• Title/Summary/Keyword: random summation

Search Result 22, Processing Time 0.024 seconds

An Analysis of Highlight Distribution Modeling for High Frequency CW Pulse Signal Reflection on Underwater Target (수중표적의 고주파수 CW 펄스신호 반사를 위한 하이라이트 분포 모델링 해석)

  • 김부일;이형욱;박명호;권우현
    • Journal of the Korea Society for Simulation
    • /
    • v.9 no.3
    • /
    • pp.1-11
    • /
    • 2000
  • This paper proposes the practical echo-signal synthesis models - UTAHID (Underwater TArget by Highlight Distribution) & M-UTAHID(Modified UTAHID) - of underwater target for active sonar engineering At high frequencies all the echo components that are the specular reflected waves and various elastic scattering wave scan be regarded the summation of individual echo from some equivalent scattering centers, so the underwater target is characterized by highlights distributed in spatial target structure. Proposed models are compared with characteristics of random distributed model & equivalent interval highlight model, and analyzed target strength, echo-elongation effect, target time spread loss and so on. Thus these can be efficiently used in various real systems related to underwater target echo-signal synthesis on active sonar and acoustic countermeasure.

  • PDF

The effect of random spectrum on the fatigue life of hybrid metal matrix composites (랜덤하중이 하이브리드 금속복합재료의 피로수명에 미치는 영향)

  • 김성훈;배성인;송정일
    • Composites Research
    • /
    • v.16 no.6
    • /
    • pp.48-55
    • /
    • 2003
  • This research makes comparisons of empirical fatigue-lives between AC8A A1 alloy and the metal matrix composites(A1/A12O3, A1/A12O3/A12O3p), and also includes comparisons of fatigue-lives between empirical fatigue-lives and estimated fatigue-lives from regular-periodic load testing, AE method to predict fatigue-crack initiation before visible in sight and SEM(scanning electron microscope) photographs of each material. According to the test results of the notched specimen. the fatigue life of the hybrid metal matrix composites and the metal matrix composites, which are more brittle than the base matrix was shorter than that of the base matrix under both types of loads. In addition, the fatigue-life estimated from the damage summation method and that from experiments at random loads were fairly identical.

A Parallel Algorithm for Merging Heaps on MasPar Machine (MasPar 머쉰상의 병렬 힙 병합 알고리즘)

  • Min, Yong-Sik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.4
    • /
    • pp.554-560
    • /
    • 1995
  • In this paper, we suggest a parallel algorithm to merge priority queues organized in two heaps, kheap and nheap of sizes k and n, correspondingly. Employing max(2$^{-1}$, $\ulcorner$(m+1)/4$\lrcorner$'s processors, this algorithm requires O(log(n/k)*log(n)) on an EREW-PRAM, where i is the height of the heap and m is the summation of sizes n and k. Also, when we run it on the MasPar machine, this method achieves a 33.934-fold speedup with 64 processors to merge 8 million data items which consist of two heaps of different sizes. So our parallel algorithm's EPU is close to 1, which is considered as an optimal speedup ratio.eedup ratio.

  • PDF

Two-sample chi-square test for randomly censored data (임의로 관측중단된 두 표본 자료에 대한 카이제곱 검정방법)

  • 김주한;김정란
    • The Korean Journal of Applied Statistics
    • /
    • v.8 no.2
    • /
    • pp.109-119
    • /
    • 1995
  • A two sample chi-square test is introduced for testing the equality of the distributions of two populations when observations are subject to random censorship. The statistic is appropriate in testing problems where a two-sided alternative is of interest. Under the null hypothesis, the asymptotic distribution of the statistic is a chi-square distribution. We obtain two types of chi-square statistics ; one as a nonnegative definite quadratic form in difference of observed cell probabilities based on the product-limit estimators, the other one as a summation form. Data pertaining to a cancer chemotheray experiment are examined with these statistics.

  • PDF

Evaluation of the Reliability of Crash Discrimination Algorithms by using the Monte Carlo Method (Monte Carlo 방법을 이용한 충돌 판별 알고리즘의 신뢰성 평가)

  • 김영학;정현용
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.9 no.4
    • /
    • pp.193-203
    • /
    • 2001
  • The Monte Carlo method was used to evaluate the reliability of crash discrimination algorithms. Through the Fast Fourier Transformation, crash pulses obtained during frontal crash tests of a mini van and a sports utility vehicle were transformed to signals in the frequency domain, and the signals were divided into basic signals and changeable signals. The changeable signals were modified through random generation, and they were combined with the basic signals. Then, the combined signals were transferred back to the time domain. In this way numerous crash pulses could be generated. For the generated pulses, crash discrimination algorithms were evaluated by examining whether they did not result in air bag deployment for the pulses requiring no air bag deployment and whether they resulted in time-to-fires faster than required time-to-fires for the pulses requiring air bag deployment. The crash discrimination algorithm in which the absolute value of the deceleration change multiplied by the velocity change or the summation of the absolute value of the deceleration change was used as a metric was Proven to be highly reliable.

  • PDF

Optical Image Split-encryption Based on Object Plane for Completely Removing the Silhouette Problem

  • Li, Weina;Phan, Anh-Hoang;Jeon, Seok-Hee;Kim, Nam
    • Journal of the Optical Society of Korea
    • /
    • v.17 no.5
    • /
    • pp.384-391
    • /
    • 2013
  • We propose a split-encryption scheme on converting original images to multiple ciphertexts. This conversion introduces one random phase-only function (POF) to influence phase distribution of the preliminary ciphertexts. In the encryption process, the original image is mathematically split into two POFs. Then, they are modulated on a spatial light modulator one after another. And subsequently two final ciphertexts are generated by utilizing two-step phase-shifting interferometry. In the decryption process, a high-quality reconstructed image with relative error $RE=7.6061{\times}10^{-31}$ can be achieved only when the summation of the two ciphertexts is Fresnel-transformed to the reconstructed plane. During the verification process, any silhouette information was invisible in the two reconstructed images from different single ciphertexts. Both of the two single REs are more than 0.6, which is better than in previous research. Moreover, this proposed scheme works well with gray images.

Throughput Analysis of ETSI BRAN HIPERLAN/2 MAC Protocol Taking Guard Timing Spaces into Consideration

  • Ko, You-Chang;Son, Yong-Tae;Shin, Yong-Eok;Lee, Hyong-Woo;Cho, Choong-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.515-517
    • /
    • 2003
  • In this paper we examine the effects of the required portions of guard timing spaces in a MAC frame of ETSI BRAN HIPERLAN/2 system such as inter-mobile guard timing space in UL(Up Link) duration, inter-RCH(Random CHannel) guard timing space, sector switch guard timing space. In particular, we calculate the number of OFDM(Orthogonal Frequency Division Multiplexing) symbols required for these guard timing spaces in a MAC frame. We them evaluate the throughput of HIPERLAN/2 system as we vary parameter such as the guard time values defined in [2], the number of DLCCs(Data Link Control Connections), and the number of RCHs. Finally we show by numerical results that the portions for the 새심 summation of required guard timing spaces in a MAC frame are not negligible, and that they should be properly considered when trying to evaluate the performance of MAC protocol of HIPERLAN/2 system and also when determining the number of RCHs as well as the number of DLCCs in UL PDU trains at an AP/CC(Access Point/Central Controller).

  • PDF

Molecular Dynamics Simulation Studies of Zeolite-A. Ⅰ. Structure and Dynamics of $Na^+$ Ions in Rigid Dehydrated Zeolite-A Framework

  • Moon Gyeong Keun;Choi Sang Gu;Kim Han Soo;Lee Song Hi
    • Bulletin of the Korean Chemical Society
    • /
    • v.13 no.3
    • /
    • pp.317-324
    • /
    • 1992
  • Structure and dynamics of $Na^+$ ions are investigated by molecular dynamics simulations of rigid dehydrated zeolite-A at several temperatures using a simple Lennard-Jones potential plus Coulomb potential. A best-fitted set of electrostatic charges is chosen from the results of simulation at 298.15 K and Ewald summation technique is used for the long-ranged character of Coulomb interaction. The calculated x, y, and z coordinates of $Na^+$ ions are in good agreement with the positions determined by X-ray crystallography within statistical errors, their random movings in different types of closed cages are well described by time-correlation functions, and $Na_Ⅰ$ type ions are found to be less diffusive than $Na_Ⅱ$ and $Na_{III}$. At 600.0 K, the unstable $Na_{III}$ type ion pushes down one of nearest $Na_{I}$ ions into the $\beta-cage$ and sits on the stable site Ⅰ, and the captured ion in the $\beta-cage$ wanders over and attacks one of 8 $Na_{I}$ type ions.

The Weekly and Daily Energy Expenditure and Nutrition Survey on the Republic of Bores Army Cadets (육군 사관생도의 에너지소비량 및 영양섭취량에 관한 연구)

  • Cho, T.H.
    • The Korean Journal of Physiology
    • /
    • v.1 no.1
    • /
    • pp.121-130
    • /
    • 1967
  • Determination of weekly and daily energy expenditure was made on 62 Republic of Korea Army cadets who were selected at random in order to estimate the weekly and daily ealorie expenditure. Basal metabolic rate (B.M.R.), and energy cost of various military and daily activities were measured by indirect calorimetry using open circuit method. Time-motion studies were also carried on using a stop-watch. The total weekly energy expenditure was calculated by summation of data using energy cost per minute, and the time spent on each activity. Determination of daily energy expenditure was deduced from each data of weekly energy expenditure. Food survey was also carried on for a week, and daily calorie intake was determined by a weekly average discounting loss in cooking. All measurements were determined from the Standard Table of Food Composition published by the Ministry of National Defense (1961). Following data were observed. 1. Physical status of cadets are as follows. Please note that the height and weight averages are 1-2cm and 4-5kg respectively over that of the Seoul National University students. First year Height 167.92 cm $(S.D.{\pm}4.09)$ Weight 61.72 kg $(S.D.{\pm}4.53)$ Second year Height 167.89 cm $(S.D.{\pm}3.46)$ Weight 63.01 kg $(S.D.{\pm}4.61)$ Third year Height 168.15 cm $(S.D.{\pm}4.24)$ Weight 43.48 kg $(S.D.{\pm}5.03)$ Fourth year Height 168.10 cm $(S.D.{\pm}3.70)$ Weight 64.02kg $(S.D.{\pm}5.10)$ 2. The B.M.R. of cadets averaged $36.57\;Cal./m^2/hr.(S.D.{\pm}3.63\;Cal./m^2/hr.)$ is almost equal with data on the same ages of civilians and the Japanese, but a lower average of $5.1\;Cal./m^2/hr.$ than that of a common soldier. 3. The energy expenditure during various military activities is close agreement with Consolazio. Passmore and Durnin, and Japanese reports.

  • PDF

An Image Concealment Algorithm Using Fuzzy Inference (퍼지 추론을 이용한 영상은닉 알고리즘)

  • Kim, Ha-Sik;Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.4
    • /
    • pp.485-492
    • /
    • 2007
  • In this paper, we propose the receiver block error detection of the video codec and the image concealment algorithm using fuzzy inference. The proposed error detection and concealment algorithm gets SSD(Summation of Squared Difference) and BMC(Boundary Matching Coefficient) using the temporal and spatial similarity between corresponded blocks in the two successive frames. Proportional constant, ${\alpha}$, for threshold value, TH1 and TH2, is decided after fuzzy data is generated by each parameter. To examine the propriety of the proposed algorithm, random errors are inserted into the QCIF Susie standard image, then the error detection and concealment performance is simulated. To evaluate the efficiency of the algorithm, image quality is evaluated by PSNR for the error detection and concealed image by the existing VLC table and by the proposed method. In the experimental results, the error detection algorithm could detect all of the inserted error, the image quality is improved over 15dB after the error concealment compare to existing error detection algorithm.

  • PDF