• Title/Summary/Keyword: Function Block

Search Result 1,106, Processing Time 0.024 seconds

Kullback-Leibler Information of Consecutive Order Statistics

  • Kim, Ilmun;Park, Sangun
    • Communications for Statistical Applications and Methods
    • /
    • v.22 no.5
    • /
    • pp.487-494
    • /
    • 2015
  • A calculation of the Kullback-Leibler information of consecutive order statistics is complicated because it depends on a multi-dimensional integral. Park (2014) discussed a representation of the Kullback-Leibler information of the first r order statistics in terms of the hazard function and simplified the r-fold integral to a single integral. In this paper, we first express the Kullback-Leibler information in terms of the reversed hazard function. Then we establish a generalized result of Park (2014) to an arbitrary consecutive order statistics. We derive a single integral form of the Kullback-Leibler information of an arbitrary block of order statistics; in addition, its relation to the Fisher information of order statistics is discussed with numerical examples provided.

UNDERSTANDING NON-NEGATIVE MATRIX FACTORIZATION IN THE FRAMEWORK OF BREGMAN DIVERGENCE

  • KIM, KYUNGSUP
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.25 no.3
    • /
    • pp.107-116
    • /
    • 2021
  • We introduce optimization algorithms using Bregman Divergence for solving non-negative matrix factorization (NMF) problems. Bregman divergence is known a generalization of some divergences such as Frobenius norm and KL divergence and etc. Some algorithms can be applicable to not only NMF with Frobenius norm but also NMF with more general Bregman divergence. Matrix Factorization is a popular non-convex optimization problem, for which alternating minimization schemes are mostly used. We develop the Bregman proximal gradient method applicable for all NMF formulated in any Bregman divergences. In the derivation of NMF algorithm for Bregman divergence, we need to use majorization/minimization(MM) for a proper auxiliary function. We present algorithmic aspects of NMF for Bregman divergence by using MM of auxiliary function.

Efficient Hardware Architecture of SEED S-box for Smart Cards

  • Hwang, Joon-Ho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.4 no.4
    • /
    • pp.307-311
    • /
    • 2004
  • This paper presents an efficient architecture that optimizes the design of SEED S-box using composite field arithmetic. SEED is the Korean standard 128-bit block cipher algorithm developed by Korea Information Security Agency. The nonlinear function S-box is the most costly operation in terms. of size and power consumption, taking up more than 30% of the entire SEED circuit. Therefore the S-box design can become a crucial factor when implemented in systems where resources are limited such as smart cards. In this paper, we transform elements in $GF(2^8)$ to composite field $GF(((2^2)^2)^2)$ where more efficient computations can be implemented and transform the computed result back to $GF(2^8)$. This technique reduces the S-box portion to 15% and the entire SEED algorithm can be implemented at 8,700 gates using Samsung smart card CMOS technology.

Motion Estimation Using the Relation Between Rate and Distortion (부호화율과 일그러짐의 관계를 이용하는 움직임 추정)

  • 양경호;김태정;이충웅
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.29B no.8
    • /
    • pp.66-73
    • /
    • 1992
  • This paper proposes a new motion estimation algorithm which takes into account the rate-distortion relation in encoding motion compensated error images. The proposed algorithm is based on a new block-matching criterion which is the function of not only the mean squared block-matching error but also the code length for the entropy coded motion vector. The proposed algorithm optimizes the trade-off between the bit rate for motion compensated error images and the bit rate for the motion vectors. Simulation results show that in the motion compensated image coding the proposed motion estimator improves the overall performance by 0.5 dB when compared to the motion estimator which uses MSE only.

  • PDF

DCS Model Calculation for Steam Temperature System

  • Hwang, Jae-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1201-1204
    • /
    • 2004
  • This paper suggests a DCS (Distributed Control System) model for steam temperature system of the thermal power plant. The model calculated within sectional range is linear. In order to calculate mathematical models, the system is partitioned into two or three sectors according to its thermal conditions, that is, saturated water/steam and superheating state. It is divided into three sections; water supply, steam generation and steam heating loop. The steam heating loop is called 'superheater' or steam temperature system. Water spray supply is the control input. A first order linear model is extracted. For linear approach, sectional linearization is achieved. Modeling methodology is a decomposition-synthetic technique. Superheater is composed of several tube-blocks. For this block, linear input-output model is to be calculated. Each tiny model has its transfer function. By expanding these block models to total system, synthetic DCS linear models are derived. Control instrument include/exclude models are also considered. The resultant models include thermal combustion conditions, and applicable to practical plant engineering field.

  • PDF

A Low Power Multi-Function Digital Audio SoC

  • Lim, Chae-Duck;Lee, Kyo-Sik
    • Proceedings of the IEEK Conference
    • /
    • 2004.06b
    • /
    • pp.399-402
    • /
    • 2004
  • This paper presents a system-on-chip prototype implementing a full integration for a portable digital audio system. The chip is composed of a audio processor block to implements audio decoding and voice compression or decompression software, a system control block including 8-bit MCU core and Memory Management Unit (MMU) a low power 16-bit ${\Sigma}{\Delta}$ CODEC, two DC-to-BC converter, and a flash memory controller. In order to support other audio algorithms except Mask ROM type's fixed codes, a novel 16-bit fixed-point DSP core with the program-download architecture is proposed. Funker, an efficient power management technique such as task-based clock management is implemented to reduce power consumption for portable application. The proposed chip has been fabricated with a 4 metal 0.25um CMOS technology and the chip area is about 7.1 mm ${\times}$ 7.1mm with 100mW power dissipation at 2.5V power supply.

  • PDF

Experimental Analysis of the AES Encryption Algorithm (AES 암호화 알고리즘의 실험적 분석)

  • Oh, Ju-Young;Suh, Jin-Hyung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.2
    • /
    • pp.58-63
    • /
    • 2010
  • Cryptography is primarily a computationally intensive process. In this paper we expand AES scheme for analysis of computation time with four criteria, first is the compression of plain data, second is the variable size of block, third is the selectable round, fourth is the selective function of whole routine. We have tested our encryption scheme by c++ using MinGW GCC. Through extensive experimentations of our scheme we found that the optimal block size.

  • PDF

A study on analysis of thermal and electrical parameters of the ZnO arrester block (배전용 ZnO 피뢰기 소자의 열적/전기적 파라미터 분석에 관한 연구)

  • Lee, Bok-Hee;Lee, Su-Bong;Lee, Seung-Ju;Jeon, Byung-Wook;Kim, Dong-Sung
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2007.05a
    • /
    • pp.353-356
    • /
    • 2007
  • This paper presents the thermal and electrical characteristics of ZnO arrester blocks under the AC voltages. The leakage currents of ZnO arrester blocks were measured as a function of time. The temperature distributions of ZnO arrester blocks were observed by the forward looking infrared camera The degradation and thermal runaway of ZnO arrester blocks were closely related with the temperature limit of ZnO arrester blocks which decided heat generation and dissipation As a result, the degradation and thermal runaway of ZnO arrester blocks depend on the temperature and leakage current of ZnO arrester blocks.

  • PDF

OPTIMAL LIQUIDATION OF A LARGE BLOCK OF STOCK WITH REGIME SWITCHING

  • Shin, Dong-Hoon
    • Bulletin of the Korean Mathematical Society
    • /
    • v.48 no.4
    • /
    • pp.737-757
    • /
    • 2011
  • This work is concerned with an optimal selling rule for a large position of stock in a market. Selling a large block of stock in a short period typically depresses the market, which would result in a poor filling price. In addition, the large selling intensity makes the regime more likely to be poor state in the market. In this paper, regime switching and depressing terms associated with selling intensity are considered on a set of geometric Brownian models to capture movements of underlying asset. We also consider the liquidation strategy to sell much smaller number of shares in a long period. The goal is to maximize the overall return under state constraints. The corresponding value function with the selling strategy is shown to be a unique viscosity solution to the associated HJB equations. Optimal liquidation rules are characterized by a finite difference method. A numerical example is given to illustrate the result.

Legal Structure and Improvement Measures of Police Responsibility for Unlawful Information in the Cyberspace

  • Gu, Hyung-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.3
    • /
    • pp.105-111
    • /
    • 2016
  • Circulating various pieces of unlawful information that violate the law by leaking personal information or circulating violent/sexual materials or malignant programs in the cyberspace is unlawful, and blocking this beforehand is an important duty of the state. Preceding discussions on the legal restriction of unlawful information in the cyberspace have mostly been focused on the criminal responsibilities and civil responsibilities of information communications service providers, but this study has approached it with emphasis on the issue of police responsibility for the exercise of police authority to block unlawful information. It is because the principles of police responsibility to determine the target of police authority to block unlawful information provide the standards for the interpretation of existing laws and regulations and function as legislative principles for the enactment of new laws and regulations to prevent risks in the cyberspace.