• Title/Summary/Keyword: Instance Generation

Search Result 89, Processing Time 0.024 seconds

Limited Cost-Based Competition and the Cost Distortion Factor - How Real Variable Costs are Reported in Cost-Base Pool of Korean Power Market - (원가기반 제한경쟁과 비용왜곡 요인 -변동비 반영 전력시장에서의 실제변동비 반영사례를 중심으로-)

  • Kim, Myung-Seok;Cho, Sung Bong
    • Environmental and Resource Economics Review
    • /
    • v.23 no.3
    • /
    • pp.497-513
    • /
    • 2014
  • Rate-of-return regulation where a regulator compensates the utilities based upon the cost incurred the regulated companies have the incentive to over-report cost level. However, in case of cost-based competition where a regulator knows the cost of each plant involved and induce the competition among them, one can encounter prisoner's dilemma situation in the short run where the regulated firms under-report cost level. For instance, in case of cost-based pool, a generator may have a strategic behavior to keep its registered variable cost higher than the actual level to maintain its operation rate and generation amounts higher. Eventually, however, such behavior decrease the profitability of a generator and discourage new entry jeopardizing required level of capacity reserves. This is a typical Prisoner's Dilemma situation. The power market operating rule should be revised so that generators' registered variable cost reflect actual level of variable cost.

Studies of radiosensitivity (6) Radiosensitivity of insect pests (방사선 감수성에 관한 연구 (6) 해충의 방사선감수성)

  • Bai D. H.
    • Korean journal of applied entomology
    • /
    • v.4
    • /
    • pp.67-74
    • /
    • 1965
  • The work on the 'Studies of radiosensitivity' in Korea has been initiated since 1959 by the author at various institutions in home and foreign countries, and more than 20000 of plant materials in 73 varieties and 41 kinds are treated under varied conditions for the studies of radiosensitivity in plants. However, a study of the susceptibility to radiation in insect pests as well as their biological effects has not been previously reported in this country. During the year of 1964 and 1965, near 50000 of insects at the stages of adult, egg, larva and pupa in 14 different kinds are irradiated under acute X and gamma rays to investigate the behavior of growth and lethality after irradiation, and thrir general tolerances to radiations are compared by the kind of insects, stage of growth, radiation sources and exposured dosages. Through the experiments, it is shown that the lethality in most of insects are high as several kilo roentgens above and no significant effects on pupation. emergence, and oviposition in the treated generation at the dose of 3 Kr. below, but in the following generation , the rice stem borer for instance, no oviposition or decreased laying is observed from the dosages at 3 Kr. to 1 Kr., and the hatching was possible from 1.5 Kr. below of irradiated larvae although laying and hatching are seemed in normal. In general, the lethal dose $50\%$ of tested infect materials at the larval stage can he classified some what 60-80 Kr. for Pine caterpillar, Fall webworm, Camphor silk moth and their relatives, at 40-60 Kr. for Gypsy moth, Monley prominent and some relatives and at 20-30 Kr. for House fly, Rice weevil, Pine sawfly etc. Plant parasitic nematodes such as Hirschmannia and Paratylenchus shown very high resistance to radiation and the LD-50 is observed from 100 Kr. or above. A concept to evaluate the radiosensitivity in insects by taxological family line as a practical measure is not answerable yet, but it ran he solved within the near future through the continuing experiments.

  • PDF

Conflict Resolution of Patterns for Generating Linked Data From Tables (테이블로부터 링크드 데이터 생성을 위한 패턴 충돌 해소)

  • Han, Yong-Jin;Kim, Kweon Yang;Park, Se Young
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.3
    • /
    • pp.285-291
    • /
    • 2014
  • Recently, many researchers have paid attention to the study on generation of new linked data from tables by using linked open data (e.g. RDF, OWL). This paper proposes a new method for such generation of linked data. A pattern-based method intrinsically has a conflict problem among patterns. For instance, several patterns, mapping a single header of a table into different properties of linked data, conflict with each others. Existing studies have sacrificed precision by applying a statistically dominant pattern or have ignored conflicting patterns to increase precision. The proposed method finds appropriate patterns for all headers in a given table by connecting patterns applied to the headers. Experiments using DBPedia and Wikipedia showed results that conflicts of patterns are effectively resolved by the proposed method.

Depthmap Generation with Registration of LIDAR and Color Images with Different Field-of-View (다른 화각을 가진 라이다와 칼라 영상 정보의 정합 및 깊이맵 생성)

  • Choi, Jaehoon;Lee, Deokwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.6
    • /
    • pp.28-34
    • /
    • 2020
  • This paper proposes an approach to the fusion of two heterogeneous sensors with two different fields-of-view (FOV): LIDAR and an RGB camera. Registration between data captured by LIDAR and an RGB camera provided the fusion results. Registration was completed once a depthmap corresponding to a 2-dimensional RGB image was generated. For this fusion, RPLIDAR-A3 (manufactured by Slamtec) and a general digital camera were used to acquire depth and image data, respectively. LIDAR sensor provided distance information between the sensor and objects in a scene nearby the sensor, and an RGB camera provided a 2-dimensional image with color information. Fusion of 2D image and depth information enabled us to achieve better performance with applications of object detection and tracking. For instance, automatic driver assistance systems, robotics or other systems that require visual information processing might find the work in this paper useful. Since the LIDAR only provides depth value, processing and generation of a depthmap that corresponds to an RGB image is recommended. To validate the proposed approach, experimental results are provided.

Delay-Aware Packet Scheduling (DAPS) Algorithm in 3GPP LTE System (LTE 시스템에서 지연에 대한 QoS 보장을 위한 하향링크 패킷 스케줄링 알고리즘)

  • Choi, Bum-Gon;Chung, Min-Young;Lee, Hye-Kyung;Kim, Tai-Suk;Kang, Jee-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.498-508
    • /
    • 2009
  • In wireless mobile environments, large bandwidth and high QoS (Quality of Service) are recently required to support the increased demands for multimedia services. LTE (Long Term Evolution) is one of the promising solutions for the next generation broadband wireless access systems. To efficiently use downlink resource and effectively support QoS, packet scheduling algorithm is one of the important features in LTE system. In this paper, we proposed DAPS (Delay-Aware Packet Scheduling) algorithm to consider QoS requirements of delays for various traffic classes as well as channel condition and fairness. To reflect delay experiences at scheduling instance, DAPS observes how queue waiting time of packet is closed to maximum allowable delay. The simulation results show that the DAPS algorithm yields better performance for delay experience by increasing the number of transmitted packets with satisfying the required delay time compared with existing scheduling algorithms.

A Method for Generating Malware Countermeasure Samples Based on Pixel Attention Mechanism

  • Xiangyu Ma;Yuntao Zhao;Yongxin Feng;Yutao Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.456-477
    • /
    • 2024
  • With information technology's rapid development, the Internet faces serious security problems. Studies have shown that malware has become a primary means of attacking the Internet. Therefore, adversarial samples have become a vital breakthrough point for studying malware. By studying adversarial samples, we can gain insights into the behavior and characteristics of malware, evaluate the performance of existing detectors in the face of deceptive samples, and help to discover vulnerabilities and improve detection methods for better performance. However, existing adversarial sample generation methods still need help regarding escape effectiveness and mobility. For instance, researchers have attempted to incorporate perturbation methods like Fast Gradient Sign Method (FGSM), Projected Gradient Descent (PGD), and others into adversarial samples to obfuscate detectors. However, these methods are only effective in specific environments and yield limited evasion effectiveness. To solve the above problems, this paper proposes a malware adversarial sample generation method (PixGAN) based on the pixel attention mechanism, which aims to improve adversarial samples' escape effect and mobility. The method transforms malware into grey-scale images and introduces the pixel attention mechanism in the Deep Convolution Generative Adversarial Networks (DCGAN) model to weigh the critical pixels in the grey-scale map, which improves the modeling ability of the generator and discriminator, thus enhancing the escape effect and mobility of the adversarial samples. The escape rate (ASR) is used as an evaluation index of the quality of the adversarial samples. The experimental results show that the adversarial samples generated by PixGAN achieve escape rates of 97%, 94%, 35%, 39%, and 43% on the Random Forest (RF), Support Vector Machine (SVM), Convolutional Neural Network (CNN), Convolutional Neural Network and Recurrent Neural Network (CNN_RNN), and Convolutional Neural Network and Long Short Term Memory (CNN_LSTM) algorithmic detectors, respectively.

A VoIP System for Secure Support in Next Generation Networks based on SIP (차세대 네트워크환경에서의 보안성 지원을 위한 SIP 기반 VoIP 시스템)

  • Sung, Kyung;Kim, Seok-Hun;Park, Gil-Ha
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2321-2328
    • /
    • 2006
  • Today, SIP standard (The signalling protocol for the Internet phone service) raises to be the standard technique because the expandability is high and complexity is low. It is widely investigated and actively advocated to use Si81a1 ring protocol for SIP in VoIP service. SIP service can be applied even outside the Internet phone service; instance messaging and various multimedia technology are just an example. This paper proposed an embodiment proxy server for rambling support to use JAIN SIP API. It provides standard interface for testing the Proxy server for SIP and embodiment of user agent that transfer instant massaging and voice communication.

A Challenge to Development and Environmental Protection in China (중국의 개발과 환경보전에의 도전)

  • 조윤숭
    • Journal of environmental and Sanitary engineering
    • /
    • v.8 no.2
    • /
    • pp.123-148
    • /
    • 1993
  • Over the past-decade of reform and opening up to the outside world, China#s GNP doubled which now ranks eighth in the world, making an average 9.6% increase annually. Some industrial products such as steel, crude oil and power generation rank fourth in the world, while output of coal and cement rank first. In the agricultural sector, China ranks first in the output of grain, cotton, meat and basically solved the problem of providing food and daily necessities for 22% of the world#s population, The Chinese government has set the objectives in environmental protection plan to be achieved by the year 2000 together with ecological protection. During the Seventh Pive-Year Plan(1985-90), Chains#s annual investment in controlling environment pollution was about 10 billion Yuan, or 0.7% of her GNP, while during the Eighth Five-Year Plan, effort will be made to increase such investments, in terms of the GNP, possibly to 0.85"1% . However, the expanding development including industrial production will increase large amounts of pollutants into the environment and efforts are underway to deal with these pollution. *대한위생학회장 Regional community are faced with serious environmental problems. For instance, so called# Yellow Sand Storm# from China is one of the case. Recently, to make matter worse, acid rain and dry depositation from transboundary air pollution is tend to increase mainly because of emissions from mainland China. Therefore, the countries concerned in the region, should seek to promote international cooperation on environmental issues. An overall aspects of development and environmental programs in China are presented.

  • PDF

A Study on the Pluralism Expressed in Modern Fashion (현대 패션에 나타난 다원주의에 관한 연구)

  • Choi, Young-Ok
    • Fashion & Textile Research Journal
    • /
    • v.5 no.5
    • /
    • pp.453-464
    • /
    • 2003
  • This study is to analyze that the pluralism is the main aspect of the modem fashion which examines the definition and the character of the pluralism. This will also consider the pluralism that appeared on the modern fashion which is based on them. The main point of pluralism is that the world is necessarily aware of plural and difference. Also many values which is focused on the previous generation, for instance disorganize of westernism, androcentrictrism, christianism and powerful nationalism, what is called unfamiliar, heterogeneous, the others and the circumference things. As these were rehabilitated, morality, ethics, religion or politics were all became possible to choose for one's taste. The pluralism expressed in modern fashion can be divided as collapse of genre, grafting the lower and higher orders cultivation, variety way of approaching in time, internationalism. The result for the consideration is that the pluralism has candid attitude for everything so that in the modern fashion is importing variety range of artistic definition. Namely, it is not only containing previous pure art, elegance art and element of artistic sublime beauty, but also has aesthetics of ugliness, deconstructive art and anti-fashion so that the definition of the art is getting vagueness and diverse.

An Architecture for Mobile Instruction: Application to Mathematics Education through the Web

  • Kim, Steven H.;Kwon, Oh-Nam;Kim, Eun-Jung
    • Research in Mathematical Education
    • /
    • v.4 no.1
    • /
    • pp.45-55
    • /
    • 2000
  • The rapid proliferation of wireless networks provides a ubiquitous channel for delivering instructional materials at the convenience of the user. By delivering content through portable devices linked to the Internet, the full spectrum of multimedia capabilities is available for engaging the user's interest. This capability encompasses not only text but images, video, speech generation and voice recognition. Moreover, the incorporation of machine learning capabilities at the source provides the ability to tailor the material to the general level of expertise of the user as well as the immediate needs of the moment: for instance, a request for information regarding a particular city might be covered by a leisurely presentation if solicited from the home, but more tersely if the user happens to be driving a car. This paper presents system architecture to support mobile instruction in conjunction with knowledge-based tutoring capabilities. For concreteress, the general concepts are examined in the context of a system for mathematics education on the Web.

  • PDF