• Title/Summary/Keyword: logarithm

Search Result 476, Processing Time 0.023 seconds

Hydraulic Conductivity of Bentonite-Sand Mixture for a Potential Backfill Material for a High-level Radioactive Waste Repository

  • Cho, Won-Jin;Lee, Jae-Owan;Kang, Chul-Hyung
    • Nuclear Engineering and Technology
    • /
    • v.32 no.5
    • /
    • pp.495-503
    • /
    • 2000
  • The hydraulic conductivities in the bentonite-sand mixtures with high density were measured, and the effects of sand content and dry density on the hydraulic conductivity were investigated. The hydraulic conductivities of the bentonite-sand mixtures with a dry density of 1.6 Mg/㎥ and 1.8 Mg/㎥ are less than 10$^{-11}$ m/s when the sand content is not higher than 70 wt%. However at the sand content of 90 wt%, the hydraulic conductivity increases rapidly At the same dry density, the logarithm of hydraulic conductivity increases linearly with increasing sand content. The hydraulic conductivity of the bentonite-sand mixture can be explained by the concept of effective clay dry density, and using this concept, the hydraulic conductivities for the mixtures with various sand contents and dry densities can be estimated.

  • PDF

Cusum control chart for monitoring process variance (공정분산 관리를 위한 누적합 관리도)

  • Lee, Yoon-Dong;Kim, Sang-Ik
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2006.04a
    • /
    • pp.135-141
    • /
    • 2006
  • Cusum control chart is used for the purpose of controling the process mean. We consider the problem related to cusum chart for controling process variance. Previous researches have considered the same problem. The main difficulty shown in the related researches was to derive the ARL function which characterizes the properties of the chart. Sample variance, differently with sample mean, follows chi-squared type distribution, even when the quality characteristics are assumed to be normally distributed. The ARL function of cusum is described by a type of integral equation. Since the solution of the integral equation for non-normal distribution is not known well, people used simulation method instead of solving the integral equation directly, or approximation method by taking logarithm of the sample variance. Recently a new method to solve the integral equation for Erlang distribution was published. Here we consider the steps to apply the solution to the problem of controling process variance.

  • PDF

Study on the Relationship between Udder and Teat Characteristics and Somatic Cell Count (유방과 유두의 형태와 체세포수에 대한 연구)

  • Lee, Jeong-Chi;Lee, Chai-Yong
    • Journal of Veterinary Clinics
    • /
    • v.24 no.2
    • /
    • pp.172-176
    • /
    • 2007
  • The objective of this study was to determine the relationship between udder and teat characteristics and somatic cell count (SCC). A total of 749 (73.1%) milk samples from 1,024 quarters of 259 Holstein cows contained less than 200,000 somatic cells/ml, while 132 (12.9%) quarters contained more than 500,000 somatic cells/ml. Prior to data analysis, somatic cell counts were transformed to natural logarithm. The mean SCS {$log_e(SCS/10^3)$} of milk samples from the front quarters was lower than milk samples from the rear quarters. The highest SCS was observed from cows with the step-shaped udder and the pear-shaped teats, respectively. Increased SCS was observed from cows with large teat diameter, short teat length, short distance between the teat tip to floor (p<0.05) and with increase in parity, respectively.

Effects of Recombinant truman Granulocyte Colony-Stimulating Factor(rhG-CSF) on Cyclophosphamide-induced Neutropenic Mice (호중구 감소증을 유도한 마우스에서의 유전자 재조합 인과립구 콜로니자극인자의 효과)

  • 조명행;유아선;방명주;곽형일;성하정;안길환
    • Biomolecules & Therapeutics
    • /
    • v.6 no.2
    • /
    • pp.145-150
    • /
    • 1998
  • Administration of 3 type KGCs [recombinant human granulocyte colony-stimulating factor (rhG-CSF)] to mice with cyclophosphamide (CPA)-induced neutropenia for 4 consecutive days from the day after the CPA dosing (100 mg/kg) resulted in a dose dependent increase in the peripheral blood neutrophil count 6 hours after the final KGC injection. Within the KGC dose range of 0.1 to 40$\mu$g Per mouse Per day, there was a sigmoidal relationship between the logarithm of the dose and the peripheral blood neutrophil count (relative value for neutrophil count of the basal dose) in the treated mice. The sigmoidal relationship of test KGC preparations shows that there is a saturation point in terms of efficacy. Compared with e(fact of KGC-Orange, Green, and Blue, KGC-Orange recovers neutrophils more effectively than the others do.

  • PDF

GENERAL LAWS OF PRECISE ASYMPTOTICS FOR SUMS OF RANDOM VARIABLES

  • Meng, Yan-Jiao
    • Journal of the Korean Mathematical Society
    • /
    • v.49 no.4
    • /
    • pp.795-804
    • /
    • 2012
  • In this paper, we obtain two general laws of precise asymptotics for sums of i.i.d random variables, which contain general weighted functions and boundary functions and also clearly show the relationship between the weighted functions and the boundary functions. As corollaries, we obtain Theorem 2 of Gut and Spataru [A. Gut and A. Sp$\check{a}$taru, Precise asymptotics in the law of the iterated logarithm, Ann. Probab. 28 (2000), no. 4, 1870-1883] and Theorem 3 of Gut and Sp$\check{a}$taru [A. Gut and A. Sp$\check{a}$taru, Precise asymptotics in the Baum-Katz and Davids laws of large numbers, J. Math. Anal. Appl. 248 (2000), 233-246].

Elliptic Curve AMP Protocol (타원곡선을 이용한 AMP 프로토콜)

  • Ahn, Chang-Sup;Heu, Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.712-714
    • /
    • 2001
  • 낮은 엔트로피의 패스워드를 이용하여 안전한 인증 및 키교환을 위해 Diffie-Hellman에 기반한 AMP(Authentication and key agreement via Memorable Password) 프로토콜이 제안되었다. 본 논문에서는 타원곡선 암호화가 가질수 있는 높은 보안성과 효율성을을 위해 타원곡선이산대수문제(Elliptic Curve Discrete Logarithm Problem)에 기반한 EC-AMP (Elliptic Curve-AMP)프로토콜을 제안한다. EC-AMP는 랜덤 오라클(random oracle) 모델에서 여러 가지 공격에 대해 안전하므로 인증 및 키교환이 필요한 네트워크 환경에 패스워드를 이용함으로 얻을수 있는 편의성과 타원곡선이산대수문제가 제공하는 안전성을 보장할 수 있다.

  • PDF

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.

A Compilation and Evaluation of Thermal and Mechanical Properties of Bentonite-based Buffer Materials for a High- level Waste Repository

  • Cho, Won-Jin;Lee, Jae-Owan;Kang, Chul-Hyung
    • Nuclear Engineering and Technology
    • /
    • v.34 no.1
    • /
    • pp.90-103
    • /
    • 2002
  • The thermal and mechanical properties of compacted bentonite and bentonite-sand mixture were collected from the literatures and compiled. The thermal conductivity of bentonite is found to increase almost linearly with increasing dry density and water content of the bentonite. The specific heat can also be expressed as a function of water ontent, and the coefficient of thermal expansion is almost independent on the dry density. The logarithm of unconfined compressive strength and Young’s modulus of elasticity increase linearly with increasing dry density, and in the case of constant dry density, it can be fitted to a second order polynomial of water content. Also the unconfined compressive strength and Young’s modulus of elasticity of the bentonite-sand mixture decreases with increasing sand content. The Poisson’s ratio remains constant at the dry density higher than 1.6 Mg/m$_3$, and the shear strength increases with increasing dry density.

Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates

  • Braeken, An
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1546-1565
    • /
    • 2019
  • Signcryption schemes offer the possibility to simultaneously sign and encrypt a message. In order to guarantee the authentication of both signer and receiver in the most efficient way during the signcryption, certificate based solutions have been proposed in literature. We first compare into detail three recently proposed certificate based signcryption systems relying on the elliptic curve discrete logarithm problem and without the usage of compute intensive pairing operations. Next, we demonstrate how the performance of these certificate based systems can be improved by using the Elliptic Curve Qu Vanstone (ECQV) implicit certificates. What is more, generalized signcryption schemes are easily derived from these schemes and the anonymity feature of sender and receiver is already inherently included or can be very efficiently obtained without a significant additional cost.

Applied to Satellite Network of Modified Diffie-Hellman Scheme (Diffie-Hellman 방법의 위성망에서의 응용)

  • Park, Jeong-Hyun;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.23-30
    • /
    • 1996
  • This paper presented a key distribution scheme based on the Yacobi scheme that does not use the secret key provided by key distribution center as a power, but uses instead a random number generated by the user. The scheme is independent of the exposure of the secret key. Then this paper described modified Diffie-Hellman schemes based on the discrete logarithm and prime resolution into factors. The modified DH scheme was applied to point-to-multicasting, and broadcasting networks via satellite.