• Title/Summary/Keyword: Game Strategy

Search Result 515, Processing Time 0.028 seconds

An Empirical Study for Identifying Players′ Loyalty factors in Online Games (온라인 게임의 소비자 충성도 유인에 관한 실증적 연구)

  • 정재진
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.4
    • /
    • pp.484-495
    • /
    • 2004
  • In this paper appears that in this extremely attractive and growing services segment, academics, as well as practitioners, would benefit from investigating the relationships among the players' loyalty, word of mouth and flow, and the impacts of several other key game-related constructs on consumer behavioral intentions. A conceptual framework is proposed and a structural equation model is developed. This paper develops the exploratory LISREL model for identifying the factors affecting the players' loyalty for some specific brand of online games. The concept of flow, feedback, challenge, etc, are all introduced into the model, as the independent variables affecting the loyalty directly and indirectly. Statistical results show that depending upon the types of games, the configuration of structural equation model is a little different from each other, but overall results are very much intuitive in that challenge positively enforces flow, and flow strengthens loyalty. Other interesting results concerning game development strategy are also provided. It is hoped that this result might provide the useful guidelines for developing the successful online game contents. With a better understanding of the players' behavioral intentions, online game developers should be able to make adjustments in their development and marketing plans, providing them with a sustainable advantage over their competition.

  • PDF

Real-time VR Strategy Chess Game using Motion Recognition (VR기반 모션인식을 이용한 실시간 전략 체스 게임)

  • Kim, Young-Kwang;Yoon, Yeo-Song;Oh, Tea-Gyeoung;HwangBo, Yeung-Hwan;Hwang, Jeong-Hee
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.1-7
    • /
    • 2017
  • Virtual reality(VR) is known as immersive multimedia or computer-simulated reality, is a computer technology that replicates an environment, real or imagined, and simulates a user's physical presence and environment to allow for user interaction. Virtual realities artificially create sensory experience including sight, touch, hearing, and smell. Owing to the use of a single device in most VR contents, user have difficulty in manipulating user interface and game object. And also immersion of the game goes down because they can't see the mouse and keyboard in virtual space. In this paper, we design and implement the chess game to easily and accurately control user interface to improve the immersion in game.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

An Offloading Strategy for Multi-User Energy Consumption Optimization in Multi-MEC Scene

  • Li, Zhi;Zhu, Qi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4025-4041
    • /
    • 2020
  • Mobile edge computing (MEC) is capable of providing services to smart devices nearby through radio access networks and thus improving service experience of users. In this paper, an offloading strategy for the joint optimization of computing and communication resources in multi-user and multi-MEC overlapping scene was proposed. In addition, under the condition that wireless transmission resources and MEC computing resources were limited and task completion delay was within the maximum tolerance time, the optimization problem of minimizing energy consumption of all users was created, which was then further divided into two subproblems, i.e. offloading strategy and resource allocation. These two subproblems were then solved by the game theory and Lagrangian function to obtain the optimal task offloading strategy and resource allocation plan, and the Nash equilibrium of user offloading strategy games and convex optimization of resource allocation were proved. The simulation results showed that the proposed algorithm could effectively reduce the energy consumption of users.

Equilibrium Bidding Strategy and Optimal Auction Design of Sequential Auction (축차경매의 평형입찰전략과 최적경매설계)

  • Kim, Yea-Gen;Park, Soon-Dal
    • Journal of the military operations research society of Korea
    • /
    • v.14 no.1
    • /
    • pp.63-83
    • /
    • 1988
  • This study is concerned with the equilibrium bidding strategy and the optimal auction design of sequential auction with a reserve price and an entry fee. It is assumed that each bidder has a fixed reservation value and draws the reservation values of other bidders independently in the same distribution and may obtain at most one object to be sold. Under such assumptions, the sequential auction will be analyzed by the game theoretic approach. The purpose of this paper is, in the sequential auction, to find the equilibrium bidding strategy and to design the optimal auction under the equilibrium bidding strategy. The equilibrium bidding strategy and the optimal auction design are further analyzed with respect to change of the reserve price, the entry fee, and the number of bidders and objects. Specially, the auctioneer's expected revenue for each auction is obtained and analyzed.

  • PDF

Equilibrium Bidding Strategy and Optimal Auction Design of Sequential Auction (축차경매의 평형입찰전략과 최적경매설계)

  • Kim, Yea-Gen;Park, Soon-Dal
    • Journal of the military operations research society of Korea
    • /
    • v.13 no.2
    • /
    • pp.63-83
    • /
    • 1987
  • This study is concerned with the equilibrium bidding strategy and the optimal auction design of sequential auction with a reserve price and an entry fee. It is assumed that each bidder has a fixed reservation value and draws the reservation values of other bidders independently in the same distribution and may obtain at most one object to be sold. Under such assumptions, the sequential auction will be analyzed by the game theoretic approach. The purpose of this paper is, in the sequential auction, to find the equilibrium bidding strategy and to design the optimal auction under the equilibrium bidding strategy. The equilibrium bidding strategy and the optimal auction design are further analyzed with respect to change of the reserve price, the entry fee, and the number of bidders and objects. Specially, the auctioneer's expected revenue for each auction is obtained and analyzed.

  • PDF

Solving Mixed Strategy Nash-Cournot Equilibria under Generation and Transmission Constraints in Electricity Market

  • Lee, Kwang-Ho
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.4
    • /
    • pp.675-685
    • /
    • 2013
  • Generation capacities and transmission line constraints in a competitive electricity market make it troublesome to compute Nash Equilibrium (NE) for analyzing participants' strategic generation quantities. The NE can cause a mixed strategy NE rather than a pure strategy NE resulting in a more complicated computation of NE, especially in a multiplayer game. A two-level hierarchical optimization problem is used to model competition among multiple participants. There are difficulties in using a mathematical programming approach to solve a mixed strategy NE. This paper presents heuristics applied to the mathematical programming method for dealing with the constraints on generation capacities and transmission line flows. A new formulation based on the heuristics is provided with a set of linear and nonlinear equations, and an algorithm is suggested for using the heuristics and the newly-formulated equations.

Development of Game management system suitable for mobile games (모바일 게임에 적합한 게임운영 시스템 개발)

  • Lee, Dong-Seong;Ryu, Seuc-Ho;Kyung, Byung-Pyo;Lee, Dong-Lyeor;Lee, Dong-Yeop;Lee, Wan-Bok
    • Journal of Digital Convergence
    • /
    • v.14 no.1
    • /
    • pp.371-377
    • /
    • 2016
  • In the area of mobile game, the job of data analysis is very important. As the mobile game market is being expanded, the characteristics of the market have been so much changed, that the contents updating and marketing strategy should be built on thorough understanding and analysis result of the gamers' needs and their play pattern. Thus the importance of the mobile game management system can not be overemphasized. However, in practice, most of the mobile game companies are small scale, and they have intrinsic problem to provide successful game service to user with a dedicated operating team. To overcome these problems, this paper suggests an efficient mobile game management system based on our already developed mobile game. And the effectiveness of our system is illustrated by our case examples such as prompt response to user question or refund request. Our proposed system also played an important role to plan additional contents update, providing scientific data analysis result on user's play pattern and purchase trend.

Situating social games in the everyday: an Australian perspective

  • Willson, Michele
    • Journal of Contemporary Eastern Asia
    • /
    • v.14 no.1
    • /
    • pp.57-69
    • /
    • 2015
  • This paper explores some of the ways in which social games - games played with others through social network sites such as Facebook - are situated within the everyday. It argues that social games are more than just games; they perform a range of interactive and integrative functions across and within people's lives and therefore need to be investigated as such. Social games en-able spaces for and practices of creative expression, and identity management. They also form a mechanism through which relations can be enacted and maintained across and outside of the game environment. This argument requires the researcher to consider the panoply of ways in which people integrate social games within their lives and everyday practices. Part of a larger project, this paper explores some findings from an exploratory survey of Australian game play-ers about their management and integration of game play within the everyday with a particular focus on gender.

Car Driving Simulation Game using 3-axis Gyroscope Sensor (3축 자이로스코프 센서를 이용한 자동차 주행 시뮬레이션)

  • Han, Kwangbae;Ko, Kwangman
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.6
    • /
    • pp.1089-1094
    • /
    • 2016
  • A simulation game represented the real world and situation as a video games, In the first time, this simulation game primarily applied to military practice areas and then it's applied areas were extended to strategy, flighting, racing, life areas. In this paper, we developed the driving simulator that operate the 3-axis sensor attached driver's handle which could forward/backward moving, control of direction, and transmit of gear in the virtual space. For more the realities of the situation and accuracy of the location and speed, we adopted the 3-axis sensing informations, Unreal engine4' and Blueprint.