This paper presents a novel cooperative value iteration(VI)-based adaptive dynamic programming method for multi-player differential game models with a convergence proof.The players are divided into two groups in the l...This paper presents a novel cooperative value iteration(VI)-based adaptive dynamic programming method for multi-player differential game models with a convergence proof.The players are divided into two groups in the learning process and adapt their policies sequentially.Our method removes the dependence of admissible initial policies,which is one of the main drawbacks of the PI-based frameworks.Furthermore,this algorithm enables the players to adapt their control policies without full knowledge of others’ system parameters or control laws.The efficacy of our method is illustrated by three examples.展开更多
Cooperative autonomous air combat of multiple unmanned aerial vehicles(UAVs)is one of the main combat modes in future air warfare,which becomes even more complicated with highly changeable situation and uncertain info...Cooperative autonomous air combat of multiple unmanned aerial vehicles(UAVs)is one of the main combat modes in future air warfare,which becomes even more complicated with highly changeable situation and uncertain information of the opponents.As such,this paper presents a cooperative decision-making method based on incomplete information dynamic game to generate maneuver strategies for multiple UAVs in air combat.Firstly,a cooperative situation assessment model is presented to measure the overall combat situation.Secondly,an incomplete information dynamic game model is proposed to model the dynamic process of air combat,and a dynamic Bayesian network is designed to infer the tactical intention of the opponent.Then a reinforcement learning framework based on multiagent deep deterministic policy gradient is established to obtain the perfect Bayes-Nash equilibrium solution of the air combat game model.Finally,a series of simulations are conducted to verify the effectiveness of the proposed method,and the simulation results show effective synergies and cooperative tactics.展开更多
At present, the studies on multi-team antagonistic games(MTAGs) are still in the early stage, because this complicated problem involves not only incompleteness of information and conflict of interests, but also select...At present, the studies on multi-team antagonistic games(MTAGs) are still in the early stage, because this complicated problem involves not only incompleteness of information and conflict of interests, but also selection of antagonistic targets.Therefore, based on the previous researches, a new framework is proposed in this paper, which is dynamic multi-team antagonistic games with incomplete information(DMTAGII) model.For this model, the corresponding concept of perfect Bayesian Nash equilibrium(PBNE) is established and the existence of PBNE is also proved. Besides, an interactive iteration algorithm is introduced according to the idea of the best response for solving the equilibrium. Then, the scenario of multiple unmanned aerial vehicles(UAVs) against multiple military targets is studied to solve the problems of tactical decision making based on the DMTAGII model. In the process of modeling, the specific expressions of strategy, status and payoff functions of the games are considered, and the strategy is coded to match the structure of genetic algorithm so that the PBNE can be solved by combining the genetic algorithm and the interactive iteration algorithm.Finally, through the simulation the feasibility and effectiveness of the DMTAGII model are verified. Meanwhile, the calculated equilibrium strategies are also found to be realistic, which can provide certain references for improving the autonomous ability of UAV systems.展开更多
The different conditions of use of a component result in a variety of damage levels.Therefore,excluding differences in shape and size,used parts show a high degree of uncertainty regarding failure characteristics,qual...The different conditions of use of a component result in a variety of damage levels.Therefore,excluding differences in shape and size,used parts show a high degree of uncertainty regarding failure characteristics,quality conditions,and remaining life,which seriously affects the efficiency of a remanufacturing scheme design.Aiming to address this problem,a remanufacturing scheme design method based on the reconstruction of incomplete information of used parts is proposed.First,the remaining life of the reconstructed model is predicted by finite element analysis,and the demand for the next life cycle is determined.Second,the scanned 3D damage point cloud data are registered with the original point cloud data using the integral iterative method to construct a missing point cloud model to achieve the restoration of geometric information.Then,according to reverse engineering and laser cladding remanufacturing,the tool remanufacturing process path can be generated by the tool contact point path section line method.Finally,the proposed method is adopted for turbine blades to evaluate the effectiveness and feasibility of the proposed scheme.This study proposes a remanufacturing scheme design method based on the incomplete reconstruction of used part information to solve the uncertain and highly personalized problems in remanufacturing.展开更多
The weights of criteria are incompletely known and the criteria values are incomplete and uncertain or even default in some fuzzy multi-criteria decision-making problems.For those problems,an approach based on evident...The weights of criteria are incompletely known and the criteria values are incomplete and uncertain or even default in some fuzzy multi-criteria decision-making problems.For those problems,an approach based on evidential reasoning is proposed,in which the criteria values are integrated on the basis of analytical algorithm of evidential reasoning,and then nonlinear programming models of each alternative are developed with the incomplete information on weights.The genetic algorithm is employed to solve the models,producing the weights and the utility interval of each alternative,and the ranking of the whole set of alternatives can be attained.Finally,an example shows the effectiveness of the method.展开更多
The generalized linear model(GLM) based on the observed data with incomplete information in the case of random censorship is defined. Under the given conditions, the existence and uniqueness of the solution on the l...The generalized linear model(GLM) based on the observed data with incomplete information in the case of random censorship is defined. Under the given conditions, the existence and uniqueness of the solution on the likelihood equations with respect to the parameter vector β of the model are discussed, and the consistency and asymptotic normality of the maximum likelihood estimator(MLE) βn^-, are proved.展开更多
The threat sequencing of multiple unmanned combat air vehicles(UCAVs) is a multi-attribute decision-making(MADM)problem. In the threat sequencing process of multiple UCAVs,due to the strong confrontation and high dyna...The threat sequencing of multiple unmanned combat air vehicles(UCAVs) is a multi-attribute decision-making(MADM)problem. In the threat sequencing process of multiple UCAVs,due to the strong confrontation and high dynamics of the air combat environment, the weight coefficients of the threat indicators are usually time-varying. Moreover, the air combat data is difficult to be obtained accurately. In this study, a threat sequencing method of multiple UCAVs is proposed based on game theory by considering the incomplete information. Firstly, a zero-sum game model of decision maker( D) and nature(N)with fuzzy payoffs is established to obtain the uncertain parameters which are the weight coefficient parameters of the threat indicators and the interval parameters of the threat matrix. Then,the established zero-sum game with fuzzy payoffs is transformed into a zero-sum game with crisp payoffs(matrix game) to solve. Moreover, a decision rule is addressed for the threat sequencing problem of multiple UCAVs based on the obtained uncertain parameters. Finally, numerical simulation results are presented to show the effectiveness of the proposed approach.展开更多
As a core component of the network,web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attacke...As a core component of the network,web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attackers.Although the moving target defense(MTD)has been proposed to increase the attack difficulty for the attackers,there is no solo approach can cope with different attacks;in addition,it is impossible to implement all these approaches simultaneously due to the resource limitation.Thus,the selection of an optimal defense strategy based on MTD has become the focus of research.In general,the confrontation of two players in the security domain is viewed as a stochastic game,and the reward matrices are known to both players.However,in a real security confrontation,this scenario represents an incomplete information game.Each player can only observe the actions performed by the opponent,and the observed actions are not completely accurate.To accurately describe the attacker’s reward function to reach the Nash equilibrium,this work simulated and updated the strategy selection distribution of the attacker by observing and investigating the strategy selection history of the attacker.Next,the possible rewards of the attacker in each confrontation via the observation matrix were corrected.On this basis,the Nash-Q learning algorithm with reward quantification was proposed to select the optimal strategy.Moreover,the performances of the Minimax-Q learning algorithm and Naive-Q learning algorithm were compared and analyzed in the MTD environment.Finally,the experimental results showed that the strategy selection algorithm can enable defenders to select a more reasonable defensive strategy and achieve the maximum possible reward.展开更多
Incompleteness of information about objects may be the greatest obstruct to performing induction learning from examples. In this paper, the concept of limited-non-symmetric similarity relation is used to formulate a n...Incompleteness of information about objects may be the greatest obstruct to performing induction learning from examples. In this paper, the concept of limited-non-symmetric similarity relation is used to formulate a new definition of approximation to an incomplete information system. With the new definition of approximation to an object set and the concept of attribute value pair, rough-setsbased methodology for certain rule acquisition in an incomplete information system is developed. The algorithm can deal with incomplete data directly and does not require changing the size of the original incomplete system. Experiments show that the algorithm provides precise and simple certain decision rules and is not affected by the missing values.展开更多
In this paper, we have discussed a random censoring test with incomplete information, and proved that the maximum likelihood estimator(MLE) of the parameter based on the randomly censored data with incomplete informat...In this paper, we have discussed a random censoring test with incomplete information, and proved that the maximum likelihood estimator(MLE) of the parameter based on the randomly censored data with incomplete information in the case of the exponential distribution has the strong consistency.展开更多
This study analyzes the cooperative coalition problem for formation scheduling based on incomplete information. A multi-agent cooperative coalition framework is developed to optimize the formation scheduling problem i...This study analyzes the cooperative coalition problem for formation scheduling based on incomplete information. A multi-agent cooperative coalition framework is developed to optimize the formation scheduling problem in a decentralized manner. The social class differentiation mech- anism and role-assuming mechanism are incorporated into the framework, which, in turn, ensures that the multi-agent system (MAS) evolves in the optimal direction. Moreover, a further differen- tiation pressure can be achieved to help MAS escape from local optima. A Bayesian coalition nego- tiation algorithm is constructed, within which the Harsanyi transformation is introduced to transform the coalition problem based on incomplete information to the Bayesian-equivalent coali- tion problem based on imperfect information. The simulation results suggest that the distribution of agents' expectations of other agents' unknown information approximates to the true distribution after a finite set of generations. The comparisons indicate that the MAS cooperative coalition algo- rithm produces a significantly better utility and possesses a more effective capability of escaping from local optima than the proposal-engaged marriage algorithm and the Simulated Annealing algorithm.展开更多
In this paper we address information measures of roughness of knowledge and rough sets for incomplete information systems. The definition of rough entropy of knowledge and its important properties are given. In partic...In this paper we address information measures of roughness of knowledge and rough sets for incomplete information systems. The definition of rough entropy of knowledge and its important properties are given. In particular, the relationship between rough entropy of knowledge and the Hartley measure of uncertainty is established. We show that rough entropy of know1edge decreases monotonously as granularity of information become smaller. This gives an information interpretation for roughness of knowledge. Based on rough entropy of knowledge and roughness of rough set. a definition of rough entropy of rough set is proposed, and we show that rough entropy of rough set decreases monotonousIy as granularity of information become smaller. This gives more accurate measure for roughness of rough set.展开更多
To extract and express the knowledge hidden in information systems, discernibility matrix and its extensions were introduced and applied successfully in many real life applications. Binary discernibility matrix, as a ...To extract and express the knowledge hidden in information systems, discernibility matrix and its extensions were introduced and applied successfully in many real life applications. Binary discernibility matrix, as a representative approach, has many interesting superior properties and has been rapidly developed to find intuitive and easy to understand knowledge. However, at present, the binary discernibility matrix is mainly adopted in the complete information system. It is a challenging topic how to achieve the attribute reduction by using binary discernibility matrix in incomplete information system. A form of generalized binary discernibility matrix is further developed for a number of representative extended rough set models that deal with incomplete information systems. Some useful properties and criteria are introduced for judging the attribute core and attribute relative reduction. Thereafter, a new algorithm is formulated which supports attribute core and attribute relative reduction based on the generalized binary discernibility matrix. This algorithm is not only suitable for consistent information systems but also inconsistent information systems. The feasibility of the proposed methods was demonstrated by worked examples and experimental analysis.展开更多
All eight possible extended rough set models in incomplete information systems are proposed.By analyzing existing extended models and technical meth-ods of rough set theory,the strategy of model extension is found to ...All eight possible extended rough set models in incomplete information systems are proposed.By analyzing existing extended models and technical meth-ods of rough set theory,the strategy of model extension is found to be suitable for processing incomplete information systems instead of filling possible values for missing attributes.After analyzing the definitions of existing extended models,a new general extended model is proposed.The new model is a generalization of indiscernibility relations,tolerance relations and non-symmetric similarity relations.Finally,suggestions for further study of rough set theory in incomplete informa-tion systems are put forward.展开更多
Given the fragmentation of public opinion dissemination and the lag of network users’cognition,the paper analyzes public opinion dissemination with incomplete information,which can provide reference for us to control...Given the fragmentation of public opinion dissemination and the lag of network users’cognition,the paper analyzes public opinion dissemination with incomplete information,which can provide reference for us to control and guide the spread of public opinion.Based on the derivative and secondary radiation of public opinion dissemination with incomplete information,the Susceptible-Susceptible-Infected-Recovered-Recovered-Infected(SSIRR-I)model is proposed.Given the interaction between users,the Deffuant opinion dynamics model and evolutionary game theory are introduced to simulate the public opinion game between dissemination and immune nodes.Finally,the numerical simulation and results analysis are given.The results reveal that the rate of opinion convergence significantly affects disseminating public opinion,which is positively correlated with the promotion effect of the dissemination node and negatively correlated with the suppression effect of the immune node of public opinion dissemination.Derivative and secondary radiations have different effects on public opinion dissemination in the early stage,but promote public opinion dissemination in the later stage.The dominant immune nodes have an apparent inhibitory effect on the spread of public opinion;nevertheless,they cannot block the dissemination of public opinion.展开更多
Considering both the high complexity of urban traffic flow systems and the bounded rationality of travelers,providing traffic information to all travelers is an effective method to induce each individual to make a mor...Considering both the high complexity of urban traffic flow systems and the bounded rationality of travelers,providing traffic information to all travelers is an effective method to induce each individual to make a more rational route-choice decision.Within Advanced Traveler Information System(ATIS)working environment,temporal and spatial evolution processes of traffic flow in urban road networks are closely related to strategies of providing traffic information and contents of information.In view of the day-to-day route-choice situations,this study constructs original updating models of the cognitive travel time of travelers under four conditions,including not providing any route travel time,only providing the most rapid route travel time,only providing the most congested route travel time,and providing all the routes travel times.The disaggregate route-choice approach is adopted for simulation to reveal the relationship between the evolution process of network traffic flow and the strategy of providing traffic information.The simulation shows that providing traffic information to all travelers cannot improve the operational efficiency of road networks.It is noteworthy that an inappropriate information feedback strategy would lead to intense variation in various routes traffic flow.Compared with incomplete information feedback strategies,it is inefficient and superfluous to provide complete traffic information to all travelers.展开更多
Nowadays,cloud computing has been identified as new opportunities for migrating to the expected agility,reuse,and adaptive capabilities that can support the ever changing IT trends and requirements.Unfortunately,the r...Nowadays,cloud computing has been identified as new opportunities for migrating to the expected agility,reuse,and adaptive capabilities that can support the ever changing IT trends and requirements.Unfortunately,the rapid evolution of those technologies also comes with open issues such as security,privacy,integrity,quality of services,and their possible detrimental consequences.In this work,the concept of insurance is introduced to compensate the cloud computing customers when encountering those failures if service providers(SPs)have insurance purchased.Particularly,we consider the situation when the insurer is unable to see the system failure risk levels of the SPs,which is usually seen as an incomplete information market,in contrast with the optimal situation in a complete information market.First,an insurance-based cloud computing architecture is proposed to build a monetary credit system in which the cloud computing SP pays a premium for a certain coverage to the insurer.Subsequently,problem is formulated to solve the optimal insurance plan in complete and incomplete information markets,together with detail analysis of insurance policies in both cases are provided.Furthermore,simulation results show the properties of the two insurance plans and parameters that affect the design of the insurance plan.展开更多
The designing of incentive strategy when the follower’s objective functions have Parameters unknown to the leader is investigated in this paper. A desinging approach named IncentiveStrategy with Unknown but Bounded ...The designing of incentive strategy when the follower’s objective functions have Parameters unknown to the leader is investigated in this paper. A desinging approach named IncentiveStrategy with Unknown but Bounded error (ISUBB) is proposed. A simple example is given to explain the use of ISUBS.展开更多
Right randomly censored data with incomplete infor-mation are frequently met in practice.Although much study about right randomly censored data has been seen in the proportional hazards model,relatively little is know...Right randomly censored data with incomplete infor-mation are frequently met in practice.Although much study about right randomly censored data has been seen in the proportional hazards model,relatively little is known about the inference of regression parameters for right randomly censored data with in-complete information in such model.In particular,theoretical properties of the maximum likelihood estimator of the regression parameters have not been proven yet in that model.In this paper,we show the consistency and asymptotic normality of the maxi-mum likelihood estimator of unknown regression parameters.展开更多
It is not uncommon in multiple criteria decision-making that the numerical values of alternatives of some criteria are subject to imprecision, uncertainty and indetermination and the information on weights of criteria...It is not uncommon in multiple criteria decision-making that the numerical values of alternatives of some criteria are subject to imprecision, uncertainty and indetermination and the information on weights of criteria is incomplete certain. A new multiple criteria decision- making method with incomplete certain information based on ternary AHP is proposed. This improves on Takeda's method. In this method, the ternary comparison matrix of the alternatives under each pseudo-criteria is constructed, the eigenvector associated with the maximum eigenvalue of the ternary comparison matrix is attained as to normalize priority vector of the alternatives, then the order of alternatives is obtained by solving two kinds of linear programming problems. Finally, an example is given to show the feasibility and effectiveness of the method.展开更多
基金supported by the Industry-University-Research Cooperation Fund Project of the Eighth Research Institute of China Aerospace Science and Technology Corporation (USCAST2022-11)Aeronautical Science Foundation of China (20220001057001)。
文摘This paper presents a novel cooperative value iteration(VI)-based adaptive dynamic programming method for multi-player differential game models with a convergence proof.The players are divided into two groups in the learning process and adapt their policies sequentially.Our method removes the dependence of admissible initial policies,which is one of the main drawbacks of the PI-based frameworks.Furthermore,this algorithm enables the players to adapt their control policies without full knowledge of others’ system parameters or control laws.The efficacy of our method is illustrated by three examples.
基金supported by the National Natural Science Foundation of China(Grant No.61933010 and 61903301)Shaanxi Aerospace Flight Vehicle Design Key Laboratory。
文摘Cooperative autonomous air combat of multiple unmanned aerial vehicles(UAVs)is one of the main combat modes in future air warfare,which becomes even more complicated with highly changeable situation and uncertain information of the opponents.As such,this paper presents a cooperative decision-making method based on incomplete information dynamic game to generate maneuver strategies for multiple UAVs in air combat.Firstly,a cooperative situation assessment model is presented to measure the overall combat situation.Secondly,an incomplete information dynamic game model is proposed to model the dynamic process of air combat,and a dynamic Bayesian network is designed to infer the tactical intention of the opponent.Then a reinforcement learning framework based on multiagent deep deterministic policy gradient is established to obtain the perfect Bayes-Nash equilibrium solution of the air combat game model.Finally,a series of simulations are conducted to verify the effectiveness of the proposed method,and the simulation results show effective synergies and cooperative tactics.
基金supported by Foundation for Innovative Research Groups of National Natural Science Foundation of China(NSFC)(61321002)National Science Fund for Distinguished Young Scholars(60925011)+2 种基金Projects of Major International(Regional)Joint Research Program NSFC(61120106010)Beijing Education Committee Cooperation Building Foundation Project,Program for Changjiang Scholars and Innovative Research Team in University(IRT1208)Chang Jiang Scholars Program and National Natural Science Foundation of China(61203078)
文摘At present, the studies on multi-team antagonistic games(MTAGs) are still in the early stage, because this complicated problem involves not only incompleteness of information and conflict of interests, but also selection of antagonistic targets.Therefore, based on the previous researches, a new framework is proposed in this paper, which is dynamic multi-team antagonistic games with incomplete information(DMTAGII) model.For this model, the corresponding concept of perfect Bayesian Nash equilibrium(PBNE) is established and the existence of PBNE is also proved. Besides, an interactive iteration algorithm is introduced according to the idea of the best response for solving the equilibrium. Then, the scenario of multiple unmanned aerial vehicles(UAVs) against multiple military targets is studied to solve the problems of tactical decision making based on the DMTAGII model. In the process of modeling, the specific expressions of strategy, status and payoff functions of the games are considered, and the strategy is coded to match the structure of genetic algorithm so that the PBNE can be solved by combining the genetic algorithm and the interactive iteration algorithm.Finally, through the simulation the feasibility and effectiveness of the DMTAGII model are verified. Meanwhile, the calculated equilibrium strategies are also found to be realistic, which can provide certain references for improving the autonomous ability of UAV systems.
基金Supported by Plateau Disciplines in ShanghaiNational Natural Science Foundation of China (Grant No. 51675388)Hubei Provincial Department of Education of China (Grant No. D20181102)
文摘The different conditions of use of a component result in a variety of damage levels.Therefore,excluding differences in shape and size,used parts show a high degree of uncertainty regarding failure characteristics,quality conditions,and remaining life,which seriously affects the efficiency of a remanufacturing scheme design.Aiming to address this problem,a remanufacturing scheme design method based on the reconstruction of incomplete information of used parts is proposed.First,the remaining life of the reconstructed model is predicted by finite element analysis,and the demand for the next life cycle is determined.Second,the scanned 3D damage point cloud data are registered with the original point cloud data using the integral iterative method to construct a missing point cloud model to achieve the restoration of geometric information.Then,according to reverse engineering and laser cladding remanufacturing,the tool remanufacturing process path can be generated by the tool contact point path section line method.Finally,the proposed method is adopted for turbine blades to evaluate the effectiveness and feasibility of the proposed scheme.This study proposes a remanufacturing scheme design method based on the incomplete reconstruction of used part information to solve the uncertain and highly personalized problems in remanufacturing.
基金supported by the National Natural Science Foundation of China(7077111570921001)and Key Project of National Natural Science Foundation of China(70631004)
文摘The weights of criteria are incompletely known and the criteria values are incomplete and uncertain or even default in some fuzzy multi-criteria decision-making problems.For those problems,an approach based on evidential reasoning is proposed,in which the criteria values are integrated on the basis of analytical algorithm of evidential reasoning,and then nonlinear programming models of each alternative are developed with the incomplete information on weights.The genetic algorithm is employed to solve the models,producing the weights and the utility interval of each alternative,and the ranking of the whole set of alternatives can be attained.Finally,an example shows the effectiveness of the method.
文摘The generalized linear model(GLM) based on the observed data with incomplete information in the case of random censorship is defined. Under the given conditions, the existence and uniqueness of the solution on the likelihood equations with respect to the parameter vector β of the model are discussed, and the consistency and asymptotic normality of the maximum likelihood estimator(MLE) βn^-, are proved.
基金supported by the Major Projects for Science and Technology Innovation 2030 (2018AAA0100805)。
文摘The threat sequencing of multiple unmanned combat air vehicles(UCAVs) is a multi-attribute decision-making(MADM)problem. In the threat sequencing process of multiple UCAVs,due to the strong confrontation and high dynamics of the air combat environment, the weight coefficients of the threat indicators are usually time-varying. Moreover, the air combat data is difficult to be obtained accurately. In this study, a threat sequencing method of multiple UCAVs is proposed based on game theory by considering the incomplete information. Firstly, a zero-sum game model of decision maker( D) and nature(N)with fuzzy payoffs is established to obtain the uncertain parameters which are the weight coefficient parameters of the threat indicators and the interval parameters of the threat matrix. Then,the established zero-sum game with fuzzy payoffs is transformed into a zero-sum game with crisp payoffs(matrix game) to solve. Moreover, a decision rule is addressed for the threat sequencing problem of multiple UCAVs based on the obtained uncertain parameters. Finally, numerical simulation results are presented to show the effectiveness of the proposed approach.
基金This paper is supported by the National Key R&D Program of China(2017YFB0802703)the National Nature Science Foundation of China(61602052).
文摘As a core component of the network,web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attackers.Although the moving target defense(MTD)has been proposed to increase the attack difficulty for the attackers,there is no solo approach can cope with different attacks;in addition,it is impossible to implement all these approaches simultaneously due to the resource limitation.Thus,the selection of an optimal defense strategy based on MTD has become the focus of research.In general,the confrontation of two players in the security domain is viewed as a stochastic game,and the reward matrices are known to both players.However,in a real security confrontation,this scenario represents an incomplete information game.Each player can only observe the actions performed by the opponent,and the observed actions are not completely accurate.To accurately describe the attacker’s reward function to reach the Nash equilibrium,this work simulated and updated the strategy selection distribution of the attacker by observing and investigating the strategy selection history of the attacker.Next,the possible rewards of the attacker in each confrontation via the observation matrix were corrected.On this basis,the Nash-Q learning algorithm with reward quantification was proposed to select the optimal strategy.Moreover,the performances of the Minimax-Q learning algorithm and Naive-Q learning algorithm were compared and analyzed in the MTD environment.Finally,the experimental results showed that the strategy selection algorithm can enable defenders to select a more reasonable defensive strategy and achieve the maximum possible reward.
文摘Incompleteness of information about objects may be the greatest obstruct to performing induction learning from examples. In this paper, the concept of limited-non-symmetric similarity relation is used to formulate a new definition of approximation to an incomplete information system. With the new definition of approximation to an object set and the concept of attribute value pair, rough-setsbased methodology for certain rule acquisition in an incomplete information system is developed. The algorithm can deal with incomplete data directly and does not require changing the size of the original incomplete system. Experiments show that the algorithm provides precise and simple certain decision rules and is not affected by the missing values.
文摘In this paper, we have discussed a random censoring test with incomplete information, and proved that the maximum likelihood estimator(MLE) of the parameter based on the randomly censored data with incomplete information in the case of the exponential distribution has the strong consistency.
基金supported by the National Natural Science Foundation of China(No.61039001)the National Science and Technology Support Program of China(No.2011BAH24B10)
文摘This study analyzes the cooperative coalition problem for formation scheduling based on incomplete information. A multi-agent cooperative coalition framework is developed to optimize the formation scheduling problem in a decentralized manner. The social class differentiation mech- anism and role-assuming mechanism are incorporated into the framework, which, in turn, ensures that the multi-agent system (MAS) evolves in the optimal direction. Moreover, a further differen- tiation pressure can be achieved to help MAS escape from local optima. A Bayesian coalition nego- tiation algorithm is constructed, within which the Harsanyi transformation is introduced to transform the coalition problem based on incomplete information to the Bayesian-equivalent coali- tion problem based on imperfect information. The simulation results suggest that the distribution of agents' expectations of other agents' unknown information approximates to the true distribution after a finite set of generations. The comparisons indicate that the MAS cooperative coalition algo- rithm produces a significantly better utility and possesses a more effective capability of escaping from local optima than the proposal-engaged marriage algorithm and the Simulated Annealing algorithm.
基金This work is supported by the National Young Science Foundation of China (No. 69805004)
文摘In this paper we address information measures of roughness of knowledge and rough sets for incomplete information systems. The definition of rough entropy of knowledge and its important properties are given. In particular, the relationship between rough entropy of knowledge and the Hartley measure of uncertainty is established. We show that rough entropy of know1edge decreases monotonously as granularity of information become smaller. This gives an information interpretation for roughness of knowledge. Based on rough entropy of knowledge and roughness of rough set. a definition of rough entropy of rough set is proposed, and we show that rough entropy of rough set decreases monotonousIy as granularity of information become smaller. This gives more accurate measure for roughness of rough set.
基金supported by the National Natural Science Foundation of China (61403184, 61105082)the ‘1311 Talent Plan’ of Nanjing University of Posts and Telecommunications (NY2013)+3 种基金the ‘Qinglan’ Project of Jiangsu Province (QL2016)the Natural Science Foundation of Nanjing University of Posts and Telecommunications (215149)the Priority Academic Program Development of Jiangsu Higher Education Institutions, (PAPD)the Major Program of the Natural Science Foundation of Jiangsu Province Education Commission (17KJA120001)
文摘To extract and express the knowledge hidden in information systems, discernibility matrix and its extensions were introduced and applied successfully in many real life applications. Binary discernibility matrix, as a representative approach, has many interesting superior properties and has been rapidly developed to find intuitive and easy to understand knowledge. However, at present, the binary discernibility matrix is mainly adopted in the complete information system. It is a challenging topic how to achieve the attribute reduction by using binary discernibility matrix in incomplete information system. A form of generalized binary discernibility matrix is further developed for a number of representative extended rough set models that deal with incomplete information systems. Some useful properties and criteria are introduced for judging the attribute core and attribute relative reduction. Thereafter, a new algorithm is formulated which supports attribute core and attribute relative reduction based on the generalized binary discernibility matrix. This algorithm is not only suitable for consistent information systems but also inconsistent information systems. The feasibility of the proposed methods was demonstrated by worked examples and experimental analysis.
基金supported by the National Natural Science Foundation of China(Grant Nos.60573068,60773113)the Program for New Century Excellent Talents in University(NCET),and the Natural Science Foundation of Chongqing of China(No.2008BA2017).
文摘All eight possible extended rough set models in incomplete information systems are proposed.By analyzing existing extended models and technical meth-ods of rough set theory,the strategy of model extension is found to be suitable for processing incomplete information systems instead of filling possible values for missing attributes.After analyzing the definitions of existing extended models,a new general extended model is proposed.The new model is a generalization of indiscernibility relations,tolerance relations and non-symmetric similarity relations.Finally,suggestions for further study of rough set theory in incomplete informa-tion systems are put forward.
基金supported by the National Social Science Foundation of China(No.20BGL025)and the Postgraduate Practice Innovation Program of Jiangsu Province(No.SJCX200316).
文摘Given the fragmentation of public opinion dissemination and the lag of network users’cognition,the paper analyzes public opinion dissemination with incomplete information,which can provide reference for us to control and guide the spread of public opinion.Based on the derivative and secondary radiation of public opinion dissemination with incomplete information,the Susceptible-Susceptible-Infected-Recovered-Recovered-Infected(SSIRR-I)model is proposed.Given the interaction between users,the Deffuant opinion dynamics model and evolutionary game theory are introduced to simulate the public opinion game between dissemination and immune nodes.Finally,the numerical simulation and results analysis are given.The results reveal that the rate of opinion convergence significantly affects disseminating public opinion,which is positively correlated with the promotion effect of the dissemination node and negatively correlated with the suppression effect of the immune node of public opinion dissemination.Derivative and secondary radiations have different effects on public opinion dissemination in the early stage,but promote public opinion dissemination in the later stage.The dominant immune nodes have an apparent inhibitory effect on the spread of public opinion;nevertheless,they cannot block the dissemination of public opinion.
基金the National Social Science Foundation of China(Grant No.14XGL011)the Humanity and Social Science Youth Foundation of Ministry of Education in China(Grant No.12YJC630200)+1 种基金the Natural Science Foundation of Gansu Province in China(Grant No.145RJZA190)the Social Science Planning Project of Gansu Province in China(Grant No.13YD066).
文摘Considering both the high complexity of urban traffic flow systems and the bounded rationality of travelers,providing traffic information to all travelers is an effective method to induce each individual to make a more rational route-choice decision.Within Advanced Traveler Information System(ATIS)working environment,temporal and spatial evolution processes of traffic flow in urban road networks are closely related to strategies of providing traffic information and contents of information.In view of the day-to-day route-choice situations,this study constructs original updating models of the cognitive travel time of travelers under four conditions,including not providing any route travel time,only providing the most rapid route travel time,only providing the most congested route travel time,and providing all the routes travel times.The disaggregate route-choice approach is adopted for simulation to reveal the relationship between the evolution process of network traffic flow and the strategy of providing traffic information.The simulation shows that providing traffic information to all travelers cannot improve the operational efficiency of road networks.It is noteworthy that an inappropriate information feedback strategy would lead to intense variation in various routes traffic flow.Compared with incomplete information feedback strategies,it is inefficient and superfluous to provide complete traffic information to all travelers.
基金the National Natural Science Foundation of China(62001085)Sichuan Science and Technology Program(2021YFG0349)。
文摘Nowadays,cloud computing has been identified as new opportunities for migrating to the expected agility,reuse,and adaptive capabilities that can support the ever changing IT trends and requirements.Unfortunately,the rapid evolution of those technologies also comes with open issues such as security,privacy,integrity,quality of services,and their possible detrimental consequences.In this work,the concept of insurance is introduced to compensate the cloud computing customers when encountering those failures if service providers(SPs)have insurance purchased.Particularly,we consider the situation when the insurer is unable to see the system failure risk levels of the SPs,which is usually seen as an incomplete information market,in contrast with the optimal situation in a complete information market.First,an insurance-based cloud computing architecture is proposed to build a monetary credit system in which the cloud computing SP pays a premium for a certain coverage to the insurer.Subsequently,problem is formulated to solve the optimal insurance plan in complete and incomplete information markets,together with detail analysis of insurance policies in both cases are provided.Furthermore,simulation results show the properties of the two insurance plans and parameters that affect the design of the insurance plan.
文摘The designing of incentive strategy when the follower’s objective functions have Parameters unknown to the leader is investigated in this paper. A desinging approach named IncentiveStrategy with Unknown but Bounded error (ISUBB) is proposed. A simple example is given to explain the use of ISUBS.
基金Supported by the National Natural Science Foundation of China (10771163)
文摘Right randomly censored data with incomplete infor-mation are frequently met in practice.Although much study about right randomly censored data has been seen in the proportional hazards model,relatively little is known about the inference of regression parameters for right randomly censored data with in-complete information in such model.In particular,theoretical properties of the maximum likelihood estimator of the regression parameters have not been proven yet in that model.In this paper,we show the consistency and asymptotic normality of the maxi-mum likelihood estimator of unknown regression parameters.
文摘It is not uncommon in multiple criteria decision-making that the numerical values of alternatives of some criteria are subject to imprecision, uncertainty and indetermination and the information on weights of criteria is incomplete certain. A new multiple criteria decision- making method with incomplete certain information based on ternary AHP is proposed. This improves on Takeda's method. In this method, the ternary comparison matrix of the alternatives under each pseudo-criteria is constructed, the eigenvector associated with the maximum eigenvalue of the ternary comparison matrix is attained as to normalize priority vector of the alternatives, then the order of alternatives is obtained by solving two kinds of linear programming problems. Finally, an example is given to show the feasibility and effectiveness of the method.