• Title/Summary/Keyword: Random Cascade

Search Result 26, Processing Time 0.025 seconds

A Multi Carrier RPWM Technique for the Single-Phase 5-Level Cascaded Inverters (단상 5-레벨 cascade 인버터를 위한 멀티 캐리어 RPWM기법)

  • Kim J. N.;Lim Y. C.;Jung Y. G.;Kim Y. C.
    • Proceedings of the KIPE Conference
    • /
    • 2004.07a
    • /
    • pp.389-392
    • /
    • 2004
  • 본 연구에서는 단상 5-레벨 cascaded 인버터의 출력 전압 및 전류의 파워 스펙트럼을 광대역으로 분산시키기 위한 멀티 캐리어 RPW(Random PWM)기법을 제안하였다. 제안된 방법은 고정 주파수의 멀티 캐리어 대신에 랜덤한 주파수의 삼각파 캐리어를 사용하고 있다. PD(Phase Disposition)방식 및 H(Hybrid)방식의 멀티 캐리어 RPW을 단상 cascade H-브리지 멀티 레벨 인버터에 적용하였다. 각 방식에 따른 출력 전압과 전류 파형 및 고조파 스펙트럼을 PSIM에 의하여 확인하였으며, 제안된 방식의 타당성을 입증할 수 있었다.

  • PDF

Evaluation of multiplicative random cascade models for CMIP 6 rainfall data temporal disaggregation (MRC 모형의 CMIP6 강우 자료에 대한 시간 분해 성능 평가)

  • Kwak, Jihye;Lee, Hyunji;Kim, Jihye;Jun, Sang Min;Lee, Jae Nam;Kang, Moon Seong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.367-367
    • /
    • 2021
  • 최근 기후변화로 인해 극한 강우 사상의 빈도가 잦아짐에 따라 수공 구조물의 안전성이 저해되거나 인명 및 재산 피해가 발생할 가능성이 커지고 있다. 기후변화에 따른 기상현상의 변화 추세를 파악하고 대비하기 위해 CMIP (Coupled Model Intercomparison Project Phase)의 GCM(General Circulation Model) 기상자료 산출물이 활발하게 이용되고 있다. 기후변화 시나리오는 홍수기 방재 대책 수립 등의 연구에도 적용되고 있으나, GCM에서 산출된 기상자료의 시간 간격은 24시간 혹은 3시간 정도로 시간적 해상도가 낮아 홍수 모형의 입력자료로 사용되기 어려운 형태를 가지고 있다. 따라서 기후변화 시나리오를 홍수 모의 등의 분야에 접목하기 위해서는 GCM 자료의 시간적 해상도를 1시간 이하로 낮춤으로써 시나리오 산출물이 홍수모형과 적절하게 연결될 수 있도록 해야 한다. MRC (Multiplicative Random Cascade) 모형은 국내외에서 예보강우의 시간 분해 및 일강우 데이터 분해 연구에 활용된 바 있으며 관측 강우에 대하여 분해 성능이 준수함이 확인되었다. 이에 본 연구에서는 MRC 모형을 활용하여 미래 기후변화 시나리오 산출물에 적용함으로써 MRC 모형이 일단위 및 3시간 단위 기후변화 자료의 시간 분해에 대해 적절한 성능을 수행하는지 여부를 분석하고, 기후변화 자료의 최소 시간 간격별 강우 분해 결과를 비교·분석하고자 하였다. 본 연구의 결과는 향후 기후변화 시나리오 기반 기상자료 시간 분해에 대한 MRC 모형의 적용성을 평가하는 기초 자료로 활용될 수 있을 것으로 사료된다.

  • PDF

LONG-TERM STREAMFLOW SENSITIVITY TO RAINFALL VARIABILITY UNDER IPCC SRES CLIMATE CHANGE SCENARIO

  • Kang, Boo-sik;Jorge a. ramirez, Jorge-A.-Ramirez
    • Water Engineering Research
    • /
    • v.5 no.2
    • /
    • pp.81-99
    • /
    • 2004
  • Long term streamflow regime under virtual climate change scenario was examined. Rainfall forecast simulation of the Canadian Global Coupled Model (CGCM2) of the Canadian Climate Center for modeling and analysis for the IPCC SRES B2 scenario was used for analysis. The B2 scenario envisions slower population growth (10.4 billion by 2010) with a more rapidly evolving economy and more emphasis on environmental protection. The relatively large scale of GCM hinders the accurate computation of the important streamflow characteristics such as the peak flow rate and lag time, etc. The GCM rainfall with more than 100km scale was downscaled to 2km-scale using the space-time stochastic random cascade model. The HEC-HMS was used for distributed hydrologic model which can take the grid rainfall as input data. The result illustrates that the annual variation of the total runoff and the peak flow can be much greater than rainfall variation, which means actual impact of rainfall variation for the available water resources can be much greater than the extent of the rainfall variation.

  • PDF

Performance Analysis of DS-CDMA Communication Systems with Array Antenna and CCI Canceller (Array 안테나와 간섭제거기에 의한 DS-CDMA 통신 시스템의 성능분석)

  • 최충열;오창헌;김봉철;조성준
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.9 no.4
    • /
    • pp.439-449
    • /
    • 1998
  • In this paper, error performance of DS-CDMA communication system has been analyzed in a radio channel which is characterized by multi-user interference (MUI). Also, performance improvement has been obtained by both numerical analysis and simulation techniques when 3-element array antenna and co-channel interference (CCI) canceller are employed as a means for overcoming an MUI effect. The MUI was modelled as a gaussian random process. In array antenna scheme we only considered a directivity of antennal. The results show that there is a substantial enhancement in performance by employing an array antenna or a CCI canceller. CCI canceller gives better improvement in performance than the array antenna with D=2.67. Additional improvement can be obtained when the array antenna and the CCI canceller are adopted in cascade form. In this case the error performance approaches that of AWGN environment.

  • PDF

Uncertainty quantification and propagation with probability boxes

  • Duran-Vinuesa, L.;Cuervo, D.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.8
    • /
    • pp.2523-2533
    • /
    • 2021
  • In the last decade, the best estimate plus uncertainty methodologies in nuclear technology and nuclear power plant design have become a trending topic in the nuclear field. Since BEPU was allowed for licensing purposes by the most important regulator bodies, different uncertainty assessment methods have become popular, overall non-parametric methods. While non-parametric tolerance regions can be well stated and used in uncertainty quantification for licensing purposes, the propagation of the uncertainty through different codes (multi-scale, multiphysics) in cascade needs a better depiction of uncertainty than the one provided by the tolerance regions or a probability distribution. An alternative method based on the parametric or distributional probability boxes is used to perform uncertainty quantification and propagation regarding statistic uncertainty from one code to another. This method is sample-size independent and allows well-defined tolerance intervals for uncertainty quantification, manageable for uncertainty propagation. This work characterizes the distributional p-boxes behavior on uncertainty quantification and uncertainty propagation through nested random sampling.

Analysis of Future Land Use and Climate Change Impact on Stream Discharge (미래토지이용 및 기후변화에 따른 하천유역의 유출특성 분석)

  • Ahn, So Ra;Lee, Yong Jun;Park, Geun Ae;Kim, Seong Joon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.2B
    • /
    • pp.215-224
    • /
    • 2008
  • The effect of streamflow considering future land use change and vegetation index information by climate change scenario was assessed using SLURP (Semi-distributed Land-Use Runoff Process) model. The model was calibrated and verified using 4 years (1999-2002) daily observed streamflow data for the upstream watershed ($260.4km^2$) of Gyeongan water level gauging station. By applying CA-Markov technique, the future land uses (2030, 2060, 2090) were predicted after test the comparison of 2004 Landsat land use and 2004 CA-Markov land use by 1996 and 2000 land use data. The future land use showed a tendency that the forest and paddy decreased while urban, grassland and bareground increased. The future vegetation indices (2030, 2060, 2090) were estimated by the equation of linear regression between monthly NDVI of NOAA AVHRR images and monthly mean temperature of 5 years (1998-2002). Using CCCma CGCM2 simulation result based on SRES A2 and B2 scenario (2030s, 2060s, 2090s) of IPCC and data were downscaled by Stochastic Spatio-Temporal Random Cascade Model (SST-RCM) technique, the model showed that the future runoff ratio was predicted from 13% to 34% while the runoff ratio of 1999-2002 was 59%. On the other hand, the impact on runoff ratio by land use change showed about 0.1% to 1% increase.

An Implementation of Stable Optical Security System using Interferometer and Cascaded Phase Keys (간섭계와 직렬 위상 키를 이용한 안정한 광 보안 시스템의 구현)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.1
    • /
    • pp.101-107
    • /
    • 2007
  • In this paper, we proposed an stable optical security system using interferometer and cascaded phase keys. For the encryption process, a BPCGH(binary phase computer generated hologram) that reconstructs the origial image is designed, using an iterative algorithm and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. For the decryption process, we cascade the encrypted image and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the origianl image is recovered by an inverse Fourier transformation of the phase information. During this process, interference intensity is very sensitive to external vibrations. a stable interference pattern is obtained using self-pumped phase-conjugate minor made of the photorefractive material. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the key images, so can be used an authorized system.

  • PDF

High Throughput Screening for Natural Products to Find Biologically Active Compounds : Natural Products versus Combinatorial Chemistry

  • Sankawa, Ushio
    • Proceedings of the Korean Society of Applied Pharmacology
    • /
    • 1997.11a
    • /
    • pp.47-50
    • /
    • 1997
  • Drug development began with the finding of biologically active compounds which are obtained by chemical synthesis or from natural sources. The advent of Combinatorial Chemistry is recognized as a strategy which has a potential to change the methodology of research and development(R&D) of new drugs. Drug development has been carried out with diverse strategies. In the past several decades a variety of new methodology have been introduced in R&D. Random screening of accumulated synthetic samples which had been synthesized for development of other drugs led to the discovery of new drugs. The typical examples are anti-asthma drug trimethoquinol and calcium antagonist diltiazem. (herbesser). In particular the latter drug has been used as a calcium antagonist worldwide, however it was first synthesized to find new tranquilizer and this is the reason why diltiazem has benzodiazepam skeleton. The random screening contributed in the finding of new drugs were carried out with whole animal test and it is a standard methodology in R&D of new drugs. Aspirin is the first synthetic non-steroidal antiinflammatory drug(NSAID) and has been used for more than one hundred years. It is the first example of drug developed from natural product. Salicin is the main constituent of willow bark which had been used in Europe for a long time to treat arthritis and aspirin was developed from salicin. Most of NSAID used clinically were developed from the structure of aspirin, however it took 70 years to clarify why aspirin exhibits its antiinflammatory, analgesic and antipyretic activities. The target of aspirin is cyclooxygenase(COX)which is the first enzyme involved in arachidonate cascade leading to the production of prostaglandins(PG) and thromboxan(TX). Side effect of aspirin causing ulcer in stomach is rather serious problem, since aspirin is so popular drug easily obtained in drug store(OTP). This problem is now going to be solved by a new finding on COX, which have two different types, one is constitutionally expressed COX 1 in almost all organs and the other is inducible COX 2. COX 2 is the responsible enzyme in inflammation etc and now the search of COX 2 specific inhibitors is the target of R&D of next generation NSAID.

  • PDF

Analysis of facial expression recognition (표정 분류 연구)

  • Son, Nayeong;Cho, Hyunsun;Lee, Sohyun;Song, Jongwoo
    • The Korean Journal of Applied Statistics
    • /
    • v.31 no.5
    • /
    • pp.539-554
    • /
    • 2018
  • Effective interaction between user and device is considered an important ability of IoT devices. For some applications, it is necessary to recognize human facial expressions in real time and make accurate judgments in order to respond to situations correctly. Therefore, many researches on facial image analysis have been preceded in order to construct a more accurate and faster recognition system. In this study, we constructed an automatic recognition system for facial expressions through two steps - a facial recognition step and a classification step. We compared various models with different sets of data with pixel information, landmark coordinates, Euclidean distances among landmark points, and arctangent angles. We found a fast and efficient prediction model with only 30 principal components of face landmark information. We applied several prediction models, that included linear discriminant analysis (LDA), random forests, support vector machine (SVM), and bagging; consequently, an SVM model gives the best result. The LDA model gives the second best prediction accuracy but it can fit and predict data faster than SVM and other methods. Finally, we compared our method to Microsoft Azure Emotion API and Convolution Neural Network (CNN). Our method gives a very competitive result.

An Improvement of Image Encryption using Binary Phase Computer Generated Hologram and Multi XOR Operations (이진위상 컴퓨터형성홀로그램과 다중 XOR 연산을 이용한 영상 암호화의 개선)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2008
  • In this paper, we proposed an improvement technique of image encryption using binary phase computer generated hologram(BPCGH) and multi exclusive-OR(XOR) operations. For the encryption process, a BPCGH that reconstructs the original image is designed, using an iterative algorithm, and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. Then the encrypted image is divided into several slide images using XOR operations. So, the performance of encryption for the image is improved. For the decryption process, we cascade the encrypted slide images and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the original image is recovered by an inverse Fourier transformation of the phase information. If the slide images are changed, we can get various decrypted BPCGH images. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the slide images, so it can be used in the differentiated authorization system.

  • PDF