• 제목/요약/키워드: Complex Vector

검색결과 622건 처리시간 0.029초

EVALUATION FORMULAS FOR AN ANALOGUE OF CONDITIONAL ANALYTIC FEYNMAN INTEGRALS OVER A FUNCTION SPACE

  • Cho, Dong-Hyun
    • 대한수학회보
    • /
    • 제48권3호
    • /
    • pp.655-672
    • /
    • 2011
  • Let $C^r$[0,t] be the function space of the vector-valued continuous paths x : [0,t] ${\rightarrow}$ $R^r$ and define $X_t$ : $C^r$[0,t] ${\rightarrow}$ $R^{(n+1)r}$ and $Y_t$ : $C^r$[0,t] ${\rightarrow}$ $R^{nr}$ by $X_t(x)$ = (x($t_0$), x($t_1$), ..., x($t_{n-1}$), x($t_n$)) and $Y_t$(x) = (x($t_0$), x($t_1$), ..., x($t_{n-1}$)), respectively, where 0 = $t_0$ < $t_1$ < ... < $t_n$ = t. In the present paper, with the conditioning functions $X_t$ and $Y_t$, we introduce two simple formulas for the conditional expectations over $C^r$[0,t], an analogue of the r-dimensional Wiener space. We establish evaluation formulas for the analogues of the analytic Wiener and Feynman integrals for the function $G(x)=\exp{{\int}_0^t{\theta}(s,x(s))d{\eta}(s)}{\psi}(x(t))$, where ${\theta}(s,{\cdot})$ and are the Fourier-Stieltjes transforms of the complex Borel measures on ${\mathbb{R}}^r$. Using the simple formulas, we evaluate the analogues of the conditional analytic Wiener and Feynman integrals of the functional G.

자동 지령모드절환 기능을 갖춘 PMSG MV 해상 풍력 발전기의 직접전력제어 방법 (Automatic Command Mode Transition Strategy of Direct Power Control for PMSG MV Offshore Wind Turbines)

  • 권국민;서용석
    • 전력전자학회논문지
    • /
    • 제21권3호
    • /
    • pp.238-248
    • /
    • 2016
  • In this study, an automatic command mode transition strategy of direct power control (DPC) is proposed for permanent magnet synchronous generators (PMSGs) medium-voltage (MV) offshore wind turbines (WTs). Benchmarking against the control methods are performed based on a three-level neutral-point-clamped (NPC) back-to-back type voltage source converter (VSC). The ramping rate criterion of complex power is utilized to select the switching vector in DPC for a three-level NPC converter. With a grid command and an MPPT mode transition strategy, the proposed control method automatically controls the generated output power to satisfy a grid requirement from the hierarchical wind farm controller. The automatic command mode transition strategy of DPC is confirmed through PLECS simulations based on Matlab. The simulation result of the automatic mode transition strategy shows that the proposed control method of VOC and DPC achieves a much shorter transient time of generated output power than the conventional control methods of MPPT and VOC under a step response. The proposed control method helps provide a good dynamic performance for PMSGs MV offshore WTs, thereby generating high quality output power.

Identification of Positive and Negative Regulatory Elements of the Human Cytochrome P4501A2 (CYP1A2) Gene

  • Chung, Injae;Jeong, Choonsik;Jung, Kihwa;Bresnick, Edward
    • 한국응용약물학회:학술대회논문집
    • /
    • 한국응용약물학회 1997년도 춘계학술대회
    • /
    • pp.81-81
    • /
    • 1997
  • We previously demonstrated an enhancer-like positive regulatory element within a 259-bp sequence (-2352 to-2094 bp) of the human CYP1A2 gene in HepG2 cells. Three protein binding sites were identified by DNase I footprint analyses within the 259-bp sequence: protected region A PRA ( -2283 to-2243 bp), PRB (-2218 to-2187 bp), and PRC (-2124 to-2098 bp) (I. Chung and E. Bresnick, Mol. Pharmacol. 47, 677-685, 1995). In the present study, the functional significance of those protected regions was examined. Transfection experiments with deletion and substitution mutants defined the PRB and PRC as containing positive and negative regulatory elements, respectively. Human breast carcinoma MCF-7 cells were cotransfected with a hepatocyte nuclear factor-1 (HNF-1) expression vector and CYP1A2 promoter-or thymidine kinase promoter-luciferase remoter gene constructs. HNF-1, which contributes to the liver specificity of genes, enhanced reporter gene activity in a PRC sequence-dependent manner. These results suggested that PRC could exist bound to a repressor which was displaceable by other transcription factors such as HNF-1. Results obtained by transfection of HepG2 hepatoma cells with various PRB substitution mutant-luciferase gene fusion constructs indicated that the entire sequence of PRB was necessary for promoter activity. Consequently, the regulation of CYP1A3 expression is very complex, requiring a number of both positive and negative regulatory factors.

  • PDF

Mobile Junk Message Filter Reflecting User Preference

  • Lee, Kyoung-Ju;Choi, Deok-Jai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권11호
    • /
    • pp.2849-2865
    • /
    • 2012
  • In order to block mobile junk messages automatically, many studies on spam filters have applied machine learning algorithms. Most previous research focused only on the accuracy rate of spam filters from the view point of the algorithm used, not on individual user's preferences. In terms of individual taste, the spam filters implemented on a mobile device have the advantage over spam filters on a network node, because it deals with only incoming messages on the users' phone and generates no additional traffic during the filtering process. However, a spam filter on a mobile phone has to consider the consumption of resources, because energy, memory and computing ability are limited. Moreover, as time passes an increasing number of feature words are likely to exhaust mobile resources. In this paper we propose a spam filter model distributed between a users' computer and smart phone. We expect the model to follow personal decision boundaries and use the uniform resources of smart phones. An authorized user's computer takes on the more complex and time consuming jobs, such as feature selection and training, while the smart phone performs only the minimum amount of work for filtering and utilizes the results of the information calculated on the desktop. Our experiments show that the accuracy of our method is more than 95% with Na$\ddot{i}$ve Bayes and Support Vector Machine, and our model that uses uniform memory does not affect other applications that run on the smart phone.

유전 알고리즘에서의 자기 조직화 신경망의 활용 (New Usage of SOM for Genetic Algorithm)

  • 김정환;문병로
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제33권4호
    • /
    • pp.440-448
    • /
    • 2006
  • 자기 조직화 신경망 (SOM: Self-Organizing Map)은 자율 학습 신경망으로 사전 지식이 존재하지 않는 자료에 존재하는 구조적 관계성을 보전하는데 이용된다. 자기 조직화 신경망은 벡터 양자화, 조합 최적화, 패턴 인식과 같은 복잡한 문제 해결을 위한 연구에 많이 이용되어 왔다. 이 논문에서는 좀더 효율적인 유전 알고리즘을 얻기 위한 스키마 변환 도구로서 자기 조직화 신경망을 이용하는 새로운 사용법에 대해서 제안한다. 즉, 각 자식해는 탐색 공간에서 좀더 바람직한 모양을 가지는 동질의 인공 신경망으로 변환된다. 이 변환으로 인해 강한 상위(epistasis)를 가지는 유전자들은 염색체 상에서 서로 인접하게 되는 것이다. 실험 결과는 기존 결과에 비해서 주목할만한 성능 개선이 있음을 보여준다.

리뷰에서의 고객의견의 다층적 지식표현 (Multilayer Knowledge Representation of Customer's Opinion in Reviews)

  • ;원광복;옥철영
    • 한국정보과학회 언어공학연구회:학술대회논문집(한글 및 한국어 정보처리)
    • /
    • 한국정보과학회언어공학연구회 2018년도 제30회 한글 및 한국어 정보처리 학술대회
    • /
    • pp.652-657
    • /
    • 2018
  • With the rapid development of e-commerce, many customers can now express their opinion on various kinds of product at discussion groups, merchant sites, social networks, etc. Discerning a consensus opinion about a product sold online is difficult due to more and more reviews become available on the internet. Opinion Mining, also known as Sentiment analysis, is the task of automatically detecting and understanding the sentimental expressions about a product from customer textual reviews. Recently, researchers have proposed various approaches for evaluation in sentiment mining by applying several techniques for document, sentence and aspect level. Aspect-based sentiment analysis is getting widely interesting of researchers; however, more complex algorithms are needed to address this issue precisely with larger corpora. This paper introduces an approach of knowledge representation for the task of analyzing product aspect rating. We focus on how to form the nature of sentiment representation from textual opinion by utilizing the representation learning methods which include word embedding and compositional vector models. Our experiment is performed on a dataset of reviews from electronic domain and the obtained result show that the proposed system achieved outstanding methods in previous studies.

  • PDF

모바일 디스플레이에서 TS 알고리즘을 이용한 실시간 얼굴영역 검출 (Real Time Face Detection with TS Algorithm in Mobile Display)

  • 이용환;김영섭;이상범;강정원;박진양
    • 반도체디스플레이기술학회지
    • /
    • 제4권1호
    • /
    • pp.61-64
    • /
    • 2005
  • This study presents a new algorithm to detect the facial feature in a color image entered from the mobile device with complex backgrounds and undefined distance between camera's location and the face. Since skin color model with Hough transformation spent approximately 90$\%$ of running time to extract the fitting ellipse for detection of the facial feature, we have changed the approach to the simple geometric vector operation, called a TS(Triangle-Square) transformation. As the experimental results, this gives benefit of reduced run time. We have similar ratio of face detection to other methods with fast speed enough to be used on real-time identification system in mobile environments.

  • PDF

Interaction between Metalloporphyrins and Diazine Tautomers

  • Xu, Huiying;Wang, Wei;Zhu, Jianqing;Xu, Xiaolu;Zhang, Deyong
    • Bulletin of the Korean Chemical Society
    • /
    • 제34권12호
    • /
    • pp.3727-3732
    • /
    • 2013
  • The interaction between metalloporphyrins and diazine tautomers was investigated using quantum chemistry method. The results showed that the metal atom in the metalloporphyrin was not coplanar with porphin ring, and zinc porphyrin has the most extent of its non-coplanar nature. The most stable complex in nine complexes was iron porphyrin. NBO analysis indicated that the interaction between the lone pair of electrons on the nitrogen atom and the unoccupied lone pair orbital of metal contributes significantly to the stability of the complexes. Through the conceptual DFT parameter and Fukui dual descriptor, the thermodynamic stability and reactivity of complexes were analyzed. The density difference function (DDF) analyzes were performed to explore the rearrangement of electronic density after the coordination interaction. NICS calculation indicated that metalloporphyrin aromaticity was reduced after the coordination interaction, and aromaticity of diazine tautomer was increased along direction vector of the coordination interaction force.

비균질/이방성 암반에서의 터널 거동 분석을 위한 수치해석적 연구 (Numerical Analysis on the Effect of Heterogeneous/Anisotropic Nature of Rock Masses on Displacement Behavior of Tunnel)

  • 백승한;김창용;김광염;홍성완;문현구
    • 한국지반공학회:학술대회논문집
    • /
    • 한국지반공학회 2006년도 춘계 학술발표회 논문집
    • /
    • pp.939-948
    • /
    • 2006
  • The structural anisotropy and heterogeneity of rock mass, caused by discontinuities and weak zones, have a great influence on the deformation behavior of tunnel. Tunnel construction in these complex ground conditions is very difficult. No matter how excellent a geological investigation is, local uncertainties of rock mass conditions still remain. Under these uncertain circumstances, an accurate forecast of the ground conditions ahead of the advancing tunnel face is indispensable to safe and economic tunnel construction. This paper presents the effect of anisotropy and heterogeneity of the rock masses to be excavated by numerical analysis. The influences of distance from weak zone, the size or dimension, the different stiffness and the orientation of weak zones are analysedby 2-D and 3-D finite element analysis. By analysing these numerical results, the tunnel behavior due to excavation can be well understood and the prediction of rock mass condition ahead of tunnel face can be possible.

  • PDF

Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation

  • Yuan, Sheng;Liu, Xuemei;Zhou, Xin;Li, Zhongyang
    • Journal of the Optical Society of Korea
    • /
    • 제20권4호
    • /
    • pp.476-480
    • /
    • 2016
  • For the application of multiusers, the arrangement and distribution of the keys is a much concerning problem in a cryptosystem. In this paper, we propose an optical encryption scheme with multiple users based on computational ghost imaging (CGI) and orthogonal modulation. The CGI encrypts the secret image into an intensity vector rather than a complex-valued matrix. This will bring convenience for post-processing and transmission of the ciphertext. The orthogonal vectors are taken as the address codes to distinguish users and avoid cross-talk. Only the decryption key and the address code owned by an authorized user are matched, the secret image belonging to him/her could be extracted from the ciphertext. Therefore, there are two security levels in the encryption scheme. The feasibility and property are verified by numerical simulations.