• Title/Summary/Keyword: restrict information

Search Result 205, Processing Time 0.029 seconds

RISK-MINIMIZING HEDGING FOR A SPECIAL CONTINGENTS

  • YANG, JIANQI;JIANG, QIUYAN
    • Journal of Applied and Pure Mathematics
    • /
    • v.4 no.5_6
    • /
    • pp.287-297
    • /
    • 2022
  • In this paper, we consider a risk-minimization hedging problem for a special European contingent claims. The existence and uniqueness of strategy are given constructively. Firstly, a non-standard European contingent is demonstrated as stochastic payment streams. Then the existence of the risk minimization strategy and also the uniqueness are proved under two kinds market information by using Galtchouk-Kunita-Watanabe decomposition and constructing a 0-achieving strategy risk-minimizing strategies in full information. And further, we have proven risk-minimizing strategies exists and is unique under restrict information by constructing a weakly mean-selffinancing strategy.

Color Gamut Mapping for Different Kinds of Display Devices (이종 디스플레이 장치간의 색역폭 사상)

  • Kwon, Do-Hyung;Lee, Hak-Sung;Kim, Kyung-Suk;Han, Dong-il
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.691-692
    • /
    • 2006
  • Generally many devices reproduce images in the various ways. Therefore many devices can reproduce restrict range of colors according to their device characters. And the restrict range of color is called as a color gamut. Owing to these color gamuts have the differences between devices, color gamut mapping is needed. In this paper, we attempted an experiment about a gamut mapping from a CRT monitor to a LCD monitor.

  • PDF

Passivation layers that restrict Ageing Effects of Porous Silicon (다공질 실리콘의 에이징 효과를 억제하기 위한 보호막)

  • 안종필;강문식;민남기;김석기
    • Proceedings of the IEEK Conference
    • /
    • 2001.06b
    • /
    • pp.243-246
    • /
    • 2001
  • At atmosphere photoluminescence(PL) of porous silicon(PSi) decreases and peak wave number of PL is shifted to blue region. When PS is used light detector, the ageing effects are negative phenomena. For controling ageing effects, this paper uses Polymers.

  • PDF

Asymptotic Normality of PL estimator for interval censored bivariate life-times

  • Kang, Shin-Soo
    • Communications for Statistical Applications and Methods
    • /
    • v.7 no.1
    • /
    • pp.245-256
    • /
    • 2000
  • Large sample properties of Life-Table estimator are discussed for interval censored bivariate survival data. We restrict out attention to the situation where response times within pairs are not distinguishable and the univariate survival distribution is the same for any individual within any pair.

  • PDF

An Access Control using Reputation Information in P2P File Sharing System (P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어)

  • Shin Jung-Hwa;Shin Weon;Rhee Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.493-498
    • /
    • 2005
  • P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.

Simulation of Detecting the Distributed Denial of Service by Multi-Agent

  • Seo, Hee-Suk;Lee, Young-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.59.1-59
    • /
    • 2001
  • The attackers on Internet-connected systems we are seeing today are more serious and more technically complex than those in the past. Computer security incidents are different from many other types of crimes because detection is unusually difficult. So, network security managers need a IDS and Firewall. IDS (Intrusion Detection System) monitors system activities to identify unauthorized use, misuse or abuse of computer and network system. It accomplishes these by collecting information from a variety of systems and network resources and then analyzing the information for symptoms of security problems. A Firewall is a way to restrict access between the Internet and internal network. Usually, the input ...

  • PDF

Implementation of mutual Authentication Module using ECDSA for web-Camera system (ECDSA 인증모듈을 사용한 웹 카메라 서버용 영상처리 시스템 구현)

  • 차재원;박덕용;김영철
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1503-1506
    • /
    • 2003
  • In this paper, we propose a mutual Authentication module, using ECDSA(Elliptic Curve Digital Signature Algorithm) for web-Camera system. which. is based on three module. first is authentication module which is based on ECDSA algorithm. second is transfort module using stream socket. the last module is graphic module. This paper describes cipher algorithm which can be used restrict condition for the same secret service with wire internet. we made a authentication module using based client and server system.

  • PDF

New chaotic map development and its application in encrypted color image

  • JarJar, Abdellatif
    • Journal of Multimedia Information System
    • /
    • v.8 no.2
    • /
    • pp.131-142
    • /
    • 2021
  • This paper traces the process of constructing a new one-dimensional chaotic map, and will provide a simple application in color image encryption. The use of Sarkovskii's theorem will make it possible to determine the existence of chaos and restrict all conditions to ensure the existence of this new sequence. In addition, the sensitivity to initial conditions will be proved by Lyapunov's index value. Similarly, the performance of this new chaotic map will be illustrated graphically and compared with other chaotic maps most commonly used in cryptography. Finally, a humble color image encryption application will show the power of this new chaotic map.

Mobile Agent System (이동 에이전트 시스템)

  • 김평중;윤석환
    • Journal of the Korean Professional Engineers Association
    • /
    • v.30 no.6
    • /
    • pp.59-67
    • /
    • 1997
  • As Information society evolves, there is a growing need that substitutes agents for users to do the given Jobs in distributed computing environments. Agents can retrieve and browse the diverse information via Internet, as the users request, and can deal with the complicated routine jobs on behalf of users with timeliness and efficiency. Especially, mobile agent can support the paradigm for distributed application programs in Internet environments. This is suitable to jump-to-jump model without any hesitations because agent moves. Agents can be applied to various applications, but we restrict it to market information retrieval in this paper. On recognizing a query about merchandise information by an user, agent by itself retrieves the corresponding information by navigating the Internet and informs the result to the user. In this paper, we review the mobile agent configuration to do this kind of work, propose the system architecture based on this review. By using this system, users can be free from complicated routine jobs and pursue his/her wishes to promote ones welfare.

  • PDF