2,972 research outputs found

    Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband Services

    Full text link
    We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs

    Long-term outcomes after revascularization for advanced popliteal artery entrapment syndrome with segmental arterial occlusion

    Get PDF
    ObjectivesThere are few long-term follow-up studies about the result of revascularization surgery for the treatment of popliteal artery entrapment syndrome (PAES). We performed this retrospective study to analyze the long-term result of revascularization surgery in patients with advanced PAES during the last 16 years.MethodsTwenty-two limbs in 18 consecutive patients with PAES were treated surgically at Seoul National University Hospital between January 1994 and December 2009. The preoperative diagnosis of PAES was made by duplex ultrasonography, three-dimensional computed tomography angiography, magnetic resonance imaging, or conventional angiography. The method of surgical approach was determined by the extent of arterial occlusion in preoperative images.ResultsThe mean age was 31 years old and the majority of patients were men (94%). The chief complaints were claudication in 18 limbs, ischemic rest pain in three limbs, and toe necrosis in one limb. All 22 limbs underwent revascularization for advanced PAES with segmental arterial occlusion. Fourteen limbs underwent musculotendinous section and popliteo-popliteal interposition graft (13 posterior approaches, one medial approach), five femoropopliteal (below-knee) bypasses, one femoro-posterior tibial bypass, and two popliteo-posterior tibial bypasses. All revascularization surgeries were performed with reversed saphenous veins. The overall primary graft patency rates at 1, 3, and 5 years were 80.9%, 74.6%, and 74.6%, respectively. Comparing 5-year graft patency according to the extent of arterial occlusion, patients with occlusion confined to the popliteal artery (n = 14) showed a better patency rate than patients with occlusion extended beyond the popliteal artery (n = 8) with no statistical significance (83.6% vs 53.6%; P = .053). Comparing 5-year graft patency according to the inflow artery, superficial femoral artery inflow (n = 6) showed a worse patency rate than popliteal artery inflow (n = 16) (30.0% vs 85.9%; P = .015).ConclusionIn advanced popliteal entrapment syndrome, longer bypass with superficial femoral artery inflow showed poor long-term graft patency rate. The graft patency rate was excellent in patients whose arterial occlusion was confined to the popliteal artery and treated by popliteal interposition graft with reversed saphenous vein. With these data, we suggest that longer bypass extending beyond the popliteal artery might only be indicated in patients with critical limb ischemia when the extent of disease does not allow short interposition graft

    Impact angle control guidance synthesis for evasive maneuver against intercept missile

    Get PDF
    This paper proposes a synthesis of new guidance law to generate an evasive maneuver against enemy’s missile interception while considering its impact angle, acceleration, and field-of-view constraints. The first component of the synthesis is a new function of repulsive Artificial Potential Field to generate the evasive maneuver as a real-time dynamic obstacle avoidance. The terminal impact angle and terminal acceleration constraints compliance are based on Time-to-Go Polynomial Guidance as the second component. The last component is the Logarithmic Barrier Function to satisfy the field-of-view limitation constraint by compensating the excessive total acceleration command. These three components are synthesized into a new guidance law, which involves three design parameter gains. Parameter study and numerical simulations are delivered to demonstrate the performance of the proposed repulsive function and guidance law. Finally, the guidance law simulations effectively achieve the zero terminal miss distance, while satisfying an evasive maneuver against intercept missile, considering impact angle, acceleration, and field-of-view limitation constraints simultaneously

    Return and Volatility Transmission Between Oil Prices and Emerging Asian Markets

    Get PDF
    We investigated return and volatility transmission between oil futures prices and ten Asian emerging indices using a VAR-bivariate GARCH model. We also analyzed the optimal weights and hedge ratios for optimizing portfolios to minimize the exposure to risk associated with oil futures price changes. We found no significant influence of oil futures price returns on Asian stock returns. However, strong volatility spillover was observed from oil futures price shocks and volatility to counterpart volatilities. In addition, optimal weights and hedge ratios suggested that incorporating the oil asset in a well-diversified portfolio effectively hedged the risks associated with oil price volatility

    Impact time control based on time-to-go prediction for sea-skimming antiship missiles

    Get PDF
    This paper proposes a novel approach for guidance law design to satisfy the impact-time constraints for a certain class of homing missiles. The proposed guidance law provides proper lateral acceleration commands that make the impact time error converge to zero by the time of impact. This scheme can be applied to any existing guidance law for which a formula of predicted time to go is available. Convergence of time-to-go errors is supported by Lyapunov stability. The optimal guidance law and the impact angle control guidance law are extended by the proposed method for impact-time-control guidance and impact-time-and-angle-control guidance, respectively. The performance of the extended guidance laws is demonstrated by numerical simulation

    User-centric resource allocation with two-dimensional reverse pricing in mobile communication services

    Get PDF

    Cost-sensitive spam detection using parameters optimization and feature selection

    Get PDF
    E-mail spam is no more garbage but risk since it recently includes virus attachments and spyware agents which make the recipients' system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning techniques have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should counteract with it. To cope with this, parameters optimization and feature selection have been used to reduce processing overheads while guaranteeing high detection rates. However, previous approaches have not taken into account feature variable importance and optimal number of features. Moreover, to the best of our knowledge, there is no approach which uses both parameters optimization and feature selection together for spam detection. In this paper, we propose a spam detection model enabling both parameters optimization and optimal feature selection; we optimize two parameters of detection models using Random Forests (RF) so as to maximize the detection rates. We provide the variable importance of each feature so that it is easy to eliminate the irrelevant features. Furthermore, we decide an optimal number of selected features using two methods; (i) only one parameters optimization during overall feature selection and (ii) parameters optimization in every feature elimination phase. Finally, we evaluate our spam detection model with cost-sensitive measures to avoid misclassification of legitimate messages, since the cost of classifying a legitimate message as a spam far outweighs the cost of classifying a spam as a legitimate message. We perform experiments on Spambase dataset and show the feasibility of our approaches
    corecore