• Title/Summary/Keyword: Discrete Support

Search Result 164, Processing Time 0.026 seconds

Study on the Treatment of Benign Prostatic Hyperplasia(BPH) in Oriental Medicine (전립선비대증 치료의 한의학적 접근방법에 관한 연구)

  • Kim, Joong-Kil;Song, Bong-Keun;Lee, Eun-Jeong;Kim, Hyeong-Kyun
    • The Journal of Korean Medicine
    • /
    • v.19 no.2
    • /
    • pp.211-227
    • /
    • 1998
  • Benign Prostatic Hyperplasia(BPH) is the most common benign tumor seen in the western male, and it is found in 50% of men over 50 years of age. It is characterized by the formation of large discrete lesions in the periurethral region. As they enlarge, these nodules tend to compress the urethra and cause partial or almost complete obstruction of .urine flow. The etiology of BPH is uncertain, but the increasing incidence with advancing age suggests the possibility of an imbalance between male and female sex hormones. In the past, most patients have had multiple indications to support the decision to initiate therapy. But both the urologic surgeon and the patient must be clearly aware of the results that can be expected and the risks involved in achieving them. The aims of this study are to investigate and summarize the current trends of treatment for BPH so as to suggest the effective and available way to treat the disease. In Oriental medicine, the BPH is recognized as uroschesis and ischuria, and the etiology is mainly in stagnated blood and insufficiency of the kidneys. The point of treatment of BPH is recovery of urination, and the treatment can be approached in two ways through herb drugs and acupuncture. Some of the herb drugs have substances which reduce BPB. Acupuncture therapy stimulates the pelvic plexus and is reported to be effective for voiding. Suppository, massotherapy, rectal injection, locus injection and attachment of herb drugs to the navel or the acupoint are announced as the effective treatments. So, this study of the approach and application of these treatments on BPH would be necessary.

  • PDF

Design of MPEG-2 Video Decoder Compliance Test Bitstreams (MPEG-2 비디오 디코더 적합성 검사용 비트열의 제작)

  • Kim, Chul-Min;Lee, Byung-Uk;Park, Rae-Hong
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.10
    • /
    • pp.83-93
    • /
    • 1999
  • In MPEG-2 video standard, there are many parameters to support profiles and levels. It is necessary to verify that a decoder is compliant with the MPEG-2 standard. This paper proposes a design principle of the test bitstreams which confirms that an MPEG video decoder is correct by observing the final image of the decoder under test. The presented test bitstream is composed of two parts. The first part generates a test pattern by varying a selected test parameter. And the following predictive coded picture generates a complementary pattern to the previous image by motion compensation and DCT coefficients. Then it will result in a uniform pattern. We present several bitstreams following the proposed principle. Also we analyze and compare the characteristics of the test bitstreams presented in the MPEG conformance test and the proposed test bistreams.

  • PDF

Design and Implementation of Real-Time Parallel Engine for Discrete Event Wargame Simulation (이산사건 워게임 시뮬레이션을 위한 실시간 병렬 엔진의 설계 및 구현)

  • Kim, Jin-Soo;Kim, Dae-Seog;Kim, Jung-Guk;Ryu, Keun-Ho
    • The KIPS Transactions:PartA
    • /
    • v.10A no.2
    • /
    • pp.111-122
    • /
    • 2003
  • Military wargame simulation models must support the HLA in order to facilitate interoperability with other simulations, and using parallel simulation engines offer efficiency in reducing system overhead generated by propelling interoperability. However, legacy military simulation model engines process events using sequential event-driven method. This is due to problems generated by parallel processing such as synchronous reference to global data domains. Additionally. using legacy simulation platforms result in insufficient utilization of multiple CPUs even if a multiple CPU system is under use. Therefore, in this paper, we propose conversing the simulation engine to an object model-based parallel simulation engine to ensure military wargame model's improved system processing capability, synchronous reference to global data domains, external simulation time processing, and the sequence of parallel-processed events during a crash recovery. The converted parallel simulation engine is designed and implemented to enable parallel execution on a multiple CPU system (SMP).

Efficient and General PVSS Based on ElGamal Encryption

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.375-388
    • /
    • 2012
  • PVSS stands for publicly verifiable secret sharing. In PVSS, a dealer shares a secret among multiple share holders. He encrypts the shares using the shareholders' encryption algorithms and publicly proves that the encrypted shares are valid. Most of the existing PVSS schemes do not employ an ElGamal encryption to encrypt the shares. Instead, they usually employ other encryption algorithms like a RSA encryption and Paillier encryption. Those encryption algorithms do not support the shareholders' encryption algorithms to employ the same decryption modulus. As a result, PVSS based on those encryption algorithms must employ additional range proofs to guarantee the validity of the shares obtained by the shareholders. Although the shareholders can employ ElGamal encryptions with the same decryption modulus in PVSS such that the range proof can be avoided, there are only two PVSS schemes based on ElGamal encryption. Moreover, the two schemes have their drawbacks. One of them employs a costly repeating-proof mechanism, which needs to repeat the dealer's proof at least scores of times to achieve satisfactory soundness. The other requires that the dealer must know the discrete logarithm of the secret to share and thus weakens the generality and it cannot be employed in many applications. A new PVSS scheme based on an ElGamal encryption is proposed in this paper. It employs the same decryption modulus for all the shareholders' ElGamal encryption algorithms, so it does not need any range proof. Moreover, it is a general PVSS technique without any special limitation. Finally, an encryption-improving technique is proposed to achieve very high efficiency in the new PVSS scheme. It only needs a number of exponentiations in large cyclic groups that are linear in the number of the shareholders, while all the existing PVSS schemes need at least a number of exponentiations in large cyclic groups that are linear in the square of the number of the shareholders.

Formation and Progression of Intermetallic phase on Iron Base Alloy PTA weld overlay in Molten Zn Alloys (용융 Zn 합금에서 Fe합금의 PTA 오버레이 용접 금속간 상의 형성과 진행)

  • Zulkarnain, Zulkarnain;Baek, E.R.
    • Proceedings of the KWS Conference
    • /
    • 2009.11a
    • /
    • pp.95-95
    • /
    • 2009
  • Zinc coatings provide the most effective and economical way of protecting steel against corrosion. There are three types of galvanizing lines typically used in production line in galvanizing industries,Galvanize (GI) coating (Zn-0.1-0.3%Al), Galfan coating (Zn-5%Al), Galvalume(GL) coating (45%Zn-Al). In continuous Galvanizing lines, the immersed bath hardware (e.g. bearings, sink, stabilizer, and corrector rolls, and also support roll arms and snout tip) are subjected to corrosion and wear failure. Understanding the reaction of these materials with the molten Zn alloy is becomes scientific and commercial interest. To investigate the reaction with molten Zn alloys, static immersion test performed for 4, 8, 16, and 24 Hr. Two different baths used for the static immersion, which are molten Zn and molten Zn-55%Al. Microstructures characterization of each of the materials and intermetallic layer formed in the reaction zone was performed using optical microscope, SEM and EDS. The thickness of the reaction layer is examined using image analysis to determine the kinetics of the reaction. The phase dominated by two distinct phase which are eutectic carbide and matrix. The morphology of the intermetallic phase formed by molten Zn is discrete phase showing high dissolution of the material, and the intermetallic phase formed by Zn-55wt%Al is continuous. Aluminum reacts readily with the materials compare to Zinc, forming iron aluminide intermetallic layer ($Fe_2Al_5$) at the interface and leaving zinc behind.

  • PDF

Detection of tonal frequency of underwater radiated noise via atomic norm minimization (Atomic norm minimization을 통한 수중 방사 소음 신호의 토널 주파수 탐지)

  • Kim, Junhan;Kim, Jinhong;Shim, Byonghyo;Hong, Jungpyo;Kim, Seongil;Hong, Wooyoung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.5
    • /
    • pp.543-548
    • /
    • 2019
  • The tonal signal caused by the machinery component of a vessel such as an engine, gearbox, and support elements, can be modeled as a sparse signal in the frequency domain. Recently, compressive sensing based techniques that recover an original signal using a small number of measurements in a short period of time, have been applied for the tonal frequency detection. These techniques, however, cannot avoid a basis mismatch error caused by the discretization of the frequency domain. In this paper, we propose a method to detect the tonal frequency with a small number of measurements in the continuous domain by using the atomic norm minimization technique. From the simulation results, we demonstrate that the proposed technique outperforms conventional methods in terms of the exact recovery ratio and mean square error.

The Study of Industrial Trends in Power Semiconductor Industry (전력용반도체 산업분석 및 시사점)

  • Chun, Hwang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.845-848
    • /
    • 2009
  • Power semiconductor devices are semiconductor devices used as switches or rectifiers in power electronics circuits. Theyare also caleed power devices or when used in integrated circuits, called power ICs. Some common power devices are the power diode, thyristor, power MOSFET and IGBT (insulated gate bipolar transistor). A power diode or MOSFET operates on similar principles to its low-power counterpart, but is able to carry a larger amount of current and typically is able to support a larger reverse-bias voltage in the off-state. Structural changes are often made in power devices to accommodate the higher current density, higher power dissipation and/or higher reverse breakdown voltage. The vast majority of the discrete (i.e non integrated) power devices are built using a vertical structure, whereas small-signal devices employ a lateral structure. With the vertical structure, the current rating of the device is proportional to its area, and the voltage blocking capability is achieved in the height of the die. With this structure, one of the connections of the device is located on the bottom of the semiconductor.

  • PDF

Improving Extensibility of DEVS Simulation Environment with Model Base by using Event Control Model Templates (이벤트 제어 모델 템플릿을 사용한 모델 라이브러리 기반 DEVS 시뮬레이션 환경의 확장성 개선)

  • Kwon, Se Jung;Lee, Jun Hee;Choi, Changbeom;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.91-99
    • /
    • 2018
  • Discrete event simulation environments often need to be modified because additional questions to systems may become apparent while observing the simulation results repeatedly. It leads to increasing development budget and depreciating the effectiveness of the environment. To avoid the modifications and to generate the altered results, this paper applies an Event Control Model (ECM) with control functions that modulate, delete and generate the events at the simulation time. In addition, this paper suggests an easier approach for domain-users, who do not want to program at source code level, by using ECM templates. The simulators with the ECMs can have better extensibility because it becomes more adaptable to possibly unanticipated changes. It prevents increasing development costs due to modifications or development of new models by M&S experts, and it provides a new alternative step to domain users. To support the effectiveness of this approach, this paper describes a relevant example, which is composed of an initial simulation model based on our empirical studies. It will show that there exist the uncountable benefits because the existing simulator is reused by domain users without new projects.

Energetic Electron and Proton Interactions with Pc5 Ultra Low Frequency (ULF) Waves during the Great Geomagnetic Storm of 15-16 July 2000

  • Lee, Eunah;Mann, Ian R.;Ozeke, Louis G.
    • Journal of Astronomy and Space Sciences
    • /
    • v.39 no.4
    • /
    • pp.145-158
    • /
    • 2022
  • The dynamics of the outer zone radiation belt has received a lot of attention mainly due to the correlation between the occurrence of enhancing relativistic electron flux and spacecraft operation anomalies or even failures (e.g., Baker et al. 1994). Relativistic electron events are often observed during great storms associated with ultra low frequency (ULF) waves. For example, a large buildup of relativistic electrons was observed during the great storm of March 24, 1991 (e.g., Li et al. 1993; Hudson et al. 1995; Mann et al. 2013). However, the dominant processes which accelerate magnetospheric radiation belt electrons to MeV energies are not well understood. In this paper, we present observations of Pc5 ULF waves in the recovery phase of the Bastille day storm of July 16, 2000 and electron and proton flux simultaneously oscillating with the same frequencies as the waves. The mechanism for the observed electron and proton flux modulations is examined using ground-based and satellite observations. During this storm time, multiple packets of discrete frequency Pc5 ULF waves appeared associated with energetic particle flux oscillations. We model the drift paths of electrons and protons to determine if the particles drift through the ULF wave to understand why some particle fluxes are modulated by the ULF waves and others are not. We also analyze the flux oscillations of electrons and protons as a function of energy to determine if the particle modulations are caused by a ULF wave drift resonance or advection of a particle density gradient. We suggest that the energetic electron and proton modulations by Pc5 ULF waves provide further evidence in support of the important role that ULF waves play in outer radiation belt dyanamics during storm times.

A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB

  • Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2021
  • The enormous prevalence of transferring official confidential digital documents via the Internet shows the urgent need to deliver confidential messages to the recipient without letting any unauthorized person to know contents of the secret messages or detect there existence . Several Steganography techniques such as the least significant Bit (LSB), Secure Cover Selection (SCS), Discrete Cosine Transform (DCT) and Palette Based (PB) were applied to prevent any intruder from analyzing and getting the secret transferred message. The utilized steganography methods should defiance the challenges of Steganalysis techniques in term of analysis and detection. This paper presents a novel and robust framework for color image steganography that combines Linear Congruential Generator (LCG), simulated annealing (SA), Cesar cryptography and LSB substitution method in one system in order to reduce the objection of Steganalysis and deliver data securely to their destination. SA with the support of LCG finds out the optimal minimum sniffing path inside a cover color image (RGB) then the confidential message will be encrypt and embedded within the RGB image path as a host medium by using Cesar and LSB procedures. Embedding and extraction processes of secret message require a common knowledge between sender and receiver; that knowledge are represented by SA initialization parameters, LCG seed, Cesar key agreement and secret message length. Steganalysis intruder will not understand or detect the secret message inside the host image without the correct knowledge about the manipulation process. The constructed system satisfies the main requirements of image steganography in term of robustness against confidential message extraction, high quality visual appearance, little mean square error (MSE) and high peak signal noise ratio (PSNR).