• Title/Summary/Keyword: game framework

Search Result 241, Processing Time 0.027 seconds

The Theory of Auctions and Competitive Bidding : A Survey (경매 및 경쟁입찰에 관한 이론적 고찰;-문헌연구를 중심으로 -)

  • 정형찬
    • The Journal of Fisheries Business Administration
    • /
    • v.25 no.2
    • /
    • pp.89-102
    • /
    • 1994
  • This paper is to survey the major results of the game-theoretic models and recent research directions of the literature on auctions and competitive biddings. This paper classifies the auctions and competitive biddings into the following four major types:(i) English auction, (ii) Dutch auction, (iii) the first-price sealed-bid auction, (iv) the second-price sealed-bid auction. In order to survey the major ideas related to auctions and competitive biddings, we use two representative theoretical models developed under the game-theoretic framework : (i) the independent private value model are summarized as follows ; (1) The Dutch auction and the first-price auction are strategically equivalent, and so are the English auction and the second-price auction. (2) At the symmetric equilibria, the expected selling price is the same for all four types of auction. Meanwhile, the major results of the general model are as follows ; (1) When bidders are uncertain about their value extimate, the English and second-price auctions are not equivalent, but the dutch and the first-price auctions are still strategically equivalent. (2) The English auction generates the higher expected prices than the second-price auction. Also, when bidders are risk-neutral, the second-price auction generated higher average prices than the Dutch and the first-price auctions.

  • PDF

Strategy for Providing Optimal VMS Travel Time Information Using Bi-Level Programming (Bi-Level 프로그래밍 기법을 이용한 최적의 VMS 통행시간 정보제공 전략)

  • Baik, Nam Cheol;Kim, Byung Kwan;Lee, Sang Hyup
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4D
    • /
    • pp.559-564
    • /
    • 2006
  • The purpose of this study is to minimize negative effect of VMS travel time information service by sensitivity analysis, which forecasts the change in link traffic volume. As a result, strategies for providing travel information that can change driving patterns for minimizing travel time were found. The framework for analysis is recently expanded with the application of game theory. According to the experiment, the algorithm generated for travel time information service reduces total travel time and yields travel patterns that is very close to the system optimization. Also, this study found that the route the travel time service information is provided about could play the important role.

A Study on Masochistic Aspects of Action Games -Focusing on 'Gilles Deleuze's 『Masochism』 Theory- (액션게임에서 나타난 매저키즘적 양상 연구 -질 들뢰즈의 『매저키즘』 이론 중심으로-)

  • Lim, Yong-Seob
    • Cartoon and Animation Studies
    • /
    • s.33
    • /
    • pp.531-549
    • /
    • 2013
  • Action games exhibit all the specific constellation of masochism, such as disavowal, suspense, waiting, fetishism, and fantasy. These characteristics of action games can be analyzed with respect to masochism. This study conducted an analysis excluding sadism as much as possible, as sadism is a result of etiological misconception as opposed to masochism. However, comparative analysis is included in the study so that action games are not seen as demonstrating sadism. Games create a space for virtual interaction for main agents by connecting gamer-existence and game-character in the framework of a contract. The interaction of visual tactility within this space creates a system of difference in pleasure. Masochism enables one to attain pleasure in a world created himself or herself using fetishism in contractual relationships such as the ones exhibited in games. This shows that action games and masochism are mutually related. This paper analyzed the ontology of action games using actual examples of action games. The paper concluded that action games lead to the fulfillment of masochistic pleasure.

An Optimized Deployment Mechanism for Virtual Middleboxes in NFV- and SDN-Enabling Network

  • Xiong, Gang;Sun, Penghao;Hu, Yuxiang;Lan, Julong;Li, Kan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3474-3497
    • /
    • 2016
  • Network Function Virtualization (NFV) and Software Defined Networking (SDN) are recently considered as very promising drivers of the evolution of existing middlebox services, which play intrinsic and fundamental roles in today's networks. To address the virtual service deployment issues that caused by introducing NFV or SDN to networks, this paper proposes an optimal solution by combining quantum genetic algorithm with cooperative game theory. Specifically, we first state the concrete content of the service deployment problem and describe the system framework based on the architecture of SDN. Second, for the service location placement sub-problem, an integer linear programming model is built, which aims at minimizing the network transport delay by selecting suitable service locations, and then a heuristic solution is designed based on the improved quantum genetic algorithm. Third, for the service amount placement sub-problem, we apply the rigorous cooperative game-theoretic approach to build the mathematical model, and implement a distributed algorithm corresponding to Nash bargaining solution. Finally, experimental results show that our proposed method can calculate automatically the optimized placement locations, which reduces 30% of the average traffic delay compared to that of the random placement scheme. Meanwhile, the service amount placement approach can achieve the performance that the average metric values of satisfaction degree and fairness index reach above 90%. And evaluation results demonstrate that our proposed mechanism has a comprehensive advantage for network application.

Game Theoretic Cache Allocation Scheme in Wireless Networks (게임이론 기반 무선 통신에서의 캐시 할당 기법)

  • Le, Tra Huong Thi;Kim, Do Hyeon;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.854-859
    • /
    • 2017
  • Caching popular videos in the storage of base stations is an efficient method to reduce the transmission latency. This paper proposes an incentive proactive cache mechanism in the wireless network to motivate the content providers (CPs) to participate in the caching procedure. The system consists of one/many Infrastructure Provider (InP) and many CPs. The InP aims to define the price it charges the CPs to maximize its revenue while the CPs compete to determine the number of files they cache at the InP's base stations (BSs). We conceive this system within the framework of Stackelberg game where InP is considered as the leader and CPs are the followers. By using backward induction, we show closed form of the amount of cache space that each CP renting on each base station and then solve the optimization problem to calculate the price that InP leases each CP. This is different from the existing works in that we consider the non-uniform pricing scheme. The numerical results show that InP's profit in the proposed scheme is higher than in the uniform pricing.

Scenario-based 3D Objects Synthesizing System Design

  • Nam, Ji-Seung;Gao, Hui;Kang, Mi-Young;Kim, Kyoung-Tae;Son, Seung-Chul;Pom, Chung-Ung;Heo, Kwon
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.18-22
    • /
    • 2006
  • This paper proposes the framework of the scenario-based 3D image synthesizing system that allows common users who envision a scenario in their mind to realize it into the segments of cool animation. We focused on utilization of the existing motions to synthesize new motions for the objects. The framework is useful to build a 3D animation in game programming with a limited set of 3D objects. We also propose a practical algorithm to reuse and expand the objects. This algorithm is based on motion path modification rules. Both linear and nonlinear curve-fitting algorithms were applied to modify an animation by key frame interpolation and to make the motion appear realistic.

Real-time Flocking Simulation through RBF-based Vector Field (방사기저함수(RBF) 기반 벡터 필드를 이용한 실시간 군집 시뮬레이션)

  • Sung, Mankyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2937-2943
    • /
    • 2013
  • This paper introduces a real-time flocking simulation framework through radial basis function(RBF). The proposed framework first divides the entire environment into a grid structure and then assign a vector per each cell. These vectors are automatically calculated by using RBF function, which is parameterized from user-input control lines. Once the construction of vector field is done, then, flocks determine their path by following the vector field flow. The collision with static obstacles are modeled as a repulsive vector field, which is ultimately over-layed on the existing vector field and the inter-individual collision is also handled through fast lattice-bin method.

A proposed framework for UX evaluation of artificial intelligence services (인공지능 서비스 UX 평가를 위한 프레임워크)

  • Hur, Su-Jin;Youn, Joosang;Kim, Sung-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.274-276
    • /
    • 2021
  • As artificial intelligence develops rapidly, we can experience it in our everyday life such as with medical, education, and game applications. Traditional SW services were programmed explicitly by the intention of the programmer, and we have conducted evaluation on it. However, due to the uncertianty of AI services, risk follows to the products. Therefore, UX evaluations need to be different from traditional UX evaluations. Therefore, in this paper we suggest a AI-UX framework that consideres the task delegability, UX evaluations metrics, and individual differences.

  • PDF

A Normalization Method to Utilize Brain Waves as Brain Computer Interface Game Control (뇌파를 BCI 게임 제어에 활용하기 위한 정규화 방법)

  • Sung, Yun-Sick;Cho, Kyung-Eun;Um, Ky-Hyun
    • Journal of Korea Game Society
    • /
    • v.10 no.6
    • /
    • pp.115-124
    • /
    • 2010
  • In the beginning brain waves were used for monkeys to control robot arm with neural activity. In recent years there are research that measured brain waves are used for the control of programs which monitor the progression of dementia or enhance of attention in children diagnosed with Attention Deficit Hyperactivity Disorder (ADHD). Moreover, low-price devices that can be used as a game control interface have become available. One of the problems associated with control using brain waves is that the mean amplitude, mean wavelength, and mean vibrational frequency of the brain waves differ from individual to individual. This paper attempts to propose a method to normalize measured brain waves using normal distribution and calculate the waveforms that can be used in controlling games. For this, a framework in which brain waves are converted in seven stages has been suggested. In addition, the estimation process in each stage has been described. In an experiment the waveforms of two subjects have been compared using the proposed method in the BCI English word learning program. The level of similarity between two subjects' waveforms has been compared with correlation coefficient. When the proposed method was applied, both meditation and concentration increased by 13% and 8%, respectively. Because the proposed regularization method is converted into a waveform fit for control functions by reducing personal characteristics reflected in the brain waves, it is fitting for application programs such as games.

Design The User Authentication Framework Using u-health System (u-health 시스템을 이용한 사용자 인증 프레임워크 설계)

  • Choo, Yeun-Su;Jin, Byung-Wook;Park, Jae-Pyo;Jun, Moon-Seog
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.219-226
    • /
    • 2015
  • OTP(One Time Password) is for user authentication of Internet banking and users should carry their security card or OTP generator to use OTP. If they lost their security card or OTP generator, there is at risk for OTP leak. This paper suggests a new User Authentication Framework using personal health information from diverse technology of u-Health. It will cover the problem of OTP loss and illegal reproduction A User Authentication Framework is worthy of use because it uses various combinations of user's physical condition which is inconstant. This protocol is also safe from leaking information due to encryption of reliable institutes. Users don't need to bring their OTP generator or card when they use bank, shopping mall, and game site where existing OTP is used.