• Title/Summary/Keyword: cosine-function

Search Result 148, Processing Time 0.026 seconds

SUPERSTABILITY OF THE p-RADICAL TRIGONOMETRIC FUNCTIONAL EQUATION

  • Kim, Gwang Hui
    • Korean Journal of Mathematics
    • /
    • v.29 no.4
    • /
    • pp.765-774
    • /
    • 2021
  • In this paper, we solve and investigate the superstability of the p-radical functional equations $$f(\sqrt[p]{x^p+y^p})-f(\sqrt[p]{x^p-y^p})={\lambda}f(x)g(y),\\f(\sqrt[p]{x^p+y^p})-f(\sqrt[p]{x^p-y^p})={\lambda}g(x)f(y),$$ which is related to the trigonometric(Kim's type) functional equations, where p is an odd positive integer and f is a complex valued function. Furthermore, the results are extended to Banach algebras.

Genetic association tests when a nuisance parameter is not identifiable under no association

  • Kim, Wonkuk;Kim, Yeong-Hwa
    • Communications for Statistical Applications and Methods
    • /
    • v.24 no.6
    • /
    • pp.663-671
    • /
    • 2017
  • Some genetic association tests include an unidentifiable nuisance parameter under the null hypothesis of no association. When the mode of inheritance (MOI) is not specified in a case-control design, the Cochran-Armitage (CA) trend test contains an unidentifiable nuisance parameter. The transmission disequilibrium test (TDT) in a family-based association study that includes the unaffected also contains an unidentifiable nuisance parameter. The hypothesis tests that include an unidentifiable nuisance parameter are typically performed by taking a supremum of the CA tests or TDT over reasonable values of the parameter. The p-values of the supremum test statistics cannot be obtained by a normal or chi-square distribution. A common method is to use a Davies's upper bound of the p-value instead of an exact asymptotic p-value. In this paper, we provide a unified sine-cosine process expression of the CA trend test that does not specify the MOI and the TDT that includes the unaffected. We also present a closed form expression of the exact asymptotic formulas to calculate the p-values of the supremum tests when the score function can be written as a linear form in an unidentifiable parameter. We illustrate how to use the derived formulas using a pharmacogenetics case-control dataset and an attention deficit hyperactivity disorder family-based example.

Hardware Design of Pipelined Special Function Arithmetic Unit for Mobile Graphics Application (모바일 그래픽 응용을 위한 파이프라인 구조 특수 목적 연산회로의 하드웨어 설계)

  • Choi, Byeong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1891-1898
    • /
    • 2013
  • To efficiently execute 3D graphic APIs, such as OpenGL and Direct3D, special purpose arithmetic unit(SFU) which supports floating-point sine, cosine, reciprocal, inverse square root, base-two exponential, and logarithmic operations is designed. The SFU uses second order minimax approximation method and lookup table method to satisfy both error less than 2 ulp(unit in the last place) and high speed operation. The designed circuit has about 2.3-ns delay time under 65nm CMOS standard cell library and consists of about 23,300 gates. Due to its maximum performance of 400 MFLOPS and high accuracy, it can be efficiently applicable to mobile 3D graphics application.

The new approach to maxillary and mandibular anterior dental arch forms - In Korean normal occlusion models (상하악 전치부 치열궁 형태에 대한 새로운 접근 - 한국성인 정상교합자 모델에서)

  • Ha, Man-Hee;Son, Woo-Sung;Yang, Hoon-Chul
    • The korean journal of orthodontics
    • /
    • v.31 no.3 s.86
    • /
    • pp.347-355
    • /
    • 2001
  • Maxillary and mandibular anterior dental arches often have the problems of occlusal relation and esthetics by malformations of teeth, congenital missing, et at. Though the clinician usually use the anterior ratio to overcome this problems, he has the limitation of a direct application this ratio to the prediction of anterior occlusal relationship by the change of anterior ratio as dental arch form, intercanine width, segment depth and arch perimeter. So this study examine maxillary and mandibular anterior dental arch forms by least square method using Korean normal occlusion models(man : 20 casts, woman : 20 casts). Maxillary and mandibular anterior dental arches of Korean normal occlusion models are curve fitted to polynomial function, beta function, hyperbolic cosine function in order. And this accuracy of curve fitting is constant regardless of man/woman and maxilla/mandible. The relationships between intercanine width, segment depth, and arch perimeter based on this owe fitted dental arch form are acquired. This relationships will give the prediction of anterior dental arch form and the information of more accurate anterior ratio according to intercanine width.

  • PDF

Copyright Protection for Digital Image by Watermarking Technique

  • Ali, Suhad A.;Jawad, Majid Jabbar;Naser, Mohammed Abdullah
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.599-617
    • /
    • 2017
  • Due to the rapid growth and expansion of the Internet, the digital multimedia such as image, audio and video are available for everyone. Anyone can make unauthorized copying for any digital product. Accordingly, the owner of these products cannot protect his ownership. Unfortunately, this situation will restrict any improvement which can be done on the digital media production in the future. Some procedures have been proposed to protect these products such as cryptography and watermarking techniques. Watermarking means embedding a message such as text, the image is called watermark, yet, in a host such as a text, an image, an audio, or a video, it is called a cover. Watermarking can provide and ensure security, data authentication and copyright protection for the digital media. In this paper, a new watermarking method of still image is proposed for the purpose of copyright protection. The procedure of embedding watermark is done in a transform domain. The discrete cosine transform (DCT) is exploited in the proposed method, where the watermark is embedded in the selected coefficients according to several criteria. With this procedure, the deterioration on the image is minimized to achieve high invisibility. Unlike the traditional techniques, in this paper, a new method is suggested for selecting the best blocks of DCT coefficients. After selecting the best DCT coefficients blocks, the best coefficients in the selected blocks are selected as a host in which the watermark bit is embedded. The coefficients selection is done depending on a weighting function method, where this function exploits the values and locations of the selected coefficients for choosing them. The experimental results proved that the proposed method has produced good imperceptibility and robustness for different types of attacks.

Development of Adaptive Digital Image Watermarking Techniques (적응형 영상 워터마킹 알고리즘 개발)

  • Min, Jun-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.4
    • /
    • pp.1112-1119
    • /
    • 1999
  • Digital watermarking is to embed imperceptible mark into image, video, audio and text data to prevent the illegal copy of multimedia data, arbitrary modification, and also illegal sales of the copes without agreement of copyright ownership. The DCT(discrete Cosine Transforms) transforms of original image is conducted in this research and these DCT coefficients are expanded by Fourier series expansion algorithm. In order to embed the imperceptible and robust watermark, the Fourier coefficients(lower frequency coefficients) can be calculated using sine and cosine function which have a complete orthogonal basis function, and the watermark is embedded into these coefficients, In the experiment, we can show robustness with respect to image distortion such as JPEG compression, bluring and adding uniform noise. The correlation coefficient are in the range from 0.5467 to 0.9507.

  • PDF

Digital Image Watermarking Technique using Scrambled Binary Phase Computer Generated Hologram in Discrete Cosine Transform Domain (DCT영역에서 스크램블된 이진 위상 컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술)

  • Kim, Cheol-Su
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.403-413
    • /
    • 2011
  • In this paper, we proposed a digital image watermarking technique using scrambled binary phase computer generated hologram in the discrete cosine transform(DCT) domain. For the embedding process of watermark. Using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and encrypt it through the scramble operation. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using descramble operation. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and scramble encryption technique so it is very secure and robust to the various external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.

A Study On Arbitrary Artificial Earthquake Acceleration Generation -Based On Design Response Spectrum of Arbitrary Damping Value- (임의의 인공지진 가속도 발생에 관한 연구 -설계응답 스펙트럼에 기초하여 -)

  • 우운택;김영문;노재선
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1989.04a
    • /
    • pp.5-10
    • /
    • 1989
  • In this study, the basic concept of design response spectrum is briefly revi-ewed. To generate the artificial earthquake acceleration, the method of superpo-sition of cosine waves is used. Theoretical developments using F.F.T. and spect-ral density function are compared. The amplitude was derived by use of the peak factor and the phase angle is d-erived by use of Monte Carlo simulation. To smoothen the match, the calculated pseudo velocity respon-se spectrum is compared with input pseudo velocity response spectrum at a set of control frequencies. With the modified spectral density function, a new acceleration and pseudo velocity response spectrum are generat-ed.

  • PDF

On-line Identification of a Fuzzy System

  • Kim, euntai;Lee, Heejin;Park, Minkee;Park, Mignon
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.06a
    • /
    • pp.685-690
    • /
    • 1998
  • This paper presents an explanation regarding on-line identification of a fuzzy system. The fuzzy system to be identified is assumed to be in the type of singletion consequent parts and be represented by a linear combination of fuzzy basis function (FBF's). For on-line identification, squared-cosine (SCOS) fuzzy basis function is introduced to reduce the number of parameters to be identified and make the system consistent and differentiable. Then the parameters of the fuzzy system are identified on-line by the gradient search method. Finally, a computer simulation is performed to illustrate the validity of the suggested algorithms.

  • PDF

A study on print estimation using wavelet transformation method (Wavelet 변환 방식을 이용한 인쇄물 평가에 관한 연구)

  • 김택준;조가람;구철희
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.20 no.1
    • /
    • pp.28-44
    • /
    • 2002
  • Wavelet transformation in image compression is to offer higher image compressibility and high-quality by quantization and entropy encoding. More image quality is good that reconstructed image by wavelet calculation than acquire cosine transform. Therefore, wavelet itself is function if it is wavelet's feature, in this function, do processing applying difference scale and resolution. That is, this is not that fixed resolution has been decided like existent compression way, when it regulated scale, damage goes in pixel and picture looks like break without giving damage entirely in reflex even if magnify or curtail Decoding. Therefore, this paper is in Image that using new wavelet application compression way research that see applies comparing In each image noted this time compressing step by step with circle image compression efficiency recognize. Also, estimated quality pass through by printing of compressed image, investigated compression ratio of most suitable that get print of high quality and elevation of transmission speed.

  • PDF