001     910341
005     20240918100824.0
020 _ _ |a 978-3-031-19896-0 (print)
020 _ _ |a 978-3-031-19897-7 (electronic)
024 7 _ |a 10.1007/978-3-031-19897-7_5
|2 doi
024 7 _ |a 0302-9743
|2 ISSN
024 7 _ |a 1611-3349
|2 ISSN
024 7 _ |a 2128/32098
|2 Handle
024 7 _ |a WOS:001286406100005
|2 WOS
037 _ _ |a FZJ-2022-03760
041 _ _ |a English
100 1 _ |a Burgeth, Bernhard
|0 0000-0001-6602-6201
|b 0
111 2 _ |a Discrete Geometry and Mathematical Morphology
|g DGMM 2022
|c Strasbourg
|d 2022-10-24 - 2022-10-27
|w France
245 _ _ |a Towards Topological Analysis of Non-symmetric Tensor Fields via Complexification
260 _ _ |a Cham
|c 2022
|b Springer International Publishing
300 _ _ |a 48 - 59
336 7 _ |a CONFERENCE_PAPER
|2 ORCID
336 7 _ |a Conference Paper
|0 33
|2 EndNote
336 7 _ |a INPROCEEDINGS
|2 BibTeX
336 7 _ |a conferenceObject
|2 DRIVER
336 7 _ |a Output Types/Conference Paper
|2 DataCite
336 7 _ |a Contribution to a conference proceedings
|b contrib
|m contrib
|0 PUB:(DE-HGF)8
|s 1666670608_10468
|2 PUB:(DE-HGF)
336 7 _ |a Contribution to a book
|0 PUB:(DE-HGF)7
|2 PUB:(DE-HGF)
|m contb
490 0 _ |a Lecture Notes in Computer Science
|v 13493
520 _ _ |a Fields of asymmetric tensors play an important role in many applications such as medical imaging (diffusion tensor magnetic resonance imaging), physics, and civil engineering (for example Cauchy-Green-deformation tensor, strain tensor with local rotations, etc.). However, such asymmetric tensors are usually symmetrized and then further processed. Using this procedure results in a loss of information. A new method for the processing of asymmetric tensor fields is proposed restricting our attention to tensors of second-order given by a 2 × 2 array or matrix with real entries. This is achieved by a transformation resulting in Hermitian matrices that have an eigendecomposition similar to symmetric matrices. With this new idea numerical results for real-world data arising from a deformation of an object by external forces are given. It is shown that the asymmetric part indeed contains valuable information.
536 _ _ |a 5112 - Cross-Domain Algorithms, Tools, Methods Labs (ATMLs) and Research Groups (POF4-511)
|0 G:(DE-HGF)POF4-5112
|c POF4-511
|f POF IV
|x 0
588 _ _ |a Dataset connected to CrossRef Book Series, Journals: juser.fz-juelich.de
700 1 _ |a Kleefeld, Andreas
|0 P:(DE-Juel1)169421
|b 1
|e Corresponding author
700 1 _ |a Zhang, Eugene
|0 0000-0003-4752-3119
|b 2
700 1 _ |a Zhang, Yue
|0 P:(DE-HGF)0
|b 3
773 _ _ |a 10.1007/978-3-031-19897-7_5
856 4 _ |u https://juser.fz-juelich.de/record/910341/files/bbakezyzR2.pdf
|y OpenAccess
909 C O |o oai:juser.fz-juelich.de:910341
|p openaire
|p open_access
|p VDB
|p driver
|p dnbdelivery
910 1 _ |a External Institute
|0 I:(DE-HGF)0
|k Extern
|b 0
|6 0000-0001-6602-6201
910 1 _ |a Forschungszentrum Jülich
|0 I:(DE-588b)5008462-8
|k FZJ
|b 1
|6 P:(DE-Juel1)169421
910 1 _ |a External Institute
|0 I:(DE-HGF)0
|k Extern
|b 2
|6 0000-0003-4752-3119
910 1 _ |a External Institute
|0 I:(DE-HGF)0
|k Extern
|b 3
|6 P:(DE-HGF)0
913 1 _ |a DE-HGF
|b Key Technologies
|l Engineering Digital Futures – Supercomputing, Data Management and Information Security for Knowledge and Action
|1 G:(DE-HGF)POF4-510
|0 G:(DE-HGF)POF4-511
|3 G:(DE-HGF)POF4
|2 G:(DE-HGF)POF4-500
|4 G:(DE-HGF)POF
|v Enabling Computational- & Data-Intensive Science and Engineering
|9 G:(DE-HGF)POF4-5112
|x 0
914 1 _ |y 2022
915 _ _ |a DBCoverage
|0 StatID:(DE-HGF)0200
|2 StatID
|b SCOPUS
|d 2020-08-25
915 _ _ |a OpenAccess
|0 StatID:(DE-HGF)0510
|2 StatID
915 _ _ |a Nationallizenz
|0 StatID:(DE-HGF)0420
|2 StatID
|d 2020-08-25
|w ger
920 _ _ |l no
920 1 _ |0 I:(DE-Juel1)JSC-20090406
|k JSC
|l Jülich Supercomputing Center
|x 0
980 _ _ |a contrib
980 _ _ |a VDB
980 _ _ |a UNRESTRICTED
980 _ _ |a contb
980 _ _ |a I:(DE-Juel1)JSC-20090406
980 1 _ |a FullTexts


LibraryCollectionCLSMajorCLSMinorLanguageAuthor
Marc 21