matching criterion
Recently Published Documents


TOTAL DOCUMENTS

77
(FIVE YEARS 2)

H-INDEX

10
(FIVE YEARS 0)

2021 ◽  
pp. 1-1
Author(s):  
Zuoyu Liao ◽  
Ziqi Guan ◽  
Xin Zhang ◽  
Jiuhong Jia ◽  
Xiancheng Zhang ◽  
...  

Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4141
Author(s):  
Ricardo Belda ◽  
Raquel Megías ◽  
Norberto Feito ◽  
Ana Vercher-Martínez ◽  
Eugenio Giner

(1) Background: Open-cell polyurethane foam mechanical behavior is highly influenced by microstructure. The determination of the failure mechanisms and the characterization of the deformation modes involved at the micro scale is relevant for accurate failure modeling. (2) Methods: We use digital image correlation (DIC) to investigate strain fields of open-cell polyurethane foams of three different densities submitted to compression testing. We analyze the effect of some DIC parameters on the failure pattern definition and the equivalent strain magnification at the apparent ultimate point. Moreover, we explore speckle versus non-speckle approaches and discuss the importance of determining the pattern quality to perform the displacement correlation. (3) Results: DIC accurately characterizes the failure patterns. A variation in the subset size has a relevant effect on the strain magnification values. Step size effect magnitude depends on the subset size. The pattern matching criterion presented little influence (3.5%) on the strain magnification. (4) Conclusion: The current work provides a comprehensive analysis of the influence of some DIC parameters on compression failure characterization of foamed structures. It highlights that changes of subset and step sizes have a significant effect on the failure pattern definition and the strain magnification values, while the pattern matching criterion and the use of speckle have a minor influence on the results. Moreover, this work stands out that the determination of the pattern quality has a major importance for texture analysis. The in-depth, detailed study carried out with samples of three different apparent densities is a useful guide for DIC users as regards texture correlation and foamed structures.


Doklady BGUIR ◽  
2019 ◽  
pp. 5-12
Author(s):  
O. A. Yurtsev ◽  
A. A. Popov

The aim of the work is to determine the properties of the ultra-wideband scanning antenna array of wire emitters. A single element of the grid is a three-dimensional antenna Vivaldi. Numerical simulation of antenna arrays and single Vivaldi emitters was carried out by the method of integral equations in the thin-wire approximation using the original program and the MMANA program. The dimensions of all elements of a single emitter are determined by the criterion of matching and the shape of the radiation pattern for operation in the frequency range 2–18 GHz. The described variant of the antenna according to the matching criterion (SWR < 2) has a frequency overlap coefficient of 12. The narrowing of the frequency band of a single emitter in the composition of non-scanning and scanning gratings within the angle of 30 degrees is determined. The article deals with the range properties of antenna arrays depending on the parameters of the emitters and the possibility of phase scanning. It is shown that the greatest frequency band in agreement has a lattice with a minimum step of placement of emitters. In a flat antenna array, when scanning in the H-plane, the frequency band according to the matching criterion decreases by 2–3 times. It is shown that the linear lattice without scanning has a frequency overlap coefficient equal to 6 according to the criterion of matching emitters. This ratio decreases as the phase scan sector increases. In a flat lattice, the frequency overlap coefficient and the phase scan sector are smaller than in a linear lattice and decrease with the number of rows. The reduced antenna array has a number of design advantages and can be used in systems with ultra-wideband signals.


2019 ◽  
Vol 2019 (3) ◽  
pp. 87-107 ◽  
Author(s):  
Adi Akavia ◽  
Craig Gentry ◽  
Shai Halevi ◽  
Max Leibovich

Abstract We present a novel secure search protocol on data and queries encrypted with Fully Homomorphic Encryption (FHE). Our protocol enables organizations (client) to (1) securely upload an unsorted data array x = (x[1], . . . , x[n]) to an untrusted honest-but-curious sever, where data may be uploaded over time and from multiple data-sources; and (2) securely issue repeated search queries q for retrieving the first element (i*, x[i*]) satisfying an agreed matching criterion i* = min { i ∈ [n] | IsMatch(x[i], q) = 1 }, as well as fetching the next matching elements with further interaction. For security, the client encrypts the data and queries with FHE prior to uploading, and the server processes the ciphertexts to produce the result ciphertext for the client to decrypt. Our secure search protocol improves over the prior state-of-the-art for secure search on FHE encrypted data (Akavia, Feldman, Shaul (AFS), CCS’2018) in achieving: – Post-processing free protocol where the server produces a ciphertext for the correct search outcome with overwhelming success probability. This is in contrast to returning a list of candidates for the client to postprocess, or suffering from a noticeable error probability, in AFS. Our post-processing freeness enables the server to use secure search as a sub-component in a larger computation without interaction with the client. – Faster protocol: (a) Client time and communication bandwidth are improved by a log2 n/ log log n factor. (b) Server evaluates a polynomial of degree linear in log n (compare to cubic in AFS), and overall number of multiplications improved by up to log n factor. (c) Employing only GF(2) computations (compare to GF(p) for p ≫ in AFS) to gain both further speedup and compatibility to all current FHE candidates. – Order of magnitude speedup exhibited by extensive benchmarks we executed on identical hardware for implementations of ours versus AFS’s protocols. Additionally, like other FHE based solutions, our solution is setup-free: to outsource elements from the client to the server, no additional actions are performed on x except for encrypting it element by element (each element bit by bit) and uploading the resulted ciphertexts to the server.


2019 ◽  
Vol 63 (5) ◽  
pp. 657-687
Author(s):  
Eleonora D’Andrea ◽  
Beatrice Lazzerini ◽  
Francesco Marcelloni

Abstract Traffic and air pollution caused by the increasing number of cars have become important issues in nowadays cities. A possible solution is to employ recommender systems for efficient ridesharing among users. These systems, however, typically do not allow specifying ordered stops, thus preventing a large amount of possible users from exploiting ridesharing, e.g. parents leaving kids at school while going to work. Indeed, if a parent desired to share a ride, he/she would need to indicate the following constraint in the path: the stop at school should precede the stop at work. In this paper, we propose a ridesharing recommender, which allows each user to specify an ordered list of stops and suggests efficient ride matches. The ride-matching criterion is based on a dissimilarity between the driver’s path and the shared path, computed as the shortest path on a directed acyclic graph with ordering constraints between the stops defined in the single paths. The dissimilarity value is the detour requested to the driver to visit also the stops of the paths involved in the ride-share, respecting the visiting order of the stops within each path. Results are presented on a case study involving the city of Pisa.


2019 ◽  
pp. 245-252
Author(s):  
Richard Evan Schwartz

This chapter completes the proof of the weak and strong case of the Copy Lemma. The two cases have just about the same proof. Section 25.2 proves the first two statements of the Copy Lemma. The rest of the chapter is devoted to proving the third statement. Section 25.3 proves an easy technical lemma. Section 25.4 repackages some of the results from Section 1.5. Two sequences are assigned to each rectangle in the plane: a mass sequence and a capacity sequence. It is established that these sequences determine the structure of the plaid model inside the rectangle. Section 25.5 proves a technical result about vertical light points. The final section verifies the conditions of the Matching Criterion.


Sign in / Sign up

Export Citation Format

Share Document