• Title/Summary/Keyword: similar

Search Result 49,035, Processing Time 0.07 seconds

CAN A WIND MODEL MIMIC A CONVECTION-DOMINATED ACCRETION FLOW MODEL\ulcorner

  • Chang, Heon-Young
    • Journal of Astronomy and Space Sciences
    • /
    • v.18 no.1
    • /
    • pp.1-6
    • /
    • 2001
  • In this paper we investigate the properties of advection-dominated accretion flows (ADAFs) in case that outflows carry away infalling matter with its angular momentum and energy. Positive Bernoulli number in ADAFs allow a fraction of the gas to be expelled in a form of outflows. The ADAFs are also unstable to convection. We present self-similar solutions for advection-dominated accretion flows in the presence of outflows from the accretion flows(ADIOS). The axisymmetric flow is treated in variables integrated over polar sections and the effects of outflows on the accretion flow are parameterized for possible configurations compatible with the one dimensional self-similar ADAF solution. We explicitly derive self-similar solutions of ADAFs in the presence of outflows and show that the strong outflows in the accretion flows result in a flatter density profile, which is similar to that of the convection-dominated accretion flows(CDAFs) in which convection transports the angular momentum inward and the energy outward. There two different versions of the ADAF model should show similar behaviors in X-ray spectrum to some extent. Even though the two models may show similar behaviors, they should be distinguishable due to different physical properties. We suggest that for a central object of which mass is known these two different accretion flow should have different X-ray flux value due to deficient matter in the wind model.

  • PDF

Comparison Study on Nondestructive Strength Equation Based on Probability for Bridges (확률론적 방법을 적용한 도로교량의 비파괴 압축강도식 평가)

  • Kim, Hun-Kyom
    • International Journal of Highway Engineering
    • /
    • v.20 no.3
    • /
    • pp.39-46
    • /
    • 2018
  • PURPOSES: This study is to estimate nondestructive strength equation based on probability for bridges using field test data. METHODS : In this study, a series of the field inspection and the test have been performed on 297 existing bridges, in order to evaluate the bridges, based on the test results of the in-depth inspection, and the estimated strengths by means of the nondestructive strength equations are analyzed and compared with results of the core specimen strengths. RESULTS : According to results of analyses, In case of standard design compressive strength of concrete is 18MPa, 21MPa, similar reliability of RILEM equation were 0.89~0.90, but in case of standard design compressive strength of concrete is 35MPa, 40MPa were 0.4~0.56. According to standard design compressive strength of concrete is 40MPa, similar reliability of ultrasonic pulse velocity method equation were 0.56. CONCLUSIONS :RILEM equation had high similar reliability than other equation in case of standard design compressive strength of concrete is 18MPa, 21MPa, but had low similar reliability than other equation in case of standard design compressive strength of concrete is 35MPa, 40MPa. and ultrasonic pulse velocity method equation had low similar reliability than other equation in case of standard design compressive strength of concrete is 40MPa.

A Study on the optimization design of ATM network Using Internet Traffic Characteristics (인터넷 트래픽 특성을 이용한 ATM 망의 최적설계에 관한 연구)

  • 최삼길;김동일
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.4
    • /
    • pp.574-581
    • /
    • 2002
  • Traditional queueing analyses are very useful for designing a network's capacity and predicting their performances, however most of the predicted results from the queueing analyses are quite different from the realistic measured performance. And recent empirical studies on LAN, WAN, and VBR traffic characteristic have indicated that the models used in the traditional Poisson assumption cannot properly predict the real traffic properties due to underestimation of the long-range dependence of network traffics and self-similar properties. In this paper, It is also shown that the self-similar traffic reflects real Ethernet traffic characteristics by comparing Pareto-like ON/OFF source model which is exactly self-similar model to the traditional Poisson model. It is also performed optimization design and performance analysis of ATM network using Internet traffic characteristics.

Grid-based Similar Trajectory Search for Moving Objects on Road Network (공간 네트워크에서 이동 객체를 위한 그리드 기반 유사 궤적 검색)

  • Kim, Young-Chang;Chang, Jae-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.1
    • /
    • pp.29-40
    • /
    • 2008
  • With the spread of mobile devices and advances in communication techknowledges, the needs of application which uses the movement patterns of moving objects in history trajectory data of moving objects gets Increasing. Especially, to design public transportation route or road network of the new city, we can use the similar patterns in the trajectories of moving objects that move on the spatial network such as road and railway. In this paper, we propose a spatio-temporal similar trajectory search algorithm for moving objects on road network. For this, we define a spatio-temporal similarity measure based on the real road network distance and propose a grid-based index structure for similar trajectory search. Finally, we analyze the performance of the proposed similar trajectory search algorithm in order to show its efficiency.

  • PDF

A Similar Price Zone Determination of Public Land Price Using a Hybrid Clustering Technique (평균연결법과 K-means 혼합클러스터링 기법을 이용한 공시지가 유사가격권역의 설정)

  • Yi Seong-Kyu;Park Soo-Hong;Hong Sung-Eon
    • Journal of the Korean Geographical Society
    • /
    • v.41 no.1 s.112
    • /
    • pp.121-135
    • /
    • 2006
  • Even though the similar land price zone is very important element in the public land appraisal procedure, the concept is implicitly described and applied into the actual land appraisal system. This situation makes it worse when applying for the automatic selection of a comparative standard land parcel. In addition, the division of similar land price zones requires the objective and reasonable process for improving ALPAS(Automatic land Price Appraisal System), which becomes an issue today. To solve the similar land price zone determination problem that is caused by the lack of objective numerical standard, this study proposed a similar land price zone determination method using a hybrid clustering technique. Results showed that this hybrid clustering method that applied into the test area could easily detect similar land price zones with considerable accuracy levels, which are verified with some test statistics and real comparative standard land parcels done by manually.

An Efficient Method for Finding Similar Regions in a 2-Dimensional Array Data (2차원 배열 데이터에서 유사 구역의 효율적인 탐색 기법)

  • Choe, YeonJeong;Lee, Ki Yong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.4
    • /
    • pp.185-192
    • /
    • 2017
  • In various fields of science, 2-dimensional array data is being generated actively as a result of measurements and simulations. Although various query processing techniques for array data are being studied, the problem of finding similar regions, whose sizes are not known in advance, in 2-dimensional array has not been addressed yet. Therefore, in this paper, we propose an efficient method for finding regions with similar element values, whose size is larger than a user-specified value, for a given 2-dimensional array data. The proposed method, for each pair of elements in the array, expands the corresponding two regions, whose initial size is 1, along the right and down direction in stages, keeping the shape of the two regions the same. If the difference between the elements values in the two regions becomes larger than a user-specified value, the proposed method stops the expansion. Consequently, the proposed method can find similar regions efficiently by accessing only those parts that are likely to be similar regions. Through theoretical analysis and various experiments, we show that the proposed method can find similar regions very efficiently.

Feasibility of Using Similar Electrocardiography Measured around the Ears to Develop a Personal Authentication System (귀 주변에서 측정한 유사 심전도 기반 개인 인증 시스템 개발 가능성)

  • Choi, Ga-Young;Park, Jong-Yoon;Kim, Da-Yeong;Kim, Yeonu;Lim, Ji-Heon;Hwang, Han-Jeong
    • Journal of Biomedical Engineering Research
    • /
    • v.41 no.1
    • /
    • pp.42-47
    • /
    • 2020
  • A personal authentication system based on biosignals has received increasing attention due to its relatively high security as compared to traditional authentication systems based on a key and password. Electrocardiography (ECG) measured from the chest or wrist is one of the widely used biosignals to develop a personal authentication system. In this study, we investigated the feasibility of using similar ECG measured behind the ears to develop a personal authentication system. To this end, similar ECGs were measured from thirty subjects using a pair of three electrodes attached behind each of the ears during resting state during which the standard Lead-I ECG was also simultaneously measured from both wrists as baseline ECG. The three ECG components, Q, R, and S, were extracted for each subject as classification features, and authentication accuracy was estimated using support vector machine (SVM) based on a 5×5-fold cross-validation. The mean authentication accuracies of Lead I-ECG and similar ECG were 90.41 ± 8.26% and 81.15 ± 7.54%, respectively. Considering a chance level of 3.33% (=1/30), the mean authentication performance of similar ECG could demonstrate the feasibility of using similar ECG measured behind the ears on the development of a personal authentication system.

Analysis of methods for the model extraction without training data (학습 데이터가 없는 모델 탈취 방법에 대한 분석)

  • Hyun Kwon;Yonggi Kim;Jun Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.57-64
    • /
    • 2023
  • In this study, we analyzed how to steal the target model without training data. Input data is generated using the generative model, and a similar model is created by defining a loss function so that the predicted values of the target model and the similar model are close to each other. At this time, the target model has a process of learning so that the similar model is similar to it by gradient descent using the logit (logic) value of each class for the input data. The tensorflow machine learning library was used as an experimental environment, and CIFAR10 and SVHN were used as datasets. A similar model was created using the ResNet model as a target model. As a result of the experiment, it was found that the model stealing method generated a similar model with an accuracy of 86.18% for CIFAR10 and 96.02% for SVHN, producing similar predicted values to the target model. In addition, considerations on the model stealing method, military use, and limitations were also analyzed.

Similar sub-Trajectory Retrieval Technique based on Grid for Video Data (비디오 데이타를 위한 그리드 기반의 유사 부분 궤적 검색 기법)

  • Lee, Ki-Young;Lim, Myung-Jae;Kim, Kyu-Ho;Kim, Joung-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.183-189
    • /
    • 2009
  • Recently, PCS, PDA and mobile devices, such as the proliferation of spread, GPS (Global Positioning System) the use of, the rapid development of wireless network and a regular user even images, audio, video, multimedia data, such as increased use is for. In particular, video data among multimedia data, unlike the moving object, text or image data that contains information about the movements and changes in the space of time, depending on the kinds of changes that have sigongganjeok attributes. Spatial location of objects on the flow of time, changing according to the moving object (Moving Object) of the continuous movement trajectory of the meeting is called, from the user from the database that contains a given query trajectory and data trajectory similar to the finding of similar trajectory Search (Similar Sub-trajectory Retrieval) is called. To search for the trajectory, and these variations, and given the similar trajectory of the user query (Tolerance) in the search for a similar trajectory to approximate data matching (Approximate Matching) should be available. In addition, a large multimedia data from the database that you only want to be able to find a faster time-effective ways to search different from the existing research is required. To this end, in this paper effectively divided into a grid to search for the trajectory to the trajectory of moving objects, similar to the effective support of the search trajectory offers a new grid-based search techniques.

  • PDF

perturbed Cantor set and quasi-self-similar measure

  • 백인수
    • Proceedings of the Korean Society of Computational and Applied Mathematics Conference
    • /
    • 2003.09a
    • /
    • pp.12.2-12
    • /
    • 2003
  • 미분 가능한 함수가 독립변수의 각 점에서 미분계수를 가지듯이 가장 일반화된 Cantor집합의 각 점에서 weak local dimension 을 갖는다. 이러한 weak local dimension 은 두 가지가 있는데 weak lower local dimension 과 weak upper local dimension 이 있다 weak lower local dimension 은 국소적인 의미로 perturbed Cantor 집합의 lower Cantor dimension 이고 Hausdorff dimension 과 관련이 있다. weak upper local dimension 은 국소적인 의미로 perturbed Cantor 집합의 upper Cantor dimension 이고 packing dimension 과 관련이 있다. 이때 각 점에 대응하는 유관한 측도는 quasi-self-similar measure 이며 그 점의 weak lower local dimension 이 s 이면 그 점의 s-차원 quasi-self-similar measure 의 lower local dimension 이 s 가 된다. 마찬가지로 그 점의 weak upper local dimension 이 s 이면 그 점의 s-차원 quasi-self-similar measure 의 upper local dimension 이 s 가 된다. 따라서 이와 같은 사실을 이용하면 가장 일반화된 Cantor집합의 각 점에서의 weak local dimension 을 이용하여 그 집합의 Hausdorff 또는 packing 차원의 정보를 얻을 수 있을 뿐 더러 weak local dimension 을 이용한 spectrum 을 또한 구할 수 있다. 한편 weak local dimension 과 유관한 quasi-self-similar measure 는 집합의 spectrum을 생성하며 이 spectrum 을 이루는 각 부분집합의 차원에 대하여 보다 좋은 정보를 주는 transformed dimension 과 또 다른 관련을 갖게 된다.

  • PDF