We investigate the problem of power utility maximization considering risk management and strategy constraints. The aim of this paper is to obtain admissible dynamic portfolio strategies. In case the floor is guaranteed with probability one, we provide two admissible solutions, the option based portfolio insurance in the constrained model, and the alternative method and show that none of the solutions dominate the other. In case the floor is guaranteed partially, we provide one admissible solution, the portfolio insurance with spreads.
Microblogging filtering is intended to filter out irrelevant content, and select useful, new, and timely content from microblogs. However, microblogging filtering suffers from the problem of insufficient samples which renders the probabilistic models unreliable. To mitigate this problem, a novel method is proposed in this study. It is believed that an explicit brief query is only an abstract of the user's information needs, and its difficult to infer users' actual searching intents and interests. Based on this belief, a filtering model is built where the multi-sources query expansion in microblogging filtering is exploited and expanded query is submitted as users interest. To manage the external expansion risk, a user filter graph inference method is proposed, which is characterized by combination of external multi-sources information, and a risk minimization filtering model is introduced to achieve the best reasoning through the multi-sources expansion. A series of experiments are conducted to evaluate the effectiveness of proposed framework on an annotated tweets corpus. The results of these experiments show that our method is effective in tweets retrieval as compared with the baseline standards.
In multimedia consuming, Digital Rights Management (DRM) is the important means to confirm the benefits of both digital contents/services providers and consumers. To keep the DRM system running in order, risk management should be adopted, which identifies and assesses the DRM system's security level. Now, the legitimate sharing of copyrighted digital content is still an open issue, which faces severe risks of propertied assets circumvention and copyright infringements. In this paper, we try to highlight a multi-disciplinary method for all-around examinations on risks to digital assets in the contents sharing scenario. The method is a qualitative and quantitative fuzzy risk assessment, which is used for estimating a novel concept called Risk-Controlled Utility (RCU) in DRM. Then, we emphasize an application case of the emerging trusted computing policy, and analyze the influences of different content sharing modes. Finally, we address a business model with some simulation results. Comparison with other methods shows that the fusion of qualitative and quantitative styles cannot only evaluate the RCU with uncertain risk events effectively, but also provide accurate assessment data for the security policies of DRM.
Housing wealth has been viewed as the main route to asset-based welfare. Accumulated wealth is supposed to provide more in the way of welfare services than just shelter, services such as a net pension and the financing of long-term care. This paper challenges this view and highlights the new risks attached to acquiring and managing housing wealth. Although assets may provide a nest egg in old age, earlier on in the life cycle they leave mortgagers disproportionately exposed to financial and housing market risks and amplify susceptibility to existing social risks such as unemployment or sickness. In contrast to social insurance schemes, assets individualise social risks and leave it to the individual to smooth housing consumption over their life. This lack of risk pooling constitutes a new and hidden social risk that should be considered in the discussion around homeownership.
The paper introduces a novel proposal of a security management system destined primarily for application in the field of IT. Its core is formed by a triplet of cooperating knowledge-based (expert) systems, the knowledge bases of which consist of vague If-Then rules. The knowledge bases were created by experts on the problem domain and multiple times tested and verified on actual scenarios and real systems. With the system, a comprehensive methodology that is a part of a more complex approach to a decision making process is introduced. The proposed fuzzy tool is demonstrated on examples and problems from the area of information security. The paper also briefly reviews other used approaches to information security management - mainly qualitative and quantitative methodologies.
The article describes use of fuzzy logic in the evaluation of nonlimited values at measurement of lightning arresters in telecommunication networks. It describes the application of Γa-cut method and evaluates their electrical parametres and functional features based on the measurement of a selected sample of lightning arresters. and Článek popisuje využití fuzzy logiky v oblasti mimolimitních hodnot při měření bleskojistek nasazených v telekomunikačních sítích. Popisuje aplikaci metody αa-řezů, hodnotí elektrické parametry a funkční vlastnosti bleskojistek založené na měření vybraného vzorku.