首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
    
In this paper, we have proposed a differential game model to optimally solve the resource allocation problems in the edge-computing based wireless networks. In the proposed model, a wireless network with one cloud-computing center (CC) and lots of edge services providers (ESPs) is investigated. In order to provide users with higher services quality, the ESPs in the proposed wireless network should lease the computing resources from the CC and the CC can allocate its idle cloud computing resource to the ESPs. We will try to optimally allocate the edge computing resources between the ESPs and CC using the differential game and feedback control. Based on the proposed model, the ESPs can choose the amount of computing resources from the CC using feedback control, which is affected by the unit price of computing resources controlled by the CC. In the simulation part, the optimal allocated resources for users’ services are obtained based on the Nash equilibrium of the proposed differential game. The effectiveness and correctness of the proposed scheme is also verified through the numerical simulations and results.  相似文献   

2.
    
COVID-19 turned out to be an infectious and life-threatening viral disease, and its swift and overwhelming spread has become one of the greatest challenges for the world. As yet, no satisfactory vaccine or medication has been developed that could guarantee its mitigation, though several efforts and trials are underway. Countries around the globe are striving to overcome the COVID-19 spread and while they are finding out ways for early detection and timely treatment. In this regard, healthcare experts, researchers and scientists have delved into the investigation of existing as well as new technologies. The situation demands development of a clinical decision support system to equip the medical staff ways to timely detect this disease. The state-of-the-art research in Artificial intelligence (AI), Machine learning (ML) and cloud computing have encouraged healthcare experts to find effective detection schemes. This study aims to provide a comprehensive review of the role of AI & ML in investigating prediction techniques for the COVID-19. A mathematical model has been formulated to analyze and detect its potential threat. The proposed model is a cloud-based smart detection algorithm using support vector machine (CSDC-SVM) with cross-fold validation testing. The experimental results have achieved an accuracy of 98.4% with 15-fold cross-validation strategy. The comparison with similar state-of-the-art methods reveals that the proposed CSDC-SVM model possesses better accuracy and efficiency.  相似文献   

3.
研究了云计算系统现有任务调度和运行管理机制,指出在云计算环境下,基础性支撑软件虚拟机和虚拟机管理器在长期运行过程中均会表现出老化现象,从而降低了其性能,进而影响了任务的调度和执行效果。在一定程度上影响了服务质量(QoS)。针对这种情况,提出了一种老化感知的任务调度和运行管理框架,该框架能在任务调度和运行时感知底层虚拟机和虚拟机管理器的老化状况,并通过及时再生手段恢复虚拟机性能,从而降低老化所带来的负面影响,提升系统可用性。基于CloudSim仿真工具,在该框架下实现了Max-Min调度算法,并对比说明了该框架的有效性。  相似文献   

4.
    
This article presents an asset-based security system where security practitioners build their systems based on information they own and not solicited by observing attackers’ behavior. Current security solutions rely on information coming from attackers. Examples are current monitoring and detection security solutions such as intrusion prevention/detection systems and firewalls. This article envisions creating an imbalance between attackers and defenders in favor of defenders. As such, we are proposing to flip the security game such that it will be led by defenders and not attackers. We are proposing a security system that does not observe the behavior of the attack. On the contrary, we draw, plan, and follow up our own protection strategy regardless of the attack behavior. The objective of our security system is to protect assets rather than protect against attacks. Virtual machine introspection is used to intercept, inspect, and analyze system calls. The system call-based approach is utilized to detect zero-day ransomware attacks. The core idea is to take advantage of Xen and DRAKVUF for system call interception, and leverage system calls to detect illegal operations towards identified critical assets. We utilize our vision by proposing an asset-based approach to mitigate zero-day ransomware attacks. The obtained results are promising and indicate that our prototype will achieve its goals.  相似文献   

5.
秦字兴  朱阁 《工业工程》2015,18(4):1-08
针对电动汽车市场推广乏力的问题,采用完美信息动态博弈的方法,构建了一个基于政府、企业和消费者三方博弈的电动汽车市场推广模型。通过对均衡解进行分析,指出以降低电动汽车隐性成本为目标的稳健管制策略能更好地促进电动汽车的市场推广,建议出台加大政府扶持力度和提高基础设施投入的组合政策,并尽快建立健全燃油汽车污染处罚机制。  相似文献   

6.
高鹏  陆玉梅 《工业工程》2012,15(3):29-34
设计了一个具有供应商和两个零售商组成的Bertrand双寡头价格博弈的主从闭环供应链系统,给出了分散和集中两种模式下批发价、零售价、回收价以及各方利润的具体表达式并进行了比较,研究了供应链整体利润与产品和废弃品替代率的关系.最后,在此基础上分析了分散模式下零售商和生产商的具体对策,提出了两阶段数量折扣协调策略实现帕累托改进,并求出了折扣率和补贴率的具体范围,为进一步研究更一般的闭环供应链系统打下理论基础.  相似文献   

7.
陈敬贤 《工业工程》2011,14(4):63-67
为了有效激励供应商提高产品质量,提出了一种制造商主导下依赖于产品价格的供应链质量惩罚策略。分别考虑由于供应商提供不合格产品而引起的制造商内部质量损失和外部质量损失。制造商依据产品价格对供应商实施质量惩罚,运用主从对策的方法建立了供应商与制造商的Stackelberg博弈模型,求解了模型的子博弈精炼纳什均衡解。算例则针对4种常见情况下的惩罚策略,利用数值结果分析比较了所构建的质量惩罚策略的优势。结果表明:依赖于价格的质量惩罚策略有利于激励供应商提高产品质量,增加供应链收益。  相似文献   

8.
The general consensus from epidemiological game-theory studies is that vaccination coverage driven by self-interest (Nash vaccination) is generally lower than group-optimal coverage (utilitarian vaccination). However, diseases that become more severe with age, such as chickenpox, pose an exception to this general consensus. An individual choice to be vaccinated against chickenpox has the potential to harm those not vaccinated by increasing the average age at infection and thus the severity of infection as well as those already vaccinated by increasing the probability of breakthrough infection. To investigate the effects of these externalities on the relationship between Nash and utilitarian vaccination coverages for chickenpox, we developed a game-theory epidemic model that we apply to the USA and Israel, which has different vaccination programmes, vaccination and treatment costs, as well as vaccination coverage levels. We find that the increase in chickenpox severity with age can reverse the typical relationship between utilitarian and Nash vaccination coverages in both the USA and Israel. Our model suggests that to obtain herd immunity of chickenpox vaccination, subsidies or external regulation should be used if vaccination costs are high. By contrast, for low vaccination costs, improving awareness of the vaccine and the potential cost of chickenpox infection is crucial.  相似文献   

9.
    
The demand for cloud computing has increased manifold in the recent past. More specifically, on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing needs. The cloud service provider fulfills different user requirements using virtualization - where a single physical machine can host multiple Virtual Machines. Each virtual machine potentially represents a different user environment such as operating system, programming environment, and applications. However, these cloud services use a large amount of electrical energy and produce greenhouse gases. To reduce the electricity cost and greenhouse gases, energy efficient algorithms must be designed. One specific area where energy efficient algorithms are required is virtual machine consolidation. With virtual machine consolidation, the objective is to utilize the minimum possible number of hosts to accommodate the required virtual machines, keeping in mind the service level agreement requirements. This research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized host. The online algorithm is analyzed using a competitive analysis approach. In addition, an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark algorithms. Our proposed online algorithm consumed 25% less energy and performed 43% fewer migrations than the benchmark algorithms.  相似文献   

10.
物流服务供应链两级合作的质量监控与协调   总被引:6,自引:0,他引:6  
考虑一个物流服务集成商和提供商的两级供应链结构,建立了物流服务供应链两级合作的质量协调基本博弈模型,其中物流服务集成商可以选择质量监控和不监控,提供商可以按质量合同完成合作也可以选择欺骗,论文给出了该博弈模型的混合策略纳什均衡解.然后研究了物流服务集成商本身也存在受到惩罚可能时的多级质量协调的情况,模型进一步考虑了提供商之间的竞争情况对质量协调的影响,得出了新的纳什均衡解.上述模型分析结果表明,通过加强物流合作过程的监督与控制,减少信息不对称性,减少物流合作外包的层数,建立物流服务提供商的竞争机制,及时做好合作的回顾和评价工作等措施可以加强物流服务供应链两级合作的质量协调.  相似文献   

11.
范定祥  李重莲 《工业工程》2020,23(1):104-111
针对网购供应链中频繁出现的假冒伪劣等产品质量问题,考虑了由电商平台、平台销售企业和消费者3个理性群体组成的网购供应链,通过构建三方博弈的混合纳什均衡模型,求出了该混合策略纳什均衡解。在此基础上,进一步分析了网购供应链中各因素对相关主体行为概率的影响,得到了各主体的期望收益。运用Matlab R2017a软件对模型影响因素进行了数值仿真分析。研究结果表明,网购供应链质量博弈中存在着混合策略纳什均衡,且各主体的行为概率与惩罚、伪造、检验成本、收益、平台注册费用、后悔值、庆幸值等因素相关。为使各主体的期望收益同时趋于理想状态,电商企业应增加惩罚值和平台注册费用到区间中值,而消费者须增大后悔值、庆幸值到区间最大值。  相似文献   

12.
    
The goal of delivering high-quality service has spurred research of 6G satellite communication networks. The limited resource-allocation problem has been addressed by next-generation satellite communication networks, especially multilayer networks with multiple low-Earth-orbit (LEO) and non-low-Earth-orbit (NLEO) satellites. In this study, the resource-allocation problem of a multilayer satellite network consisting of one NLEO and multiple LEO satellites is solved. The NLEO satellite is the authorized user of spectrum resources and the LEO satellites are unauthorized users. The resource allocation and dynamic pricing problems are combined, and a dynamic game-based resource pricing and allocation model is proposed to maximize the market advantage of LEO satellites and reduce interference between LEO and NLEO satellites. In the proposed model, the resource price is formulated as the dynamic state of the LEO satellites, using the resource allocation strategy as the control variable. Based on the proposed dynamic game model, an open-loop Nash equilibrium is analyzed, and an algorithm is proposed for the resource pricing and allocation problem. Numerical simulations validate the model and algorithm.  相似文献   

13.
    
In the present work, multidisciplinary optimization is formulated in the game theory framework. We choose a coupled heat transfer—thermoelastic system as the case study for which a topology design approach is developed. The multidisciplinary optimization problem is solved as a non‐cooperative game and we determine a Nash equilibrium. The game has two players and the parameterization of the design domain is such that the design variables describe the material density and a parameter which influences the heat flow by convection to the surrounding fluid. The first player controls the structure and the second player controls the temperature distribution in the structure. For the second player, we present mathematical proof of existence of a discrete valued optimal solution and it is concluded that no regularization of the suboptimization problem is needed. We present two numerical examples which illustrate the proposed methodology. One of the examples is also solved by weighting the objectives to a scalar valued objective function and the result is compared with the Nash game solution. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

14.
借鉴Nash均衡讨价还价模型和Roundy提出的序列优化算法,对实行WOI-c库存所有权模式的简单(及其扩展)二级供应链联盟中的转移定价策略进行了研究.通过将MA和OA思想相结合,运用序列优化算法和利润分享思想,为该联盟体的整体利益最大化目标提出了相适应的转移定价策略,及其为双方所接受的利润分配策略.通过一个算例对理论研究进行了证实/伪,发现根据序列优化算法得到的转移定价方法对规模较大的需求更为适用,准确性也更高.  相似文献   

15.
16.
    
In the paper, we investigate the heterogeneous resource allocation scheme for virtual machines with slicing technology in the 5G/B5G edge computing environment. In general, the different slices for different task scenarios exist in the same edge layer synchronously. A lot of researches reveal that the virtual machines of different slices indicate strong heterogeneity with different reserved resource granularity. In the condition, the allocation process is a NP hard problem and difficult for the actual demand of the tasks in the strongly heterogeneous environment. Based on the slicing and container concept, we propose the resource allocation scheme named Two-Dimension allocation and correlation placement Scheme (TDACP). The scheme divides the resource allocation and management work into three stages in this paper: In the first stage, it designs reasonably strategy to allocate resources to different task slices according to demand. In the second stage, it establishes an equivalent relationship between the virtual machine reserved resource capacity and the Service-Level Agreement (SLA) of the virtual machine in different slices. In the third stage, it designs a placement optimization strategy to schedule the equivalent virtual machines in the physical servers. Thus, it is able to establish a virtual machine placement strategy with high resource utilization efficiency and low time cost. The simulation results indicate that the proposed scheme is able to suppress the problem of uneven resource allocation which is caused by the pure preemptive scheduling strategy. It adjusts the number of equivalent virtual machines based on the SLA range of system parameter, and reduces the SLA probability of physical servers effectively based on resource utilization time sampling series linear. The scheme is able to guarantee resource allocation and management work orderly and efficiently in the edge datacenter slices.  相似文献   

17.
    
In this paper, we provide a new approach to data encryption using generalized inverses. Encryption is based on the implementation of weighted Moore–Penrose inverse AMN(nxm) over the nx8 constant matrix. The square Hermitian positive definite matrix N8x8 p is the key. The proposed solution represents a very strong key since the number of different variants of positive definite matrices of order 8 is huge. We have provided NIST (National Institute of Standards and Technology) quality assurance tests for a random generated Hermitian matrix (a total of 10 different tests and additional analysis with approximate entropy and random digression). In the additional testing of the quality of the random matrix generated, we can conclude that the results of our analysis satisfy the defined strict requirements. This proposed MP encryption method can be applied effectively in the encryption and decryption of images in multi-party communications. In the experimental part of this paper, we give a comparison of encryption methods between machine learning methods. Machine learning algorithms could be compared by achieved results of classification concentrating on classes. In a comparative analysis, we give results of classifying of advanced encryption standard (AES) algorithm and proposed encryption method based on Moore–Penrose inverse.  相似文献   

18.
    
With the advances of artificial intelligence (AI), autonomous robotics, virtual reality (VR) and Internet of things (IoT), an intelligent and ubiquitous human–machine interfacing (HMI) ecosystem has become a desire and attracted lots of interests. Triboelectric nanogenerators (TENG), as a natural and effective mechanical‐to‐electrical signal conversion technology, have been successfully utilized to realize many types of HMI, including smart keyboards, body motion sensors, the electronic skin, voice sensors, the triboelectrification‐induced electroluminescence, and the artificial muscle. Meanwhile, tribotronics, as the coupling field of TENG and semiconductors, has demonstrated the feasibility for tactile switch or sensing with the possibilities of high integration and large scale. The fundamental theory of TENG and tribotronics is revisited herein. In addition, the definition of HMI and, for the first time, the research progress of the TENG and tribotronics enabled HMI are systematically and thoroughly reviewed. Finally, the perspectives in this emerging field are also discussed.  相似文献   

19.
Jing Zhou 《工程优选》2018,50(6):949-964
In recent years many heuristic algorithms have been proposed to solve task scheduling problems in the cloud environment owing to their optimization capability. This article proposes a hybrid glowworm swarm optimization (HGSO) based on glowworm swarm optimization (GSO), which uses a technique of evolutionary computation, a strategy of quantum behaviour based on the principle of neighbourhood, offspring production and random walk, to achieve more efficient scheduling with reasonable scheduling costs. The proposed HGSO reduces the redundant computation and the dependence on the initialization of GSO, accelerates the convergence and more easily escapes from local optima. The conducted experiments and statistical analysis showed that in most cases the proposed HGSO algorithm outperformed previous heuristic algorithms to deal with independent tasks.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号