• Title/Summary/Keyword: trace function

Search Result 231, Processing Time 0.027 seconds

A Study on the Correlation of Mean Velocity of Basilar Artery and Equilibrium Function with Sasang Constitution (체질에 따른 기저동맥 평균 혈류속도와 균형 기능과의 상관관계에 대한 연구)

  • Lee, Joo-Yong;Choi, Jae-Song;Bae, Na-Young;Ahn, Taek-Won
    • Journal of Sasang Constitutional Medicine
    • /
    • v.22 no.4
    • /
    • pp.30-39
    • /
    • 2010
  • 1. Objectives This study was carried out to investigate the equilibrium functional difference according to mean velocity of basilar artery with Sasang Constitution. 2. Methods We analyzed the data of 300 adults(194 males, 106 females), who visited oriental hospital of D university for medical examiation, which includes Sasang constitution examination, equilibrium function test, transcranial doppler ultrasonography(TCD). We evaluated the trace length and envelop area of open eyes and closed eyes, mean velocity of basilar artery and analyzed its statistical data. 3. Results and Conclusions 1) Within all subjects, trace length and envelop area of closed eyes were significantly lower, in the order of increased mean velocity of basilar artery group, normal mean velocity of basilar artery group and decreased mean velocity of basilar artery group. 2) No significantly difference was seen between the mean velocity of basilar artery and equilibrium function in Soyangin and Soeumin. 3) When closed eyes, trace length were significantly lower in order of increased mean velocity of basilar artery group, normal mean velocity of basilar artery group and decreased mean velocity of basilar artery group, in Taeeumin.

A Theory on the Construction of Binary Sequences with Ideal Atutocorrelation

  • No, Jong-Seon;Yang, Kyeong-Cheol;Chung, Ha-Bong;Song, Hong-Yeop
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.6
    • /
    • pp.223-228
    • /
    • 1997
  • In this paper, we present a closed-form expression of binary sequences of longer period with ideal autocorrelation property in a trace representation, if a given binary sequence with ideal autocorrelation property is described using the trace function. We also enumerate the number of cyclically distinct binary sequences of a longer period with ideal autocorrelation property, which are extended from a given binary sequence with ideal autocorrelation property.

  • PDF

Estimation of Motion-Blur Parameters Based on a Stochastic Peak Trace Algorithm (통계적 극점 자취 알고리즘에 기초한 움직임 열화 영상의 파라메터 추출)

  • 최병철;홍훈섭;강문기
    • Journal of Broadcast Engineering
    • /
    • v.5 no.2
    • /
    • pp.281-289
    • /
    • 2000
  • While acquiring images, the relative motion between the imaging device and the object scene seriously damages the image quality. This phenomenon is called motion blur. The peak-trace approach, which is our recent previous work, identifies important parameters to characterize the point spread function (PSF) of the blur, given only the blurred image itself. With the peak-trace approach the direction of the motion blur can be extracted regardless of the noise corruption and does not need much Processing time. In this paper stochastic peak-trace approaches are introduced. The erroneous data can be selected through the ML classification, and can be made small through weighting. Therefore the distortion of the direction in the low frequency region can be prevented. Using the linear prediction method, the irregular data are prohibited from being selected as the peak point. The detection of the second peak using the proposed moving average least mean (MALM) method is used in the Identification of the motion extent. The MALM method itself includes a noise removal process, so it is possible to extract the parameters even an environment of heavy noise. In the experiment, we could efficiently restore the degraded image using the information obtained by the proposed algorithm.

  • PDF

Levels of Serum Trace Elements in Renal Cell Carcinoma Cases

  • Pirincci, Necip;Gecit, Ilhan;Gunes, Mustafa;Kaba, Mehmet;Tanik, Serhat;Yuksel, Mehmet Bilgehan;Arslan, Harun;Demir, Halit
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.1
    • /
    • pp.499-502
    • /
    • 2013
  • Trace elements which are essential components of biological structures may also be toxic when present at levels above the amounts required for biological function. In our study, trace element levels were measured with furnace atomic absorption spectrophotometry in 33 newly diagnosed renal cell carcinoma cases (preoperative) and 32 healthy controls. When compared with the control group, it was found that the levels of cadmium (Cd), lead (Pb) were higher and the levels of zinc (Zn), iron (Fe) and manganese (Mn) were lower in the patient group. These changes may be important in the formation of renal cell carcinoma, a question which should be explored with postoperative comparative studies.

Threshold Neural Network Model for VBR Video Trace (가변적 비디오 트랙을 위한 임계형 신경망 모델)

  • Jang, Bong-Seog
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.2
    • /
    • pp.34-43
    • /
    • 2006
  • This paper shows modeling methods for VBR video trace. It is well known that VBR video trace is characterized as longterm correlated and highly intermittent burst data. To analyze this, we attempt to model it using neural network with auxiliary linear structures derived from residual threshold. For testing purpose, we generate VBR video trace from chaotic nonlinear function combined with the geometric random noise. The modeling result of the generated data shows that the attempted method represents more accurately than the traditional neural network. However, we also found that combining hRU to the attempted modeling method can yield a closer agreement to statistical features of the generated data than the attempted modeling method alone.

  • PDF

CAUCHY PROBLEMS FOR A PARTIAL DIFFERENTIAL EQUATION IN WHITE NOISE ANALYSIS

  • Chung, Dong-Myung;Ji, Un-Cig
    • Journal of the Korean Mathematical Society
    • /
    • v.33 no.2
    • /
    • pp.309-318
    • /
    • 1996
  • The Gross Laplacian $\Delta_G$ was introduced by Groww for a function defined on an abstract Wiener space (H,B) [1,7]. Suppose $\varphi$ is a twice H-differentiable function defined on B such that $\varphi"(x)$ is a trace class operator of H for every x \in B.in B.

  • PDF

MATRIX OPERATORS ON FUNCTION-VALUED FUNCTION SPACES

  • Ong, Sing-Cheong;Rakbud, Jitti;Wootijirattikal, Titarii
    • Korean Journal of Mathematics
    • /
    • v.27 no.2
    • /
    • pp.375-415
    • /
    • 2019
  • We study spaces of continuous-function-valued functions that have the property that composition with evaluation functionals induce $weak^*$ to norm continuous maps to ${\ell}^p$ space ($p{\in}(1,\;{\infty})$). Versions of $H{\ddot{o}}lder^{\prime}s$ inequality and Riesz representation theorem are proved to hold on these spaces. We prove a version of Dixmier's theorem for spaces of function-valued matrix operators on these spaces, and an analogue of the trace formula for operators on Hilbert spaces. When the function space is taken to be the complex field, the spaces are just the ${\ell}^p$ spaces and the well-known classical theorems follow from our results.

A Design of Secure Audit/ Trace Module to Support Computer Forensics (컴퓨터 포렌식스를 지원하는 보안 감사/추적 모듈 설계)

  • 고병수;박영신;최용락
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.79-86
    • /
    • 2004
  • In general, operating system is offering the security function of OS level to support several web services. However, it is true that security side of OS level is weak from many parts. Specially, it is needed to audit/trace function in security kernel level to satisfy security more than B2 level that define in TCSEC(Trusted Computer System Evaluation Criteria). So we need to create audit data at system call invocation for this, and do to create audit data of equal format about almost event and supply information to do traceback late. This Paper Proposes audit/trace system module that use LKM(Loadable Kernel Module) technique. It is applicable without alteration about existing linux kernel to ensure safe evidence. It offers interface that can utilize external audit data such as intrusion detection system, and also offers safe role based system that is divided system administrator and security administrator These data will going to utilize to computer forensics' data that legal confrontation is Possible.

  • PDF

Design of Binary Sequences with Optimal Cross-correlation Values (최적의 상호상관관계를 갖는 이진 수열의 설계)

  • Choi, Un-Sook;Cho, Sung-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.539-544
    • /
    • 2011
  • Balanced binary sequences of period $2^n-1(n{\geq}1)$ having the two-valued autocorrelation function have many applications in spread-spectrum communications system. In this paper we propose new nonlinear binary sequences which are constructed from Legendre sequences with the same cross-correlation as the sequences proposed by Cho. These sequences include the m-sequences, GMW sequences, Kasami sequences and No sequences which are described in terms of the trace function over a finite field. Also the proposed sequences have more low cross-correlation distribution than the quadratic form sequences proposed by Klapper.

Relation between the Irreducible Polynomials that Generates the Same Binary Sequence Over Odd Characteristic Field

  • Ali, Md. Arshad;Kodera, Yuta;Park, Taehwan;Kusaka, Takuya;Nogmi, Yasuyuki;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.3
    • /
    • pp.166-172
    • /
    • 2018
  • A pseudo-random sequence generated by using a primitive polynomial, trace function, and Legendre symbol has been researched in our previous work. Our previous sequence has some interesting features such as period, autocorrelation, and linear complexity. A pseudo-random sequence widely used in cryptography. However, from the aspect of the practical use in cryptographic systems sequence needs to generate swiftly. Our previous sequence generated by utilizing a primitive polynomial, however, finding a primitive polynomial requires high calculating cost when the degree or the characteristic is large. It’s a shortcoming of our previous work. The main contribution of this work is to find some relation between the generated sequence and irreducible polynomials. The purpose of this relationship is to generate the same sequence without utilizing a primitive polynomial. From the experimental observation, it is found that there are (p - 1)/2 kinds of polynomial, which generates the same sequence. In addition, some of these polynomials are non-primitive polynomial. In this paper, these relationships between the sequence and the polynomials are shown by some examples. Furthermore, these relationships are proven theoretically also.