• Title/Summary/Keyword: closed formula

Search Result 141, Processing Time 0.024 seconds

Channel Capacity Analysis of SSW Technique in Wireless Channels for ITS System (ITS 시스템을 위한 무선 채널에서의 SSW 기법의 채널용량 분석)

  • Kim, Joo-Chan;Bae, Jung-Nam;Kim, Jin-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.2
    • /
    • pp.68-74
    • /
    • 2010
  • In this paper, we analyze and simulate the channel capacity of a spread spectrum watermarking (SSW) technique in wireless fading channel to apply ITS system. Channel capacity analysis causing minimum effect to existing system is required necessary to apply SSW technique. We derive the channel capacity as a closed-form approximation formula in Rayleigh and Rician fading channel model. The numerical results are demonstrated and good approximated results are reported.

ARMA System identification Using GTLS method and Recursive GTLS Algorithm (GTLS의 ARMA시트템식별에의 적용 및 적응 GTLS 알고리듬에 관한 연구)

  • Kim, Jae-In;Kim, Jin-Young;Rhee, Tae-Won
    • The Journal of the Acoustical Society of Korea
    • /
    • v.14 no.3
    • /
    • pp.37-48
    • /
    • 1995
  • This paper presents an sstimation of ARMA coefficients of noisy ARMA system using generalized total least square (GTLS) method. GTLS problem for ARMA system is defined as minimizing the errors between the noisy output vectors and estimated noisy-free output. The GTLS problem is solved in closed form by eigen-problem and the perturbation analysis of GTLS is presented. Also its recursive solution (recursive GTLS) is proposed using the power method and the covariance formula of the projected output error vector into the input vector space. The simulation results show that GTLS ARMA coefficients estimator is an unbiased estimator and that recursive GTLS achieves fast convergence.

  • PDF

CARTIER OPERATORS ON COMPACT DISCRETE VALUATION RINGS AND APPLICATIONS

  • Jeong, Sangtae
    • Journal of the Korean Mathematical Society
    • /
    • v.55 no.1
    • /
    • pp.101-129
    • /
    • 2018
  • From an analytical perspective, we introduce a sequence of Cartier operators that act on the field of formal Laurent series in one variable with coefficients in a field of positive characteristic p. In this work, we discover the binomial inversion formula between Hasse derivatives and Cartier operators, implying that Cartier operators can play a prominent role in various objects of study in function field arithmetic, as a suitable substitute for higher derivatives. For an applicable object, the Wronskian criteria associated with Cartier operators are introduced. These results stem from a careful study of two types of Cartier operators on the power series ring ${\mathbf{F}}_q$[[T]] in one variable T over a finite field ${\mathbf{F}}_q$ of q elements. Accordingly, we show that two sequences of Cartier operators are an orthonormal basis of the space of continuous ${\mathbf{F}}_q$-linear functions on ${\mathbf{F}}_q$[[T]]. According to the digit principle, every continuous function on ${\mathbf{F}}_q$[[T]] is uniquely written in terms of a q-adic extension of Cartier operators, with a closed-form of expansion coefficients for each of the two cases. Moreover, the p-adic analogues of Cartier operators are discussed as orthonormal bases for the space of continuous functions on ${\mathbf{Z}}_p$.

Automotive Windshield Wiper Linkage Dynamic Modeling for Vibration Analysis (자동차 와이퍼 링키지의 진동해석을 위한 동역학 모델링)

  • Lee, Byoung-Soo
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.18 no.4
    • /
    • pp.465-472
    • /
    • 2008
  • An automotive windshield wiper system is modeled mainly for vibration analysis purpose. The model is composed of solid links, ideal joints, imperfect joints to simulate unavoidable manufacturing defects and bushings having stiffness, contact between a wiper blade and a wind screen glass, friction, a spring and an actuator. Main stream of wiper dynamics analysis has been obtaining a closed form of system of equations using Newton's or Lagrange's formula and doing a numerical simulation study to understand and predict the behavior of it. However, the modeling process is complex since a wiper system is of multibody and a contact problem occurs. When imperfection, such as dead zone of a joint and stiffness of a rubber bushing, should be included, the added complexity makes the modeling difficult. Since the imperfection is understood as main cause of problematic vibration, the dynamics model of a wiper system aiming vibration analysis should include such unavoidable manufacturing defects in the model. An open form of dynamic model of a automotive windshield wiper system with imperfect joints using a commercial software is obtained and a simulation analyssis is conducted for vibration reduction study.

Channel Capacity of Additional Data Transmission System for Spectrum Efficiency Improvement (스펙트럼 효율 향상을 위한 부가 데이터 전송 시스템에서의 채널용량)

  • Kim, Joo-Chan;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.145-150
    • /
    • 2010
  • In this paper, we propose additional data transmission system for spectrum efficiency improvement and derive channel capacity formula as a approximated closed-form. Spread spectrum watermarking scheme is selected for the watermarking embedder. Nakagami-q (Hoyt) model is considered as a multipath fading channel. Numerical results show the channel capacity variation of the proposed system in wireless fading channel. From the results, we confirm that the channel capacity of the watermarking system is affected by the fading coefficient and system parameters such that host sampling frequency, host-to-watermark ratio, watermark-to-noise ratio, and PN sequence length.

First Description of the Adult Scolecenchelys aoki (Ophichthidae, Anguilliformes) Collected from the South Sea of Korea, with Comments on the Synonym Scolecenchelys borealis (한국 남해에서 채집된 동해물뱀(Scolecenchelys aoki) 성어의 첫기재 및 Scolecenchelys borealis의 동종이명에 관한 검토)

  • Ji, Hwan-Sung;Kim, Maeng Jin;Kim, Jin-Koo
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.46 no.5
    • /
    • pp.589-593
    • /
    • 2013
  • Scolecenchelys borealis was first added to the Korean fish fauna based on one leptocephalus specimen (total length (TL) 59.2 mm) collected from Dokdo, in the East Sea. Recently, however, Scolecenchelys borealis has been treated as a junior synonym of Scolecenchelys aoki, necessitating review of the scientific name S. borealis. This study describes the morphological characteristics of S. aoki based on an adult specimen (TL 230.0 mm) collected from the sea south of Korea and compares its mitochondrial DNA 12S rRNA sequence with that of the S. borealis leptocephalus. The adult S. aoki is characterized by several morphological features: vertebral formula 59-55-135; preanal lateral pores 55; infraorbital pores two; teeth on upper jaw visible externally when the mouth is closed; the dorsal fin originates just behind the anus; both jaws and vomerine teeth are conical, arranged in two rows. An analysis of an 886-base paire sequence of the 12S rRNA showed that adult S. aoki was concordant with the S. borealis leptocephalus (sensu Ji et al., 2012), indicating that both are the same species.

Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information

  • Duy, Tran Trung;Son, Pham Ngoc
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4623-4643
    • /
    • 2015
  • This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use same codebook with the secondary source to forward the source's signals to the secondary destination. Hence, the secondary eavesdropper can employ either maximal-ratio combining (MRC) or selection combining (SC) to combine signals received from the source and the selected relay. In RF protocol, different codebooks are used by the source and the relay to forward the source message secretly. For each scheme, we derive exact and asymptotic closed-form expressions of secrecy outage probability (SOP), non-zero secrecy capacity probability (NzSCP) in both independent and identically distributed (i.i.d.) and independent but non-identically distributed (i.n.i.d.) networks. Moreover, we also give a unified formula in an integral form for average secrecy capacity (ASC). Finally, our derivations are then validated by Monte-Carlo simulations.

The Optimal Base-Stock Level in Assembly lines (조립 생산 시스템에서 최적 Base-Stock 수준)

  • Ko, Sung-Seok;Seo, Dong-Won
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.30 no.3
    • /
    • pp.89-93
    • /
    • 2007
  • In this study, we consider an assembly line operated under a base-stock policy. A product consists of two parts, and a finished product transfers to a warehouse in which demands are satisfied. Assume that demands arrive according to a Poisson process and processing times at each production line are exponentially distributed. Whenever a demand arrives, it is satisfied immediately from an inventory in the warehouse if available; otherwise, it is backlogged and satisfied later by the next product exiting from production lines. In either case, an arriving demand automatically triggers the production of a part at both production lines. These two parts will be assembled into a product that eventually transfers to the warehouse. We obtain a closed form formula of approximation for delay time or lead time distribution of a demand when a base- stock level is s. Moreover, it can be applied to the optimal base-stock level which minimizes the total inventory cost. Numerical examples are presented to show our optimal base-stock level's quality.

Genetic association tests when a nuisance parameter is not identifiable under no association

  • Kim, Wonkuk;Kim, Yeong-Hwa
    • Communications for Statistical Applications and Methods
    • /
    • v.24 no.6
    • /
    • pp.663-671
    • /
    • 2017
  • Some genetic association tests include an unidentifiable nuisance parameter under the null hypothesis of no association. When the mode of inheritance (MOI) is not specified in a case-control design, the Cochran-Armitage (CA) trend test contains an unidentifiable nuisance parameter. The transmission disequilibrium test (TDT) in a family-based association study that includes the unaffected also contains an unidentifiable nuisance parameter. The hypothesis tests that include an unidentifiable nuisance parameter are typically performed by taking a supremum of the CA tests or TDT over reasonable values of the parameter. The p-values of the supremum test statistics cannot be obtained by a normal or chi-square distribution. A common method is to use a Davies's upper bound of the p-value instead of an exact asymptotic p-value. In this paper, we provide a unified sine-cosine process expression of the CA trend test that does not specify the MOI and the TDT that includes the unaffected. We also present a closed form expression of the exact asymptotic formulas to calculate the p-values of the supremum tests when the score function can be written as a linear form in an unidentifiable parameter. We illustrate how to use the derived formulas using a pharmacogenetics case-control dataset and an attention deficit hyperactivity disorder family-based example.

A Study on the Buckling Strength of Plate Panels with Opening (유공판의 좌굴강도에 관한 연구)

  • Kim, Ul-Nyeon;Choe, Ick-Heung;Kwon, Jin-Chil;Paik, Jeom-Kee
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.47 no.2
    • /
    • pp.210-224
    • /
    • 2010
  • The aim of the present study is to investigate the buckling strength of plates and stiffened panels with opening under transverse thrust and shear actions. It is observed that the existing design formulation for critical-buckling strength of plates are not valid for perforated plates, because the current design formulation trends can significantly overestimate or underestimate the load-carrying capacity of plates when plates have large opening and/or are thick. A series of eigen value and elastic.plastic large deflection finite element analyses are carried out with varying the aspect ratio of plate, the opening size and location on plate until and after the ultimate strength is reached. Based on the results obtained from the present study, closed-form design formulations for the elastic buckling strength of plates and stiffened panels with opening are derived. The derived design formulations are considered plasticity correction of the material and verified by experimental tests and results of nonlinear finite element computations.