• Title/Summary/Keyword: Exponential Scheme

Search Result 156, Processing Time 0.027 seconds

A Discretization Method Via a Radial-Exponential Scheme in the Cylindrical Coordinate (원통좌표계에서 반경지수도식에 의한 이산화방법)

  • Kim, Charn-Jung
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.24 no.5
    • /
    • pp.694-698
    • /
    • 2000
  • In the cylindrical coordinate, the origin r = 0 plays a role of the singularity and thus much care is needed to treat near-origin region. This work presents a new numerical scheme which is derived from the exact solution under the one-dimensional assumption in the radial direction. It is shown that the near-origin region can be properly treated by the radial-exponential scheme, whereas the numerical results from the conventional exponential scheme deviate considerably from the exact solution. Over the region of small ($ {\delta}r_e/r_e$ the present radial-exponential scheme turns out to be almost the same as the exponential scheme.

Bayesian estimation for the exponential distribution based on generalized multiply Type-II hybrid censoring

  • Jeon, Young Eun;Kang, Suk-Bok
    • Communications for Statistical Applications and Methods
    • /
    • v.27 no.4
    • /
    • pp.413-430
    • /
    • 2020
  • The multiply Type-II hybrid censoring scheme is disadvantaged by an experiment time that is too long. To overcome this limitation, we propose a generalized multiply Type-II hybrid censoring scheme. Some estimators of the scale parameter of the exponential distribution are derived under a generalized multiply Type-II hybrid censoring scheme. First, the maximum likelihood estimator of the scale parameter of the exponential distribution is obtained under the proposed censoring scheme. Second, we obtain the Bayes estimators under different loss functions with a noninformative prior and an informative prior. We approximate the Bayes estimators by Lindleys approximation and the Tierney-Kadane method since the posterior distributions obtained by the two priors are complicated. In addition, the Bayes estimators are obtained by using the Markov Chain Monte Carlo samples. Finally, all proposed estimators are compared in the sense of the mean squared error through the Monte Carlo simulation and applied to real data.

A Remote User Authentication Scheme Using Smart Cards (스마트 카드를 이용한 원격 사용자 인증 방안)

  • 유종상;신인철
    • Proceedings of the IEEK Conference
    • /
    • 2001.06c
    • /
    • pp.51-54
    • /
    • 2001
  • Recently Hwang and Li[1] proposed a remote user authentication scheme using smart cards. Their scheme is based on the ElGamal public key cryptosystem and does not need to maintain a password table for verifying the legitimacy of the login users. In this paper, we proposed an advanced user authentication scheme using smart cards. Unlike Hwang and Li's scheme, smart card contains a pair of public parameters(h, P) where h is a hash function which is used in login phase. In result, we reduce one exponential computation frequency in login phase and two exponential computation frequencies in authentication phase with comparing the Hwang and Li's scheme. The proposed scheme not only provides the advantages as security of Hwang and Li's scheme, but also reduces computation cost.

  • PDF

A New Fault Diagnosis Scheme between L1 Signals Using IES on the Metric Defined via Kalman Filter and Exponential Function Transformation (칼만추정과 초월함수 사영을 통한 L1 신호간의 거리 Metric에 IES을 적용한 새로운 고장진단 기법)

  • Kim, Sung-Soo
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.64 no.1
    • /
    • pp.23-28
    • /
    • 2015
  • Measuring the distances between signals in the signal space is usually determined by obtaining the ideal metric which is not easy to obtain. In this research we have investigated the scheme that measures the distances between the signals constructed with the measured voltage signals connected to electric apparatus using Kalman filter and exponential mapping. The metric is defined on the feature signals obtained via the estimation process of a Kalman filter and the mapping process using the exponential transformation. Diagnosis is on the voltage fluctuations is applied to determining whether the system is in the stable state or not due to the unexpected accidents, such as power overcharge, discharge, outages flow may be the cause of the accident. The decision making scheme evaluated with respect to the effectiveness and the degree of complication with different variances. Two methods, the Hard Limit Threshold Scheme(HLTS) and the Interval Energy Scheme(IES) are proposed and compared. In experiments the IES shows better tolerance to impulse noise than the HLTS.

Low-Latency Handover Scheme Using Exponential Smoothing Method in WiBro Networks (와이브로 망에서 지수평활법을 이용한 핸드오버 지연 단축 기법)

  • Pyo, Se-Hwan;Choi, Yong-Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.3
    • /
    • pp.91-99
    • /
    • 2009
  • Development of high-speed Internet services and the increased supply of mobile devices have become the key factor for the acceleration of ubiquitous technology. WiBro system, formed with lP backbone network, is a MBWA technology which provides high-speed multimedia service in a possibly broader coverage than Wireless LAN can offer. Wireless telecommunication environment needs not only mobility support in Layer 2 but also mobility management protocol in Layer 3 and has to minimize handover latency to provide seamless mobile services. In this paper, we propose a fast cross-layer handover scheme based on signal strength prediction in WiBro environment. The signal strength is measured at regular intervals and future value of the strength is predicted by Exponential Smoothing Method. With the help of the prediction, layer-3 handover activities are able to occur prior to layer-2 handover, and therefore, total handover latency is reduced. Simulation results demonstrate that the proposed scheme predicts that future signal level accurately and reduces the total handover latency.

  • PDF

Estimation on Exponential Model with Limited Replacements

  • Cho, Kil-Ho;Cho, Jang-Sik;Jeong, Seong-Hwa
    • Journal of the Korean Data and Information Science Society
    • /
    • v.16 no.2
    • /
    • pp.457-465
    • /
    • 2005
  • We consider the estimation of parameter in the exponential model in the case that the number of replacements of failed items is limited. And the desirable number of replacements to give the similar effect as unlimited case in terms of the mean square errors is proposed.

  • PDF

An Exponential Indexing Scheme for Broadcast Disk Program in a Single Wireless Channel (단일 무선 채널에서 브로드캐스트 디스크 프로그램을 위한 지수 인덱스 기법)

  • Park, Ki-Young;Jung, Sung-Won
    • Journal of KIISE:Databases
    • /
    • v.35 no.6
    • /
    • pp.518-532
    • /
    • 2008
  • Broadcast scheme has been widely researched for efficient data delivery in the mobile environment because the downlink capacity of a mobile client is much greater than the uplink capacity, and the power of a mobile client is limited. In the proposed scheme, the index lets the client know when data items would be broadcasted and enables the client to minimize the tuning time and power consumption. Single channel index schemes are fit to flat broadcast that performs well when all the broadcasted data items are accessed with the same probability whereas the multi-disk broadcast scheme is proper when the data access distribution is skewed. The existing index schemes, however, cannot work on the Multi-disk broadcast scheme because they cannot point the replicating data items in a broadcast cycle. This paper proposes a Multi-disk Exponential Index (MDEI) which is a single channel index scheme fit to Multi-disk broadcast scheme. Because MDEI scheme organizes a separate index for each disk, it functions with multi-disk broadcast, resulting in a greater reduction of average access latency than that of other flat-broadcast index schemes when the data access distribution is skewed. The performance evaluation showed that MDEI has a good performance when data access distribution is skewed. MDEI has short average access latency and not much average tuning time when the data access distribution is skewed.

An Approximate Evidence Combination Scheme for Increased Efficiency (효율성 제고를 위한 근사적 증거병합 방법)

  • Lee, Gye-Sung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.337-340
    • /
    • 2001
  • A major impediment in using the Dempster-Shafer evidence combination scheme is its computational complexity, which in general is exponential since DS scheme allows any subsets over the frame of discernment as focal elements. To avoid this problem, we propose a method called approximate evidence combination scheme. This scheme is applied to a few sample applications and the experiment results are compared with those of VBS. The results show that the approximation scheme achieves a great amount of computational speedup and produces belief values within the range of deviation that the expert allows.

  • PDF

Estimation in the exponential distribution under progressive Type I interval censoring with semi-missing data

  • Shin, Hyejung;Lee, Kwangho
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.6
    • /
    • pp.1271-1277
    • /
    • 2012
  • In this paper, we propose an estimation method of the parameter in an exponential distribution based on a progressive Type I interval censored sample with semi-missing observation. The maximum likelihood estimator (MLE) of the parameter in the exponential distribution cannot be obtained explicitly because the intervals are not equal in length under the progressive Type I interval censored sample with semi-missing data. To obtain the MLE of the parameter for the sampling scheme, we propose a method by which progressive Type I interval censored sample with semi-missing data is converted to the progressive Type II interval censored sample. Consequently, the estimation procedures in the progressive Type II interval censored sample can be applied and we obtain the MLE of the parameter and survival function. It will be shown that the obtained estimators have good performance in terms of the mean square error (MSE) and mean integrated square error (MISE).

Design and Implementation of a new XML-Signcryption scheme to protect the XML document (XML 문서 보안을 위한 새로운 XML-Signcryption scheme 설계 및 구현)

  • Han, Myung-Jin;Lee, Young-Kyung;Shin, Jung-Hwa;Rhee, Kyung-Hyung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.405-412
    • /
    • 2003
  • As the XML is approved standard language by the UN, the progress which complemented the XML security has being processed rapidly. In this paper, we design and implement the "XML-Signcryption" as a security mechanism to protect the XML document that can operate between other platforms. The signature and encryption which is the standard specification in W3C needs to be able to proceed them separately. Generally the signature and encryption require four times modular exponential operation, however the signcryption only needed three times modular exponential operation. This will benefit overall system effectiveness in terms of cost. And this scheme offers to convenient the user, because the signature and encryption implement as a single XML format. This tool can save the parsing time as a number of tags is few within a document. And also, in this paper, based on a research of Web Services security, we can apply XML-Signcryption to the SOAP message to provide the security services. Based on the XML-Signcryption scheme which provides confidentiality, integrity, authentication and non-repudiation to the XML document and Web Service security simultaneously.