• Title/Summary/Keyword: 방향성 함수

Search Result 599, Processing Time 0.024 seconds

Design of the Broad-Band 3-dB Branch-Line Directional Coupler Using Exponential Transmission Line (지수함수적인 비균일 전송선을 이용한 광대역 3-dB 브랜치라인 방향성 결합기의 설계)

  • 하헌태;김세윤
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.28A no.9
    • /
    • pp.685-691
    • /
    • 1991
  • A broad-band 3-dB directional coupler is implemented by using cascaded exponential transmission line as branch lines. Compared with that of the uniform transmission line, the bandwidth of the proposed 3-dB branch-line directional cpoupler increases 2.96 times.

  • PDF

Dynamic Adaptive Model based on Probabilistic Distribution Functions and User's Profile for Web Media Systems (웹 미디어 시스템을 위한 확률 분포 함수와 사용자 프로파일에 기반 한 동적 적응 모델)

  • Baek, Yeong-Tae;Lee, Se-Hoon
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.1
    • /
    • pp.29-39
    • /
    • 2003
  • In this paper we proposed dynamic adaptive model based on discrete probabilistic distribution functions and user's profile for web media systems(web based hypermedia systems). The model represented that the application domain is modelled using a weighted direct graph and the user's behaviour is modelled using a probabilistic approach that dynamically constructs a discrete probability distribution functions. The proposed probabilistic interpretation of the web media structure is used to characterize latent properties of the user's behaviour, which can be captured by tracking user's browsing activity. Using that distribution the system attempts to assign the user to the best profile that fits user's expectations.

  • PDF

Password-based Authentication and Key Agreement Protocol using Verifier (검증자를 사용한 패스워드 기반의 인증 및 키 교환 프로토콜)

  • 반정;이재욱;김순자
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.418-420
    • /
    • 2004
  • 패스워드 기반의 키 교환 프로토콜들은 참여자들이 쉽게 기억할 수 있는 자신의 패스워드를 사용하므로 단순성, 편리성, 이동성의 장점 때문에 광범위하게 사용되지만 완전한 전 방향 보안성(perfect forward secrecy), 패스워드 추측공격과 Denning-Saccon 공격에 취약하다. 본 논문에서 제안한 검증자(verifier)를 사용한 패스워드 기반의 인증 및 키 교환 프로토콜은 키 교환 프로토콜 요구 사항을 만족하고, 알려진 공격으로부터 안전하며 DH(Diffie-Hellman) 키 교환 방법과 해쉬 함수만을 사용하기 때문에 기존의 프로토콜보다 구조가 간단하며 높은 효율성을 가진다.

  • PDF

Consolidation Model and Numerical Analysis for Soft Clay Ground Considering Characteristics of Material Function (물질함수특성을 고려한 연약 점토지반의 압밀모델 및 수치해석)

  • Jeon, Je-Sung;Yi, Chang-Tok;Lee, Song
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.8 no.2
    • /
    • pp.123-136
    • /
    • 2004
  • Terzaghi's one-dimensional consolidation theory has some important assumption, which can't be applicable to predict the behavior of soft clay ground. Especially, predictions using infinitesimal strain and linear material function related with permeability can give rise to mistake in comparison with the result of real behavior in site. For this reason, Gibson et al. established a rigorous formulation for the one-dimensional nonlinear finite strain consolidation theory, which can consider non-linearity of material function. But it is difficult to apply this theory to predict the behavior of common soft clay ground with vertical drain. In this study, consolidation model which can consider the vertical and horizontal flow of a fully saturated clay layer, self-weight of soil and nonlinear characteristics of compressibility and permeability are derived. Numerical analysis scheme, which can be applied to consolidation analysis by derived consolidation model in this study was developed. The characteristics of material function were examined using laboratory testing such as standard consolidation test, Rowe-cell test and modified consolidation test.

General Construction for Provably Secure Public Key Cryptosystem in the Standard Model (표준모델에서 안전성이 증명 가능한 공개키 암호 시스템을 구성하는 일반적인 방법)

  • Choi, Seung-Bok;Oh, Soo-Hyun;Won, Dong-Ho
    • Annual Conference of KIPS
    • /
    • 2001.04a
    • /
    • pp.403-406
    • /
    • 2001
  • 암호 기술이 다양화되고 실용화되면서 암호문을 변경할 수 없다는 안전성(CCS)를 만족하는 암호 알고리즘에 대한 필요성이 제기되었고, 최근 몇 년간 안전성이 증명가능한 공개키 암호 방식을 개발하려는 연구가 활발히 진행되어왔다. 지금까지의 연구는 암/복호화시의 효율성 개선과 안전성 증명에 필요한 보다 악한 가정을 사용하려는 방향으로 진행되어왔다. 본 논문에서는 표준모델하에서 기존에 알려진 일 방향 함수를 이용하여 적응-선택 암호문 공격에 안전한 공개키 암호시스템을 구성하는 일반적인 변환 방법을 제안한다. 제안된 방식으로 변환된 공개키 암호 방식은 CCS를 만족할 뿐만 아니라 효율적이며 가장 최소화된 가정만을 사용하기 때문에 기존의 어떤 방식들보다 이상적인 변형방식이다.

  • PDF

Pattern Recognition using Robust Feedforward Neural Networks (로버스트 다층전방향 신경망을 이용한 패턴인식)

  • Hwang, Chang-Ha;Kim, Sang-Min
    • Journal of the Korean Data and Information Science Society
    • /
    • v.9 no.2
    • /
    • pp.345-355
    • /
    • 1998
  • The back propagation(BP) algorithm allows multilayer feedforward neural networks to learn input-output mappings from training samples. It iteratively adjusts the network parameters(weights) to minimize the sum of squared approximation errors using a gradient descent technique. However, the mapping acquired through the BP algorithm may be corrupt when errorneous training data are employed. In this paper two types of robust backpropagation algorithms are discussed both from a theoretical point of view and in the case studies of nonlinear regression function estimation and handwritten Korean character recognition. For future research we suggest Bayesian learning approach to neural networks and compare it with two robust backpropagation algorithms.

  • PDF

Three-Dimensional Numerical Experiment on the Tide-Induced Residual Currents around a Circular Island (원형섬 주변 조사 잔차류에 대한 삼차원 수치실험연구)

  • 이호진;최현용;정종률
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.5 no.4
    • /
    • pp.338-349
    • /
    • 1993
  • Most of numerical models for studying tide-induced residual currents (TIRC) were to dimensional depth averaged models which were confined to anlayze the horizontal structure of TIRC. In this study, TIRC occurring around a circular island was simulated with the three-dimensional spectral model which employed by the finite difference method in the horizontal direction and the expansion of basis function in the vertical direction. The main results of numerical experiment can be summarized as follows. Firstly. both topographic and nonlinear effect played an important role in the generation of TIRC. Secondly, when the currents were rotary clockwise. the horizontal structure of TIRC appeared to rotate in the same direction. These results were consistent with those of previous studies of two-dimensional numerical models.

  • PDF

Coupled Trigonomotric Transmission Line and its Application (결합삼각함수 선로와 그 응용)

  • 박송배
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.12 no.6
    • /
    • pp.14-20
    • /
    • 1975
  • Characteristics of coupled trigonometric transmission lines (CTTL) are studies based on the theory of general coupled nonuniform transmission lines. First, the 4-port transmission matrix parameters of networks and directional couplers using CTTL. The phase slrift characteristic of the all-pass networks and the magnitude characteristic of the directional couplers are studied in detail for various coupling and a high-pass small ripple directional coupler using CTTL are given and their physical realization is considered.

  • PDF