scholarly journals Implementasi Algoritma Negascout Untuk Permainan Checkers

2012 ◽  
Vol 8 (1) ◽  
Author(s):  
Aditya Kurniawan Effendi ◽  
Rosa Delima ◽  
Antonius Rachmat Chrismanto

Checker is a zero sum game which means if one player is declared win then the other player is declared lose, if one player gets 1 point then the other player gets -1 point. In this type of game every player have full knowledge of other player condition, like every move the other player has, what kind of pawn and the position of other player's pawn. This game will be implemented with Negascout and compared to Alpha-Beta to see wether it offer better or worse performance than Alpha-Beta. Both algorithm will be given 5 identical board condition to solve and the search depth will be limited to 4, 6 and 8 level. The result showed Negascout outperformed Alpha-Beta on 86% of the test performed. It searched less node than Alpha-Beta especially with depth 8. The result also showed Negascout found one difference node solution compared to Alpha-Beta with identical heuristic score. Negascout returned identical heuristic score with Alpha-Beta on all test. Kata Kunci : Negascout, Permainan, Checkers, Kecerdasan Buatan

1902 ◽  
Vol 48 (202) ◽  
pp. 434-450 ◽  
Author(s):  
T. S. Clouston

Dr. Clouston said that when he suggested toxæmia to the secretary as a suitable subject for a discussion at this meeting he had not intended to be the first speaker, because his object was to bring out more fully the views of the younger members who had recently committed themselves so strongly to the toxæmic and bacterial etiology of insanity, and so to get light thrown on some of the difficulties which he and others had felt in applying this theory to many of their cases in practice. It was not that he did not believe in the toxic theory as explaining the onset of many cases, or that he under-rated its importance, but that he could not see how it applied so universally or generally as some of the modern pathological school were now inclined to insist on. He knew that it was difficult for those of the older psychological and clinical school to approach the subject with that full knowledge of recent bacteriological and pathological doctrine which the younger men possessed, or to breathe that all-pervading pathological atmosphere which they seemed to inhale. He desired to conduct this discussion in an absolutely non-controversial and purely scientific spirit. To do so he thought it best to put his facts, objections, and difficulties in a series of propositions which could be answered and explained by the other side. He thought it important to define toxæmia, but should be willing to accept Dr. Ford Robertson's definition of toxines, viz., “Substances which are taken up by the (cortical nerve) cell and then disorder its metabolism.” He took the following extracts from his address at the Cheltenham meeting of the British Association (1) as representing Dr. Ford Robertson's views and the general trend of much investigation and hypothesis on the Continent.


Think ◽  
2013 ◽  
Vol 12 (34) ◽  
pp. 33-56
Author(s):  
Matthew Carey Jordan

This essay is about liberal and conservative views of marriage. I'll begin by mentioning that I would really, really like to avoid use of the terms ‘liberal’ and ‘conservative’, but when push comes to shove, I know of no better labels for the positions that will be discussed in what follows. I would like to avoid these labels for a simple reason: many people strongly self-identify as liberals or as conservatives, and this can undermine our ability to investigate the topic in a sane, rational way. Politics, at least in the contemporary English-speaking world, functions a lot like the world of sports. Many people have a particular team to which their allegiance has been pledged, and the team's successes and failures on the field are shared in the hearts and minds of its loyal followers. In my own case – and here, I ask for your pity – I am a fan of the National Football League's Cleveland Browns. As much as I might wish things were otherwise, I rejoice in the Browns' (rare) triumphs and suffer when they lose (which happens frequently). I do not wait to see what happens in the game before I decide which team to cheer for; if it's an NFL game, and I see orange and brown, I know where my allegiance lies. Furthermore, I identify with my fellow Browns fans in a way that I cannot identify with followers of, say, the Pittsburgh Steelers. Clevelanders are my people. We share something, and what we share unites us in opposition to Steeler Nation. Their victories are our defeats. It is a zero-sum game: for one of us to win, the other must lose.


2016 ◽  
Vol 33 (2) ◽  
pp. 90-101
Author(s):  
Aziz Douai

Western-Muslim relations have experienced long periods of peaceful coexistence,fruitful co-operation, and close interactions that have enriched both civilizations.And yet an alien observer of our mainstream media could be forgivenfor concluding that “Islam” and the “West” can never co-exist in peace becausethey seem to have nothing in common. In fact, the intermittent violence interruptingthese long peaceful interactions – from the Crusades to the “War onTerror” – has constituted the core of most mainstream media coverage and“scholarship” purporting to “study” and “explain” these relations.In a zero-sum power game, these dominant frameworks emphasize thatsuch a “clash” is inevitable. Samuel Huntington’s “Clash of Civilizations”theory has become the best known articulation and deployment of “conflict”as an “explanatory” framework for understanding current and past Muslim-West interactions. Simply put, existential, cultural, and religious chasmshave put the Muslim world on a collision course with the western world, aproblem that is most exacerbated by the presence of “Islam” and Muslimcommunities in western societies (Huntington, 1993).1 His thesis appearsto ignore each civilization’s internal diversity and pluralism and to be willfullyoblivious to the inter- and intra-civilizational interactions and centuriesoldco-existence, as Edward Said argued in his rebuttal: “Clash of Ignorance”(2001).  Beyond the broadest generalizations, after all, what do “Islam” and the“West” mean? How long can we afford to “ignore” the “porousness” and “ambiguity”of their geographical and cultural borders? Is “conflict” between thesetwo realms inevitable? How about the centuries-old dialogue between thesecivilizations, the “Self” and the “Other”? How can researchers and intellectualsdeploy their inter-disciplinary insights and scholarship to address both thereal and the perceived civilizational “chasms”?These questions constitute the overarching themes of some very importantscholarship published in three recent books: Engaging the Other: Public Policyand Western-Muslim Intersections, edited by Karim H. Karim and MahmoudEid; Re-Imagining the Other: Culture, Media, and Western-Muslim Intersections,edited by Mahmoud Eid and Karim H. Karim; and the Routledge Handbookof Islam in the West, edited by Roberto Tottoli. With rich methodologicalapproaches, broad theoretical lenses, and diverse topics, these three books offera unique platform to build both a holistic and nuanced understanding of thecontingencies and intricacies surrounding “Islam” and the “West.” ...


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Siwan Noh ◽  
Donghyun Kim ◽  
Zhipeng Cai ◽  
Kyung-Hyune Rhee

Recently, the concept of a decentralized data marketplace is getting much attention to exchange user data. Multi-authority attribute-based encryption (ABE), which can provide flexibility and user-centric access control, is previously widely used in decentralized data sharing applications and also becoming a foundation to build decentralized data trading applications. It is known that users in a multi-authority ABE system can collude by sharing their secret information for malicious purposes. To address this issue, the collusion-resistant multi-authority ABE model was introduced in which a unique global identifier (GID) is issued by the central authority (CA) to each user. Unfortunately, such approach cannot be used directly to build a decentralized data marketplace as (a) such intervention of the CA is directly against the main motivation of the decentralized trading platform and, mostly importantly, (b) the CA can exploit its full knowledge on users’ GID to launch various attacks against users. Motivated by these observations, this paper introduces a novel user collusion-resistant decentralized multi-authority ABE scheme for privacy preserving data trading systems. In the existing multi-authority ABE systems, users utilize his/her GID that is solely assigned by the CA to generate his/her secret keys throughout the collaboration with authorities and a user can compute multi-authority keys by combining the secret keys (stem from the same GID) in various ways. In the proposed system, the CA only has a partial knowledge of users’ GIDs, and thus, users’ privacy can be protected. On the other hand, we set the user’s own partial GID as a secret which can be used to withdraw his/her deposit to discourage any possible collusion among users.


Author(s):  
Anne Layne-Farrar

As part of its “policy project to examine the legal and policy issues surrounding the problem of potential patent ‘hold-up' when patented technologies are included in collaborative standards,” the Federal Trade Commission held an all-day workshop on June 21, 2011. The first panel of the day focused on patent disclosure rules intended to encourage full knowledge of patents “essential” for a standard and therefore to prevent patent ambush. When patents are disclosed after a standard is defined, the patent holder may have enhanced bargaining power that it can exploit to charge excessive royalties (e.g., greater than the value the patented technology contributes to the product complying with the standard). In this chapter, the authors present a case study on patent disclosure within the ICT sector. Specifically, they take an empirical look at the timing of patent disclosures within the European Telecommunications Standards Institute, the body responsible for some of the world's most prevalent mobile telephony standards. They find that most members officially disclose their potentially relevant patents after the standard is published, and sometimes considerably so. On the other hand, the authors also find that the delay in declaring patents to ETSI standards has been shrinking over time, with disclosures occurring closer to (although for the most part still after) the standard publication date for more recent standard generations as compared to earlier ones. This latter finding coincides with ETSI policy changes, suggesting that standards bodies may be able to improve patent disclosure with more precise rules.


Worldview ◽  
1977 ◽  
Vol 20 (9) ◽  
pp. 4-9
Author(s):  
Walter C. Clemens

Kto kovo? according to Lenin, is the fundamental question of politics. "Who's going to do in whom?" Lenin and others plotting against the czar came steadily to this zero-sum conception of politics. One side or the other could win—not both. Though Americans tend to expect a harmony of interests among nations, the zero-sum conception also exists in this country; it is, in fact, a prominent factor in the ongoing debate about Soviet strategic objectives and capabilities—for instance, in statements by the Committee on the Present Danger.


1997 ◽  
Vol 53 (3) ◽  
pp. 457-465 ◽  
Author(s):  
A. D. Rae ◽  
D. C. Craig ◽  
I. G. Dance ◽  
M. L. Scudder ◽  
P. A. W. Dean ◽  
...  

The crystal structure of Pb(SC6H5)2 is pseudo-C-centred orthorhombic, a = 54.06 (1), b = 11.468 (1), c = 7.4387 (8) Å, \alpha = \beta = \gamma = 90°, Z = 16, and may be described as a partial ordering of a 1:1 disordered parent structure of symmetry Pmcn, Z = 4 (a′ = a/2, b′ = b/2, c′ = c), in which the mirror imposes a 1:1 disorder on two-dimensionally polymeric layers perpendicular to a*. An ideally ordered structure has monoclinic space group C1121/d (P21/c using an alternative axis system b, c, [a + b]/2), but may also be described as two inversion-related substructures of Cmc21 pseudo- symmetry, where the b-glide planes of one substructure coincide with the mirror planes of the other and vice versa. Moving one substructure by b/2 relative to the other creates a different orientation of the structure. The crystal studied showed a partial disorder of each substructure relative to origins b/2 apart [0.964 (4):0.036 for one substructure and 0.584 (3):0.416 for the other]. This lowers the symmetry of the average structure to C1121 with intensities realistically described as K 2[(1−\delta)|F(hkl)|2 + \delta|F(hkl)|2], where K 2 for h odd, k odd reflections is 0.444 (7) of the value for h even, k even reflections, \delta is 0.325 (5) and F(hkl) is the structure factor for an ideally ordered structure. Final values for R of 0.046 and 0.090 were obtained for the 844 h even, k even and 687 h odd, k odd reflections with I(h) > 3\sigma(I(h)) used in refinement. A bond-valence interpretation of the bonding within the polymeric layer structure is given.


Author(s):  
Marco Angrisani ◽  
Antonio Guarino ◽  
Steffen Huck ◽  
Nathan C Larson

We construct laboratory financial markets in which subjects can trade an asset whose value is unknown. Subjects receive private clues about the asset value and then set bid and ask prices at which they are willing to buy or to sell from the other participants. In some of our markets (experimental treatments), there are gains from trade, while in others there are no gains: trade is zero sum. Celebrated no-trade theorems state that differences in private information alone cannot explain trade in the zero sum case. We study whether purely informational trade is eliminated in our experimental markets with no gains. The comparison of our results for gains and no-gains treatments shows that subjects fail to reach the no-trade outcome by pure introspection, but they approach it over time through market feedback and learning. Furthermore, the less noisy the clue-asset relationship is, the closer trade comes to being eliminated entirely.


2013 ◽  
Vol 55 (4) ◽  
pp. 834-864 ◽  
Author(s):  
Walter Armbrust

AbstractThe term “counter-revolution” evokes a straightforward contestation of political claims in a revolutionary situation. But contestation is not a zero-sum game: this side wins; the other side loses, and power remains the same. A revolutionary situation is unpredictable. New formulations of political claims may emerge in a protracted moment of “liminal crisis”—a kind of political ritual with no master of ceremonies capable of ending it. Indeed, the meaning of the political prize itself might be open to reinterpretation. My paper examines counter-revolution through the lens of Taufiq ‘Ukasha, an Egyptian talk show host and former member of the deposed National Democratic Party. Since the Revolution ‘Ukasha has become increasingly prominent as an unacknowledged spokesman for Egypt's Military Council, which assumed executive powers in the wake of the Mubarak regime's collapse. I argue that ‘Ukasha should not be understood simply as afilul—a remnant of the old regime. He is rather a “trickster,” a creature at home in the betwixt-and-between of open-ended liminality, and as such not an instrument of a socially grounded political power. In an environment in which the usual points of social and political orientation are called into question, the significance of a trickster is that he or she can become an object of emulation, an instrument of “schismogenesis”—the creation of a new social formation. A trickster, as a creature of pure liminality, is particularly prone to generating perverted forms of social knowledge. In ‘Ukasha's case, this new social formation is an unprecedented formulation of Egyptian militarism.


Sign in / Sign up

Export Citation Format

Share Document