• Title/Summary/Keyword: exclusive set

Search Result 94, Processing Time 0.028 seconds

Genetic-Based Combinatorial Optimization Method for Design of Rolling Element Bearing (구름 베어링 설계를 위한 유전 알고리듬 기반 조합형 최적설계 방법)

  • 윤기찬;최동훈;박창남
    • Proceedings of the Korean Society of Tribologists and Lubrication Engineers Conference
    • /
    • 2001.11a
    • /
    • pp.166-171
    • /
    • 2001
  • In order to improve the efficiency of the design process and the quality of the resulting design for the application-based exclusive rolling element bearings, this study propose design methodologies by using a genetic-based combinatorial optimization. By the presence of discrete variables such as the number of rolling element (standard component) and by the engineering point of views, the design problem of the rolling element bearing can be characterized by the combinatorial optimization problem as a fully discrete optimization. A genetic algorithm is used to efficiently find a set of the optimum discrete design values from the pre-defined variable sets. To effectively deal with the design constraints and the multi-objective problem, a ranking penalty method is suggested for constructing a fitness function in the genetic-based combinatorial optimization. To evaluate the proposed design method, a robust performance analyzer of ball bearing based on quasi-static analysis is developed and the computer program is applied to some design problems, 1) maximize fatigue life, 2) maximize stiffness, 3) maximize fatigue life and stiffness, of a angular contact ball bearing. Optimum design results are demonstrate the effectiveness of the design method suggested in this study. It believed that the proposed methodologies can be effectively applied to other multi-objective discrete optimization problems.

  • PDF

Probabilistic Location Choice and Markovian Industrial Migration a Micro-Macro Composition Approach

  • Jeong, Jin-Ho
    • Journal of the Korean Regional Science Association
    • /
    • v.11 no.1
    • /
    • pp.31-60
    • /
    • 1995
  • The distribution of economic activity over a mutually exclusive and exhaustive categorical industry-region matrix is modeled as a composition of two random components: the probability-like share distribution of jobs and the dynamic evolution of absolute aggregates. The former describes the individual activity location choice by comparing the predicted profitability of the current industry-region pair against that of all other alternatives based on the available information on industry-specific, region specific, or activity specific attributes. The latter describes the time evolution of macro-level aggregates using a dynamic reduced from model. With the seperation of micro choice behavior and macro dynamic aggregate constraint, the usual independence and identicality assumptions become consistent with the activity share distribution, hence multi-regional industrial migration can be represented by a set of probability evolution equations in a conservative Markovian from. We call this a Micro-Macro Composition Approach since the product of the aggregate prediction and the predicted activity share distribution gives the predicted activity distribution gives the predicted activity distribution which explicitly considers the underlying individual choice behavior. The model can be applied to interesting practical problems such as the plant location choice of multinational enterprise, the government industrial ploicy to attract international firms, and the optimal tax-transfer mix to influence activity location choice. We consider the latter as an example.

  • PDF

Efficient Continuous Skyline Query Processing Scheme over Large Dynamic Data Sets

  • Li, He;Yoo, Jaesoo
    • ETRI Journal
    • /
    • v.38 no.6
    • /
    • pp.1197-1206
    • /
    • 2016
  • Performing continuous skyline queries of dynamic data sets is now more challenging as the sizes of data sets increase and as they become more volatile due to the increase in dynamic updates. Although previous work proposed support for such queries, their efficiency was restricted to small data sets or uniformly distributed data sets. In a production database with many concurrent queries, the execution of continuous skyline queries impacts query performance due to update requirements to acquire exclusive locks, possibly blocking other query threads. Thus, the computational costs increase. In order to minimize computational requirements, we propose a method based on a multi-layer grid structure. First, relational data object, elements of an initial data set, are processed to obtain the corresponding multi-layer grid structure and the skyline influence regions over the data. Then, the dynamic data are processed only when they are identified within the skyline influence regions. Therefore, a large amount of computation can be pruned by adopting the proposed multi-layer grid structure. Using a variety of datasets, the performance evaluation confirms the efficiency of the proposed method.

On the set up to the Number of Hidden Node of Adaptive Back Propagation Neural Network (적응 역전파 신경회로망의 은닉 층 노드 수 설정에 관한 연구)

  • Hong, Bong-Wha
    • The Journal of Information Technology
    • /
    • v.5 no.2
    • /
    • pp.55-67
    • /
    • 2002
  • This paper presents an adaptive back propagation algorithm that update the learning parameter by the generated error, adaptively and varies the number of hidden layer node. This algorithm is expected to escaping from the local minimum and make the best environment for convergence to be change the number of hidden layer node. On the simulation tested this algorithm on two learning pattern. One was exclusive-OR learning and the other was $7{\times}5$ dot alphabetic font learning. In both examples, the probability of becoming trapped in local minimum was reduce. Furthermore, in alphabetic font learning, the neural network enhanced to learning efficient about 41.56%~58.28% for the conventional back propagation. and HNAD(Hidden Node Adding and Deleting) algorithm.

  • PDF

An Establishment of Guideline and Evaluation Items for Before-and-After Study in Railroad Construction Projects (철도건설공사 사후평가 항목 및 지침 수립방안)

  • Kim, Yeon Kyu
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.2D
    • /
    • pp.315-322
    • /
    • 2011
  • The Korea government set a Act called as Before and After Study for a huge SOC projects in order to check their feasibility again at the time of design, construction and completion period. However, the evaluation items and analysis method are so vague that its effectiveness has been challenged. Especially railroad projects need to be evaluated differently by railroad construction types and rolling stocks. This paper suggests the evaluation items as a common items and exclusive items on the type of construction and rolling stocks. Also data collection in the standardized form and GIS techniques and are introduced to analyze evaluation items effectively.

A Study on the Activation of Arbitration System for Entertainment Disputes Resolution (엔터테인먼트분쟁 해결을 위한 중재제도의 활성화 방안)

  • Kim, Sang-Chan
    • Journal of Arbitration Studies
    • /
    • v.23 no.1
    • /
    • pp.85-105
    • /
    • 2013
  • The entertainment industry has developed along with current Korean wave fever, and so entertainment-related disputes are increasing rapidly. Litigation is a poor fit for entertainment disputes because of characteristics such as temporal sensitivity. Thus, in the US, the entertainment industry resolves these disputes through ADR mechanisms like arbitration, but cases of settling such disputes through arbitrations are very rare in Korea. This study examined the characteristics and types of entertainment disputes and considered the compatibility of arbitration as a method for settling disputes, and then suggested tasks for revitalizing arbitration systems as entertainment dispute resolution procedures. Arbitrations have many merits, such as the rapid pace of procedures, confidentiality, satisfying the long-term desires of business relationships, the low cost of settling disputes, judgments rendered by experts, etc.; thus, it is a very suitable mechanism to settle entertainment-related disputes. The study proposes necessary steps for revitalizing arbitration systems for entertainment disputes. First, awareness of entertainment industry workers about the arbitration system should be raised. Second, special educational programs for members the of Korean Commercial Arbitration Board related to entertainment should be set up and operated together with encouraging positive attitudes toward actions like establishing a dedicated arbitration unit on entertainment disputes. Third, neutral, professional arbitrators should be secured and aggressive disclosures made. Fourth, a professional ADR organization such as an "Entertainment Arbitration Committee" should be established.

  • PDF

Web3.0 Metaverse Business Model Innovation of Sports Media

  • Song, Minzheong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.64-76
    • /
    • 2024
  • We study three sports media start-ups that seek to promote business model innovation (BMI) in which Web 3.0 and metaverse are converged. In results, LM starts from an innovative digital space platform offering a unique combination of virtual real estate, games, and non-fungible tokens (NFTs) which come with real-world earning potential. It creates value by integrating virtual real estate, training academies, blockchain games, and meta shops to offer a unique experience, capture value by offering monetization tools for buying and trading limited edition NFTs of favorite influencers from various sports leagues, offering access to premier real-world events and VIP game contests, and delivers value by building community to play games with favorite athletes or teams including trivia games, allowing fans to engage with their favorite athletes in a unique exclusive way. SL starts from the customizable digital identities especially for young sports fans like generation (gen) Z to play, hang out, and express themselves with their own avatars. SI starts from a leading Web3.0 metaverse innovator creating NFTs with the greatest athletes of all time, allowing athletes and creators to set up a profile and mint NFTs directly onto the blockchain. It tries to have the partnerships with great athletes revolutionizing the sports media industry to connect sports heroes and their super fans through an immersive, artistic, inspirational NFTs and unlockable content creating a sticky community between them.

A Study on the Construction of the Multiple Fishery Cooperation System Between Korea, China and Japan (한.중.일 다자간 어업협력체 구성방안 연구)

  • Shim, Ho-Jin
    • The Journal of Fisheries Business Administration
    • /
    • v.39 no.2
    • /
    • pp.81-108
    • /
    • 2008
  • Since the declaration made by UN Convention on the Law of the Sea on EEZs, The open seas of Northeast Asia, considerd as a convention area, needed new agreements in conformity with the changes brought by the introduction of the Exclusive Economic Zone(EEZ) system. The Contracting Parties of these agreements set up their own EEZs, which extend certain ranges from their baselines, Fishing in the other party's EEZ is done based on mutual agreements, which take into account traditional fishing activity in the zones. Seperate fishries management systems, in accordance with the relevant legal status of the waters, are applied to individual overlapping areas: Middle Zone in the Bast Sea and the waters south of jeju Island, Interim Measure Zone in the Yellow Sea and East China Sea, and the Transitional Zone in the Yellow Sea. They decided to conclude fisheries agreements as the provisional agreement under Article 74(3) of the UN Convention before the delimitations of the EEZs to avoid the territorial disputes. China and Japan concluded the Fishries Agreement in the November 1997, allowing each coastal State 52 mile EEZ. it was followed by Korea and Japan in September 1998, reaching a final compromise. And also Korea and China came to a satisfactary settlement in November 1998. Fisheries agreements have been established between the three North-east Asian States, the agreement are all bilateral. That implies inefficient resource management on the overlapping waters of the three states, especially on the East China Sea. The Korea-Japan Fisheries Agreement and the China-Japan Fishery Agreement worked as governing rules in the North-east Asian seas before the establishment of EEZs (Exclusive Economic Zones). However the conclusion of the bilateral fishery agreements, Korea China and Japan have developed EEZs, and these three countries have competed for the exploitation of fisheries resources. Therefore, the issue of fisheries resource management was no longer a single countries' problem and emerged as a common issue facing these three countries. In recognition of the above-mentioned problem, it is needed for the construction of cooperative System fishery management in the North-east Asian seas. Therefore, cooperative measures should be establishied. The final goal of the construction of fisheries management cooperative system is to establish sustainable fisheries in the North-east Asian seas. However, there is a big difference in fisheries management tools, fishing gear, exploitation rate of species, etc. This implies that a careful approach should be taken in order to achieve the cooperative fisheries management among Korea, China and Japan. conclusionly, the Governments of Korea, China and Japan should complement three bilateral agreemens, and which they prepares to 'Fisheries Resource Restore Program' Between Korea, China and Japan in the adjacent waters south of Jeju Island.

  • PDF

The effect of Territorial Restraint in Food&Beverage Similar Brand Extension (외식 프랜차이즈 거래에서 지역제한(Territorial Restraint)이 가맹본사의 브랜드 확장에 미치는 영향)

  • Lim, Chae-Un;Lee, Joseph;Yi, Ho-Taek
    • Journal of Distribution Research
    • /
    • v.15 no.5
    • /
    • pp.217-235
    • /
    • 2010
  • In franchise industry, territorial restraint is a system that imposes exclusive right to franchisers in a certain business area. To the franchisers, this system guarantees monopoly profits in a local market and exclusive rights during the contract periods. In such a way, franchisee generates a big revenue at once on the basis of franchiser's initial investment such as interior cost and franchise fee, it must have supervised franchiser's moral hazard for the territorial restraint agreement. Rather than territorial restraint can be a system to give exclusive right to franchiser's so that they neglect their own sales and too much rely on headquarter's brand and marketing activities without their own efforts. This paper assesses the implication of territorial restraint by examining the effect on brand extension, degree of contract termination. Drawing on research in transaction cost agreement and opportunism, the authors suggest that franchisee is highly likely to launch similar brand which is not effected on previous contract when territorial restraint is set out in the contract system. Moreover, the authors find that the degree of contract termination will be high in the existence of territorial restraint due to the franchisee's opportunism. The results imply that territorial restraint induces franchisee's opportunistic strategy more aggressively so that the possibility of brand extension or new brand launching will be increased. At the same time, franchisee is aggressively seeking for the reason for contract termination due to the pursuit of its profit maximization. Based on some empirical findings, this paper concludes with policy implications and some necessary fields of future studies desirable.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.