613,344 results on '"game theory"'
Search Results
102. A Two-stage Service-oriented Task Offloading Framework with Edge-cloud Collaboration: A Game Theory Approach
- Author
-
Li, Shiyong, Li, Wenzhe, Liu, Huan, and Sun, Wei
- Published
- 2024
- Full Text
- View/download PDF
103. Game theory analysis when playing the wrong game
- Author
-
Zwillinger, Dan and Clemente, Paul San
- Subjects
Computer Science - Computer Science and Game Theory - Abstract
In classical game theory, optimal strategies are determined for games with complete information; this requires knowledge of the opponent's goals. We analyze games when a player is mistaken about their opponents goals. For definitiveness, we study the (common) bimatrix formulation where both player's payoffs are matrices. While the payoff matrix weights are arbitrary, we focus on strict ordinal payoff matrices, which can be enumerated. In this case, a reasonable error would be for one player to switch two ordinal values in their opponents payoff matrix. The mathematical formulation of this problem is stated, and all 78 strict ordinal 2-by-2 bimatrix games are investigated. This type of incomplete information game has not -- to our knowledge -- been studied before.
- Published
- 2023
104. Use game theory for climate models that really help reach net zero goals.
- Author
-
Aviso KB, Tan RR, Cruz JB Jr, and Migo-Sumagang MV
- Subjects
- Climate Models, Game Theory, Goals, Global Warming legislation & jurisprudence, Global Warming prevention & control
- Published
- 2024
- Full Text
- View/download PDF
105. Game Theory : Third East Asia International Conference, EAGT 2019, Fuzhou, China, March 7–9, 2019, Revised Selected Papers
- Author
-
Deng-Feng Li and Deng-Feng Li
- Subjects
- Computer science—Mathematics, Artificial intelligence, Computer networks
- Abstract
This book constitutes extended, revised and selected papers from the Third East Asia Game Theory International Conference, EAGT 2019, held in Fuzhou, China, in March 2019. The 10 full papers presented in this volume were carefully reviewed and selected from a total of 146 submissions. The papers in the volume are focused on non-cooperative and cooperative games and cover such subjects or disciplines as game theory, operations research, mathematics, decision science, management science, economics, experiment economics, system engineering, psychology and control theory.
- Published
- 2019
106. Risk assessment of high-speed railway CTC system based on improved game theory and cloud model
- Author
-
Sun, Yanhao, Zhang, Tao, Ding, Shuxin, Yuan, Zhiming, and Yang, Shengliang
- Published
- 2024
- Full Text
- View/download PDF
107. Efficient QoS processing for internet of medical things using non-cooperative game theory: resource allocation in cloud framework
- Author
-
Xu, Zongpeng, Ban, Fuyu, and Fotia, Pasquale
- Published
- 2024
- Full Text
- View/download PDF
108. Game theory approach for secured supply chain management in effective trade management
- Author
-
Chu, Wei, Shi, Yanzhao, Jiang, Xue, Ciano, Tiziana, and Zhao, Bin
- Published
- 2024
- Full Text
- View/download PDF
109. A novel selfish node detection based on reputation and game theory in Internet of Things
- Author
-
Abdi, Gholam Hossein, Sheikhani, Amir Hossein Refahi, Kordrostami, Sohrab, Ghane, Armin, and Babaie, Shahram
- Published
- 2024
- Full Text
- View/download PDF
110. Risk assessment of gas explosion in coal mines based on game theory and Bayesian network
- Author
-
Zhijun LIN, Min LI, Shan HE, Shiliang SHI, Xiaona TIAN, and Dan WANG
- Subjects
gas explosion ,bayesian network ,game theory ,portfolio weighting ,risk assessment ,Geology ,QE1-996.5 ,Mining engineering. Metallurgy ,TN1-997 - Abstract
In order to solve the problem of uncertainty processing and the fuzziness of index weight in the risk analysis of gas explosion, a risk assessment model of gas explosion using the Bayesian network and game theory is proposed. Firstly, the topological structure model of gas explosion is constructed based on expertise and accident-causing theories. At the same time, the subjective and objective weights of experts are determined by game theory optimization. Then, the prior probability and conditional probability of risk factors are calculated based on the fuzzy set theory. Secondly, the Bayesian inference technology is used to calculate the probability of gas explosion and the posterior probability distribution of risk factors. Finally, the sensitivity analysis and key cause chain analysis are used to find out the key risk factors and key risk paths affecting gas explosion. The case study shows that the probability of gas explosion in the working face of a coal mine in Shandong Province is 6.5%. The main ignition sources of gas explosion are electric failures, friction between rocks, blasting sparks and coal spontaneous combustion, while the main causes of gas accumulation are ventilation system failures and ventilation system design. Through sensitivity analysis, it can be seen that two factors of ventilation system failures and electric failures are the most sensitive. According to the analysis of the key causal chain, it shows that the combination of the path of electric failures→ventilation system failures→ventilation measures→gas control measures→gas transfinite and the path of electric failures→electric spark→ignition source leads to the highest possibility of gas explosion. Compared with normal conditions, the probability of gas explosion increased by 301.5%. At the same time, the combination weighting method based on game theory has comprehensive advantages in improving the objectivity and accuracy of index weights, and the evaluation results accords with the actual situation of coal mines.
- Published
- 2024
- Full Text
- View/download PDF
111. Game theory in network security for digital twins in industry
- Author
-
Hailin Feng, Dongliang Chen, Haibin Lv, and Zhihan Lv
- Subjects
Digital twins ,Industrial internet of things ,Network security ,Game theory ,Attack and defense ,Information technology ,T58.5-58.64 - Abstract
To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion, a series of discussions on network security issues are carried out based on game theory. From the perspective of the life cycle of network vulnerabilities, mining and repairing vulnerabilities are analyzed by applying evolutionary game theory. The evolution process of knowledge sharing among white hats under various conditions is simulated, and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed. On this basis, the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm (WCA) to produce better replacement individuals with greater probability from the perspective of both attack and defense. Through the simulation experiment, it is found that the convergence speed of the probability (X) of white Hat 1 choosing the knowledge sharing policy is related to the probability (x0) of white Hat 2 choosing the knowledge sharing policy initially, and the probability (y0) of white hat 2 choosing the knowledge sharing policy initially. When y0 = 0.9, X converges rapidly in a relatively short time. When y0 is constant and x0 is small, the probability curve of the “cooperative development” strategy converges to 0. It is concluded that the higher the trust among the white hat members in the temporary team, the stronger their willingness to share knowledge, which is conducive to the mining of loopholes in the system. The greater the probability of a hacker attacking the vulnerability before it is fully disclosed, the lower the willingness of manufacturers to choose the ''cooperative development'' of vulnerability patches. Applying the improved wolf colony-co-evolution algorithm can obtain the equilibrium solution of the ''attack and defense game model'', and allocate the security protection resources according to the importance of nodes. This study can provide an effective solution to protect the network security for digital twins in the industry.
- Published
- 2024
- Full Text
- View/download PDF
112. Risk assessment of karst water inrush in tunnel engineering based on improved game theory and uncertainty measure theory
- Author
-
Rui Zhao, Linsen Zhang, Ankui Hu, Song Kai, and Chenchen Fan
- Subjects
Tunnel engineering ,Karst water inrush ,Risk assessment ,Improved game theory ,Medicine ,Science - Abstract
Abstract The sudden inrush of water poses a serious threat to the safety of workers during tunnel construction in the karst region of southwest China. To mitigate this risk, a model is proposed to assess the risk of water surge through a tunnel by combining improved game theory with uncertainty measure theory. Eight indicators of risk were extracted based on the solubility of rock, its geological structure, capacity for surface catchment, and hydrogeological factors, and were incorporated into the proposed model. The subjective weights of these indicators were obtained using the analytic hierarchy process, while their objective weights were calculated through the entropy weighting method and the criteria importance through intercriteria correlation method. An improved game theory-based method of combinatorial weighting was then used to construct the corresponding weight vectors. Single-indicator measurement functions and multi-indicator measurement matrices were utilized to classify and evaluate the indicators of the risk of a surge in water level based on a confidence criterion. The proposed method was applied to five typical karst sections of the Yanjin Tunnel of the Chongqing–Kunming High-speed Railway Project, and the method was validated by comparing the recorded and estimated inflow volume ranges during the project’s construction, showing consistency with the actual evaluation results. This proposed model thus offers a practical tool for assessing the risk of water inrush in karst tunnels.
- Published
- 2024
- Full Text
- View/download PDF
113. Power control in LTE based on heuristic game theory for interference management
- Author
-
D. Diana Josephine and A. Rajeswari
- Subjects
Het-net ,heuristic game theory approach ,inter-cell interference ,power control ,wireless network ,Control engineering systems. Automatic machinery (General) ,TJ212-225 ,Automation ,T59.5 - Abstract
In the conventional LTE homogeneous network, sufficient transmit power of user equipment (UE) is determined by open-loop power control (OL-PC) and closed-loop power control (CL-PC) schemes. However, in a Het-Net environment, setting the UE’s transmit power requires delicate responsiveness to handle the severe and complicated uplink interference. In this paper, an interference-aware uplink power control mechanism based on Heuristic game theory approach is proposed for devices coexisting in a heterogeneous wireless network. Various wireless constraints like channel response, path loss, fading, shadowing, interference and metrics like SNR, SINR, throughput and bit rates are considered. Uplink power is controlled by suitably selecting the penalization factor (β) based on a simple Heuristic game theory approach considering the possible wireless constraints of each user depending on its location in the cell under consideration. The algorithm is framed in such a way to reduce inter-cell interference, limit transmit power, enhance bit rates and throughput of users. A significant improvement of 5.2% in the user coverage/distribution is achieved as a result of interference management compared to conventional power control scheme and power control with convex pricing.
- Published
- 2024
- Full Text
- View/download PDF
114. The Game Theory in Quantum Computers: A Review
- Author
-
Raquel Pérez-Antón, José Ignacio López Sánchez, and Alberto Corbi
- Subjects
nash equilibrium ,polynomial time quantum problems ,quantum ,computing ,game theory ,Technology - Abstract
Game theory has been studied extensively in recent centuries as a set of formal mathematical strategies for optimal decision making. This discipline improved its efficiency with the arrival, in the 20th century, of digital computer science. However, the computational limitations related to exponential time type problems in digital processors, triggered the search for more efficient alternatives. One of these choices is quantum computing. Certainly, quantum processors seem to be able to solve some of these complex problems, at least in theory. For this reason, in recent times, many research works have emerged related to the field of quantum game theory. In this paper we review the main studies about the subject, including operational requirements and implementation details. In addition, we describe various quantum games, their design strategy, and the used supporting tools. We also present the still open debate linked to the interpretation of the transformations of classical algorithms in fundamental game theory to their quantum version, with special attention to the Nash equilibrium.
- Published
- 2024
- Full Text
- View/download PDF
115. Game Theory for Managing Evolving Systems: Challenges and Opportunities of Including Vector-Valued Strategies and Life-History Traits
- Author
-
Kleshnina, Maria, Streipert, Sabrina, Brown, Joel S., and Staňková, Kateřina
- Published
- 2023
- Full Text
- View/download PDF
116. A new approach based on game theory to reflect meta-cluster dependencies into VoIP attack detection using ensemble clustering
- Author
-
Bavifard, Farid, Kheyrandish, Mohammad, and Mosleh, Mohammad
- Published
- 2023
- Full Text
- View/download PDF
117. A Solution to Dynamic Weapon Assignment Problem Based on Game Theory for Naval Platforms.
- Author
-
Akbel, Oğuzkan and Kalaycıoğlu, Aykut
- Subjects
- *
NASH equilibrium , *GAME theory , *MATHEMATICAL optimization , *DYNAMICAL systems , *CONTINUOUS functions - Abstract
Weapon target assignment is a critical challenge in military contexts. Traditionally, commanding officers manually decide weapon assignments, but the problem's complexity has grown over time. To address this, automated systems have been introduced. These systems fall into two categories, which are static (time-independent) and dynamic (considering changes over time). Static systems solve the problem for a single time step without considering temporal changes. Dynamic systems incorporate time as a variable, adapting to evolving scenarios. Two main approaches exist, which are asset-based and target-based. Asset-based approach maximizes the survival probability of assets, which is our focus in this study. We propose a solution using game theory that spans the entire area and all time frames. We employ game theory, treating continuous functions of time as utility functions for vessels. Continuous probability-to-kill values for weapons are defined across the area. Threat trajectories yield continuous kill probabilities for the weapons, translating to vessel utility. To avoid inefficiencies, we align individual vessel utility with global utility. The Nash Equilibrium provides the optimal weapon assignment strategy. Our study uses a naval environment for analysis. In summary, our research leverages game theory to dynamically assign weapons to naval vessels, aiming to maximize asset survival. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
118. Design methodology of permanent magnet eddy current brake and optimization based on the Stackelberg game theory.
- Author
-
Yumeng Fan and Guolai Yang
- Subjects
- *
IMPACT loads , *GAME theory , *BRAKE systems , *EDDIES , *MACHINERY - Abstract
The permanent magnet eddy current brake (ECB) discussed in this paper are expected to brake a strong impact load for a large-scale machinery, and its design requirement is to brake smoothly within a given displacement limit. A design method is proposed to be able to design and calculate the based on the design requirements. According to the requirements of the brake displacement, an expected brake force can be calculated. Then, through the analysis of the permanent magnet operating point and the analysis and calculation of the design parameters, a reasonable design scheme that matches the prime design requirements can be obtained. When facing strong shock loads, in addition to satisfying braking requirements, different shock conditions can lead to different practical braking process. Making the corresponding braking process smoother can be regarded as an additional design objective, thus the design scheme obtained can be optimized in a certain range accordingly. A multi-objective optimization design of the ECB is carried out in combination with the Stackelberg game theory. After verifying the optimization results, it can be obtained that the given design and optimization methods are applicable and can satisfy the design and optimization objectives. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
119. An Ultra-Refined Grammar for Interactions : Thoughts on Robert Aumann’s Philosophy of Game Theory
- Author
-
Linsbichler, Alexander
- Published
- 2023
120. Dynamic assessment of seawater quality based on semi-partial subtraction set pair potential method and game theory.
- Author
-
Liu Q, Xu X, Zhang S, and Wang M
- Subjects
- Seawater, Game Theory, Environmental Monitoring
- Abstract
The assessment of seawater quality is a complex process as it involves the influence of several factors and is characterized by dynamic changes in these factors. Herein, a novel model coupled with the semi-partial subtraction set pair potential method (SSSPP) and game theory was discussed for the dynamic assessment of seawater quality. In the proposed model, the identity-discrepancy-contrary degrees were calculated to construct the evaluation matrix, and then the classification and the dynamic risk trends of the seawater quality were determined. A case study and comparison with the single-factor approach and Nemerow index evaluation method were carried out to confirm the accuracy and dependability of the suggested model. The results indicate that the proposed method can be used to measure trends in seawater quality evolution and also to diagnose key indicators affecting seawater quality. It provides a new and effective way to accurately identify the quality of seawater and its trends., (© 2024. The Author(s), under exclusive licence to Springer Nature Switzerland AG.)
- Published
- 2024
- Full Text
- View/download PDF
121. A Review On Game Theory With Smart Grid Security
- Author
-
Masum, Rahat
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Computer Science and Game Theory ,Computer Science - Machine Learning - Abstract
Smart grid is the modern two way mechanism combining the power grid, control center, smart metering facility, energy routing and customer demand response services. The system being complicated, security vulnerabilities are paramount for the sound operation and process continuation. Since smart grid connects with the end user to the energy providers, these two parties can interact with each other within the whole energy management work flow. In this regard, game theory provides effective insights in the analysis of security measures for smart grid. The mentioned parties will be the players in the game model to provide a solution for the various threats to the grid aspects. In this work, a brief review has presented with the existing approaches to the threat models for divergent sectors of the smart grid. The solution approaches to these threats are based on the game theoretical approaches that connect the attackers and defenders in the scenarios., Comment: survey paper, security, distributed system
- Published
- 2023
122. Power control in LTE based on heuristic game theory for interference management.
- Author
-
Josephine, D. Diana and Rajeswari, A.
- Subjects
GAME theory ,BIT rate ,HEURISTIC ,MANAGEMENT philosophy ,MULTICASTING (Computer networks) ,COGNITIVE radio ,PRICE regulation - Abstract
In the conventional LTE homogeneous network, sufficient transmit power of user equipment (UE) is determined by open-loop power control (OL-PC) and closed-loop power control (CL-PC) schemes. However, in a Het-Net environment, setting the UE’s transmit power requires delicate responsiveness to handle the severe and complicated uplink interference. In this paper, an interference-aware uplink power control mechanism based on Heuristic game theory approach is proposed for devices coexisting in a heterogeneous wireless network. Various wireless constraints like channel response, path loss, fading, shadowing, interference and metrics like SNR, SINR, throughput and bit rates are considered. Uplink power is controlled by suitably selecting the penalization factor (β) based on a simple Heuristic game theory approach considering the possible wireless constraints of each user depending on its location in the cell under consideration. The algorithm is framed in such a way to reduce inter-cell interference, limit transmit power, enhance bit rates and throughput of users. A significant improvement of 5.2% in the user coverage/ distribution is achieved as a result of interference management compared to conventional power control scheme and power control with convex pricing. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
123. Game Theory in the Realm of Pop Culture: A Novel Approach to Social Media Strategy.
- Author
-
Talajić, Mirko, Vrankić, Ilko, and Matić, Lucia
- Subjects
- *
GAME theory , *POPULAR culture , *SOCIAL media , *MARKETING strategy , *EDUCATION research - Abstract
This paper explores the intersection of game theory and pop culture as a potent strategy for amplifying social media engagement. A methodological analysis demonstrates how game theory principles can be effectively applied to social media campaigns by leveraging the universal appeal of pop culture. The study introduces a simple yet illustrative model that outlines the strategic use of pop culture elements to attract new followers and maximise net profit, considering variables such as potential follower base, cost of pop culture integration, and the preferences of different audience segments towards pop culture-infused products. Findings underscore the untapped potential of conscious game theory application in social media strategy design, offering a fresh perspective on achieving optimal engagement through a balance of appeal to pop culture enthusiasts and those favouring traditional content. This contribution is novel in its approach. It provides a comprehensive review of game theory's utility in pop culture and presents a detailed framework for its application in social media campaigns. By bridging theoretical concepts with practical application, this research opens new avenues for strategic engagement in the digital age, making a significant addition to both academic research and practical marketing strategies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
124. Game theory in the case of a geopolitical operation between two persons
- Author
-
Malafeyev, O. A. and Vekovtsev, V.
- Subjects
Mathematics - Optimization and Control - Abstract
This article explores the interaction of two agents during a geopolitical operation. Collaborative work is considered, rather than being done alone. However, each agent has the goal of maximizing personal net profit. We will have 3 different situations depending on the order of the players moves, in each of which we will present the game in both expanded and normal form. In each of them we find optimal strategies for both players and possible Nash equilibrium.
- Published
- 2024
125. Quantifying AI Vulnerabilities: A Synthesis of Complexity, Dynamical Systems, and Game Theory
- Author
-
Kereopa-Yorke, B
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence - Abstract
The rapid integration of Artificial Intelligence (AI) systems across critical domains necessitates robust security evaluation frameworks. We propose a novel approach that introduces three metrics: System Complexity Index (SCI), Lyapunov Exponent for AI Stability (LEAIS), and Nash Equilibrium Robustness (NER). SCI quantifies the inherent complexity of an AI system, LEAIS captures its stability and sensitivity to perturbations, and NER evaluates its strategic robustness against adversarial manipulation. Through comparative analysis, we demonstrate the advantages of our framework over existing techniques. We discuss the theoretical and practical implications, potential applications, limitations, and future research directions. Our work contributes to the development of secure and trustworthy AI technologies by providing a holistic, theoretically grounded approach to AI security evaluation. As AI continues to advance, prioritising and advancing AI security through interdisciplinary collaboration is crucial to ensure its responsible deployment for the benefit of society., Comment: 18 pages
- Published
- 2024
126. Bridging the Gap between Discrete Agent Strategies in Game Theory and Continuous Motion Planning in Dynamic Environments
- Author
-
Zheng, Hongrui, Zhuang, Zhijun, Wu, Stephanie, Yang, Shuo, and Mangharam, Rahul
- Subjects
Computer Science - Robotics - Abstract
Generating competitive strategies and performing continuous motion planning simultaneously in an adversarial setting is a challenging problem. In addition, understanding the intent of other agents is crucial to deploying autonomous systems in adversarial multi-agent environments. Existing approaches either discretize agent action by grouping similar control inputs, sacrificing performance in motion planning, or plan in uninterpretable latent spaces, producing hard-to-understand agent behaviors. This paper proposes an agent strategy representation via Policy Characteristic Space that maps the agent policies to a pre-specified low-dimensional space. Policy Characteristic Space enables the discretization of agent policy switchings while preserving continuity in control. Also, it provides intepretability of agent policies and clear intentions of policy switchings. Then, regret-based game-theoretic approaches can be applied in the Policy Characteristic Space to obtain high performance in adversarial environments. Our proposed method is assessed by conducting experiments in an autonomous racing scenario using scaled vehicles. Statistical evidence shows that our method significantly improves the win rate of ego agent and the method also generalizes well to unseen environments., Comment: Submitted to RA-L
- Published
- 2024
127. Game Theory : A Classical Introduction, Mathematical Games, and the Tournament
- Author
-
Andrew McEachern and Andrew McEachern
- Subjects
- Sports tournaments--Mathematics, Game theory
- Abstract
This book is a formalization of collected notes from an introductory game theory course taught at Queen's University. The course introduced traditional game theory and its formal analysis, but also moved to more modern approaches to game theory, providing a broad introduction to the current state of the discipline. Classical games, like the Prisoner's Dilemma and the Lady and the Tiger, are joined by a procedure for transforming mathematical games into card games. Included is an introduction and brief investigation into mathematical games, including combinatorial games such as Nim. The text examines techniques for creating tournaments, of the sort used in sports, and demonstrates how to obtain tournaments that are as fair as possible with regards to playing on courts. The tournaments are tested as in-class learning events, providing a novel curriculum item. Example tournaments are provided at the end of the book for instructors interested in running a tournament in their own classroom.The book is appropriate as a text or companion text for a one-semester course introducing the theory of games or for students who wish to get a sense of the scope and techniques of the field.
- Published
- 2017
128. GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks
- Author
-
Mvah, Fabrice, Kengne Tchendji, Vianney, Tayou Djamegni, Clémentin, Anwar, Ahmed H., Tosh, Deepak K., and Kamhoua, Charles
- Published
- 2024
- Full Text
- View/download PDF
129. An evolutionary game theory–based study examining the relationship between fiscal policy, stability of farmers’ cooperatives, and environmentally friendly digital management
- Author
-
Ma, Dingchou, Wang, Xiaowen, Guo, Zhiyi, and Yu, Tong
- Published
- 2024
- Full Text
- View/download PDF
130. Game theory attack pricing for mining pools in blockchain-based IoT
- Author
-
Yourong Chen, Hao Chen, Zhenyu Xiong, Banteng Liu, Zhangquan Wang, and Meng Han
- Subjects
Game theory ,Blockchain ,PoW ,Mining pool ,Employment attack ,Information technology ,T58.5-58.64 - Abstract
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network. The employed computing power carries out the pool mining attacks on the attacked mining pool. To realize the win-win game between the malicious mining pool and the employee, the paper proposes an Employment Attack Pricing Algorithm (EAPA) of mining pools in blockchain based on game theory. In the EAPA, the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack, the revenue increment of malicious mining pools, and the revenue of the employee. It establishes a game model between the malicious mining pool and the employee under the employment attack. Then, the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation. In the strategy, the malicious mining pool analyzes the conditions for the employment attack, and uses the derivative method to find the optimal utilization value of computing power, employees analyze the conditions for accepting employment, and use the derivative method to find the optimal reward value of computing power. Finally, the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation. The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee. The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time. The EAPA outperforms the state-of-the-art methods such as SPSUCP, DPSACP, and FPSUCP.
- Published
- 2024
- Full Text
- View/download PDF
131. Diversified and compatible web APIs recommendation based on game theory in IoT
- Author
-
Wenwen Gong, Huiping Wu, Xiaokang Wang, Xuyun Zhang, Yawei Wang, Yifei Chen, and Mohammad R. Khosravi
- Subjects
Internet of things ,Web APIs recommendation ,Game theory ,Diversity and compatibility ,Information technology ,T58.5-58.64 - Abstract
With the ever-increasing popularity of Internet of Things (IoT), massive enterprises are attempting to encapsulate their developed outcomes into various lightweight Web Application Programming Interfaces (APIs) that can be accessible remotely. In this context, finding and writing a list of existing Web APIs that can collectively meet the functional needs of software developers has become a promising approach to economically and easily develop successful mobile applications. However, the number and diversity of candidate IoT Web APIs places an additional burden on application developers’ Web API selection decisions, as it is often a challenging task to simultaneously ensure the diversity and compatibility of the final set of Web APIs selected. Considering this challenge and latest successful applications of game theory in IoT, a Diversified and Compatible Web APIs Recommendation approach, namely DivCAR, is put forward in this paper. First of all, to achieve API diversity, DivCAR employs random walk sampling technique on a pre-built “API-API” correlation graph to generate diverse “API-API” correlation subgraphs. Afterwards, with the diverse “API-API” correlation subgraphs, the compatible Web APIs recommendation problem is modeled as a minimum group Steiner tree search problem. A sorted set of multiple compatible and diverse Web APIs are returned to the application developer by solving the minimum group Steiner tree search problem. At last, a set of experiments are designed and implemented on a real dataset crawled from www.programmableweb.com. Experimental results validate the effectiveness and efficiency of our proposed DivCAR approach in balancing the Web APIs recommendation diversity and compatibility.
- Published
- 2024
- Full Text
- View/download PDF
132. Anti-rollover Artificial Potential Field Motion Planning Method of an Autonomous Heavy Truck Optimised by Game Theory
- Author
-
Zhilin Jin and Shaowei He
- Subjects
Autonomous heavy truck ,Motion planning ,Anti-rollover ,Artificial potential field ,Game theory ,Ocean engineering ,TC1501-1800 ,Mechanical engineering and machinery ,TJ1-1570 - Abstract
Abstract Anti-rollover is a critical factor to consider when planning the motion of autonomous heavy trucks. This paper proposed a method for autonomous heavy trucks to generate a path that avoids collisions and minimizes rollover risk. The corresponding rollover index is deduced from a 5-DOF heavy truck dynamic model that includes longitudinal motion, lateral motion, yaw motion, sprung mass roll motion, unsprung mass roll motion, and an anti-rollover artificial potential field (APF) is proposed based on this. The motion planning method, which is based on model predictive control (MPC), combines trajectory tracking, anti-rollover APF, and the improved obstacle avoidance APF and considers the truck dynamics constraints, obstacle avoidance, and anti-rollover. Furthermore, by using game theory, the coefficients of the two APF functions are optimised, and an optimal path is planned. The effectiveness of the optimised motion planning method is demonstrated in a variety of scenarios. The results demonstrate that the optimised motion planning method can effectively and efficiently avoid collisions and prevent rollover.
- Published
- 2024
- Full Text
- View/download PDF
133. Pricing and Producer-Retailer Supply Chain Coordination: A Game Theory Approach
- Author
-
KF. Sunny Cahya Utama and Valeriana Lukitosari
- Subjects
collaboration advertising ,game theory ,price ,supply chain coordination ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Supply chain process is interdependent. Starting from procurement of raw materials, production, distribution, and finally the goods reaching consumers will influence each other. The costs of goods and services will be somewhat impacted by these social habits. Producers and merchants must comprehend these social behaviors in order to properly establish prices and the distribution of goods. This includes determining the prices of goods and services. Offering manufacturers who participate in cooperative advertising schemes money for a percentage of the costs connected with local advertising encourages retailers to launch additional promotional activities. The aim of this research is to investigate how cooperative pricing and advertising can improve supply chain coordination using consumer demand functions. A model based on game theory that takes the dynamics of power in the supply. A series of numerical simulations is presented to illustrate the optimal solution of channel members based on scenarios that illustrate, understand and compare the fundamental results of the game models. The results of this research are that retail price decisions are influenced by the level of competition and product differentiation. The results show that retail margins depend on local ( ) and national ( ) advertising effectiveness values. In addition, retailers can gain greater profits by setting higher prices in conditions of low price elasticity but must consider consumer sensitivity to price to maximize profits.
- Published
- 2024
- Full Text
- View/download PDF
134. An effective lane changing behaviour prediction model using optimized CNN and game theory
- Author
-
D. Prakash and K. Sathiyasekar
- Subjects
WOA-CNN ,CFCM ,weiner filter ,game theory ,lane change prediction ,Control engineering systems. Automatic machinery (General) ,TJ212-225 ,Automation ,T59.5 - Abstract
Accurately predicting lane changes, a crucial driving activity for preventing accidents and ensuring driver safety, is addressed in this study. An innovative predictive model that integrates game theory for precise lane change intention detection and an optimized Convolutional Neural Network (CNN) for trajectory prediction is proposed in this study. The CNN's efficiency is enhanced through metaheuristic optimization of both the convolution and fully connected layers using the Whale Optimization Algorithm (WOA). Emphasizing robust data processing, a Wiener filter is applied for pre-processing, and the Cascaded Fuzzy C means (CFCM) technique is employed for segmentation. The resulting Whale Optimization Algorithm-based CNN (WOA-CNN) effectively forecasts the trajectory of lane-changing vehicles. Validation of the proposed approach in Python demonstrates exceptional accuracy, reaching 96.5%. This study showcases the effectiveness of the WOA-CNN model in advancing the prediction accuracy of lane-changing behaviour, contributing to enhanced driver safety and accident prevention.
- Published
- 2024
- Full Text
- View/download PDF
135. Risk assessment of high-speed railway CTC system based on improved game theory and cloud model
- Author
-
Yanhao Sun, Tao Zhang, Shuxin Ding, Zhiming Yuan, and Shengliang Yang
- Subjects
High-speed railway ,Centralized traffic control ,Risk assessment ,Game theory ,Cloud model ,Transportation engineering ,TA1001-1280 ,Railroad engineering and operation ,TF1-1620 - Abstract
Purpose – In order to solve the problem of inaccurate calculation of index weights, subjectivity and uncertainty of index assessment in the risk assessment process, this study aims to propose a scientific and reasonable centralized traffic control (CTC) system risk assessment method. Design/methodology/approach – First, system-theoretic process analysis (STPA) is used to conduct risk analysis on the CTC system and constructs risk assessment indexes based on this analysis. Then, to enhance the accuracy of weight calculation, the fuzzy analytical hierarchy process (FAHP), fuzzy decision-making trial and evaluation laboratory (FDEMATEL) and entropy weight method are employed to calculate the subjective weight, relative weight and objective weight of each index. These three types of weights are combined using game theory to obtain the combined weight for each index. To reduce subjectivity and uncertainty in the assessment process, the backward cloud generator method is utilized to obtain the numerical character (NC) of the cloud model for each index. The NCs of the indexes are then weighted to derive the comprehensive cloud for risk assessment of the CTC system. This cloud model is used to obtain the CTC system's comprehensive risk assessment. The model's similarity measurement method gauges the likeness between the comprehensive risk assessment cloud and the risk standard cloud. Finally, this process yields the risk assessment results for the CTC system. Findings – The cloud model can handle the subjectivity and fuzziness in the risk assessment process well. The cloud model-based risk assessment method was applied to the CTC system risk assessment of a railway group and achieved good results. Originality/value – This study provides a cloud model-based method for risk assessment of CTC systems, which accurately calculates the weight of risk indexes and uses cloud models to reduce uncertainty and subjectivity in the assessment, achieving effective risk assessment of CTC systems. It can provide a reference and theoretical basis for risk management of the CTC system.
- Published
- 2024
- Full Text
- View/download PDF
136. 6G assisted federated learning for continuous monitoring in wireless sensor network using game theory
- Author
-
Phani Praveen, S., Ali, Mohammed Hasan, Jarwar, Muhammad Aslam, Prakash, Chander, Reddy, Chavva Ravi Kishore, Malliga, L., and Chandru Vignesh, C.
- Published
- 2024
- Full Text
- View/download PDF
137. Game Theory with Simulation of Other Players
- Author
-
Kovarik, Vojtech, Oesterheld, Caspar, and Conitzer, Vincent
- Subjects
Computer Science - Computer Science and Game Theory - Abstract
Game-theoretic interactions with AI agents could differ from traditional human-human interactions in various ways. One such difference is that it may be possible to simulate an AI agent (for example because its source code is known), which allows others to accurately predict the agent's actions. This could lower the bar for trust and cooperation. In this paper, we formalize games in which one player can simulate another at a cost. We first derive some basic properties of such games and then prove a number of results for them, including: (1) introducing simulation into generic-payoff normal-form games makes them easier to solve; (2) if the only obstacle to cooperation is a lack of trust in the possibly-simulated agent, simulation enables equilibria that improve the outcome for both agents; and however (3) there are settings where introducing simulation results in strictly worse outcomes for both players., Comment: The latest version fixes some typos in the proof of Theorem 5
- Published
- 2023
138. Egyptian Ratscrew: Discovering Dominant Strategies with Computational Game Theory
- Author
-
Diamond, Justin and Garcia, Ben
- Subjects
Computer Science - Computer Science and Game Theory ,Economics - Theoretical Economics - Abstract
"Egyptian Ratscrew" (ERS) is a modern American card game enjoyed by millions of players worldwide. A game of ERS is won by collecting all of the cards in the deck. Typically this game is won by the player with the fastest reflexes, since the most common strategy for collecting cards is being the first to slap the pile in the center whenever legal combinations of cards are placed down. Most players assume that the dominant strategy is to develop a faster reaction time than your opponents, and no academic inquiry has been levied against this assumption. This thesis investigates the hypothesis that a "risk slapping" strategist who relies on practical economic decision making will win an overwhelming majority of games against players who rely on quick reflexes alone. It is theorized that this can be done by exploiting the "burn rule," a penalty that is too low-cost to effectively dissuade players from slapping illegally when it benefits them. Using the Ruby programming language, we construct an Egyptian Ratscrew simulator from scratch. Our model allows us to simulate the behavior of 8 strategically unique players within easily adjustable parameters including simulation type, player count, and burn amount. We simulate 100k iterations of 67 different ERS games, totaling 6.7 million games of ERS, and use win percentage data in order to determine which strategies are dominant under each set of parameters. We then confirm our hypothesis that risk slapping is a dominant strategy, discover that there is no strictly dominant approach to risk slapping, and elucidate a deeper understanding of different ERS mechanics such as the burn rule. Finally, we assess the implications of our findings and suggest potential improvements to the rules of the game. We also touch on the real-world applications of our research and make recommendations for the future of Egyptian Ratscrew modeling., Comment: 21 pages, 8 figures, link to source code available
- Published
- 2023
139. A Methodological Framework for the Implementation of an Interdisciplinary Business Analytics Program Using Ordinal Game Theory
- Author
-
St. John, Jeremy, St. John, Karen, and Ceballos, Ruben
- Abstract
The authors' aim was to present a practical decision-making framework for decision makers (DMs) to use in evaluating interdisciplinary strategic approaches to degree program development. A framework based on ordinal game theory was applied using a recent decision to create an interdisciplinary business analytics program at a small, public university. The optimal Nash, in which each decision maker receives the most desirable outcome, was determined. The proposed methodological framework can be used for the design, evaluation, and postcommitment support of any interdisciplinary degree program.
- Published
- 2023
- Full Text
- View/download PDF
140. An effective lane changing behaviour prediction model using optimized CNN and game theory.
- Author
-
Prakash, D. and Sathiyasekar, K.
- Subjects
GAME theory ,LANE changing ,CONVOLUTIONAL neural networks ,PREDICTION models ,METAHEURISTIC algorithms ,FRANKFURTER sausages ,TRAFFIC accidents - Abstract
Accurately predicting lane changes, a crucial driving activity for preventing accidents and ensuring driver safety, is addressed in this study. An innovative predictive model that integrates game theory for precise lane change intention detection and an optimized Convolutional Neural Network (CNN) for trajectory prediction is proposed in this study. The CNN’s efficiency is enhanced through metaheuristic optimization of both the convolution and fully connected layers using the Whale Optimization Algorithm (WOA). Emphasizing robust data processing, a Wiener filter is applied for pre-processing, and the Cascaded Fuzzy C means (CFCM) technique is employed for segmentation. The resulting Whale Optimization Algorithm-based CNN (WOA-CNN) effectively forecasts the trajectory of lane-changing vehicles. Validation of the proposed approach in Python demonstrates exceptional accuracy, reaching 96.5%. This study showcases the effectiveness of the WOA-CNN model in advancing the prediction accuracy of lane-changing behaviour, contributing to enhanced driver safety and accident prevention. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
141. Technology acquisition strategy in the context of the Internet of Things using game theory.
- Author
-
He, Haojia, Tang, Hua, and Guo, Songbo
- Subjects
- *
INTERNET of things , *GAME theory , *TECHNOLOGICAL innovations , *NUMERICAL analysis , *OPEN innovation , *HIGH technology industries - Abstract
In the era of open innovation, it is of great significance to analyse strategic trade-offs for enterprises' technology acquisition between external and internal. This paper considers the relative pay-offs amongst two manufacturers' selection for their respective scarce technology of the Internet of Things, using game theory models and numerical analysis. In addition to self-innovation relying on internal resources, enterprises can obtain technology from external sources, including technology imported from a third party or cross-licensing with its competitor. Unlike empirical analysis, this study focuses on the strategic firms' interactions at the micro-level study and operational considerations, such as the factors influencing the mode of enterprise technology acquisition, firm competition and cooperation behaviour mechanism, and the selection of innovation initiators. The findings provide implications for competitive enterprises in high-tech industries to acquire complementary technologies by identifying what conditions lead to win-win outcomes. In particular, firms can adjust their licensing levels under certain conditions to adapt to the disparities in each other's development capabilities, thus achieving cross-licensing agreements. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
142. The Path of Cost Shifting for Energy Storage under Different Business Models: Based on Evolutionary Game Theory.
- Author
-
Ye, Yingjin, Zeng, Zhensong, Wu, Qifan, Lin, Hongyang, and Lin, Wenbin
- Subjects
COST shifting ,GAME theory ,ENERGY storage ,INVESTORS ,ENERGY industries - Abstract
With the acceleration of energy storage construction, investors are paying attention to how the costs of storage projects can be recovered. Market rules and incentive policies affect the dissemination of energy storage costs. This article simulates the interactive behavior of multiple agents based on evolutionary game theory, taking into account market factors such as prices, capacity, and incentive policies. It views the dissemination of storage costs as an interactive decision-making problem involving multiple agents' adoption of technology, and analyzes how market factors influence the outcomes of cost dissemination. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
143. DEVELOPING GAME THEORY-BASED METHODS FOR MODELING INFORMATION CONFRONTATION IN SOCIAL NETWORKS
- Author
-
Damir Moldabayev, Mikhail Suchkov, Zukhra Abdiakhmetova, and Amandyk Kartbayev
- Subjects
game theory ,strategy adaptation ,social networks ,information conflict ,simulation algorithm ,probabilistic approach ,analytical systems. ,Information technology ,T58.5-58.64 - Abstract
This paper explores the essential dynamics of social networks, specifically examining the phenomenon of information confrontation among users. The goal of the research is the development of a novel simulation methodology that integrates game-theoretic principles with probabilistic techniques to provide a robust model for these interactions. The theoretical framework of the study is founded on the conceptualization of user conflicts as a strategic game between two players. The primary objective for each player in this game is to exert influence and control over as many nodes within the network as possible. To capture the essence of these strategic interactions, we have introduced an innovative algorithm that facilitates dynamic strategy adaptation. This algorithm is pivotal in allowing players to modify their decision-making processes in real-time, based on the continually changing conditions of the network. For practical implementation and validation of the methodology, we used the Facebook Researcher open dataset, with a particular focus on its Kazakhstani segment. This dataset provides a rich source of empirical data, reflecting diverse user interactions and network configurations, which are essential for testing the model. This approach stands out by offering significant improvements in computational efficiency and resource management. By dynamically tracking and updating the network's status, the proposed method reduces the computational resources required, thereby enhancing the scalability of the simulation. In comparing our methodology with other existing models in the field, it becomes evident that it not only matches but in several respects surpasses these methodologies in terms of flexibility. This study makes substantial contributions to the field of social network analysis by providing a sophisticated tool that can be effectively employed to navigate and analyze the complexities of information confrontation in digital social spaces.
- Published
- 2024
- Full Text
- View/download PDF
144. Aumann and Game Theory
- Author
-
Sorin, Sylvain
- Published
- 2023
145. Engineering a social contract: Rawlsian distributive justice through algorithmic game theory and artificial intelligence
- Author
-
Ashrafian, Hutan
- Published
- 2023
- Full Text
- View/download PDF
146. GeoShapley: A Game Theory Approach to Measuring Spatial Effects in Machine Learning Models
- Author
-
Li, Ziqi
- Subjects
Computer Science - Machine Learning ,Statistics - Machine Learning - Abstract
This paper introduces GeoShapley, a game theory approach to measuring spatial effects in machine learning models. GeoShapley extends the Nobel Prize-winning Shapley value framework in game theory by conceptualizing location as a player in a model prediction game, which enables the quantification of the importance of location and the synergies between location and other features in a model. GeoShapley is a model-agnostic approach and can be applied to statistical or black-box machine learning models in various structures. The interpretation of GeoShapley is directly linked with spatially varying coefficient models for explaining spatial effects and additive models for explaining non-spatial effects. Using simulated data, GeoShapley values are validated against known data-generating processes and are used for cross-comparison of seven statistical and machine learning models. An empirical example of house price modeling is used to illustrate GeoShapley's utility and interpretation with real world data. The method is available as an open-source Python package named geoshapley., Comment: 30 pages, 10 figures, 6 tables
- Published
- 2023
147. Game Theory and Demonstratives
- Author
-
Smit, J. P.
- Published
- 2024
- Full Text
- View/download PDF
148. Game Theory : A Multi-Leveled Approach
- Author
-
Hans Peters and Hans Peters
- Subjects
- Mathematics, Microeconomics, Management science, Economics, Game theory, Operations research
- Abstract
This textbook presents the basics of game theory both on an undergraduate level and on a more advanced mathematical level. It is the second, revised version of the successful 2008 edition. The book covers most topics of interest in game theory, including cooperative game theory. Part I presents introductions to all these topics on a basic yet formally precise level. It includes chapters on repeated games, social choice theory, and selected topics such as bargaining theory, exchange economies, and matching. Part II goes deeper into noncooperative theory and treats the theory of zerosum games, refinements of Nash equilibrium in strategic as well as extensive form games, and evolutionary games. Part III covers basic concepts in the theory of transferable utility games, such as core and balancedness, Shapley value and variations, and nucleolus. Some mathematical tools on duality and convexity are collected in Part IV. Every chapter in the book contains a problem section. Hints, answersand solutions are included.
- Published
- 2015
149. Estimating visibility and understanding factors influencing its variations at Bangkok airport using machine learning and a game theory–based approach
- Author
-
Aman, Nishit, Panyametheekul, Sirima, Sudhibrabha, Sumridh, Pawarmart, Ittipol, Xian, Di, Gao, Ling, Tian, Lin, Manomaiphiboon, Kasemsan, and Wang, Yangjun
- Published
- 2024
- Full Text
- View/download PDF
150. Geometry of Set Functions in Game Theory: Combinatorial and Computational Aspects
- Author
-
Mermoud, Dylan Laplace
- Subjects
Computer Science - Computer Science and Game Theory ,Economics - Theoretical Economics ,Mathematics - Combinatorics ,91A12 (Primary) 52C35, 28A10 (Secondary) - Abstract
The main ambition of this thesis is to contribute to the development of cooperative game theory towards combinatorics, algorithmics and discrete geometry. Therefore, the first chapter of this manuscript is devoted to highlighting the geometric nature of the coalition functions of transferable utility games and spotlights the existing connections with the theory of submodular set functions and polyhedral geometry. To deepen the links with polyhedral geometry, we define a new family of polyhedra, called the basic polyhedra, on which we can apply a generalized version of the Bondareva-Shapley Theorem to check their nonemptiness. To allow a practical use of these computational tools, we present an algorithmic procedure generating the minimal balanced collections, based on Peleg's method. Subsequently, we apply the generalization of the Bondareva-Shapley Theorem to design a collection of algorithmic procedures able to check properties or generate specific sets of coalitions. In the next chapter, the connections with combinatorics are investigated. First, we prove that the balanced collections form a combinatorial species, and we construct the one of k-uniform hypergraphs of size p, as an intermediary step to construct the species of balanced collections. Afterwards, a few results concerning resonance arrangements distorted by games are introduced, which gives new information about the space of preimputations and the facial configuration of the core. Finally, we address the question of core stability using the results from the previous chapters. Firstly, we present an algorithm based on Grabisch and Sudh\"olter's nested balancedness characterization of games with a stable core, which extensively uses the generalization of the Bondareva-Shapley Theorem introduced in the second chapter. Secondly, a new necessary condition for core stability is described, based on the application ..., Comment: The author's PhD thesis
- Published
- 2023
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.