• Title/Summary/Keyword: information Theory

Search Result 7,424, Processing Time 0.037 seconds

Resource Allocation in Multiuser Multi-Carrier Cognitive Radio Network via Game and Supermarket Game Theory: Survey, Tutorial, and Open Research Directions

  • Abdul-Ghafoor, Omar B.;Ismail, Mahamod;Nordin, Rosdiadee;Shaat, Musbah M.R.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3674-3710
    • /
    • 2014
  • In this tutorial, we integrate the concept of cognitive radio technology into game theory and supermarket game theory to address the problem of resource allocation in multiuser multicarrier cognitive radio networks. In addition, multiuser multicarrier transmission technique is chosen as a candidate to study the resource allocation problem via game and supermarket game theory. This tutorial also includes various definitions, scenarios and examples related to (i) game theory (including both non-cooperative and cooperative games), (ii) supermarket game theory (including pricing, auction theory and oligopoly markets), and (iii) resource allocation in multicarrier techniques. Thus, interested readers can better understand the main tools that allow them to model the resource allocation problem in multicarrier networks via game and supermarket game theory. In this tutorial article, we first review the most fundamental concepts and architectures of CRNs and subsequently introduce the concepts of game theory, supermarket game theory and common solution to game models such as the Nash equilibrium and the Nash bargaining solution. Finally, a list of related studies is highlighted and compared in this tutorial.

Contract Theory Based Cooperative Spectrum Sharing with Joint Power and Bandwidth Optimization

  • Lu, Weidang;He, Chenxin;Lin, Yuanrong;Peng, Hong;Liu, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5803-5819
    • /
    • 2017
  • In this paper, we proposed a contract theory based cooperative spectrum sharing scheme with joint power and bandwidth optimization under asymmetric information, where the primary user (PU) does not know the secondary users' (SUs) private information. To improve performance, PU needs to provide incentives to stimulate nearby SUs to help forward its signal. By using contract theory, PU and SUs' negotiations are modeled as a labor market. PU and SUs act as the employer and employees, respectively. Specifically, SUs provide labor (i.e. the relay power, which can be used for forwarding PU's signal) in exchange for the reward (i.e. the spectrum access bandwidth which can be used for transmitting their own signals). PU needs to overcome a challenge how to balance the relationship between contributions and incentives for the SUs. We study the optimal contract design which consists of relay power and spectrum access bandwidth allocation. We show that the most efficient SUs will be hired by the PU to attend the cooperative communication. PU can achieve the same maximum utility as in the symmetric information scenario. Simulation results confirm that the utility of PU is significantly enhanced with our proposed cooperative spectrum sharing scheme.

Effect of uncertain information on drivers' decision making (Application of Prospect Theory) (불확실한 정보에 대한 운전자의 의사결정행태 연구)

  • CHO, Hye-Jin;KIM, Kang-Soo
    • Journal of Korean Society of Transportation
    • /
    • v.21 no.1
    • /
    • pp.77-90
    • /
    • 2003
  • This paper explores the way and the extent to which drivers' route choice was influenced by uncertain information. In particular, this paper investigates the effect of qualitative information on route choice when drivers face a choice with different degrees of uncertain information. The SP survey was conducted and route choice legit models were estimated. We also applied Prospect Theory to the analysis of drivers' decision making under uncertain information. The main findings are firstly, drivers tend to prefer a route with information than(to) one without information. This indicated that providing charge information encouraged drivers to choose the routes for which information is provided in preference to those for which it is not provided. Secondly, drivers also prefer a route with a certain and precise information over one with uncertain and imprecise information. Thirdly, when the information is given as a range, the size of the range of the information influenced route choice slightly and as the range of the charge increases, the route becomes slightly less unattractive. Fourthly, when the information is given as a range, drivers' route choices are influenced more by the median value of the ranges than by the size of the overall ranges of the information. Application of Prospect Theory to the results explains the way drivers may be interpreting the choice situation and how they make a route choice in response to uncertain information. The results of this paper implicate that drivers' decision making under uncertainty seem to be very complicated and flexible, depending on the way drivers interpret the choice situation. Therefore, it is recommended to apply wider related theories to the analysis of the drivers' behaviour.

A Study on the Dimension of Quality Metrics for Information Systems Development and Success : An Application of Information Processing Theory

  • An, Joon M.
    • The Journal of Information Technology and Database
    • /
    • v.3 no.2
    • /
    • pp.97-118
    • /
    • 1996
  • Information systems quality engineering is one of the most problematic areas in practice and research, and needs cooperative efforts between practice and theory [Glass, 1996]. A model for evaluating the quality of system development process and ensuing success is proposed based on information processing theory of project unit design. A nomological net among a set of quality variables is identified from prior research in the areas of organization science, software engineering, and management information systems. More specifically, system development success was modelled as a function of project complexity, system development modelling environment, user participation, project unit structure, resource availability, and the level of iterative nature of development methodology. Based on the model developed from the information processing theory of project unit design in organization science. appropriate quality metrics for each variable in the proposed model are matched. In this way, a framework of relevant systems development and success quality metrics for controlling systems development processes and ensuing success is proposed. The causal relationships among the constructs in the proposed model are proposed as future empirical research for academicians and as managerial tools for quality managers. The framework and propositions help quality manager to select more parsimonious quality metrics for controlling information systems development processes and project success in an integrated way. Also this model can be utilized for evaluating software quality assurance programmes, which are developed and marketed by many vendors.

  • PDF

A Study on the Privacy Concern of e-commerce Users: Focused on Information Boundary Theory (전자상거래 이용자의 프라이버시 염려에 관한 연구 : 정보경계이론을 중심으로)

  • Kim, Jong-Ki;Oh, Da-Woon
    • The Journal of Information Systems
    • /
    • v.26 no.2
    • /
    • pp.43-62
    • /
    • 2017
  • Purpose This study provided empirical support for the model that explain the formation of privacy concerns in the perspective of Information Boundary Theory. This study investigated an integrated model suggesting that privacy concerns are formed by the individual's disposition to value privacy, privacy awareness, awareness of privacy policy, and government legislation. The Information Boundary Theory suggests that the boundaries of information space dependends on the individual's personal characteristics and environmental factors of e-commerce. When receiving a request for personal information from e-commerce websites, an individual assesses the risk depending on the risk-control assessment, the perception of intrusion give rise to privacy concerns. Design/methodology/approach This study empirically tested the hypotheses with the data collected in a survey that included the items measuring the constructs in the model. The survey was aimed at university students. and a causal modeling statistical technique(PLS) is used for data analysis in this research. Findings The results of the survey indicated significant relationships among environmental factors of e-commerce websites, individual's personal privacy characteristics and privacy concerns. Both individual's awareness of institutional privacy assurance on e-commerce and the privacy characteristics affect the risk-control assessment towards information disclosure, which becomes an essential components of privacy concerns.

The Pattern Recognition System Using the Fractal Dimension of Chaos Theory

  • Shon, Young-Woo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.2
    • /
    • pp.121-125
    • /
    • 2015
  • In this paper, we propose a method that extracts features from character patterns using the fractal dimension of chaos theory. The input character pattern image is converted into time-series data. Then, using the modified Henon system suggested in this paper, it determines the last features of the character pattern image after calculating the box-counting dimension, natural measure, information bit, and information (fractal) dimension. Finally, character pattern recognition is performed by statistically finding each information bit that shows the minimum difference compared with a normalized character pattern database.

Intentions of Employees to Whistleblow Information Security Policy Violations in the Organization

  • Wei, Liang-Cheng;Hsu, Carol;Wang, Kai
    • Asia pacific journal of information systems
    • /
    • v.26 no.1
    • /
    • pp.163-188
    • /
    • 2016
  • Compliance with information security policies has been an important managerial concern in organizations. Unlike traditional general deterrent theory, this study proposes whistle-blowing as an alternative approach for reducing internal information security policy violations. We build on the theories of planned behavior and rational choice as well as develop a theoretical model to understand the factors that influence whistle-blowing attitudes and intention at both the organizational and individual levels. Our empirical results reveal that altruistic and egoistic concerns are involved in the development of whistle-blowing attitudes. The results not only extend our understanding of whistle-blowing motivation but also offer directions to managers in promoting internal disclosure of information security breaches.

An Empirical Investigation of IT Adoption: Based on Movie Website (정보기술 수용에 관한 실증적 연구 : 영화관 웹사이트를 중심으로)

  • Kim, Jong-Weon;Jeong, Seok-Chan;Kim, Eun-Jung
    • The Journal of Information Systems
    • /
    • v.16 no.4
    • /
    • pp.157-176
    • /
    • 2007
  • Most of the Information Systems(IS) literature has focused on utilitarian or hedonic Information Technology(IT) to explain and predict IT adoption and use. This study investigates the relationships among individuals' beliefs and intention to use of movie website, which has both utilitarian and hedonic characteristics simultaneously. As a theoretical background, this study adopts Technology Acceptance Model(TAM) and Motivation Theory, in which the former is well-known as a theory of IT adoption and use in IS field, and the latter is famous for a theory of individual's behavior in organizational behavior field. With 153 responses, five hypotheses are tested by using structured equation model. The results show that perceived ease of use positively influences perceived usefulness and perceived enjoyment, and that all individuals' beliefs have a positive impact on intention to use of movie web-site. Based upon the study results, movie website's managers and professionals can plan and conduct their courses of action effectively for users' continuous visits on their operating website.

  • PDF

Supplier Evaluation in Green Supply Chain: An Adaptive Weight D-S Theory Model Based on Fuzzy-Rough-Sets-AHP Method

  • Li, Lianhui;Xu, Guanying;Wang, Hongguang
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.655-669
    • /
    • 2019
  • Supplier evaluation is of great significance in green supply chain management. Influenced by factors such as economic globalization, sustainable development, a holistic index framework is difficult to establish in green supply chain. Furthermore, the initial index values of candidate suppliers are often characterized by uncertainty and incompleteness and the index weight is variable. To solve these problems, an index framework is established after comprehensive consideration of the major factors. Then an adaptive weight D-S theory model is put forward, and a fuzzy-rough-sets-AHP method is proposed to solve the adaptive weight in the index framework. The case study and the comparison with TOPSIS show that the adaptive weight D-S theory model in this paper is feasible and effective.

A Study of Consumers' Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services

  • Se Hun Lim;Jungyeon Sung;Daekil Kim;Dan J. Kim
    • Asia pacific journal of information systems
    • /
    • v.27 no.3
    • /
    • pp.156-175
    • /
    • 2017
  • The proposed conceptual framework is based in the relationships among knowledge of personal information security, trust on the personal information security policies of parcel delivery service companies, privacy concern, trust in and risk of parcel delivery services, and user satisfaction with parcel delivery services. Drawing upon both cognitive theory of emotion and cognitive emotion theory that complement each other, we propose a research model and examine the relationships between cognitive and emotional factors and the usage of parcel delivery services. The proposed model is validated using data from customers who have previously used parcel delivery services. The results show a significant relationship between the cognitive and affective factors and the usage of parcel delivery services. This study enhances our understanding of parcel delivery services based on the consumers' psychological processes and presents useful implications on the importance of privacy and security in these services.