• 제목/요약/키워드: mutual information analysis

검색결과 488건 처리시간 0.026초

슬롯결합 적층 마이크로스트립 배열 안테나 해석 (Analysis of aperture coupled stacked microstrip array antenna)

  • 장병준;이용국;문호원;윤영중;박한규
    • 한국통신학회논문지
    • /
    • 제21권3호
    • /
    • pp.753-762
    • /
    • 1996
  • In this paper, aperture coupled stacked microstrip array antennas are proposed and their operating characteristics are analyzed based on analytical. In order to evaluate mutual coupling between slot-coupled microstrip patches in finite array, analysis uses the reciprocity theorem and the spectral domain Green's functions for dielectric slab in a moment method solution for the unknown patches and solts current distrbution. By introducing an N-port equivalent network, the impedance matrix of an affay of N-element slot-coupled patches is evaluated directly from its network current matix of order N$^{2}$, and it can be programmed to be run on a PC. Numerical results show mutual coupling, radiation pattern, active reflection coefficient versus scan angle, radiation efficiency and active element gain pattern.

  • PDF

Chatterjee의 ξ 계수에 대한 탐색적자료분석 (Exploratory data analysis for Chatterjee's ξ coefficient)

  • 장대흥
    • 응용통계연구
    • /
    • 제35권3호
    • /
    • pp.421-434
    • /
    • 2022
  • Chatterjee (2021)는 새로운 상관계수 ξ를 제안하였다. 두 가지 질문 (1. Anscombe's quartet 데이터셋에 대하여 ξ 계수는 구별이 가능한가?, 2. 다양한 종류의 산점도에서 데이터의 개수에 따라 ξ 계수 값의 변화는 어떠한가?)을 중심으로 ξ 계수에 대한 탐색적자료분석을 시도하였다. 세 가지 측도 (ξ 계수, 피어슨상관계수, 상호정보)를 서로 비교하였다.

Evaluation of Similarity Analysis of Newspaper Article Using Natural Language Processing

  • Ayako Ohshiro;Takeo Okazaki;Takashi Kano;Shinichiro Ueda
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.1-7
    • /
    • 2024
  • Comparing text features involves evaluating the "similarity" between texts. It is crucial to use appropriate similarity measures when comparing similarities. This study utilized various techniques to assess the similarities between newspaper articles, including deep learning and a previously proposed method: a combination of Pointwise Mutual Information (PMI) and Word Pair Matching (WPM), denoted as PMI+WPM. For performance comparison, law data from medical research in Japan were utilized as validation data in evaluating the PMI+WPM method. The distribution of similarities in text data varies depending on the evaluation technique and genre, as revealed by the comparative analysis. For newspaper data, non-deep learning methods demonstrated better similarity evaluation accuracy than deep learning methods. Additionally, evaluating similarities in law data is more challenging than in newspaper articles. Despite deep learning being the prevalent method for evaluating textual similarities, this study demonstrates that non-deep learning methods can be effective regarding Japanese-based texts.

3D Non-Rigid Registration for Abdominal PET-CT and MR Images Using Mutual Information and Independent Component Analysis

  • Lee, Hakjae;Chun, Jaehee;Lee, Kisung;Kim, Kyeong Min
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제4권5호
    • /
    • pp.311-317
    • /
    • 2015
  • The aim of this study is to develop a 3D registration algorithm for positron emission tomography/computed tomography (PET/CT) and magnetic resonance (MR) images acquired from independent PET/CT and MR imaging systems. Combined PET/CT images provide anatomic and functional information, and MR images have high resolution for soft tissue. With the registration technique, the strengths of each modality image can be combined to achieve higher performance in diagnosis and radiotherapy planning. The proposed method consists of two stages: normalized mutual information (NMI)-based global matching and independent component analysis (ICA)-based refinement. In global matching, the field of view of the CT and MR images are adjusted to the same size in the preprocessing step. Then, the target image is geometrically transformed, and the similarities between the two images are measured with NMI. The optimization step updates the transformation parameters to efficiently find the best matched parameter set. In the refinement stage, ICA planes from the windowed image slices are extracted and the similarity between the images is measured to determine the transformation parameters of the control points. B-spline. based freeform deformation is performed for the geometric transformation. The results show good agreement between PET/CT and MR images.

클라우드 서비스 환경의 안전한 인증과 보안세션 관리를 위한 다중세션 인증 기법 (Multi-session authentication scheme for secure authentication and session management of cloud services environment)

  • 최도현;박중오
    • 한국정보통신학회논문지
    • /
    • 제19권9호
    • /
    • pp.2056-2063
    • /
    • 2015
  • 최근 클라우드 서비스는 서비스 규모가 확대됨에 따라 신규 취약성과 보안 관련 사건·사고에 대한 우려로 인한 불안감도 함께 증가하고 있다. 본 논문은 사용자 인증 이후 생성되는 보안세션의 다중 세션관리를 위한 인증 기법을 제안한다. 제안하는 기법의 세션다중화는 서비스 제공자 내부의 가상화(하이퍼바이저) 수준에서 보안세션의 독립적 관리를 가능하게 한다. 성능분석결과 상호인증과 세션 다중화로 인한 강력한 안전성을 제공하고, 기존 상호인증 암호화 알고리즘을 비교하여 성능의 우수성을 입증하였다.

On Information Theoretic Index for Measuring the Stochastic Dependence Among Sets of Variates

  • Kim, Hea-Jung
    • Journal of the Korean Statistical Society
    • /
    • 제26권1호
    • /
    • pp.131-146
    • /
    • 1997
  • In this paper the problem of measuring the stochastic dependence among sets fo random variates is considered, and attention is specifically directed to forming a single well-defined measure of the dependence among sets of normal variates. A new information theoretic measure of the dependence called dependence index (DI) is introduced and its several properties are studied. The development of DI is based on the generalization and normalization of the mutual information introduced by Kullback(1968). For data analysis, minimum cross entropy estimator of DI is suggested, and its asymptotic distribution is obtained for testing the existence of the dependence. Monte Carlo simulations demonstrate the performance of the estimator, and show that is is useful not only for evaluation of the dependence, but also for independent model testing.

  • PDF

상호정보량과 MDR을 이용한 대용량 단일염기다형성 연관성 분석 (An large scale single nucleotide polymorphism analysis method using mutual information and MDR)

  • 정현환;위규범
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2010년도 추계학술발표대회
    • /
    • pp.1392-1394
    • /
    • 2010
  • 단일염기다형성 유전형 자료에 대한 유전자형을 얻어내는 기술(genotyping)이 발달함에 따라 분석해야 하는 SNP의 개수가 수십만 개로 증가하였다. 따라서 기존의 연관성 분석(association study)연구 방법을 그대로 적용시키기는 어렵다. 본 논문에서는 상호정보량(mutual information)과 Multifactor dimensionality reduction을 이용하여 대용량의 SNP 유전형자료를 분석하는 방법을 제안하였고, 이 방법을 toluene diisocyanate-induced asthma에 대해 실험해본 결과 높은 판별력을 보이는 모델을 찾을 수 있었다.

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • 제8권4호
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

다수의 블루투스 피코넷 공존시의 상호 간섭에 대한 해석 (Analysis of Mutual Interference between Independent Bluetooth Piconets)

  • 신수용;하재열;권욱현;장병수;김용호;이병양
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2004년도 하계학술대회
    • /
    • pp.181-186
    • /
    • 2004
  • Bluetooth can form many Piconets within the same location. This network topology can cause mutual interferences , and the effect of interference is critical when a tot of Bluetooth networks coexist. In this paper, the performances of Bluetooth networks under mutual interference is analyzed and simulated using the concept of bit error rate (BER)

  • PDF

견고한 행렬기반 RFID 상호인증 프로토콜 (Robust Matrix-based RFID Mutual Authentication Protocol)

  • 윤은준;하경주;유기영
    • 한국통신학회논문지
    • /
    • 제33권11C호
    • /
    • pp.883-891
    • /
    • 2008
  • 2006년에 Lee와 Ahn은 기존의 HB와 $HB^+$ RFID 인증 프로토콜들이 가지는 보안취약점들을 해결한 행렬기반의 RFID 인증 프로토콜을 제안하였다. 그들이 제안한 프로토콜은 RFID 태그측의 계산량을 감소시켜줄 뿐만 아니라, 통신 오버헤드를 줄여주며, 사용자 프라이버시 보호 등의 장점을 제공한다. 하지만, 본 논문에서는 먼저 Lee와 Ahn이 제안한 프로토콜이 그들의 주장과는 달리 RFID 리더를 태그가 인증을 하지 않는 상호인증 문제로 인하여 다양한 공격들에 취약함을 지적하고, 이러한 문제점들을 해결한 상호인증을 제공하는 개선된 행렬기반 RFID 인증 프로토콜을 제안한다. 결론적으로 제안한 RFID 인증 프로토콜은 Lee와 Ahn의 프로토콜과 비교하여 강한 보안성을 제공할 뿐만 아니라, 통신 라운드 수 또한 줄여주었기 때문에 높은 효율성을 보장할 수 있다.