• Title/Summary/Keyword: Distribution Journal

Search Result 56,960, Processing Time 0.071 seconds

Estimation of p-values with Two Dimensional Null Distributions from Genomic Data Set

  • Yee, Jaeyong;Park, Mira
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.2711-2719
    • /
    • 2018
  • When an observable is described by a single value, the statistic significance may be estimated by construction of null distribution using permutation and counting the portion of it that exceeds the observed value by chance. Genome-wide association study usually focuses on the association measure between a single or interacting genotypes with a single phenotype. However investigation of common genotypes associated simultaneously on multiple phenotypes may involve the observables that should be described with multiple numbers. Statistical significance for such an observable would involve null distribution in multiple dimensions. In this study, extension of the p-value estimation process using null distribution in one dimension has been sought that may be applicable to two dimensional case. Comparison of the position of points within the set of points they form has been proposed to use a positioning parameter inspired by the extension of the Kolmogorov-Smirnov statistic to two dimensions.

A parametric study on effects of pitting corrosion on stiffened panels' ultimate strength

  • Feng, Liang;Hu, Luocun;Chen, Xuguang;Shi, Hongda
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.12 no.1
    • /
    • pp.699-710
    • /
    • 2020
  • Pitting corrosion commonly shaped in hull structure due to marine corrosive environment seriously causes the deterioration of structural performance. This paper deals with the ultimate strength behaviors of stiffened ship panels damaged by the pits subjected to uniaxial compression. A series of no-linear finite element analyses are carried out for three stiffened panels using ABAQUS software. Influences of the investigated typical parameters of pit degree (DOP), depth, location and distribution on the ultimate strength strength are discussed in detail. It is found that the ultimate strength is significantly reduced with increasing the DOP and pit depth and severely affected by the distribution. In addition, the pits including their distributions on the web have a slight effect on the ultimate strength. Compared with regular distribution, random one on the panel result in a change of collapse mode. Finally, an empirical formula as a function of corrosion volume loss is proposed for predicting the ultimate strength of stiffened panel.

Adversarial-Mixup: Increasing Robustness to Out-of-Distribution Data and Reliability of Inference (적대적 데이터 혼합: 분포 외 데이터에 대한 강건성과 추론 결과에 대한 신뢰성 향상 방법)

  • Gwon, Kyungpil;Yo, Joonhyuk
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.1
    • /
    • pp.1-8
    • /
    • 2021
  • Detecting Out-of-Distribution (OOD) data is fundamentally required when Deep Neural Network (DNN) is applied to real-world AI such as autonomous driving. However, modern DNNs are quite vulnerable to the over-confidence problem even if the test data are far away from the trained data distribution. To solve the problem, this paper proposes a novel Adversarial-Mixup training method to let the DNN model be more robust by detecting OOD data effectively. Experimental results show that the proposed Adversarial-Mixup method improves the overall performance of OOD detection by 78% comparing with the State-of-the-Art methods. Furthermore, we show that the proposed method can alleviate the over-confidence problem by reducing the confidence score of OOD data than the previous methods, resulting in more reliable and robust DNNs.

A LT Codec Architecture with an Efficient Degree Generator and New Permutation Technique (효율적인 정도 생성기 및 새로운 순열 기법을 가진 LT 코덱 구조)

  • Hasan, Md. Tariq;Choi, Goang Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.117-125
    • /
    • 2014
  • In this paper, a novel hardware architecture of the LT codec is presented where non-BP based decoding algorithm is applied. Novel LT codec architecture is designed with an efficient degree distribution unit using Verilog HDL. To perform permutation operation, different initial valued or time shifted counters have been used to get pretty well permutations and an effect of randomness. The codec will take 128 bits as input and produce 256 encoded output bits. The simulation results show expected performances as the implemented distribution and the original distribution are pretty same. The proposed LT codec takes 257.5 cycle counts and $2.575{\mu}s$ for encoding and decoding instead of 5,204,861 minimum cycle counts and 4.43s of the design mentioned in the previous works where iterative soft BP decoding was used in ASIC and ASIP implementation of the LT codec.

Temperature Distribution of High Speed Tool Steel Rod During High Speed Hot Rolling Procedure (고속열간압연에서 고속도공구강 봉재의 온도분포 해석)

  • Jeong, Hyo Tae;Lee, Soo Yeon;Ha, Tae Kwon;Jung, Jae Young
    • Korean Journal of Metals and Materials
    • /
    • v.46 no.3
    • /
    • pp.150-158
    • /
    • 2008
  • The temperature distribution of high speed tool steel rod has been studied during high speed hot rolling procedures. The tool steel rod shows severe temperature gradient during rolling procedures and the temperature at the center of rod are much higher than that at the surface of rod. This temperature gradient accumulated after every rolling procedure and the center of rolled rod could be remelt in some procedures to cause inside defects. In this study, the temperature distribution was simulated using finite element method and the processing parameters such as rolling speed, cooling condition, have been discussed to prevent the temperature increases at the center of rod.

Proposal of ID-Based Cryptosystems Integrating Digital Signature and Key Distribution (개인정보에 기초한 서명 및 키 분배 통합 암호시스템의 제안)

  • Ha, Jae-Cheol;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.57-70
    • /
    • 1996
  • It would be desirable in network to implement an efficient asymmetric key cryptosystem which can not only solve the public key authentication problem but also integrate digital signature and key distribution, We propose two ID-based key distribution systems integrated with digital signature, and analyze them in computation and implementation. The first is based on the EIGamal-typed signature scheme, and the second is based on the RSA scheme, Both can be employed in one-pass and interactive key distribution systems.

Authenticated quantum key distribution protocol (인증된 양자 키 분배 프로토콜)

  • 이화연;홍창호;이덕진;양형진;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.49-55
    • /
    • 2004
  • We propose a new authenticated quantum key distribution protocol. Using Greenberger-Home-Zeilinger(GHZ) state, the users of our protocol can authenticate each other and share a secret key. In our protocol, the shared key is not revealed to the honest arbitrator, which Provides the additional secrecy. Our Protocol not only guarantees secrecy as the other quantum key distribution protocols, but also the users authenticates each other. In practice, our new protocol can be easily implemented because it only uses basic quantum operations.

Design and Implementation of Secure Distribution System for Broadcasting Contents (방송 콘텐츠를 위한 안전한 유통 시스템 설계 및 구현)

  • Lee, Jin-Heung;Lee, Hea-Ju;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.19-27
    • /
    • 2007
  • Broadcasting contents protection system for HDTV has many difficult to apply file encryption technology that using the existing DRM systems. Therefore, this system has to be processed as accommodative about broadcasting contents format such as TS and PS and so on. Also, this system must support efficient encryption technology and random access mode. In addition, this system must have suitable key distribution mechanism in broadcasting environment. In this paper, we propose and implement encryption/key distribution scheme applicable to encoder/decoder without changing the existing MPEG system.

Secure Key Distribution Protocol for ZigBee Wireless Sensor Network (ZigBee 무선 센서 네트워크에서의 안전한 키 분배 프로토콜)

  • Oh, Su-Min;Choi, Soo-Kyeong;Kwon, Ye-Jin;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.745-759
    • /
    • 2012
  • It is shown in this paper that Yuksel-Nielson's key distribution scheme is not secure against key de-synchronization attack even though their scheme supplement ZigBee-2007 specification's security problems. Furthermore, a new key distribution scheme is proposed, which is the one to fix the security weakness of Yuksel-Nielson's scheme, as well as its security and performance analysis to verify its effectiveness.

Study of Supply-Production-Distribution Routing in Supply Chain Network Using Matrix-based Genetic Algorithm (공급사슬네트워크에서 Matrix-based 유전알고리즘을 이용한 공급-생산-분배경로에 대한 연구)

  • Lim, Seok-Jin;Moon, Myung-Kug
    • Journal of the Korea Safety Management & Science
    • /
    • v.22 no.4
    • /
    • pp.45-52
    • /
    • 2020
  • Recently, a multi facility, multi product and multi period industrial problem has been widely investigated in Supply Chain Network(SCN). One of keys issues in the current SCN research area involves minimizing both production and distribution costs. This study deals with finding an optimal solution for minimizing the total cost of production and distribution problems in supply chain network. First, we presented an integrated mathematical model that satisfies the minimum cost in the supply chain. To solve the presented mathematical model, we used a genetic algorithm with an excellent searching ability for complicated solution space. To represent the given model effectively, the matrix based real-number coding schema is used. The difference rate of the objective function value for the termination condition is applied. Computational experimental results show that the real size problems we encountered can be solved within a reasonable time.