Evolutionary games are widely studied in the fields of biology, sociology, economics and informatics. People's interests focus on how cooperation emerged in a system that individuals are selfish. We studied the it...
详细信息
ISBN:
(纸本)9787894631046
Evolutionary games are widely studied in the fields of biology, sociology, economics and informatics. People's interests focus on how cooperation emerged in a system that individuals are selfish. We studied the iterated Prisoner's Dilemma Game evolved on BA network with genetic algorithm. Nodes in network could remember the game historical strategies and coded into gene. We show that memory length has gentle effect on cooperation level, and that some characteristic genes and frequentlyused genes emerge after some generations. We also find that cooperate strategy distributed on different degree-nodes equably. These findings give new perspectives to the illustration of cooperation behavior in biological group and society.
Using the multi-objective hybrid simulated annealing algorithm, this paper optimal design the three-phase induction motor. Typical examples of optimization show the efficiency and feasibility of this method.
Using the multi-objective hybrid simulated annealing algorithm, this paper optimal design the three-phase induction motor. Typical examples of optimization show the efficiency and feasibility of this method.
Cognitive WLAN over Fiber (CWLANoF) is proposed as the improved architecture of traditional WLANs. In this paper, the channel allocation problem for hot spot in CWLANoF is firstly established as a restless bandit prob...
详细信息
ISBN:
(纸本)9781849192064
Cognitive WLAN over Fiber (CWLANoF) is proposed as the improved architecture of traditional WLANs. In this paper, the channel allocation problem for hot spot in CWLANoF is firstly established as a restless bandit problem, which is solved by the primal-dual index heuristic algorithm based on the first order relaxation due to less complexity. Moreover, the proposed scheme is divided into offline computation and online allocation so as to decrease the complexity farther. Finally, extensive simulation results illustrate the significant performance improvement of the proposed scheme compared to the existing one.
The evaluation of EC security often copies the standard of information security, the effect of evaluation is rough and partial. This paper firstly constructs the security frame of EC system, which includes five layers...
详细信息
The evaluation of EC security often copies the standard of information security, the effect of evaluation is rough and partial. This paper firstly constructs the security frame of EC system, which includes five layers based on TCP/IP protocol and introduces the security technologies in each layer; and then designs the security evaluation model of EC system bases on the analytic hierarchy process(AHP), which includes the evaluation layer(A), four main factors(B 1 to B 4 ) and 12 sub-factors(C 1 to C 12 ). Thirdly this paper establishes the assessment matrixes of A-B and B-C and check their consistency to get the assessment matrixes of A-C. In addition, this paper calculates the total evaluation coefficient of three EC systems and the best one was choosed. At last, the conclusion is that the model of EC security can get the satisfied result of evaluation using AHP.
In this article, synthesis of switching H2/H∞ controller is considered which results in the minimum bounds on H2 and H∞ performance levels. The fuzzy supervisor manages the controllers and results in the structure t...
详细信息
The evaluation of EC security often copies the standard of information security, the effect of evaluation is rough and partial. This paper firstly constructs the security frame of EC system, which includs five layers ...
详细信息
Searching optimal path is an important function of the maze question. For the shortage of the traditional algorithm to solve the maze problem, this paper at first analyzes the characteristic of Ant Colony Optimization...
详细信息
There are some limitations when environment model of AS-R mobile robot is obtained by only using a separate CCD camera or ultrasonic sensor array. The BP neural network is designed to fuse information of the two senso...
详细信息
There are some limitations when environment model of AS-R mobile robot is obtained by only using a separate CCD camera or ultrasonic sensor array. The BP neural network is designed to fuse information of the two sensors to obtain the robot's environment model in this paper. The input of BP neural network is the intercept and slope of the edge line obtained CCD camera and ultrasonic sensor arrays, which is processed by through the global coordinates of coordinate transformation. The output of BP network is the fused intercept and slope of the straight edge. Experiment shows that environment model is feasible for the AS-R mobile robot and the environment modeling method has more reliability and accuracy.
The effectiveness of collecting water droplets strongly influences the status of icing on conductors. This work presents an Eulerian approach to calculate the local collection efficiency on two dimensional conductors ...
详细信息
The effectiveness of collecting water droplets strongly influences the status of icing on conductors. This work presents an Eulerian approach to calculate the local collection efficiency on two dimensional conductors ...
详细信息
The effectiveness of collecting water droplets strongly influences the status of icing on conductors. This work presents an Eulerian approach to calculate the local collection efficiency on two dimensional conductors by the CFD software FLUENT6.2. The simulation results show that: the local collection coefficient is affected by the wind velocity and the median volume diameter (MVD). Comparison between the simulation results and the experimental data in the literature show that the model can be used to accurately calculate the local collection coefficient on icing conductor surface.
暂无评论