• Title/Summary/Keyword: WeWhere

Search Result 14,362, Processing Time 0.041 seconds

Spiral Structure and Mass Inflows in Barred-Spiral Galaxies

  • Kim, Yonghwi;Kim, Woong-Tae
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.38 no.2
    • /
    • pp.39.1-39.1
    • /
    • 2013
  • We use high-resolution hydrodynamic simulations to study nonlinear gas responses to imposed non-axisymmetric stellar potentials in barred-spiral galaxies. The gas is assumed to be infinitesimally thin, isothermal, and unmagnetized. We consider various spiral-arm models with differing strength and pattern speed, while fixing the bar parameters. We find that the extent and shapes of spiral shocks as well as the related mass drift depend rather sensitively on the pattern speed. In models where the arm pattern is rotating more slowly than the bar, the gaseous arms extend from the bar ends all the way to the outer boundary, with a pitch angle slightly smaller than that of the stellar counterpart. The arms drive mass inflows at a rate of ${\sim}0.5-2.5M{\odot}/yr$ to the bar region to which the shock dissipation, external torque, and self-gravitational torque contribute about 50%, 40%, and 10%, respectively. About 85% of the inflowing mass is added to bar substructures such as an inner ring, dust lanes, and a nuclear ring. while the remaining 15% encircles the bar region. On the other hand, models where the arms corotate with the bar exhibit mass outflows, rather than inflows, over most of the arm region. In these models, spiral shocks are much more tightly wound than the stellar arms and cease to exist in the region where $M{\bot}/sinp*{\geq}25-40$, where $M{\bot}$ denotes the Mach number of a rotating gas perpendicular to the arms with pitch angle p*. We demonstrate that the distributions of line-of-sight velocities and densities can be a useful diagnostic tool to distinguish if the arms and bar corotate or not.

  • PDF

Design of Human Works Model for Gantry Crane System

  • Kim, Hwan-Seong;Tran, Hoang-Son;Kim, Seoung-Ho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.08a
    • /
    • pp.102-112
    • /
    • 2004
  • In this paper, we propose a human model for analysis for human work pattern or human fault, where a gantry crane simulator is used to survey the property of human operation. From the input and output of gantry crane response, we make a human operation model by using conventional ARX identification method. For identify the human model, we assume the eight inputs and two outputs. By using the input/output data, we estimate the parameters of ARX of the human system model. For verify the proposed method, we compared the real data with the modeled data, where three kinds of work trajectory path are used.

  • PDF

Packet Scheduling in Interactive Satellite Return Channels for Mobile Multimedia Services Using Hybrid CDMA/TDMA

  • Lee Ki-Dong;Kim Ho-Kyom;Lee Ho-Jin
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.744-748
    • /
    • 2003
  • Developing an interactive satellite multi­media system, such as a digital video broadcasting (DVB) return channel via satellite (RCS) system, is gaining popularity over the world To accommodate the increasing traffic demand we are motivated to investigate an alternative for improving return channel utilization We develop an efficient method for optimal packet scheduling in an interactive satellite multimedia system using hybrid CDMA/TDMA channels. We formulate the timeslot-code assignment problem as a binary integer programming (BIP) problem, where the throughput maximization is the objective, and decompose this BIP problem into two sub-problems for the purpose of solution efficiency. With this decomposition, we promote the computational efficiency in finding the optimal solution of the original BIP problem Since 2001, ETRI has been involved in a development project where we have successfully completed an initial system integration test on broadband mobile Internet access via Ku-band channels using the proposed resource allocation algorithm.

  • PDF

Design of Human Works Model for Gantry Crane System

  • Kim Hwan Seong;Son Tran Ngoc Hoang;Kim Seong Ho
    • Journal of Navigation and Port Research
    • /
    • v.29 no.2
    • /
    • pp.135-140
    • /
    • 2005
  • In this paper, we propose a human model for analysing the human work pattern or human fault, where a gantry crane simulator is used to survey the property cf human operation From the input and output cf gantry crane response, we make a human operation model by using conventional ARX identification method To identify the human model, we assume the eight inputs and two outputs. By using the achieved input/output data, we estimate the parameters of ARX for the human work model. To verify the proposed method, we compared the real data with the modeled data, where three kinds of work trajectory path are used.

Maximum Likelihood Estimation of Multinomial Parameters with Known or Unknown Crossing Point

  • Lee, Ju-Young;Oh, Myongsik
    • Communications for Statistical Applications and Methods
    • /
    • v.6 no.3
    • /
    • pp.947-956
    • /
    • 1999
  • We define a crossing point $x_0$ such that f(x)$\geq$g(x) for x$\leq$$x_0$ and f(x)$\leq$g(x) for x>$x_0$ where f and g are probability density functions. We may encounter suchy situation when we compare two histograms from two independent observations. For example two contingency tables where initially admitted students and actually enrolled students are classified according to their high school ranking may show such situation, In this paper we consider maximum likelihood estimation of cell probabilities when a crossing point exists, We first assume a known crossing point and find an estimator. The estimation procedure for the case of unknown crossing point is just a straightforward extension. A real data is analyzed for an illustrative purpose.

  • PDF

Two Types of Concessive Conditionals in English and Their Implications to the Semantics of 'even' (영어의 두 가지 양보조건문과 even의 의미에 대한 함의)

  • Lim, Dongsik
    • Language and Information
    • /
    • v.18 no.2
    • /
    • pp.123-140
    • /
    • 2014
  • The aim of this paper is twofold: to identify two types of even if concessive conditionals, standing-ifs and introduced-ifs (Bennett 1982) in terms of whether the truth of the consequent is 'entailed' (the consequent-entailment problem in terms of Lycan 2001); and to analyze these two types of concessive conditionals in a compositional way. Here we argue that, following Guerzoni and Lim (2007), even if conditionals can be analyzed as the cases where even gets its focus in conditionals. We also argue that the consequent-entailment problem can be accounted for in a compositional way if we identify the focus as well as the scope of even in conditionals correctly. We further argue that the analysis presented in this paper supports the scope theory of even, among two theories of even previously proposed in various works. We also consider the possibility where concessive conditionals without even can be analyzed as an extension of the analysis proposed in this paper.

  • PDF

ON REGULAR NEAR-RINGS WITH (m,n)-POTENT CONDITIONS

  • Cho, Yong-Uk
    • East Asian mathematical journal
    • /
    • v.25 no.4
    • /
    • pp.441-447
    • /
    • 2009
  • Jat and Choudhari defined a near-ring R with left bipotent or right bipotent condition in 1979. Also, we can dene a near-ring R as subcommutative if aR = Ra for all a in R. From these above two concepts it is natural to investigate the near-ring R with the properties aR = $Ra^2$ (resp. $a^2R$ = Ra) for each a in R. We will say that such is a near-ring with (1,2)-potent condition (resp. a near-ring with (2,1)-potent condition). Thus, we can extend a general concept of a near-ring R with (m,n)-potent condition, that is, $a^mR\;=\;Ra^n$ for each a in R, where m, n are positive integers. We will derive properties of near-ring with (1,n) and (n,1)-potent conditions where n is a positive integer, any homomorphic image of (m,n)-potent near-ring is also (m,n)-potent, and we will obtain some characterization of regular near-rings with (m,n)-potent conditions.

Covid-19 disaster text notificatioin service using location-based (위치기반을 이용한 코로나 재난 문자 알림 서비스)

  • Kim, Ga-eul;Moon, Seon-yun;Lee, Tae-heon;Park, Min-sook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.395-396
    • /
    • 2021
  • We have changed a lot in our lives because of a disease called Covid-19.One of the biggest changes is to check the "disaster notification character" service spent in the country every time it is sent in real time. By the way, we cannot accept the characters of other regional disasters other than the area where we live. After visiting other areas, when we returned to the area where we relocated, we experienced difficulty in confirming the flow lines because we could not receive the characters of the flow lines of the corona confirmed persons in the visited areas separately. And if you use the broadcast-type broadcast service, you will not receive unnecessary copper wire information, and you will be able to obtain the characters of the disaster only where we visited. We try to provide app services to provide the public with more accurate and reliable information.

  • PDF

Uncertainty for Privacy and 2-Dimensional Range Query Distortion

  • Sioutas, Spyros;Magkos, Emmanouil;Karydis, Ioannis;Verykios, Vassilios S.
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.3
    • /
    • pp.210-222
    • /
    • 2011
  • In this work, we study the problem of privacy-preservation data publishing in moving objects databases. In particular, the trajectory of a mobile user in a plane is no longer a polyline in a two-dimensional space, instead it is a two-dimensional surface of fixed width $2A_{min}$, where $A_{min}$ defines the semi-diameter of the minimum spatial circular extent that must replace the real location of the mobile user on the XY-plane, in the anonymized (kNN) request. The desired anonymity is not achieved and the entire system becomes vulnerable to attackers, since a malicious attacker can observe that during the time, many of the neighbors' ids change, except for a small number of users. Thus, we reinforce the privacy model by clustering the mobile users according to their motion patterns in (u, ${\theta}$) plane, where u and ${\theta}$ define the velocity measure and the motion direction (angle) respectively. In this case, the anonymized (kNN) request looks up neighbors, who belong to the same cluster with the mobile requester in (u, ${\theta}$) space: Thus, we know that the trajectory of the k-anonymous mobile user is within this surface, but we do not know exactly where. We transform the surface's boundary poly-lines to dual points and we focus on the information distortion introduced by this space translation. We develop a set of efficient spatiotemporal access methods and we experimentally measure the impact of information distortion by comparing the performance results of the same spatiotemporal range queries executed on the original database and on the anonymized one.

Multiple Group Testing Procedures for Analysis of High-Dimensional Genomic Data

  • Ko, Hyoseok;Kim, Kipoong;Sun, Hokeun
    • Genomics & Informatics
    • /
    • v.14 no.4
    • /
    • pp.187-195
    • /
    • 2016
  • In genetic association studies with high-dimensional genomic data, multiple group testing procedures are often required in order to identify disease/trait-related genes or genetic regions, where multiple genetic sites or variants are located within the same gene or genetic region. However, statistical testing procedures based on an individual test suffer from multiple testing issues such as the control of family-wise error rate and dependent tests. Moreover, detecting only a few of genes associated with a phenotype outcome among tens of thousands of genes is of main interest in genetic association studies. In this reason regularization procedures, where a phenotype outcome regresses on all genomic markers and then regression coefficients are estimated based on a penalized likelihood, have been considered as a good alternative approach to analysis of high-dimensional genomic data. But, selection performance of regularization procedures has been rarely compared with that of statistical group testing procedures. In this article, we performed extensive simulation studies where commonly used group testing procedures such as principal component analysis, Hotelling's $T^2$ test, and permutation test are compared with group lasso (least absolute selection and shrinkage operator) in terms of true positive selection. Also, we applied all methods considered in simulation studies to identify genes associated with ovarian cancer from over 20,000 genetic sites generated from Illumina Infinium HumanMethylation27K Beadchip. We found a big discrepancy of selected genes between multiple group testing procedures and group lasso.