SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Interpolation and It’s application
What is interpolation ?
Interpolation is the process of using points with known values or sample points to estimate
values at other unknown points. It can be used to predict unknown values for any geographic
point data, such as elevation, rainfall, chemical concentrations, noise levels, and so on.
Example:-Find value of x for y(x)=0.390 , from the following table
Application of interpolation in Computer Science
Iterative reconstruction in digital imaging
Approximation Using CAD Facilities
Interpolation in Grapics
Application of interpolation in Computer Science
1 • Approximation Using CAD Facilities
Application of interpolation in Computer Science
 Let us consider a problem where the formulation of the problem depends on some parameters and an iterative solution
is possible. It is well known that the final solution depends on the initial approximation in terms of accuracy and of
computer runtime.
If some solutions can be found using an initial solution which is not accurate, the next initial solutions can be evaluated by
the use of an interpolation method. In this way the computer time decreases and the accuracy is increased
Approximation of the Initial Solution for Iterative Methods
Application of interpolation in Computer Science
Moving Average in Experimental Data Processing
Important sources of the points considered in interpolation problems are the experiments. For instance, a thorough experimental and
numerical study was carried out regarding
The experimental data were used to calibrate the numerical FEM model, so the experimental data was checked, double checked and over
checked in order to offer a high degree of confidence. Several states of the running conditions were studied and several millions of
experimental values were acquired. In this way there was verified the repeatability of the experimental data for all the measurement points.
Figure 4 - Repeatability of the experimental values for the same measurement point
Application of interpolation in Computer Science
 The experimental data were used to calibrate the numerical FEM model, so the experimental data was checked, double
checked and over checked in order to offer a high degree of confidence. Several states of the running conditions were studied
and several millions of experimental values were acquired. In this way there was verified the repeatability of the experimental
data for all the measurement points.
Figure 5 : The “trend line” facility offered in Excel, in order to smooth the curves
Application of interpolation in Computer Science
The most facile method to smooth the curves was to use Excel in order to add a trend line which
might present the relevant variation of the phenomenon. Excel also offers a whole set of
facilities, such as:
 import of the data from several formats: text, Visual FoxPro tables, comma separated values,
etc;
graphics of the data presented in the sheet;
 record, store and run a macro (a set of consecutive commands),
in this way being possible to draw a graph by using a single click
Application of interpolation in Computer Science
Secure Multiparty Computation and Secret Sharing
schemes
“Secret sharing” or secret splitting describes the methodology of distributing secret information among a group of
participants in a way that a subset of this group is needed to reconstruct the secret. Whereby a single piece of
information cannot be used to reconstruct the secret.
Secret sharing has a wide operation range. It can be used in high security areas for validation reasons e.g. in the
military or in the banking area where it might be necessary to have a 4, 6 or 8 eye validation principle. It also can
be used to ensure the secure transport of information e.g. transport of a cryptographic key over several channels.
Last but not least it can be used in secure access regulation where only a combination of trustworthy people
might get access to a secure area
Application of interpolation in Computer Science
1) k is the least quantity of participants you would like
to be able to reconstruct the secret
2) Choose a polynomial of grade k-1
3) Define k random indices (a0…ak-1)
4) Define k points which can be calculated by the
polynomial
5) Distribute k points to the participants.
6) To calculate the secret out of the keys use e.g.
Lagrange interpolation [5] with x=0 .
Secret Sharing schemes step by step:
Application of interpolation in Computer Science
Secret sharing graphical explanation:
 Let’s start with a simple polynomial y = a 0+ a1x1.
 a0 is our secret and since the grade of the polynomial is 1 we need at least two points to
determine it (see figure 1).
figure 1: graph of a first grade polinomial. a0 is the secret e.g.
password. The points are the given keys
• If you have only one point given an infinite account of possible solutions can
be calculated (see figure 2).
figure 2: graph of a first grade polinomial. a0 is the secret e.g. password. Since
there is only one fix point the secret is not reconstructible, because an infinite
amount of lines are crossing the point
Application of interpolation in Computer Science
 If K is supposed to be bigger than 2 just take a polynomial with a higher grade e.g. y = a0-
a2x2+a0x4 in this case K is equal 5 (see figure 3).
figure 3: graph of a fourth grade polynomial. a0 is the
secret e.g. password. The points are the given keys.
 Now if you would like to add more participants to have a key you could just create a
new key by taking another point of the polynomial (see figure 4).
figure 4: graph of a fourth grade polynomial. a0 is the secret e.g.
password. The points are the given keys. The x are additional keys
that could be created without interfering with already existing keys.
Application of interpolation in Computer Science
Nonlinear programming
The Lagrange multiplier method has several generalizations. In nonlinear programming there are
several multiplier rules, e.g., the Caratheodory-John Multiplier Rule and the Convex Multiplier Rule,
for inequality constraints
ADVANTAGES AND DISADVANTAGES of LAGRANGE’S
INTERPOLATION
• ADVANTAGES
• The formula is simple and easy to remember.
• There is no need to construct the divided difference table.
• The application of the formula is not speedy.
• DISADVANTAGE
• There is always a chance to committing some error.
• The calculation provide no check whether the functional values
used the taken correctly or not.

Weitere ähnliche Inhalte

Was ist angesagt?

Simplex method concept,
Simplex method concept,Simplex method concept,
Simplex method concept,
Dronak Sahu
 
Approximation and error
Approximation and errorApproximation and error
Approximation and error
rubenarismendi
 
Classical relations and fuzzy relations
Classical relations and fuzzy relationsClassical relations and fuzzy relations
Classical relations and fuzzy relations
Baran Kaynak
 

Was ist angesagt? (20)

Applications of numerical methods
Applications of numerical methodsApplications of numerical methods
Applications of numerical methods
 
Error analysis
Error analysisError analysis
Error analysis
 
Numerical method for solving non linear equations
Numerical method for solving non linear equationsNumerical method for solving non linear equations
Numerical method for solving non linear equations
 
Interpolation In Numerical Methods.
 Interpolation In Numerical Methods. Interpolation In Numerical Methods.
Interpolation In Numerical Methods.
 
Romberg’s method
Romberg’s methodRomberg’s method
Romberg’s method
 
Polynomials and Curve Fitting in MATLAB
Polynomials and Curve Fitting in MATLABPolynomials and Curve Fitting in MATLAB
Polynomials and Curve Fitting in MATLAB
 
Canonical form and Standard form of LPP
Canonical form and Standard form of LPPCanonical form and Standard form of LPP
Canonical form and Standard form of LPP
 
GRAPH COLORING AND ITS APPLICATIONS
GRAPH COLORING AND ITS APPLICATIONSGRAPH COLORING AND ITS APPLICATIONS
GRAPH COLORING AND ITS APPLICATIONS
 
Problem reduction AND OR GRAPH & AO* algorithm.ppt
Problem reduction AND OR GRAPH & AO* algorithm.pptProblem reduction AND OR GRAPH & AO* algorithm.ppt
Problem reduction AND OR GRAPH & AO* algorithm.ppt
 
Application of numerical method
Application of numerical methodApplication of numerical method
Application of numerical method
 
real life application in numerical method
real life application in numerical methodreal life application in numerical method
real life application in numerical method
 
Numerical Methods - Power Method for Eigen values
Numerical Methods - Power Method for Eigen valuesNumerical Methods - Power Method for Eigen values
Numerical Methods - Power Method for Eigen values
 
Numerical method
Numerical methodNumerical method
Numerical method
 
NUMERICAL METHODS
NUMERICAL   METHODSNUMERICAL   METHODS
NUMERICAL METHODS
 
Numerical analysis ppt
Numerical analysis pptNumerical analysis ppt
Numerical analysis ppt
 
Simplex method concept,
Simplex method concept,Simplex method concept,
Simplex method concept,
 
Approximation and error
Approximation and errorApproximation and error
Approximation and error
 
Application of Numerical method in Real Life
Application of Numerical method in Real LifeApplication of Numerical method in Real Life
Application of Numerical method in Real Life
 
Classical relations and fuzzy relations
Classical relations and fuzzy relationsClassical relations and fuzzy relations
Classical relations and fuzzy relations
 
Golden Section method
Golden Section methodGolden Section method
Golden Section method
 

Ähnlich wie Interpolation and-its-application

Rapport_Cemracs2012
Rapport_Cemracs2012Rapport_Cemracs2012
Rapport_Cemracs2012
Jussara F.M.
 
Ai_Project_report
Ai_Project_reportAi_Project_report
Ai_Project_report
Ravi Gupta
 

Ähnlich wie Interpolation and-its-application (20)

VCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxVCE Unit 01 (2).pptx
VCE Unit 01 (2).pptx
 
Application's of Numerical Math in CSE
Application's of Numerical Math in CSEApplication's of Numerical Math in CSE
Application's of Numerical Math in CSE
 
Scientific calculator project in c language
Scientific calculator project in c languageScientific calculator project in c language
Scientific calculator project in c language
 
Ijetr042170
Ijetr042170Ijetr042170
Ijetr042170
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
G1802053147
G1802053147G1802053147
G1802053147
 
House price prediction
House price predictionHouse price prediction
House price prediction
 
Engineering Numerical Analysis-Introduction.pdf
Engineering Numerical Analysis-Introduction.pdfEngineering Numerical Analysis-Introduction.pdf
Engineering Numerical Analysis-Introduction.pdf
 
THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...
THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...
THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...
 
THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...
THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...
THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...
 
K044065257
K044065257K044065257
K044065257
 
Rapport_Cemracs2012
Rapport_Cemracs2012Rapport_Cemracs2012
Rapport_Cemracs2012
 
Neural networks
Neural networksNeural networks
Neural networks
 
DATA STRUCTURE.pdf
DATA STRUCTURE.pdfDATA STRUCTURE.pdf
DATA STRUCTURE.pdf
 
DATA STRUCTURE
DATA STRUCTUREDATA STRUCTURE
DATA STRUCTURE
 
Ai_Project_report
Ai_Project_reportAi_Project_report
Ai_Project_report
 
Lagrange Interpolation
Lagrange InterpolationLagrange Interpolation
Lagrange Interpolation
 
Verifiable secure computation of linear fractional programming using certific...
Verifiable secure computation of linear fractional programming using certific...Verifiable secure computation of linear fractional programming using certific...
Verifiable secure computation of linear fractional programming using certific...
 
Data clustering using map reduce
Data clustering using map reduceData clustering using map reduce
Data clustering using map reduce
 
Transfer Learning for Improving Model Predictions in Highly Configurable Soft...
Transfer Learning for Improving Model Predictions in Highly Configurable Soft...Transfer Learning for Improving Model Predictions in Highly Configurable Soft...
Transfer Learning for Improving Model Predictions in Highly Configurable Soft...
 

Mehr von Apurbo Datta

How to improve Bangladeshi movie industry
How to improve Bangladeshi movie industryHow to improve Bangladeshi movie industry
How to improve Bangladeshi movie industry
Apurbo Datta
 

Mehr von Apurbo Datta (12)

Bioinformatrics and it's application
Bioinformatrics and it's applicationBioinformatrics and it's application
Bioinformatrics and it's application
 
Data communication and communications technology
Data communication and communications technologyData communication and communications technology
Data communication and communications technology
 
Genetic Disorder
Genetic DisorderGenetic Disorder
Genetic Disorder
 
Internet of Things(Bangladesh)
Internet of Things(Bangladesh)Internet of Things(Bangladesh)
Internet of Things(Bangladesh)
 
Algorithms In our Daily life
Algorithms In our Daily lifeAlgorithms In our Daily life
Algorithms In our Daily life
 
How to improve Bangladeshi movie industry
How to improve Bangladeshi movie industryHow to improve Bangladeshi movie industry
How to improve Bangladeshi movie industry
 
Java swing
Java swingJava swing
Java swing
 
Digital Electronic and it application
Digital Electronic and it applicationDigital Electronic and it application
Digital Electronic and it application
 
High study in abroad(indian subcontinent countries)
High  study in abroad(indian subcontinent countries)High  study in abroad(indian subcontinent countries)
High study in abroad(indian subcontinent countries)
 
Stack and Queue
Stack and Queue Stack and Queue
Stack and Queue
 
ROBOTICS Apurbo datta
ROBOTICS Apurbo dattaROBOTICS Apurbo datta
ROBOTICS Apurbo datta
 
C programming-apurbo datta
C programming-apurbo dattaC programming-apurbo datta
C programming-apurbo datta
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 

Interpolation and-its-application

  • 2. What is interpolation ? Interpolation is the process of using points with known values or sample points to estimate values at other unknown points. It can be used to predict unknown values for any geographic point data, such as elevation, rainfall, chemical concentrations, noise levels, and so on. Example:-Find value of x for y(x)=0.390 , from the following table
  • 3. Application of interpolation in Computer Science Iterative reconstruction in digital imaging Approximation Using CAD Facilities Interpolation in Grapics
  • 4. Application of interpolation in Computer Science 1 • Approximation Using CAD Facilities
  • 5. Application of interpolation in Computer Science  Let us consider a problem where the formulation of the problem depends on some parameters and an iterative solution is possible. It is well known that the final solution depends on the initial approximation in terms of accuracy and of computer runtime. If some solutions can be found using an initial solution which is not accurate, the next initial solutions can be evaluated by the use of an interpolation method. In this way the computer time decreases and the accuracy is increased Approximation of the Initial Solution for Iterative Methods
  • 6. Application of interpolation in Computer Science Moving Average in Experimental Data Processing Important sources of the points considered in interpolation problems are the experiments. For instance, a thorough experimental and numerical study was carried out regarding The experimental data were used to calibrate the numerical FEM model, so the experimental data was checked, double checked and over checked in order to offer a high degree of confidence. Several states of the running conditions were studied and several millions of experimental values were acquired. In this way there was verified the repeatability of the experimental data for all the measurement points. Figure 4 - Repeatability of the experimental values for the same measurement point
  • 7. Application of interpolation in Computer Science  The experimental data were used to calibrate the numerical FEM model, so the experimental data was checked, double checked and over checked in order to offer a high degree of confidence. Several states of the running conditions were studied and several millions of experimental values were acquired. In this way there was verified the repeatability of the experimental data for all the measurement points. Figure 5 : The “trend line” facility offered in Excel, in order to smooth the curves
  • 8. Application of interpolation in Computer Science The most facile method to smooth the curves was to use Excel in order to add a trend line which might present the relevant variation of the phenomenon. Excel also offers a whole set of facilities, such as:  import of the data from several formats: text, Visual FoxPro tables, comma separated values, etc; graphics of the data presented in the sheet;  record, store and run a macro (a set of consecutive commands), in this way being possible to draw a graph by using a single click
  • 9. Application of interpolation in Computer Science Secure Multiparty Computation and Secret Sharing schemes “Secret sharing” or secret splitting describes the methodology of distributing secret information among a group of participants in a way that a subset of this group is needed to reconstruct the secret. Whereby a single piece of information cannot be used to reconstruct the secret. Secret sharing has a wide operation range. It can be used in high security areas for validation reasons e.g. in the military or in the banking area where it might be necessary to have a 4, 6 or 8 eye validation principle. It also can be used to ensure the secure transport of information e.g. transport of a cryptographic key over several channels. Last but not least it can be used in secure access regulation where only a combination of trustworthy people might get access to a secure area
  • 10. Application of interpolation in Computer Science 1) k is the least quantity of participants you would like to be able to reconstruct the secret 2) Choose a polynomial of grade k-1 3) Define k random indices (a0…ak-1) 4) Define k points which can be calculated by the polynomial 5) Distribute k points to the participants. 6) To calculate the secret out of the keys use e.g. Lagrange interpolation [5] with x=0 . Secret Sharing schemes step by step:
  • 11. Application of interpolation in Computer Science Secret sharing graphical explanation:  Let’s start with a simple polynomial y = a 0+ a1x1.  a0 is our secret and since the grade of the polynomial is 1 we need at least two points to determine it (see figure 1). figure 1: graph of a first grade polinomial. a0 is the secret e.g. password. The points are the given keys • If you have only one point given an infinite account of possible solutions can be calculated (see figure 2). figure 2: graph of a first grade polinomial. a0 is the secret e.g. password. Since there is only one fix point the secret is not reconstructible, because an infinite amount of lines are crossing the point
  • 12. Application of interpolation in Computer Science  If K is supposed to be bigger than 2 just take a polynomial with a higher grade e.g. y = a0- a2x2+a0x4 in this case K is equal 5 (see figure 3). figure 3: graph of a fourth grade polynomial. a0 is the secret e.g. password. The points are the given keys.  Now if you would like to add more participants to have a key you could just create a new key by taking another point of the polynomial (see figure 4). figure 4: graph of a fourth grade polynomial. a0 is the secret e.g. password. The points are the given keys. The x are additional keys that could be created without interfering with already existing keys.
  • 13. Application of interpolation in Computer Science Nonlinear programming The Lagrange multiplier method has several generalizations. In nonlinear programming there are several multiplier rules, e.g., the Caratheodory-John Multiplier Rule and the Convex Multiplier Rule, for inequality constraints
  • 14. ADVANTAGES AND DISADVANTAGES of LAGRANGE’S INTERPOLATION • ADVANTAGES • The formula is simple and easy to remember. • There is no need to construct the divided difference table. • The application of the formula is not speedy. • DISADVANTAGE • There is always a chance to committing some error. • The calculation provide no check whether the functional values used the taken correctly or not.