• Title/Summary/Keyword: information theoretic analysis

Search Result 94, Processing Time 0.027 seconds

Capacity and Secrecy Rate Analysis of a Frequency-Domain Equal-Gain-Combining TR Scheme for Distributed Antenna Systems in Multi-User Multi-Path Fading Channels (다중 사용자 다중 경로 페이딩 채널에서 분산 안테나 시스템을 위한 주파수 영역 Equal-Gain-Combining TR 기법의 Capacity와 Secrecy Rate 분석)

  • Kim, Myoung-Seok;Lee, Chungyong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.10
    • /
    • pp.47-53
    • /
    • 2012
  • Time-reversal (TR) precoding focuses the energy of the effective channel in time and improves receive performance of a single tap receiver. Frequency-domain equal-gain-combining (FD-EGC) TR scheme, which works in linear block precoding fashion, has better temporal focusing performance than the traditional TR. Also, the FD-EGC improves receive performance of minimum mean square error receiver with distributed antenna systems (DAS). The detailed receive performance of the FD-EGC was analyzed in our previous work. In this paper, we focused on capacity analysis of the FD-EGC in DAS. We derived a scaling law which shows how the use of multiple antenna can increase the capacity of the FD-EGC precoding compared with that of no precoding. In addition, we analyze the secrecy rate of the FD-EGC which shows how high-rate messages can be transmitted towards an intended user without being decoded by the other users from the view point of information theoretic security.

Is HAZOP a Reliable Tool? What Improvements are Possible?

  • Park, Sunhwa;Rogers, William J.;Pasman, Hans J.
    • Journal of the Korean Institute of Gas
    • /
    • v.22 no.2
    • /
    • pp.1-20
    • /
    • 2018
  • Despite many measures, still from time to time catastrophic events occur, even after reviewing potential scenarios with HAZID tools. Therefore, it is evident that in order to prevent such events, answering the question: "What can go wrong?" requires more enhanced HAZID tools. Recently, new system based approaches have been proposed, such as STPA (system-theoretic process analysis) and Blended Hazid, but for the time being for several reasons their availability for general use is very limited. However, by making use of available advanced software and technology, traditional HAZID tools can still be improved in degree of completeness of identifying possible hazards and in work time efficiency. The new HAZID methodology proposed here, the Data-based semi-Automatic HAZard IDentification (DAHAZID), seeks to identify possible scenarios with a semi-automated system approach. Based on the two traditional HAZID tools, Hazard Operability (HAZOP) Study and Failure Modes, Effects, and Criticality Analysis (FMECA), the new method will minimize the limitations of each method. This will occur by means of a thorough systematic preparation before the tools are applied. Rather than depending on reading drawings to obtain connectivity information of process system equipment elements, this research is generating and presenting in prepopulated work sheets linked components together with all required information and space to note HAZID results. Next, this method can be integrated with proper guidelines regarding process safer design and hazard analysis. To examine its usefulness, the method will be applied to a case study.

Is Category P Lexical or Functional?: A Generalized pP-Shell Approach

  • Hong, Sung-Shim;Yang, Xiaodong
    • Language and Information
    • /
    • v.14 no.2
    • /
    • pp.71-84
    • /
    • 2010
  • The aim of this paper is to propose that a category P is encapsulated within a functional layer above the lexical layer, just like vP containing a lexical VP. As is well known, the category P has long been in the obscure domain of syntactic studies: Marantz (2001) and den Dikken (2003), for example, argue that P is a lexical category, but Emonds (1985), Grimshaw (1991), and Baker (2003), maintain that the category P is functional and is a closed category without its own intrinsic meaning. On the other hand, Zwart (2005) argues that it does have some meaning. Following the works of Svenonius (2003, 2006, 2007), and the spirit of Rizzi's (1997) split CP hypothesis, we elaborate and develop Svenonius' idea of split-pP analysis with detailed schematic representations of the novel examples in English, Korean, and Chinese in this paper. Unlike Svenonius, however, this paper incorporates KP into pP-Shell, which is a substantial simplification. Furthermore, Chinese Localizers that have long been considered as Postpositions are now under the category of Prepositions. This proposal renders an X-bar theoretic consistency over the categorical status of Chinese phrasal structures. In short, the present analysis accounts for inconsistency found in English complex preposition phrase (Quirk, et al, 1972, 1985), Chinese circumposition phrase (Ernst 1988, Liu, 2002) and Korean postposition phrase in a unified and consistent manner. Furthermore, by proposing a finer-grained phrasal architecture for the category P, the controversial status of the category subsides within this analysis.

  • PDF

A Meta-Analysis of Social Network Service Research in Communications (미디어 영역에서의 소셜네트워크서비스 연구동향 분석)

  • Kim, Yoojung;Joe, Susan
    • Informatization Policy
    • /
    • v.19 no.4
    • /
    • pp.3-26
    • /
    • 2012
  • The purpose of this study is to provide a systematical view point of SNS research published by scholarly journals in communications vis a meta-analysis. A total of 72 articles dealing with SNS issues from 2006 to 2012 were analysed by research theme, related sub-theme, methodology, theoretic rationale, targeted media, and characteristics. Effect research get the largest portion and then user research in terms of a developmental model of media research agenda. A major methodological trend is an online survey and theoretical background is Uses and Gratification. Twitter is the most popular medium researched and SNS is mainly characterized as information provision and seeking as well as relationship forming.

  • PDF

Bayesian methods in clinical trials with applications to medical devices

  • Campbell, Gregory
    • Communications for Statistical Applications and Methods
    • /
    • v.24 no.6
    • /
    • pp.561-581
    • /
    • 2017
  • Bayesian statistics can play a key role in the design and analysis of clinical trials and this has been demonstrated for medical device trials. By 1995 Bayesian statistics had been well developed and the revolution in computing powers and Markov chain Monte Carlo development made calculation of posterior distributions within computational reach. The Food and Drug Administration (FDA) initiative of Bayesian statistics in medical device clinical trials, which began almost 20 years ago, is reviewed in detail along with some of the key decisions that were made along the way. Both Bayesian hierarchical modeling using data from previous studies and Bayesian adaptive designs, usually with a non-informative prior, are discussed. The leveraging of prior study data has been accomplished through Bayesian hierarchical modeling. An enormous advantage of Bayesian adaptive designs is achieved when it is accompanied by modeling of the primary endpoint to produce the predictive posterior distribution. Simulations are crucial to providing the operating characteristics of the Bayesian design, especially for a complex adaptive design. The 2010 FDA Bayesian guidance for medical device trials addressed both approaches as well as exchangeability, Type I error, and sample size. Treatment response adaptive randomization using the famous extracorporeal membrane oxygenation example is discussed. An interesting real example of a Bayesian analysis using a failed trial with an interesting subgroup as prior information is presented. The implications of the likelihood principle are considered. A recent exciting area using Bayesian hierarchical modeling has been the pediatric extrapolation using adult data in clinical trials. Historical control information from previous trials is an underused area that lends itself easily to Bayesian methods. The future including recent trends, decision theoretic trials, Bayesian benefit-risk, virtual patients, and the appalling lack of penetration of Bayesian clinical trials in the medical literature are discussed.

The Differences of Self-Validation, Regulatory Focus and Information Distortion Between Happiness and Sadness (행복감정과 슬픔감정 간의 자기타당화와 규제초점 및 정보왜곡의 차이)

  • Choi, Nak-Hwan;Chen, Fei;Kim, Min-Ji
    • Science of Emotion and Sensibility
    • /
    • v.20 no.3
    • /
    • pp.71-88
    • /
    • 2017
  • This paper compared self-validation and regulatory focus between consumers who felt happy vs. sad prior to decision and explored the effects of self-validation on regulatory focus and information distortion. The results of empirical analysis are as follows. First, consumers who felt happy beforehand revealed larger self-validation and stronger promotion focus than those who felt sad in advance. Second, compared to sadness, just-felt happiness was found to have partially positive impact on promotion focus by means of self-validation and exercise entirely positive impact on information distortion through mediation of self-validation. This study has made theoretic contributions by identifying the differences in the extent of self-validation and promotion focus between happiness and sadness as ambient emotion felt prior to the impending decision making as well as by investigating the effects of self-validation upon information distortion.

Various Techniques for Improving of the Reliability of the Wireless Network Design/Optimization Simulation Tool (무선망 설계/최적화 시뮬레이션 툴 의 다양한 신뢰도 향상 기법)

  • Jeon Hyun-Cheol;Ryu Jae-Hyun;Park Sang-Jin;Park Joo-Yeoul;Kim Jung-Chul
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.39-42
    • /
    • 2006
  • There are various analysis functions(including prediction of path loss, analyzing of capacity and coverage, etc.) of simulation tool to design and optimize the mobile communication network. Its reliability absolutely effects the performance of mobile communication network. Especially as the wireless network highly advancing focused on data service, it more needs to research and develop on the standard establishment of reliability of the simulation tool. Also it is important the systematic research how to improve the reliability of simulation tool. In this paper, to give the concrete process and skill about how to improve reliability, we define the kinds of reliability at first. And then we explain the comparison results between real field measurement data and theoretic simulation data.

  • PDF

Game-Theoretic Analysis of Selfish Secondary Users in Cognitive Radio Networks

  • Kahsay, Halefom;Jembre, Yalew Zelalem;Choi, Young-June
    • Journal of Communications and Networks
    • /
    • v.17 no.4
    • /
    • pp.440-448
    • /
    • 2015
  • In this paper, we study the problem of selfish behavior of secondary users (SUs) based on cognitive radio (CR) with the presence of primary users (PUs). SUs are assumed to contend on a channel using the carrier sense multiple access with collision avoidance (CSMA/CA) and PUs do not consider transmission of SUs, where CSMA/CA protocols rely on the random deference of packets. SUs are vulnerable to selfish attacks by which selfish users could pick short random deference to obtain a larger share of the available bandwidth at the expense of other SUs. In this paper, game theory is used to study the systematic cheating of SUs in the presence of PUs in multichannel CR networks. We study two cases: A single cheater and multiple cheaters acting without any restraint. We identify the Pareto-optimal point of operation of a network with multiple cheaters and also derive the Nash equilibrium of the network. We use cooperative game theory to drive the Pareto optimality of selfish SUs without interfering with the activity of PUs. We show the influence of the activity of PUs in the equilibrium of the whole network.

Design and Theoretic Analysis of 3D Tactile Sensor (3D 촉각 센서의 설계와 이론적인 해석)

  • Sim Kwee-Bo;Hwang Han-Kun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.7
    • /
    • pp.870-874
    • /
    • 2005
  • This paper presents capacitive tactile sensor that can detect normal and shear forces. This tactile sensor consists of index plate, sensing plate, and elastic dielectric layer. The calculated sensing character is based on the changes of space between two horizontal plate. Larger overlap areas and narrow space between top and bottom plate guarantees higher sensitivity. Tactile sense information can be calculated from the changes of phase of output signal. The symmetric arrangement of sensing plates makes the manufacturing process easier and guarantees the stability of the structure. In this paper, the sensor structure is designed, the mechanism of the Proposed sensor is theoretically explained, and the simulated result is presented.

An Experimental Delay Analysis Based on M/G/1-Vacation Queues for Local Audio/Video Streams

  • Kim, Doo-Hyun;Lee, Kyung-Hee;Kung, Sang-Hwan;Kim, Jin-Hyung
    • ETRI Journal
    • /
    • v.19 no.4
    • /
    • pp.344-362
    • /
    • 1997
  • The delay which is one of the quality of service parameters is considered to be a crucial factor for the effective usage of real-time audio and video streams in interactive multimedia collaborations. Among the various causes of the delay, we focus in this paper on the local delay concerned with the schemes which handle continuous inflow of encoded data from constant or variable bit-rate audio and video encoders. We introduce two kinds of implementation approaches, pull model and push model. While the pull model periodically pumps out the incoming data from the system buffer, the push model receives events from the device drivers. From our experiments based on Windows NT 3.51, it is shown that the push model outperforms the other for both constant and variable bit-rate streams in terms of the local delay, when the system suffers reasonable loads. We interpret this experimental data with M/G/1 multiple vacation queuing theories, and show that it is consistent with the queuing theoretic interpretations.

  • PDF