skip to main content
article
Free Access

Mesh refinement via bidirected flows: modeling, complexity, and computational results

Published:01 May 1997Publication History
Skip Abstract Section

Abstract

We investigate a problem arising in the computer-aided design of cars, planes, ships, trains, and other motor vehicles and machines: refine a mesh of curved polygons, which approximates the surface of a workpiece, into quadrilaterals so that the resulting mesh is suitable for a numerical analysis. This mesh refinement problem turns out to be strongly NP-hard

In commercial CAD systems, this problem is usually solved using a gree dy approach. However, these algorithms leave the user a lot of patchwork to do afterwards. We introduce a new global approach, which is based on network flow techniques. Abstracting from all geometric and numerical aspects, we obtain an undirected graph with upper and lower capacities on the edges and some additional node constraints. We reduce this problem to a sequence of bidirected flwo problems (or, equivalently, to b-matching problems). For the first time, network flow techniques are applied to a mesh refinement problem.

This approach avoids the local traps of greedy approaches and yields solutions that require significantly less additional patchwork.

References

  1. AHUJA, R. K., MAGNANTI, T. L., AND ORLIN, J.B. 1993. Network Flows. Prentice-Hall, Englewood Cliffs, N.J.Google ScholarGoogle Scholar
  2. ANSTEE, R.P. 1987. A polynomial algorithm for b-matching: An alternative approach. Inf. Proc. Lett. 24, 153-157. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. BABUSKA, I., AND AzIz, A. 1976. On the angle condition in the finite element method. SIAM J. Num. Anal. 13, 214-227.Google ScholarGoogle ScholarCross RefCross Ref
  4. BERN, M., AND EPPSTEIN, D. 1992. Mesh generation and optimal triangulation. In Computing in ~Euclidean Geometry, D.-Z. Du and F. K. Hwang, eds. World Scientific, Singapore, pp. 23-90.Google ScholarGoogle Scholar
  5. DERIGS, U. 1988. Programming in networks and graphs. In Lecture Notes in Economics and Mathematical Systems, vol. 300. Springer-Verlag, Berlin, Germany.Google ScholarGoogle Scholar
  6. EDMONDS, J. 1967. An Introduction to Matching. Lecture Notes. Univ. Michigan, Ann Arbor, Ann Arbor, Mich.Google ScholarGoogle Scholar
  7. Ho-LE, K. 1988. Finite element mesh generation methods: A review and classification. Comput. Aided Des. 20, 27-38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. JOE, 13. 1995. Quadrilateral mesh generation in polygonal regions. Comput. Aided Des. 27, 209 -222.Google ScholarGoogle ScholarCross RefCross Ref
  9. KRAUSE, G. 1991. Interactive finite element preprocessing with ISAGEN. Fin. Element News 15.Google ScholarGoogle Scholar
  10. MEHLHORN, K., AND NAHER, S. 1995. LEDA, A platform for combinatorial and geometric computing. Commun. ACM 38, 2 (Feb.), 96-102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. MILLER, D. t., AND PEKNY, J.F. 1995. A staged primal-dual algorithm for perfect b-matching with edge capacities. ORSA J. Comput. 7, 298-320.Google ScholarGoogle ScholarCross RefCross Ref
  12. M(3HRING, R. H., AND MULLER-HANNEMANN, M. 1995. Cardinality matching: Heuristic search for augmenting paths. Tech. Rep. no. 439/1995. Technische Universitfit Berlin, Berlin, Germany. (Available via anonymous ftp from ftp.math.tu-berlin.de; cd pub/Preprints/combi; file Report-439-1995 .ps. Z.)Google ScholarGoogle Scholar
  13. MULLER-HANNEMANN, M., AND SCHWARTZ, A. 1997. Mesh refinement in quadrilaterals without template restrictions. Manuscript.Google ScholarGoogle Scholar
  14. MOLLER-HANNEMANN, M., AND WEIHE, K. 1996. Minimum strictly convex quadrangulations of convex polygons. Preprint No. 13. Dept. Math. Comput. Sci., Univ. Konstanz, Konstanz, Germany. (Available via anonymous ftp from ftp.informatik.uni-konstanz.de; cd pub/preprints/1996, file preprint-013 .ps. Z.)Google ScholarGoogle Scholar
  15. PAPADIMITRIOU, C. H., AND STEIGLITZ, K. 1982. Combinatorial Optimization-Algorithms and Complexity. Prentice-Hall, Englewood Cliffs, N.J. Google ScholarGoogle Scholar
  16. PULLEYBLANK, W. 1973. Faces of matching polyhedra. Ph.D. dissertation. Faculty of Mathematics, Univ. Waterloo, Waterloo, England.Google ScholarGoogle Scholar
  17. RIPPENHAUSEN-LIPA, H., WAGNER, D., AND WEIHE, K. 1995. Efficient algorithms for disjoint paths in planar graphs. In DIMACS Series in Discrete Mathematics and Computer Science, vol. 20 (from the special year on combinatorial optimization). American Mathematical Society, Providence, R. I., pp. 295-354.Google ScholarGoogle Scholar
  18. SRINIVASAN, V., NACKMAN, L. R., TANG, J.-M., AND MEHKAT, S. N. 1992. Automatic mesh generation using the symmetric axis transformation of polygonal domains. In Proc. IEEE 80, 1485-1501.Google ScholarGoogle ScholarCross RefCross Ref
  19. STRANG, G., AND FIX, a. J. 1973. An Analysis of the Finite Element Method. Prentice-Hall, Englewood Cliffs, N.J.Google ScholarGoogle Scholar
  20. TAM, T. K. H., AND ARMSTRONG, C. G. 1993. Finite element mesh control by integer programming. Int. J. Num. Meth. Eng. 36, 2581-2605.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Mesh refinement via bidirected flows: modeling, complexity, and computational results

              Recommendations

              Reviews

              Paul Cull

              It may surprise some readers that applied mathematics, including numerical analysis, is as much an art as a science. This paper gives a glimpse of some of the real difficulties associated with applying mathematics to computer-aided design. The problem is to choose the right (or a good enough) grid to allow efficient analysis by the finite element method. From this vague problem, the authors abstract an exact combinatorial problem and then show that their problem is NP-complete. They then develop a heuristic technique based on the idea of network flows to find (they hope) a reasonable grid and<__?__Pub Caret> present examples in which their method proves superior to some other methods. There are a number of lessons and a question from this paper. If the authors' method works in their problem domain, could one simplify (restrict) the problem so that there is a polynomial-time algorithm__?__ The lesson here is that the real problem is not well-specified, and the major effort is in abstracting the right problem. The authors mention that they ignored the fact that their graphs could have “blossoms.” The lesson of this is not to complicate your heuristic; if you cannot really solve a problem, getting a pretty good answer quickly is probably better than spending a lot of time on finding an answer that may not be much better. The authors build an escape into their method so that it always produces a grid. The lesson of this is that heuristics should have soft failures, so that a usable, if not good, solution can be produced. The major question left open is how one should evaluate heuristics. Is comparing one method with another on a handful of examples the best we can do__?__

              Access critical reviews of Computing literature here

              Become a reviewer for Computing Reviews.

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image Journal of the ACM
                Journal of the ACM  Volume 44, Issue 3
                May 1997
                163 pages
                ISSN:0004-5411
                EISSN:1557-735X
                DOI:10.1145/258128
                • Editor:
                • F. T. Leighton
                Issue’s Table of Contents

                Copyright © 1997 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 May 1997
                Published in jacm Volume 44, Issue 3

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader