Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,758)

Search Parameters:
Keywords = cooperative algorithm

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 12164 KiB  
Article
Heuristic Optimization-Based Trajectory Planning for UAV Swarms in Urban Target Strike Operations
by Chen Fei, Zhuo Lu and Weiwei Jiang
Drones 2024, 8(12), 777; https://doi.org/10.3390/drones8120777 (registering DOI) - 20 Dec 2024
Abstract
Unmanned aerial vehicle (UAV) swarms have shown substantial potential to enhance operational efficiency and reduce strike costs, presenting extensive applications in modern urban warfare. However, achieving effective strike performance in complex urban environments remains challenging, particularly when considering three-dimensional obstacles and threat zones [...] Read more.
Unmanned aerial vehicle (UAV) swarms have shown substantial potential to enhance operational efficiency and reduce strike costs, presenting extensive applications in modern urban warfare. However, achieving effective strike performance in complex urban environments remains challenging, particularly when considering three-dimensional obstacles and threat zones simultaneously, which can significantly degrade strike effectiveness. To address this challenge, this paper proposes a target strike strategy using the Electric Eel Foraging Optimization (EEFO) algorithm, a heuristic optimization method designed to ensure precise strikes in complex environments. The problem is formulated with specific constraints, modeling each UAV as an electric eel with random initial positions and velocities. This algorithm simulates the interaction, resting, hunting, and migrating behaviors of electric eels during their foraging process. During the interaction phase, UAVs engage in global exploration through communication and environmental sensing. The resting phase allows UAVs to temporarily hold their positions, preventing premature convergence to local optima. In the hunting phase, the swarm identifies and pursues optimal paths, while in the migration phase the UAVs transition to target areas, avoiding threats and obstacles while seeking safer routes. The algorithm enhances overall optimization capabilities by sharing information among surrounding individuals and promoting group cooperation, effectively planning flight paths and avoiding obstacles for precise strikes. The MATLAB(R2024b) simulation platform is used to compare the performance of five optimization algorithms—SO, SCA, WOA, MFO, and HHO—against the proposed Electric Eel Foraging Optimization (EEFO) algorithm for UAV swarm target strike missions. The experimental results demonstrate that in a sparse undefended environment, EEFO outperforms the other algorithms in terms of trajectory planning efficiency, stability, and minimal trajectory costs while also exhibiting faster convergence rates. In densely defended environments, EEFO not only achieves the optimal target strike trajectory but also shows superior performance in terms of convergence trends and trajectory cost reduction, along with the highest mission completion rate. These results highlight the effectiveness of EEFO in both sparse and complex defended scenarios, making it a promising approach for UAV swarm operations in dynamic urban environments. Full article
(This article belongs to the Special Issue Space–Air–Ground Integrated Networks for 6G)
Show Figures

Figure 1

Figure 1
<p>Three-dimensional configuration space.</p>
Full article ">Figure 2
<p>Schematic diagram of an urban building.</p>
Full article ">Figure 3
<p>Schematic diagram of ground threats.</p>
Full article ">Figure 4
<p>Flight altitude constraint.</p>
Full article ">Figure 5
<p>Maximum range constraint.</p>
Full article ">Figure 6
<p>Waypoint obstacle avoidance constraint.</p>
Full article ">Figure 7
<p>Cubic B-spline smoothing curve.</p>
Full article ">Figure 8
<p>Charts comparing the UAV swarm target strike results in the sparse environment scenario with hostile defense: (<b>a</b>–<b>f</b>) respectively represent the target strike trajectories of the EEFO, HHO, MFO, SCA, SO, and WOA algorithms in the 3D environment.</p>
Full article ">Figure 9
<p>Charts comparing the UAV swarm target strike results in the sparse environment scenario with hostile defense: (<b>a</b>–<b>f</b>) respectively represent the target strike trajectories of the EEFO, HHO, MFO, SCA, SO, and WOA algorithms in the 2D environments.</p>
Full article ">Figure 10
<p>Comparison of UAV swarm target strike results in the sparse environment scenario with invincible defense: (<b>a</b>) line chart comparing the optimal fitness values; (<b>b</b>) distribution chart, with bars showing differences in the optimal fitness values; (<b>c</b>) heatmap comparing the optimal fitness values.</p>
Full article ">Figure 11
<p>Charts comparing the UAV swarm target strike results in the dense environment scenario with hostile defense: (<b>a</b>–<b>f</b>) respectively represent the target strike trajectories of the EEFO, HHO, MFO, SCA, SO, and WOA algorithms in the 3D environment.</p>
Full article ">Figure 12
<p>Comparison of UAV swarm target strike results in the dense environment scenario with hostile defense: (<b>a</b>–<b>f</b>) respectively represent the target strike trajectories of the EEFO, HHO, MFO, SCA, SO, and WOA algorithms in the 2D environments.</p>
Full article ">Figure 13
<p>Comparison of UAV swarm target strike results in the sparse environment scenario with hostile defense: (<b>a</b>) line chart comparing optimal fitness values; (<b>b</b>) distribution chart with bars representing the difference in optimal fitness values; (<b>c</b>) heatmap chart comparing the optimal fitness values.</p>
Full article ">
17 pages, 6724 KiB  
Article
Distributed Localization of Non-Cooperative Targets in Non-Coplanar Rendezvous Processes
by Zihan Zhen and Feng Yu
Aerospace 2024, 11(12), 1039; https://doi.org/10.3390/aerospace11121039 - 19 Dec 2024
Abstract
Precise positioning of non-cooperative targets is important for maintaining spacecraft operational environments in orbit. In order to address the challenges of non-cooperative target localization during non-coplanar rendezvous, this study develops a distributed cooperative localization scheme. First, a three-line-of-sight positioning method for long-range targets [...] Read more.
Precise positioning of non-cooperative targets is important for maintaining spacecraft operational environments in orbit. In order to address the challenges of non-cooperative target localization during non-coplanar rendezvous, this study develops a distributed cooperative localization scheme. First, a three-line-of-sight positioning method for long-range targets in non-coplanar orbits is proposed. Second, a distributed extended Kalman filter based on a consensus algorithm is designed, which reduces observation dimensions and increases system robustness. Subsequently, the rendezvous configuration optimization problem for long-range non-coplanar targets is transformed into a numerical optimization problem. Finally, an improved NSGA-III algorithm is proposed by introducing normal distribution crossover (NDX) and a cosine-like mutation distribution index to optimize the rendezvous configuration. A simulation shows that the methods proposed are effective, and the improved NSGA-III is superior to traditional algorithms in terms of search range and convergence speed. After configuration optimization, the performance of the system has been greatly improved, with better positioning accuracy and stronger robustness. Full article
Show Figures

Figure 1

Figure 1
<p>Multi-LOS cooperative localization scheme.</p>
Full article ">Figure 2
<p>System observability. (<b>a</b>) System observability. (<b>b</b>) Distance between tracking satellites and target. (<b>c</b>) Observation angle between satellites 1 and 2 and target.</p>
Full article ">Figure 3
<p>Transferring configuration design.</p>
Full article ">Figure 4
<p>Cosine-like mutation distribution index.</p>
Full article ">Figure 5
<p>Improved NSGA-III algorithm.</p>
Full article ">Figure 6
<p>Comparation of two algorithms’ simulation results for DTLZ1. (<b>a</b>) Traditional NSGA-III. (<b>b</b>) Improved NSGA-III.</p>
Full article ">Figure 7
<p>Distribution of offspring.</p>
Full article ">Figure 8
<p>Convergence curve.</p>
Full article ">Figure 9
<p>Solution comparations for three algorithms. (<b>a</b>) Improved NSGA-III and NSGA-III. (<b>b</b>) Improved NSGA-III and NSGA-II.</p>
Full article ">Figure 10
<p>Position error of estimation in satellite 1, 2, 3. (<b>a</b>–<b>c</b>) Position error of <span class="html-italic">x</span>, <span class="html-italic">y</span>, <span class="html-italic">z</span> axis in satellite 1. (<b>d</b>–<b>f</b>) Position error of <span class="html-italic">x</span>, <span class="html-italic">y</span>, <span class="html-italic">z</span> axis in satellite 2. (<b>g</b>–<b>i</b>) Position error of <span class="html-italic">x</span>, <span class="html-italic">y</span>, <span class="html-italic">z</span> axis in satellite 3.</p>
Full article ">Figure 11
<p>Co-localization system position estimation error. (<b>a</b>) Estimation error of satellite 1; (<b>b</b>) Estimation error of satellite 2; (<b>c</b>) Estimation error of satellite 3.</p>
Full article ">
21 pages, 4447 KiB  
Article
A Bi-Objective Model for the Location and Optimization Configuration of Kitchen Waste Transfer Stations
by Ming Wan, Ting Qu, George Q. Huang, Ruoheng Chen, Manna Huang, Yanghua Pan, Duxian Nie and Junrong Chen
Systems 2024, 12(12), 571; https://doi.org/10.3390/systems12120571 - 17 Dec 2024
Viewed by 312
Abstract
Since the implementation of China’s mandatory waste sorting policy, the recycling of kitchen waste has become one of the core tasks of waste classification. The problem of designing the locations and the optimization configuration strategy for kitchen waste transfer stations faces great challenges [...] Read more.
Since the implementation of China’s mandatory waste sorting policy, the recycling of kitchen waste has become one of the core tasks of waste classification. The problem of designing the locations and the optimization configuration strategy for kitchen waste transfer stations faces great challenges in reconstructing the municipal solid waste collection and transportation system. This paper establishes an integer programming model for the bi-objectives of the location and optimal configuration for a kitchen waste transfer station, with the goal of minimizing the total cost and overall negative environmental impact. An improved non-dominated sorting genetic algorithm with an elite strategy (NSGA-II) is used to solve the problem, resulting in a Pareto-optimal solution set that includes several non-dominated solutions, thereby providing diversified choices for decision-makers. Finally, a pilot case involving cooperative enterprises is used as an example in this study, and the results demonstrate the effectiveness of the model and algorithm, as well as their feasibility in practice. Full article
Show Figures

Figure 1

Figure 1
<p>The recycling process of KW.</p>
Full article ">Figure 2
<p>The collection and transportation network for kitchen waste.</p>
Full article ">Figure 3
<p>The process of the improved NSGA-II.</p>
Full article ">Figure 4
<p>Distribution of KW deposit points and TS candidates within the pilot area (Blue dots represent deposit points, green squares represent TS candidates, and numbers represent numbering).</p>
Full article ">Figure 5
<p>Distribution of Pareto-optimal front solutions (F1 reflects the total cost, and F2 reflects the negative environmental effect).</p>
Full article ">Figure 6
<p>Distribution of the TSs and the allocation of the deposit points in the Pareto-optimal solutions.</p>
Full article ">Figure 7
<p>Comparison of improved NSGA-II and traditional NSGA-II Pareto-optimal frontiers.</p>
Full article ">Figure 8
<p>Comparison of different fixed construction costs of the TSs (F1 reflects the total cost, and F2 reflects the negative environmental effect).</p>
Full article ">Figure 9
<p>Pareto-optimal solutions corresponding to different tank capacities (F1 reflects the total cost, and F2 reflects the negative environmental effect).</p>
Full article ">Figure 10
<p>Pareto-optimal solutions corresponding to the different minimum loading rate of tanks (F1 reflects the total cost, and F2 reflects the negative environmental effect).</p>
Full article ">Figure 11
<p>Distribution of Pareto-optimal solutions under different waste volumes (F1 reflects the total cost, and F2 reflects negative environmental effects).</p>
Full article ">Figure 12
<p>Trends in the variation of the calculation results for different scales (values of <math display="inline"><semantics> <mi mathvariant="bold-italic">m</mi> </semantics></math>).</p>
Full article ">
16 pages, 4711 KiB  
Article
A Multi-Agent Centralized Strategy Gradient Reinforcement Learning Algorithm Based on State Transition
by Lei Sheng, Honghui Chen and Xiliang Chen
Algorithms 2024, 17(12), 579; https://doi.org/10.3390/a17120579 - 15 Dec 2024
Viewed by 509
Abstract
The prevalent utilization of deterministic strategy algorithms in Multi-Agent Deep Reinforcement Learning (MADRL) for collaborative tasks has posed a significant challenge in achieving stable and high-performance cooperative behavior. Addressing the need for the balanced exploration and exploitation of multi-agent ant robots within a [...] Read more.
The prevalent utilization of deterministic strategy algorithms in Multi-Agent Deep Reinforcement Learning (MADRL) for collaborative tasks has posed a significant challenge in achieving stable and high-performance cooperative behavior. Addressing the need for the balanced exploration and exploitation of multi-agent ant robots within a partially observable continuous action space, this study introduces a multi-agent centralized strategy gradient algorithm grounded in a local state transition mechanism. In order to solve this challenge, the algorithm learns local state and local state-action representation from local observations and action values, thereby establishing a “local state transition” mechanism autonomously. As the input of the actor network, the automatically extracted local observation representation reduces the input state dimension, enhances the local state features closely related to the local state transition, and promotes the agent to use the local state features that affect the next observation state. To mitigate non-stationarity and reliability assignment issues in multi-agent environments, a centralized critic network evaluates the current joint strategy. The proposed algorithm, NST-FACMAC, is evaluated alongside other multi-agent deterministic strategy algorithms in a continuous control simulation environment using a multi-agent ant robot. The experimental results indicate accelerated convergence and higher average reward values in cooperative multi-agent ant simulation environments. Notably, in four simulated environments named Ant-v2 (2 × 4), Ant-v2 (2 × 4d), Ant-v2 (4 × 2), and Manyant (2 × 3), the algorithm demonstrates performance improvements of approximately 1.9%, 4.8%, 11.9%, and 36.1%, respectively, compared to the best baseline algorithm. These findings underscore the algorithm’s effectiveness in enhancing the stability of multi-agent ant robot control within dynamic environments. Full article
(This article belongs to the Section Evolutionary Algorithms and Machine Learning)
Show Figures

Figure 1

Figure 1
<p>The NST-FACMAC framework: (<b>a</b>) the mechanism of learning local state transitions; (<b>b</b>) the decentralized policy and its novelty exploration; and (<b>c</b>) the centralized but factored critic.</p>
Full article ">Figure 2
<p>The coding process of the encoder pair. (<b>a</b>) The process of encoding local state. (<b>b</b>) The process of encoding local state-action.</p>
Full article ">Figure 3
<p>MAMuJoCo-ant simulation environment.</p>
Full article ">Figure 4
<p>Comparative experimental diagram of the algorithm in four simulation environments.</p>
Full article ">Figure 5
<p>The episode returns for NST-FACMAC training with z_dim of 2, 4, and 8 in the Manyagent Ant [2 <math display="inline"><semantics> <mrow> <mo>×</mo> </mrow> </semantics></math> 3].</p>
Full article ">Figure 6
<p>Experiments to verify the effectiveness of local state transitions.</p>
Full article ">Figure 7
<p>Experiments to verify the validity of novelty exploration.</p>
Full article ">
19 pages, 3567 KiB  
Article
Multi-Agent Reinforcement Learning-Based Computation Offloading for Unmanned Aerial Vehicle Post-Disaster Rescue
by Lixing Wang and Huirong Jiao
Sensors 2024, 24(24), 8014; https://doi.org/10.3390/s24248014 - 15 Dec 2024
Viewed by 417
Abstract
Natural disasters cause significant losses. Unmanned aerial vehicles (UAVs) are valuable in rescue missions but need to offload tasks to edge servers due to their limited computing power and battery life. This study proposes a task offloading decision algorithm called the multi-agent deep [...] Read more.
Natural disasters cause significant losses. Unmanned aerial vehicles (UAVs) are valuable in rescue missions but need to offload tasks to edge servers due to their limited computing power and battery life. This study proposes a task offloading decision algorithm called the multi-agent deep deterministic policy gradient with cooperation and experience replay (CER-MADDPG), which is based on multi-agent reinforcement learning for UAV computation offloading. CER-MADDPG emphasizes collaboration between UAVs and uses historical UAV experiences to classify and obtain optimal strategies. It enables collaboration among edge devices through the design of the ’critic’ network. Additionally, by defining good and bad experiences for UAVs, experiences are classified into two separate buffers, allowing UAVs to learn from them, seek benefits, avoid harm, and reduce system overhead. The performance of CER-MADDPG was verified through simulations in two aspects. First, the influence of key hyperparameters on performance was examined, and the optimal values were determined. Second, CER-MADDPG was compared with other baseline algorithms. The results show that compared with MADDPG and stochastic game-based resource allocation with prioritized experience replay, CER-MADDPG achieves the lowest system overhead and superior stability and scalability. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

Figure 1
<p>Edge computing architecture.</p>
Full article ">Figure 2
<p>CER-MADDPG algorithm structure.</p>
Full article ">Figure 3
<p>Improved critic network structure.</p>
Full article ">Figure 4
<p>Good and bad behavior guidance model.</p>
Full article ">Figure 5
<p>Selection of learning rates for the critic and actor networks.</p>
Full article ">Figure 6
<p>Selection of replay buffer size.</p>
Full article ">Figure 7
<p>Selection of <math display="inline"><semantics> <msub> <mi>α</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>α</mi> <mn>2</mn> </msub> </semantics></math>.</p>
Full article ">Figure 8
<p>Comparison of system overhead of different algorithms.</p>
Full article ">Figure 9
<p>Comparison of task completion time for different UAV mission sizes.</p>
Full article ">Figure 10
<p>System consumption comparison as the number of UAVs increases.</p>
Full article ">
25 pages, 6074 KiB  
Article
Cooperative Low-Carbon Trajectory Planning of Multi-Arrival Aircraft for Continuous Descent Operation
by Cun Feng, Chao Wang, Hanlu Chen, Chenyang Xu and Jinpeng Wang
Aerospace 2024, 11(12), 1024; https://doi.org/10.3390/aerospace11121024 - 15 Dec 2024
Viewed by 348
Abstract
To address the technical challenges of implementing Continuous Descent Operations (CDO) in high-traffic-density terminal control areas, we propose a cooperative low-carbon trajectory planning method for multiple arriving aircraft. Firstly, this study analyzes the CDO phases of aircraft in the terminal area, establishes a [...] Read more.
To address the technical challenges of implementing Continuous Descent Operations (CDO) in high-traffic-density terminal control areas, we propose a cooperative low-carbon trajectory planning method for multiple arriving aircraft. Firstly, this study analyzes the CDO phases of aircraft in the terminal area, establishes a multi-phase optimal control model for the vertical profile, and introduces a novel vertical profile optimization method for CDO based on a genetic algorithm. Secondly, to tackle the challenges of CDO in busy terminal areas, a T-shaped arrival route structure is designed to provide alternative paths and to generate a set of four-dimensional (4D) alternative trajectories. A Mixed Integer Programming (MIP) model is constructed for the 4D trajectory planning of multiple aircraft, aiming to maximize the efficiency of arrival traffic flow while considering conflict constraints. The complex constrained MIP problem is transformed into an unconstrained problem using a penalty function method. Finally, experiments were conducted to evaluate the implementation of CDO in busy terminal areas. The results show that, compared to actual operations, the proposed optimization model significantly reduces the total aircraft operating time, fuel consumption, CO2 emissions, SO2 emissions, and NOx emissions. Specifically, with the optimization objective of minimizing total cost, the proposed method reduces the total operation time by 22.4%; fuel consumption, CO2 emissions, SO2 emissions by 22.9%, and NOx emissions by 23.7%. The method proposed in this paper not only produces efficient aircraft sequencing results, but also provides a feasible low-carbon trajectory for achieving optimal sequencing. Full article
(This article belongs to the Section Air Traffic and Transportation)
Show Figures

Figure 1

Figure 1
<p>A typical CDO process of an arrival aircraft.</p>
Full article ">Figure 2
<p>The explicit guidance for aircraft speed control.</p>
Full article ">Figure 3
<p>A simplified standard terminal arrival route for busy terminal areas.</p>
Full article ">Figure 4
<p>(<b>a</b>) Traditional open path arrival route structure to downwind leg; (<b>b</b>) T-shaped arrival route structure.</p>
Full article ">Figure 5
<p>Alternative route assembly schematic.</p>
Full article ">Figure 6
<p>Alternative set of 4D trajectories based on downwind leg segmentation.</p>
Full article ">Figure 7
<p>Correspondence between flight distance and time of critical waypoint.</p>
Full article ">Figure 8
<p>The chromosome model of decision variables in the MIP planning model.</p>
Full article ">Figure 9
<p>Diagram illustrating priority landing for aircraft on a direct final approach.</p>
Full article ">Figure 10
<p>Standard arrival flight procedures of ZSQD TMA.</p>
Full article ">Figure 11
<p>Alternative routes of T-shaped arrival route structure (schematic diagram not to scale).</p>
Full article ">Figure 12
<p>Actual and optimized vertical profile of B737-800.</p>
Full article ">Figure 13
<p>Variation in flight time and fuel consumption with different optimization objectives. (<b>a</b>) Flight time distribution; (<b>b</b>) fuel consumption distribution.</p>
Full article ">Figure 14
<p>Space–time diagram of multi-aircraft trajectory planning. Analysis of selected alternative routes and waiting times with the objective of minimizing total cost.</p>
Full article ">Figure 15
<p>Horizontal trajectory comparison. (<b>a</b>) Actual horizontal trajectories; (<b>b</b>) optimized horizontal trajectories.</p>
Full article ">Figure 16
<p>Vertical profile comparison. (<b>a</b>) Actual trajectory vertical profile; (<b>b</b>) optimized altitude profile.</p>
Full article ">Figure 17
<p>Fuel flow comparison of Aircraft 11. (<b>a</b>) Actual trajectory fuel profile; (<b>b</b>) optimized trajectory fuel profile.</p>
Full article ">Figure 18
<p>Comparison of fuel consumption of the 22 aircraft.</p>
Full article ">Figure 19
<p>The distribution of flight times under different numbers of arrival flights.</p>
Full article ">
18 pages, 2009 KiB  
Article
Convergence Rates of Partial Truncated Numerical Algorithm for Stochastic Age-Dependent Cooperative Lotka–Volterra System
by Mengqing Zhang, Quanxin Zhu and Jing Tian
Symmetry 2024, 16(12), 1659; https://doi.org/10.3390/sym16121659 - 15 Dec 2024
Viewed by 364
Abstract
We present a numerical algorithm for a stochastic age-dependent cooperative Lotka–Volterra system that incorporates a partially truncated function. Since it is challenging to obtain the real solution for this system, and traditional numerical algorithms often experience blow-up phenomena, we design a partially truncated [...] Read more.
We present a numerical algorithm for a stochastic age-dependent cooperative Lotka–Volterra system that incorporates a partially truncated function. Since it is challenging to obtain the real solution for this system, and traditional numerical algorithms often experience blow-up phenomena, we design a partially truncated algorithm to ensure the solution remains well behaved. We further establish the convergence of the algorithm and obtain its convergence order. Finally, numerical simulations are presented to demonstrate our theoretical findings. Full article
Show Figures

Figure 1

Figure 1
<p>The true solutions of species <math display="inline"><semantics> <mrow> <msub> <mo>Φ</mo> <mn>1</mn> </msub> <mrow> <mo>(</mo> <mi>t</mi> <mo>,</mo> <mi>a</mi> <mo>)</mo> </mrow> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mo>Φ</mo> <mn>2</mn> </msub> <mrow> <mo>(</mo> <mi>t</mi> <mo>,</mo> <mi>a</mi> <mo>)</mo> </mrow> </mrow> </semantics></math> in System (<a href="#FD1-symmetry-16-01659" class="html-disp-formula">1</a>).</p>
Full article ">Figure 2
<p>The PTEM numerical solutions of species in System (<a href="#FD1-symmetry-16-01659" class="html-disp-formula">1</a>).</p>
Full article ">Figure 3
<p>Vertical perspective and contour lines in System (<a href="#FD1-symmetry-16-01659" class="html-disp-formula">1</a>).</p>
Full article ">Figure 4
<p>The error simulation of species <math display="inline"><semantics> <mrow> <mi>ν</mi> <mo>(</mo> <mi>t</mi> <mo>,</mo> <mi>a</mi> <mo>)</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>(</mo> <mi>t</mi> <mo>,</mo> <mi>a</mi> <mo>)</mo> </mrow> </semantics></math> in System (<a href="#FD1-symmetry-16-01659" class="html-disp-formula">1</a>).</p>
Full article ">Figure 5
<p>The squared error simulation of species in System (<a href="#FD1-symmetry-16-01659" class="html-disp-formula">1</a>).</p>
Full article ">
34 pages, 936 KiB  
Article
Enhancing Group Consensus in Social Networks: A Two-Stage Dual-Fine Tuning Consensus Model Based on Adaptive Leiden Algorithm and Minority Opinion Management with Non-Cooperative Behaviors
by Tingyu Xu, Shiqi He, Xuechan Yuan and Chao Zhang
Electronics 2024, 13(24), 4930; https://doi.org/10.3390/electronics13244930 - 13 Dec 2024
Viewed by 434
Abstract
The rapid growth of the digital economy has significantly enhanced the convenience of information transmission while reducing its costs. As a result, the participation in social networks (SNs) has surged, intensifying the mutual influence among network participants. To support objective decision-making and gather [...] Read more.
The rapid growth of the digital economy has significantly enhanced the convenience of information transmission while reducing its costs. As a result, the participation in social networks (SNs) has surged, intensifying the mutual influence among network participants. To support objective decision-making and gather public opinions within SNs, the research on the consensus-reaching process (CRP) has become increasingly important. However, CRP faces three key challenges: first, as the number of decision-makers (DMs) increases, the efficiency of reaching consensus declines; second, minority opinions and non-cooperative behaviors affect decision outcomes; and third, the relationships among DMs complicate opinion adjustments. To address these challenges, this paper introduces an enhanced CRP mechanism. Initially, the hippopotamus optimization algorithm (HOA) is applied to update the initial community division in Leiden clustering, which accelerates the clustering process, collectively referred to as HOAL. Subsequently, a two-stage opinion adjustment method is proposed, combining minority opinion handling (MOH), non-cooperative behavior management, and dual-fine tuning (DFT) management, collectively referred to as DFT-MOH. Moreover, trust relationships between DMs are directly integrated into both the clustering and opinion management processes, resulting in the HOAL-DFT-MOH framework. The proposed method proceeds by three main steps: (1) First, the HOAL clusters DMs. (2) Then, in the initial CRP stage, DFT manages subgroup opinions with a weighted average to synthesize subgroup perspectives; and in the second stage, MOH addresses minority opinions, a non-cooperative mechanism manages uncooperative behaviors, and DFT is used when negative behaviors are absent. (3) Third, the prospect-regret theory is applied to rank decision alternatives. Finally, the approach is applied to case analyses across three different scenarios, while comparative experiments with other clustering and CRP methods highlight its superior performance. Full article
Show Figures

Figure 1

Figure 1
<p>Hippopotamus position updates across various phases.</p>
Full article ">Figure 2
<p>Implementation steps of Leiden clustering.</p>
Full article ">Figure 3
<p>Community division implementation flowchart.</p>
Full article ">Figure 4
<p>The flowchart of misconduct detection.</p>
Full article ">Figure 5
<p>Two-stage opinion adjustments flowchart.</p>
Full article ">Figure 6
<p>The flowchart of our method.</p>
Full article ">Figure 7
<p>Two-stage adjustment time statistics.</p>
Full article ">Figure 8
<p>The statistics of adjustment rounds in two stages.</p>
Full article ">
31 pages, 22621 KiB  
Article
A Ray-Tracing-Based Single-Site Localization Method for Non-Line-of-Sight Environments
by Shuo Hu, Lixin Guo and Zhongyu Liu
Sensors 2024, 24(24), 7925; https://doi.org/10.3390/s24247925 - 11 Dec 2024
Viewed by 350
Abstract
Localization accuracy in non-line-of-sight (NLOS) scenarios is often hindered by the complex nature of multipath propagation. Traditional approaches typically focus on NLOS node identification and error mitigation techniques. However, the intricacies of NLOS localization are intrinsically tied to propagation challenges. In this paper, [...] Read more.
Localization accuracy in non-line-of-sight (NLOS) scenarios is often hindered by the complex nature of multipath propagation. Traditional approaches typically focus on NLOS node identification and error mitigation techniques. However, the intricacies of NLOS localization are intrinsically tied to propagation challenges. In this paper, we propose a novel single-site localization method tailored for complex multipath NLOS environments, leveraging only angle-of-arrival (AOA) estimates in conjunction with a ray-tracing (RT) algorithm. The method transforms NLOS paths into equivalent line-of-sight (LOS) paths through the generation of generalized sources (GSs) via ray tracing. A novel weighting mechanism for GSs is introduced, which, when combined with an iteratively reweighted least squares (IRLS) estimator, significantly improves the localization accuracy of non-cooperative target sources. Furthermore, a multipath similarity displacement matrix (MSDM) is incorporated to enhance accuracy in regions with pronounced multipath fluctuations. Simulation results validate the efficacy of the proposed algorithm, achieving localization performance that approaches the Cramér–Rao lower bound (CRLB), even in challenging NLOS scenarios. Full article
Show Figures

Figure 1

Figure 1
<p>A flowchart of the proposed RT algorithm.</p>
Full article ">Figure 2
<p>Binary tree structure of ray nodes.</p>
Full article ">Figure 3
<p>Schematic diagram of ray-splitting structure. Red nodes indicate split nodes that will be deleted, while blue nodes represent newly generated split nodes.</p>
Full article ">Figure 4
<p>Schematic diagram of ray tube determination and reception. Red lines represent virtual ray tubes, while blue lines indicate the edge rays of the ray tube.</p>
Full article ">Figure 5
<p>An overview of the overall technical roadmap of the RT-LBS algorithm.</p>
Full article ">Figure 6
<p>Power measurement system architecture and key equipment. The <b>upper half</b> of the figure is the block diagram of the channel sounder used in this paper. The <b>lower half</b> is the key equipment of the sounder, including the signal generator, power amplifier, spectrum analyzer, power supplier, RTK, and antennas.</p>
Full article ">Figure 7
<p>Localization test system architecture and key equipment. The <b>upper half</b> of the figure is the block diagram of the localization test system used in this paper. The <b>lower half</b> is the key equipment in the signal transmitter system, UCA direction-finding equipment, the Rx antenna array, and the RF processing circuit.</p>
Full article ">Figure 8
<p>Measurement scenario. (<b>a</b>) The raw point cloud image of the measurement scenario. (<b>b</b>) The geometric building model extracted from the point cloud.</p>
Full article ">Figure 9
<p>Measurement path and power distribution at (<b>a</b>) 3 GHz frequency, (<b>b</b>) 3.6 GHz frequency, (<b>c</b>) 4 GHz frequency, (<b>d</b>) 5 GHz frequency, and (<b>e</b>) 5.9 GHz frequency.</p>
Full article ">Figure 10
<p>Raw power measurement data and power measurement data after applying the sliding filter at (<b>a</b>) 3 GHz frequency, (<b>b</b>) 3.6 GHz frequency, (<b>c</b>) 4 GHz frequency, (<b>d</b>) 5 GHz frequency, and (<b>e</b>) 5.9 GHz frequency.</p>
Full article ">Figure 11
<p>RSS predictions and measurements in the scenario at (<b>a</b>) 3 GHz frequency, (<b>b</b>) 3.6 GHz frequency, (<b>c</b>) 4 GHz frequency, (<b>d</b>) 5 GHz frequency, and (<b>e</b>) 5.9 GHz frequency. The basic RT method refers to the approach presented in [<a href="#B39-sensors-24-07925" class="html-bibr">39</a>].</p>
Full article ">Figure 12
<p>The angle measurement scenario and the positions of the NCTS (denoted by T1, T2, and T3) and sensor (denoted by R).</p>
Full article ">Figure 13
<p>The AOA spectrum measured for the source located at T1.</p>
Full article ">Figure 14
<p>The AOA spectrum measured for the source located at T2.</p>
Full article ">Figure 15
<p>The AOA spectrum measured for the source located at T3.</p>
Full article ">Figure 16
<p>Comparison between measured AS and simulated multipath at (<b>a</b>) T1 position, (<b>b</b>) T2 position, and (<b>c</b>) T3 position.</p>
Full article ">Figure 17
<p>NCTS and sensor positions and a geometrical map of the scenario. The line segments represent the multipath between the source and the sensor, distinguished using different colors.</p>
Full article ">Figure 18
<p>A comparison of the proposed localization algorithm’s accuracy with the CRLB. (<b>a</b>) The source at location A; (<b>b</b>) the source at location B; (<b>c</b>) the source at location C.</p>
Full article ">Figure 19
<p>Localization error at point A with different AOA and RSSD errors.</p>
Full article ">Figure 20
<p>Localization error at point B with different AOA and RSSD errors.</p>
Full article ">Figure 21
<p>Localization error at point C with different AOA and RSSD errors.</p>
Full article ">Figure 22
<p>MSD distribution at (<b>a</b>) 0.1° AOA error, (<b>b</b>) 0.5°AOA error, (<b>c</b>) 1°AOA error, (<b>d</b>) 2°AOA error, (<b>e</b>) 4°AOA error, and (<b>f</b>) 6°AOA error.</p>
Full article ">Figure 22 Cont.
<p>MSD distribution at (<b>a</b>) 0.1° AOA error, (<b>b</b>) 0.5°AOA error, (<b>c</b>) 1°AOA error, (<b>d</b>) 2°AOA error, (<b>e</b>) 4°AOA error, and (<b>f</b>) 6°AOA error.</p>
Full article ">Figure 23
<p>Schematic diagram of displacement compensation expansion method.</p>
Full article ">Figure 24
<p>Planar Localization Error Distribution with 0.1° AOA error. (<b>a</b>) Original localization algorithm; (<b>b</b>) localization algorithm with MSDM.</p>
Full article ">Figure 25
<p>Planar Localization Error Distribution with 0.5° AOA error. (<b>a</b>) Original localization algorithm; (<b>b</b>) localization algorithm with MSDM.</p>
Full article ">Figure 26
<p>Planar Localization Error Distribution with 1° AOA error. (<b>a</b>) Original localization algorithm; (<b>b</b>) localization algorithm with MSDM.</p>
Full article ">Figure 27
<p>Planar Localization Error Distribution with 2° AOA error. (<b>a</b>) Original localization algorithm; (<b>b</b>) localization algorithm with MSDM.</p>
Full article ">Figure 28
<p>Planar Localization Error Distribution with 4° AOA error. (<b>a</b>) Original localization algorithm; (<b>b</b>) localization algorithm with MSDM.</p>
Full article ">Figure 29
<p>Planar Localization Error Distribution with 6° AOA error. (<b>a</b>) Original localization algorithm; (<b>b</b>) localization algorithm with MSDM.</p>
Full article ">Figure 30
<p>Schematic diagram of GPU acceleration algorithm.</p>
Full article ">Figure 31
<p>Power coverage map.</p>
Full article ">Figure 32
<p>Efficiency comparison of different acceleration methods.</p>
Full article ">
21 pages, 596 KiB  
Article
Allocation Strategy Optimization Using Repulsion-Enhanced Quantum Particle Swarm Optimization for Multi-AUV Systems
by Changjian Lin, Dan Yu and Shibo Lin
J. Mar. Sci. Eng. 2024, 12(12), 2270; https://doi.org/10.3390/jmse12122270 - 10 Dec 2024
Viewed by 351
Abstract
In the context of multi-autonomous underwater vehicle (multi-AUV) operations, the target assignment is addressed as a multi-objective allocation (MOA) problem. The selection of strategy for multi-AUV target allocation is dependent on the current non-cooperative environment. This paper establishes a multi-AUV allocation situation advantage [...] Read more.
In the context of multi-autonomous underwater vehicle (multi-AUV) operations, the target assignment is addressed as a multi-objective allocation (MOA) problem. The selection of strategy for multi-AUV target allocation is dependent on the current non-cooperative environment. This paper establishes a multi-AUV allocation situation advantage evaluation system to assess and quantify the non-cooperative environment. Based on this framework, a multi-AUV target allocation model using a bi-matrix game theory is developed, where multi-AUV target allocation strategies are considered as part of the strategic framework within the game. The payoff matrix is constructed based on factors including the situational context of multi-AUV operations, effectiveness, and AUV operational integrity. The Nash equilibrium derived from the game analysis serves as the optimal solution for resource distribution in multi-AUV non-cooperative scenarios. To address the challenge of finding the Nash equilibrium in bi-matrix games, this paper introduces a repulsion process quantum particle swarm optimization (RPQPSO) algorithm. This method not only resolves the complexities of Nash equilibrium computation but also overcomes the limitations of traditional optimization methods that often converge to local optima. A simulation experiment of multi-AUV operations is designed to validate the multi-AUV target allocation model, demonstrating that the RPQPSO algorithm performs effectively and is applicable to multi-AUV task scenarios. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

Figure 1
<p>Antagonistic situation diagram.</p>
Full article ">Figure 2
<p>Multi-AUV confrontation initial situation diagram.</p>
Full article ">Figure 3
<p>Situation of red and blue AUVs before the second load assignment.</p>
Full article ">Figure 4
<p>Red target distribution.</p>
Full article ">Figure 5
<p>Blue target distribution.</p>
Full article ">Figure 6
<p>Algorithm performance comparison.</p>
Full article ">Figure 7
<p>Algorithm time comparison.</p>
Full article ">Figure 8
<p>Algorithm iteration times comparison.</p>
Full article ">Figure 9
<p>Algorithm optimization effect comparison.</p>
Full article ">
19 pages, 2670 KiB  
Article
Distributed Dispatch and Profit Allocation for Parks Using Co-Operative Game Theory and the Generalized Nash Bargaining Approach
by Hanwen Wang, Xiang Li, Haojun Hu and Yizhou Zhou
Energies 2024, 17(23), 6143; https://doi.org/10.3390/en17236143 - 5 Dec 2024
Viewed by 360
Abstract
To improve the regulatory capacity of distributed resources within the park and enhance the flexibility of market transactions, this paper introduces a distributed dispatch and profit allocation method grounded in cooperative game theory and the generalized Nash bargaining framework. Initially, models for individual [...] Read more.
To improve the regulatory capacity of distributed resources within the park and enhance the flexibility of market transactions, this paper introduces a distributed dispatch and profit allocation method grounded in cooperative game theory and the generalized Nash bargaining framework. Initially, models for individual park equipment are established. Subsequently, a distributed dispatch model is constructed, followed by the development of a profit allocation strategy based on contribution levels, using the generalized Nash bargaining method. The model is solved using the alternating direction method of multipliers. The results show that the proposed approach achieves fast convergence, optimizes resource sharing and mutual support within the park, lowers operational costs, ensures a fairer distribution of profits, and promotes increased cooperation among park entities. Full article
(This article belongs to the Section C: Energy Economics and Policy)
Show Figures

Figure 1

Figure 1
<p>Conceptual diagram of the park energy management system.</p>
Full article ">Figure 2
<p>Park market transaction framework.</p>
Full article ">Figure 3
<p>Solution flowchart.</p>
Full article ">Figure 4
<p>Predicted load and PV power of parks.</p>
Full article ">Figure 5
<p>Predicted load power and PV power values: (<b>a</b>) Park 1, (<b>b</b>) Park 2, and (<b>c</b>) Park 3.</p>
Full article ">Figure 6
<p>Energy trading between parks and the market operator across various cases.</p>
Full article ">Figure 7
<p>Results of electric energy interactions among parks.</p>
Full article ">Figure 8
<p>Variation in residuals.</p>
Full article ">Figure 9
<p>Cost variations in park alliances over iterations.</p>
Full article ">Figure 10
<p>Convergence analysis of the model with varying numbers of parks.</p>
Full article ">Figure A1
<p>Variation in residuals.</p>
Full article ">Figure A2
<p>Cost variations in park alliances over iterations.</p>
Full article ">
22 pages, 3483 KiB  
Article
A Flexible Framework for Decentralized Composite Optimization with Compressed Communication
by Zhongyi Chang, Zhen Zhang, Shaofu Yang and Jinde Cao
Fractal Fract. 2024, 8(12), 721; https://doi.org/10.3390/fractalfract8120721 - 5 Dec 2024
Viewed by 432
Abstract
This paper addresses the decentralized composite optimization problem, where a network of agents cooperatively minimize the sum of their local objective functions with non-differentiable terms. We propose a novel communication-efficient decentralized ADMM framework, termed as CE-DADMM, by combining the ADMM framework with the [...] Read more.
This paper addresses the decentralized composite optimization problem, where a network of agents cooperatively minimize the sum of their local objective functions with non-differentiable terms. We propose a novel communication-efficient decentralized ADMM framework, termed as CE-DADMM, by combining the ADMM framework with the three-point compressed (3PC) communication mechanism. This framework not only covers existing mainstream communication-efficient algorithms but also introduces a series of new algorithms. One of the key features of the CE-DADMM framework is its flexibility, allowing it to adapt to different communication and computation needs, balancing communication efficiency and computational overhead. Notably, when employing quasi-Newton updates, CE-DADMM becomes the first communication-efficient second-order algorithm based on compression that can efficiently handle composite optimization problems. Theoretical analysis shows that, even in the presence of compression errors, the proposed algorithm maintains exact linear convergence when the local objective functions are strongly convex. Finally, numerical experiments demonstrate the algorithm’s impressive communication efficiency. Full article
(This article belongs to the Section Optimization, Big Data, and AI/ML)
Show Figures

Figure 1

Figure 1
<p>Distribution of samples across agents for the a9a dataset (<b>left</b>) and ijcnn1 (<b>right</b>).</p>
Full article ">Figure 2
<p>Random communication graph of network with 10 agents.</p>
Full article ">Figure 3
<p>Performance comparison of distributed logistic regression the on a9a dataset: Plots of iteration number (<b>left</b>) and total communication bits (<b>right</b>) versus distance error.</p>
Full article ">Figure 4
<p>Performance comparison of distributed logistic regression the on ijcnn1 dataset: Plots of iteration number (<b>left</b>) and total communication bits (<b>right</b>) versus distance error.</p>
Full article ">Figure 5
<p>Performance comparison of distributed ridge regression on the a9a dataset: Plots of iteration number (<b>left</b>) and total communication bits (<b>right</b>) versus distance error.</p>
Full article ">Figure 6
<p>Performance comparison of distributed ridge regression on the ijcnn1 dataset: Plots of iteration number (<b>left</b>) and total communication bits (<b>right</b>) versus distance error.</p>
Full article ">Figure 7
<p>Performance comparison of distributed LASSO on the a9a dataset: Plots of iteration number (<b>left</b>) and total communication bits (<b>right</b>) versus distance error.</p>
Full article ">Figure 8
<p>Performance comparison of distributed LASSO on the ijcnn1 dataset: Plots of iteration number (<b>left</b>) and total communication bits (<b>right</b>) versus distance error.</p>
Full article ">
28 pages, 5225 KiB  
Article
MAARS: Multiagent Actor–Critic Approach for Resource Allocation and Network Slicing in Multiaccess Edge Computing
by Ducsun Lim and Inwhee Joe
Sensors 2024, 24(23), 7760; https://doi.org/10.3390/s24237760 - 4 Dec 2024
Viewed by 480
Abstract
This paper presents a novel algorithm to address resource allocation and network-slicing challenges in multiaccess edge computing (MEC) networks. Network slicing divides a physical network into virtual slices, each tailored to efficiently allocate resources and meet diverse service requirements. To maximize the completion [...] Read more.
This paper presents a novel algorithm to address resource allocation and network-slicing challenges in multiaccess edge computing (MEC) networks. Network slicing divides a physical network into virtual slices, each tailored to efficiently allocate resources and meet diverse service requirements. To maximize the completion rate of user-computing tasks within these slices, the problem is decomposed into two subproblems: efficient core-to-edge slicing (ECS) and autonomous resource slicing (ARS). ECS facilitates collaborative resource distribution through cooperation among edge servers, while ARS dynamically manages resources based on real-time network conditions. The proposed solution, a multiagent actor–critic resource scheduling (MAARS) algorithm, employs a reinforcement learning framework. Specifically, MAARS utilizes a multiagent deep deterministic policy gradient (MADDPG) for efficient resource distribution in ECS and a soft actor–critic (SAC) technique for robust real-time resource management in ARS. Simulation results demonstrate that MAARS outperforms benchmark algorithms, including heuristic-based, DQN-based, and A2C-based methods, in terms of task completion rates, resource utilization, and convergence speed. Thus, this study offers a scalable and efficient framework for resource optimization and network slicing in MEC networks, providing practical benefits for real-world deployments and setting a new performance benchmark in dynamic environments. Full article
(This article belongs to the Special Issue Sensing and Mobile Edge Computing)
Show Figures

Figure 1

Figure 1
<p>System architecture.</p>
Full article ">Figure 2
<p>Illustration of the MADDPG-based ECS algorithm.</p>
Full article ">Figure 3
<p>Task-completion ratio vs. arrival rate. RAM: resource-allocation management.</p>
Full article ">Figure 4
<p>Task-completion ratio vs. CPU frequency.</p>
Full article ">Figure 5
<p>Task-completion ratio vs. bandwidth.</p>
Full article ">Figure 6
<p>Reward values vs. number of iterations.</p>
Full article ">Figure 7
<p>Task-completion ratio vs. arrival rate.</p>
Full article ">Figure 8
<p>Task-completion ratio vs. CPU frequency.</p>
Full article ">Figure 9
<p>Task-completion ratio vs. bandwidth.</p>
Full article ">Figure 10
<p>Utility-function values vs. weight vectors.</p>
Full article ">Figure 11
<p>Loss ratio vs. number of iterations.</p>
Full article ">
22 pages, 7085 KiB  
Article
Multiple PUE Attack Detection in Cooperative Mobile Cognitive Radio Networks
by Ernesto Cadena Muñoz, Gustavo Chica Pedraza and Alexander Aponte Moreno
Future Internet 2024, 16(12), 456; https://doi.org/10.3390/fi16120456 - 4 Dec 2024
Viewed by 336
Abstract
The Mobile Cognitive Radio Network (MCRN) are an alternative to spectrum scarcity. However, like any network, it comes with security issues to analyze. One of the attacks to analyze is the Primary User Emulation (PUE) attack, which leads the system to give the [...] Read more.
The Mobile Cognitive Radio Network (MCRN) are an alternative to spectrum scarcity. However, like any network, it comes with security issues to analyze. One of the attacks to analyze is the Primary User Emulation (PUE) attack, which leads the system to give the attacker the service as a legitimate user and use the Primary Users’ (PUs) spectrum resources. This problem has been addressed from perspectives like arrival time, position detection, cooperative scenarios, and artificial intelligence techniques (AI). Nevertheless, it has been studied with one PUE attack at once. This paper implements a countermeasure that can be applied when several attacks simultaneously exist in a cooperative network. A deep neural network (DNN) is used with other techniques to determine the PUE’s existence and communicate it with other devices in the cooperative MCRN. An algorithm to detect and share detection information is applied, and the results show that the system can detect multiple PUE attacks with coordination between the secondary users (SUs). Scenarios are implemented on software-defined radio (SDR) with a cognitive protocol to protect the PU. The probability of detection (PD) is measured for some signal-to-noise ratio (SNR) values in the presence of one PUE or more in the network, which shows high detection values above 90% for an SNR of -7dB. A database is also created with the attackers’ data and shared with all the SUs. Full article
(This article belongs to the Special Issue AI and Security in 5G Cooperative Cognitive Radio Networks)
Show Figures

Figure 1

Figure 1
<p>PUE attack scenario (source: own).</p>
Full article ">Figure 2
<p>Model for multiple PUE attack detection.</p>
Full article ">Figure 3
<p>Example of global information shared by a base station.</p>
Full article ">Figure 4
<p>Deep artificial neural network [<a href="#B20-futureinternet-16-00456" class="html-bibr">20</a>].</p>
Full article ">Figure 5
<p>Example of the user’s position in the environment (source: own).</p>
Full article ">Figure 6
<p>Example of energy detection (source: own).</p>
Full article ">Figure 7
<p>SDR test bed platform.</p>
Full article ">Figure 8
<p>Mobile SDR device.</p>
Full article ">Figure 9
<p>Probability of detection vs. probability of false alarm results for AWGN channel (source: own).</p>
Full article ">Figure 10
<p>Probability of detection vs. probability of false alarm for CSS for SNR = −10 dB (source: own).</p>
Full article ">Figure 11
<p>Downlink signal without and with active signal (source: own).</p>
Full article ">Figure 12
<p>Uplink signal without and with active signal (source: own).</p>
Full article ">Figure 13
<p>Available networks with PUE screen in the mobile phone (source: own).</p>
Full article ">Figure 14
<p>Confusion matrix -10 dB (source: author).</p>
Full article ">Figure 15
<p>DNN results depend on the epoch size (source: own).</p>
Full article ">Figure 16
<p>DNN code in Keras and Python (source: own).</p>
Full article ">Figure 17
<p>Probability of detection of a PUE attack (source: own).</p>
Full article ">
27 pages, 6325 KiB  
Article
Handling Exponentially Growing Strategies in Spatial Cooperative Games: The Case of the European Union
by Mehmet Küçükmehmetoğlu, Yasin Fahjan and Muhammed Ziya Paköz
Algorithms 2024, 17(12), 554; https://doi.org/10.3390/a17120554 - 4 Dec 2024
Viewed by 373
Abstract
This paper introduces a comprehensive cooperative game theory framework to measure the significance of location and neighborhood relations in conjunction with the magnitude of players/parties. The significances of these relations are measured over the EU geography. In this case, there are (i) the [...] Read more.
This paper introduces a comprehensive cooperative game theory framework to measure the significance of location and neighborhood relations in conjunction with the magnitude of players/parties. The significances of these relations are measured over the EU geography. In this case, there are (i) the test of availability of a core solution that satisfies all associated parties/players; (ii) the measurement of players’/parties’ rational minimal and maximal return expectations from the grand coalition regarding their all individual and sub-group strategies and associated return rationalities; (iii) the determination of the critical players/parties in the grand coalition. The study’s main contributions are the provision of a methodology that identifies spatially/geographically critical players/parties and the design of an algorithm for handling exponentially growing strategies alongside increasing numbers of players/parties. In sum, a comprehensive cooperative game theory framework is introduced to measure the significance of location and neighborhood relations in conjunction with the magnitude of the players/parties. The case of the EU has revealed the union’s geographically critical countries, with Germany being found to be the most influential. Full article
(This article belongs to the Section Algorithms for Multidisciplinary Applications)
Show Figures

Figure 1

Figure 1
<p>An algorithm to eliminate redundant coalitions as well as the associated allocation constraints.</p>
Full article ">Figure 2
<p>Hypothetical three-player neighborhood design and the associated matrix [<a href="#B41-algorithms-17-00554" class="html-bibr">41</a>].</p>
Full article ">Figure 3
<p>Model III application with the core and maximized <span class="html-italic">X<sub>A</sub></span> (10<sup>3</sup>): (<b>a</b>) Tax is zero (<span class="html-italic">Z</span> = 0): (<b>b</b>) Tax is two thousand (<span class="html-italic">Z</span> = 2000) [<a href="#B41-algorithms-17-00554" class="html-bibr">41</a>].</p>
Full article ">Figure 4
<p>After tax (<span class="html-italic">Z</span>), the minimum expected individual benefits per unit base square meter area (<span class="html-italic">P_<sub>Min</sub>/P_<sub>Area</sub></span>) [<a href="#B41-algorithms-17-00554" class="html-bibr">41</a>].</p>
Full article ">Figure 5
<p>After tax (<span class="html-italic">Z</span>), the maximum expected individual benefits per unit base square meter area (<span class="html-italic">P_<sub>Max</sub>/P_<sub>Area</sub></span>) [<a href="#B41-algorithms-17-00554" class="html-bibr">41</a>].</p>
Full article ">Figure 6
<p>European Union countries and their neighborhood relations.</p>
Full article ">Figure 7
<p>After tax (<span class="html-italic">Z</span>), the minimum expected country benefits per unit GDP size (<span class="html-italic">X<sub>_Min</sub>/GDP_</span>)—Differentiated base GDP.</p>
Full article ">Figure 8
<p>After tax (<span class="html-italic">Z</span>), the maximum expected country benefits per unit GDP size (<span class="html-italic">X<sub>_Max</sub>/GDP_</span>)—Differentiated base GDP.</p>
Full article ">Figure 9
<p>After tax (<span class="html-italic">Z</span>), the minimum expected country benefits per unit GDP size (<span class="html-italic">X<sub>_Min</sub>/GDP_</span>)—Equal base GDP.</p>
Full article ">Figure 10
<p>After tax (<span class="html-italic">Z</span>), the maximum expected country benefits per unit GDP size (<span class="html-italic">X<sub>_Max</sub>/GDP_</span>)—Equal base GDP.</p>
Full article ">
Back to TopTop