• Title/Summary/Keyword: network theory

Search Result 1,839, Processing Time 0.029 seconds

Quantification of the Value of Freeway VMS Traffic Information (고속도로 VMS 교통정보의 가치산정에 관한 연구)

  • Yoo, Tae-Ho;Lee, Ki-Young;Lee, Sang-Soo;Oh, Young-Tae
    • International Journal of Highway Engineering
    • /
    • v.9 no.3
    • /
    • pp.63-74
    • /
    • 2007
  • Traffic information provision plays an important role in increasing the efficiency of network operation and in providing convenience for roadway users. As a typical device for disseminating real-time traffic information for collective general public, VMS is a prevalent device nowadays and it is being expanded. However, the actual monetary value of traffic information is not quantified up to now. The previous studies regarding VMS traffic information are mainly focused on the behavioral aspects of road users such as departure time and route choices under traffic information provision conditions. This paper tried to estimate the monetary value of VMS traffic information using discrete choice theory and logit model through the stated preference study(SP). The methodological framework adopted in this paper can also be used in evaluating the monetary value of other traffic information providers including PDA, CNS, and mobile phone.

  • PDF

Introduction to the Indian Buffet Process: Theory and Applications (인도부페 프로세스의 소개: 이론과 응용)

  • Lee, Youngseon;Lee, Kyoungjae;Lee, Kwangmin;Lee, Jaeyong;Seo, Jinwook
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.2
    • /
    • pp.251-267
    • /
    • 2015
  • The Indian Buffet Process is a stochastic process on equivalence classes of binary matrices having finite rows and infinite columns. The Indian Buffet Process can be imposed as the prior distribution on the binary matrix in an infinite feature model. We describe the derivation of the Indian buffet process from a finite feature model, and briefly explain the relation between the Indian buffet process and the beta process. Using a Gaussian linear model, we describe three algorithms: Gibbs sampling algorithm, Stick-breaking algorithm and variational method, with application for finding features in image data. We also illustrate the use of the Indian Buffet Process in various type of analysis such as dyadic data analysis, network data analysis and independent component analysis.

Human Error Probability Assessment During Maintenance Activities of Marine Systems

  • Islam, Rabiul;Khan, Faisal;Abbassi, Rouzbeh;Garaniya, Vikram
    • Safety and Health at Work
    • /
    • v.9 no.1
    • /
    • pp.42-52
    • /
    • 2018
  • Background: Maintenance operations on-board ships are highly demanding. Maintenance operations are intensive activities requiring high man-machine interactions in challenging and evolving conditions. The evolving conditions are weather conditions, workplace temperature, ship motion, noise and vibration, and workload and stress. For example, extreme weather condition affects seafarers' performance, increasing the chances of error, and, consequently, can cause injuries or fatalities to personnel. An effective human error probability model is required to better manage maintenance on-board ships. The developed model would assist in developing and maintaining effective risk management protocols. Thus, the objective of this study is to develop a human error probability model considering various internal and external factors affecting seafarers' performance. Methods: The human error probability model is developed using probability theory applied to Bayesian network. The model is tested using the data received through the developed questionnaire survey of >200 experienced seafarers with >5 years of experience. The model developed in this study is used to find out the reliability of human performance on particular maintenance activities. Results: The developed methodology is tested on the maintenance of marine engine's cooling water pump for engine department and anchor windlass for deck department. In the considered case studies, human error probabilities are estimated in various scenarios and the results are compared between the scenarios and the different seafarer categories. The results of the case studies for both departments are also compared. Conclusion: The developed model is effective in assessing human error probabilities. These probabilities would get dynamically updated as and when new information is available on changes in either internal (i.e., training, experience, and fatigue) or external (i.e., environmental and operational conditions such as weather conditions, workplace temperature, ship motion, noise and vibration, and workload and stress) factors.

Development of Composite Deprivation Index for Korea: The Correlation with Standardized Mortality Ratio (표준화사망비와 지역결핍지수의 상관관계: 지역사회 통합결핍지수 개발)

  • Shin, Ho-Sung;Lee, Sue-Hyung;Chu, Jang-Min
    • Journal of Preventive Medicine and Public Health
    • /
    • v.42 no.6
    • /
    • pp.392-402
    • /
    • 2009
  • Objectives : The aims of this paper were to develop the composite deprivation index (CDI) for the sub-district (Eup-Myen-Dong) levels based on the theory of social exclusion and to explore the relationship between the CDI and the standardized mortality ratio (SMR). Methods : The paper calculated the age adjusted SMR and we included five dimensions of social exclusion for CDI; unemployment, poverty, housing, labor and social network. The proxy variables of the five dimensions were the proportion of unemployed males, the percent of recipients receiving National Basic Livelihood Security Act benefits, the proportion of households under the minimum housing standard, the proportion of people with a low social class and the proportion of single-parent household. All the variables were standardized using geometric transformation and then we summed up them for a single index. The paper utilized the 2004-2006 National Death Registry data, the 2003-2006 national residents' registration data, the 2005 Population Census data and the 2005-2006 means-tested benefit recipients' data. Results : The figures were 115.6, 105.8 and 105.1 for the CDI of metropolitan areas (big cities), middle size cities and rural areas, respectively. The distributional variation of the CDI was the highest in metropolitan areas (8.9 - 353.7) and the lowest was in the rural areas (26.8 - 209.7). The extent and relative differences of deprivation increased with urbanization. Compared to the Townsend and Carstairs index, the CDI better represented the characteristics of rural deprivation. The correlation with the SMR was statistically significant and the direction of the CDI effects on the SMR was in accordance with that of the previous studies. Conclusions : The study findings indicated mortality inequalities due to the difference in the CDI. Despite the attempt to improve deprivation measures, further research is warranted for the consensus development of a deprivation index.

Coalition based Optimization of Resource Allocation with Malicious User Detection in Cognitive Radio Networks

  • Huang, Xiaoge;Chen, Liping;Chen, Qianbin;Shen, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4661-4680
    • /
    • 2016
  • Cognitive radio (CR) technology is an effective solution to the spectrum scarcity issue. Collaborative spectrum sensing is known as a promising technique to improve the performance of spectrum sensing in cognitive radio networks (CRNs). However, collaborative spectrum sensing is vulnerable to spectrum data falsification (SSDF) attack, where malicious users (MUs) may send false sensing data to mislead other secondary users (SUs) to make an incorrect decision about primary user (PUs) activity, which is one of the key adversaries to the performance of CRNs. In this paper, we propose a coalition based malicious users detection (CMD) algorithm to detect the malicious user in CRNs. The proposed CMD algorithm can efficiently detect MUs base on the Geary'C theory and be modeled as a coalition formation game. Specifically, SSDF attack is one of the key issues to affect the resource allocation process. Focusing on the security issues, in this paper, we analyze the power allocation problem with MUs, and propose MUs detection based power allocation (MPA) algorithm. The MPA algorithm is divided into two steps: the MUs detection step and the optimal power allocation step. Firstly, in the MUs detection step, by the CMD algorithm we can obtain the MUs detection probability and the energy consumption of MUs detection. Secondly, in the optimal power allocation step, we use the Lagrange dual decomposition method to obtain the optimal transmission power of each SU and achieve the maximum utility of the whole CRN. Numerical simulation results show that the proposed CMD and MPA scheme can achieve a considerable performance improvement in MUs detection and power allocation.

Distributed Test Method using Logical Clock (Logical Clock을 이용한 분산 시험)

  • Choi, Young-Joon;Kim, Myeong-Chul;Seol, Soon-Uk
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.9
    • /
    • pp.469-478
    • /
    • 2001
  • It is difficult to test a distributed system because of the task of controlling concurrent events,. Existing works do not propose the test sequence generation algorithm in a formal way and the amount of message is large due to synchronization. In this paper, we propose a formal test sequence generation algorithm using logical clock to control concurrent events. It can solve the control-observation problem and makes the test results reproducible. It also provides a generic solution such that the algorithm can be used for any possible communication paradigm. In distributed test, the number of channels among the testers increases non-linearly with the number of distributed objects. We propose a new remote test architecture for solving this problem. SDL Tool is used to verify the correctness of the proposed algorithm and it is applied to the message exchange for the establishment of Q.2971 point-to-multipoint call/connection as a case study.

  • PDF

An Implementation of Fault Tolerant Software Distributed Shared Memory with Remote Logging (원격 로깅 기법을 이용하는 고장 허용 소프트웨어 분산공유메모리 시스템의 구현)

  • 박소연;김영재;맹승렬
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.5_6
    • /
    • pp.328-334
    • /
    • 2004
  • Recently, Software DSMs continue to improve its performance and scalability As Software DSMs become attractive on larger clusters, the focus of attention is likely to move toward improving the reliability of a system. A popular approach to tolerate failures is message logging with checkpointing, and so many log-based rollback recovery schemes have been proposed. In this work, we propose a remote logging scheme which uses the volatile memory of a remote node assigned to each node. As our remote logging does not incur frequent disk accesses during failure-free execution, its logging overhead is not significant especially over high-speed communication network. The remote logging tolerates multiple failures if the backup nodes of failed nodes are alive. It makes the reliability of DSMs grow much higher. We have designed and implemented the FT-KDSM(Fault Tolerant KAIST DSM) with the remote logging and showed the logging overhead and the recovery time.

Politics of Candlelight Protest and Democratic Theories in Korea (촛불의 정치와 민주주의 이론: 현실과 이론, 사실과 가치의 긴장과 균형)

  • Jaung, Hoon
    • Korean Journal of Legislative Studies
    • /
    • v.23 no.2
    • /
    • pp.37-66
    • /
    • 2017
  • Massive civic protests and consequent presidential impeachment requires a serious revisiting to democratic theories of Korean democracy. This paper explores the strengths and limitations of macro and micro approaches. Changes in democratic realities was manifested on three fronts. First, the rise of new political subject, that is, participants to massive protest. Second, changing nexus between representative institutions and civic protests. Third, parliamentarization of presidential democracy. Specifically macro approach has changed its negative assessment of democracy into positive evaluation. Macro theory has to revisit it's notion of 'minjung' to cope with the rise of new subject. Also macro approach has to struggle with the declining role of civic organizations and political activists. Micro approach has to deal with new mode of networking among citizens and to unravel the evolving relation between democratic institutions and civic protests. In sum, theories need to expand the analytic scope, to revitalize analytic tools and to rebalance value judgment and analytical efforts.

H.263-Based Scalable Video Codec (H.263을 기반으로 한 확장 가능한 비디오 코덱)

  • 노경택
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.29-32
    • /
    • 2000
  • Layered video coding schemes allow the video information to be transmitted in multiple video bitstreams to achieve scalability. they are attractive in theory for two reasons. First, they naturally allow for heterogeneity in networks and receivers in terms of client processing capability and network bandwidth. Second, they correspond to optimal utilization of available bandwidth when several video qualify levels are desired. In this paper we propose a scalable video codec architectures with motion estimation, which is suitable for real-time audio and video communication over packet networks. The coding algorithm is compatible with ITU-T recommendation H.263+ and includes various techniques to reduce complexity. Fast motion estimation is Performed at the H.263-compatible base layer and used at higher layers, and perceptual macroblock skipping is performed at all layers before motion estimation. Error propagation from packet loss is avoided by Periodically rebuilding a valid Predictor in Intra mode at each layer.

  • PDF

Identification of Profane Words in Cyberbullying Incidents within Social Networks

  • Ali, Wan Noor Hamiza Wan;Mohd, Masnizah;Fauzi, Fariza
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.1
    • /
    • pp.24-34
    • /
    • 2021
  • The popularity of social networking sites (SNS) has facilitated communication between users. The usage of SNS helps users in their daily life in various ways such as sharing of opinions, keeping in touch with old friends, making new friends, and getting information. However, some users misuse SNS to belittle or hurt others using profanities, which is typical in cyberbullying incidents. Thus, in this study, we aim to identify profane words from the ASKfm corpus to analyze the profane word distribution across four different roles involved in cyberbullying based on lexicon dictionary. These four roles are: harasser, victim, bystander that assists the bully, and bystander that defends the victim. Evaluation in this study focused on occurrences of the profane word for each role from the corpus. The top 10 common words used in the corpus are also identified and represented in a graph. Results from the analysis show that these four roles used profane words in their conversation with different weightage and distribution, even though the profane words used are mostly similar. The harasser is the first ranked that used profane words in the conversation compared to other roles. The results can be further explored and considered as a potential feature in a cyberbullying detection model using a machine learning approach. Results in this work will contribute to formulate the suitable representation. It is also useful in modeling a cyberbullying detection model based on the identification of profane word distribution across different cyberbullying roles in social networks for future works.