随着分布式能源的发展,传统用户具备发电能力而成为产消者(production and consumption users,PCU)的趋势愈演愈烈,该文主要研究了同一微能网下大量产消者的协同运行问题。电价不确定性和产消者响应给微能网协同不同利益主体的PCU之间...随着分布式能源的发展,传统用户具备发电能力而成为产消者(production and consumption users,PCU)的趋势愈演愈烈,该文主要研究了同一微能网下大量产消者的协同运行问题。电价不确定性和产消者响应给微能网协同不同利益主体的PCU之间的调度带来困难。在此背景下提出考虑产消者响应与电价不确定性的微能网与产消者混合博弈优化策略。首先,构建产消者响应模型和电价不确定性模型,引入效用函数来描述PCU的满意程度,采用鲁棒优化和机会约束方法描述电价的不确定性与新能源出力的不确定性。其次,构建混合博弈模型,即上层微能网运营商(integrated energy operator,IEO)与下层PCU之间的主从博弈模型和下层PCU联盟之间的合作博弈模型。上层IEO作为主从博弈的领导者以运行成本最小化为目标,通过为产消者制定电价、热价引导产消者的用能需求;下层产消者作为跟随者,以效益最大为目标通过合作方式对IEO的决策进行产消者响应。PCU之间的合作博弈以纳什议价的方式进行,将PCU模型等效为联盟收益最大化和合作分配两个子问题。基于KKT条件利用Big-M法和Mc Cormick包络法将双层问题转换为单层混合整数线性规划问题求解主从博弈,结合交替方向乘子法(alternating direction multiplier method,ADMM)求解下层合作博弈。结果表明,该文所提策略有效协调了微能网与PCU的调度并保证了PCU合作联盟的公平性。展开更多
针对多域网络中的切片存在域间时延不均的问题,提出了一种基于域间时延博弈的端到端动态协同切片方法(interdomain dynamic game algorithm,IDGA)。采用博弈论方法将端到端时延约束分配到不同的网络域,通过在域内部署切片来获得相应的...针对多域网络中的切片存在域间时延不均的问题,提出了一种基于域间时延博弈的端到端动态协同切片方法(interdomain dynamic game algorithm,IDGA)。采用博弈论方法将端到端时延约束分配到不同的网络域,通过在域内部署切片来获得相应的博弈收益,采用DDPG算法不断更新博弈策略,最终得到最佳的时延分配比例和切片部署方案。实验表明,该算法与传统的静态分配算法对比有明显优势,与经验迭代的DSDP方法以及DQN-SNAF算法相比,IDGA算法在100个切片请求下,切片部署成功率分别提高了8%和3%左右,同时节点资源利用率提高了5.75%和1.96%左右,在降低部署成本方面也有显著优势。展开更多
Using the semi-tensor product method, this paper investigates the modeling and analysis of networked evolutionary games(NEGs) with finite memories, and presents a number of new results. Firstly, a kind of algebraic ex...Using the semi-tensor product method, this paper investigates the modeling and analysis of networked evolutionary games(NEGs) with finite memories, and presents a number of new results. Firstly, a kind of algebraic expression is formulated for the networked evolutionary games with finite memories, based on which the behavior of the corresponding evolutionary game is analyzed. Secondly, under a proper assumption, the existence of Nash equilibrium of the given networked evolutionary games is proved and a free-type strategy sequence is designed for the convergence to the Nash equilibrium. Finally, an illustrative example is worked out to support the obtained new results.展开更多
The exact evolutionary history of any set of biological taxa is unknown, and all phylogenetic reconstructions are approximations. The problem becomes harder when one must consider a mix of vertical and lateral phyloge...The exact evolutionary history of any set of biological taxa is unknown, and all phylogenetic reconstructions are approximations. The problem becomes harder when one must consider a mix of vertical and lateral phylogenetic signals. In this paper we propose a game theoretic approach to constructing biological networks. The key hypothesis is that evolution is driven by distinct mechanisms that seek to maximize two competing objectives, taxonomic conservation and diversity. One branch of the mathematical theory of games is brought to bear. It translates this evolutionary game hypothesis into a mathematical model in two-player zero-sum games, with the zero-sum assumption conforming to one of the fundamental constraints in nature in mass and energy conservation. We demonstrate why and how a mechanistic and localized adaptation to seek out greater information for conservation and diversity may always lead to a global Nash equilibrium in phylogenetic affinity. Our game theoretic method, referred to as bioinformatic game theory, is used to construct network clusters. As an example, we applied this method to clustering of a multidomain protein family. The protein clusters identified were consistent with known protein subfamilies, indicating that this game-theoretic approach provides a new framework in biological sequence analysis, especially in studying gene-genome and domain-protein relationships.展开更多
In this paper, we investigate the link resource management problem for optical networks, to achieve the resource cost during the information transmission. We use the differential game to formulate the cost control pro...In this paper, we investigate the link resource management problem for optical networks, to achieve the resource cost during the information transmission. We use the differential game to formulate the cost control problem for the link resource management, to minimize the resource allocation cost functions, which dynamic behaviours are described by differential equations. Each link controls its transmission bandwidth based on the Nash equilibriums of the differential game. The effectiveness of the proposed model is given through numerical simulations.展开更多
Focusing on dropping packets attacks in sensor networks, we propose a model of dropping packets attack-resistance as a repeated game based on such an assumption that sensor nodes are rational. The model prevents malic...Focusing on dropping packets attacks in sensor networks, we propose a model of dropping packets attack-resistance as a repeated game based on such an assumption that sensor nodes are rational. The model prevents malicious nodes from attacking by establishing punishment mechanism, and impels sensor networks to reach a collaborative Nash equilibrium. Simulation results show that the devised model can effectively resist the dropping packets attacks(DPA) by choosing reasonable configuration parameters.展开更多
A closed-loop supply chain network equilibrium problem is examined,which consists of mutual competitive manufacturers with production capacity constraints and retailers with fuzzy market demands,mutual competitive col...A closed-loop supply chain network equilibrium problem is examined,which consists of mutual competitive manufacturers with production capacity constraints and retailers with fuzzy market demands,mutual competitive collectors as well as a binding price ceiling of the commodities.By utilizing the credibility measure of fuzzy event,variational inequality and Lagrange dual theory,the optimum behaviors of manufactures,retailers,collectors and consumers are described.Therefore,the supply chain network equilibrium model is established.Numerical examples were given to illustrate the impact of production capacity constraints and price ceiling on the network equilibrium pattern.The results show that the shortage of commodities in consumer market will be more serious,the wholesale price of product and purchase price of waste products rise,the profits of retailers decrease,the profits of manufacturers and collectors increase as the government gradually reduce the binding price ceiling on competitive markets,and the trend will be more obvious in the existence of production capacity constraints at same time.展开更多
Wireless ad ho network is becoming a new research fronter, in which security is an important issue. Usually some nodes act maliciously and they are able to do different kinds of Denial of Service (Dos). Because of the...Wireless ad ho network is becoming a new research fronter, in which security is an important issue. Usually some nodes act maliciously and they are able to do different kinds of Denial of Service (Dos). Because of the limited resource, intrusion detection system (IDS) runs all the time to detect intrusion of the attacker which is a costly overhead. In our model, we use game theory to model the interactions between the intrusion detection system and the attacker, and a realistic model is given by using Bayesian game. We solve the game by finding the Bayesian Nash equilibrium. The results of our analysis show that the IDS could work intermittently without compromising on its effectiveness. At the end of this paper, we provide an experiment to verify the rationality and effectiveness of the proposed model.展开更多
This article is intended as a proposal for a numerical model for the prediction of the ultimate moment of a reinforced concrete beam reinforced with composite materials based on neural networks, which are classified i...This article is intended as a proposal for a numerical model for the prediction of the ultimate moment of a reinforced concrete beam reinforced with composite materials based on neural networks, which are classified in the artificial intelligence method. In this work, a RBF network or radial basis function type model was created and tested. The validation of the RBF architecture consists in judging its predictive capacity by using the weights and biases computed during the training, to apply them to another database which did not participate to the training and testing of the model. So, with Bayesian regularization, a maximum error of 0.0813 Tm in absolute value was found between the targets and predicted outputs. The value of the mean square error MSE = 1.1106 * 10<sup>-4</sup> allowed us to quantify and justify the prediction performance of this network. Through this article, RBF network model was justified perform and can be used and exploited by our engineers with a high reliability rate.展开更多
文摘随着分布式能源的发展,传统用户具备发电能力而成为产消者(production and consumption users,PCU)的趋势愈演愈烈,该文主要研究了同一微能网下大量产消者的协同运行问题。电价不确定性和产消者响应给微能网协同不同利益主体的PCU之间的调度带来困难。在此背景下提出考虑产消者响应与电价不确定性的微能网与产消者混合博弈优化策略。首先,构建产消者响应模型和电价不确定性模型,引入效用函数来描述PCU的满意程度,采用鲁棒优化和机会约束方法描述电价的不确定性与新能源出力的不确定性。其次,构建混合博弈模型,即上层微能网运营商(integrated energy operator,IEO)与下层PCU之间的主从博弈模型和下层PCU联盟之间的合作博弈模型。上层IEO作为主从博弈的领导者以运行成本最小化为目标,通过为产消者制定电价、热价引导产消者的用能需求;下层产消者作为跟随者,以效益最大为目标通过合作方式对IEO的决策进行产消者响应。PCU之间的合作博弈以纳什议价的方式进行,将PCU模型等效为联盟收益最大化和合作分配两个子问题。基于KKT条件利用Big-M法和Mc Cormick包络法将双层问题转换为单层混合整数线性规划问题求解主从博弈,结合交替方向乘子法(alternating direction multiplier method,ADMM)求解下层合作博弈。结果表明,该文所提策略有效协调了微能网与PCU的调度并保证了PCU合作联盟的公平性。
文摘针对多域网络中的切片存在域间时延不均的问题,提出了一种基于域间时延博弈的端到端动态协同切片方法(interdomain dynamic game algorithm,IDGA)。采用博弈论方法将端到端时延约束分配到不同的网络域,通过在域内部署切片来获得相应的博弈收益,采用DDPG算法不断更新博弈策略,最终得到最佳的时延分配比例和切片部署方案。实验表明,该算法与传统的静态分配算法对比有明显优势,与经验迭代的DSDP方法以及DQN-SNAF算法相比,IDGA算法在100个切片请求下,切片部署成功率分别提高了8%和3%左右,同时节点资源利用率提高了5.75%和1.96%左右,在降低部署成本方面也有显著优势。
基金supported by the National Natural Science Foundation of China(61503225)the Natural Science Foundation of Shandong Province(ZR2015FQ003,ZR201709260273)
文摘Using the semi-tensor product method, this paper investigates the modeling and analysis of networked evolutionary games(NEGs) with finite memories, and presents a number of new results. Firstly, a kind of algebraic expression is formulated for the networked evolutionary games with finite memories, based on which the behavior of the corresponding evolutionary game is analyzed. Secondly, under a proper assumption, the existence of Nash equilibrium of the given networked evolutionary games is proved and a free-type strategy sequence is designed for the convergence to the Nash equilibrium. Finally, an illustrative example is worked out to support the obtained new results.
文摘The exact evolutionary history of any set of biological taxa is unknown, and all phylogenetic reconstructions are approximations. The problem becomes harder when one must consider a mix of vertical and lateral phylogenetic signals. In this paper we propose a game theoretic approach to constructing biological networks. The key hypothesis is that evolution is driven by distinct mechanisms that seek to maximize two competing objectives, taxonomic conservation and diversity. One branch of the mathematical theory of games is brought to bear. It translates this evolutionary game hypothesis into a mathematical model in two-player zero-sum games, with the zero-sum assumption conforming to one of the fundamental constraints in nature in mass and energy conservation. We demonstrate why and how a mechanistic and localized adaptation to seek out greater information for conservation and diversity may always lead to a global Nash equilibrium in phylogenetic affinity. Our game theoretic method, referred to as bioinformatic game theory, is used to construct network clusters. As an example, we applied this method to clustering of a multidomain protein family. The protein clusters identified were consistent with known protein subfamilies, indicating that this game-theoretic approach provides a new framework in biological sequence analysis, especially in studying gene-genome and domain-protein relationships.
基金supported by National Science Foundation Project of P. R. China (No.61501026,U1603116)the Fundamental Research Funds for the Central Universities (No.FRF-TP-15-032A1)
文摘In this paper, we investigate the link resource management problem for optical networks, to achieve the resource cost during the information transmission. We use the differential game to formulate the cost control problem for the link resource management, to minimize the resource allocation cost functions, which dynamic behaviours are described by differential equations. Each link controls its transmission bandwidth based on the Nash equilibriums of the differential game. The effectiveness of the proposed model is given through numerical simulations.
基金the National Defense Basic Research Foun-dation of China (C2720061361)
文摘Focusing on dropping packets attacks in sensor networks, we propose a model of dropping packets attack-resistance as a repeated game based on such an assumption that sensor nodes are rational. The model prevents malicious nodes from attacking by establishing punishment mechanism, and impels sensor networks to reach a collaborative Nash equilibrium. Simulation results show that the devised model can effectively resist the dropping packets attacks(DPA) by choosing reasonable configuration parameters.
基金study by the National Natural Science Foundation of China,Shandong province by the National Science Foundation Project,Project number:71202142,ZR2012GM002
文摘A closed-loop supply chain network equilibrium problem is examined,which consists of mutual competitive manufacturers with production capacity constraints and retailers with fuzzy market demands,mutual competitive collectors as well as a binding price ceiling of the commodities.By utilizing the credibility measure of fuzzy event,variational inequality and Lagrange dual theory,the optimum behaviors of manufactures,retailers,collectors and consumers are described.Therefore,the supply chain network equilibrium model is established.Numerical examples were given to illustrate the impact of production capacity constraints and price ceiling on the network equilibrium pattern.The results show that the shortage of commodities in consumer market will be more serious,the wholesale price of product and purchase price of waste products rise,the profits of retailers decrease,the profits of manufacturers and collectors increase as the government gradually reduce the binding price ceiling on competitive markets,and the trend will be more obvious in the existence of production capacity constraints at same time.
文摘Wireless ad ho network is becoming a new research fronter, in which security is an important issue. Usually some nodes act maliciously and they are able to do different kinds of Denial of Service (Dos). Because of the limited resource, intrusion detection system (IDS) runs all the time to detect intrusion of the attacker which is a costly overhead. In our model, we use game theory to model the interactions between the intrusion detection system and the attacker, and a realistic model is given by using Bayesian game. We solve the game by finding the Bayesian Nash equilibrium. The results of our analysis show that the IDS could work intermittently without compromising on its effectiveness. At the end of this paper, we provide an experiment to verify the rationality and effectiveness of the proposed model.
文摘This article is intended as a proposal for a numerical model for the prediction of the ultimate moment of a reinforced concrete beam reinforced with composite materials based on neural networks, which are classified in the artificial intelligence method. In this work, a RBF network or radial basis function type model was created and tested. The validation of the RBF architecture consists in judging its predictive capacity by using the weights and biases computed during the training, to apply them to another database which did not participate to the training and testing of the model. So, with Bayesian regularization, a maximum error of 0.0813 Tm in absolute value was found between the targets and predicted outputs. The value of the mean square error MSE = 1.1106 * 10<sup>-4</sup> allowed us to quantify and justify the prediction performance of this network. Through this article, RBF network model was justified perform and can be used and exploited by our engineers with a high reliability rate.