• Title/Summary/Keyword: MD algorithm

Search Result 190, Processing Time 0.026 seconds

Uncertainty Analysis of Flood Damage Estimation Using Bootstrap Method and SIR Algorithm (Bootstrap 방법 및 SIR 알고리즘을 이용한 예상홍수피해액의 불확실성 분석)

  • Lee, Keon-Haeng;Lee, Jung-Ki;Kim, Soo-Jun;Kim, Hung-Soo
    • Journal of Wetlands Research
    • /
    • v.13 no.1
    • /
    • pp.53-66
    • /
    • 2011
  • We estimated the expected flood damage considering uncertainty which is involved in hydrologic processes and data. Actually, this uncertainty represents a freeboard or safety factor in the design of hydraulic structures. The uncertainty was analyzed using Bootstrap method, and SIR algorithm then the frequency based rainfalls were estimated for each method of uncertainty analysis. Also the benefits for each uncertainty analysis were estimated using 'multi-dimensional flood damage analysis(MD-FDA). As a result, the expected flood damage with SIR algorithm was 1.22 times of present status and Boostrap 0.92 times. However when we used SIR algorithm, the likelihood function should be selected with caution for the estimation of the expected flood damage.

Performance Evaluation of Hybrid-SE-MMA Adaptive Equalizer using Adaptive Modulus and Adaptive Step Size (적응 모듈러스와 적응 스텝 크기를 이용한 Hybrid-SE-MMA 적응 등화기의 성능 평가)

  • Lim, Seung-Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.97-102
    • /
    • 2020
  • This paper relates with the Hybrid-SE-MMA (Signed-Error MMA) that is possible to improving the equalization performance by using the adaptive modulus and adaptive step size in SE-MMA adaptive equalizer for the minimizing the intersymbol interference. The equalizer tap coefficient is updatted use the error signal in MMA algorithm for adaptive equalizer. But the sign of error signal is used for the simplification of arithmetic operation in SE-MMA algorithm in order to updating the coefficient. By this simplification, we get the fast convergence speed and the reduce the algorithm processing speed, but not in the equalization performance. In this paper, it is possible to improve the equalization performance by computer simulation applying the adaptive modulus to the SE-MMA which is proposional to the power of equalizer output signal. In order to compare the improved equalization performance compared to the present SE-MMA, the recovered signal constellation that is the output of the equalizer, residual isi, MD(maximum distortion), MSE and the SER perfomance that means the robustness to the external noise were used. As a result of computer simulation, the Hybrid-SE-MMA improve equalization performance in the residual isi and MD, MSE, SER than the SE-MMA.

Transcoding Algorithm for SMV and G.723.1 Vocoders via Direct Parameter Transformation (SMV와 G.723.1 음성부호화기를 위한 파라미터 직접 변환 방식의 상호부호화 알고리듬)

  • 서성호;장달원;이선일;유창동
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.2228-2231
    • /
    • 2003
  • In this paper, a transcoding algorithm for the Selectable Mode Vocoder (SMV) and the G.723.1 speech coder via direct parameter transformation is proposed. In contrast to the conventional tandem transcoding algorithm, the proposed algorithm converts the parameters of one coder to the Other Without going through the decoding md encoding process. The proposed algorithm is composed of four parts: the parameter decoding, line spectral pair (LSP) conversion, pitch period conversion, excitation conversion and rate selection. The evaluation results show that the proposed algorithm achieves equivalent speech quality to that of tandem transcoding with reduced computational complexity and delay.

  • PDF

Molecular Dynamics Simulation of Liquid Alkanes. Ⅰ. Thermodynamics and Structures of Normal Alkanes : n-butane to n-heptadecane

  • 이송희;이홍;박형석;Jayendran C. Rasaiah
    • Bulletin of the Korean Chemical Society
    • /
    • v.17 no.8
    • /
    • pp.735-744
    • /
    • 1996
  • We present results of molecular dynamic (MD) simulations for the thermodynamic and structural properties of liquid n-alkanes, from n-butane to n-heptadecane, using three different models Ⅰ-Ⅲ. Two of the three classes of models are collapsed atomic models while the third class is an atomistically detailed model. Model Ⅰ is the original Ryckaert and Bellemans' collapsed atomic model [Discuss. Faraday Soc. 1978, 66, 95] and model Ⅱ is the expanded collapsed model which includes C-C bond stretching and C-C-C bond angle bending potentials in addition to Lennard-Jones and torsional potentials of model Ⅰ. In model Ⅲ all the carbon and hydrogen atoms in the monomeric units are represented explicitly for the alkane molecules. Excellent agreement of the results of our MD simulations of model Ⅰ for n-butane with those of Edberg et al.[J. Chem. Phys. 1986, 84, 6933], who used a different algorithm confirms the validity of our algorithms for MD simulations of model Ⅱ for 14 liquid n-alkanes and of models Ⅰ and Ⅲ for liquid n-butane, n-decane, and n-heptadecane. The thermodynamic and structural properties of models Ⅰ and Ⅱ are very similar to each other and the thermodynamic properties of model Ⅲ for the three n-alkanes are not much different from those of models Ⅰ and Ⅱ. However, the structural properties of model Ⅲ are very different from those of models Ⅰ and Ⅱ as observed by comparing the radial distribution functions, the average end-to-end distances and the root-mean-squared radii of gyrations.

Digital Watermarking of Medical Image Based on Public Key Encryption Algorithm Considering ROI (ROI를 고려한 공개키 암호화 알고리즘 기반 의료영상 디지털 워터마킹)

  • Lee Hyung-Kyo;Kim Hee-Jung;Seong Tack-Young;Kwon Ki-Ryong;Lee Jong-Keuk
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1462-1471
    • /
    • 2005
  • Recently, the medical image has been digitized by the development of computer science and digitization of the medical devices. There are needs for database service of the medical image and long term storage because of the construction of PACS(picture archiving and communication system) following DICOM(digital imaging communications in medicine) standards, telemedicine, and et al. However, it also caused some kinds of problems, such as illegal reproduction of medical image, proprietary rights and data authentication. In this paper, we propose the new digital watermarking technique for medical image based on public key encryption algorithm for integrity verification. It prevents illegal forgery that can be caused after transmitting medical image data remotely. The watermark is the value of bit-plane in wavelet transform of the original image for certification method of integrity verification. We proposed the embedding regions are randomly chosen considering ROI, and a digital signature is made using hash function of MD5 which input is a secret key. The experimental results show that the watermark embedded by the proposed algorithm can survive successfully in image processing operations and that the watermark's invisibility is good.

  • PDF

Node Distribution-Based Localization for Large-scale Wireless Sensor Networks (대규모 무선 센서 네트워크에서 노드 분포를 고려한 분산 위치 인식 기법 및 구현)

  • Han, Sang-Jin;Lee, Sung-Jin;Lee, Sang-Hoon;Park, Jong-Jun;Park, Sang-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9B
    • /
    • pp.832-844
    • /
    • 2008
  • Distributed localization algorithms are necessary for large-scale wireless sensor network applications. In this paper, we introduce an efficient node distribution based localization algorithm that emphasizes simple refinement and low system load for low-cost and low-rate wireless sensors. Each node adaptively chooses neighbor nodes for sensors, update its position estimate by minimizing a local cost function and then passes this update to the neighbor nodes. The update process considers a distribution of nodes for large-scale networks which have same density in a unit area for optimizing the system performance. Neighbor nodes are selected within a range which provides the smallest received signal strength error based on the real experiments. MATLAB simulation showed that the proposed algorithm is more accurate than trilateration and les complex than multidimensional scaling. The implementation on MicaZ using TinyOS-2.x confirmed the practicality of the proposed algorithm.

A Performance Variation by Scaling Factor in NM-MMA Adaptive Equalization Algorithm (NM-MMA 적응 등화 알고리즘에서 Scaling Factor에 의한 성능 변화)

  • Lim, Seung-Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.2
    • /
    • pp.105-110
    • /
    • 2018
  • This paper compare the adaptive equalization performance of NM-MMA (Novel Mixed-MMA) algorithm which using the mixed const function by scaling factor values. The mixed cost function of NM-MMA composed of the appropriate weighted addition of gradient vector in the MMA and SE-MMA cost function, and updating the tap coefficient based on these function, it is possible to improve the convergence speed and MSE value of current algorithm. The computer simulation was performed in the same channel, step size, SNR environment by changing the scaling factor, and its performance were compared appling the equalizer output constellation, residual isi, MD, MSE, SER. As a result of computer simulation, the residual values of performance index were reduced in case of the scaling factor of MMA cost function was greater than the scaling factor of SE-MMA. and the convergence speed was improved in case of the scaling factor of SE-MMA was greater than the MMA.

Performance Evaluation of MSAG-SCS-MMA-I Adaptive Blind Equalization Algorithm with dual step-size (이중 스텝 크기를 가지는 MSAG-SCS-MMA-I 적응 블라인드 등화 알고리즘의 성능 평가)

  • Jeong, Young-Hwa
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.115-121
    • /
    • 2019
  • In this paper, we propose MSAG-SCS-MMA-I adaptive blind equalization with double step size with very small residual ISI and MSE at steady-state while significantly improving the convergence speed of the traditional SCS-MMA-I algorithm in 256-QAM system. And we evaluate the equalization performance for this algorithm. Different step sizes according to the absolute value of decision-directed error instead of a fixed step-size are applied to the tap update equation of MSAG-SCS-MMA-I, which is controlled by binary flags of '1' or '0' obtained from SCS-MMA-I and decision-directed algorithms. This makes for excellent equalization performance. As a result of computer simulation, we confirmed that the proposed algorithm has more better performance than the MMA, SCS-MMA-I, and MSAG-SCS-MMA-I algorithms in terms of the performance index such as residual ISI, MSE, and MD.

Formal Description and Reference Implementation Code Generation for a Security Algorithm using VDM-SL (VDM-SL을 이용한 보안 알고리즘의 형식적 표현과 참조구현 코드 생성)

  • Kim, Young-Gil;Kim, Ki-Su;Kim, Young-Wha;Ryou, Jae-Cheol;Jang, Chung-Ryong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.67-84
    • /
    • 1996
  • VDL-SL (Vienna Development Method-Specification Language) is one of the FSL(Formal Specification Language) which is being presented for the correct description of the security relevant standards. Several tools are being developed for the correctness and the convenience in the description and executable code generation of security relevant standards using VDM-SL. The IFAD VDM-SL Toolbox is one that has many functions : syntax checking, type checking, c++ code generation, test coverage information. This paper describes a formal method for description and implementation of MD4 algorithm using VDM-SL and IFAD VDM-SL Toolbox, and examines the result applied to secure hash algorithm, and proposes the relation to strict conformance test which recently suggested as a security test method.

A High-Performance ECC Processor Supporting Multiple Field Sizes over GF(p) (GF(p) 상의 다중 체 크기를 지원하는 고성능 ECC 프로세서)

  • Choe, Jun-Yeong;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.419-426
    • /
    • 2021
  • A high-performance elliptic curve cryptography processor (HP-ECCP) was designed to support five field sizes of 192, 224, 256, 384 and 521 bits over GF(p) defined in NIST FIPS 186-2, and it provides eight modes of arithmetic operations including ECPSM, ECPA, ECPD, MA, MS, MM, MI and MD. In order to make the HP-ECCP resistant to side-channel attacks, a modified left-to-right binary algorithm was used, in which point addition and point doubling operations are uniformly performed regardless of the Hamming weight of private key used for ECPSM. In addition, Karatsuba-Ofman multiplication algorithm (KOMA), Lazy reduction and Nikhilam division algorithms were adopted for designing high-performance modular multiplier that is the core arithmetic block for elliptic curve point operations. The HP-ECCP synthesized using a 180-nm CMOS cell library occupied 620,846 gate equivalents with a clock frequency of 67 MHz, and it was evaluated that an ECPSM with a field size of 256 bits can be computed 2,200 times per second.