• Title/Summary/Keyword: Theory U

Search Result 790, Processing Time 0.026 seconds

Development of a Kinematic Wave Model to Route Overland Flow in Vegetated Area (I) -Theory and Numerical Solution- (초지의 지표면 흐름을 추적하기위한 Kinematic Wave Model의 개발(I) -이론 Model의 개발-)

  • ;W.L.MAGETTE
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.35 no.2
    • /
    • pp.57-64
    • /
    • 1993
  • A modified kinematic wave model of the overland flow in vegetated filter strips was developed. The model can predict both flow depth and hydraulic radius of the flow. Existing models can predict only mean flow depth. By using the hydraulic radius, erosion, deposition and flow's transport capacity can be more rationally computed. Spacing hydraulic radius was used to compute flow's hydraulic radius. Numerical solution of the model was accomplished by using both a second-order nonlinear scheme and a linear solution scheme. The nonlinear portion of the model ensures convergence and the linear portion of the model provides rapid computations. This second-order nonlinear scheme minimizes numerical computation errors that may be caused by linearization of a nonlinear model. This model can also be applied to golf courses, parks, no-till fields to route runoff and production and attenuation of many nonpoint source pollutants.

  • PDF

Fair Bline signature with Message Recovery Based on Oblivious Transfer Protocol (메시지 복원 기능을 제공하는 불확정 전송기반의 공정 은닉 서명 기법)

  • Lee, Hyeong-U;Kim, Tae-Yun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.4
    • /
    • pp.456-463
    • /
    • 1999
  • chaum[10]이 제시한 은닉 서명은 서명자의 신분과 메시지 내용에 대해 어떠한 관련정보도 유출하지 않기 때문에 익명성을 필요로 하는 전자 화폐 시스템에 사용되고 있다. 그러나 완전한 익명성은 화폐 인출에서의 연관성을 은닉하고 화폐에 대한 이중 사용이 가능하기 때문에 악용될 수 있다. 따라서 필요로 하는 경우 특정 신회 센터가 메시지에 대해 공개 검증할수 있는 과정이 제공되어야한다. 본 연구에서는 메시지 복원 기능을 제공하는 개선된 공정 은닉 서명 기법을 제시한다. Horster 기반 메타 -Elgamal 기법[12]을 분석하여 메시지 복원 기능을 제공하는 은닉 서명 모델을 고찰한다. 또한 감지 불가 전송 방식의 특성을 사용하여 신뢰 센터에 의한 공정 검증 및 확인 기능을 제공하는 공정 은닉 서명 방식을 제안한다. 본 연구에서 제시하는 기법은 다중 서명 기법으로 발전시킬수 있으며 다양한 전자 화폐 시스템에 적용가능하다.

Design and Analysis of Fixed -size Systolic Arrays for Montgomery Modular Multiplication (몽고메리 알고리즘을 위한 고정-크기 시스톨릭 어레이 설계 및 분석)

  • Kim, Hyeon-Seong;Lee, Seong-U;Kim, Jeong-Jun;Kim, Tae;Yu, Gi-Yeong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.4
    • /
    • pp.406-419
    • /
    • 1999
  • RSA와 같은 공개키 암호시스템(public-key cryptography system)에서는 512 비트 또는 그 이상 큰수의 모듈러 곱셈 연산을 수행하여야한다. 본 논문에서는 Montgomery 알고리즘을 이용하여 모듈러 곱셈을 수행하는 두 가지의 고정-크기 선형 시스톨릭 어레이를 설계하고 분석한다. 제안된 임의의 고정-크기 선형 시스톨릭 어레이와 파이프라인된 고정-크기 선형 시스톨릭 어레이는 최적의 문제-크기 선형 시스톨릭 어레이로부터 LPGS(Locally Parallel Globally Sequential)분할방법을 적용하여 설계한다. VHDL 시뮬레이션 결과, 밴드이 크기를 4로 하여 분할 시 문제-크기 어레이와 비교하면 수행시간의 지연이 없었으며,어레이의 크기도 1/4로 줄일 수 있었다. 제안된 시스톨릭 어레이는 크기에 제한을 갖는 스마트카드 등에 이용될수 있을 것이다.

Trojan : A High-Performance Simulator for Shared Memory Architectures (Trojan : 공유메모리 구조를 위한 고성능 시뮬레이터)

  • Park, Dae-Yeon;An, U-Hyeon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.4
    • /
    • pp.420-431
    • /
    • 1999
  • 이 논문은 병렬 공유 메모리 시스템의 성능을 정확하게 평가할수 있으며 MIT의 Proteus 시뮬레이터의 기능을 확장한 시뮬레이터인 Trojan 에 대해 언급한다. 이 논문에서 언급되는 trojan 의 주요한 기능으로는 다음과 같다. 첫째, Trojan 은 프로세스 기반 응용 프로그램(예를 들어 SPLASH)과 쓰레드 기반 응용 프로그램들(예를 들어 SPLASH2) 에 대해 효율적 시뮬레이션을 제공한다. 둘째, 수행 구동 시뮬레이터 중에 처음으로 가상 메모리 시뮬레이션 기능이 구현되었다. 실제 운영체제의 가상 메모리 시스템과 하드웨어 시스템과의 상호작용 및 가상 메모리 시스템의 성능을 평가할수 있게 되었다. 기존의 공유 메모리 시뮬레이터들은 공유 메모리를 참조하기위해서 시뮬레이터 자체가 제공하는 문법에 맞게 변경해야만 하는 단점이 있다. 이 논문에서처럼 Trojan 시뮬레이터는 캐쉬동작, 네트웍통신양, 다주프로세서 시스템 설계,그리고 병렬 공유 응용 프로그램동작 및 성능 연구에 효율적이고 폭넓게 사용되고 있다.

Segmentation of Millimeter-wave Radiometer Image via Classuncertainty and Region-homogeneity

  • Singh, Manoj Kumar;Tiwary, U.S.;Kim, Yong-Hoon
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.862-864
    • /
    • 2003
  • Thresholding is a popular image segmentation method that converts a gray-level image into a binary image. The selection of optimum threshold has remained a challenge over decades. Many image segmentation techniques are developed using information about image in other space rather than the image space itself. Most of the technique based on histogram analysis information-theoretic approaches. In this paper, the criterion function for finding optimal threshold is developed using an intensity-based classuncertainty (a histogram-based property of an image) and region-homogeneity (an image morphology-based property). The theory of the optimum thresholding method is based on postulates that objects manifest themselves with fuzzy boundaries in any digital image acquired by an imaging device. The performance of the proposed method is illustrated on experimental data obtained by W-band millimeter-wave radiometer image under different noise level.

  • PDF

An Analysis on the Equivalent Circuit and the Accelerating Characteristics of Single Sided Linear Induction Motor (편측식(片側式) 선형유도전동기(線型誘導電動機)의 등가회로 구성과 가속특성(加速特性) 해석)

  • Jang, S.M.;Park, C.I.;Kim, G.T.;Kim, Y.R.;Kim, B.S.;Jung, Y.U.
    • Proceedings of the KIEE Conference
    • /
    • 1995.07a
    • /
    • pp.180-182
    • /
    • 1995
  • The equivalent circuit of SLIM is composed of the circuit parameters. They can be obtained from the electromagnetic theory. The accelerating characteristics of SLIM are the best efficiency when synchronous speed changed continuously. The paper outlines a method of acceleration for an accelerated field system in which it is desired to reduce the overall length to a minimum, assuming a limit on the amount of heat which can be generated in the secondary member. The paper then shows that a primary unit designed to give several discrete field speeds only, as opposed to one with continuous speed variation, is not significantly inferior in performance to the latter but is much easier to manufacture.

  • PDF

집합을 도입한 체계적 확률의 지도연구

  • Yu Byeong U
    • The Mathematical Education
    • /
    • v.4 no.1
    • /
    • pp.16-28
    • /
    • 1966
  • According to the modernization of mathematics education, new abstract concepts such as the concept of sets are introduced in many fields of it. The purpose of this thesis is to adopt the concept of sets to 'probability' which is included in the curriculum of high school matematics education. The considerations of the preceding chapter III, and their obvious generalizations to more complicated experiments, justify the conclusion that probability theory consists of the study of sets. An event is a set, its opposite event is the complementary set; mutually exclusive events are disjoint sets, and an event consisting of the simultaneous occurrence of two other events is a sets obtained by intersecting two other sets it is clear how this glossary, translating physical terminology into set theoretic terminology, may be continued. Furthermore, the important theorems of probability; Additional theorem, multiplication theorem, their applications and so on, are proved by the technical operations of sets. Thinking of the mathematics education introduced by the concept of sets is very important in future.

  • PDF

A study on the completeness of 'the understanding' in the generalization process and justification - centered on the arithmetical, geometric and harmonic average - (일반화 과정과 그 정당화에서 '이해'의 완전성에 대한 연구 - 산술, 기하, 조화평균을 중심으로)

  • Kim, ChangSu
    • The Mathematical Education
    • /
    • v.51 no.4
    • /
    • pp.377-393
    • /
    • 2012
  • The understanding demands the different degree of the understanding according to student's learning situation. In this paper, we investigate what is the foundation for the complete understanding for the generalization in the generalization-process and justification of some concepts or some theories, through a case. We discovered that the completeness of the understanding in the generalization-process and justification requires 'the meaningful-mental object' which can give the meaning about the concept or theory to students. Students can do the generalization-process through the construction of 'the meaningful-mental object' and confirm the validity of generalization through 'the meaningful-mental object' which is constructed by them. And we can judge the whether students construct the completeness of the understanding or not, by 'the meaningful-mental object' of the student. Hence 'the meaningful-mental object' are vital condition for the generalization-process and justification.

Dissipation Pattern of Excess Pore Pressure after Liquefaction in Saturated Sand Deposits (포화된 모래지반의 액상화후 과잉간극수압 소산양상)

  • 하익수;박영호;김명모
    • Proceedings of the Earthquake Engineering Society of Korea Conference
    • /
    • 2003.09a
    • /
    • pp.90-97
    • /
    • 2003
  • The purpose of this study is to understand the dissipation pattern of excess pore pressure after liquefaction which governs the post-liquefaction behavior of liquefied sand deposits. 1-g shaking table tests were carried out on 5 different kinds of sands, all of which had high liquefaction potentials. During the tests excess pore pressure at various depths, and surface settlements were measured. The measured curve of the excess pore pressure dissipation was simulated using the solidification theory, and from the analysis of the velocity of dissipation, the dissipation pattern of excess pore pressure after liquefaction was examined. The dissipation velocity of excess pore pressure after liquefaction had a linear correlation with the effective grain size ( $D_{10}$) divided by the coefficient of uniformity ( $C_{u}$), and the increase in the initial relative density of the ground played a role in shifting this correlation curve toward an increased dissipation velocity. From the correlation, an approximate method was recommended for prediction of the dissipation curve of excess pore pressure after liquefaction in saturated sand deposits.s.s.

  • PDF

Neuro-Fuzzy Systems: Theory and Applications

  • Lee, C.S. George
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.29.1-29
    • /
    • 2001
  • Neuro-fuzzy systems are multi-layered connectionist networks that realize the elements and functions of traditional fuzzy logic control/decision systems. A trained neuro-fuzzy system is isomorphic to a fuzzy logic system, and fuzzy IF-THEN rule knowledge can be explicitly extracted from the network. This talk presents a brief introduction to self-adaptive neuro-fuzzy systems and addresses some recent research results and applications. Most of the existing neuro-fuzzy systems exhibit several major drawbacks that lead to performance degradation. These drawbacks are the curse of dimensionality (i.e., fuzzy rule explosion), inability to re-structure their internal nodes in a changing environment, and their lack of ability to extract knowledge from a given set of training data. This talk focuses on our investigation of network architectures, self-adaptation algorithms, and efficient learning algorithms that will enable existing neuro-fuzzy systems to self-adapt themselves in an unstructured and uncertain environment.

  • PDF