• Title/Summary/Keyword: Log Law

Search Result 109, Processing Time 0.022 seconds

A SUPPLEMENT TO PRECISE ASYMPTOTICS IN THE LAW OF THE ITERATED LOGARITHM FOR SELF-NORMALIZED SUMS

  • Hwang, Kyo-Shin
    • Journal of the Korean Mathematical Society
    • /
    • v.45 no.6
    • /
    • pp.1601-1611
    • /
    • 2008
  • Let X, $X_1$, $X_2$, ... be i.i.d. random variables with zero means, variance one, and set $S_n\;=\;{\sum}^n_{i=1}\;X_i$, $n\;{\geq}\;1$. Gut and $Sp{\check{a}}taru$ [3] established the precise asymptotics in the law of the iterated logarithm and Li, Nguyen and Rosalsky [7] generalized their result under minimal conditions. If P($|S_n|\;{\geq}\;{\varepsilon}{\sqrt{2n\;{\log}\;{\log}\;n}}$) is replaced by E{$|S_n|/{\sqrt{n}}-{\varepsilon}{\sqrt{2\;{\log}\;{\log}\;n}$}+ in their results, the new one is called the moment version of precise asymptotics in the law of the iterated logarithm. We establish such a result for self-normalized sums, when X belongs to the domain of attraction of the normal law.

Analysis of vertical velocity distribution in natural rivers with ADCPs (ADCP를 이용한 자연하천의 연직유속분포 분석)

  • Lee, Hea-Eun;Lee, Chan-Joo;Kim, Yong-Jeon;Kim, Won
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.1865-1869
    • /
    • 2009
  • 본 연구에서는 ADCP를 이용하여 국내 하천에서의 연직유속분포 특성을 살펴보았다. 먼저, 김치영 등 (2004)의 10점법 측정 자료와의 비교를 통하여 power law와 log law로 ADCP의 측정불가역의 유속분포를 추정하는 방법을 검증하였다. 또한, 국내 하천의 다양한 흐름조건을 고려한 4개 지점, 총 26개 자료를 사용하여 각각의 ADCP 측정자료마다 최적의 power 식과 log 식을 구했으며, 이 식들로부터 구한 수심평균유속을 ADP-stationary (고정된 지수 1/6)의 평균유속과 비교하였다. 그 결과 power law로 ADCP 측정불가역을 외삽하는 경우 하천의 흐름에 적절한 지수를 사용했는지 여부가 평균유속의 정확도에 큰 영향을 미침을 확인하였다. 이에, Limerinos (1970)의 조도계수 계산식과 ISO (1997)에 제시된 power law 지수식을 토대로 측정 자료의 power law 지수와 하상재료, 수심의 상관관계를 살펴보았다.

  • PDF

Five layers in turbulent pipe flow (난류 파이프 유동 내 다섯 개의 영역)

  • Ahn, Junsun;Hwang, Jinyul
    • Journal of the Korean Society of Visualization
    • /
    • v.18 no.3
    • /
    • pp.109-115
    • /
    • 2020
  • Five layers in mean flow are proposed by using the direct numerical simulation data of turbulent pipe flow up to Reτ = 3008. Viscous sublayer, buffer layer, mesolayer, log layer and core region are investigated. In the buffer layer, the viscous force is counterbalanced by the turbulent inertia from the streamwise mean momentum balance, and a log law occurs here. The overlap layer is composed of the mesolayer and the log layer. Above the buffer layer, the non-negligible viscous force causes the power law, and this region is the mesolayer, where it is the lower part of the overlap layer. At the upper part of the overlap layer, where the viscous force itself becomes naturally negligible, the log layer will appear due to that the acceleration force of the large-scale motions increases as the Reynolds number increases. In the core region, the velocity-defect form is satisfied with the power-law scaling.

A Study of using Wall Function for Numerical Analysis of High Reynolds Number Turbulent Flow (고 레이놀즈수 유동의 수치해석시 벽함수 사용에 관한 연구)

  • Choi, Jung-Kyu;Kim, Hyoung-Tae
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.47 no.5
    • /
    • pp.647-655
    • /
    • 2010
  • In this paper, a numerical study is carried out for super-pipe, flat plate and axisymmetric body flows to investigate a validity of using wall function and high $y_1^+$ in calculation of high Reynolds number flow. The velocity profiles in boundary layer agree well with the law of the wall. And it is found that the range of $y^+$��which validated the logarithmic law of the wall grows with increasing Reynolds number. From the result, an equation is suggested that can be used to estimate a maximum $y^+$ value of validity of the log law. And the slope(1/$\kappa$) of the log region of the numerical result is larger than that of experimental data. On the other hand, as $y_1^+$ is increasing, both the friction and the pressure resistances tend to increase finely. When using $y_1^+$ value beyond the range of log law, the surface shear stress shows a significant error and the pressure resistance increases rapidly. However, when using $y_1^+$ value in the range, the computational result is reasonable. From this study, the use of the wall function with high value of $y_1^+$ can be justified for a full scale Reynolds number ship flow.

Prediction of Agricultural Wind and Gust Using Local Ensemble Prediction System (국지앙상블시스템을 활용한 농경지 바람 및 강풍 예측)

  • Jung Hyuk Kang;Geon-Hu Kim;Kyu Rang Kim
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.26 no.2
    • /
    • pp.115-125
    • /
    • 2024
  • Wind is a meteorological factor that has a significant impact on agriculture. Gust cause damage such as fruit drop and damage to facilities. In this study, low-altitude wind speed prediction was performed by applying physical models to Local Ensemble Prediction System (LENS). Logarithmic Law (LOG) and Power Law (POW) were used as the physical models, and Korea Ministry of Environment indicators and Moderate Resolution Imaging Spectroradiometer (MODIS) data were applied as indicator variables. We collected and verified wind and gust data at 3m altitude in 2022 operated by the Rural Development Administration, and presented the results in scatter plot, correlation coefficient, Root Mean Square Error (RMSE), Normalized Root Mean Square Error (NRMSE), and Threat Score (TS). The LOG-applied model showed better results in wind speed, and the POW-applied model showed better results in gust.

UWB Automobile Short Range Radar Receivers Performance In a Log-Normal Clutter Background (Log-Normal Clutter 환경에서 차량용 UWB 단거리 레이더 수신기의 성능분석)

  • Kumaravelu, Nandeeshkumar;Ko, Seok-Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.9
    • /
    • pp.59-64
    • /
    • 2011
  • Ultra wideband radars attract considerable attention as a short range automotive radar because of its high range resolution. Radar signal reflected from a target often contains unwanted echoes called as clutter, so the detection of target is difficult due to clutter echoes. Therefore, it is important to investigate the radar detector for better detecting from the reflected signals. In this paper, the optimal detector is obtained for various mean and variance value in log-normal clutter environment. The types of non-coherent detectors used are square law detector, linear detector, and logarithmic detector. The performances of detectors are compared in log normal clutter environment and the suitable detector is determined for automotive short range radar application.

브래드포드법칙과 그 응용에 관한 고찰

  • 이경호
    • Journal of Korean Library and Information Science Society
    • /
    • v.8
    • /
    • pp.127-154
    • /
    • 1981
  • Today's complicated society with a rapid change needs more objective and accurate data for the better managerical decisions and the prospect for the future other than the intuition or subjective experience by men themselves. These data can't be extracted without the analysis of actual data by a n.0, pplying any of mathematical techniques. One of these mathematical techniques, called bibliometrics has been newly developed in the field of library and information science to extract the objective data for the better services through the library operations. The Beadford's Law, one important law in bibliometrics has provided rather scientific and objective basis on the more valid building of library collection within the constraints of budget. The purpose of the study is to investigate the theory of the Bradford's Law, to clarify the possible areas of its a n.0, pplication, and to discern some problems in doing so. The results of the study can be summarized as follows; (1) There is certain difference between the graphical formulation and verbal formulation of Bradford's Law. But this law is very useful for the field of library and information science, owing to the flexibility of the a n.0, pplication of the law in the field. (2) The minimal nucleus can consist of a single periodical only if j, the number of relevant papers in the most productive journals is greater than Z/2. On the other hand, if j is less than or equal to Z/2, then the minimal nucleus will consist of 2 or more periodicals. (3) It is possible to design the most compact selection of scientific periodicals covering any specified percentage P among the total periodicals by using the formulation, log n=Plog N+(1-P)logs, or Nlog N/s=P center dot N log N/s. (4) If there is need to provide all the articles needed by users the given budget, the library can purchase the proper number of journals, by using the formulation, f center dot AN=An+PN (log N/s-logn/s). (5) In the building of the library collection based on the decreasing ratio of use, the library can subscribe to the proper number of journals according to the satisfactory degree of the need, by using the formulation, f=Nu+uNlogN/S-uNlogn/s / nNlogN/s = 1+logN/m /logN/s (6) If the order of valuable journals is decided according to the frequency of being cited, the order can't always represent the value. (7) The evaluation criteria for the journals with high value, but less cited should be made a further study.

  • PDF

An Inner Region Velocity-Profile Formula of Turbulent Flows on Smooth Bed (매끄러운 하상위 난류의 내부 영역 유속 분포 공식)

  • Yu Kwon-Kyu;Yoon Byung-Man
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.9 s.170
    • /
    • pp.737-744
    • /
    • 2006
  • The velocity of the inner region of turbulent flow on a smooth bed has complex profile which can not be described with a simple formula. Though there have been a couple of formulas describing the profile, most of them have very complex forms, i.e., with many terms, with integration form, or with implicit forms. It means that it is hard to use them or it is difficult to estimate their parameters. A new single formula that describes the velocity profile of the inner region of the turbulent flow on a smooth bed was proposed. This formula has a form of the traditional log-law multiplied by a damping function. Introducing only one additional parameter, it can describe the whole inner range nicely. It approximates the law-of-the-wall in the vicinity of the bed and approaches to the log-law in the overlap region. The added parameter, damping factor, can be estimated very easily. It is not sensitive to the Reynolds number change and the velocity profile calculated by the formula does not change much due to the change of the parameter.

IDENTICALLY DISTRIBUTED UNCORRELATED RANDOM VARIABLES NOT FULFILLING THE WLLN

  • Landers, Dieter;Rogge, Lothar
    • Bulletin of the Korean Mathematical Society
    • /
    • v.38 no.3
    • /
    • pp.605-610
    • /
    • 2001
  • It is shown that for each 1 < p < 2 there exist identically distributed uncorrelated random variables $X_n\; with\;E({$\mid$X_1$\mid$}^p)\;<\;{\infty}$, not fulfilling the weak law of large numbers (WLLN). If, however, the random variables are moreover non-negative, the weaker integrability condition $E(X_1\;log\;X_1)\;<\;{\infty}$ already guarantees the strong law of large numbers.

  • PDF

The Threat Analysis and Security Guide for Private Information in Web Log (웹 로그 데이터에 대한 개인정보 위협분석 및 보안 가이드)

  • Ryeo, Sung-Koo;Shim, Mi-Na;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.135-144
    • /
    • 2009
  • This paper discusses an issue of serious security risks at web log which contains private information, and suggests solutions to protect them. These days privacy is core information to produce value-added in information society. Its scope and type is expanded and is more important along with the growth of information society. Web log is a privacy information file enacted as law in South Korea. Web log is not protected properly in spite of that has private information It just is treated as residual product of web services. Many malicious people could gain private information in web log. This problem is occurred by no classified data and improper development of web application. This paper suggests the technical solutions which control data in development phase and minimizes that the private information stored in web log, and applies in operation environment. It is very efficient method to protect private information and to observe the law.