• Title/Summary/Keyword: Information Asymmetric

Search Result 683, Processing Time 0.029 seconds

Estimating Willingness to Switch to MVNO for Activation of Mobile Data Services (무선데이터서비스 활성화를 위한 MVNO 전환의사비용 추정)

  • Lee, Sang Woo;Ko, Chang Youl
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.1-11
    • /
    • 2015
  • This study uses the contingent valuation method to estimate the switching cost for adopting the MVNO service. The findings are as follows.: First, Willingness To Switch(WTS) increases as users' using pattern and perceived degree of MVNO service, but satisfaction with current service provider does not play a significant role in predicting Switching Cost. This means that as amount of money users can save exceeds a certain level, users decide to willingly change their service provider to MVNO regardless of their level of satisfaction with current service provider. Second, there are differences in WTS among service subscribers in SKT, KT and LGU+. It means that there will be a difference in the tendency to switch to MVNO among subscribers of service providers. This study suggest the following mangerial perspective to effectively promote the MVNO and boost the MVNO market for activation of mobile data services.: First, MVNOs are better off applying differentiated pricing scheme at attractive rates than using a differentiation of service product and quality. Second, regulators should consider how to implement an MVNO regulatory policy when there is an asymmetric customer loyalty among MNOs. This research will be used to set the MVNO's pricing strategy and to build up a successful regulatory policies.

Effect of Stimulus Waveform of Biphasic Current Pulse on Retinal Ganglion Cell Responses in Retinal Degeneration (rd1) mice

  • Ahn, Kun No;Ahn, Jeong Yeol;Kim, Jae-Hyung;Cho, Kyoungrok;Koo, Kyo-In;Senok, Solomon S.;Goo, Yong Sook
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.19 no.2
    • /
    • pp.167-175
    • /
    • 2015
  • A retinal prosthesis is being developed for the restoration of vision in patients with retinitis pigmentosa (RP) and age-related macular degeneration (AMD). Determining optimal electrical stimulation parameters for the prosthesis is one of the most important elements for the development of a viable retinal prosthesis. Here, we investigated the effects of different charge-balanced biphasic pulses with regard to their effectiveness in evoking retinal ganglion cell (RGC) responses. Retinal degeneration (rd1) mice were used (n=17). From the ex-vivo retinal preparation, retinal patches were placed ganglion cell layer down onto an $8{\times}8$ multielectrode array (MEA) and RGC responses were recorded while applying electrical stimuli. For asymmetric pulses, 1st phase of the pulse is the same with symmetric pulse but the amplitude of 2nd phase of the pulse is less than $10{\mu}A$ and charge balanced condition is satisfied by lengthening the duration of the pulse. For intensities (or duration) modulation, duration (or amplitude) of the pulse was fixed to $500{\mu}s$($30{\mu}A$), changing the intensities (or duration) from 2 to $60{\mu}A$(60 to $1000{\mu}s$). RGCs were classified as response-positive when PSTH showed multiple (3~4) peaks within 400 ms post stimulus and the number of spikes was at least 30% more than that for the immediate pre-stimulus 400 ms period. RGC responses were well modulated both with anodic and cathodic phase-1st biphasic pulses. Cathodic phase-1st pulses produced significantly better modulation of RGC activity than anodic phase-1st pulses regardless of symmetry of the pulse.

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

AFTL: An Efficient Adaptive Flash Translation Layer using Hot Data Identifier for NAND Flash Memory (AFTL: Hot Data 검출기를 이용한 적응형 플래시 전환 계층)

  • Yun, Hyun-Sik;Joo, Young-Do;Lee, Dong-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.1
    • /
    • pp.18-29
    • /
    • 2008
  • NAND Flash memory has been growing popular storage device for the last years because of its low power consumption, fast access speed, shock resistance and light weight properties. However, it has the distinct characteristics such as erase-before-write architecture, asymmetric read/write/erase speed, and the limitation on the number of erasure per block. Due to these limitations, various Flash Translation Layers (FTLs) have been proposed to effectively use NAND flash memory. The systems that adopted the conventional FTL may result in severe performance degradation by the hot data which are frequently requested data for overwrite in the same logical address. In this paper, we propose a novel FTL algorithm called Adaptive Flash Translation Layer (AFTL) which uses sector mapping method for hot data and log-based block mapping method for cold data. Our system removes the redundant write operations and the erase operations by the separating hot data from cold data. Moreover, the read performance is enhanced according to sector translation that tends to use a few read operations. A series of experiments was organized to inspect the performance of the proposed method, and they show very impressive results.

Automatic TV Program Recommendation using LDA based Latent Topic Inference (LDA 기반 은닉 토픽 추론을 이용한 TV 프로그램 자동 추천)

  • Kim, Eun-Hui;Pyo, Shin-Jee;Kim, Mun-Churl
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.270-283
    • /
    • 2012
  • With the advent of multi-channel TV, IPTV and smart TV services, excessive amounts of TV program contents become available at users' sides, which makes it very difficult for TV viewers to easily find and consume their preferred TV programs. Therefore, the service of automatic TV recommendation is an important issue for TV users for future intelligent TV services, which allows to improve access to their preferred TV contents. In this paper, we present a recommendation model based on statistical machine learning using a collaborative filtering concept by taking in account both public and personal preferences on TV program contents. For this, users' preference on TV programs is modeled as a latent topic variable using LDA (Latent Dirichlet Allocation) which is recently applied in various application domains. To apply LDA for TV recommendation appropriately, TV viewers's interested topics is regarded as latent topics in LDA, and asymmetric Dirichlet distribution is applied on the LDA which can reveal the diversity of the TV viewers' interests on topics based on the analysis of the real TV usage history data. The experimental results show that the proposed LDA based TV recommendation method yields average 66.5% with top 5 ranked TV programs in weekly recommendation, average 77.9% precision in bimonthly recommendation with top 5 ranked TV programs for the TV usage history data of similar taste user groups.

Preliminary Phantom Experiments to Map Amino Acids and Neurotransmitters Using MRI

  • Oh, Jang-Hoon;Kim, Hyug-Gi;Woo, Dong-Cheol;Rhee, Sun Jung;Lee, Soo Yeol;Jahng, Geon-Ho
    • Progress in Medical Physics
    • /
    • v.29 no.1
    • /
    • pp.29-41
    • /
    • 2018
  • The objective of this study was to evaluate the chemical exchange saturation transfer (CEST) effect of amino acids and neurotransmitters, which exist in the human brain, depending on the concentration, pH, and amplitude of the saturation radiofrequency field. Phantoms were developed with asparagine (Asn), ${\gamma}-aminobutyric$ acid (GABA), glutamate (Glu), glycine (Gly), and myoinositol (MI). Each chemical had three different concentrations of 10, 30, and 50 mM and three different pH values of 5.6, 6.2, and 7.4. Full Z-spectrum CEST images for each phantom were acquired with a continuous-wave radiofrequency (RF) saturation pulse with two different $B_1$ amplitudes of $2{\mu}T$ and $4{\mu}T$ using an animal 9.4T MRI system. A voxel-based CEST asymmetry was mapped to evaluate exchangeable protons based on amide (-NH), amine ($-NH_2$), and hydroxyl (-OH) groups for the five target molecules. For all target molecules, the CEST effect was increased with increasing concentration and B1 amplitude; however, the CEST effect with varying pH displayed a different trend depending on the characteristics of the molecule. On CEST asymmetric maps, Glu and MI were well visualized around 3.0 and 0.9 ppm, respectively, and were well separated macroscopically at a pH of 7.4. The exchange rates of Asn, Glu, BABA, and Gly usually decreased with increasing pH. The CEST effect was dependent on the concentration, acidity of the target molecules, and B1 amplitude of the saturation RF pulse. The CEST effect for Asn can be observed in a 9.4T MRI system. The results of this study are based on applying the CEST technique in patients with neurodegenerative diseases when proteins in the brain are increased with disease progression.

Studies on Endpoints of Toxicological Evaluation of Heavy Metals in Brachinella kugenumaensis (카드뮴과 구리에 노출된 풍년새우의 생태독성)

  • Park, Ki-Yun;Lee, Dong-Ju;Lee, Chang-Hoon;Won, Du-Hee;Lee, Won-Choel;Kwak, Inn-Sil
    • Environmental Analysis Health and Toxicology
    • /
    • v.24 no.3
    • /
    • pp.241-249
    • /
    • 2009
  • Heavy metal contaminants on the aquatic environment are of interest because they can have severe effects on economy and public health. Recently, the studies for monitoring of heavy metals try to do on aquatic system to assess safety and health of ecosystem by heavy metals. Thus, biological responses were investigated on Korean fairy shrimp Branchinella kugenumaensis exposed to cadmium (Cd) or copper (Cu) for long-periods (30 days). The survival rate decreased significantly (p<0.05) on B. kugenumaensis exposed to Cd and Cu at all concentrations. Especially, the highest decrease was observed at the relatively high concentration of Cd and Cu (p<0.01) and the response by Cd exposure was at dose-dependent. The growth rates were also decreased significantly (p<0.05) on B. kugenumaensis exposed to Cd and Cu for at all concentrations. Then, the reproduction rate, numbering cyst, was decreased significantly (p<0.01) on B. kugenumaensis after Cd or Cu exposures. Long exposure of the relatively high concentration Cd and Cu can have severe effects on the reproduction, while exposures of Cd and Cu can not have effects on sex ratios of B. kugenumaensis. Additionally, asymmetric telson deformity was only observed after Cd exposure. Therefore, these results suggest that B. kugenumaensis is a sensitive bio-indicator of heavy metal exposure and these biological responses of B. kugenumaensis give important information for long-term monitoring on aquatic ecosystem.

Analysis on the Recent Simulation Results of the Pilot Carbon Emission Trading System in Korea (국내 온실가스 배출권거래제도 시범도입방안에 관한 소고(小考))

  • Lee, Sang-Youp;Kim, Hyo-Sun;Yoo, Sang-Hee
    • Environmental and Resource Economics Review
    • /
    • v.13 no.2
    • /
    • pp.271-300
    • /
    • 2004
  • We investigate the two recent simulations of the proto-type domestic carbon emission trading system in Korea and draw some policy implications. The first simulation includes the 5 electric power companies based on baseline and credit. But the second one is with the 7 energy-intensive companies based on cap and trade. The voluntary approaches in this paper revealed the instability of market equilibrium, i.e., price volatility or distortion, excess supply or demand. These phenomena stems from excess incentives to the players, asymmetric information, players' irresponsible strategic behaviors, and non acquaintance of trading system. This paper suggests the basic design for domestic carbon trading system in future and a stepwise introduction strategy for it including the incentive auction scheme, the total quantity of incentive needed, and how to finance it. Meantime, the further simulations on the various sectors based on voluntary participation must be essential for learning experiences and better policy design.

  • PDF

Automated Detecting and Tracing for Plagiarized Programs using Gumbel Distribution Model (굼벨 분포 모델을 이용한 표절 프로그램 자동 탐색 및 추적)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.453-462
    • /
    • 2009
  • Studies on software plagiarism detection, prevention and judgement have become widespread due to the growing of interest and importance for the protection and authentication of software intellectual property. Many previous studies focused on comparing all pairs of submitted codes by using attribute counting, token pattern, program parse tree, and similarity measuring algorithm. It is important to provide a clear-cut model for distinguishing plagiarism and collaboration. This paper proposes a source code clustering algorithm using a probability model on extreme value distribution. First, we propose an asymmetric distance measure pdist($P_a$, $P_b$) to measure the similarity of $P_a$ and $P_b$ Then, we construct the Plagiarism Direction Graph (PDG) for a given program set using pdist($P_a$, $P_b$) as edge weights. And, we transform the PDG into a Gumbel Distance Graph (GDG) model, since we found that the pdist($P_a$, $P_b$) score distribution is similar to a well-known Gumbel distribution. Second, we newly define pseudo-plagiarism which is a sort of virtual plagiarism forced by a very strong functional requirement in the specification. We conducted experiments with 18 groups of programs (more than 700 source codes) collected from the ICPC (International Collegiate Programming Contest) and KOI (Korean Olympiad for Informatics) programming contests. The experiments showed that most plagiarized codes could be detected with high sensitivity and that our algorithm successfully separated real plagiarism from pseudo plagiarism.

A Parameter-Free Approach for Clustering and Outlier Detection in Image Databases (이미지 데이터베이스에서 매개변수를 필요로 하지 않는 클러스터링 및 아웃라이어 검출 방법)

  • Oh, Hyun-Kyo;Yoon, Seok-Ho;Kim, Sang-Wook
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.80-91
    • /
    • 2010
  • As the volume of image data increases dramatically, its good organization of image data is crucial for efficient image retrieval. Clustering is a typical way of organizing image data. However, traditional clustering methods have a difficulty of requiring a user to provide the number of clusters as a parameter before clustering. In this paper, we discuss an approach for clustering image data that does not require the parameter. Basically, the proposed approach is based on Cross-Association that finds a structure or patterns hidden in data using the relationship between individual objects. In order to apply Cross-Association to clustering of image data, we convert the image data into a graph first. Then, we perform Cross-Association on the graph thus obtained and interpret the results in the clustering perspective. We also propose the method of hierarchical clustering and the method of outlier detection based on Cross-Association. By performing a series of experiments, we verify the effectiveness of the proposed approach. Finally, we discuss the finding of a good value of k used in k-nearest neighbor search and also compare the clustering results with symmetric and asymmetric ways used in building a graph.