated, and compared with the experimental results. Numerical examples indicate that the numerical calculations well agree with the experimental results. Error values between numerical calculations and experimental results are less than 7.5%. The numerical results verify the validity and accuracy of the new geometrical model.


2019 ◽  
Vol 30 (1) ◽  
pp. 99
Author(s):  
Hanaa Mohusan Ahmed ◽  
Ahmed Oday Alazzawi

With the tremendous development witnessed by the world in recent times, computer security significance expanded as insurance procedure of registering systems and authentication the user with scientific and technological developments are increasing every day. This assurance procedure is connected for touchy information such of electronic business, electronic learning, and electronic saving money exchange, online networking and more administrations over the web by utilizing login application to distinguish the character for doing this authentication. The problem by using some application login how to detected the user authentic and experimental data collection and separated the duplicated name that may be Confusion the system with speed detected and difficult attack. This paper solve this problem by used Cubic spline to easy represented name and easy detected by distance Euclidean equation, authentication techniques utilized as insurance process by securing name mix with Blum Blum Shub (BBS) algorithm that have randomly number. In this work, the application is founded on type name that the combine with (BBS) and represented by cubic spline, to detected user. The result of proposed work require randomly number to drawing the curve to detect and how much the different shape in cubic spline curve that can be detected. Assurance gives affirmation distinguished suitable security and all the more effortlessly least complex that developing popular in the online application that shows in result some portion of the paper


Sign in / Sign up

Export Citation Format

Share Document