• Title/Summary/Keyword: 상한함수

Search Result 74, Processing Time 0.022 seconds

Signal-to-noise Ratio in Time- and Frequency-domain Photoacoustic Measurements by Different Frequency Filtering (주파수 필터링 함수에 따른 시간 및 주파수 영역 광음향 측정에 대한 신호 대 잡음비 분석)

  • Kang, DongYel
    • Korean Journal of Optics and Photonics
    • /
    • v.30 no.2
    • /
    • pp.48-58
    • /
    • 2019
  • We investigate the signal-to-noise ratios (SNRs) of time-domain (i.e. pulsed illumination) and frequency-domain (i.e. chirped illumination) photoacoustic signals measured by a spherically focused ultrasound transducer for spherical absorbers. The simulation results show that the time-domain photoacoustic SNR is higher than that of frequency-domain photoacoustic signals, as reported in the previous literature. We understand the reason for this SNR gap between the two measurement modes by analyzing photoacoustic-signal spectra, considering the incident beam energy controlled by the maximum permissible exposure. As the result of this approach, we find that filtering off the DC term in the chirped signal's spectrum improves frequency-domain photoacoustic SNRs by up to approximately 5 dB. In particular, it is observed that photoacoustic SNRs are highly sensitive to an upper-frequency value of frequency filtering functions, and the optimal upper-frequency values maximizing the SNR are different in time- and frequency-domain photoacoustic measurements.

Estimation of Probability Density Function of Tidal Elevation Data using the Double Truncation Method (이중 절단 기법을 이용한 조위자료의 확률밀도함수 추정)

  • Jeong, Shin-Taek;Cho, Hong-Yeon;Kim, Jeong-Dae;Hui, Ko-Dong
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.20 no.3
    • /
    • pp.247-254
    • /
    • 2008
  • The double-peak normal distribution function (DPDF) suggested by Cho et al.(2004) has the problems that the extremely high and low tidal elevations are frequently generated in the Monte-Carlo simulation processes because the upper and lower limits of the DPDF are unbounded in spite of the excellent goodness-offit results. In this study, the modified DPDF is suggested by introducing the upper and lower value parameters and re-scale parameters in order to remove these problems. These new parameters of the DPDF are optimally estimated by the non-linear optimization problem solver using the Levenberg-Marquardt scheme. This modified DPDF can remove completely the unrealistically generated tidal levations and give a slightly better fit than the existing DRDF. Based on the DPDF's characteristic power, the over- and under estimation problems of the design factors are also automatically intercepted, too.

Fuzzy Neural Networks-Based Call Admission Control Using Possibility Distribution of Handoff Calls Dropping Rate for Wireless Networks (핸드오프 호 손실율 가능성 분포에 의한 무선망의 퍼지 신경망 호 수락제어)

  • Lee, Jin-Yi
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.901-906
    • /
    • 2009
  • This paper proposes a call admission control(CAC) method for wireless networks, which is based on the upper bound of a possibility distribution of handoff calls dropping rates. The possibility distribution is estimated in a fuzzy inference and a learning algorithm in neural network. The learning algorithm is considered for tuning the membership functions(then parts)of fuzzy rules for the inference. The fuzzy inference method is based on a weighted average of fuzzy sets. The proposed method can avoid estimating excessively large handoff calls dropping rates, and makes possibile self-compensation in real time for the case where the estimated values are smaller than real values. So this method makes secure CAC, thereby guaranteeing the allowed CDR. From simulation studies we show that the estimation performance for the upper bound of call dropping rate is good, and then handoff call dropping rates in CAC are able to be sustained below user's desired value.

  • PDF

A Performance Bound of Mu1ti-hop Mu1ti-Relay Wireless Communication Systems with Optimal Path Selection (다중-홉 다중-릴레이 무선 통신 시스템에서 최적 경로 선택 기법의 성능 한계)

  • Almuradov, Kamol;Park, Jin-Bae;Kim, Yun-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1C
    • /
    • pp.1-7
    • /
    • 2011
  • Recently, multi-hop relay transmission has drawn much attention owing to its advantage of coverage extension at low power consumption. In this paper, we derive a performance bound of multi-hop communication systems with multiple amplify-and-forward relays when the optimal path is selected. The bound is derived in generalized Nakagami fading channels with different parameters for each hop by applying the geometric mean bound to the path signal-to-noise ratio (SNR) and obtaining the moment generation function of the bound. It is shown that the bound based on the geometric mean is closer to the actual performance of optimal path selection when the fading effect is small.

Estimation of the return period of statistical method for probable maximum precipitation (통계학적 가능최대강수량의 재현기간 추정)

  • Kim, Sangdan;Sim, Inkyeong;Lee, Okjeong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.180-180
    • /
    • 2018
  • 가능최대강수량(PMP)은 대규모 수공구조물의 설계 시 기준이 되는 강수량으로, 최근 대규모 거대재난에 대비한 대피계획수립에 PMP를 활용하려는 움직임이 있으며 PMP에 대한 국내 연구가 활발히 수행되고 있다. PMP를 추정하기 위해 Hershfield의 통계적 방법에 대한 간단한 대안이 제안되었다. PMP는 물리적인 강우량 상한계로, 확률론적 개념과는 모순적이다. 또한, Hershfield의 PMP는 연 최대 시계열 평균의 선형함수로 주어지는 모양 매개변수를 가지는 GEV 분포의 약 60,000년 빈도임이 밝혀졌다. 따라서 본 연구에서는 Hershfield의 방법을 확률론적으로 해석하는 것이 바람직할 것으로 판단하였고, 기상청 ASOS 및 AWS 자료를 이용하여 우리나라 각 지점자료 중 10년 이상의 자료를 사용하여 Hershfield 방법을 적용하여 PMP를 산정하였다. 각 지점의 빈도계수를 구하여 우리나라 자료에 적합한 확률분포의 형태를 적용하였고, 분포형의 매개변수 값을 추정하였다. 또한, Hershfield의 빈도계수와, 우리나라 자료에 해당하는 빈도계수가 몇 년 빈도로 계산되는지 각각 확인해 보았다. ASOS 및 AWS 자료를 이용하여 연 최대 강수량 시계열 평균과 모양 매개변수의 관계 공식 또한 구성하였다. 본 연구의 방법을 검증하기 위하여 우리나라에서 제일 오래된 자료(57년)인 서울지점 자료를 이용하여 경험적인 분포함수와 본 연구에서 제안하고 있는 방법을 비롯한 다양한 방법을 통하여 구한 분포함수를 비교하여 도시하였다.

  • PDF

Provable Security for New Block Cipher Structures against Differential Cryptanalysis and Linear Cryptanalysis (새로운 블록 암호 구조에 대한 차분/선형 공격의 안전성 증명)

  • Kim, Jong-Sung;Jeong, Ki-Tae;Lee, Sang-Jin;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.121-125
    • /
    • 2007
  • Differential cryptanalysis and linear cryptanalysis are the most powerful approaches known for attacking many block ciphers and used to evaluating the security of many block ciphers. So designers have designed secure block ciphers against these cryptanalyses. In this paper, we present new three block cipher structures. And for given r, we prove that differential(linear) probabilities for r-round blockcipher structures are upper bounded by $p^2(q^2),\;2p^2(2q^2)$ if the maximum differential(linear) probability is p(q) and the round function is a bijective function.

Median Prefilter Based Robust Acquisition Of Direct Sequence Spread Spectrum Signals In Wideband Pulse Jamming (미디언 필터를 이용한 광대역 펄스 재밍 환경에서의 직접 시퀀스 확산 대역 신호의 강인한 포착)

  • 김승준;이용환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6B
    • /
    • pp.1015-1023
    • /
    • 1999
  • We propose nonlinear processing schemes for robust acquisition of direct-sequence spread spectrum (DS/SS) signals in wideband pulse jamming. To mitigate the interference effect due to impulse-like wideband jamming signals, the received signal is preprocessed by using the median filter, a simple order statistic filter Since only parts of the PN sequence are used for rapid acquisition, it is indispensable for analytic design of an acquisition scheme to have an appropriate model of the partial PN signal. The partial correlation of the median filtered PN signal is approximated by a two-piecewise linear model using an approximate upper bound. The acquisition performance of the proposed schemes is compared to that of other schemes. Finally, the analytic design is verified by computer simulation.

  • PDF

On the Support of Minimum Mean-Square Error Scalar Quantizers for a Laplacian Source (라플라스 신호원에 대한 최소평균제곱오차 홑 양자기의 지지역에 관하여)

  • Kim, Seong-Min;Na, Sang-Sin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10C
    • /
    • pp.991-999
    • /
    • 2006
  • This paper shows that the support growth of an optimum (minimum mean square-error) scalar quantizer for a Laplacian density is logarithmic with the number of quantization points. Specifically, it is shown that, for a unit-variance Laplacian density, the ratio of the support-determining threshold of an optimum quantizer to $\frac 3{\sqrt{2}}1n\frac N 2$ converges to 1, as the number of quantization points grows. Also derived is a limiting upper bound that says that the optimum support cannot exceed the logarithmic growth by more than a constant. These results confirm the logarithmic growth of the optimum support that has previously been derived heuristically.

Guaranteed Cost and $H_{\infty}$ Filtering for Delayed Fuzzy Dynamic Systems (시간지연 퍼지 시스템의 보장비용 및 $H_{\infty}$ 필터링)

  • 이갑래;조희수;박홍배
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.40 no.2
    • /
    • pp.10-18
    • /
    • 2003
  • This paper presents a method for designing guaranteed cost fuzzy filter with a desired H$_{\infty}$ disturbance rejection constraint of delayed fuzzy dynamic systems. This method not only guarantees an induced L$_2$ norm bound constraint on disturbance attenuation, but also minimizes an upper bound on a linear quadratic performance measure. A sufficient condition for the existence of guaranteed cost fuzzy filter with H$_{\infty}$ constraint is then presented in terms of linear matrix inequalities(LMIs). A simulation example is given to illustrate the design procedures and performances of the proposed methods.

Security of OFB mode and 3GPP f8 encryption mode (OFB 모드와 3GPP f8 암호화 모드의 안전성)

  • 신상욱;홍도원;강주성;이옥연
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.55-66
    • /
    • 2001
  • In this paper, we analyze the security of OFB encryption mode which is one of the basic modes of operation for the block cipher and the security of 3GPP f8 encryption mode used to provide the data confidentiality over a radio access link of W-CDMA IMT-2000. We provide the lower bound and the upper bound on security of both modes in random function model and random permutation model, respectively, by means of the left-or-right security notion, and prove the security of both modes using a pseudorandom function and a pseudorandom permutation, respectively.