Professional Documents
Culture Documents
Interpolation and It's Application
Interpolation and It's Application
What is interpolation ?
Interpolation is the process of using points with known values or sample points to estimate
values at other unknown points. It can be used to predict unknown values for any geographic
point data, such as elevation, rainfall, chemical concentrations, noise levels, and so on.
Interpolation in Grapics
If some solutions can be found using an initial solution which is not accurate, the next initial solutions can be evaluated by
the use of an interpolation method. In this way the computer time decreases and the accuracy is increased
Application of interpolation in Computer Science
Figure 4 - Repeatability of the experimental values for the same measurement point
Application of interpolation in Computer Science
The experimental data were used to calibrate the numerical FEM model, so the experimental data was checked, double
checked and over checked in order to offer a high degree of confidence. Several states of the running conditions were studied
and several millions of experimental values were acquired. In this way there was verified the repeatability of the experimental
data for all the measurement points.
Figure 5 : The “trend line” facility offered in Excel, in order to smooth the curves
Application of interpolation in Computer Science
The most facile method to smooth the curves was to use Excel in order to add a trend line which
might present the relevant variation of the phenomenon. Excel also offers a whole set of
facilities, such as:
import of the data from several formats: text, Visual FoxPro tables, comma separated values,
etc;
graphics of the data presented in the sheet;
record, store and run a macro (a set of consecutive commands),
in this way being possible to draw a graph by using a single click
Application of interpolation in Computer Science
“Secret sharing” or secret splitting describes the methodology of distributing secret information among a group of
participants in a way that a subset of this group is needed to reconstruct the secret. Whereby a single piece of
information cannot be used to reconstruct the secret.
Secret sharing has a wide operation range. It can be used in high security areas for validation reasons e.g. in the
military or in the banking area where it might be necessary to have a 4, 6 or 8 eye validation principle. It also can
be used to ensure the secure transport of information e.g. transport of a cryptographic key over several channels.
Last but not least it can be used in secure access regulation where only a combination of trustworthy people
might get access to a secure area
Application of interpolation in Computer Science
a0 is our secret and since the grade of the polynomial is 1 we need at least two points to
determine it (see figure 1).
• If you have only one point given an infinite account of possible solutions can
be calculated (see figure 2).
figure 2: graph of a first grade polinomial. a0 is the secret e.g. password. Since
there is only one fix point the secret is not reconstructible, because an infinite
amount of lines are crossing the point
Application of interpolation in Computer Science
If K is supposed to be bigger than 2 just take a polynomial with a higher grade e.g. y = a 0-
a2x2+a0x4 in this case K is equal 5 (see figure 3).
Now if you would like to add more participants to have a key you could just create a
new key by taking another point of the polynomial (see figure 4).
Nonlinear programming
The Lagrange multiplier method has several generalizations. In nonlinear programming there are
several multiplier rules, e.g., the Caratheodory-John Multiplier Rule and the Convex Multiplier Rule,
for inequality constraints
ADVANTAGES AND DISADVANTAGES of LAGRANGE’S
INTERPOLATION
• ADVANTAGES
• The formula is simple and easy to remember.
• There is no need to construct the divided difference table.
• The application of the formula is not speedy.
• DISADVANTAGE
• There is always a chance to committing some error.
• The calculation provide no check whether the functional values
used the taken correctly or not.