• Title/Summary/Keyword: 3G Networks

Search Result 414, Processing Time 0.026 seconds

ALLOCATION AND PRICING IN PUBLIC TRANSPORTATION AND THE FREE RIDER THEOREM

  • Beckmann, Martin J.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.3 no.1
    • /
    • pp.31-46
    • /
    • 1978
  • Consider a time interval during which the demand for trips is fixed (e.g. the rush hour period). The traveller has a choice between various public modes, whose travel times and fares are fixed, and the automobile mode, for which travel time and cost depend on the volume of traffic flow on those roads, which are subject to congestion. We consider the equilibrium in terms of a representative travellerm, who choses for any trip the mode and route with the least combined money and time cost. When several (parallel) model or routes are chosen, then the combined cost of money and time must be equal among these. Our problem is first, to find the optimal flows of cars and of public mode carriers on the various links of their networks and second the optimal fares for trips by the variousmodes. The object is to minimize the total operating costs of the carriers and car plus the total time costs to travellers. The optimal fares are related to, but not identical with the dual variables of the underlying Nonlinear Program. They are equal to these dual variables only in the case, when congestion tolls on trips or on the use of specific roads are collected from automobile users. When such tolls are not collected, they must be passed on as subsidies to travellers using competing modes. The optimal fares of public modes are then reduced by the amounts of these subsidies. Note that subsidies are not a flat payment to public carriers, but are calculated on the basis of tickets sold. Fares and subsidies depend in general on tile period considered. They will be higher during periods of higher demand. When the assumption of fixed trip demand is relaxed, this tare system is no longer best, but only second best since too much traffic will, in general, be generated. The Free Rider Theorem states the following : Suppose road tolls can be charged, so that a best pricing system for public modes is posssible. Then there may exist free rides on some routes and modes, but never on a complete round trip.

  • PDF

Integrating Ant Colony Clustering Method to a Multi-Robot System Using Mobile Agents

  • Kambayashi, Yasushi;Ugajin, Masataka;Sato, Osamu;Tsujimura, Yasuhiro;Yamachi, Hidemi;Takimoto, Munehiro;Yamamoto, Hisashi
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.3
    • /
    • pp.181-193
    • /
    • 2009
  • This paper presents a framework for controlling mobile multiple robots connected by communication networks. This framework provides novel methods to control coordinated systems using mobile agents. The combination of the mobile agent and mobile multiple robots opens a new horizon of efficient use of mobile robot resources. Instead of physical movement of multiple robots, mobile software agents can migrate from one robot to another so that they can minimize energy consumption in aggregation. The imaginary application is making "carts," such as found in large airports, intelligent. Travelers pick up carts at designated points but leave them arbitrary places. It is a considerable task to re-collect them. It is, therefore, desirable that intelligent carts (intelligent robots) draw themselves together automatically. Simple implementation may be making each cart has a designated assembly point, and when they are free, automatically return to those points. It is easy to implement, but some carts have to travel very long way back to their own assembly point, even though it is located close to some other assembly points. It consumes too much unnecessary energy so that the carts have to have expensive batteries. In order to ameliorate the situation, we employ mobile software agents to locate robots scattered in a field, e.g. an airport, and make them autonomously determine their moving behaviors by using a clustering algorithm based on the Ant Colony Optimization (ACO). ACO is the swarm intelligence-based methods, and a multi-agent system that exploit artificial stigmergy for the solution of combinatorial optimization problems. Preliminary experiments have provided a favorable result. In this paper, we focus on the implementation of the controlling mechanism of the multi-robots using the mobile agents.

The Structure of Reversible DTCNN (Discrete-Time Celluar Neural Networks) for Digital Image Copyright Labeling (디지털영상의 저작권보호 라벨링을 위한 Reversible DTCNN(Discrete-Time Cellular Neural Network) 구조)

  • Lee, Gye-Ho;Han, Seung-jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.3
    • /
    • pp.532-543
    • /
    • 2003
  • In this paper, we proposed structure of a reversible discrete-time cellular neural network (DTCNN) for labeling digital images to protect copylight. First, we present the concept and the structure of reversible DTCNN, which can be used to generate 2D binary pseudo-random images sequences. We presented some, output examples of different kinds of reversible DTCNNs to show their complex behaviors. Then both the original image and the copyright label, which is often another binary image, are used to generate a binary random key image. The key image is then used to scramble the original image. Since the reversibility of a reversible DTCNN, the same reversible DTCNN can recover the copyright label from a labeled image. Due to the high speed of a DTCNN chip, our method can be used to label image sequences, e.g., video sequences, in real time. Computer simulation results are presented.

Identifying Responsive Functional Modules from Protein-Protein Interaction Network

  • Wu, Zikai;Zhao, Xingming;Chen, Luonan
    • Molecules and Cells
    • /
    • v.27 no.3
    • /
    • pp.271-277
    • /
    • 2009
  • Proteins interact with each other within a cell, and those interactions give rise to the biological function and dynamical behavior of cellular systems. Generally, the protein interactions are temporal, spatial, or condition dependent in a specific cell, where only a small part of interactions usually take place under certain conditions. Recently, although a large amount of protein interaction data have been collected by high-throughput technologies, the interactions are recorded or summarized under various or different conditions and therefore cannot be directly used to identify signaling pathways or active networks, which are believed to work in specific cells under specific conditions. However, protein interactions activated under specific conditions may give hints to the biological process underlying corresponding phenotypes. In particular, responsive functional modules consist of protein interactions activated under specific conditions can provide insight into the mechanism underlying biological systems, e.g. protein interaction subnetworks found for certain diseases rather than normal conditions may help to discover potential biomarkers. From computational viewpoint, identifying responsive functional modules can be formulated as an optimization problem. Therefore, efficient computational methods for extracting responsive functional modules are strongly demanded due to the NP-hard nature of such a combinatorial problem. In this review, we first report recent advances in development of computational methods for extracting responsive functional modules or active pathways from protein interaction network and microarray data. Then from computational aspect, we discuss remaining obstacles and perspectives for this attractive and challenging topic in the area of systems biology.

A study of fast Reliability evaluation for acyclic digraph using domination theory (Domination 이론을 이용한 acyclic digraph의 빠른 신뢰도 계산을 위한 연구)

  • 이광원
    • Journal of the Korean Society of Safety
    • /
    • v.11 no.1
    • /
    • pp.27-38
    • /
    • 1996
  • The aim of this paper is to develop more fast algorithm for evaluation of the reliability of networks and system. It is illustrated with examples. This paper derived the algorithm to calculate the acyclic directed graph G(deals with the problem of the s-t graph). The language PASCAL was used to implement the algorithm. Three Examples are calculated and the calculation time is shorter than the time by program in $\ulcorner$21$\lrcorner.

  • PDF

Systems Pharmacological Analysis of Dichroae Radix in Anti-Tumor Metastasis Activity (시스템 약리학적 분석에 의한 상산의 암전이 억제 효과)

  • Jee Ye Lee;Ah Yeon Shin;Hak Koon Kim;Won Gun An
    • Herbal Formula Science
    • /
    • v.31 no.4
    • /
    • pp.295-313
    • /
    • 2023
  • Objectives : While treatments for cancer are advancing, the development of effective treatments for cancer metastasis, the main cause of cancer patient death, remains insufficient. Recent studies on Dichroae Radix have revealed that its active ingredients have the potential to inhibit cancer metastasis. This study aimed to investigate the cancer metastasis inhibitory effect of Dichroae Radix using network pharmacological analysis. Methods : The active compounds of Dichroae Radix have been identified using Traditional Chinese Medicine System Pharmacology Database and Analysis Platform. The UniProt database was used to collect each of information of all target proteins associated with the active compounds. To find the bio-metabolic processes associated with each target, the DAVID6.8 Gene Functional classifier tool was used. Compound-Target and Target-Pathway networks were analyzed via Cytoscape 3.40. Results : In total, 25 active compounds and their 62 non-redundant targets were selected through the TCMSP database and analysis platform. The target genes underwent gene ontology and pathway enrichment analysis. The gene list applied to the gene ontology analysis revealed associations with various biological processes, including signal transduction, chemical synaptic transmission, G-protein-coupled receptor signaling pathways, response to xenobiotic stimulus, and response to drugs, among others. A total of eleven genes, including HSP90AB1, CALM1, F2, AR, PAKACA, PTGS2, NOS2, RXRA, ESR1, ESR2, and NCOA1, were found to be associated with biological pathways related to cancer metastasis. Furthermore, nineteen of the active compounds from Dichroae Radix were confirmed to interact with these genes. Conclusions : The results provide valuable insights into the mechanism of action and molecular targets of Dichroae Radix. Notably, Berberine, the main active ingredient of Dichroae Radix, plays a significant role in degrading AR proteins in advanced prostate cancer. Further studies and validations can provide crucial data to advance cancer metastasis prevention and treatment strategies.

Localization Algorithm in Wireless Sensor Networks using the Acceleration sensor (가속도 센서를 이용한 무선 센서 네트워크하에서의 위치 인식 알고리즘)

  • Hong, Sung-Hwa;Jung, Suk-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1294-1300
    • /
    • 2010
  • In an environment where all nodes move, the sensor node receives anchor node's position information within communication radius and modifies the received anchor node's position information by one's traveled distance and direction in saving in one's memory, where if there at least 3, one's position is determined by performing localization through trilateration. The proposed localization mechanisms have been simulated in the Matlab. In an environment where certain distance is maintained and nodes move towards the same direction, the probability for the sensor node to meet at least 3 anchor nodes with absolute coordinates within 1 hub range is remote. Even if the sensor node has estimated its position with at least 3 beacon information, the angle ${\theta}$ error of accelerator and digital compass will continuously apply by the passage of time in enlarging the error tolerance and its estimated position not being relied. Dead reckoning technology is used as a supplementary position tracking navigation technology in places where GPS doesn't operate, where one's position can be estimated by knowing the distance and direction the node has traveled with acceleration sensor and digital compass. The localization algorithm to be explained is a localization technique that uses Dead reckoning where all nodes are loaded with omnidirectional antenna, and assumes that one's traveling distance and direction can be known with accelerator and digital compass. The simulation results show that our scheme performed better than other mechanisms (e.g. MCL, DV-distance).

CFD Simulations of the Trees' Effects on the Reduction of Fine Particles (PM2.5): Targeted at the Gammandong Area in Busan (수목의 초미세먼지(PM2.5) 저감 효과에 대한 CFD 수치 모의: 부산 감만동 지역을 대상으로)

  • Han, Sangcheol;Park, Soo-Jin;Choi, Wonsik;Kim, Jae-Jin
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.5_3
    • /
    • pp.851-861
    • /
    • 2022
  • In this study, we analyzed the effects of trees planted in urban areas on PM2.5 reduction using a computational fluid dynamics (CFD) model. For realistic numerical simulations, the meteorological components(e.g., wind velocity components and air temperatures) predicted by the local data assimilation and prediction system (LDAPS), an operational model of the Korea Meteorological Administration, were used as the initial and boundary conditions of the CFD model. The CFD model was validated against, the PM2.5 concentrations measured by the sensor networks. To investigate the effects of trees on the PM2.5 reduction, we conducted the numerical simulations for three configurations of the buildings and trees: i) no tree (NT), ii) trees with only drag effect (TD), and iii) trees with the drag and dry-deposition effects (DD). The results showed that the trees in the target area significantly reduced the PM2.5 concentrations via the dry-deposition process. The PM2.5 concentration averaged over the domain in DD was reduced by 5.7 ㎍ m-3 compared to that in TD.

The Sub Authentication Method For Driver Using Driving Patterns (운전 패턴을 이용한 운전자 보조 인증방법)

  • Jeong, Jong-Myoung;Kang, Hyung Chul;Jo, Hyo Jin;Yoon, Ji Won;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.919-929
    • /
    • 2013
  • Recently, a variety of IT technologies are applied to the vehicle. However, some vehicle-IT technologies without security considerations may cause security problems. Specially, some researches about a smart key system applied to automobiles for authentication show that the system is insecure from replay attacks and modification attacks using a wireless signal of the smart key. Thus, in this paper, we propose an authentication method for the driver by using driving patterns. Nowadays, we can obtain driving patterns using the In-vehicle network data. In our authentication model, we make driving ppatterns of car owner using standard normal distribution and apply these patterns to driver authentication. To validate our model, we perform an k-fold cross validation test using In-vehicle network data and obtain the result(true positive rate 0.7/false positive rate is 0.35). Considering to our result, it turns out that our model is more secure than existing 'what you have' authentication models such as the smart key if the authentication result is sent to the car owner through mobile networks.

Implant Isolation Characteristics for 1.25 Gbps Monolithic Integrated Bi-Directional Optoelectronic SoC (1.25 Gbps 단일집적 양방향 광전 SoC를 위한 임플란트 절연 특성 분석)

  • Kim, Sung-Il;Kang, Kwang-Yong;Lee, Hai-Young
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.8
    • /
    • pp.52-59
    • /
    • 2007
  • In this paper, we analyzed and measured implant isolation characteristics for a 1.25 Gbps monolithic integrated hi-directional (M-BiDi) optoelectronic system-on-a-chip, which is a key component to constitute gigabit passive optical networks (PONs) for a fiber-to-the-home (FTTH). Also, we derived an equivalent circuit of the implant structure under various DC bias conditions. The 1.25 Gbps M-BiDi transmit-receive SoC consists of a laser diode with a monitor photodiode as a transmitter and a digital photodiode as a digital data receiver on the same InP wafer According to IEEE 802.3ah and ITU-T G.983.3 standards, a receiver sensitivity of the digital receiver has to satisfy under -24 dBm @ BER=10-12. Therefore, the electrical crosstalk levels have to maintain less than -86 dB from DC to 3 GHz. From analysed and measured results of the implant structure, the M-BiDi SoC with the implant area of 20 mm width and more than 200 mm distance between the laser diode and monitor photodiode, and between the monitor photodiode and digital photodiode, satisfies the electrical crosstalk level. These implant characteristics can be used for the design and fabrication of an optoelectronic SoC design, and expended to a mixed-mode SoC field.