• Title/Summary/Keyword: Chain Rules

Search Result 68, Processing Time 0.028 seconds

OPTIMAL CONSUMPTION/INVESTMENT AND LIFE INSURANCE WITH REGIME-SWITCHING FINANCIAL MARKET PARAMETERS

  • LEE, SANG IL;SHIM, GYOOCHEOL
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.19 no.4
    • /
    • pp.429-441
    • /
    • 2015
  • We study optimal consumption/investment and life insurance purchase rules for a wage earner with mortality risk under regime-switching financial market conditions, in a continuous time-horizon. We apply the Markov chain approximation method and suggest an efficient algorithm using parallel computing to solve the simultaneous Hamilton-Jaccobi-Bellman equations arising from the optimization problem. We provide numerical results under the utility functions of the constant relative risk aversion type, with which we illustrate the effects of regime switching on the optimal policies by comparing them with those in the absence of regime switching.

The Study on Job Satisfaction, Turnover Intention and Organization Commitment of Employees in Domestic Independent Hotel and International Chain Hotels (로컬호텔과 체인호텔 종사자의 직무만족, 이직의도, 조직몰입에 관한 연구)

  • Kim, Hae-Dong;Choi, Ha-Yeon;Kim, Hak-Seon
    • Culinary science and hospitality research
    • /
    • v.23 no.4
    • /
    • pp.216-224
    • /
    • 2017
  • The purpose of this study was to analyze the job satisfaction, turnover intention and organization commitment level of hotel employees using Herzberg's motivation hygiene theory. This study used SPSS 20.0 and AMOS 20.0 to conduct frequency analysis, reliability analysis, confirmatory factor analysis, path analysis and chi-square difference test. The results of study, first of all, Herzberg's, theory of hygiene are influenced by satisfaction of employees, organization commitment and turnover intention. It will be strongly needed to management of compensation, well-organized policy of human resources system. Lastly, in Hotel business, It showed differences having a strong influence on local employee and chain hotel employee according to method of Hotel management. In conclusion, in the hospitality industry, it is desirable to carry out on their own ways of vision and purpose each corporations rather than following regimental rules.

The Future of BlockChain Technology Leading Innovation in the Industrial Ecosystem (산업 생태계의 혁신을 선도할 블록체인 기술의 미래전망)

  • Kim, Jung-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.324-332
    • /
    • 2018
  • Blockchain technology has the potential to revolutionize trust models and business processes in a variety of industries. However, it is considered to be the initial stage of the system that pursues autonomy rather than efficiency, and it is necessary to monitor and inspect the distributed ledger technology from the price and introduction time as compared with the existing relational DB transaction technology. However, domestic and foreign private sectors have already been activated by applying block-chain technology in the national domain, and the block chain is devoid of doubt that it is an exaggerated technology, characterized by the invariance of the record, transparency, and autonomous execution of business rules. It has begun to be utilized in history, identity, certification and auditing in the financial industry as well as various industries. In this paper, we analyze the problems such as security weakness, insufficient regulatory environment, technical consensus and lack of common standard. In addition, the business sense and possibility of the block chain technology is expected to be the innovation of the industrial ecosystem by entering into the reality system from the concept through monitoring the actual introduction performance in the field of copyright, logistics, health care and environment.

HMM Based Part of Speech Tagging for Hadith Isnad

  • Abdelkarim Abdelkader
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.151-160
    • /
    • 2023
  • The Hadith is the second source of Islamic jurisprudence after Qur'an. Both sources are indispensable for muslims to practice Islam. All Ahadith are collected and are written. But most books of Hadith contain Ahadith that can be weak or rejected. So, quite a long time, scholars of Hadith have defined laws, rules and principles of Hadith to know the correct Hadith (Sahih) from the fair (Hassen) and weak (Dhaif). Unfortunately, the application of these rules, laws and principles is done manually by the specialists or students until now. The work presented in this paper is part of the automatic treatment of Hadith, and more specifically, it aims to automatically process the chain of narrators (Hadith Isnad) to find its different components and affect for each component its own tag using a statistical method: the Hidden Markov Models (HMM). This method is a power abstraction for times series data and a robust tool for representing probability distributions over sequences of observations. In this paper, we describe an important tool in the Hadith isnad processing: A chunker with HMM. The role of this tool is to decompose the chain of narrators (Isnad) and determine the tag of each part of Isnad (POI). First, we have compiled a tagset containing 13 tags. Then, we have used these tags to manually conceive a corpus of 100 chains of narrators from "Sahih Alboukhari" and we have extracted a lexicon from this corpus. This lexicon is a set of XML documents based on HPSG features and it contains the information of 134 narrators. After that, we have designed and implemented an analyzer based on HMM that permit to assign for each part of Isnad its proper tag and for each narrator its features. The system was tested on 2661 not duplicated Isnad from "Sahih Alboukhari". The obtained result achieved F-scores of 93%.

Kinetics and Statistics of Structural Changes in Polyacrylonitrile (폴리아크릴로니트릴의 構造變化에 있어서의 動力學的 및 統計學的 硏究)

  • Noh, Ick-Sam
    • Journal of the Korean Chemical Society
    • /
    • v.10 no.1
    • /
    • pp.25-31
    • /
    • 1966
  • It is well known that the coloration and structural changes in thermal treatment of polyacrylonitrile are due to the formation of partly hydrogenated naphthylidine-type ring involving the pendant nitrile groups. Any quantitative study of the reaction, in the sense of kinetics and/or statistics, however, has never been reported. This paper presents that, at first, the disappearance of the nitrile groups follows the first order kinetics, which indicates clearly that nitrile groups do not disappear by a long chain reaction-the kinetic chain length is very short. This observation rules out the long intramolecular and intermolecular propagation chain through which most of the nitrile groups disappear. From the evidence that a similar reaction occurs in propylene carbonate solutions without gel formation, one may conclude that the coloration and structural changes are not necessarily intermolecular reaction. Secondly, a finite amount of nitrile groups remains unreacted at the extrem of reaction-not contributed to the formation of naphthylidine-type ring. The concentration of this unreacted nitrile groups is 19∼22% which is good agreement with the statistically calculated value of 19.2%.

  • PDF

Optical 2-bit Adder Using the Rule of Symbolic Substitiution (부호치환 규칙을 이용한 광2-비트가산기)

  • 조웅호;배장근;김정우;노덕수;김수중
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.6
    • /
    • pp.871-880
    • /
    • 1993
  • Conventional binary addition rules require a carry formation and propagation to the most significant bit, and lead to serial addition. Thus, the carry progapation in a binary addition stands as a hindrance to the full utilization of parallelism optics offers, Optical adders using a modified signed-digit(MSD) number system have been proposed to eliminate the carry propagation chain states to represent the three possible digits of MSD number system must encode three different states to represent the three possible digits of MSD. In the paper, we propose the design of a parallel optical adder based on 2-bit addition rules using the method of symbolic substitution(SS).

  • PDF

A Study on the Establishment and Application of URBPO 750E (URBPO 750E의 제정과 운용에 관한 연구)

  • Chae, Jin Ik
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.60
    • /
    • pp.109-139
    • /
    • 2013
  • This paper is to review the Uniform Rules for Bank Payment Obligations(URBPO 750E) which were developed by the Banking Commission of the International Chamber of Commerce and to present the implications. The rules were unanimously adopted during Lisbon meeting of the ICC Banking Commission on April 17th, 2013 and taken effect as of July 1, 2013. A BPO is an irrevocable undertaking given by an Obligor bank to a Recipient bank to pay a specified amount under the condition of a successful electronic matching of data or acceptance of mismatches. It is an alternative instrument for trade settlement, designed to complement existing solution and not to replace them(ICC,750E). The BPO enables banks to provide sellers and buyers with advanced risk mitigations and enhanced financing services. The BPO will improve trade processing efficiency such as increased transaction times, reduced handling cost, and others. It is believed that the BPO will have an important role to play in supporting the development of Supply Chain Finance in international Trade. So, This study will review the provisions and application of the URBPO 750E based on documentary materials including swift com and icc.org and so on.

  • PDF

Developing XML Messaging System for Supply Chain Management (공급사슬관리를 위한 XML 메시징 시스템 개발)

  • 김용수;임종선;주경준;주경수
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.1-8
    • /
    • 2002
  • Because XML is a W3C standard and has characteristics like platform-independent, it has a critical role in e-commerce. Business rules and procedures should be standardized for efficient B2B integration, But a lot of companies are its own XML documents instead of standard document, Therefore many organizations try to make standards for e-commerce based on framework. Also, in case use supply chain administration system, because document transmit between corporation use on-line, need messaging system that can transfer XML message In this paper, XML messaging system is designed and implemented. Client requests service in XML and server returns response in XML in this system, So we con more easily and efficiently to exchange document between company this XML messaging system.

  • PDF

A study on production and distribution planning problems using hybrid genetic algorithm (유전 알고리즘을 이용한 생산 및 분배 계획)

  • 정성원;장양자;박진우
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.26 no.4
    • /
    • pp.133-141
    • /
    • 2001
  • Rapid development in computer and network technology these days has created in environment in which decisions for manufacturing companies can be made in a much broader perspective. Especially, better decisions on production and distribution planning(PDP) problems can be made laking advantage of real time information from all the parties concerned. However, since the PDP problem-a core part of the supply chain management- is known to be the so-called NP-hard problem, so heuristic methods are dominantly used to find out solutions in a reasonable time. As one of those heuristic techniques, many previous studios considered genetic a1gorithms. A standard genetic a1gorithm applies rules of reproduction, gene crossover, and mutation to the pseudo-organisms so the organisms can pass along beneficial and survival-enhancing trails to a new generation. When it comes to representing a chromosome on the problem, it is hard to guarantee an evolution of solutions through classic a1gorithm operations alone, for there exists a strong epitasis among genes. To resolve this problem, we propose a hybrid genetic a1gorithm based on Silver-Meal heuristic. Using IMS-TB(Intelligent Manufacturing System Test-bed) problem sets. the good performance of the proposed a1gorithm is demonstrated.

  • PDF

TG-SPSR: A Systematic Targeted Password Attacking Model

  • Zhang, Mengli;Zhang, Qihui;Liu, Wenfen;Hu, Xuexian;Wei, Jianghong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2674-2697
    • /
    • 2019
  • Identity authentication is a crucial line of defense for network security, and passwords are still the mainstream of identity authentication. So far trawling password attacking has been extensively studied, but the research related with personal information is always sporadic. Probabilistic context-free grammar (PCFG) and Markov chain-based models perform greatly well in trawling guessing. In this paper we propose a systematic targeted attacking model based on structure partition and string reorganization by migrating the above two models to targeted attacking, denoted as TG-SPSR. In structure partition phase, besides dividing passwords to basic structure similar to PCFG, we additionally define a trajectory-based keyboard pattern in the basic grammar and introduce index bits to accurately characterize the position of special characters. Moreover, we also construct a BiLSTM recurrent neural network classifier to characterize the behavior of password reuse and modification after defining nine kinds of modification rules. Extensive experimental results indicate that in online attacking, TG-SPSR outperforms traditional trawling attacking algorithms by average about 275%, and respectively outperforms its foremost counterparts, Personal-PCFG, TarGuess-I, by about 70% and 19%; In offline attacking, TG-SPSR outperforms traditional trawling attacking algorithms by average about 90%, outperforms Personal-PCFG and TarGuess-I by 85% and 30%, respectively.