The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When looking at an image, humans shift their attention towards interesting regions, making sequences of eye fixations. When describing an image, they also come up with simple sentences that highlight the key elements in the scene. What is the correlation between where people look and what they describe in an image? To investigate this problem, we look into eye fixations and image captions, two types...
The present paper presents a serious game, built on Android tablets, through which students can test, in an attractive, disguised form, the mastering of some mathematical notions which are part of hydrological models for the contaminations of groundwater resources. Our game is based on an adventure story in which the regular game' levels are intertwined with mathematical' levels. Consequently, finishing...
The conflict over the Asian Infrastructure Investment Bank (AIIB) involving China, the United States of America (USA), and Japan is analyzed within the paradigm of the Graph Model for Conflict Resolution to gain strategic insights and to predict the possible compromise resolutions. The conflict starts after China proposed in October 2013 the establishment of the AIIB. The USA and Japan opposed the...
This paper investigates the evolutionary dynamic and strategy optimization for a type of public goods games. First, by using semi-tensor product of matrices method, the evolutionary dynamics of the public goods games is converted into a standard Markovian chain, based on which, many properties of the game's evolutionary behaviour can be revealed. Secondly, the strategy optimization problem is considered...
Electricity theft is a major contributor of nontechnical losses in the distribution systems of the smart grid. However, owing to the resource-limitations of smart meters and the privacy requirement of electricity usage data, theft detection has become a challenging task for electric utilities. To address this problem, a Distributed Intelligent Framework for Electricity Theft Detection (DIFETD) is...
Economic denial of sustainability (EDoS) is an emerging threat of cloud computing. This new form of attack is a breed of DDoS attack that exploits the volatility of cloud consumers utility cost model. EDoS attackers fraudulently consume resources that result multiple cloud instances due to auto scaling feature of cloud. Consequently, affected cloud consumer ends up with an excessive amount of payment...
The traditional principal-agent model is based purely on the self-interest of the agent. In this paper, the fairness preference is incorporated into the model, and the Crowdsourcing sponsors and the task participants are analyzed as a system. The fairness preference of task participants is considered to analyze the effect of fairness preference on benefit distribution. The study shows that the share...
Considering the different types of equipment manufacturing industries, consumers' differentiated preferences for Chinese domestic equipment manufacturers and multinational equipment manufacturers, as well as the uncertainty of technological level and dependence on production factor in reality, this paper introduces the interval grey number into the Stackelberg game model, and analyzes the market share...
Public-private partnership (PPP) model has become an important solution of governments to provide infrastructures. In the execution of the PPP projects contracts, however, inevitably to renegotiate, which might affect the execution efficiency of PPP contracts. This paper built two PPP projects renegotiation bargaining game models of the private sectors and public sectors respectively through the analysis...
This paper explains the exact mechanism of governmental intervention in the process of economic system reform through the intervention index model and the evolutionary game model. The results show that the government should keep the principle of moderate guidance in the mixed ownership reform process under the consideration of both the political objectives and market efficiency. Meanwhile, the government...
Based on the circle model, three models of port pricing strategy are established by using game theory. The results show that the two ports will choose their best service quality when they both choose the single price strategy or the differential price strategy. The Nash equilibrium of the whole industry will develop towards higher service quality. Moreover, when ports implement differential pricing,...
The Proof of Work (PoW) consensus algorithm guarantees the safety and dependability of Blockchain systems. Miners can achieve a consensus through the PoW algorithm during the mining process, that is mutual attacking. However, when the miners attack each other, all miners earn less. In this paper, we established a model that mining between two miners is an iterative game, and proposed a subclass of...
To model the cooperative behavior under the realistic world, we put forward a high clustering network model with the property of adjustable power-law, and analyze the evolution of the prisoner dilemma game on this improved HK network model. Using simulation experiments, we investigate the effect of high clustering property of this network on the cooperative behavior. Extensive simulations indicate...
Various research work have highlighted the importance of modeling learner's personality to provide a personalized computer based learning. In particular, questionnaire is the most used method to model personality which can be long and not motivating. This makes learners unwilling to take it. Therefore, this paper refers to Learning Analytics (LA) to implicitly model learners' personalities based on...
Recent work in affective computing focused on affect from facial expressions, and not as much on body. This work focuses on body affect. Affect does not occur in isolation. Humans usually couple affect with an action; for example, a person could be running and happy. Recognizing body affect in sequences requires efficient algorithms to capture both the micro movements that differentiate between happy...
The paper addresses one of the fundamental questions in using simulation as a means for system verification and validation, namely, how far the simulation model represents the transition timings of the real system. A formal quantification of this difference in transition timings of a simulation model with respect to the system specification is presented based on game theoretic distance notions from...
Virtual-patient simulators play an important role in modern medical education. These simulators provide a safe environment for learning, give contextual feedback to learners, and allow the learner to move beyond the time and space constraints of traditional face-to-face medical instruction. In this paper, we present an interactive simulation system, LiveBook. This system places learners in the role...
We investigate multi-agent epistemic modal logic with common knowledge modalities for groups of agents and obtain van Benthem style model-theoretic characterisations, in terms of bisimulation invariance of classical first-order logic over the non-elementary classes of (finite or arbitrary) common knowledge Kripke frames. The fixpoint character of common knowledge modalities and the rôle that reachability...
The extensive use of information and communication technologies in power grid systems make them vulnerable to cyber-attacks. One class of cyber-attack is advanced persistent threats where highly skilled attackers can steal user authentication information's and then move laterally in the network, from host to host in a hidden manner, until they reach an attractive target. Once the presence of the attacker...
The concept of “truth,” as a public good is the production of a collective understanding, which emerges from a complex network of social interactions. The recent impact of social networks on shaping the perception of truth in political arena shows how such perception is corroborated and established by the online users, collectively. However, investigative journalism for discovering truth is a costly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.