5,735 research outputs found

    Tolling, Capacity Selection and Equilibrium Problems with Equilibrium Constraints

    Get PDF
    An Equilibrium problem with an equilibrium constraint is a mathematical construct that can be applied to private competition in highway networks. In this paper we consider the problem of finding a Nash Equilibrium regarding competition in toll pricing on a network utilising 2 alternative algorithms. In the first algorithm, we utilise a Gauss Siedel fixed point approach based on the cutting constraint algorithm for toll pricing. In the second algorithm, we extend an existing sequential linear complementarity approach for finding Nash equilibrium subject to Wardrop Equilibrium constraints. Finally we consider how the equilibrium may change between the Nash competitive equilibrium and a collusive equilibrium where the two players co-operate to form the equivalent of a monopoly operation

    Effectiveness of anonymised information sharing and use in health service, police, and local government partnership for preventing violence related injury: experimental study and time series analysis

    Get PDF
    Objective: To evaluate the effectiveness of anonymised information sharing to prevent injury related to violence. Design: Experimental study and time series analysis of a prototype community partnership between the health service, police, and local government partners designed to prevent violence. Setting: Cardiff, Wales, and 14 comparison cities designated "most similar" by the Home Office in England and Wales. Intervention After a 33 month development period, anonymised data relevant to violence prevention (precise violence location, time, days, and weapons) from patients attending emergency departments in Cardiff and reporting injury from violence were shared over 51 months with police and local authority partners and used to target resources for violence prevention. Main outcome measures: Health service records of hospital admissions related to violence and police records of woundings and less serious assaults in Cardiff and other cities after adjustment for potential confounders. Results: Information sharing and use were associated with a substantial and significant reduction in hospital admissions related to violence. In the intervention city (Cardiff) rates fell from seven to five a month per 100 000 population compared with an increase from five to eight in comparison cities (adjusted incidence rate ratio 0.58, 95% confidence interval 0.49 to 0.69). Average rate of woundings recorded by the police changed from 54 to 82 a month per 100 000 population in Cardiff compared with an increase from 54 to 114 in comparison cities (adjusted incidence rate ratio 0.68, 0.61 to 0.75). There was a significant increase in less serious assaults recorded by the police, from 15 to 20 a month per 100 000 population in Cardiff compared with a decrease from 42 to 33 in comparison cities (adjusted incidence rate ratio 1.38, 1.13 to 1.70). Conclusion: An information sharing partnership between health services, police, and local government in Cardiff, Wales, altered policing and other strategies to prevent violence based on information collected from patients treated in emergency departments after injury sustained in violence. This intervention led to a significant reduction in violent injury and was associated with an increase in police recording of minor assaults in Cardiff compared with similar cities in England and Wales where this intervention was not implemented

    A Distributed Security Architecture for Large Scale Systems

    Get PDF
    This thesis describes the research leading from the conception, through development, to the practical implementation of a comprehensive security architecture for use within, and as a value-added enhancement to, the ISO Open Systems Interconnection (OSI) model. The Comprehensive Security System (CSS) is arranged basically as an Application Layer service but can allow any of the ISO recommended security facilities to be provided at any layer of the model. It is suitable as an 'add-on' service to existing arrangements or can be fully integrated into new applications. For large scale, distributed processing operations, a network of security management centres (SMCs) is suggested, that can help to ensure that system misuse is minimised, and that flexible operation is provided in an efficient manner. The background to the OSI standards are covered in detail, followed by an introduction to security in open systems. A survey of existing techniques in formal analysis and verification is then presented. The architecture of the CSS is described in terms of a conceptual model using agents and protocols, followed by an extension of the CSS concept to a large scale network controlled by SMCs. A new approach to formal security analysis is described which is based on two main methodologies. Firstly, every function within the system is built from layers of provably secure sequences of finite state machines, using a recursive function to monitor and constrain the system to the desired state at all times. Secondly, the correctness of the protocols generated by the sequences to exchange security information and control data between agents in a distributed environment, is analysed in terms of a modified temporal Hoare logic. This is based on ideas concerning the validity of beliefs about the global state of a system as a result of actions performed by entities within the system, including the notion of timeliness. The two fundamental problems in number theory upon which the assumptions about the security of the finite state machine model rest are described, together with a comprehensive survey of the very latest progress in this area. Having assumed that the two problems will remain computationally intractable in the foreseeable future, the method is then applied to the formal analysis of some of the components of the Comprehensive Security System. A practical implementation of the CSS has been achieved as a demonstration system for a network of IBM Personal Computers connected via an Ethernet LAN, which fully meets the aims and objectives set out in Chapter 1. This implementation is described, and finally some comments are made on the possible future of research into security aspects of distributed systems.IBM (United Kingdom) Laboratories Hursley Park, Winchester, U

    A rank based social norms model of how people judge their levels of drunkenness whilst intoxicated

    Get PDF
    Background: A rank based social norms model predicts that drinkers’ judgements about their drinking will be based on the rank of their breath alcohol level amongst that of others in the immediate environment, rather than their actual breath alcohol level, with lower relative rank associated with greater feelings of safety. This study tested this hypothesis and examined how people judge their levels of drunkenness and the health consequences of their drinking whilst they are intoxicated in social drinking environments. Methods: Breath alcohol testing of 1,862 people (mean age = 26.96 years; 61.86 % male) in drinking environments. A subset (N = 400) also answered four questions asking about their perceptions of their drunkenness and the health consequences of their drinking (plus background measures). Results: Perceptions of drunkenness and the health consequences of drinking were regressed on: (a) breath alcohol level, (b) the rank of the breath alcohol level amongst that of others in the same environment, and (c) covariates. Only rank of breath alcohol level predicted perceptions: How drunk they felt (b 3.78, 95 % CI 1.69 5.87), how extreme they regarded their drinking that night (b 3.7, 95 % CI 1.3 6.20), how at risk their long-term health was due to their current level of drinking (b 4.1, 95 % CI 0.2 8.0) and how likely they felt they would experience liver cirrhosis (b 4.8. 95 % CI 0.7 8.8). People were more influenced by more sober others than by more drunk others. Conclusion: Whilst intoxicated and in drinking environments, people base judgements regarding their drinking on how their level of intoxication ranks relative to that of others of the same gender around them, not on their actual levels of intoxication. Thus, when in the company of others who are intoxicated, drinkers were found to be more likely to underestimate their own level of drinking, drunkenness and associated risks. The implications of these results, for example that increasing the numbers of sober people in night time environments could improve subjective assessments of drunkenness, are discussed

    Tolling, collusion and equilibrium problems with equilibrium constraints

    Get PDF
    An Equilibrium Problem with an Equilibrium Constraint (EPEC) is a mathematical construct that can be applied to private competition in highway networks. In this paper we consider the problem of finding a Nash Equilibrium in a situation of competition in toll pricing on a network utilising two alternative algorithms. In the first algorithm, we utilise a Gauss Seidel fixed point approach based on the cutting constraint algorithm for toll pricing. The second algorithm that we propose, a novel contribution of this paper, is the extension of an existing sequential linear complementarity programming approach for finding the competitive Nash equilibrium when there is a lower level equilibrium constraint. Finally we develop an intuitive approach to represent collusion between players and demonstrate that as the level of collusion goes from none to full collusion so the solution maps from the Nash to monopolistic solution. However we also show that there may be local solutions for the collusive monopoly which lie closer to the second best welfare toll solution than does the competitive Nash equilibrium

    Impacts of fuel consumption taxes on mobility patterns and CO2 emissions using a system dynamic approach

    Full text link
    Current transport behaviour leads to increasing congestion of the infrastructure, growing dependence on fossil fuels, increasing energy demand, and growing CO2 emissions. Policies based principally on increasing system speed and in particular car speeds will lead to greater urban sprawl with increases in average trip lengths. Time saved by speed increases are traded for more distance. This trend is not sustainable in the longer term. Transport policies based just on time savings for citizens may not be the basis for our city planning strategy. The same happens with transport cost. With underpriced transport, the market undervalues land use location, which again may lead city to sprawl and could induce greater trip lengths. In this study, the efficiency of a fuel consumption or CO2 tax policy is analysed as a policy to internalise externalities of transport in a fair travel cost. Based on system dynamics theory, an integrated land use and transport model is proposed in order to assess the effects and impacts of such policy in the short, medium and long term. Different scenarios related to clean vehicles are incorporated. This model is applied to three cities Madrid, Vienna and Leeds and compares their results

    Variability and polarization in the inner jet of 3C395

    Get PDF
    We present new results on the parsec-scale jet of the quasar 3C395, derived from VLBI polarization sensitive observations made in 1995.91 and 1998.50 at 8.4, 15.4 and 22.2 GHz. The observations show a complex one-sided jet extending up to 20 mas, with a projected magnetic field essentially aligned with the radio jet. The emission is strongly dominated, in total intensity and polarization, by the core and the inner jet region (of ~3 mas length). We have studied the details of this dominant region finding clear structural variations during this ~2.5 years period, in contrast with the apparent quietness of the jet structure inferred from lower resolution VLBI observations. We observe the ejection of a new component from the core and variations in the degree of polarization of the inner jet components. We estimate a high Faraday Rotation Measure close to the core, with a strong decrease along the inner jet.Comment: 7 pages, 4 figures, A&A in pres
    • …
    corecore