• Title/Summary/Keyword: Log interpolation

Search Result 23, Processing Time 0.033 seconds

Block Interpolation Search (블록 보간 탐색법)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.157-163
    • /
    • 2017
  • The binary and interpolation search algorithms are the most famous among search area algorithms, the former running in $O(log_2n)$ on average, and the latter in $O(log_2log_2n)$ on average and O(n) at worst. Also, the interpolation search use only the probability of key value location without priori information. This paper proposes another search algorithm, which I term a 'hybrid block and interpolation search'. This algorithm employs the block search, a method by which MSB index of a data is determined as a block, and the interpolation search to find the exact location of the key. The proposed algorithm reduces the search range with priori information and search the reduced range with uninformed situation. Experimental results show that the algorithm has a time complexity of $O(log_2log_2n_i)$, $n_i{\simeq}0.1n$ both on average and at worst through utilization of previously acquired information on the block search. The proposed algorithm has proved to be approximately 10 times faster than the interpolation search on average.

Comparison of Univariate Kriging Algorithms for GIS-based Thematic Mapping with Ground Survey Data (현장 조사 자료를 이용한 GIS 기반 주제도 작성을 위한 단변량 크리깅 기법의 비교)

  • Park, No-Wook
    • Korean Journal of Remote Sensing
    • /
    • v.25 no.4
    • /
    • pp.321-338
    • /
    • 2009
  • The objective of this paper is to compare spatial prediction capabilities of univariate kriging algorithms for generating GIS-based thematic maps from ground survey data with asymmetric distributions. Four univariate kriging algorithms including traditional ordinary kriging, three non-linear transform-based kriging algorithms such as log-normal kriging, multi-Gaussian kriging and indicator kriging are applied for spatial interpolation of geochemical As and Pb elements. Cross validation based on a leave-one-out approach is applied and then prediction errors are computed. The impact of the sampling density of the ground survey data on the prediction errors are also investigated. Through the case study, indicator kriging showed the smallest prediction errors and superior prediction capabilities of very low and very high values. Other non-linear transform based kriging algorithms yielded better prediction capabilities than traditional ordinary kriging. Log-normal kriging which has been widely applied, however, produced biased estimation results (overall, overestimation). It is expected that such quantitative comparison results would be effectively used for the selection of an optimal kriging algorithm for spatial interpolation of ground survey data with asymmetric distributions.

Generation of Time Series Data from Octave Bandwidth SPL of Acoustic Loading Using Interpolation Method (보간법을 이용한 옥타브 밴드폭 음향 하중 SPL의 시계열 데이터 생성)

  • Go, Eun-Su;Kim, In-Gul;Jeon, Minhyeok;Cho, Hyun-Jun;Park, Jae-Sang;Kim, Min-Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.1
    • /
    • pp.1-11
    • /
    • 2021
  • Thermal protection system structures such as double-panel structures are used on the skin of the fuselage and wings to prevent the transfer of high heat into the interior of an high supersonic/hypersonic aircraft. The thin-walled double-panel skin can be exposed to acoustic loads by high power engine noise and jet flow noise, which can cause sonic fatigue damage. In order to predict the fatigue life of the skin, the octave bandwidth SPL should be calculated as narrow bandwidth PSD or acoustic load history using interpolation method. In this paper, a method of converting the octave bandwidth SPL acoustic load into a narrow bandwidth PSD and reconstructed acoustic load history was investigated. The octave bandwidth SPL was converted to the narrow bandwidth PSD using various interpolation methods such as flat, log and linear scale, and the probabilistic characteristics and fatigue damage results were compared. It was found that average error of fatigue damage index by the log scale interpolation method was relatively small among three methods.

An Improved Interpolation Method using Pixel Difference Values for Effective Reversible Data Hiding (효과적인 가역 정보은닉을 위한 픽셀의 차이 값을 이용한 개선된 보간법)

  • Kim, Pyung Han;Jung, Ki Hyun;Yoon, Eun-Jun;Ryu, Kwan-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.6
    • /
    • pp.768-788
    • /
    • 2021
  • The reversible data hiding technique safely transmits secret data to the recipient from malicious attacks by third parties. In addition, this technique can completely restore the image used as a transmission medium for secret data. The reversible data hiding schemes have been proposed in various forms, and recently, the reversible data hiding schemes based on interpolation are actively researching. The reversible data hiding scheme based on the interpolation method expands the original image into the cover image and embed secret data. However, the existing interpolation-based reversible data hiding schemes did not embed secret data during the interpolation process. To improve this problem, this paper proposes embedding the first secret data during the image interpolation process and embedding the second secret data into the interpolated cover image. In the embedding process, the original image is divided into blocks without duplicates, and the maximum and minimum values are determined within each block. Three way searching based on the maximum value and two way searching based on the minimum value are performed. And, image interpolation is performed while embedding the first secret data using the PVD scheme. A stego image is created by embedding the second secret data using the maximum difference value and log function in the interpolated cover image. As a result, the proposed scheme embeds secret data twice. In particular, it is possible to embed secret data even during the interpolation process of an image that did not previously embed secret data. Experimental results show that the proposed scheme can transmit more secret data to the receiver while maintaining the image quality similar to other interpolation-based reversible data hiding schemes.

The ML scale in southern Korea (한반도 남부 지진의 지역 규모식)

  • 홍태경
    • Proceedings of the Earthquake Engineering Society of Korea Conference
    • /
    • 2000.10a
    • /
    • pp.73-80
    • /
    • 2000
  • The distance correction term -logA0 of the local magnitude scale was estimated for earthquakes in southern Korea using linear least-squares inversion and interpolation scheme. Total 1054 short-period velocity seismograms from 107 local events recorded at hypocentral distances ranging from 10 to 480 km were used in this study. Simulated Wood-Anderson amplitudes were obtained from velocity seismograms with use of revised Wood-Anderson instrument response with static magnification 2080, damping factor 0.7, and natural period 0.8 sec. The estimated distance correction term for southern Korea is found to be -logA0=1.137 log(r/17) + 0.001159(r-17) + 20, where r is hypocentral distance in kilometers. The attenuation rate of this distance correction term falls between those of southern California and eastern North America.

  • PDF

Development of program for calculation of representative bed-material size by using MS ExcelTM (MS ExcelTM을 이용한 하상재료의 대표입경 계산 프로그램 개발)

  • Lee, Chanjoo;Nam, Ji-Su;Lee, In
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.334-334
    • /
    • 2017
  • Representative particle sizes(RPS) are commonly used for particle size distribution of heterogeneous sediment such as bed material. RPS can provide not only information of mean characteristics of sediment, but also other properties like sorting, skewness, kurtosis. For sediment including sand and clay material, RPS is estimated through two steps. The first is experimental step for calculating weight of each size class, the next is interpolation step to get RPS by using the graph plot. At the second step, graph method known as direct reading of value along the interpolation line in the graph plot is commonly used. This method is often time-consuming job. In this study we developed a new program to get RPS by using MS Excel. Simple linear and semi-log interpolation are used. When compared with conventional graph method(direct reading), simple linear shows 5.31%, while semi-log 1.29% of relative difference. We developed MS Excel program for estimation of RPS automatically.

  • PDF

An IE-FFT Algorithm to Analyze PEC Objects for MFIE Formulation

  • Seo, Seung Mo
    • Journal of electromagnetic engineering and science
    • /
    • v.19 no.1
    • /
    • pp.6-12
    • /
    • 2019
  • An IE-FFT algorithm is implemented and applied to the electromagnetic (EM) solution of perfect electric conducting (PEC) scattering problems. The solution of the method of moments (MoM), based on the magnetic field integral equation (MFIE), is obtained for PEC objects with closed surfaces. The IE-FFT algorithm uses a uniform Cartesian grid to apply a global fast Fourier transform (FFT), which leads to significantly reduce memory requirement and speed up CPU with an iterative solver. The IE-FFT algorithm utilizes two discretizations, one for the unknown induced surface current on the planar triangular patches of 3D arbitrary geometries and the other on a uniform Cartesian grid for interpolating the free-space Green's function. The uniform interpolation of the Green's functions allows for a global FFT for far-field interaction terms, and the near-field interaction terms should be adequately corrected. A 3D block-Toeplitz structure for the Lagrangian interpolation of the Green's function is proposed. The MFIE formulation with the IE-FFT algorithm, without the help of a preconditioner, is converged in certain iterations with a generalized minimal residual (GMRES) method. The complexity of the IE-FFT is found to be approximately $O(N^{1.5})$and $O(N^{1.5}logN)$ for memory requirements and CPU time, respectively.

논제 부정 Access에 대한 Firewall의 과제와 대책

  • 변성준;서정석;최원석
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.227-238
    • /
    • 2000
  • Firewall은 다양한 부정Access의 방지책으로서 확실히 유효한 수단이지만 이 Firewall은 사용자로부터 지시된 설정을 충실히 실행하는 것으로 설정 오류, 소프트웨어의 정지, 허가된 룰을 악용한 침입 등 반드시 사용자가 바라는 작용을 무조건적 상태에서 보증해 주는 것은 아니다. 따라서 사용자는 도입 후 에도 운용시에 Access log를 감시하고 본래의 Security Policy에 반하는 행위를 매일 매일 체크하지 않으면 안될 상황에 처해 있다. 본 연구는 이러한 부정Access에 대한 이와 같은 Firewall의 현상에 대한 과제 중에서 "부정Access를 어떻게 하면 일찍, 정확히 체크할 수 있는가\ulcorner"라는 주제를 선택하여 Firewall의 한계와 그 대응책을 실제로 부정Access를 시험해 보는 것으로 검증하기로 하였다. 실험결과에서 (1)Port Scan이나 전자메일 폭탄(서비스정지공격)등은 Firewall로 방지하는 것은 불가능하거나 혹은 Checking이 곤란하다. (2)공격마다 로그 수집을 했음에도 관계없이 Firewall의 로그는 번잡하므로 단시간에 사태의 발견이 대단히 곤란하다고 하는 Firewall의 한계를 인식하였다. 그리고 그 대책으로서 우리는 체크 툴의 유효성에 착안하여 조사한 결과, 결국 무엇이 부정Access인가에 대해서는 어디까지나 이용하는 측이 판단하여 Firewall 상에 설정하지 않으면 안되지만 체크 툴은 이 부정Access 정보를 데이터베이스로서 갖고 있음으로써 '무엇이 부정Access인가'를 이용자 대신에 판단하고 툴에 따라서는 설정을 자동적으로 변경하여 부정 Access의 저지율을 향상시킨다. 이처럼 체크 툴은 Firewall의 수비능력을 보강하는 위치에 있다고 생각할 수 있다.다. 4 장에서는 3장에서 제기한 각각의 문제점에 대해 RAD 의 관점에 비추어 e-business 시스템의 단기개발을 실현하기 위한 고려사항이나 조건 해결책을 제안한다. 본 논문이 지금부터 e-business 를 시작하려고 하는 분, e-business 시스템의 개발을 시작하려고 하는 분께 단기간의 e-business 실현을 위한 하나의 지침이 된다면 다행이겠다.formable template is used to optimize the matching. Then, clustering the similar shapes by the distance between each centroid, papaya can be completely detected from the background.uage ("Association of research for algorithm of calculating machine (1992)"). As a result, conventional NN and CNN were available for interpolation of sampling data. Moreover, when nonlinear intensity is not so large under the field condition of small slope, interpolation performance of CNN was a little not so better than NN. However, when nonlinear intensity is large under the field condition of large slope, interpolation performance of CNN was relatively better than NN.콩과 자연 콩이 성분 분석에서 차이를

  • PDF

Analysis of Frequency Response Curve for Conduction-Cooled Power Capacitors (전도 냉각 파워 커패시터의 주파수 응답 곡선 분석)

  • An, Gyeong Moon;Kim, Hiesik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.10
    • /
    • pp.123-130
    • /
    • 2016
  • High-frequency induction heating equipment can heat the metal by applying a High-Frequency power to the resonant circuit. The resonance circuit is composed of the work coil and the conduction-cooled power capacitor, it influences the performance of the heat treatment equipment according to the characteristics of the capacitor. However, dependence on conduction-cooled power capacitor's import is high due to lack of core technology research and development. Minimizing the generation of internal heat transmitted inside during LC resonance, reduce the reactive power loss, there is a need for a capacitor within the voltage characteristic outstanding. To implement localization it is vital that prior study of the analysis on the frequency response characteristic for the finished capacitor advanced manufacturer be implemented. Studying the interpolation method to read the value at any point of the characteristic curve for a given log-log scale was applied to the analysis tool of the capacitor by my proposed algorithm. The simulation for reproducing frequency response curves was attempted by assuming a capacitor in a simplified series equivalent RC circuit to obtain the equivalent series resistance value. It was confirmed that the reproduction rate was the result value above 83% as compared to the simulation of the properties and characteristics on the actual reactive power for Peak value, and that the algorithm can be applicable when analyzing and predicting the characteristic curves of a simpled model capacitor.

Study of robust watermarking method in medical image (의료영상에서의 강인한 워터마킹 기법에 관한 연구)

  • 남기철;박무훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.255-258
    • /
    • 2003
  • Recently, Digital Watermarking is used to authenticate data and to determine whether the data are distorted or not in medical images which is digitalized. The Fourier Mellin method using the Fourier Transform and the Log-Polar coordinate transform gets an invariant feature for RST distortion in images. But there are several problems in the real materialization. Interpolation of the image value should be considered according to the pixel position and so a watermark loss, original image distortion, numerical approximation is happened. Therefore there should be solved to realization of the Fourier Mellin method. Using the Look up table, there reduce the data loss caused by the conversion between Rectangular and Polar coordinate. After diagnose, medical images are transformed the Polar coordinate and taken the Discrete Fourier transform in the center of ROI region. Maintaining the symmetry in Fourier magnitude coefficient, the gaussian distributed random vectors and binary images are embedded in medical images.

  • PDF