|
|
|
Ran Li, Huizhuo Ma, Feifei Wang, Yihe Wang, Yang Liu and Zenghui Li
Based on Game Theory and Multi-objective optimization problems (MOP), Game Optimization Theory (GOT) is discussed in this paper. Optimization Stability Analysis (OSA), Distance Entropy Multi-Objective Particle Swarm Optimization (DEMPSO) and Fuzzy Multi-...
ver más
|
|
|
|
|
|
|
Adedamola Adesokan, Rowan Kinney and Eirini Eleni Tsiropoulou
This paper tackles the challenges inherent in crowdsourcing dynamics by introducing the CROWDMATCH mechanism. Aimed at enabling crowdworkers to strategically select suitable crowdsourcers while contributing information to crowdsourcing tasks, CROWDMATCH ...
ver más
|
|
|
|
|
|
|
Ashtad Javanmardi, Chuanni He, Simon M. Hsiang, S. Alireza Abbasian-Hosseini and Min Liu
This research aims to determine the appropriate level of effort required for each step of the Observe?Plan?Do?Check?React (OPDCA) cycle to improve the workflow reliability of a construction project. Empirical data on detailed weekly meeting minutes over ...
ver más
|
|
|
|
|
|
|
Hui Li, Xueshan Bai, Xing Zhai, Jianqing Zhao, Xiaolong Zhu, Chenxi Li, Kehui Liu and Qizhi Wang
Mountain mudslides have emerged as one of the main geological dangers in the Yanshan region of China as a result of excessive rains. In light of this, a multi-step debris flow hazard assessment method combining optimal weights and a topological object me...
ver más
|
|
|
|
|
|
|
Chuyu Xiong, Jiaying Wang, Wei Gao, Xianda Huang and Tao Tao
Assessing the risk of water leakage within urban water distribution networks (UWDN) is crucial prior to implementing any control measures. Conducting a risk assessment facilitates the development of effective water leakage management plans. By comprehens...
ver más
|
|
|
|
|
|
|
Nur Syahira Mohamad Shari, Mohd Farid Shamsudin
Game theory has been used a long time ago in military strategy. In Marketing, game theory can be explained as persuasion element for the organization to consider about which the competitors will likely move and the impact for this movement towards their ...
ver más
|
|
|
|
|
|
|
Feng Cai, Zhinan Hu, Beihan Jiang, Weifang Ruan, Shujuan Cai and Huiling Zou
This study aimed to effectively evaluate the ecological restoration of the river reach where a small hydropower station was retired or renovated. An ecological health index system was constructed based on the environmental characteristics of the upstream...
ver más
|
|
|
|
|
|
|
Nida Zamir, Bakhtiar Ali, Muhammad Fasih Uddin Butt, Muhammad Awais Javed, Byung Moo Lee and Soon Xin Ng
In this contribution, we investigate the performance of an untrusted relaying system when Cooperative Jammers (CJs) are available. We propose two scenarios, Untrusted Relaying-aided Multiple Cooperative-Jammers-based Simultaneous Transmission (UR-MCJST) ...
ver más
|
|
|
|
|
|
|
N?guessan Yves-Roland Douha, Masahiro Sasabe, Yuzo Taenaka and Youki Kadobayashi
In the digital era, smart-home users face growing threats from cyberattacks that threaten their privacy and security. Hence, it is essential for smart-home users to prioritize cybersecurity education and training to secure their homes. Despite this, the ...
ver más
|
|
|
|
|
|
|
Qi Deng and Feng Zeng
In big cities, there are more and more parking lots and charging piles for electric vehicles, and the resources of parking and charging vehicles can be aggregated to provide strong computing power for vehicular edge computing (VEC). In this paper, we pro...
ver más
|
|
|
|
|
|
|
Fatemeh Stodt and Christoph Reich
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare. However, IIoT devices are susceptible to cyber-threats such as the leaking of i...
ver más
|
|
|
|
|
|
|
Lihong Li, Rui Zhu, Kun Song, Ou Zhang and Xue Jiang
The actual situation of carbon-emission reduction in China?s power sector has not yet achieved the expected benefits. The rent-seeking behavior of participants in power construction projects (PCPs) hinders the realization of low-carbon benefits. It is ne...
ver más
|
|
|
|
|
|
|
Atefeh Torkaman, Kambiz Badie, Afshin Salajegheh, Mohammad Hadi Bokaei and Seyed Farshad Fatemi Ardestani
Over the years, detecting stable communities in a complex network has been a major challenge in network science. The global and local structures help to detect communities from different perspectives. However, previous methods based on them suffer from h...
ver más
|
|
|
|
|
|
|
Jingsha He, Yue Li and Nafei Zhu
Online social networks (OSNs) have experienced rapid growth in recent years, and an increasing number of people now use OSNs, such as Facebook and Twitter, to share and spread information on a daily basis. As a special type of information, user personal ...
ver más
|
|
|
|
|
|
|
Yibrah Gebreyesus, Damian Dalton, Sebastian Nixon, Davide De Chiara and Marta Chinnici
The need for artificial intelligence (AI) and machine learning (ML) models to optimize data center (DC) operations increases as the volume of operations management data upsurges tremendously. These strategies can assist operators in better understanding ...
ver más
|
|
|
|
|
|
|
Irina Makarova, Polina Buyvol, Larisa Gabsalikhova, Eduard Belyaev and Eduard Mukhametdinov
This article is devoted to the problem of determining the rational amount of spare parts in the warehouse of a service center of an automobile manufacturer?s branded network used for maintenance and current repairs. This problem was solved on the basis o...
ver más
|
|
|
|
|
|
|
Burhan Ul Islam Khan, Farhat Anwar, Farah Diyana Bt. Abdul Rahman, Rashidah Funke Olanrewaju, Khang Wen Goh, Zuriati Janin and Md Arafatur Rahman
This paper introduces a computational strategic game model capable of mitigating the adversarial impact of node misbehaviour in large-scale Internet of Things (IoT) deployments. This security model?s central concept is to preclude the participation of mi...
ver más
|
|
|
|
|
|
|
Razvan Florea and Mitica Craus
Cybersecurity plays an increasing role in today?s digital space, and its methods must keep pace with the changes. Both public and private sector researchers have put efforts into strengthening the security of networks by proposing new approaches. This pa...
ver más
|
|
|
|
|
|
|
Kaveh Madani, Faraz Farhidi and Sona Gholizadeh
Cooperative game theory provides an appropriate framework to assess the likelihood of conflict resolution, encourage cooperation among parties, and determine each party?s share in resource sharing conflicts. In calculating the fair and efficient allocati...
ver más
|
|
|
|
|
|
|
Shuyou Wu, Zhengxiao Wu, Xiaohong Wu, Jie Tao and Yonggen Gu
Resource sharing can gain economies of scale and increase utilization of cloud infrastructure, a critical challenge of which is how to design efficient resource sharing solutions among self-interested cloud providers. Cloud federation can realize resourc...
ver más
|
|
|
|