• 제목/요약/키워드: restrict information

검색결과 206건 처리시간 0.028초

RISK-MINIMIZING HEDGING FOR A SPECIAL CONTINGENTS

  • YANG, JIANQI;JIANG, QIUYAN
    • Journal of Applied and Pure Mathematics
    • /
    • 제4권5_6호
    • /
    • pp.287-297
    • /
    • 2022
  • In this paper, we consider a risk-minimization hedging problem for a special European contingent claims. The existence and uniqueness of strategy are given constructively. Firstly, a non-standard European contingent is demonstrated as stochastic payment streams. Then the existence of the risk minimization strategy and also the uniqueness are proved under two kinds market information by using Galtchouk-Kunita-Watanabe decomposition and constructing a 0-achieving strategy risk-minimizing strategies in full information. And further, we have proven risk-minimizing strategies exists and is unique under restrict information by constructing a weakly mean-selffinancing strategy.

이종 디스플레이 장치간의 색역폭 사상 (Color Gamut Mapping for Different Kinds of Display Devices)

  • 권도형;이학성;김경석;한동일
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2006년도 하계종합학술대회
    • /
    • pp.691-692
    • /
    • 2006
  • Generally many devices reproduce images in the various ways. Therefore many devices can reproduce restrict range of colors according to their device characters. And the restrict range of color is called as a color gamut. Owing to these color gamuts have the differences between devices, color gamut mapping is needed. In this paper, we attempted an experiment about a gamut mapping from a CRT monitor to a LCD monitor.

  • PDF

다공질 실리콘의 에이징 효과를 억제하기 위한 보호막 (Passivation layers that restrict Ageing Effects of Porous Silicon)

  • 안종필;강문식;민남기;김석기
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(2)
    • /
    • pp.243-246
    • /
    • 2001
  • At atmosphere photoluminescence(PL) of porous silicon(PSi) decreases and peak wave number of PL is shifted to blue region. When PS is used light detector, the ageing effects are negative phenomena. For controling ageing effects, this paper uses Polymers.

  • PDF

Asymptotic Normality of PL estimator for interval censored bivariate life-times

  • Kang, Shin-Soo
    • Communications for Statistical Applications and Methods
    • /
    • 제7권1호
    • /
    • pp.245-256
    • /
    • 2000
  • Large sample properties of Life-Table estimator are discussed for interval censored bivariate survival data. We restrict out attention to the situation where response times within pairs are not distinguishable and the univariate survival distribution is the same for any individual within any pair.

  • PDF

P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어 (An Access Control using Reputation Information in P2P File Sharing System)

  • 신정화;신원;이경현
    • 정보처리학회논문지A
    • /
    • 제12A권6호
    • /
    • pp.493-498
    • /
    • 2005
  • P2P 서비스는 인터넷 상에서 서버를 거치지 않고 정보를 찾는 사람과 정보를 가진 사람의 컴퓨터간의 직접적인 연결을 통해 다양한 정보를 공유할 수 있는 방식으로, 파일의 자유로운 교환을 위한 방법으로 많은 인기를 얻고 있다. 그러나 P2P 파일 공유 시스템에서 서비스를 이용하는 모든 사용자들은 동등한 접근 권한으로 자유롭게 여러 사용자들의 공유 파일을 이용할 수 있기 때문에, 자신의 파일에 대한 공유 없이 다른 사용자들의 공유 파일을 다운로드만 하는 "free riding" 문제가 빈번하게 발생하고 있으며, 바이러스나 웜을 포함한 파일을 공유하거나 실제내용과 다른 제목을 가지는 파일을 공유하는 사용자라 하더라도 제한 없이 파일 공유 서비스를 이용할 수 있다. 이에 본 논문에서는 파일 공유서비스를 이용하는 사용자들의 신뢰도를 나타낼 수 있는 평판(Reputation) 정보를 이용하여 빈번한 다운로드를 행하는 "free rider"의 접근을 제한하고, 정상적인 실행이 되지 않는 파일을 공유한 사용자들에 대해서도 다른 사용자들의 공유 파일에 대한 사용을 제한하고자 한다.

Simulation of Detecting the Distributed Denial of Service by Multi-Agent

  • Seo, Hee-Suk;Lee, Young-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.59.1-59
    • /
    • 2001
  • The attackers on Internet-connected systems we are seeing today are more serious and more technically complex than those in the past. Computer security incidents are different from many other types of crimes because detection is unusually difficult. So, network security managers need a IDS and Firewall. IDS (Intrusion Detection System) monitors system activities to identify unauthorized use, misuse or abuse of computer and network system. It accomplishes these by collecting information from a variety of systems and network resources and then analyzing the information for symptoms of security problems. A Firewall is a way to restrict access between the Internet and internal network. Usually, the input ...

  • PDF

ECDSA 인증모듈을 사용한 웹 카메라 서버용 영상처리 시스템 구현 (Implementation of mutual Authentication Module using ECDSA for web-Camera system)

  • 차재원;박덕용;김영철
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 Ⅲ
    • /
    • pp.1503-1506
    • /
    • 2003
  • In this paper, we propose a mutual Authentication module, using ECDSA(Elliptic Curve Digital Signature Algorithm) for web-Camera system. which. is based on three module. first is authentication module which is based on ECDSA algorithm. second is transfort module using stream socket. the last module is graphic module. This paper describes cipher algorithm which can be used restrict condition for the same secret service with wire internet. we made a authentication module using based client and server system.

  • PDF

New chaotic map development and its application in encrypted color image

  • JarJar, Abdellatif
    • Journal of Multimedia Information System
    • /
    • 제8권2호
    • /
    • pp.131-142
    • /
    • 2021
  • This paper traces the process of constructing a new one-dimensional chaotic map, and will provide a simple application in color image encryption. The use of Sarkovskii's theorem will make it possible to determine the existence of chaos and restrict all conditions to ensure the existence of this new sequence. In addition, the sensitivity to initial conditions will be proved by Lyapunov's index value. Similarly, the performance of this new chaotic map will be illustrated graphically and compared with other chaotic maps most commonly used in cryptography. Finally, a humble color image encryption application will show the power of this new chaotic map.

이동 에이전트 시스템 (Mobile Agent System)

  • 김평중;윤석환
    • 기술사
    • /
    • 제30권6호
    • /
    • pp.59-67
    • /
    • 1997
  • As Information society evolves, there is a growing need that substitutes agents for users to do the given Jobs in distributed computing environments. Agents can retrieve and browse the diverse information via Internet, as the users request, and can deal with the complicated routine jobs on behalf of users with timeliness and efficiency. Especially, mobile agent can support the paradigm for distributed application programs in Internet environments. This is suitable to jump-to-jump model without any hesitations because agent moves. Agents can be applied to various applications, but we restrict it to market information retrieval in this paper. On recognizing a query about merchandise information by an user, agent by itself retrieves the corresponding information by navigating the Internet and informs the result to the user. In this paper, we review the mobile agent configuration to do this kind of work, propose the system architecture based on this review. By using this system, users can be free from complicated routine jobs and pursue his/her wishes to promote ones welfare.

  • PDF