scholarly journals Budget-feasible Mechanisms for Representing Groups of Agents Proportionally

Author(s):  
Xiang Liu ◽  
Hau Chan ◽  
Minming Li ◽  
Weiwei Wu

In this paper, we consider the problem of designing budget-feasible mechanisms for selecting agents with private costs from various groups to ensure proportional representation, where the minimum proportion of the selected agents from each group is maximized. Depending on agents' membership in the groups, we consider two main models: single group setting where each agent belongs to only one group, and multiple group setting where each agent may belong to multiple groups. We propose novel budget-feasible proportion-representative mechanisms for these models, which can select representative agents from different groups. The proposed mechanisms guarantee theoretical properties of individual rationality, budget-feasibility, truthfulness, and approximation performance on proportional representation.

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Qi Cheng ◽  
Zhuo Zhao ◽  
Chingfang Hsu ◽  
Maoyuan Zhang ◽  
Qing Yang ◽  
...  

Although nowadays lots of group key agreement schemes have been presented, most of these protocols generate a secret key for a single group. However, in the IoT HCS, more and more communications are involved in multiple groups and users can join multiple groups to communicate at the same time. Therefore, applying the conventional public-key-based one-at-a-time group key establishment protocols has heavy computational cost or suffer from security vulnerabilities. At the same time, in an IoT HCS, a trusted KGC is usually not available and so more flexible self-organized multigroup keys generation will be desired by all group members. In order to address this issue, a practical scheme for efficient and flexible KGC-free polynomial-based multigroup key establishments for IoT HCS is proposed. The proposed protocol can generate multiple group keys for all group members at once, instead of generating one key each time for a single group; more importantly, there is no need for a trusted KGC in the process of group keys establishment and each user can join multiple groups at the same time using only one reserved share. Meanwhile, the security of the proposed protocol is discussed in detail. Finally, we compare this protocol with the latest related group key distribution protocols in performance analysis. The results show that this efficient and flexible KGC-free polynomial-based multiple group keys establishment protocol is more suitable for practical group key agreement in IoT HCS.


1971 ◽  
Vol 6 (4) ◽  
pp. 355-358
Author(s):  
Julia T. Wu
Keyword(s):  

2000 ◽  
Vol 25 (1) ◽  
pp. 20-59 ◽  
Author(s):  
T. Mark Beasley

This study developed an extension of the Hollander and Sethuraman (1978) statistic (B2 ) for testing discordance among intra-block rankings of K elements for multiple groups (J ≥ 2) of raters. B2 was demonstrated to be equivalent to the Pillai-Bartlett trace (V ) from a multivariate profile analysis performed on the ranks such that B2 = V (N - 1) Results confirmed the utility of B2 as an omnibus test of interaction (i.e., discordance) among intra-block ranks and demonstrated that it was more powerful than the multivariate approach to ranked data suggested by Serlin and Marascuilo (1983) . An extension of the Friedman (1937) two-way ANOVA for intra-block ranks was also developed. The adequacy of these procedures for testing interactions in multiple group repeated measures designs was investigated. The Friedman model demonstrated adequate statistical properties only when covariance matrices were spherical. Results also demonstrated that the Hollander-Sethuraman model was useful in testing interaction contrasts.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Haiyang Li ◽  
Zeyu Zheng

Due to the improvement of the quality of industrial products, zero-failure data often occurs during the reliability life test or in the service environment, and such problems cannot be handled using traditional reliability estimation methods. Regarding the processing and analysis of zero-failure data, the confidence limit assessment methods were proposed by some researchers. Based on the existing research, a confidence limit method set (CLMS) is established in the Weibull distribution for reliability estimation of zero-failure data. The method set includes the unilateral confidence limit method and optimal confidence limit method, so that almost all existing grouping types of zero-failure data can be quickly evaluated, and multiple methods can be used in parallel to deal with the same problem. The effectiveness and high efficiency of the CLMS combined with numerical simulation examples have been verified, and the possibility of analyzing multiple groups of zero-failure data with a confidence limit method suitable for processing single group of zero-failure data is expanded. Finally, the actual effect of the method set is verified by the single group of zero-failure data of rolling bearings and the multiple groups of zero-failure data of torque motors. The results of the example evaluation show that the CLMS has obvious advantages in practical engineering applications.


2006 ◽  
Vol 22 (3) ◽  
pp. 198-206 ◽  
Author(s):  
Gisela Mohr ◽  
Andreas Müller ◽  
Thomas Rigotti ◽  
Zeynep Aycan ◽  
Franziska Tschan

Irritation as defined in this paper is the subjectively perceived emotional and cognitive strain in occupational contexts. The structural equivalence of the Arabic, Dutch, English, French, Italian, Russian, Spanish, Turkish, and Polish adaptations of the German Irritation Scale is examined. The Irritation Scale is recommended for application particularly in occupational contexts. In this field it can be used for evaluating interventions, for research on stress at work, and for individual counseling. Exploratory factor analyses, as well as single group and different multiple-group confirmatory factor analyses, were performed. Structural equivalency in terms of equal factor loadings as well as equal factor covariances across all adaptations can be claimed. However, the single group analyses suggest that the hypothesized factor model should be rejected in the English, Russian, Spanish, and Turkish versions, mainly because of borderline values in the RMSEA index.


2007 ◽  
Vol 09 (04) ◽  
pp. 599-635 ◽  
Author(s):  
JURJEN KAMPHORST ◽  
GERARD VAN DER LAAN

It is widely recognized that the shape of networks influences both individual and aggregate behavior. This raises the question which types of networks are likely to arise. In this paper we investigate a model of network formation, where players are divided into groups and the costs of a link between any pair of players are increasing in the distance between the groups that these players belong to. We give a full characterization of the networks induced by a minimal curb set for any number of groups. To do so, we show that in our multiple group model each minimal curb set is a so-called super-tight curb set, that is a minimal curb set satisfying the condition that in each state of the set every player has the same best reply. From the proof it follows that every recurrent class of an unperturbed best reply dynamics is a minimal (super-tight) curb set and reversely, which yields the characterization result. We show that in case of multiple groups networks in minimal curb sets may have features that can not occur in networks with at most two groups. Nevertheless, local centrality and center-sponsorship are still important characteristics of the networks in minimal curb sets.


Author(s):  
Xia Liang ◽  
Fei Teng ◽  
Yan Sun

When an emergency event occurs, it is critical to respond in the shortest possible time. Therefore, the rationality and effectiveness of emergency decisions are the key links in emergency management. In this paper, with aims to investigate the problem of emergency alternatives selection, in which a large number of experts from multiple groups consider the linguistic evaluations of emergency alternatives and prior orders of criteria, a novel emergency decision method is proposed. First, many experts from multiple subgroups are employed to evaluate the emergency alternatives associated with multiple criteria in the format of linguistic terms. Then, linguistic distribution evaluations for the emergency alternatives of the criteria associated with each subgroup are constructed. With respect to the linguistic distribution evaluations associated with the different subgroups, the linguistic distribution power average (LDPA) and linguistic distribution weighted power average (LDWPA) operators are developed so as to aggregate the subgroups’ evaluations. Next, based on the linguistic distribution multi-attributive border approximation area comparison (LD-MABAC) method, the distance matrix of the emergency alternatives is calculated. Furthermore, the prior weights of the criteria are determined based on the distance values. Finally, the ranking result of the emergency alternatives is derived. A practical example of emergency alternatives selection is adopted to illustrate the availability and practicability of the proposed method.


2011 ◽  
Vol 16 (4) ◽  
pp. 278-287 ◽  
Author(s):  
Annalaura Nocentini ◽  
Ersilia Menesini ◽  
Concetta Pastorelli ◽  
Jennifer Connolly ◽  
Debra Pepler ◽  
...  

The present study aims to investigate the latent structure of a Physical Dating Aggression Scale in Italian and Canadian adolescents and to evaluate the measurement invariance across gender and country. Participants involved 1,628 adolescents (704 Italians and 924 Canadians; 800 males and 828 females) aged 14–16 years. A revised version of the CTS Physical Aggression Scale ( Straus, 1979 ) modified to make the items more acceptable to younger teens was used. Results from Single-Group confirmatory factor analysis supported a monodimensional structure as the most parsimonious index of Physical Dating Aggression. Furthermore, Multiple-Group analyses conducted through different tests (across gender in each country separately, across country in each gender separately, and across country on the whole sample) showed a substantial factorial invariance. Results are discussed in relation to age, gender, and cultural issues on Physical Dating Aggression.


2015 ◽  
Vol 5 (2) ◽  
pp. 99-123 ◽  
Author(s):  
Jeremy N.V Miles ◽  
Magdalena Kulesza ◽  
Brett Ewing ◽  
Regina A Shih ◽  
Joan S Tucker ◽  
...  

Purpose – When researchers find an association between two variables, it is useful to evaluate the role of other constructs in this association. While assessing these mediation effects, it is important to determine if results are equal for different groups. It is possible that the strength of a mediation effect may differ for males and females, for example – such an effect is known as moderated mediation. The paper aims to discuss these issues. Design/methodology/approach – Participants were 2,532 adolescents from diverse ethnic/racial backgrounds and equally distributed across gender. The goal of this study was to investigate parental respect as a potential mediator of the relationship between gender and delinquency and mental health, and to determine whether observed mediation is moderated by gender. Findings – Parental respect mediated the association between gender and both delinquency and mental health. Specifically, parental respect was a protective factor against delinquency and mental health problems for both females and males. Practical implications – Demonstrated the process of estimating models in Lavaan, using two approaches (i.e. single group regression and multiple group regression model), and including covariates in both models. Originality/value – The authors demonstrate the process of estimating these models in Lavaan, using two approaches, a single group regression model and a multiple group model, and the authors demonstrate how to include covariates in these models.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Teng Li ◽  
Jiawei Zhang ◽  
Yangxu Lin ◽  
Shengkai Zhang ◽  
Jianfeng Ma

Cloud-based Internet of Things, which is considered as a promising paradigm these days, can provide various applications for our society. However, as massive sensitive and private data in IoT devices are collected and outsourced to cloud for data storage, processing, or sharing for cost saving, the data security has become a bottleneck for its further development. Moreover, in many large-scale IoT systems, multiple group data sharing is practical for users. Thus, how to ensure data security in multiple group data sharing remains an open problem, especially the fine-grained access control and data integrity verification with public auditing. Therefore, in this paper, we propose a blockchain-based fine-grained data sharing scheme for multiple groups in cloud-based IoT systems. In particular, we design a novel multiauthority large universe CP-ABE scheme to guarantee the fine-grained access control and data integrity across multiple groups by integrating group signature into our scheme. Moreover, to ease the need for a trusted third auditor in traditional data public auditing schemes, we introduce blockchain technique to enable a distributed data public auditing. In addition, with the group signature, our scheme also realizes anonymity and traitor tracing. The security analysis and performance evaluation show that our scheme is practical for large-scale IoT systems.


Sign in / Sign up

Export Citation Format

Share Document