Design and Implementation of Combinatorial Game Calculator

Author(s):  
Kuo-Yuan Kao ◽  

The universal game calculator we developed based on a combinatorial game model features a general-purpose game analysis engine, unlike other game-specific programs. Users input game rules by defining game functions and input different game locations by describing game expressions, enabling the system to analyze optimal game strategies.

Author(s):  
Hua Li ◽  
Qingqing Lou ◽  
Qiubai Sun ◽  
Bowen Li

In order to solve the conflict of interests of institutional investors, this paper uses evolutionary game model. From the point of view of information sharing, this paper discusses four different situations. Only when the sum of risk and cost is less than the penalty of free riding, the evolution of institutional investors will eventually incline to the stable state of information sharing. That is, the phenomenon of hugging. The research shows that the institutional investors are not independent of each other, but the relationship network of institutional investors for the purpose of information exchange. The content of this paper enriches the research on information sharing of institutional investors.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Danrong Song ◽  
Jinbo Song ◽  
Hehui Yuan ◽  
Yu Fan

PurposeWith the growing demand for infrastructure and public services in recent years, PPP-UP have attracted a great deal of attention. However, while the user focuses on the payment for use and the private sector is concerned with its return on investment, the public sector pays more attention to the efficient utilization of public funds. In order to analyze the willingness of each stakeholder to join PPP-UP, an evolutionary game model involving the three parties is constructed.Design/methodology/approachAn evolutionary game model is established that considers the users and the public and private sectors in user-pay public-private-partnership projects (PPP-UP). Eight scenarios of equilibriums and the game's evolutionary stable strategies are analyzed, and the corresponding stability conditions are then obtained. A situation where all three players are willing to cooperate in theory is also examined. The key influencing parameters that affect cooperation behaviors are further discussed.FindingsFirst, the results illustrate that by properly adjusting the influencing factors, the cooperation status among the three parties can be changed along with certain evolutionary trends. Second, it is hard to modify unsatisfactory evolutionary stability by small changes in both the price compensation of and the construction and operation compensation. Third, it is necessary to involve the users in the decision-making process in PPP-UP and take their demands regarding benefits and payments into account.Originality/valueIn this paper, we focus on PPP-UP to research interactions among the public and private sectors and the users. Based on the analysis of the evolutionary game, to facilitate the successful implementation and development of a project, several conditions are needed to ensure tripartite cooperation. Several recommendations are then proposed for decision-makers in PPP-UP.


Information ◽  
2019 ◽  
Vol 10 (4) ◽  
pp. 132 ◽  
Author(s):  
Yan Wang ◽  
Liqin Tian ◽  
Zhenguo Chen

Due to the dynamics and uncertainty of the current network environment, access control is one of the most important factors in guaranteeing network information security. How to construct a scientific and accurate access control model is a current research focus. In actual access control mechanisms, users with high trust values bring better benefits, but the losses will also be greater once cheating access is adopted. A general access control game model that can reflect both trust and risk is established in this paper. First, we construct an access control game model with user behavior trust between the user and the service provider, in which the benefits and losses are quantified by using adaptive regulatory factors and the user’s trust level, which enhances the rationality of the policy making. Meanwhile, we present two kinds of solutions for the prisoner’s dilemma in the traditional access control game model without user behavior trust. Then, due to the vulnerability of trust, the user’s trust value is updated according to the interaction situation in the previous stage, which ensures that the updating of the user’s trust value can satisfy the “slow rising-fast falling” principle. Theoretical analysis and the simulation experiment both show that this model has a better performance than a traditional game model and can guarantee scientific decision-making in the access control mechanism.


Author(s):  
OMID BANYASAD ◽  
PHILIP T. COX

The design and implementation of a programming environment including an editor, a debugger and an interpreter engine for Lograph, a general-purpose visual logic programming language, is discussed. The rationale for user-interface design decisions is presented, the goal of which is to increase cognitive support for the creation, exploration and debugging of Lograph programs. The design of the interpreter engine allows for animation of execution in the debugger. The engine takes full advantage of an efficient implementation of Prolog, and operates on a Prolog translation of Lograph programs and queries. The translated Lograph programs are probed with instrumentation code at appropriate places so that applications of Lograph rules are reported to the visual interface of the Lograph debugger as a side effect of the execution of a program.


2011 ◽  
Vol 211-212 ◽  
pp. 861-865
Author(s):  
Ping Zhang ◽  
Zuo Cheng Xing

With the development of integrated circuit technology, it is more and more difficult for debugging circuits. Generally, to achieve a powerful debugging capability of circuits is often at the expense of larger cost of hardware overhead .This paper propose a method of debugging structure designed in full-custom CPU based on scan-set testability methods and combed with the boundary-scan technology. This debugging structure can reduces much scan chains hardware overheads and is applicable to all general-purpose CPU chips. Moreover, it owns a powerful debugging capability which is observing and controlling the internal registers of circuits from JTAG port. This structure only increases the difficulty of the circuit logic design, but greatly decreases the cost of hardware.


Sign in / Sign up

Export Citation Format

Share Document