• Title/Summary/Keyword: EM Algorithm

Search Result 376, Processing Time 0.023 seconds

Study for generation of standard EM field using 8 ports-variable wave impedance generator (8단자 가변 임피던스 전자파 발생 장치를 이용한 표준 복사 전자기장 조성 연구)

  • 윤재훈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.3
    • /
    • pp.771-783
    • /
    • 1996
  • A desing technique of 8 ports variable wave impedance generator (8P-VWIG) is described. The design technique employs not only a numerical algorithm to find the structure with arbitrary characteristic impedance, but also a numerical solution to analyze the uniform elementrognentic fields established inside the generator. The 8P-VWIG so obtained is shown to have good performance with the VSWR of less than 1.4 at any frequency of interest below which higher order mode begin to propagate. The measured first resonant frequency is 152.1 MHz. The 8P-VWIG is designed based on the concept of an expanded multi-transmission line(8 channel). It is especially useful for the electronmagnetic interference(EMI) and electronmagnetic susceptibility(EMS) testing since it maximizes usable test crosssectional area, and its is easy change the polarization, vertical or horizontal, of field.

  • PDF

Efficient crosswell EM Tomography using localized nonlinear approximation

  • Kim Hee Joon;Song Yoonho;Lee Ki Ha;Wilt Michael J.
    • Geophysics and Geophysical Exploration
    • /
    • v.7 no.1
    • /
    • pp.51-55
    • /
    • 2004
  • This paper presents a fast and stable imaging scheme using the localized nonlinear (LN) approximation of integral equation (IE) solutions for inverting electromagnetic data obtained in a crosswell survey. The medium is assumed to be cylindrically symmetric about a source borehole, and to maintain the symmetry a vertical magnetic dipole is used as a source. To find an optimum balance between data fitting and smoothness constraint, we introduce an automatic selection scheme for a Lagrange multiplier, which is sought at each iteration with a least misfit criterion. In this selection scheme, the IE algorithm is quite attractive for saving computing time because Green's functions, whose calculation is a most time-consuming part in IE methods, are repeatedly re-usable throughout the inversion process. The inversion scheme using the LN approximation has been tested to show its stability and efficiency, using both synthetic and field data. The inverted image derived from the field data, collected in a pilot experiment of water-flood monitoring in an oil field, is successfully compared with that derived by a 2.5-dimensional inversion scheme.

Minimisation Technique for Seismic Noise Using a Neural Network (인공신경망을 이용한 탄성파 잡음제거)

  • Hwang Hak Soo;Lee Sang Kyu;Lee Tai Sup;Sung Nak Hoon
    • Geophysics and Geophysical Exploration
    • /
    • v.3 no.3
    • /
    • pp.83-87
    • /
    • 2000
  • The noise prediction filter using a local/remote reference was developed to obtain a high quality data from seismic surveys over the area where seismic transmission power is limited. The method used in the noise prediction filter is a 3-layer neural network whose algorithm is backpropagation. A NRF (Noise Reduction Factor) value of about 3.0 was obtained with appling training and test data to the trained noise prediction filter. However, the scaling technique generally used for minimizing EM noise from electric and electromagnetic data cannot reduce seismic noise, since the technique can allow only amplitude difference between two time series measured at the primary and reference sites.

  • PDF

Functional clustering for clubfoot data: A case study (클럽발 자료를 위한 함수적 군집 분석: 사례연구)

  • Lee, Miae;Lim, Johan;Park, Chungun;Lee, Kyeong Eun
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.5
    • /
    • pp.1069-1077
    • /
    • 2014
  • A clubfoot is a kind of congenital deformity of foot, which is internally rotated at the ankle. In this paper, we are going to cluster the curves of relative differences between regular and operated feet. Since these curves are irregular and sparsely sampled, general clustering models could not be applied. So the clustering model for sparsely sampled functional data by James and Sugar (2003) are applied and parameters are estimated using EM algorithm. The number of clusters is determined by the distortion function (Sugar and James, 2003) and two clusters of the curves are found.

Reliability Modeling and Analysis for a Unit with Multiple Causes of Failure (다수의 고장 원인을 갖는 기기의 신뢰성 모형화 및 분석)

  • Baek, Sang-Yeop;Lim, Tae-Jin;Lie, Chang-Hoon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.21 no.4
    • /
    • pp.609-628
    • /
    • 1995
  • This paper presents a reliability model and a data-analytic procedure for a repairable unit subject to failures due to multiple non-identifiable causes. We regard a failure cause as a state and assume the life distribution for each cause to be exponential. Then we represent the dependency among the causes by a Markov switching model(MSM) and estimate the transition probabilities and failure rates by maximum likelihood(ML) method. The failure data are incomplete due to masked causes of failures. We propose a specific version of EM(expectation and maximization) algorithm for finding maximum likelihood estimator(MLE) under this situation. We also develop statistical procedures for determining the number of significant states and for testing independency between state transitions. Our model requires only the successive failure times of a unit to perform the statistical analysis. It works well even when the causes of failures are fully masked, which overcomes the major deficiency of competing risk models. It does not require the assumption of stationarity or independency which is essential in mixture models. The stationary probabilities of states can be easily calculated from the transition probabilities estimated in our model, so it covers mixture models in general. The results of simulations show the consistency of estimation and accuracy gradually increasing according to the difference of failure rates and the frequency of transitions among the states.

  • PDF

Development of Measurement System for Industrial Transportable Gamma Ray CT (이동 형 산업용 단층측정 장치를 위한 감마선 검출시스템 개발)

  • Kim, Jong-Bum;Jung, Sung-Hee;Moon, Jin-Ho
    • Journal of Radiation Industry
    • /
    • v.6 no.3
    • /
    • pp.231-237
    • /
    • 2012
  • This paper introduces a gamma-ray measurement system for a transportable tomography which is applicable for an industrial process diagnosis. The gamma-ray measurement system consists of pulse mode operating 72 channel CsI detectors, main AMP-pulse shaper, single channel analyzer, counter and control PC. The CsI crystal is coupled with a PIN diode which is connected to an amplifier and pulse shaper. For a compact design, the amplifier and pulse shaping circuit are included in a single package. 36 sets of CsI detectors are connected to a multi-channel counter through single channel analyzers. A computer controls and collects data from two multi-channel counters. This configuration results in 72 channel counting system in total. The CT rotator and radiation measurement system are controlled by a PC with LabVIEW program. Tomographic data were measured for a phantom by the measurement system and transportable gamma-ray CT. From the experimental data image reconstructions were performed by ML-EM algorithm. The result showed that the CsI detector system can be a suitable component for transportable gamma-ray CT system.

An Experimental Fault Injection Attack on RSA Cryptosystem using Abnormal Source Voltage (비정상 전원 전압을 이용한 RSA 암호 시스템의 실험적 오류 주입 공격)

  • Park, Jea-Hoon;Moon, Sang-Jae;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.195-200
    • /
    • 2009
  • CRT-based RSA algorithm, which was implemented on smartcard, microcontroller and so on, leakages secret primes p and q by fault attacks using laser injection, EM radiation, ion beam injection, voltage glitch injection and so on. Among the many fault injection methods, voltage glitch can be injected to target device without any modification, so more practical. In this paper, we made an experiment on the fault injection attack using abnormal source voltage. As a result, CRT-RSA's secret prime p and q are disclosed by fault attack with voltage glitch injection which was introduced by several previous papers, and also succeed the fault attack with source voltage blocking for proper period.

Performance Evaluation on the Learning Algorithm for Automatic Classification of Q&A Documents (고객 질의 문서 자동 분류를 위한 학습 알고리즘 성능 평가)

  • Choi Jung-Min;Lee Byoung-Soo
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.133-138
    • /
    • 2006
  • Electric commerce of surpassing the traditional one appeared before the public and has currently led the change in the management of enterprises. To establish and maintain good relations with customers, electric commerce has various channels for customers that understand what they want to and suggest it to them. The bulletin board and e-mail among em are inbound information that enterprises can directly listen to customers' opinions and are different from other channels in characters. Enterprises can effectively manage the bulletin board and e-mail by understanding customers' ideas as many as possible and provide them with optimum answers. It is one of the important factors to improve the reliability of the notice board and e-mail as well as the whole electric commerce. Therefore this thesis researches into methods to classify various kinds of documents automatically in electric commerce; they are possible to solve existing problems of the bulletin board and e-mail, to operate effectively and to manage systematically. Moreover, it researches what the most suitable algorithm is in the automatic classification of Q&A documents by experiment the classifying performance of Naive Bayesian, TFIDF, Neural Network, k-NN

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.

Statistical Algorithm in Genetic Linkage Based on Haplotypes (일배체형에 기초한 연쇄분석의 통계학적 알고리즘 연구)

  • Kim, Jin-Heum;Kang, Dae-Ryong;Lee, Yun-Kyung;Shin, Sun-Mi;Suh, Il;Nam, Chung-Mo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.37 no.4
    • /
    • pp.366-372
    • /
    • 2004
  • Objectives : This study was conducted to propose a new transmission/disequilibrium test(TDT) to test the linkage between genetic markers and disease-susceptibility genes based on haplotypes. Simulation studies were performed to compare the proposed method with that of Zhao et al. in terms of type I error probability and powers. Methods : We estimated the haplotype frequencies using the expectation-maximization(EM) algorithm with parents genotypes taken from a trio dataset, and then constructed a two-way contingency table containing estimated frequencies to all possible pairs of parents haplotypes. We proposed a score test based on differences between column marginals and their corresponding row marginals. The test also involved a covariance structure of marginal differences and their variances. In simulation, we considered a coalescent model with three genetic markers of biallele to investigate the performance of the proposed test under six different configurations. Results : The haplotype-based TDT statistics, our test and Zhao et al.'s test satisfied a type I error probability, but the TDT test based on single locus showed a conservative trend. As expected, the tests based on haplotypes also had better powers than those based on single locus. Our test and that of Zhao et al. were comparable in powers. Conclusion : We proposed a TDT statistic based on haplotypes and showed through simulations that our test was more powerful than the single locus-based test. We will extend our method to multiplex data with affected and/or unaffected sibling(s) or simplex data having only one parent s genotype.