期刊文献+
共找到332篇文章
< 1 2 17 >
每页显示 20 50 100
Games theory and the development of research paper publishing
1
作者 ZHOU Leping 《International English Education Research》 2018年第4期84-87,共4页
Along with rapid development of Chinese university, series of disadvantages are brought in research papers publishing. From the study of Games theory, this article tries to find out a way to adjust the rules of the ga... Along with rapid development of Chinese university, series of disadvantages are brought in research papers publishing. From the study of Games theory, this article tries to find out a way to adjust the rules of the game, to refine the science research environment, improve the quality of research paper, and then realize the sustainable development of Chinese universities. 展开更多
关键词 games theory UNIVERSITIES research paper
下载PDF
A Data Intrusion Tolerance Model Based on an Improved Evolutionary Game Theory for the Energy Internet 被引量:1
2
作者 Song Deng Yiming Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第6期3679-3697,共19页
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suf... Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources. 展开更多
关键词 Energy Internet Intrusion tolerance game theory racial competition adaptive intrusion response
下载PDF
Game theory attack pricing for mining pools in blockchain-based IoT
3
作者 Yourong Chen Hao Chen +3 位作者 Zhenyu Xiong Banteng Liu Zhangquan Wang Meng Han 《Digital Communications and Networks》 SCIE CSCD 2024年第4期973-988,共16页
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize t... The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP. 展开更多
关键词 Game theory Blockchain PoW Mining pool Employment attack
下载PDF
Game theory in network security for digital twins in industry
4
作者 Hailin Feng Dongliang Chen +1 位作者 Haibin Lv Zhihan Lv 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1068-1078,共11页
To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From ... To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From the perspective of the life cycle of network vulnerabilities,mining and repairing vulnerabilities are analyzed by applying evolutionary game theory.The evolution process of knowledge sharing among white hats under various conditions is simulated,and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed.On this basis,the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm(WCA)to produce better replacement individuals with greater probability from the perspective of both attack and defense.Through the simulation experiment,it is found that the convergence speed of the probability(X)of white Hat 1 choosing the knowledge sharing policy is related to the probability(x0)of white Hat 2 choosing the knowledge sharing policy initially,and the probability(y0)of white hat 2 choosing the knowledge sharing policy initially.When y0?0.9,X converges rapidly in a relatively short time.When y0 is constant and x0 is small,the probability curve of the“cooperative development”strategy converges to 0.It is concluded that the higher the trust among the white hat members in the temporary team,the stronger their willingness to share knowledge,which is conducive to the mining of loopholes in the system.The greater the probability of a hacker attacking the vulnerability before it is fully disclosed,the lower the willingness of manufacturers to choose the"cooperative development"of vulnerability patches.Applying the improved wolf colonyco-evolution algorithm can obtain the equilibrium solution of the"attack and defense game model",and allocate the security protection resources according to the importance of nodes.This study can provide an effective solution to protect the network security for digital twins in the industry. 展开更多
关键词 Digital twins Industrial internet of things Network security Game theory Attack and defense
下载PDF
Diversified and compatible web APIs recommendation based on game theory in IoT
5
作者 Wenwen Gong Huiping Wu +4 位作者 Xiaokang Wang Xuyun Zhang Yawei Wang Yifei Chen Mohammad R.Khosravi 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1198-1209,共12页
With the ever-increasing popularity of Internet of Things(IoT),massive enterprises are attempting to encapsulate their developed outcomes into various lightweight Web Application Programming Interfaces(APIs)that can b... With the ever-increasing popularity of Internet of Things(IoT),massive enterprises are attempting to encapsulate their developed outcomes into various lightweight Web Application Programming Interfaces(APIs)that can be accessible remotely.In this context,finding and writing a list of existing Web APIs that can collectively meet the functional needs of software developers has become a promising approach to economically and easily develop successful mobile applications.However,the number and diversity of candidate IoT Web APIs places an additional burden on application developers’Web API selection decisions,as it is often a challenging task to simultaneously ensure the diversity and compatibility of the final set of Web APIs selected.Considering this challenge and latest successful applications of game theory in IoT,a Diversified and Compatible Web APIs Recommendation approach,namely DivCAR,is put forward in this paper.First of all,to achieve API diversity,DivCAR employs random walk sampling technique on a pre-built“API-API”correlation graph to generate diverse“API-API”correlation subgraphs.Afterwards,with the diverse“API-API”correlation subgraphs,the compatible Web APIs recommendation problem is modeled as a minimum group Steiner tree search problem.A sorted set of multiple compatible and diverse Web APIs are returned to the application developer by solving the minimum group Steiner tree search problem.At last,a set of experiments are designed and implemented on a real dataset crawled from www.programmableweb.com.Experimental results validate the effectiveness and efficiency of our proposed DivCAR approach in balancing the Web APIs recommendation diversity and compatibility. 展开更多
关键词 Internet of things Web APIs recommendation Game theory Diversity and compatibility
下载PDF
Network Defense Decision-Making Based on Deep Reinforcement Learning and Dynamic Game Theory
6
作者 Huang Wanwei Yuan Bo +2 位作者 Wang Sunan Ding Yi Li Yuhua 《China Communications》 SCIE CSCD 2024年第9期262-275,共14页
Existing researches on cyber attackdefense analysis have typically adopted stochastic game theory to model the problem for solutions,but the assumption of complete rationality is used in modeling,ignoring the informat... Existing researches on cyber attackdefense analysis have typically adopted stochastic game theory to model the problem for solutions,but the assumption of complete rationality is used in modeling,ignoring the information opacity in practical attack and defense scenarios,and the model and method lack accuracy.To such problem,we investigate network defense policy methods under finite rationality constraints and propose network defense policy selection algorithm based on deep reinforcement learning.Based on graph theoretical methods,we transform the decision-making problem into a path optimization problem,and use a compression method based on service node to map the network state.On this basis,we improve the A3C algorithm and design the DefenseA3C defense policy selection algorithm with online learning capability.The experimental results show that the model and method proposed in this paper can stably converge to a better network state after training,which is faster and more stable than the original A3C algorithm.Compared with the existing typical approaches,Defense-A3C is verified its advancement. 展开更多
关键词 A3C cyber attack-defense analysis deep reinforcement learning stochastic game theory
下载PDF
Risk assessment of high-speed railway CTC system based on improved game theory and cloud model
7
作者 Yanhao Sun Tao Zhang +2 位作者 Shuxin Ding Zhiming Yuan Shengliang Yang 《Railway Sciences》 2024年第3期388-410,共23页
Purpose-In order to solve the problem of inaccurate calculation of index weights,subjectivity and uncertainty of index assessment in the risk assessment process,this study aims to propose a scientific and reasonable c... Purpose-In order to solve the problem of inaccurate calculation of index weights,subjectivity and uncertainty of index assessment in the risk assessment process,this study aims to propose a scientific and reasonable centralized traffic control(CTC)system risk assessment method.Design/methodologylapproach-First,system-theoretic process analysis(STPA)is used to conduct risk analysis on the CTC system and constructs risk assessment indexes based on this analysis.Then,to enhance the accuracy of weight calculation,the fuzzy analytical hierarchy process(FAHP),fuzzy decision-making trial and evaluation laboratory(FDEMATEL)and entropy weight method are employed to calculate the subjective weight,relative weight and objective weight of each index.These three types of weights are combined using game theory to obtain the combined weight for each index.To reduce subjectivity and uncertainty in the assessment process,the backward cloud generator method is utilized to obtain the numerical character(NC)of the cloud model for each index.The NCs of the indexes are then weighted to derive the comprehensive cloud for risk assessment of the CTC system.This cloud model is used to obtain the CTC system's comprehensive risk assessment.The model's similarity measurement method gauges the likeness between the comprehensive risk assessment cloud and the risk standard cloud.Finally,this process yields the risk assessment results for the CTC system.Findings-The cloud model can handle the subjectivity and fuzziness in the risk assessment process well.The cloud model-based risk assessment method was applied to the CTC system risk assessment of a railway group and achieved good results.Originality/value-This study provides a cloud model-based method for risk assessment of CTC systems,which accurately calculates the weight of risk indexes and uses cloud models to reduce uncertainty and subjectivity in the assessment,achieving effective risk assessment of CTC systems.It can provide a reference and theoretical basis for risk management of the CTC system. 展开更多
关键词 High-speed railway Centralized traffic control Risk assessment Game theory Cloud model Paper type Research paper
下载PDF
Game Theory Based Model for Predictive Analytics Using Distributed Position Function
8
作者 Mirhossein Mousavi Karimi Shahram Rahimi 《International Journal of Intelligence Science》 2024年第1期22-47,共26页
This paper presents a game theory-based method for predicting the outcomes of negotiation and group decision-making problems. We propose an extension to the BDM model to address problems where actors’ positions are d... This paper presents a game theory-based method for predicting the outcomes of negotiation and group decision-making problems. We propose an extension to the BDM model to address problems where actors’ positions are distributed over a position spectrum. We generalize the concept of position in the model to incorporate continuous positions for the actors, enabling them to have more flexibility in defining their targets. We explore different possible functions to study the role of the position function and discuss appropriate distance measures for computing the distance between the positions of actors. To validate the proposed extension, we demonstrate the trustworthiness of our model’s performance and interpretation by replicating the results based on data used in earlier studies. 展开更多
关键词 Distributed Position Function Game theory Group Decision Making Predictive Analytics
下载PDF
Game Theory Optimization via Diverse Genetic Crossover Intelligence
9
作者 David Webb Eric Sandgren 《Journal of Applied Mathematics and Physics》 2024年第10期3315-3327,共13页
Game theory is explored via a maze application where combinatorial optimization occurs with the objective of traversing through a defined maze with an aim to enhance decision support and locate the optimal travel sequ... Game theory is explored via a maze application where combinatorial optimization occurs with the objective of traversing through a defined maze with an aim to enhance decision support and locate the optimal travel sequence while minimizing computation time. This combinatorial optimization approach is initially demonstrated by utilizing a traditional genetic algorithm (GA), followed by the incorporation of artificial intelligence utilizing embedded rules based on domain-specific knowledge. The aim of this initiative is to compare the results of the traditional and rule-based optimization approaches with results acquired through an intelligent crossover methodology. The intelligent crossover approach encompasses a two-dimensional GA encoding where a second chromosome string is introduced within the GA, offering a sophisticated means for chromosome crossover amongst selected parents. Additionally, parent selection intelligence is incorporated where the best-traversed paths or population members are retained and utilized as potential parents to mate with parents selected within a traditional GA methodology. A further enhancement regarding the utilization of saved optimal population members as potential parents is mathematically explored within this literature. 展开更多
关键词 Crossover Intelligence Game theory Maze Navigation Genetic Optimization
下载PDF
On Ethical Literary Criticism and Game Theory--An Interview with Professor Nie Zhenzhao
10
作者 HUANG Kai-hong NIE Zhen-zhao HE Qiong(Translator) 《Journal of Literature and Art Studies》 2024年第3期207-214,共8页
In 2014,Huang Kaihong,a professor at School of Foreign Languages and Cultures,Southwest University of Science and Technology,interviewed the Doctoral advisor Professor Nie Zhenzhao during the period of his academic vi... In 2014,Huang Kaihong,a professor at School of Foreign Languages and Cultures,Southwest University of Science and Technology,interviewed the Doctoral advisor Professor Nie Zhenzhao during the period of his academic visiting to Central China Normal University.As early as in 2005,Huang Kaihong conducted an interview with Professor Nie Zhenzhao on the topic of the general introduction of ethical literary criticism.So around 11 years later,the second interview mainly covers not only the ethical literary criticism theory,but the game theory and the relationship between them as well.Professor Nie thinks whether the game theory can be applied to literature research is still under discussion.The theory of ethical literary criticism is a kind of methodology based on science and it can get the attention of literary critics at home and abroad,which is because it fits the practical needs of literary criticism,draws the literary criticism away from only emphasizing criticism genres and the research of criticism terms,and pays attention to the true nature of the literary text in literature research.After consulting Professor Nie Zhenzhao about some related questions from the perspective of game theory.Huang Kaihong gets some significant information concerning literature research and understands the latest core terms and the concrete application method of ethical literary criticism,especially the relationship between the instructing and aesthetic functions of literature. 展开更多
关键词 ethical literary criticism game theory relationship methodology application
下载PDF
MULTIOBJECTIVE OPTIMIZATION OF EIGHT-DOF VEHICLE SUSPENSION BASED ON GAME THEORY
11
作者 宋崇智 赵又群 +1 位作者 谢能刚 王璐 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2010年第2期138-147,共10页
A systematic and effective optimization is proposed for the design of a three-dimensional (3-D) vehicle suspension model with eight degrees of freedom (DOF), including vertical seat motion, vehicle suspension, pit... A systematic and effective optimization is proposed for the design of a three-dimensional (3-D) vehicle suspension model with eight degrees of freedom (DOF), including vertical seat motion, vehicle suspension, pitching and rolling motions, and vertical wheel motions using the evolutionary game theory. A new design of the passive suspension is aided by game theory to attain the best compromise between ride quality and suspension deflections. Extensive simulations are performed on three type road surface models A, B, C pavement grades based on the guidelines provided by ISO-2631 with the Matlab/Simulink environment. The preliminary results show that, when the passive suspension is optimized via the proposed approach, a substantial improvement in the vertical ride quality is obtained while keeping the suspension deflections within their allowable clearance when the vehicle moves at a constant velocity v=20 m/s, and the comfort performance of a suspension seat can be enhanced by 20%-30%. 展开更多
关键词 vehicle suspensions multiobjective optimization game theory riding comfort
下载PDF
Air combat decision-making of multiple UCAVs based on constraint strategy games 被引量:12
12
作者 Shou-yi Li Mou Chen +1 位作者 Yu-hui Wang Qing-xian Wu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2022年第3期368-383,共16页
Game theory can be applied to the air combat decision-making problem of multiple unmanned combat air vehicles(UCAVs).However,it is difficult to have satisfactory decision-making results completely relying on air comba... Game theory can be applied to the air combat decision-making problem of multiple unmanned combat air vehicles(UCAVs).However,it is difficult to have satisfactory decision-making results completely relying on air combat situation information,because there is a lot of time-sensitive information in a complex air combat environment.In this paper,a constraint strategy game approach is developed to generate intelligent decision-making for multiple UCAVs in complex air combat environment with air combat situation information and time-sensitive information.Initially,a constraint strategy game is employed to model attack-defense decision-making problem in complex air combat environment.Then,an algorithm is proposed for solving the constraint strategy game based on linear programming and linear inequality(CSG-LL).Finally,an example is given to illustrate the effectiveness of the proposed approach. 展开更多
关键词 Game theory Time-sensitive information Constraint strategy games Polytope strategy games Multiple UCAVs Air combat decision-making
下载PDF
Analysis on stability of strategic alliance: A game theory perspective 被引量:11
13
作者 CHEN Fei-qiong FAN Liang-cong 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第12期1995-2001,共7页
Strategic alliance has suffered much instabilities since its first implementation. Scholars have carried out many em- bedded, precise and comprehensive researches from both theory and empiricism. Here we try to find c... Strategic alliance has suffered much instabilities since its first implementation. Scholars have carried out many em- bedded, precise and comprehensive researches from both theory and empiricism. Here we try to find certain stable solutions by employing game theory, in an attempt to construct theoretical bases for strategic alliance, which people called “one of the most important organizational innovation in the end of the 20th century” (Shi, 2001), to exploit its advantages in the process of glob- alization. Finally, this article puts forward some advices for its success. 展开更多
关键词 Strategic alliance STABILITY Game theory Stable solution
下载PDF
Dynamic Multi-team Antagonistic Games Model with Incomplete Information and Its Application to Multi-UAV 被引量:8
14
作者 Wenzhong Zha Jie Chen Zhihong Peng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第1期74-84,共11页
At present, the studies on multi-team antagonistic games (MTAGs) are still in the early stage, because this complicated problem involves not only incompleteness of information and conflict of interests, but also selec... At present, the studies on multi-team antagonistic games (MTAGs) are still in the early stage, because this complicated problem involves not only incompleteness of information and conflict of interests, but also selection of antagonistic targets. Therefore, based on the previous researches, a new framework is proposed in this paper, which is dynamic multi-team antagonistic games with incomplete information (DMTAGII) model. For this model, the corresponding concept of perfect Bayesian Nash equilibrium (PBNE) is established and the existence of PBNE is also proved. Besides, an interactive iteration algorithm is introduced according to the idea of the best response for solving the equilibrium. Then, the scenario of multiple unmanned aerial vehicles (UAVs) against multiple military targets is studied to solve the problems of tactical decision making based on the DMTAGII model. In the process of modeling, the specific expressions of strategy, status and payoff functions of the games are considered, and the strategy is coded to match the structure of genetic algorithm so that the PBNE can be solved by combining the genetic algorithm and the interactive iteration algorithm. Finally, through the simulation the feasibility and effectiveness of the DMTAGII model are verified. Meanwhile, the calculated equilibrium strategies are also found to be realistic, which can provide certain references for improving the autonomous ability of UAV systems. © 2014 Chinese Association of Automation. 展开更多
关键词 ALGORITHMS Computation theory Decision making Game theory Genetic algorithms Iterative methods Military vehicles Water craft
下载PDF
Game theory approach to optimal capital cost allocation in pollution control 被引量:8
15
作者 Chen Wen ying Institute of Nuclear Energy Technology, Tsinghua University, Beijing 100084,China Hou Dun Urban Water Resources Center, Ministry of Construction, Beijing 100007,China 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 1998年第2期104-110,共7页
This paper tries to integrate game theory, a very useful tool to resolve conflict phenomena, with optimal capital cost allocation issue in total emission control. First the necessity of allocating optimal capital cos... This paper tries to integrate game theory, a very useful tool to resolve conflict phenomena, with optimal capital cost allocation issue in total emission control. First the necessity of allocating optimal capital costs fairly and reasonably among polluters in total emission control was analyzed. Then the possibility of applying game theory to the issue of the optimal capital cost allocation was expounded. Next the cooperative N person game model of the optimal capital cost allocation and its solution ways including method based on Shapley value, least core method, weak least core methods, proportional least core method, CGA method, MCRS method and so on were delineated. Finally through application of these methods it was concluded that to apply game theory in the optimal capital cost allocation issue is helpful to implement the total emission control planning schemes successfully, to control pollution effectively, and to ensure sustainable development. 展开更多
关键词 total emission control optimal capital cost allocation game theory cooperative N person game model.
下载PDF
A Novel Resource Allocation Method in Ultra-Dense Network Based on Noncooperation Game Theory 被引量:8
16
作者 Zhen Wang Xiaorong Zhu +1 位作者 Xu Bao Su Zhao 《China Communications》 SCIE CSCD 2016年第10期169-180,共12页
In ultra-dense networks(UDNs), large-scale deployment of femto base stations is an important technique for improving the network throughput and quality of service(QoS). In this paper, a multidimensional resource alloc... In ultra-dense networks(UDNs), large-scale deployment of femto base stations is an important technique for improving the network throughput and quality of service(QoS). In this paper, a multidimensional resource allocation algorithm based on noncooperation game theory is proposed to manage the resource allocation in UDNs, including transmission point association, user channels, and power. The algorithm derives a multidimensional resource optimization model and converts into a noncooperation game model according to the analysis of transmission point association user channel and power allocation. The algorithm includes two phases: transmission point association, and channel and power allocation. Then, feasible domain and discrete variables relaxation approaches are introduced to derive an approximate optimal multidimensional resource allocation solution with low complexity. Simulation results show that this method has some advantages in suppressing interference and improves the overall system throughput, while ensuring the QoS of femtocell users. 展开更多
关键词 resource allocation noncooperation game theory variables relaxation
下载PDF
Distributed power control algorithm based on game theory for wireless sensor networks 被引量:5
17
作者 Na Chengliang Lu Dongxin +1 位作者 Zhou Tingxian Li Lihong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第3期622-627,共6页
Energy saving is the most important issue in research and development for wireless sensor networks. A power control mechanism can reduce the power consumption of the whole network. Because the character of wireless se... Energy saving is the most important issue in research and development for wireless sensor networks. A power control mechanism can reduce the power consumption of the whole network. Because the character of wireless sensor networks is restrictive energy, this paper proposes a distributed power control algorithm based on game theory for wireless sensor networks which objects of which are reducing power consumption and decreasing overhead and increasing network lifetime. The game theory and OPNET simulation shows that the power control algorithm converges to a Nash Equilibrium when decisions are updated according to a better response dynamic. 展开更多
关键词 wireless sensor networks power control game theory CONVERGENCE
下载PDF
Diffusion mechanism simulation of cloud manufacturing complex network based on cooperative game theory 被引量:4
18
作者 GENG Chao QU Shiyou +5 位作者 XIAO Yingying WANG Mei SHI Guoqiang LIN Tingyu XUE Junjie JIA Zhengxuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第2期321-335,共15页
Cloud manufacturing is a specific implementation form of the "Internet + manufacturing" strategy. Why and how to develop cloud manufacturing platform(CMP), however, remains the key concern of both platform o... Cloud manufacturing is a specific implementation form of the "Internet + manufacturing" strategy. Why and how to develop cloud manufacturing platform(CMP), however, remains the key concern of both platform operators and users. A microscopic model is proposed to investigate advantages and diffusion forces of CMP through exploration of its diffusion process and mechanism. Specifically, a three-stage basic evolution process of CMP is innovatively proposed. Then, based on this basic process, a more complex CMP evolution model has been established in virtue of complex network theory, with five diffusion forces identified. Thereafter, simulations on CMP diffusion have been conducted. The results indicate that, CMP possesses better resource utilization,user satisfaction, and enterprise utility. Results of simulation on impacts of different diffusion forces show that both the time required for CMP to reach an equilibrium state and the final network size are affected simultaneously by the five diffusion forces. All these analyses indicate that CMP could create an open online cooperation environment and turns out to be an effective implementation of the "Internet + manufacturing" strategy. 展开更多
关键词 complex network cloud manufacturing innovation diffusion network effect Gale-Shapley algorithm cooperative game theory
下载PDF
Power Control Algorithm of Cognitive Radio Based on Non-Cooperative Game Theory 被引量:4
19
作者 赵军辉 杨涛 +2 位作者 贡毅 王娇 付雷 《China Communications》 SCIE CSCD 2013年第11期143-154,共12页
This paper addresses the power con- trol problems of Cognitive Radio (CR) trader transmission power and interference tempera- ture constraints. First, we propose the interfer- ence constraint which ensures that the ... This paper addresses the power con- trol problems of Cognitive Radio (CR) trader transmission power and interference tempera- ture constraints. First, we propose the interfer- ence constraint which ensures that the Quality of Service (QoS) standards for primary users is considered and a non-cooperative game power control model. Based on the proposed model, we developed a logical utility function based on the Signal-to-Interference-Noise Ratio (S/NR) and a novel algorithm network power control. that is suitable for CR Then, the existence and uniqueness of the Nash Equilibrium (NE) in our utility function are proved by the principle of game theory and the corresponding optimi- zations. Compared to traditional algorithms, the proposed one could converge to an NE in 3-5 iterative operations by setting an appropriate pricing factor. Finally, simulation results ver- ified the stability and superiority of the novel algorithm in flat-fading channel environments. 展开更多
关键词 cognitive radio non-cooperativepower control game theory utility function Na-sh equilibrium target power
下载PDF
Optimal Power Management for Antagonizing Between Radar and Jamming Based on Continuous Game Theory 被引量:4
20
作者 万开方 高晓光 +1 位作者 李波 梅军峰 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2014年第4期386-393,共8页
To solve the problem of dynamic power resource allocation for cooperative penetration combat,the continuous game theory is introduced and a two-person general-sum continuous-game-based model is put forward with a comm... To solve the problem of dynamic power resource allocation for cooperative penetration combat,the continuous game theory is introduced and a two-person general-sum continuous-game-based model is put forward with a common payoff function named collaborative detection probability of netted radar countermeasures.Comparing with traditional optimization methods,an obvious advantage of game-based model is an adequate consideration of the opposite potential strategy.This model guarantees a more effective allocation of the both sides′power resource and a higher combat efficiency during a combat.Furthermore,an analysis of the complexity of the proposed model is given and a hierarchical processing method is presented to simplify the calculating process.Simulation results show the validity of the proposed scheme. 展开更多
关键词 game theory radar countermeasures power management detection probability penetration combat
下载PDF
上一页 1 2 17 下一页 到第
使用帮助 返回顶部