-
61
Management scheme for autonomic load balancing of TD-SCDMA wireless access network
Published 2011-01-01Get full text
Article -
62
Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud
Published 2017-06-01“…Industrial wireless sensor networks and production equipments are deployed in unattended and distributed intelligent manufacturing system (IMS).Sensor-cloud as a potential technology can effectively integrate distributed equipments as a service and provide it to mobile robots.However,when the mobile robots access the remote devices via sensor-cloud platform,because potential attackers easily intercept keys and eavesdrop equipment operation contents through wireless channels,which makes the key management and the control of equipment operation permission become crucial to the safe and reliable operation of IMS.Therefore,the utility function of game players were formalized,the adaptive trust update process was analyzed,and an adaptive trust management mechanism based on evolutionary game was proposed.Simulation results show that the proposed method can effectively improve the security of sensor-cloud network systems and equipments.…”
Get full text
Article -
63
Cooperative routing algorithm based on game theory
Published 2013-08-01“…In order to improve the routing performance of selfish wireless network, a VMIMO coop-erative routing algorithm based on game theory was proposed. …”
Get full text
Article -
64
Damage toughness assessment method of power backbone communication network based on power big data
Published 2023-05-01“…The damage toughness assessment method of power backbone communication network based on power big data was studied, and the damage toughness assessment results were used to formulate protection strategies and improve the network survivability.The power backbone communication network and the attacker were set as the two sides of the game, and the Nash equilibrium strategy of both sides was determined by the minimax method.The damage probability of nodes was obtained by the Nash equilibrium strategy, and the node damage probability was transformed into the network damage form.According to the network damage pattern, the repair conditions contained in the power big data were obtained by cloud computing technology.According to the importance of each node, the repair resources and repair budget were allocated to the nodes in order.The performance time-history response curve of the power backbone communication network was constructed, and the dynamic evaluation results of the network damage toughness were output.The experimental results show that all operations using cloud computing technology to process massive power big data can not exceed 330 ms.When the repair budget and repair resources are the highest, the damage toughness of the power backbone communication network can reach 0.925 at most, indicating that this method can effectively evaluate the damage toughness of the power backbone communication network.…”
Get full text
Article -
65
A visual-physiology multimodal system for detecting outlier behavior of participants in a reality TV show
Published 2019-07-01Get full text
Article -
66
New collaborative DDoS defense technology based on NFV
Published 2019-04-01“…To solve the problem of selfish behavior for self-security due to limited resources in the process of resisting distributed denial of service (DDoS) attacks by a collaborative network built with network function virtualization (NFV) technology,a new collaborative DDoS defense network model was proposed.a repeat prisoner's dilemma game model was built in the collaborative network,a reward and punishment incentive mechanism was introduced to strengthen the cooperation of the collaborative network,and a dynamic resource allocation mechanism based on social reputation value assessment was adopted.Simulation results show that the new collaborative DDoS attack defense technology outperforms existing solutions in terms of packet loss rate,cooperation,and resource allocation rate,improving the effectiveness of DDoS attack defense.…”
Get full text
Article -
67
High-efficient RPL routing for analyzing mobility of nodes
Published 2019-08-01“…To deal with the mobility of nodes in low-power and lossy network(LLN),the adaptive transmission rate based game-theory mobile RPL (GT-mRPL) was proposed.GT-mRPL uses variable transmission rate-based game theory to achieve higher packet delivery ratio and better throughput.In a mobile environment,a game was designed for nodes competing to send data.The payoff function was defined to assess the profit gained from increasing data transmission rate (utility function) against the cost induced by the presence of mobile nodes (mobility function).Other factor was also taken into account in formulating the payoff function including the energy consumption.Simulation results show that in the presence of mobility,GT-mRPL reduces the packet lost ratio and improves the throughput.…”
Get full text
Article -
68
Coalitional Game Theoretical Approach for VANET Clustering to Improve SNR
Published 2019-01-01“…Clustering is considered as the potential approach for network management in vehicular ad hoc network (VANET). …”
Get full text
Article -
69
Network youth communities in the social-cultural space of the northern region: methodological and empirical aspects of the study
Published 2024-12-01“…As a promising model for further studies of the youth online communities, the authors propose the game-theoretical approach as the most relevant for the empirical characteristics of online social networks. …”
Get full text
Article -
70
Coordinated Optimization of Multi-Regional Integrated Energy Service Providers with Flexible Reserve Resources
Published 2025-01-01“…Second, based on the interaction relationship between the active distribution network (ADN) and multi-region IESPs, a mixed game model of the ADN and IESP alliance is established. …”
Get full text
Article -
71
Distributed beamforming algorithm based on game theory in device-to-device communications
Published 2018-08-01“…In the device-to-device communication network, there is the interference problem when device-to-device users share the same spectrum with cellular users, a distributed beamforming scheme based on non-cooperative game is proposed to maximize weighted sum rate under the rated transmit power and the users’ quality of service. …”
Get full text
Article -
72
Conserver la faune sauvage de la péninsule malaise : de la Malaya britannique à la Malaisie indépendante
Published 2017-05-01“…After Independence, the Society was at the centre of a network that connected conservationists, scientists, Game Wardens and decision makers. …”
Get full text
Article -
73
Novel cooperative power control game algorithm for cognitive radio systems
Published 2007-01-01Get full text
Article -
74
Novel non-cooperative power control game algorithm for cognitive radio
Published 2012-11-01“…A novel non-cooperative power control algorithm based on new pricing function and the characteristics of cognitive radio technology was proposed with the interference temperature constrain,in order to improve signal to interference plus noise ratio of CR.The problem of power control was changed into the problem of multi-restraints non-linear optimization with interference limits based on channel conditions,maximal network and power limits.The existence and unique of nash equilibrium(NE)in utility function by the principle of game theory and optimization were proved and a distributed algorithm for this game was proposed.Simulation results show that the proposed algorithm can improve users QoS(quality of serves),system performance effectively and improve radio resource efficiency.…”
Get full text
Article -
75
Dual-target WOA spectrum sharing algorithm based on Stackelberg game
Published 2020-09-01“…In order to solve the complex spectrum allocation problem,a dual-target whale optimization algorithm (WOA) with strong parallel computing capabilities was introduced,and a Stackelberg game model was proposed that could effectively reflect the actual spectrum requirements,and a dual-target WOA optimized distributed antenna system (DAS) spectrum sharing scheduling algorithm was designed.Simulation results show that performance comparison is performed from multiple indicators such as optimal pricing and user benefits.The proposed algorithm has a good spectrum sharing allocation effect,can achieve fair and effective spectrum allocation,and provides an important reference for the future communication network spectrum sharing mode.…”
Get full text
Article -
76
Lane-Changing Behavior Prediction Based on Game Theory and Deep Learning
Published 2021-01-01“…For the deep-learning component, long short-term memory and a convolutional neural network are used to extract and learn data features during the lane-changing process as well as combine the output of the game theory component to obtain the prediction result of whether the vehicle will change lanes. …”
Get full text
Article -
77
Sequencing of game complexes in women’s volleyball: are there differences according to the set played?
Published 2024-12-01“…Conclusions In conclusion, women’s volleyball presents gameplay strategies to sustain play, promoting game continuity, regardless of the set played. The number of game complexes required to secure a point varies between two and three game complexes. …”
Get full text
Article -
78
Modeling Slotted Aloha as a Stochastic Game with Random Discrete Power Selection Algorithms
Published 2009-01-01Get full text
Article -
79
Strategy of container migration and honeypot deployment based on signal game in cloud environment
Published 2022-06-01“…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
Get full text
Article -
80
Global randomized consensus algorithm resist collusion attack based on game theory
Published 2022-08-01“…As the cornerstone of blockchain technology, consensus technology has received more attention with the continuous development of blockchain technology.The development of consensus technology has become more and more rapid, but there are still related problems.Nowadays, fault-tolerant consensus algorithms, as one of the representative blockchain consensus technologies, still have many problems to be studied.The problem of node randomness and node collusion attacks in fault-tolerant consensus algorithms had been studied, and a game-theoretic-based anti-corruption algorithm was proposed.The global randomization consensus algorithm of collusion attack improved the security and throughput of the blockchain network by realizing the randomization of nodes and solving related security problems.In the process of selecting nodes participating in the fault-tolerant consensus algorithm, the global randomization of the initiator and verifier nodes was realized by using the mapping function and the weighted random function, thereby ensuring the identity anonymity of the initiator and verifier nodes and improving the blockchain network security accordingly.The reputation update model was used to realize the dynamic update of the reputation, and the game theory was used to analyze the security problems of the fault-tolerant consensus algorithm.A more correct and efficient algorithm model was constructed to improve the throughput of the algorithm and analyze the problem of collusion attack of more than one third of the nodes in this kind of algorithm, the refined Bayesian game was used to construct a collusion contract and analyze the collusion The Nash equilibrium point between the two nodes was adopted to solve the collusion attack problem of more than one third of the nodes.The security analysis and experiments show that the global randomization consensus algorithm based on the game theory anti-collusion attack is better than PoW、PoS and PBFT.The consensus algorithm is not only effective to improve throughput and reduce computing resource consumption, but also resistant to DDoS, Eclipse attacks and collusion attacks by more than one third of nodes.…”
Get full text
Article