• Title/Summary/Keyword: Cost mitigation

Search Result 192, Processing Time 0.033 seconds

NLOS Mitigation for TOA Location Based on Pattern Matching Algorithm

  • Hur, Soojung;Akbarov, Dilshod;Park, Yongwan
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.2
    • /
    • pp.63-68
    • /
    • 2009
  • The location of mobile terminals in cellular networks is an important problem in the field of information technology with applications in resource allocation, location sensitive browsing, and emergency communications. Finding location estimation techniques that are robust to non-line of light (NLOS) propagation is a key problem in this area. Time of arrival (TOA) and pattern matching (PM) measurements can be made simultaneously by CDMA cellular networks at low cost. The different sources of errors for each measurement type cause TOA and PM measurements to contain independent information about mobile station (MS) locations. This paper combines the information of PM and TOA measurements to calculate a superior location estimate. The proposed location estimator is robust, provides lower error than the estimators based on the individual measurements, and has low implementation costs.

  • PDF

A study on the Direction of Start-up SME's Social Insurance Costs based on the Study Abroad (해외 현황 고찰을 통한 우리나라 창업 중소기업 4대 보험 방향성에 관한 연구)

  • Kim, Jumi
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.3
    • /
    • pp.379-386
    • /
    • 2013
  • This study is about the suggestion of reduction method for social insurance cost of startup SMEs based on the study abroad. We suggest several methods (direct and indirect support, exemption, deferment or loan) based on the pros and cons, government's financial situation, the ease of implementation and effectiveness of mitigation methods, creating conditions for the implementation of social insurance mitigation.

One-Cycle Control Strategy with Active Damping for AC-DC Matrix Converter

  • Liu, Xiao;Zhang, Qingfan;Hou, Dianli
    • Journal of Power Electronics
    • /
    • v.14 no.4
    • /
    • pp.778-787
    • /
    • 2014
  • This study presents an input filter resonance mitigation method for an AC-DC matrix converter. This method combines the advantages of the one-cycle control strategy and the active damping technique. Unnecessary sensors are removed, and system cost is reduced by employing the grid-side input currents as feedback to damp out LC resonance. A model that includes the proposed method and the input filter is established with consideration of the delay caused by the actual controller. A zero-pole map is employed to analyze model stability and to investigate virtual resistor parameter design principles. Based on a double closed-loop control scheme, the one-cycle control strategy does not require any complex modulation index control. Thus, this strategy can be more easily implemented than traditional space vector-based methods. Experimental results demonstrate the veracity of theoretical analysis and the feasibility of the proposed approach.

Cost-Benefit Analysis for Determination of the Time to Implement In-line Inspection(ILI) on High Pressure Urban Gas Pipelines (도시가스 고압배관의 내부검사(ILI) 이행시기 결정을 위한 비용-편익 분석)

  • Ryou, Young-Don;Kim, Young-Seob;Lee, Su-Kyung
    • Journal of the Korean Institute of Gas
    • /
    • v.15 no.1
    • /
    • pp.15-21
    • /
    • 2011
  • Cost-benefit analysis (CBA) has been performed in order to decide whether the ILI (in-line inspection) suggested as risk mitigation measure (RMM) from quantitative risk assessment is reasonably practicable. As a result of CBA, we could find out the reasonable intervals of implementation of ILI. In order to assess the benefit, value of preventing a fatality (VPF), which measures value of human life, has been used. The adequate VPF figure of high pressure urban gas pipelines for CBA used in this paper is two billion won. As a result of 2 case studies, we found that the most reasonable intervals of ILI suggested as RMM were 13 years or 15 years.

Comparison of Optimization Techniques in Cost Design of Stormwater Drainage Systems (우수관망 시스템 설계에 있어서의 최적화기법의 비교)

  • Kim, Myoung-Su;Lee, Chang-Yong;Kim, Tae-Jin;Lee, Jung-Ho;Kim, Joong-Hoon
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.6 no.2 s.21
    • /
    • pp.51-60
    • /
    • 2006
  • The objective of this research is to develop a least cost system design method for branched storm sewer systems while satisfying all the design constraints using heuristic techniques such as genetic algorithm and harmony search. Two sewer system models have been developed in this study. The SEWERGA and SEWERHS both determine the optimal discrete pipe installation depths as decision variables. Two models also determine the optimal diameter of sewer pipes using the discrete installation depths of the pipes while satisfying the discharge and velocity requirement constraints at each pipe. Two models are applied to the example that was originally solved by Mays and Yen (1975) using their dynamic programming(DP). The optimal costs obtained from SEWERGA and SEWERHS are about 4% lower than that of the DP approach.

Data Structure Modeling for the LCC Analysis of the Plate Girder Bridge Considering Corrosion (부식을 고려한 판형교의 LCC 분석 데이터구조 설계)

  • Kim, Dong-Hyun;Kim, Bong-Geun;Lee, Sang-Ho
    • 한국방재학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.497-500
    • /
    • 2007
  • Data structure was designed not only to estimate LCC but also to analyze time-variant reliability index of plate girder bridges. Information model for data structure was categorized into cost information, cost variable information, user cost information, and reliability analysis information according to the characteristic of data. EXPRESS language of STEP was adopted to describe the data structure for the electronic representation of LCC information. The suitability of the developed data structure was verified by estimating LCC and analyzing time-variant reliability index of a plate girder bridge considering corrosion on the basis of the constructed test database.

  • PDF

Application of Norwegian Method of Tunnelling (NMT) Principles to bypass landslides in mountainous terrain

  • Bhasin, Rajinder;Aarset, Arnstein
    • Magazine of korean Tunnelling and Underground Space Association
    • /
    • v.22 no.1
    • /
    • pp.26-35
    • /
    • 2020
  • Tunnelling to bypass major landslide areas is considered as a good and long-term environmentally friendly solution to reduce an existing hazard. In Norway, hundreds of kilometres of tunnels have been constructed in areas prone to landslides and snow avalanches. Although tunnelling is considered as an expensive mitigation strategy for bypassing landslides, analysis indicate that in some cases the cost of building a tunnel can be repaid by savings in driving costs (fuel) alone over a period of 5-10 years due to reduced driving distances. The other benefits of constructing tunnels in landslide areas include savings in time and increased safety. The Norwegian Method of Tunnelling (NMT) is considered safe, efficient and cost effective compared to other tunnelling techniques. Some aspects of NMT, which are considered safe and cost efficient, are presented. The application of updated rock support techniques, including reinforced ribs of shotctrete (RRS), which is a key component of the Norwegian Method of Tunnelling (NMT), is highlighted.

A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement

  • Park, Jun-Young;Huh, Eui-Nam
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.61-82
    • /
    • 2020
  • The security risk management used by some service providers is not appropriate for effective security enhancement. The reason is that the security risk management methods did not take into account the opinions of security experts, types of service, and security vulnerability-based risk assessment. Moreover, the security risk assessment method, which has a great influence on the risk treatment method in an information security risk assessment model, should be security risk assessment for fine-grained risk assessment, considering security vulnerability rather than security threat. Therefore, we proposed an improved information security risk management model and methods that consider vulnerability-based risk assessment and mitigation to enhance security controls considering limited security budget. Moreover, we can evaluate the security cost allocation strategies based on security vulnerability measurement that consider the security weight.

Probabilistic Risk Evaluation Method for Human-induced Disaster by Risk Curve Analysis (확률.통계적 리스크분석을 활용한 인적재난 위험평가 기법 제안)

  • Park, So-Soon
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.9 no.6
    • /
    • pp.57-68
    • /
    • 2009
  • Recently, damage scale of human-induced disaster is sharply increased but its occurrences and damages are so uncertain that it is hard to construct a resonable response & mitigation plan for infrastructures. Therefore, the needs for a advanced risk management technique based on a probabilistic and stochastic risk evaluation theory is increased. In this study, these evaluation methods were investigated and a advanced disaster risk evaluation method, which is based on the probabilistic or stochastic risk assessment theory and also is a quantitative evaluation technique, was suggested. With this method, the safety changes as the result of fire damage management for recent 40 years was analyzed. And the result was compared with that of Japan. Through the consilience of the traditional risk assessment method and this method, a stochastical estimation technique for the uncertainty of future disaster's damage could support a cost-effective information for a resonable decision making on disaster mitigation.

A Blockchain-enabled Multi-domain DDoS Collaborative Defense Mechanism

  • Huifen Feng;Ying Liu;Xincheng Yan;Na Zhou;Zhihong Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.916-937
    • /
    • 2023
  • Most of the existing Distributed Denial-of-Service mitigation schemes in Software-Defined Networking are only implemented in the network domain managed by a single controller. In fact, the zombies for attackers to launch large-scale DDoS attacks are actually not in the same network domain. Therefore, abnormal traffic of DDoS attack will affect multiple paths and network domains. A single defense method is difficult to deal with large-scale DDoS attacks. The cooperative defense of multiple domains becomes an important means to effectively solve cross-domain DDoS attacks. We propose an efficient multi-domain DDoS cooperative defense mechanism by integrating blockchain and SDN architecture. It includes attack traceability, inter-domain information sharing and attack mitigation. In order to reduce the length of the marking path and shorten the traceability time, we propose an AS-level packet traceability method called ASPM. We propose an information sharing method across multiple domains based on blockchain and smart contract. It effectively solves the impact of DDoS illegal traffic on multiple domains. According to the traceability results, we designed a DDoS attack mitigation method by replacing the ACL list with the IP address black/gray list. The experimental results show that our ASPM traceability method requires less data packets, high traceability precision and low overhead. And blockchain-based inter-domain sharing scheme has low cost, high scalability and high security. Attack mitigation measures can prevent illegal data flow in a timely and efficient manner.