• 제목/요약/키워드: Exponential Scheme

검색결과 156건 처리시간 0.029초

원통좌표계에서 반경지수도식에 의한 이산화방법 (A Discretization Method Via a Radial-Exponential Scheme in the Cylindrical Coordinate)

  • 김찬중
    • 대한기계학회논문집B
    • /
    • 제24권5호
    • /
    • pp.694-698
    • /
    • 2000
  • In the cylindrical coordinate, the origin r = 0 plays a role of the singularity and thus much care is needed to treat near-origin region. This work presents a new numerical scheme which is derived from the exact solution under the one-dimensional assumption in the radial direction. It is shown that the near-origin region can be properly treated by the radial-exponential scheme, whereas the numerical results from the conventional exponential scheme deviate considerably from the exact solution. Over the region of small ($ {\delta}r_e/r_e$ the present radial-exponential scheme turns out to be almost the same as the exponential scheme.

Bayesian estimation for the exponential distribution based on generalized multiply Type-II hybrid censoring

  • Jeon, Young Eun;Kang, Suk-Bok
    • Communications for Statistical Applications and Methods
    • /
    • 제27권4호
    • /
    • pp.413-430
    • /
    • 2020
  • The multiply Type-II hybrid censoring scheme is disadvantaged by an experiment time that is too long. To overcome this limitation, we propose a generalized multiply Type-II hybrid censoring scheme. Some estimators of the scale parameter of the exponential distribution are derived under a generalized multiply Type-II hybrid censoring scheme. First, the maximum likelihood estimator of the scale parameter of the exponential distribution is obtained under the proposed censoring scheme. Second, we obtain the Bayes estimators under different loss functions with a noninformative prior and an informative prior. We approximate the Bayes estimators by Lindleys approximation and the Tierney-Kadane method since the posterior distributions obtained by the two priors are complicated. In addition, the Bayes estimators are obtained by using the Markov Chain Monte Carlo samples. Finally, all proposed estimators are compared in the sense of the mean squared error through the Monte Carlo simulation and applied to real data.

스마트 카드를 이용한 원격 사용자 인증 방안 (A Remote User Authentication Scheme Using Smart Cards)

  • 유종상;신인철
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(3)
    • /
    • pp.51-54
    • /
    • 2001
  • Recently Hwang and Li[1] proposed a remote user authentication scheme using smart cards. Their scheme is based on the ElGamal public key cryptosystem and does not need to maintain a password table for verifying the legitimacy of the login users. In this paper, we proposed an advanced user authentication scheme using smart cards. Unlike Hwang and Li's scheme, smart card contains a pair of public parameters(h, P) where h is a hash function which is used in login phase. In result, we reduce one exponential computation frequency in login phase and two exponential computation frequencies in authentication phase with comparing the Hwang and Li's scheme. The proposed scheme not only provides the advantages as security of Hwang and Li's scheme, but also reduces computation cost.

  • PDF

칼만추정과 초월함수 사영을 통한 L1 신호간의 거리 Metric에 IES을 적용한 새로운 고장진단 기법 (A New Fault Diagnosis Scheme between L1 Signals Using IES on the Metric Defined via Kalman Filter and Exponential Function Transformation)

  • 김성수
    • 전기학회논문지P
    • /
    • 제64권1호
    • /
    • pp.23-28
    • /
    • 2015
  • Measuring the distances between signals in the signal space is usually determined by obtaining the ideal metric which is not easy to obtain. In this research we have investigated the scheme that measures the distances between the signals constructed with the measured voltage signals connected to electric apparatus using Kalman filter and exponential mapping. The metric is defined on the feature signals obtained via the estimation process of a Kalman filter and the mapping process using the exponential transformation. Diagnosis is on the voltage fluctuations is applied to determining whether the system is in the stable state or not due to the unexpected accidents, such as power overcharge, discharge, outages flow may be the cause of the accident. The decision making scheme evaluated with respect to the effectiveness and the degree of complication with different variances. Two methods, the Hard Limit Threshold Scheme(HLTS) and the Interval Energy Scheme(IES) are proposed and compared. In experiments the IES shows better tolerance to impulse noise than the HLTS.

와이브로 망에서 지수평활법을 이용한 핸드오버 지연 단축 기법 (Low-Latency Handover Scheme Using Exponential Smoothing Method in WiBro Networks)

  • 표세환;최용훈
    • 한국ITS학회 논문지
    • /
    • 제8권3호
    • /
    • pp.91-99
    • /
    • 2009
  • 초고속 인터넷 서비스와 이동 통신의 발달, 그리고 Mobile Device 보급의 증가는 유비쿼터스(Ubiquitous) 기술의 발전을 촉진시키는 계기가 되었다. 와이브로 (WiBro, Wireless Broadband Internet) 시스템은 이동 중에도 무선 랜 (Wireless LAN) 보다 넓은 서비스 지원 영역에서 고속의 멀티미디어 서비스를 제공 받을 수 있는 MBWA(Mobile Broadband Wireless Access)기술이며, IP 기반의 백본 망(Backbone Network)로 구성된다. 이와 같은 무선 이동 통신 환경에서는 와이브로 시스템의 Layer 2(MAC Layer, Medium Access Control Layer)에서의 이동성 지원 기술뿐만 아니라 Layer 3(Network Layer)에서의 이동성 지원 프로토콜이 필요하며, 사용자가 이동 중에도 원활한 서비스를 제공받기 위해서는 핸드오버(Handovcr)의 지연 시간을 최소화 시켜야 한다. 따라서 본 논문에서는 IPv4 기반의 와이브로 망에서의 핸드오버 지연 단축 기법을 제안한다. 제안된 방법을 이동 단말(MS, Mobile Station)이 수신하는 신호 강도의 예측 값을 바탕으로 크로스 레이어 (Cross-Layer)기반의 고속 핸드오버 기법 (Fast Handover Scheme)을 적용하며, 지수평활법 (Exponential Smoothing Method)을 사용하여 예측 값을 계산한다. 모의 실험을 통해 기존의 방법과 제안된 방법을 비교, 분석하여 핸드오버 지연 시간의 단축을 증명한다.

  • PDF

Estimation on Exponential Model with Limited Replacements

  • Cho, Kil-Ho;Cho, Jang-Sik;Jeong, Seong-Hwa
    • Journal of the Korean Data and Information Science Society
    • /
    • 제16권2호
    • /
    • pp.457-465
    • /
    • 2005
  • We consider the estimation of parameter in the exponential model in the case that the number of replacements of failed items is limited. And the desirable number of replacements to give the similar effect as unlimited case in terms of the mean square errors is proposed.

  • PDF

단일 무선 채널에서 브로드캐스트 디스크 프로그램을 위한 지수 인덱스 기법 (An Exponential Indexing Scheme for Broadcast Disk Program in a Single Wireless Channel)

  • 박기영;정성원
    • 한국정보과학회논문지:데이타베이스
    • /
    • 제35권6호
    • /
    • pp.518-532
    • /
    • 2008
  • 모바일 환경에서는 상향링크와 하향링크의 대역특이 비대칭적이며 전력이 한정되어 있기 때문에 보다 효율적인 데이타 전송기술인 브로드캐스팅 방법이 연구되어 왔다. 브로드캐스트에서 인덱스를 사용하면 원하는 데이타가 언제 방송되는지를 알 수 있어 튜닝 시간을 줄이고, 전력의 소비를 줄일 수 있다. 지금까지 연구된 싱글 채널 인덱스 기법들은 모든 데이타 아이템이 동일한 확률로 접근되는 flat 브로드캐스트에 적합한 인덱스 기법들이다. 데이타 아이템에 대한 접근 확률이 편향되는 경우에는 멀티디스크 방송기법을 사용해야 효과적인 전송이 가능하나, 기존의 인덱스 기법들은 인덱스가 한 방송 주기 내에서 반복되어 방송되는 데이타 아이템을 가리킬 수 없기 때문에 멀티디스크 방송 기법에는 효과적이지 않다. 본 논문에서는 싱글 채널 인덱스 기법으로서 멀티디스크 방송에 적용되는 인덱스 기법인 MDEI (Multi-disk Exponential Index) 기법을 제안한다. 본 논문에서 제안하는 MDEI 기법은 각 디스크 별로 인덱스를 구성하기 때문에, 데이타에 대한 접근확률이 편향되는 경우에 flat 브로드캐스트를 사용하는 다른 인덱스 기법들보다 평균 접근 지연시간 시간을 크게 줄일 수 있다. 실험 결과는 데이타에 대한 접근 확률이 편향된 환경에서 MDEI가 평균 접근 지연시간에 있어서 매우 좋은 성능을 갖는 것을 보여준다.

효율성 제고를 위한 근사적 증거병합 방법 (An Approximate Evidence Combination Scheme for Increased Efficiency)

  • 이계성
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2001년도 춘계학술발표논문집 (상)
    • /
    • pp.337-340
    • /
    • 2001
  • A major impediment in using the Dempster-Shafer evidence combination scheme is its computational complexity, which in general is exponential since DS scheme allows any subsets over the frame of discernment as focal elements. To avoid this problem, we propose a method called approximate evidence combination scheme. This scheme is applied to a few sample applications and the experiment results are compared with those of VBS. The results show that the approximation scheme achieves a great amount of computational speedup and produces belief values within the range of deviation that the expert allows.

  • PDF

Estimation in the exponential distribution under progressive Type I interval censoring with semi-missing data

  • Shin, Hyejung;Lee, Kwangho
    • Journal of the Korean Data and Information Science Society
    • /
    • 제23권6호
    • /
    • pp.1271-1277
    • /
    • 2012
  • In this paper, we propose an estimation method of the parameter in an exponential distribution based on a progressive Type I interval censored sample with semi-missing observation. The maximum likelihood estimator (MLE) of the parameter in the exponential distribution cannot be obtained explicitly because the intervals are not equal in length under the progressive Type I interval censored sample with semi-missing data. To obtain the MLE of the parameter for the sampling scheme, we propose a method by which progressive Type I interval censored sample with semi-missing data is converted to the progressive Type II interval censored sample. Consequently, the estimation procedures in the progressive Type II interval censored sample can be applied and we obtain the MLE of the parameter and survival function. It will be shown that the obtained estimators have good performance in terms of the mean square error (MSE) and mean integrated square error (MISE).

XML 문서 보안을 위한 새로운 XML-Signcryption scheme 설계 및 구현 (Design and Implementation of a new XML-Signcryption scheme to protect the XML document)

  • 한명진;이영경;신정화;이경헌
    • 정보처리학회논문지C
    • /
    • 제10C권4호
    • /
    • pp.405-412
    • /
    • 2003
  • As the XML is approved standard language by the UN, the progress which complemented the XML security has being processed rapidly. In this paper, we design and implement the "XML-Signcryption" as a security mechanism to protect the XML document that can operate between other platforms. The signature and encryption which is the standard specification in W3C needs to be able to proceed them separately. Generally the signature and encryption require four times modular exponential operation, however the signcryption only needed three times modular exponential operation. This will benefit overall system effectiveness in terms of cost. And this scheme offers to convenient the user, because the signature and encryption implement as a single XML format. This tool can save the parsing time as a number of tags is few within a document. And also, in this paper, based on a research of Web Services security, we can apply XML-Signcryption to the SOAP message to provide the security services. Based on the XML-Signcryption scheme which provides confidentiality, integrity, authentication and non-repudiation to the XML document and Web Service security simultaneously.