• Title/Summary/Keyword: Explicit

Search Result 2,787, Processing Time 0.032 seconds

Three-dimensional thermal-hydraulics/neutronics coupling analysis on the full-scale module of helium-cooled tritium-breeding blanket

  • Qiang Lian;Simiao Tang;Longxiang Zhu;Luteng Zhang;Wan Sun;Shanshan Bu;Liangming Pan;Wenxi Tian;Suizheng Qiu;G.H. Su;Xinghua Wu;Xiaoyu Wang
    • Nuclear Engineering and Technology
    • /
    • v.55 no.11
    • /
    • pp.4274-4281
    • /
    • 2023
  • Blanket is of vital importance for engineering application of the fusion reactor. Nuclear heat deposition in materials is the main heat source in blanket structure. In this paper, the three-dimensional method for thermal-hydraulics/neutronics coupling analysis is developed and applied for the full-scale module of the helium-cooled ceramic breeder tritium breeding blanket (HCCB TBB) designed for China Fusion Engineering Test Reactor (CFETR). The explicit coupling scheme is used to support data transfer for coupling analysis based on cell-to-cell mapping method. The coupling algorithm is realized by the user-defined function compiled in Fluent. The three-dimensional model is established, and then the coupling analysis is performed using the paralleled Coupling Analysis of Thermal-hydraulics and Neutronics Interface Code (CATNIC). The results reveal the relatively small influence of the coupling analysis compared to the traditional method using the radial fitting function of internal heat source. However, the coupling analysis method is quite important considering the nonuniform distribution of the neutron wall loading (NWL) along the poloidal direction. Finally, the structure optimization of the blanket is carried out using the coupling method to satisfy the thermal requirement of all materials. The nonlinear effect between thermal-hydraulics and neutronics is found during the blanket structure optimization, and the tritium production performance is slightly reduced after optimization. Such an adverse effect should be thoroughly evaluated in the future work.

Hierarchy in Signed Networks

  • Jamal Maktoubian
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.111-118
    • /
    • 2024
  • The concept of social stratification and hierarchy among human dates back to the origin of human race. Presently, the growing reputation of social networks has given us with an opportunity to analyze these well-studied phenomena over different networks at different scales. Generally, a social network could be defined as a collection of actors and their interactions. In this work, we concern ourselves with a particular type of social networks, known as trust networks. In this type of networks, there is an explicit show of trust (positive interaction) or distrust (negative interaction) among the actors. In other words, an actor can designate others as friends or foes. Trust networks are typically modeled as signed networks. A signed network is a directed graph in which the edges carry an edge weight of +1 (indicating trust) or -1 (indicating distrust). Examples of signed networks include the Slashdot Zoo network, the Epinions network and the Wikipedia adminship election network. In a social network, actors tend to connect with each other on the basis of their perceived social hierarchy. The emergence of such a hierarchy within a social community shows the manner in which authority manifests in the community. In the case of signed networks, the concept of social hierarchy can be interpreted as the emergence of a tree-like structure comprising of actors in a top-down fashion in the order of their ranks, describing a specific parent-child relationship, viz. child trusts parent. However, owing to the presence of positive as well as negative interactions in signed networks, deriving such "trust hierarchies" is a non-trivial challenge. We argue that traditional notions (of unsigned networks) are insufficient to derive hierarchies that are latent within signed networks In order to build hierarchies in signed networks, we look at two interpretations of trust namely presence of trust (or "good") and lack of distrust (or "not bad"). In order to develop a hierarchy signifying both trust and distrust effectively, the above interpretations are combined together for calculating the overall trustworthiness (termed as deserve) of actors. The actors are then arranged in a hierarchical fashion based on these aggregate deserve values, according to the following hypothesis: actor v is assigned as a child of actor u if: (i) v trusts u, and (ii) u has a higher deserve value than v. We describe this hypothesis with additional qualifiers in this thesis.

Improving the Accuracy of the Mohr Failure Envelope Approximating the Generalized Hoek-Brown Failure Criterion (일반화된 Hoek-Brown 파괴기준식의 근사 Mohr 파괴포락선 정확도 개선)

  • Youn-Kyou Lee
    • Tunnel and Underground Space
    • /
    • v.34 no.4
    • /
    • pp.355-373
    • /
    • 2024
  • The Generalized Hoek-Brown (GHB) criterion is a nonlinear failure criterion specialized for rock engineering applications and has recently seen increased usage. However, the GHB criterion expresses the relationship between minimum and maximum principal stresses at failure, and when GSI≠100, it has disadvantage of being difficult to express as an explicit relationship between the normal and shear stresses acting on the failure plane, i.e., as a Mohr failure envelope. This disadvantage makes it challenging to apply the GHB criterion in numerical analysis techniques such as limit equilibrium analysis, upper-bound limit analysis, and the critical plane approach. Consequently, recent studies have attempted to express the GHB Mohr failure envelope as an approximate analytical formula, and there is still a need for continued interest in related research. This study presents improved formulations for the approximate GHB Mohr failure envelope, offering higher accuracy in predicting shear strength compared to existing formulas. The improved formulation process employs a method to enhance the approximation accuracy of the tangential friction angle and utilizes the tangent line equation of the nonlinear GHB failure envelope to improve the accuracy of shear strength approximation. In the latter part of this paper, the advantages and limitations of the proposed approximate GHB failure envelopes in terms of shear strength prediction accuracy and calculation time are discussed.

Active Inferential Processing During Comprehension in Poor Readers (미숙 독자들에 있어 이해 도중의 능동적 추리의 처리)

  • Zoh Myeong-Han;Ahn Jeung-Chan
    • Korean Journal of Cognitive Science
    • /
    • v.17 no.2
    • /
    • pp.75-102
    • /
    • 2006
  • Three experiments were conducted using a verification task to examine good and poor readers' generation of causal inferences(with because sentences) and contrastive inferences(with although sentences). The unfamiliar, critical verification statement was either explicitly mentioned or was implied. In Experiment 1, both good and poor readers responded accurately to the critical statement, suggesting that both groups had the linguistic knowledge necessary to the required inferences. Differences were found, however, in the groups' verification latencies. Poor, but not good, readers responded faster to explicit than to implicit verification statements for both because and although sentences. In Experiment 2, poor readers were induced to generate causal inferences for the because experimental sentences by including fillers that were apparently counterfactual unless a causal inference was made. In Experiment 3, poor readers were induced to generate contrastive inferences for the although sentences by including fillers that could only be resolved by making a contrastive inference. Verification latencies for the critical statements showed that poor readers made causal inferences in Experiment 2 and contrastive inferences in Experiment 3 doting comprehension. These results were discussed in terms of context effect: Specific encoding operations performed on anomaly backgrounded in another passage would form part of the context that guides the ongoing activity in processing potentially relevant subsequent text.

  • PDF

The study of the relation between the medicine of Taoism and oriental medicine (도교의학(道敎醫學)에 관한 연구(硏究) (한의학(韓醫學)과 연관(聯關)된 부분(部分)을 중심(中心)으로))

  • Lee, Byung Sou;Yun, Chang Yul
    • Journal of Korean Medical classics
    • /
    • v.6
    • /
    • pp.252-305
    • /
    • 1993
  • I have studied the relation between a Taoist(道家) and the oriental medicine(韓醫學), it is summerized as following. 1. According to the relation between a Taoist(道家) and the oriental medicine, Lao-tzu(老子)' mathematical principle that had an influence on Three yin-three yang(三陰三陽) theory of the oriental medicine, idea of natural philosopy(自然無爲) and the freedom from avarace(無慾) on the oriental medicine. 2. Vital essence and energy theory(精氣設) in a Taoist not only can be seen in Lao-tzu' Do dug gyung(老子道德經), Maengza(孟子), Guanza(管子), but also its principle has something to do with Nei Ching's Vital essence and energy theory(精氣設). 3. Danjungpa(丹鼎派) can be divided into Naedansul(內丹術) which preserves through the breath and Oedansul(外丹術) which makes one a Taoist hermit. If he takes magic portions(金丹), they had a great effect on Yangsanghak(養生學) and was actually concerned with oriental doctors who was known to us. 4. If medicine of Taoism is classified, it can be divided into three categories. Boiled solution(渴液), Pharmacopea "Ben cao"(本草), Acupuncture & moxibustion(針灸), Magic portions(外丹) are used in the first category. Chinese setting-up and Therapeutic exercises(導引), Josik(調息), Naedan(內丹), Byugok(辟榖), Naeshi(內視), Banjung(房中) belong to second category. The religious contents such as Bu(符), Jeum(占), Cheum(籤), Ju(呪), Je(齊), Gido(祈禱), taboo are implied in third category. 5. In the history of the medicine of Taoism and oriental medicine, they are called animism, shamanism, Mu(巫) or Ye(毉), not separated at first period. In the end of junguk(戰國時代), Ye(醫) was clearly distinguished from Mu(巫) and then Mu(巫) was developed into medicine of Taoism and ye(毉) into the present form of oriental medicine. 6. The oriental medicine doctors that are concerned with Taoism are Bakgo(伯高), Geyugu(鬼臾區), Soyu(少兪), Noigong(雷公), Pyujak(篇鵲), Sunuyi(淳于意), Hwata(華陀), Hwangbomil(皇甫謐), Hangang(韓康), Dongbong(童奉), Heuson(許遜), Galhong(葛洪), Dohongyung(陶弘景), Damlan(曇鸞), uyjajang(葦慈藏), Sonsanak(孫思邈), Wanguing(王氷), Jegonghwalbul(濟公活佛), Yuwanso(劉完素), Judonge(朱丹溪), Leesijin(李時珍), Johakmin(趙學敏), Ougu1(吳杰) etc. 7. The view of a human body in the medicine of Taoism affected the oriental medicine on the ground that man was regarded as a microcosm(小宇宙), so he was compared to a nation or heaven and earth. 8. The anatomy of medicine of Taoism gave a detail description of five visceras and each organs, the heart, center of mental function, Mirie(尾閭) which has an relationship to the training of Naedan(內丹修練). In this resrect, as it is accord with the acupunture point of oriental medicine, therefore we can find that Taoism influenced oriental medicine, also explicit study was achieved. 9. Acient people believed that the goo in the human lxxIy, one of the characteristics of the medicine of Taoism cured the patients and then protected him from the disease. If a man was taken ill, they had him cured by making the god's name which corresponded to its disease, calling him communicating with him, and asking him to deprive him of illness. This treatment was used to live and be kept young eternally. In this respects, we can see that they emphasized on the attitude of Bulchiyibeung chimibeung(不治己病治末病) and psychological treatment. 10. Samsi thoery(三尸說) that one's fortune, disaster, health, and disease in the world are at the mercy of his good or bad conduct, is concerned with Taoism and treatment with the oriental medicine. 11. Guchung(九蟲) is more closly associated with the religious aspect rather than with the medical aspect. Because of the similarity of the mcdern parasitism, its study has an important meaning. 12. The respect for the human life is reflected in jeunsi(傳屍), with Samsi-guchung theory(三尸九蟲說), which is considered as mxIern tuberculosis.

  • PDF

Enhancing Predictive Accuracy of Collaborative Filtering Algorithms using the Network Analysis of Trust Relationship among Users (사용자 간 신뢰관계 네트워크 분석을 활용한 협업 필터링 알고리즘의 예측 정확도 개선)

  • Choi, Seulbi;Kwahk, Kee-Young;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.3
    • /
    • pp.113-127
    • /
    • 2016
  • Among the techniques for recommendation, collaborative filtering (CF) is commonly recognized to be the most effective for implementing recommender systems. Until now, CF has been popularly studied and adopted in both academic and real-world applications. The basic idea of CF is to create recommendation results by finding correlations between users of a recommendation system. CF system compares users based on how similar they are, and recommend products to users by using other like-minded people's results of evaluation for each product. Thus, it is very important to compute evaluation similarities among users in CF because the recommendation quality depends on it. Typical CF uses user's explicit numeric ratings of items (i.e. quantitative information) when computing the similarities among users in CF. In other words, user's numeric ratings have been a sole source of user preference information in traditional CF. However, user ratings are unable to fully reflect user's actual preferences from time to time. According to several studies, users may more actively accommodate recommendation of reliable others when purchasing goods. Thus, trust relationship can be regarded as the informative source for identifying user's preference with accuracy. Under this background, we propose a new hybrid recommender system that fuses CF and social network analysis (SNA). The proposed system adopts the recommendation algorithm that additionally reflect the result analyzed by SNA. In detail, our proposed system is based on conventional memory-based CF, but it is designed to use both user's numeric ratings and trust relationship information between users when calculating user similarities. For this, our system creates and uses not only user-item rating matrix, but also user-to-user trust network. As the methods for calculating user similarity between users, we proposed two alternatives - one is algorithm calculating the degree of similarity between users by utilizing in-degree and out-degree centrality, which are the indices representing the central location in the social network. We named these approaches as 'Trust CF - All' and 'Trust CF - Conditional'. The other alternative is the algorithm reflecting a neighbor's score higher when a target user trusts the neighbor directly or indirectly. The direct or indirect trust relationship can be identified by searching trust network of users. In this study, we call this approach 'Trust CF - Search'. To validate the applicability of the proposed system, we used experimental data provided by LibRec that crawled from the entire FilmTrust website. It consists of ratings of movies and trust relationship network indicating who to trust between users. The experimental system was implemented using Microsoft Visual Basic for Applications (VBA) and UCINET 6. To examine the effectiveness of the proposed system, we compared the performance of our proposed method with one of conventional CF system. The performances of recommender system were evaluated by using average MAE (mean absolute error). The analysis results confirmed that in case of applying without conditions the in-degree centrality index of trusted network of users(i.e. Trust CF - All), the accuracy (MAE = 0.565134) was lower than conventional CF (MAE = 0.564966). And, in case of applying the in-degree centrality index only to the users with the out-degree centrality above a certain threshold value(i.e. Trust CF - Conditional), the proposed system improved the accuracy a little (MAE = 0.564909) compared to traditional CF. However, the algorithm searching based on the trusted network of users (i.e. Trust CF - Search) was found to show the best performance (MAE = 0.564846). And the result from paired samples t-test presented that Trust CF - Search outperformed conventional CF with 10% statistical significance level. Our study sheds a light on the application of user's trust relationship network information for facilitating electronic commerce by recommending proper items to users.

Social Network-based Hybrid Collaborative Filtering using Genetic Algorithms (유전자 알고리즘을 활용한 소셜네트워크 기반 하이브리드 협업필터링)

  • Noh, Heeryong;Choi, Seulbi;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.2
    • /
    • pp.19-38
    • /
    • 2017
  • Collaborative filtering (CF) algorithm has been popularly used for implementing recommender systems. Until now, there have been many prior studies to improve the accuracy of CF. Among them, some recent studies adopt 'hybrid recommendation approach', which enhances the performance of conventional CF by using additional information. In this research, we propose a new hybrid recommender system which fuses CF and the results from the social network analysis on trust and distrust relationship networks among users to enhance prediction accuracy. The proposed algorithm of our study is based on memory-based CF. But, when calculating the similarity between users in CF, our proposed algorithm considers not only the correlation of the users' numeric rating patterns, but also the users' in-degree centrality values derived from trust and distrust relationship networks. In specific, it is designed to amplify the similarity between a target user and his or her neighbor when the neighbor has higher in-degree centrality in the trust relationship network. Also, it attenuates the similarity between a target user and his or her neighbor when the neighbor has higher in-degree centrality in the distrust relationship network. Our proposed algorithm considers four (4) types of user relationships - direct trust, indirect trust, direct distrust, and indirect distrust - in total. And, it uses four adjusting coefficients, which adjusts the level of amplification / attenuation for in-degree centrality values derived from direct / indirect trust and distrust relationship networks. To determine optimal adjusting coefficients, genetic algorithms (GA) has been adopted. Under this background, we named our proposed algorithm as SNACF-GA (Social Network Analysis - based CF using GA). To validate the performance of the SNACF-GA, we used a real-world data set which is called 'Extended Epinions dataset' provided by 'trustlet.org'. It is the data set contains user responses (rating scores and reviews) after purchasing specific items (e.g. car, movie, music, book) as well as trust / distrust relationship information indicating whom to trust or distrust between users. The experimental system was basically developed using Microsoft Visual Basic for Applications (VBA), but we also used UCINET 6 for calculating the in-degree centrality of trust / distrust relationship networks. In addition, we used Palisade Software's Evolver, which is a commercial software implements genetic algorithm. To examine the effectiveness of our proposed system more precisely, we adopted two comparison models. The first comparison model is conventional CF. It only uses users' explicit numeric ratings when calculating the similarities between users. That is, it does not consider trust / distrust relationship between users at all. The second comparison model is SNACF (Social Network Analysis - based CF). SNACF differs from the proposed algorithm SNACF-GA in that it considers only direct trust / distrust relationships. It also does not use GA optimization. The performances of the proposed algorithm and comparison models were evaluated by using average MAE (mean absolute error). Experimental result showed that the optimal adjusting coefficients for direct trust, indirect trust, direct distrust, indirect distrust were 0, 1.4287, 1.5, 0.4615 each. This implies that distrust relationships between users are more important than trust ones in recommender systems. From the perspective of recommendation accuracy, SNACF-GA (Avg. MAE = 0.111943), the proposed algorithm which reflects both direct and indirect trust / distrust relationships information, was found to greatly outperform a conventional CF (Avg. MAE = 0.112638). Also, the algorithm showed better recommendation accuracy than the SNACF (Avg. MAE = 0.112209). To confirm whether these differences are statistically significant or not, we applied paired samples t-test. The results from the paired samples t-test presented that the difference between SNACF-GA and conventional CF was statistical significant at the 1% significance level, and the difference between SNACF-GA and SNACF was statistical significant at the 5%. Our study found that the trust/distrust relationship can be important information for improving performance of recommendation algorithms. Especially, distrust relationship information was found to have a greater impact on the performance improvement of CF. This implies that we need to have more attention on distrust (negative) relationships rather than trust (positive) ones when tracking and managing social relationships between users.

Enhancing Technology Learning Capabilities for Catch-up and Post Catch-up Innovations (기술학습역량 강화를 통한 추격 및 탈추격 혁신 촉진)

  • Bae, Zong-Tae;Lee, Jong-Seon;Koo, Bonjin
    • The Journal of Small Business Innovation
    • /
    • v.19 no.2
    • /
    • pp.53-68
    • /
    • 2016
  • Motivation and activities for technological learning, entrepreneurship, innovation, and creativity are driving forces of economic development in Asian countries. In the early stages of technological development, technological learning and entrepreneurship are efficient ways in which to catch up with advanced countries because firms can accumulate skills and knowledge quickly at relatively low risk. In the later stages of technological development, however, innovation and creativity become more important. This study aims to identify a) the factors (learning capabilities) that influence technological learning performance and b) barriers to enhancing innovation capabilities for the creative economy and organizations. The major part of this study is related to learning capabilities in the post-catch-up era. Based on a literature review and observations from Korean experiences, this study proposes a technological learning model composed of various influencing factors on technological learning. Three hypotheses are derived, and data are collected from Korean machine tool manufacturers. Intense interviews with CEOs and R&D directors are conducted using structured questionnaires. Statistical analysis, such as correlation and ANOVA are then carried out. Furthermore, this study addresses how to enhance innovation capabilities to move forward. Innovation enablers and barriers are identified by case studies and policy analysis. The results of the empirical study identify several levels of firms' learning capabilities and activities such as a) stock of technology, b) potential of technical labor, c) explicit technological efforts, d) readiness to learn, e) top management support, f) a formal technological learning system, g) high learning motivation, h) appropriate technology choice, and i) specific goal setting. These learning capabilities determine firms' learning performance, especially in the early stages of development. Furthermore, it is found that the critical factors for successful technological learning vary along the stages of technology development. Throughout the statistical and policy analyses, this study confirms that technological learning can be understood as an intrinsic principle of the technology development process. Firms perform proactive and creative learning in the late stages, while reactive and imitative learning prevails in the early stages. In addition, this study identifies the driving forces or facilitating factors enhancing innovation performance in the post catch-up era. The results of the preliminary case studies and policy analysis show some facilitating factors such as a) the strategic intent of the CEO and corporate culture, b) leadership and change agents, c) design principles and routines, d) ecosystem and collaboration with partners, and e) intensive R&D investment.

  • PDF

Comparative Analysis of Anti-Terrorism Act and its Enforcement Ordinance for Counter-Terrorism Activities (대테러 활동을 위한 테러 방지법과 시행령의 비교 분석)

  • Yoon, Hae-Sung
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.259-285
    • /
    • 2016
  • As the need for anti-terrorism legislation has been continuously argued, Anti-terrorism act has been enacted and enforced. On the other hand, there still remain a lot of points to be discussed regarding the definition of the concept of terrorism, matters of human rights violations, strengthening authority of the investigation and intelligence agencies, and mobilization military forces for the suppression of terrorism. Also, reviewing Anti-terrorism act and its enforcement ordinance draft, this legislation seems to regulate terrorist groups like IS. If so, in the case of terrorism of North Korea or domestic anti-government organizations, whether this law would be applied could become an issue. In the case of terrorism of North Korea, Ministry of National Defense has a right of commandership in the military operations, however, it is also possible to apply the article 4 of Natural Security Act a crime of performing objective-or a crime of foreign exchange on Criminal law as legal grounds for not military terrorisms but general investigations. Therefore, it is necessary to involve consideration about this matter. Furthermore, in the view of investigation, Anti-terrorism act and its enforcement ordinance draft do not mention Supreme Prosecutors Office and Ministry of Justice that conduct investigations. In the case of terrorism, the police and prosecution should conduct to arrest criminals and determine crimes at the investigation stage, however, any explicit article related to this content in Anti-terrorism act and its enforcement ordinance draft was unable to be found. Although Anti-terrorism act is certainly toward preventive aspects, considering some matters such as prevention, actions on the scene, maneuver after terrorism, arresting terrorists, investigation direction, cooperation, and mutual assistance, it is necessary to reflect these contents in Anti-terrorism act. In other words, immediately after terrorists attacks, it is possible to mobilize the military operations by Integrated Defense act in order to arrest them in the case of military terrorism. Nevertheless, because both military terrorism and general one are included in the investigation stage, it needs to begin an investigation under the direction of the prosecution. Therefore, above all, a device for finding out the truth behind the case at the investigation stage is not reflected in the current Anti-terrorism act and its enforcement ordinance draft. Accordingly, if National Intelligence Service approaches information at the prevention level in this situation, it may be necessary to come up with follow-up measures of the police, the prosecution, and military units.

  • PDF

Strategic Antitrust Policy Promoting Mergers to Enhance Domestic Competitiveness (기업결합규제(企業結合規制)와 국제경쟁력(國際競爭力))

  • Seong, So-mi
    • KDI Journal of Economic Policy
    • /
    • v.12 no.3
    • /
    • pp.153-172
    • /
    • 1990
  • The present paper investigates the potential value of strategic antitrust policy in an oligopolistic international market. The market is characterized by a non-cooperative Cournot-Nash equilibrium and by asymmetry in costs among firms in the world market. The model is useful for two reasons. First, it is important in the context of policy-making to examine the conditions under which it may be beneficial to relax antitrust law to enhance competitiveness. Second, the explicit derivation of the level of cost-saving required for a gain in total domestic surplus provides an empirical rule for excluding industries that do not satisfy the requirements for a socially beneficial antitrust exemption. Results of the analysis include a criterion that tells how the cost-saving and concentration effects of a merger offset each other. The criterion is derived from fairly general assumptions on demand functions and is simple enough to be applied as a part of the merger guidelines. Another interesting policy implication of our analysis is that promoting mergers would not be a beneficial strategy in a net importing industry where cost-saving opportunities are thin. Cost-saving domestic mergers are more likely to increase national welfare in exporting industries. The best candidate industries for application of strategic antitrust policy are those with the following characteristics: (i) a large potential for efficiency enhancement; (ii) high market concentration at the world but not the domestic level; (iii) a high ratio of exports to imports. Recently, many policymakers and economists in Korea have also come to believe that the appropriate antitrust policy in an era of increased foreign competition may actually be to encourage rather than to prohibit domestic mergers. The Industry Development Act of 1986 and the proposed bill for Mergers and Conversions in the Financial Industry of 1990 reflect this changing perspective on antitrust policy. Antitrust laws may burden domestic firms in the sense that they have a more constrained strategy set. Expenditures to avoid antitrust attacks could also increase costs for domestic firms. But there is no clear evidence that the impact of antitrust policy is significant enough to harm the competitiveness of domestic firms. As a matter of fact, it is necessary for domestic financial institutions to become large in scale in this era of globalization. However, the absence of empirical evidence for efficiency enhancement from mergers suggests caution in the relaxation of antitrust standards.

  • PDF