• Title/Summary/Keyword: information theoretic analysis

Search Result 94, Processing Time 0.022 seconds

A Study on the Agency Theory and Accounting (에이전시이론과 회계감사에 관한 연구)

  • 공해영
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.12 no.20
    • /
    • pp.123-138
    • /
    • 1989
  • The primary objective of the agency research in the game theory lives in the maintenance of Pareto is optimal condition for the optimal incentive contract. The basic concepts which are related to this objective are reviewed in connection with the general assumptions to model it, the moral hazard and adverse selection which arised from the information asymmetry, and finally the problem of risk distribution. The demand for auditing and the role of auditor have been addressed by ASOBAC. Issues which an auditor is explicitly introduced in a principal-agent framework have been addressed in this paper. These issues must be confronted to appropriately with the auditor, and to achieve an adequate understanding of optimal confronting arrangement with the auditor. The first step in introducing an auditor into this analysis is to examine the game-theoretic foundation of such a expended agency model. The Mathematical program formulated may not yield solution that are resonable. This arises because the program may call for the auditor and manager to play dominated Nash equilibra in some subgame. The nontrivial natures of the subgame implies that randomized strategies by the auditor and manager nay be of crucial importance. The possibilities for overcoming the randomized strategy problem were suggested; change the rule of the game and or impose covexity condition. The former seems unjustifiable in on auditing context, and the latter promising but difficult to achieve. The discussion ended with an extension of the revelation principle to the owner manager-auditor game, assuming strategies. An examination of the restriction and improvement direction of the basic concept of agency theory was addressed in the later part of this paper. Many important aspects of auditor incentives are inherently multiple-agent, multiple-period, multiple-objectine, phenomena and require further analyses and researches.

  • PDF

Game Theoretic Analysis for RFID Reader Collision (RFID 리더 주파수 간섭에 대한 게임 이론 관점에서의 해석)

  • Lee, Dong-Yul;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.36-47
    • /
    • 2009
  • There exists RFID reader-to reader frequency which can not recognize tag in dense reader nude because the interference causes low SIR. To solve this frequency, the many algorithms based on TDM have been proposed. But the most of existing algorithms not obtain the optimal time allocation but propose heuristic scheduling algorithm. In this paper, we apply game theory which deals with interest between players of game to RFID reader-to reader interference and analyze the time allocation problem of reader based on TDM in terms of cooperative game which the players bind agreements using Nash Bargaining Solution(NBS) and non-cooperative game which the players do not bind agreements using Nash Equilibrium(NE). The applied results show that in dense reader mode, NBS of cooperative game is superior to NE of non-cooperative game and present optimal time allocation in dense reader mode.

The application of the combinatorial schemes for the layout design of Sensor Networks (센서 네트워크 구축에서의 Combinatorial 기법 적용)

  • Kim, Joon-Mo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.7
    • /
    • pp.9-16
    • /
    • 2008
  • For the efficient routing on a Sensor Network, one may consider a deployment problem to interconnect the sensor nodes optimally. There is an analogous theoretic problem: the Steiner Tree problem of finding the tree that interconnects given points on a plane optimally. One may use the approximation algorithm for the problem to find out the deployment that interconnects the sensor nodes almost optimally. However, the Steiner Tree problem is to interconnect mathematical set of points on a Euclidean plane, and so involves particular cases that do not occur on Sensor Networks. Thus the approach of using the algorithm does not make a proper way of analysis. Differently from the randomly given locations of mathematical points on a Euclidean plane, the locations of sensors on Sensor Networks are assumed to be physically dispersed over some moderate distance with each other. By designing an approximation algorithm for the Sensor Networks in terms of that physical property, one may produce the execution time and the approximation ratio to the optimality that are appropriate for the problem of interconnecting Sensor Networks.

Econometric Study on Forecasting Demand Response in Smart Grid (스마트그리드 수요반응 추정을 위한 계량경제학적 방법에 관한 연구)

  • Kang, Dong Joo;Park, Sunju
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.133-142
    • /
    • 2012
  • Cournot model is one of representative models among many game theoretic approaches available for analyzing competitive market models. Recent years have witnessed various kinds of attempts to model competitive electricity markets using the Cournot model. Cournot model is appropriate for oligopoly market which is one characteristic of electric power industry requiring huge amount of capital investment. When we use Cournot model for the application to electricity market, it is prerequisite to assume the downward sloping demand curve in the right direction. Generators in oligopoly market could try to maximize their profit by exercising the market power like physical or economic withholding. However advanced electricity markets also have demand side bidding which makes it possible for the demand to respond to the high market price by reducing their consumption. Considering this kind of demand reaction, Generators couldn't abuse their market power. Instead, they try to find out an equilibrium point which is optimal for both sides, generators and demand. This paper suggest a quantitative analysis between market variables based on econometrics for estimating demand responses in smart grid environment.

A Game Theoretic Analysis of Social Commerce Ecosystem at the Crossroads (소셜커머스 생태계의 게임 분석)

  • Kim, Dohoon
    • Asia pacific journal of information systems
    • /
    • v.23 no.2
    • /
    • pp.67-86
    • /
    • 2013
  • This study first provides a stylized model that captures the essential features of the SC (Social Commerce) business and the competition process. The model focuses on the relationship between key decision issues such as marketing inputs and market value. As more SCs join the industry, they are inevitably faced with fierce competition, which may lead to sharp increase in the total marketing and advertising expenditure. This type of competition may lead the industry away from its optimal development path, and at worst, toward a disruption of the entire industry ecosystem. Such being the case, another goal of this study is to examine the possibility that the ToC (Tragedy of the Commons) may occur in the SC industry. We build game models, each of which assumes homogeneity and heterogeneity of SC providers, respectively, and derive explicit equilibrium solutions from both models. Our basic analysis presents Nash equilibria in both models and shows that SC providers are inevitably faced with fierce competition, which may lead to sharp increase in the total marketing expenses. We also compare the game outcomes with one with a hypothetical social planner who determines the total marketing level that optimizes the entire market value. Then, ToC can be defined to describe the situation where the total marketing efforts exceed the socially optimal level of marketing efforts. In both models, we examine the possibility of the ecosystem disruption and specify the conditions under which ToC may occur. However, the chance of avoiding ToC is higher with heterogeneous players than with homogeneous players. To supplement our analytical results, we develop a simulation model which incorporates a market dynamics based on the gap between actual marketing efforts and socially optimal marketing level. Simulation experiments present some lessons and insights which also confirm out findings from equilibrium analysis. For example, heterogeneity in SC providers alleviates the severity of ToC and makes it faster for survivors to escape from the ToC trap. As a result, the degree of industrial concentration tends to increase, which also explains the 'rich-get-richer' phenomenon observed in some empirical studies on the SC industry. Lastly, based on our analytical and experimental results, we come up with some measures to avoid ToC and overcome the shortcomings intrinsic to the current business model. And further discussions provide strategic implications and policy directions to overcome the possible trap of ToC in this ecosystem, and eventually help the industry to sustainably develop itself toward the next level. To name a few examples of policy measures, regulations on the marketing activities so that the overall marketing expenses cannot go beyond the socially optimal level; institutional guidelines and rules to straightening up the distortions in the way that SC providers view the marketing costs (the current marketing costs are underestimated, thereby encouraging SC providers to increase marketing expenditure); and so on.

  • PDF

Analysis on the characteristics for upper bound of [1,2]-domination in trees (트리의 [1,2]-지배 수 상계에 대한 특성 분석)

  • Lee, Hoon;Sohn, Moo Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2243-2251
    • /
    • 2016
  • In this paper, we propose a theoretical model for characterization and upper bounds of [1,2]-domination set of network which has tree structure. In detail, we propose a theoretic model for upper bounds on [1,2]-domination set of a tree network which has some typical constrains. To that purpose, we introduce a graph theory to model and analyze the characteristics of tree structure networks. We assume a node subset D of a graph G=(V,E). We define that D is a [1,2]-dominant set if for any node v in set V which is not an element of a set D is adjacent to a node or two nodes of an element in a set D (that is, $1{\leq}{\mid}N({\upsilon}){\bigcap}D{\mid}{\leq}2$ for every node $v{\in}V-D$). The minimum cardinality of a [1,2]-dominating set of G, which is denoted by ${\gamma}_{[1,2]}(G)$, is called the [1,2]-domination number of G. In this paper, we show new upper bounds and characteristics about the [1,2]-domination number of tree.

Analysis of a Large-scale Protein Structural Interactome: Ageing Protein structures and the most important protein domain

  • Bolser, Dan;Dafas, Panos;Harrington, Richard;Schroeder, Michael;Park, Jong
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2003.10a
    • /
    • pp.26-51
    • /
    • 2003
  • Large scale protein interaction maps provide a new, global perspective with which to analyse protein function. PSIMAP, the Protein Structural Interactome Map, is a database of all the structurally observed interactions between superfamilies of protein domains with known three-dimensional structure in thePDB. PSIMAP incorporates both functional and evolutionary information into a single network. It makes it possible to age protein domains in terms of taxonomic diversity, interaction and function. One consequence of it is to predict the most important protein domain structure in evolution. We present a global analysis of PSIMAP using several distinct network measures relating to centrality, interactivity, fault-tolerance, and taxonomic diversity. We found the following results: ${\bullet}$ Centrality: we show that the center and barycenter of PSIMAP do not coincide, and that the superfamilies forming the barycenter relate to very general functions, while those constituting the center relate to enzymatic activity. ${\bullet}$ Interactivity: we identify the P-loop and immunoglobulin superfamilies as the most highly interactive. We successfully use connectivity and cluster index, which characterise the connectivity of a superfamily's neighbourhood, to discover superfamilies of complex I and II. This is particularly significant as the structure of complex I is not yet solved. ${\bullet}$ Taxonomic diversity: we found that highly interactive superfamilies are in general taxonomically very diverse and are thus amongst the oldest. This led to the prediction of the oldest and most important protein domain in evolution of lift. ${\bullet}$ Fault-tolerance: we found that the network is very robust as for the majority of superfamilies removal from the network will not break up the network. Overall, we can single out the P-loop containing nucleotide triphosphate hydrolases superfamily as it is the most highly connected and has the highest taxonomic diversity. In addition, this superfamily has the highest interaction rank, is the barycenter of the network (it has the shortest average path to every other superfamily in the network), and is an articulation vertex, whose removal will disconnect the network. More generally, we conclude that the graph-theoretic and taxonomic analysis of PSIMAP is an important step towards the understanding of protein function and could be an important tool for tracing the evolution of life at the molecular level.

  • PDF

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Converged Factors Affecting Learning Flow in Nursing College Students (간호대학생의 학습몰입에 미치는 융합적 요인)

  • Lee, Hyea-Kyung;Kim, Li-A;Kim, Jae-Eun;Lee, Yu-Ra;Lee, Ji-Min;Han, Hee-Sun;Hwang, Hyeon-Kyeong
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.15-23
    • /
    • 2017
  • The purpose of this study is to analyze converged factors affecting learning flow in nursing college students. The study conducted survey on 200 nursing students attending a college in Chungcheongbuk-do. The study processed data using descriptive statistics, t-test, ANOVA and Pearson correlation coefficients and multiple regression analysis for the analysis. As for the relationship between self-leadership, social support and learning flow, the higher self-leadership(r=568, p<.001), and social support (r=.412, p<.001) led to higher learning flow of the study subject. The influential variables of learning flow was self-leadership with 33.0% of explanation power(${\beta}=.501$, p<.001). Likewise, the study confirmed that self-leadership is a very significant variable of learning flow of nursing students. Based on the theoretic grounds, there is a need to seek measures to improve learning flow by improving self-leadership of nursing students.

A Study on the Current Situation of Adult Children Cohabiting with Their Parents and an Exploration of the Frame of Analysis (성인자녀의 부모 동거 현황 및 분석틀의 탐색)

  • Choi, Youn Shil
    • Journal of Families and Better Life
    • /
    • v.32 no.4
    • /
    • pp.75-89
    • /
    • 2014
  • The purpose of this study is to explore whether the phenomenon of both married and unmarried adults' cohabiting with their parents in Korean society is "unilaterally parasitic" on the child's side, or is "interdependent", characterized by expectation and dependence from the parent's side. As a result of this study possessing the characteristics of theoretic research, the following propensities of parent-dependent adults have been discussed. First of all, it was discovered that the ratio of adult children dependent on and cohabiting with their parents is considerable. Second, parents cohabiting with their adult children have unfavorable sociological features, such as high age, low level of education and income, and lower standards of education and income, compared to parents in normal households. Third, it was found that parent-dependent adults in Korean society maintain a relatively high rate of financial activity and stable employment-based occupation status. Fourth, it was shown that the level of satisfaction on the relationship between parent-dependent adults and their parents was discovered to be high, which is contrastive to the prediction of negative results based on some previous researches. Single adult children's age, their level of education and financial activity status, and their parents' age and level of education were deducted as variables related to the level of satisfaction of the relationship between parents and their children. It seems that the issue of married and unmarried adults' cohabiting with their parents in Korean society should be approached from various perspectives such as political, economic, socio-cultural and developmental aspects. On the basis of this fundamental awareness and several of the materials, it is pertinent that approaches to both married and unmarried adults' cohabiting with parents in Korean society should be distinguished from approaches to those in Japanese or Western society because it reflects the uniqueness of Korean society. In the phenomenon of married and unmarried adults' cohabiting with their parents in Korean society, there are several factors besides the economic factor, especially the socio-cultural factor that have the characteristics of mutual dependence between parents and their children rather than those of unilateral parasitism, in contrast with the phenomenon in Japanese or Western society. This research was aimed to contribute by establishing basic data for policy making by providing necessary information to treat the issues of instability and anxiety related to families and reflection on the matters of generations and parent-child relationships in current Korean society.