首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The Iterated Prisoner’s Dilemma (IPD) game has been commonly used to investigate the cooperation among competitors. However, most previous studies on the IPD focused solely on maximizing players’ average payoffs without considering their risk preferences. By introducing the concept of income stream risk into the IPD game, this paper presents a novel evolutionary IPD model with agents seeking to balance between average payoffs and risks with respect to their own risk attitudes. We build a new IPD model of multiple agents, in which agents interact with one another in the pair-wise IPD game while adapting their risk attitudes according to their received payoffs. Agents become more risk averse after their payoffs exceed their aspirations, or become more risk seeking after their payoffs fall short of their aspirations. The aspiration levels of agents are determined based on their historical self-payoff information or the payoff information of the agent population. Simulations are conducted to investigate the emergence of cooperation under these two comparison methods. Results indicate that agents can sustain a highly cooperative equilibrium when they consider only their own historical payoffs as aspirations (called historical comparison) in adjusting their risk attitudes. This holds true even for the IPD with a short game encounter, for which cooperation was previously demonstrated difficult. However, when agents evaluate their payoffs in comparison with the population average payoff (called social comparison), those agents with payoffs below the population average tend to be dissatisfied with the game outcomes. This dissatisfaction will induce more risk-seeking behavior of agents in the IPD game, which will constitute a strong deterrent to the emergence of mutual cooperation in the population.  相似文献   

2.
Electronic equipment’s system is always manufactured as a superprecision system. However, it will be used in harsh environment. For example, the computer in moving vehicles will be acted by vibrations. The objective of this paper is to provide a systematic investigation to test and computer-aided design of the vibration isolator for protection of electronic equipment’s system in harsh vibration environment. A micro-oil damping vibration isolator is designed and manufactured through coupling the oil and spring by ingenious tactics. The structure of the oil damping vibration isolator can achieve circulating oil damping function with an inner tube and an outer tube (some orifices are manufactured on upside and underside of the inner tube). The dynamics of the key model machine is systematically investigated. Based on the test, a nonlinear dynamic model for the vibration isolator is presented by analyzing the internal fluid dynamic phenomenon with respect to the vibration isolator. The model considers all the physical parameters of the structure. Comparisons with experimental data confirm the validity of the model. In the other, the model is integrated by introducing normalization measure. The normalization model shows the actual physical characteristics of the oil damping vibration isolator by considering quadratic damping, viscous damping, Coulomb damping, and nonlinear spring forces. An approximate solution is deduced by introducing harmonic transform method and Fourier transform method. Therefore, a parameter-matching optimal model for computer-aided design of the vibration isolator is build based on approximate solution. An example confirms the validity of the computer-aided design integration.
Ping YangEmail:
  相似文献   

3.
Universal Access in the Information Society - Confusion is an emotion, which may occur when the learner is confronting inconsistence between new knowledge and existing cognitive structure, or...  相似文献   

4.
More and more complicated conceptual design of ship’s engine room (CDSER) heavily depends on designers’ engineering knowledge and existing ship data. To achieve intelligent design at the initial ship design stage, many researchers have made much significant progress in this field, however, most of them only focused on how to find the similar constructed ships. At present, how to utilize these existing data remains an untouched topic. In order to make good use of the existing data and reduce the dependence on designers’ experience, a novel system named Expert System for Aided Conceptual Design of Ship’s Engine Room Automation (ESACD), is elaborated in this study. With the support of the constructed Ship Data Warehouse System, two core subsystems Configuration Selection Assistant (CSA) and Design Scheme Decision Assistant (DSDA) are included in ESACD. A promising approach integrating Fuzzy c-means algorithm (FCM) and Rough Sets Theory (RST) to extract configuration rules from the stored data is adopted in CSA. According to engineers’ proposals, RST is utilized to reason knowledge in incomplete scheme information systems for getting design scheme rules in DSDA, which are useful suggestions for engineers to get better schemes at this stage. Finally, the validity and necessity of this interactive expert system are demonstrated through the CDSER of a new 50,000 DWT Handymax bulk carrier. It is proved that ESACD can efficiently facilitate rapid and intelligent design in CDSER, and reduce the cost of a new ship design.  相似文献   

5.
Parkinson’s disease (PD) is often responsible for difficulties in interacting with smartphones; however, research has not yet addressed these issues and how these challenge people with Parkinson’s (PwP). This paper specifically investigates the symptoms and characteristics of PD that may influence the interaction with smartphones to then contribute in this direction. The research was based on a literature review of PD symptoms, eight semi-structured interviews with healthcare professionals and observations of PwP, and usability experiments with 39 PwP. Contributions include a list of PD symptoms that may influence the interaction with smartphones, a set of experimental results that evaluated the performance of four gestures tap, swipe, multiple-tap, and drag and 12 user interface design guidelines for creating smartphone user interfaces for PwP. Findings contribute to the work of researchers and practitioners’ alike engaged in designing user interfaces for PwP or the broader area of inclusive design.  相似文献   

6.
In this paper, we discuss an overdetermined problem for a weighted Poisson’s equation. We prove that if there exists a solution of the weighted Poisson’s equation u+?logw??u=?1 on a smooth bounded domain Ω with both Dirichlet and Neumann constant boundary condition, and the weight function w satisfies some conditions in Ω, then Ω is a ball. We also study some applications of the overdetermined problems and some overdetermined problems with nonconstant Neumann boundary condition.  相似文献   

7.

This experimental study explores how game experience differs between players with different gameplay histories within the same game universe. We are interested in how prolonged engagement with a game series affects the gameplay experience in relation to the most recent game version in the series. A total of 54 participants were divided into four groups depending on their gaming experience, namely non-gamers, new-gamers, old-gamers and core-gamers. They played the mobile version of Super Mario Run, and questionnaire data was collected after the gameplay session. The results of the study showed that not only the players’ personal gameplay history but also the length of experience or degree of familiarity with the game universe affected the experience of playing a new game in the same game universe. Additionally, familiarity with the game universe had a positive impact on the feeling of competence, immersion, emotions and flow.

  相似文献   

8.
9.
If content providers want to build successful businesses on the Internet, they have to establish viable revenue models online. Because selling content or ads is less profitable online than offline, content providers have begun to generate revenues by selling products or services related to their content. However, this incentivizes content providers to increase sales by manipulating their content and thus may harm the content’s credibility. We conducted a vignette-based online experiment to test the effect of content providers’ revenue models on the credibility of two different types of content. Although our results revealed significant differences between revenue models for one of the content types, we did not find evidence that users distrust content providers employing commerce-oriented revenue models. Our findings shed light on the relationship between credibility and monetization of content on the Internet and provide helpful insights for practitioners in the media industry regarding optimal revenue generation strategies.  相似文献   

10.
Manimaran  S.  Sastry  V. N.  Gopalan  N. P. 《The Journal of supercomputing》2022,78(14):16336-16363

Sensors play a vital role in the smartphone for sensing-enabled mobile activities and applications. Different sources, like mobile applications and websites, access the sensors and use them for various purposes. The user needs permission to access the permission-imposed sensors. Using the generic sensor application programming interface, the user can access the no-permission-imposed sensors directly without any permission. Attackers target these sensors and make the smartphones vulnerable at the application, device and network levels. The attackers access the sensor’s information and use it for different purposes like personal identification number identification and user personal information theft. This paper presents STMAD, a novel allowlist-based intrusion prevention system to mitigate sensor-based threats on smartphones by detecting malicious access of an attacker through different channels. STMAD functions as a lightweight preventive mechanism for all sensors on the smartphone and preventing attackers from accessing sensors maliciously. The experimental results show that the proposed defense mechanism is more efficient and consumes minimal overhead. An informal security analysis also proved that the STMAD protects against various attacks.

  相似文献   

11.
12.
This paper structures a novel vision for OLAPby fundamentally redefining several of the pillars on which OLAP has been based for the last 20 years. We redefine OLAP queries, in order to move to higher degrees of abstraction from roll-up’s and drill-down’s, and we propose a set of novel intentional OLAP operators, namely, describe, assess, explain, predict, and suggest, which express the user’s need for results. We fundamentally redefine what a query answer is, and escape from the constraint that the answer is a set of tuples; on the contrary, we complement the set of tuples with models (typically, but not exclusively, results of data mining algorithms over the involved data) that concisely represent the internal structure or correlations of the data. Due to the diverse nature of the involved models, we come up (for the first time ever, to the best of our knowledge) with a unifying framework for them, that places its pillars on the extension of each data cell of a cube with information about the models that pertain to it — practically converting the small parts that build up the models to data that annotate each cell. We exploit this data-to-model mapping to provide highlights of the data, by isolating data and models that maximize the delivery of new information to the user. We introduce a novel method for assessing the surprise that a new query result brings to the user, with respect to the information contained in previous results the user has seen via a new interestingness measure. The individual parts of our proposal are integrated in a new data model for OLAP, which we call the Intentional Analytics Model. We complement our contribution with a list of significant open problems for the community to address.  相似文献   

13.
Deference to operational or engineering expertise is considered critical for maintaining safety in many industries. At the same time, legitimating specialized knowledge can help create “prima donnas,” expert operators who attain considerable organizational status and informal power. Safety can be used as a lever to gain industrial advantage or maintain inequitable perquisites. This paper first considers the common consensus about the need to defer to expertise in safety–critical organizations and industries and assesses available research on the relationship between deference to expertise and safety. Then, it reviews two psychological literatures that illuminate some of the cognitions, behaviors and organizational dynamics behind a prima donna syndrome: one on entitlement and another on organizational narcissism. Conclusions and recommendations center on how to defer to expertise (not necessarily experts) while dealing with “prima donnas.”  相似文献   

14.
Recently a new numerical approach for two-dimensional Maxwell’s equations based on the Hodge decomposition for divergence-free vector fields was introduced by Brenner et al. In this paper we present an adaptive P 1 finite element method for two-dimensional Maxwell’s equations that is based on this new approach. The reliability and efficiency of a posteriori error estimators based on the residual and the dual weighted-residual are verified numerically. The performance of the new approach is shown to be competitive with the lowest order edge element of Nédélec’s first family.  相似文献   

15.
16.
The implementations of design for assembly and design for manufacture (DFM) led to enormous benefits including simplification of products, reduction of assembly and manufacturing costs, improvement of quality, and reduction of time to market. More recently, environmental concerns required that disassembly and recycling issues should be considered during the design stages. The effort to reduce total life-cycle costs for a product through design innovation is becoming an essential part of the current manufacturing industry. Therefore, researchers begin to focus their attention on design for environment, design for recyclability, design for life-cycle (DFLC), etc. These studies are sometimes referred to as Design for X (DFX). Since the late 1990s, hundreds of papers have been published pertaining to DFX applications in manufacturing. Most of them are widely distributed over many different disciplines and publications. This makes it very difficult for one to locate all the information necessary for the application of DFX in manufacturing. A paper that can help researchers and practitioners applying this emerging technology is highly desirable. The objective of this paper is to present the concepts, applications, and perspectives of ‘DFX’ in manufacturing, thus providing some guidelines and references for future research and implementation.  相似文献   

17.
In this paper we present a generalization of the classic Firm’s profit maximization problem, using the linear model for the production function, considering a non constant price and maximum constraints for the inputs. We formulate the problem by previously calculating the analytical minimum cost function. This minimum cost function will be calculated for each production level via the infimal convolution of quadratic functions and the result will be a piecewise quadratic function. To solve this family of optimization problems, we present an algorithm of quasi-linear complexity. Moreover, the resulting cost function in certain cases is not $C^{1}$ and the profit maximization problem will be solved within the framework of nonsmooth analysis. Finally, we present a numerical example.  相似文献   

18.
Employees can have a profound, detrimental influence on information security that costs organizations billions of U.S. dollars annually. As a result, organizations implement stringent security controls, which can inadvertently foster the behaviors that they are designed to deter. This research attempts to understand this phenomenon of increased internal computer abuses by applying causal reasoning theory to explain employees’ causal-search process following the implementation of information security measures. Our findings show how interpersonal and environmental factors influence insiders’ beliefs that the organization trusts them (i.e., attributed trust) and how low attributed trust perceptions drive computer abuse incidents subsequent to security changes. We also highlight the need for both managers and security researchers to assess the frequency with which employees encounter information security changes within dynamic, organizational environments.  相似文献   

19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号