• Title/Summary/Keyword: trace function

Search Result 230, Processing Time 0.024 seconds

Tracing the growth of the supermassive black holes with halo mergers

  • Byeon, Woowon;Kim, Juhan;Park, Myeong-Gu
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.40 no.2
    • /
    • pp.47.1-47.1
    • /
    • 2015
  • The formation mechanism of supermassive black holes (SMBHs) at the center of galaxies remains an open fundamental question. Black holes (BHs) are believed to grow by accretion of gas or by merging with other BHs. Motivated by the observation of luminous quasar around redshift z ~ 7 with SMBH mass up to 109 solar mass, we follow the growth of the early assembly of SMBHs that trace the hierarchical evolution of dark matter halos derived from large cosmological simulations. The initial masses of BH seeds in the first halos were set up according to the BH mass - halo mass relation. We assume that mergers of host galaxies cause loss of angular momentum of gas and trigger episodes of gas accretion onto BHs for available durations and at the end of each episode of accretion, BHs merge immediately. We trace the evolution of BH masses for various scenarios for central gas properties in halos. We estimate the BH to halo mass ratio and BH mass function at each redshift.

  • PDF

Generalized Binary Bent Sequences (일반화된 이진 Bent 시퀀스)

  • Gil, Gang-Mi;No, Jong-Seon;Shin, Dong-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1A
    • /
    • pp.35-41
    • /
    • 2002
  • In this paper, we generalize the family of binary bent sequences introduced by Olsen, Scholtz and Welch [2] to obtain the generalized binary bent sequences with optimal correlation and balance properties. The modified trace transform is introduced and it enables us to use linear function from ${F_{2^n}}$ to the intermediate field ${F_{2^e}}$, where e|n. If we choose e=1, our method becomes the conventional binary bent sequence case. Also, some examples are given which show that our construction gives the family of simple binary sequences with optimal correlation and balance properties.

Groundwaterflow analysis of discontinuous rock mass with probabilistic approach (통계적 접근법에 의한 불연속암반의 지하수 유동해석)

  • 장현익;장근무;이정인
    • Tunnel and Underground Space
    • /
    • v.6 no.1
    • /
    • pp.30-38
    • /
    • 1996
  • A two dimensional analysis program for groundwater flow in fractured network was developed to analyze the influence of discontinuity characteristics on groundwater flow. This program involves the generation of discontinuities and also connectivity analysis. The discontinuities were generated by the probabilistic density function(P.D.F.) reflecting the characteristics of discontinuities. And the fracture network model was completed through the connectivity analysis. This program also involves the analysis of groundwater flow through the discontinuity network. The result of numerical experiment shows that the equivalent hydraulic conductivity increased and became closer to isotropic as the density and trace length increased. And hydraulic head decreased along the fracture zone because of much water-flow. The grouting increased the groundwater head around cavern. An analysis of groundwater flow through discontinuity network was performed around underground oil storage cavern which is now under construction. The probabilistic density functions(P.D.F) were obtained from the investigation of the discontinuity trace map. When the anisotropic hydraulic conductivity is used, the flow rate into the cavern was below the acceptable value to maintain the hydraulic containment. But when the isotropic hydraulic conductivity is used, the flow rate was above the acceptable value.

  • PDF

Effects of proteinate complex zinc on growth performance, hepatic and splenic trace elements concentrations, antioxidative function and immune functions in weaned piglets

  • She, Yue;Huang, Qiang;Li, Defa;Piao, Xiangshu
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.30 no.8
    • /
    • pp.1160-1167
    • /
    • 2017
  • Objective: To assess the effects of proteinate complex zinc (PC-Zn) on growth performance, antioxidative function, trace element concentrations and immune function in weaned piglets. Methods: Three hundred newly weaned barrows ($Duroc{\times}Landrace{\times}Yorkshire$), 28 days of age, were randomly allotted to 3 dietary groups of 5 replicate pens per group for 4 weeks of feeding. Experimental diets were: i) zinc deficient diet (ZnD, 24 mg/kg Zn supplementation from $ZnSO_4$), ii) inorganic Zn diet supplemented with 120 mg/kg of Zn from Zn sulfate ($ZnSO_4$), and iii) organic Zn diet supplemented with 120 mg/kg of Zn from PC-Zn. The body weight of pigs were recorded at the beginning, at the middle and at the end of the experiment, and the amount of feed supplied each day was recorded. Five barrows from each dietary treatment group were selected to be anesthetized and euthanized at the end of the trial to determine the Zn, Cu, Fe, and Mn concentrations, the hepatic metallothionein content, the levels of methane dicarboxylic aldehyde (MDA), Mn, and Cu/Zn superoxide dismutase (SOD), and glutathione peroxidase (GSH-Px) in the spleen, the levels of interleukin (IL)-2, IL-4, IL-10, interferon $(IFN)-{\gamma}$, $CD3^+$, $CD4^+$, and $CD8^+$ T lymphocyte. Results: The accumulation of Zn in the spleen, levels of SOD, GSH-Px, IL-4, IL-10, the proportions of $CD3^+$ and $CD4^+$ T lymphocyte, and the ratio of $CD4^+/CD8^+$ T lymphocyte were increased by organic Zn supplementation compared to ZnD, while the levels of MDA, $IFN-{\gamma}$, and proportion of $CD8^+$ T lymphocyte were lowered. Conclusion: These findings indicate that Zn can improve the antioxidant potential and immune functions of weaned piglets.

Optimization Condition of Trace Analysis of Fuel Oxygenated Compounds Using The Design of Experiment (DOE) in Solid-Phase Microextraction with GC/FID (고체상미량분석법(SPME-GC/FID)에서 실험계획법을 이용한 연료첨가제 미량분석의 최적조건)

  • An, Sang-Woo;Lee, Si-Jin;Chang, Soon-Woong
    • Journal of Soil and Groundwater Environment
    • /
    • v.15 no.1
    • /
    • pp.9-18
    • /
    • 2010
  • In this study, Solid-phase micro-extraction (SPME) with Gas Chromatograph using Flame Ionization Detector (GC/FID) was studied as a possible alternative to liquid-liquid extraction for the analysis of Methyl tert-butyl ether (MTBE) and Tertiary-butyl ether (TBA) in water and an optimization condition of trace analysis of MTBE and TBA using the design of experiment (DOE) was described. The aim of our research was to apply experimental design methodology in the optimization condition of trace analysis of fuel oxygenated compounds in soil-phase microextraction with GC/FID. The reactions of SPME were mathematically described as a function of parameters of Temp ($X_1$), Volume ($X_2$), Time ($X_3$) and Salt ($X_4$) being modeled by the use of the partial factorial designs, which was used for fitting 2nd order response surface models and was alternative to central composite designs. The model predicted agreed with the experimentally observed result ($Y_1$(MTBE, $R^2$ = 0.96, $Y_2$ (TBA, $R^2$ = 0.98)). The estimated ridge of the expected maximum responses and optimal conditions for MTBE and TBA were 278.13 and (Temp ($X_1$) = $48.40^{\circ}C$, Volume ($X_2$) = 73.04 mL, Time ($X_3$) = 11.51 min and Salt ($X_4$) = 12,50 mg/L), and 127.89 and (Temp ($X_1$) = $52.12^{\circ}C$, Volume ($X_2$) = 88.88mL, Time ($X_3$) = 65.40 min and Salt ($X_4$) = 12,50 mg/L), respectively.

An Attack Origin Traceback Mechanism using ICMP Message on Ad-hoc Network (Ad-hoc 네트워크에서 ICMP메시지를 이용한 공격 근원지 역추적 기법)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.47-54
    • /
    • 2013
  • Ad-hoc network is composed of mobile nodes and has a vulnerability of attack like on conventional wire networks. So, many studies have been conducted to apply the traceback mechanism on wire network to Ad-hoc network. In this paper, a new mechanism that can trace back to IP source of spoofing DDoS packet using iTrace message on Ad-hoc network is proposed. The proposed mechanism implements ICMP Traceback message and the traceback path between agents allocated in local network and a server located in management network. Also the proposed mechanism can trace the position of attacker even after an attack is over and has extendability through standardization by using a mechanism that IETF proposed. Result of performance evaluation shows a great improvement in terms of load, integrity, safety, traceback function as compared with conventional mechanisms.

Debugging of communication Events Based on the RPC Event Model (RPC 이벤트 모델에 기반한 통신 이벤트의 디버깅)

  • Seo, Yeong-Ae;Jo, Yeong-Uk;Lee, Gong-Seon;Park, Chang-Sun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.225-233
    • /
    • 1999
  • One of the reasons that debugging distributed programs is much more difficult than sequential programs is the communication among processes. Even though there are many debuggers constructed on distributed system environment, no available debugger provides an efficient way to debug communication events.. In this paper, we show the way to debug RPC communication, which is regarded as one of the most popular communication protocol in distributed system development. This paper presents the implementation of the RPC event trace function based on the RPC event model, which is proposed to accommodate communication events into debugging objects. Analyzing conventional RPC protocols, we formalized library function calls as corresponding actions to sending and receiving of messages. B recognizing the locations of library calls the debugger can detect all occurrences of communication events, This RPC event trace function is implemented on the on-line distributed debugger UniVIEW system.

  • PDF

The distribution of the values of the cross-correlation function between the maximal period binary sequences (최대 주기를 갖는 이진 수열의 상호상관 함숫값의 분포)

  • Kwon, Min-Jeong;Cho, Sung-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.6
    • /
    • pp.891-897
    • /
    • 2013
  • The spectrum and the number of the values of the cross-correlation function between the maximal period binary sequences have been extensively studied because of their importance in communications applications. In this paper, we propose the new family of the sequences using the decimation $d=2^{m-1}(3{\cdot}2^{m}-1)$. And we find the spectrum of the cross-correlation function of the sequences and analyze the number of times each value occurs for $0{\leq}{\tau}{\leq}2^{n}-2$.

Effective RFID Authentication Using Hash Function (해시 함수를 이용한 효율적인 RFID 인증)

  • Shin, Hyo-Young;Jung, Gye-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1171-1177
    • /
    • 2010
  • Recently RFID system is used in various fields such as distribution industry, medical industry and military service. The technology for protecting individual privacy is necessary to adapt RFID system in several applications. This paper proposes an authentication protocol which conducts mutual authentication between back-end database and tag using hash function. The proposed protocol satisfies various RFID security requirements : mutual authentication, anonymity, confidentiality, integrity, replay attack, location trace. This protocol reduces the time for authentication minimizing the number of hash operation in back-end database.

CERTAIN MAXIMAL OPERATOR AND ITS WEAK TYPE $L^1$($R^n$)-ESTIMATE

  • Kim, Yong-Cheol
    • Communications of the Korean Mathematical Society
    • /
    • v.16 no.4
    • /
    • pp.621-626
    • /
    • 2001
  • Let { $A_{>o}$ t= exp(M log t)} $_{t}$ be a dilation group where M is a real n$\times$n matrix whose eigenvalues has strictly positive real part, and let $\rho$be an $A_{t}$ -homogeneous distance function defined on ( $R^{n}$ ). Suppose that K is a function defined on ( $R^{n}$ ) such that /K(x)/$\leq$ (No Abstract.see full/text) for a decreasing function defined on (t) on R+ satisfying where wo(x)=│log│log (x)ll. For f$\in$ $L_{1}$ ( $R^{n}$ ), define f(x)=sup t>0 Kt*f(x)=t-v K(Al/tx) and v is the trace of M. Then we show that \ulcorner is a bounded operator of $L_{-{1}( $R^{n}$ ) into $L^1$,$\infty$( $R^{n}$).

  • PDF