• Title/Summary/Keyword: Conflict probability model

Search Result 15, Processing Time 0.025 seconds

ADS-B based Trajectory Prediction and Conflict Detection for Air Traffic Management

  • Baek, Kwang-Yul;Bang, Hyo-Choong
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.13 no.3
    • /
    • pp.377-385
    • /
    • 2012
  • The Automatic Dependent Surveillance Broadcast (ADS-B) system is a key component of CNS/ATM recommended by the International Civil Aviation Organization (ICAO) as the next generation air traffic control system. ADS-B broadcasts identification, positional data, and operation information of an aircraft to other aircraft, ground vehicles and ground stations in the nearby region. This paper explores the ADS-B based trajectory prediction and the conflict detection algorithm. The multiple-model based trajectory prediction algorithm leads accurate predicted conflict probability at a future forecast time. We propose an efficient and accurate algorithm to calculate conflict probability based on approximation of the conflict zone by a set of blocks. The performance of proposed algorithms is demonstrated by a numerical simulation of two aircraft encounter scenarios.

Models for Measurement of Efficiency of Free Flight Separation Assurance (자유비행 분리보증 효율성 측정모델 연구)

  • Lee, Dae-Yong;Young, Kang-Ja
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.977-985
    • /
    • 2011
  • Airborne separation assurance is a key requirement for Free Flight Airspace operations, This paper study the feasibility of airborne separation assurance for free flight Airspaces operations by evaluating the efficiency measurement models. Three qualitatively different methods are utilized; one based Ground and Air conflict probability model, other based Dynamic Density model. the other based Direct operating cost model. The evaluation is Direct Operating Cost model and Two metrics are utilized for the efficiency measurements; airborne separation assurance performed quite well in the Free Flight evaluation; (1) 2 scenario of the conflict situations are resolved; (2) The MD-80 flight peformed separation assurance and efficiency, Not only appling for geometric method algorithm is more efficiently than potential method, but also the most efficiently geometric combined method.

A Study on the Organizational Conflict and Job Withdrawal Intention of the Information Security Workers (정보보안 종사자의 조직갈등과 직무이탈 의도에 관한 연구)

  • Kim, Geunhye;Park, Kyudong;Shim, Mina
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.451-463
    • /
    • 2019
  • The purpose of this study is to identify the effects of organizational conflict stages and job withdrawal intention of information security organizations. We applied Pondy's conflict theory and analyzed the case of information security workers in public enterprises. We found that the more information security workers emotionally accept the potential factors of organizational conflict, the higher the intention of job change of information security practitioner. On the other hand, the perception mechanism has a moderating effect of lowering the job change-out probability. The result of this study is expected that the manager of the organization will be able to utilize the conflict in the organizational direction.

Development of Gap Acceptance Models for Permitted Left Turn Intersections (비보호좌회전에서의 간격수락 행태모형 개발)

  • Lee, Chung Won;Lee, Dong Min;Hwang, Soon Cheon
    • International Journal of Highway Engineering
    • /
    • v.18 no.5
    • /
    • pp.95-103
    • /
    • 2016
  • PURPOSES : Permitted left turn is a turning maneuver in which a vehicle turns left using a gap between oncoming vehicles, called gap acceptance, and it enables for more efficient traffic operation at intersections. In Korea, the permitted left turn has not been a common maneuver at signalized or un-signalized intersections. However, many experts and the Police Agency tried to apply this effective turning maneuver at intersections in Korea since 2010. Though the investigation of gap acceptance is significantly important in understanding a driver's behavior at intersections, there have not been many studies about this topic, specifically a study to develop probability models of gap acceptance behavior. METHODS : In this study, the probability model of gap acceptance behavior for a permitted left turn was developed based on observational field studies. To develop the model, seven variables were analyzed including gap, waiting time, traffic volume, conflict-flow vehicle type, left-turning vehicle type, the number of lane, and time. RESULTS : In the final model, gap and left-turning vehicle type were found to be significant influencing factors. CONCLUSIONS : Through this model development, it was concluded that as the gap size increased, the probability of gap acceptance was higher. Moreover, when a left-turning vehicle was a passenger car, the probability of gap acceptance was higher than compared to large size buses or freight cars.

The Effect of Objective and Subjective Social Isolation and Interpersonal Conflict Type on the Probability of Cognitive Impairment by Age Group in Old Age (노년기 연령집단별 객관적·주관적 사회적 고립과 대인관계갈등 유형이 인지기능에 미치는 영향)

  • Lee, Sang Chul
    • 한국노년학
    • /
    • v.38 no.4
    • /
    • pp.811-835
    • /
    • 2018
  • Social relations and cognitive function in old age are closely related to each other, and social relation is classified into structural characteristics and qualitative characteristics reflecting cognitive and emotional evaluation. The concept of social isolation is the focus of attention in relation to the social relations of old age. Social isolation has a multidimensional theoretical structure that is divided into objective dimension such as social network, type of furniture, social participation, and subjective dimension such as lack of perceived social support and loneliness. There is also a close relationship between cognitive function and interpersonal conflict in old age. In this study, we examined the effect of subjective social isolation, which shows the structural characteristics of social relations, and subjective social isolation and interpersonal conflict on the dementia occurrence by age group in the elderly. The data were analyzed by applying a random effect panel logit model using 1,740 panel data from the first year to the third year of KSHAP. The results of the analysis are summarized as follows. First, the cognitive impairment increased sharply with age. Objective and subjective social isolation were both U-shaped distribution with an inflection point of 80 years old. Second, the main effect on the probability of cognitive impairment was statistically significant with objective and subjective social isolation, but the type of interpersonal conflict did not appear to be significant. Third, the results of two-way interaction effect analysis on the probability of cognitive impairment are as follows. The relationship between subjective social isolation and the probability of occurrence of cognitive impairment was significantly different according to the level of conflict with spouse. In addition, the higher the subjective social isolation, the higher the probability of cognitive impairment in the elderly(over 85) than in the young-old(65~74). In addition, as the level of conflict with spouses increases, the probability of cognitive impairment of the oldest-old(aged 85 or older) is drastically lower than that of the young-old(aged 65~74). Based on the results of this study, policy and practical implications for reducing the cognitive impairment of the elderly age group were suggested, and limitations of the study and suggestions for future research were discussed.

Categorized the Contribution evasion through Health Insurance contribution evasion expected model (건강보험 체납예측모형을 통한 체납세대의 유형화 및 특성)

  • 이애경;최인덕
    • Health Policy and Management
    • /
    • v.14 no.2
    • /
    • pp.78-98
    • /
    • 2004
  • The purpose of this study was to categorize the contribution evasion and develop the expected models for contribution arrears in National Health Care System. The modified logistic regression model in non-payments was used as logistic regression model based on the statistical method. By using this model, we arranged non-payment types and typical branches those are appeared by statistical technique. First fact, sex and age branches those are able to take a part in economy had effect mostly. Also they had difference in non-payment probability by existence of their incomes and property. Especially people who didn't have their own house and car were appeared in high non-payment probability, disease and reduction characteristic(rare diseases, reduction of seniors, handicaps, numbers of medical treatments) didn't effect much in probability. The reason for some characteristic of non-payment which is higher than the correct threshold value of Logistic Regression Model (a suggested model for predicting non-payment)'s distribution of probability was mostly moral hazard. Living difficulty was the bigger reason for non-payment, but moral slackening was the bigger reason for non-payment. But it is careless to decide that moral hazard is just the reason, there is a necessity to examine on the side of sociology based in family. By the reason, the member's non-payment reason can be classified by economy, population, and psychology, but there was a comprehension that losing of work desire could be one reason. So we analyzed informations for composition of family of members. In conclusion, we grasped that family conflict makes non-payment and conversion of member in the National Basic Livelihood Protection System difficult.

Development of Gap Acceptance Models for Permitted Left Turn Intersections during Rainfall (우천시 비보호좌회전에서의 간격수락 행태모형 개발)

  • Hwang, Soon Cheon;Lee, Chungwon;Lee, Dong Min
    • International Journal of Highway Engineering
    • /
    • v.19 no.4
    • /
    • pp.61-68
    • /
    • 2017
  • PURPOSES : A complete signal system is not always the best solution for improving traffic operation efficiency at intersections. An alternative solution is to use a Protected Permitted Left Turn (PPLT) operation method. However, the PPLT method needs to be developed after a detailed study of driving tendencies, most notably the gap acceptance behavior, for successful implementation. In this study, the gap acceptance behavior was investigated under various variables and weather conditions, especially under rain, and the results were compared to the case of normal weather. The results of this study will be helpful in introducing the PPLT method, and are important considering the tendency of attempting unprotected left turns that is extremely common in Korean drivers. METHODS : Data was obtained by analyzing traffic footage at four intersections on a day when the precipitation was greater than 5 mm/h. The collected data was classified into seven variables for statistical analysis. Finally, we used logistic regression analysis to develop a probability distribution model. RESULTS : Gap, traffic volume, and the number of conflicting lanes were factors affecting the gap acceptance behavior of unprotected left turns under rainy conditions. CONCLUSIONS : The probability of attempting unprotected left turns is higher for larger gaps. On the other hand, the probability of attempting unprotected left turns decreases with an increase in the traffic volume. Finally, an increase in the number of conflict lanes leads to a decrease in the probability of attempting unprotected left turns.

Probabilistic assessment on the basis of interval data

  • Thacker, Ben H.;Huyse, Luc J.
    • Structural Engineering and Mechanics
    • /
    • v.25 no.3
    • /
    • pp.331-345
    • /
    • 2007
  • Uncertainties enter a complex analysis from a variety of sources: variability, lack of data, human errors, model simplification and lack of understanding of the underlying physics. However, for many important engineering applications insufficient data are available to justify the choice of a particular probability density function (PDF). Sometimes the only data available are in the form of interval estimates which represent, often conflicting, expert opinion. In this paper we demonstrate that Bayesian estimation techniques can successfully be used in applications where only vague interval measurements are available. The proposed approach is intended to fit within a probabilistic framework, which is established and widely accepted. To circumvent the problem of selecting a specific PDF when only little or vague data are available, a hierarchical model of a continuous family of PDF's is used. The classical Bayesian estimation methods are expanded to make use of imprecise interval data. Each of the expert opinions (interval data) are interpreted as random interval samples of a parent PDF. Consequently, a partial conflict between experts is automatically accounted for through the likelihood function.

A comprehensive evaluation method study for dam safety

  • Jia, Fan;Yang, Meng;Liu, Bingrui;Wang, Jianlei;Gao, Jiaorong;Su, Huaizhi;Zhao, Erfeng
    • Structural Engineering and Mechanics
    • /
    • v.63 no.5
    • /
    • pp.639-646
    • /
    • 2017
  • According to the multi-index system of dam safety assessment and the standard of safety, a comprehensive evaluation model for dam safety based on a cloud model is established to determine the basic probability assignment of the Dempster-Shafer theory. The Dempster-Shafer theory is improved to solve the high conflict problems via fusion calculation. Compared with the traditional Dempster-Shafer theory, the application is more extensive and the result is more reasonable. The uncertainty model of dam safety multi-index comprehensive evaluation is applied according to the two theories above. The rationality and feasibility of the model are verified through application to the safety evaluation of a practical arch dam.

Novel Trusted Hierarchy Construction for RFID Sensor-Based MANETs Using ECCs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • ETRI Journal
    • /
    • v.37 no.1
    • /
    • pp.186-196
    • /
    • 2015
  • In resource-constrained, low-cost, radio-frequency identification (RFID) sensor-based mobile ad hoc networks (MANETs), ensuring security without performance degradation is a major challenge. This paper introduces a novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor-based MANETs using error-correcting codes (ECCs). The proposed scheme chooses a quasi-cyclic ECC. Key pairs are generated using the ECC for establishing a secure message communication. Probability analysis shows that code-based identification; key generation; and authentication and trust management schemes protect the network from Sybil, eclipse, and de-synchronization attacks. A lightweight model for the proposed sequence of steps is designed and analyzed using an Alloy analyzer. Results show that selection processes with ten nodes and five subgroup controllers identify attacks in only a few milliseconds. Margrave policy analysis shows that there is no conflict among the roles of network members.