• Title/Summary/Keyword: 24 scenarios

Search Result 235, Processing Time 0.025 seconds

오염토양 정화의 비용편익분석 -독일 오스나부릭 도시 사례-

  • 강동규
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2004.09a
    • /
    • pp.20-24
    • /
    • 2004
  • The aim of this study was to analyse the cost-benefit-ratio of a soil remediation project. The target of the study was the 'Altablagerung Osnabrueck-Wueste' the largest inhabited former landfill site in Germany. The determination of benefit resulting from the soil remediation was quantified with the help of willingness-to-pay(WTP) analysis (contingent valuation method, CVM). 400 households participated in the survey. The average WTP was 6.5 Euro per household per month or 78 Euro per house-hold per year. The projected benefit generated by the remediation (consumer value) for the population in the landfill area was determined to be 0.7 million Euro per year. Factors which influence the will-ingness to pay were evaluated. The most important factors were age, garden use and the prevailing concern about personal health. A computation of the cost-benefit relationship was made on the basis of three different scenarios, which differed in terms of the projected benefits. Finally the economical efficiency of the project was determined. With a projection of 18 years and upwards the remediation of the soil is economically worthwhile.

  • PDF

A COUNTER-BASED MAC REVISITED: WEAKENING THE UNDERLYING ASSUMPTION

  • Lee, Eon-Kyung;Lee, Sang-Jin
    • Journal of applied mathematics & informatics
    • /
    • v.24 no.1_2
    • /
    • pp.461-470
    • /
    • 2007
  • In CRYPTO 1995, Bellare, $Gu\'{e}rin$, and Rogaway proposed a very efficient message authentication scheme. This scheme is secure against adaptive chosen message attacks, under the assumption that its underlying primitive is a pseudorandom function. This article studies how to weaken that assumption. For an adaptive chosen message attack, we take into account two scenarios. On the one hand, the adversary intercepts the authenticated messages corresponding to messages chosen adaptively by herself, so the verifier does not receive them. On the other hand, the adversary can only eavesdrop the authenticated messages corresponding to messages chosen adaptively by herself, so the verifier receives them. We modify the original scheme. In the first scenario, our scheme is secure if the underlying primitive is a pseudorandom function. In the second scenario, our scheme is still secure under a weaker assumption that the underlying primitive is an indistinguishable-uniform function.

A Low Complexity, Descriptor-Less SIFT Feature Tracking System

  • Fransioli, Brian;Lee, Hyuk-Jae
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.269-270
    • /
    • 2012
  • Features which exhibit scale and rotation invariance, such as SIFT, are notorious for expensive computation time, and often overlooked for real-time tracking scenarios. This paper proposes a descriptorless matching algorithm based on motion vectors between consecutive frames to find the geometrically closest candidate to each tracked reference feature in the database. Descriptor-less matching forgoes expensive SIFT descriptor extraction without loss of matching accuracy and exhibits dramatic speed-up compared to traditional, naive matching based trackers. Descriptor-less SIFT tracking runs in real-time on an Intel dual core machine at an average of 24 frames per second.

  • PDF

A Study for a Effectiveness of Smoke Control Operation Mode for a Subway with Separate Platform (지하철 상대식 승강장의 제연운전모드 실효성에 관한 연구)

  • Rie Dong-Ho
    • Journal of the Korean Society of Safety
    • /
    • v.20 no.1 s.69
    • /
    • pp.24-29
    • /
    • 2005
  • This study aim to derive the operation method of a comprehensive ventilation system which is capable of providing passengers with safe exit paths from platforms in onboard The situations. The airflow distributions in subway platforms under 13 types of tunnel vent system for a double track stop condition was calculated and having analyzed diffusion behaviors of smoke and heat exhaust in such states by performing 13 kinds of different ventilation scenarios by using a 3-D Fire Dynamic Simulation (FDS) simulation model to clarify the safety evaluation for the heat and smoke exhaust on subway fire events.

Signaling and Control Procedures Using Generalized MPLS Protocol for IP over an Optical Network

  • Um, Tai-Won;Choi, Jun-Kyun;Kim, Young-Ae;Lee, Hyeong-Ho;Jung, Hae-Won;Jong, Sang-Gug
    • ETRI Journal
    • /
    • v.24 no.2
    • /
    • pp.69-81
    • /
    • 2002
  • This paper reviews the existing research activities on signaling and control procedures for IP over optical networks. We focus on the IP-centric signaling and control architecture based on the generalized multi-protocol label switching (GMPLS) protocol and analyze various scenarios and technical issues for deploying the IP over an optical network. We analyze the signaling and operations and administration and maintenance requirements for integrating an IP network and an optical network in order to cope with the high bandwidth and poor resource granularity of the optical network, including the optical cross-connect system. On the basis of network architecture and a reference configuration model, we investigate the GMPLS-based control architecture and interconnection model appropriate for controlling IP bandwidth and optical lambda resources. The signaling and control procedure based on GMPLS on optical user-network interface and network-network interface are comparatively investigated to provide the optical lightpath. We also study protection and restoration procedures to protect link failure when it applies to generalized MPLS signaling.

  • PDF

Study on relations between porosity and damage in fractured rock mass

  • Xue, Xinhua
    • Geomechanics and Engineering
    • /
    • v.9 no.1
    • /
    • pp.15-24
    • /
    • 2015
  • The porosity is often regarded as a linear function of fluid pressure in porous media and permeability is approximately looked as constants. However, for some scenarios such as unconsolidated sand beds, abnormal high pressured oil formation or large deformation of porous media for pore pressure dropped greatly, the change in porosity is not a linear function of fluid pressure in porous media, and permeability can't keep a constant yet. This paper mainly deals with the relationship between the damage variable and permeability properties of a deforming media, which can be considered as an exploratory attempt in this field.

Review on Performance Requirements, Design and Implementation of RF Transceiver for Mobile Communications

  • Lee, Il-Kyoo;Ryu, Seong-Ryeol;Oh, Seung-Hyeub;Hong, Heon-Jin
    • Information and Communications Magazine
    • /
    • v.24 no.3
    • /
    • pp.76-86
    • /
    • 2007
  • This paper describes the RF performance issues of UE RF Transceiver for W-CDMA system based on 3GPP specifications. the parameters of transmitter and receiver are derived from the viewpoint of RF performance. In order for UE to achieve high performance, the transceiver performance requirements such as ACIR, EVM, Peak Code Domain Error, spectrum emission mask, frequency error stability and TX power control dynamic range for transmitter and reference sensitivity level, blocking characteristics, noise figure, ACS, linearity, AGC dynamic range for receiver are considered. On the basis of the required parameters, the UE RF transceiver is designed and then implemented. The evaluation of RF performance is accomplished through practical test scenarios.

Industrial IoT Standardization Trend of the 5G Mobile Network (5G 모바일 네트워크의 Industrial IoT 표준기술 동향)

  • Kim, K.S.;Kang, Y.H.;Kim, C.K.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.13-24
    • /
    • 2021
  • Industrial networks has been developing various technologies from fieldbus technology to industrial Ethernet and time-sensitive networking. The industry expects that the 5G mobile network will solve the diverse and highly specific industrial site requirements. Accordingly, 3GPP has been developing standard functions to provide ultra-high reliability, ultra-high speed, ultra-connection, and ultra-low latency services, and 3GPP Rel-16 began developing ultra-low latency and ultra-high reliability communication functions for 5G mobile networks to support vertical industries. In this paper, we show the related standardization trends and requirements to apply industrial IoT service scenarios to 5G mobile networks, and in particular, we introduce 5G system features and extended 5G system architecture to provide time sensitive communication and time synchronization services.

Game Theoretic based Distributed Dynamic Power Allocation in Irregular Geometry Multicellular Network

  • Safdar, Hashim;Ullah, Rahat;Khalid, Zubair
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.199-205
    • /
    • 2022
  • The extensive growth in data rate demand by the smart gadgets and mobile broadband application services in wireless cellular networks. To achieve higher data rate demand which leads to aggressive frequency reuse to improve network capacity at the price of Inter Cell Interference (ICI). Fractional Frequency Reuse (FFR) has been recognized as an effective scheme to get a higher data rate and mitigate ICI for perfect geometry network scenarios. In, an irregular geometric multicellular network, ICI mitigation is a challenging issue. The purpose of this paper is to develop distributed dynamic power allocation scheme for FFR based on game theory to mitigate ICI. In the proposed scheme, each cell region in an irregular multicellular scenario adopts a self-less behavior instead of selfish behavior to improve the overall utility function. This proposed scheme improves the overall data rate and mitigates ICI.

Decision Support System for the Water Supply System in Fukuoka, Japan

    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2001.05a
    • /
    • pp.15-24
    • /
    • 2001
  • This study introduces an integrated decision support system (DSS) for the water supply system in Fukuoka City, Japan. The objective is to conceive a comprehensive tool that may aid decision-makers to derive the best water supply alternatives from a multi-reservoir system in order to minimize the long-term drought damages and threat of water shortage. The present DSS consists of graphical user interface (GUI), a database manager, and mathematical models for runoff analysis, water demand forecasting, and reservoir operation. The methodology applied explicitly integrates the drought risk assessment based on the concept of reliability, resiliency, and vulnerability, as constraints to derive the management operation. The application of the DSS to the existing water supply system in Fukuoka City was found to be an efficient tool to facilitate the examination of a sequence of water supply scenarios toward an improved performance of the actual water supply system during periods of drought.

  • PDF