Filters








166,985 Hits in 4.3 sec

Solution Models based on Symmetric and Asymmetric Information

Edmundas Kazimieras Zavadskas, Zenonas Turskis, Jurgita Antucheviciene
2019 Symmetry  
We invited authors to submit their theoretical or experimental research presenting engineering and economic problem solution models dealing with the symmetry or asymmetry of different types of information  ...  The authors proposed different solution models as integrated tools to find a balance between the components of sustainable global development, i.e., to find a symmetry axis concerning goals, risks, and  ...  Acknowledgments: The authors express their gratitude to the journal Symmetry for offering an academic platform for researchers to contribute and exchange their recent findings in civil engineering and  ... 
doi:10.3390/sym11040500 fatcat:di4ztqi7s5chdkyjrczsq4zhry

Numerical Studies on Reformulation Techniques for Continuous Network Design with Asymmetric User Equilibria

Michael Ferris, Henry X. Liu
2010 International Journal of Operations Research and Information Systems  
For formal definitions of symmetric and asymmetric UEs, one can refer to Patriksson (1994, equation 2.44).  ...  Nevertheless, the model was based on the symmetry assumption on the lower-level UE problem.  ... 
doi:10.4018/joris.2010101304 fatcat:lzafktkzxffsnjinwj3gqt2tby

Asymmetric Information Supply Chain Models with Credit Option

Xu Zhang, Panlop Zeephongsekul
2013 Industrial Engineering & Management Systems  
Usually, a credit option policy is proposed by the seller, and often under a symmetric information environment where members have complete information on each others' operations.  ...  The proposed model in both scenarios will be investigated under an asymmetric information structure where some information are private and are only known to the individual who has knowledge of this information  ...  Esmaeili et al. (2009) introduced several game-theoretic supply chain models based on symmetric information game, and these were later extended to an asymmetric information scenario in Esmaeili and Zeephongsekul  ... 
doi:10.7232/iems.2013.12.3.264 fatcat:mwmnkgnsq5cvblwt5q2te64epy

Symmetric and Asymmetric Data in Solution Models

Edmundas Kazimieras Zavadskas, Jurgita Antucheviciene, Zenonas Turskis
2021 Symmetry  
This Special Issue covers symmetric and asymmetric data that occur in real-life problems.  ...  We invited authors to submit their theoretical or experimental research to present engineering and economic problem solution models that deal with symmetry or asymmetry of different data types.  ...  Simple symmetrical geometry shapes are safer, more efficient, and more predictable than asymmetrical ones [27] .  ... 
doi:10.3390/sym13061045 fatcat:azojrmaseffp5o75gtzxfehr3a

Prevalence of asymmetrical rupture in small earthquakes and its effect on the estimation of stress drop: a systematic investigation in inland Japan

Keisuke Yoshida
2019 Geoscience Letters  
The stress drops of the earthquakes estimated by considering asymmetrical rupture propagation were 16.8 MPa, which are almost twice the estimates based on the commonly used symmetrical rupture model.  ...  The prevailing rupture directivity can provide useful information on source parameters including the fault size, fault geometry, and rupture velocity of small earthquakes.  ...  I thank the following individuals for providing comments on the first draft of the manuscript: Tatsuhiko Saito, Taka'aki Taira, Ryota Takagi, and Yoshiaki Matsumoto.  ... 
doi:10.1186/s40562-019-0145-z fatcat:c4d62xg3n5fphnbvk5hcam7uhy

Dimension Transform Based Efficient Event Filtering for Symmetric Publish/Subscribe System [chapter]

Botao Wang, Masaru Kitsuregawa
2005 Lecture Notes in Computer Science  
By extending the existing data model and algorithm, we propose an event matching method for symmetric publish/subscribe system based on dimension transform regarding the query in multidimensional space  ...  The results show that, our proposal outperforms the other possible solutions in one or two orders of magnitude.  ...  The performance difference between MLGF-based solution and UBTree-based solution becomes larger with increasement of Ac's size.  ... 
doi:10.1007/11546924_77 fatcat:5i4cs6qdcjfrlpb5mpp46ghbwe

SCM Implementation Decisions of Principal-Agent under Asymmetric Information

Lina Wang, Stephan Poelmans, Koen Milis
2019 Open Journal of Applied Sciences  
The optimization investment policy decision of SCM-Supply Chain Management-implementation has been analysed under symmetric and asymmetric information conditions.  ...  Based upon the principal-agent theory, the models show to what extent a principal (a client) needs to pay more to an agent (a vendor) in a context of asymmetric information.  ...  system's construction based on middle-micro scale.  ... 
doi:10.4236/ojapps.2019.94014 fatcat:ncp2oveqt5hwldmxjsshtl2kw4

A New NSIS Application for LSP Setup with Security Features

S. Greco Polito, D. Gebbers, M. Chamania, A. Jukan
2010 2010 IEEE International Conference on Communications  
Connection-oriented path setup is becoming one of the key features of the next-generation Internet with the Multi-Protocol Label Switched (MPLS) framework and its generalized version GMPLS addressing the  ...  We design an NSIS application called NSIS-LSP which takes advantage of the NSIS transport security features and has own features for application layer authentication.  ...  We proposed a new signaling solution based on the NSIS protocol that supports both symmetric and asymmetric key-based mechanisms for mutual authentication between source and all provisioning domains.  ... 
doi:10.1109/icc.2010.5502672 dblp:conf/icc/PolitoGCJ10 fatcat:7iyqytr3fzdrzgbedjposkcnaq

Cooperative Communication in Cognitive Radio Networks under Asymmetric Information: A Contract-Theory Based Approach

Nan Zhao, Minghu Wu, Wei Xiong, Cong Liu
2015 International Journal of Distributed Sensor Networks  
The optimal contract design under both symmetric information and asymmetric information is presented based on contract theory.  ...  In this paper, the incentive issue between relay nodes' (RNs') service and source's relay selection is investigated in the presence of the asymmetric information scenario.  ...  HBSKFMS2014033), and Ph.D. Research Startup Foundation of Hubei University of Technology (no. BSQD13029).  ... 
doi:10.1155/2015/676195 fatcat:mdiu4qg2h5gfrlljsth4oloigq

Seriation and Multidimensional Scaling: A Data Analysis Approach to Scaling Asymmetric Proximity Matrices

Joseph Lee Rodgers, Tony D. Thompson
1992 Applied Psychological Measurement  
A number of model-based scaling methods have been developed that apply to asymmetric proximity matrices.  ...  The MDS solution contains directed distances, which define an "extra" Author's Address Send requests for reprints or further information to  ...  Acknowledgments Earlier versions of this work were presented at the meetings of the Psychometric Society in Montreal in 1987 and in Los Angeles in 1988.  ... 
doi:10.1177/014662169201600201 fatcat:xvzwggyodrdozbfvshy6qke6zy

Assessing the Effects of Symmetry on Motif Discovery and Modeling

Lala M. Motlhabi, Gary D. Stormo, Peter Csermely
2011 PLoS ONE  
finding algorithms on both symmetric and asymmetric binding site data.  ...  We show that if the true binding site is asymmetric the results are unambiguous and the asymmetric model is clearly superior to the symmetric model.  ...  Acknowledgments We thank all members of the Stormo lab for helpful discussions and suggestions regarding this work. We especially thank Mohammed Khan for help with the site sampling program.  ... 
doi:10.1371/journal.pone.0024908 pmid:21949783 pmcid:PMC3176789 fatcat:gjnadjvhyjh3zh7coons7vjgbq

Crypto Cloud Computing with Symmetric and Asymmetric Cryptography for Information Security and Storage

2020 International journal of recent technology and engineering  
Cryptography and crypto cloud computing plays major role in secure transfer and storage of information.  ...  The resources and the services that the cloud provides are attractive for the users and are distinct from one cloud provider to another.  ...  The figure below classifies the cryptographic algorithms based on the key usage and further classifies the type of algorithms as symmetric and asymmetric. Revised Fig.2.  ... 
doi:10.35940/ijrte.d4387.018520 fatcat:meexkeqjvrh7zny2f3xkuwiyky

Effects of imperfect quality items in the asymmetric information structure in supply chain model

Rita Yadav, Sarla Pareek, Mandeep Mittal, Sumil Mehta
2018 Uncertain Supply Chain Management  
This paper studies supply chain model of imperfect quality items under asymmetric information in which unit price taken by the buyer and unit marketing expenditure are influencing product's demand.  ...  Most of the supply chain models have been developed under symmetric information structure i.e. players have complete knowledge of each other's policies.  ...  None of the authors worked on the imperfect quality items in supply chain models with symmetric and asymmetric information structure.  ... 
doi:10.5267/j.uscm.2017.11.002 fatcat:dlxcgvamx5fs3n7oqh4aztysge

Investment Timing with Incentive-Disincentive Contracts under Asymmetric Information

Takashi Shibata, Michi Nishihara
2012 Technology and Investment  
Investment timing is delayed more under asymmetric information than under symmetric information.  ...  Consequently, by adopting an enlarged set of incentive-disincentive contracts framework, we showed that there is a relationship between the symmetric and asymmetric information problems. standard real  ...  As the penalty becomes sufficiently large, the solution in the disincentive-only region in the asymmetric information model converges to in the symmetric information model developed by MS.  ... 
doi:10.4236/ti.2012.32011 fatcat:nbw4mjtjmzgkvli6fq3m4wkb6i

Pricing Decisions in Closed-Loop Supply Chains with Peer-Induced Fairness Concerns

Yadong Shu, Ying Dai, Zujun Ma
2019 Sustainability  
with symmetrical and asymmetrical information of fairness concerns, respectively.  ...  By considering fairness concerns and selecting Nash bargain solution as the reference point of fairness distribution, this paper studies the equilibrium solution of Stackelberg game models in the CLSC  ...  Section 4 establishes a fairness-concerned utility system based on Nash bargain theory and studies the equilibrium solution when there is symmetrical and asymmetrical information.  ... 
doi:10.3390/su11185071 fatcat:pjjhaynfazbbth33kc3dxw6iuq
« Previous Showing results 1 — 15 out of 166,985 results