**Are you an EPFL student looking for a semester project?**

Work with us on data science and visualisation projects, and deploy your project as an app on top of GraphSearch.

Concept# Ellipse

Summary

In mathematics, an ellipse is a plane curve surrounding two focal points, such that for all points on the curve, the sum of the two distances to the focal points is a constant. It generalizes a circle, which is the special type of ellipse in which the two focal points are the same. The elongation of an ellipse is measured by its eccentricity e, a number ranging from e = 0 (the limiting case of a circle) to e = 1 (the limiting case of infinite elongation, no longer an ellipse but a parabola).
An ellipse has a simple algebraic solution for its area, but only approximations for its perimeter (also known as circumference), for which integration is required to obtain an exact solution.
Analytically, the equation of a standard ellipse centered at the origin with width 2a and height 2b is:
\frac{x^2}{a^2}+\frac{y^2}{b^2} = 1 .
Assuming a \ge b, the foci are (\pm c, 0)

Official source

This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.

Related publications

Loading

Related people

Loading

Related units

Loading

Related concepts

Loading

Related courses

Loading

Related lectures

Loading

Related publications (15)

Related people (1)

Related units

No results

Loading

Loading

Loading

Related concepts (138)

Circle

A circle is a shape consisting of all points in a plane that are at a given distance from a given point, the centre. The distance between any point of the circle and the centre is called the radius.

Parabola

In mathematics, a parabola is a plane curve which is mirror-symmetrical and is approximately U-shaped. It fits several superficially different mathematical descriptions, which can all be proved to

Conic section

A conic section, conic or a quadratic curve is a curve obtained from a cone's surface intersecting a plane. The three types of conic section are the hyperbola, the parabola, and the ellipse; the c

Related courses (35)

Related lectures (93)

MATH-126: Geometry for architects II

Ce cours traite des 3 sujets suivants : la perspective, la géométrie descriptive, et une initiation à la géométrie projective.

MATH-305: Introduction to partial differential equations

This is an introductory course on Elliptic Partial Differential Equations. The course will cover the theory of both classical and generalized (weak) solutions of elliptic PDEs.

MATH-189: Mathematics

Ce cours a pour but de donner les fondements de mathématiques nécessaires à l'architecte contemporain évoluant dans une école polytechnique.

This thesis focuses on the numerical analysis of partial differential equations (PDEs) with an emphasis on first and second-order fully nonlinear PDEs. The main goal is the design of numerical methods to solve a variety of equations such as orthogonal maps, the prescribed Jacobian equation and inequality, the elliptic and parabolic Monge-Ampère equations.
For orthogonal map we develop an \emph{operator-splitting/finite element} approach for the numerical solution of the Dirichlet problem. This approach is built on the variational principle, the introduction of an associated flow problem, and a time-stepping splitting algorithm. Moreover, we propose an extension of this method with an \emph{anisotropic mesh adaptation algorithm}. This extension allows us to track singularities of the solution's gradient more accurately. Various numerical experiments demonstrate the accuracy and the robustness of the proposed method for both constant and adaptive mesh.
For the prescribed Jacobian equation and the three-dimensional Monge-Ampère equation, we consider a \emph{least-squares/relaxation finite element method} for the numerical solution of the Dirichlet problems. We then introduce a relaxation algorithm that splits the least-square problem, which stems from a reformulation of the original equations, into local nonlinear and variational problems. We develop dedicated solvers for the algebraic problems based on Newton method and we solve the differential problems using mixed low-order finite element method. Overall the least squares approach exhibits appropriate convergence orders in $L^2(\Omega)$ and $H^1(\Omega)$ error norms for various numerical tests.
We also design a \emph{second-order time integration method} for the approximation of a parabolic two-dimensional Monge-Ampère equation. The space discretization of this method is based on low-order finite elements, and the time discretization is achieved by the implicit Crank-Nicolson type scheme.
We verify the efficiency of the proposed method on time-dependent and stationary problems. The results of numerical experiments show that the method achieves nearly optimal orders for the $L^2(\Omega)$ and $H^1(\Omega)$ error norms when smooth solutions are approximated.
Finally, we present an adaptive mesh refinement algorithm for the elliptic Monge-Ampere equation based on the residual error estimate. The robustness of the proposed algorithm is verified using various test cases and two different solvers which are inspired by the two previous proposed numerical methods.

A method for extracting in real-time the position and size of liver vessels from 2D ultrasound images is described. It proceeds in two steps. Starting with a rough localization of the vessels using the scale-space theory, seed points are defined. Then, vessel contours are detected by analyzing the 1D wavelet transform of radial rays. The size of the vessel is then computed by fitting ellipses on the edge points.

2008The RSA cryptosystem introduced in 1977 by Ron Rivest, Adi Shamir and Len Adleman is the most commonly deployed public-key cryptosystem. Elliptic curve cryptography (ECC) introduced in the mid 80's by Neal Koblitz and Victor Miller is becoming an increasingly popular alternative to RSA offering competitive performance due the use of smaller key sizes. Most recently hyperelliptic curve cryptography (HECC) has been demonstrated to have comparable and in some cases better performance than ECC. The security of RSA relies on the integer factorization problem whereas the security of (H)ECC is based on the (hyper)elliptic curve discrete logarithm problem ((H)ECDLP). In this thesis the practical performance of the best methods to solve these problems is analyzed and a method to generate secure ephemeral ECC parameters is presented. The best publicly known algorithm to solve the integer factorization problem is the number field sieve (NFS). Its most time consuming step is the relation collection step. We investigate the use of graphics processing units (GPUs) as accelerators for this step. In this context, methods to efficiently implement modular arithmetic and several factoring algorithms on GPUs are presented and their performance is analyzed in practice. In conclusion, it is shown that integrating state-of-the-art NFS software packages with our GPU software can lead to a speed-up of 50%. In the case of elliptic and hyperelliptic curves for cryptographic use, the best published method to solve the (H)ECDLP is the Pollard rho algorithm. This method can be made faster using classes of equivalence induced by curve automorphisms like the negation map. We present a practical analysis of their use to speed up Pollard rho for elliptic curves and genus 2 hyperelliptic curves defined over prime fields. As a case study, 4 curves at the 128-bit theoretical security level are analyzed in our software framework for Pollard rho to estimate their practical security level. In addition, we present a novel many-core architecture to solve the ECDLP using the Pollard rho algorithm with the negation map on FPGAs. This architecture is used to estimate the cost of solving the Certicom ECCp-131 challenge with a cluster of FPGAs. Our design achieves a speed-up factor of about 4 compared to the state-of-the-art. Finally, we present an efficient method to generate unique, secure and unpredictable ephemeral ECC parameters to be shared by a pair of authenticated users for a single communication. It provides an alternative to the customary use of fixed ECC parameters obtained from publicly available standards designed by untrusted third parties. The effectiveness of our method is demonstrated with a portable implementation for regular PCs and Android smartphones. On a Samsung Galaxy S4 smartphone our implementation generates unique 128-bit secure ECC parameters in 50 milliseconds on average.