Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Research on the Effects of the Most Used Market Power Mitigation Mechanisms Considering Different Market Environments

    Yangsheng Sun1, Zhihua Wang1, Gaoqin Wang2, Beibei Wang3,*

    Energy Engineering, Vol.119, No.6, pp. 2193-2210, 2022, DOI:10.32604/ee.2022.020943

    Abstract The market power mitigation method of the supply-side has become one of the key points affecting the stability of the electricity spot market. Different mitigation mechanisms are used in the current mature electricity markets of the world. However, the same market power mitigation mechanism shows different effects in different market environments. Every market operator in the world needs the most efficient way to mitigate market power. Considering that there is no relevant literature discussing the market power effects of different mitigation methods in detail, the mitigation effects need to be discussed and further researched. So, we analyze the effects of… More >

  • Open Access

    ARTICLE

    Research on Crowdsourcing Price Game Model in Crowd Sensing

    Weijin Jiang1,2, Xiaoliang Liu1,2,*, Dejia Shi1, Junpeng Chen1,2, Yongxia Sun1,2, Liang Guo3

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1769-1784, 2021, DOI:10.32604/cmc.2021.016609

    Abstract Crowd-Sensing is an innovative data acquisition method that combines the perception of mobile devices with the idea of crowdsourcing. It is a new application mode under the development of the Internet of Things. The perceptual data that mobile users can provide is limited. Multiple crowdsourcing parties will share this limited data, but the cost that the crowdsourcing party can pay is limited, and enough mobile users are needed to complete the perceptual task, making the group wisdom is really played. In this process, there is bound to be a game between the crowds and the mobile users. Most of the… More >

  • Open Access

    ARTICLE

    Dynamic Pricing Model of E-Commerce Platforms Based on Deep Reinforcement Learning

    Chunli Yin1,*, Jinglong Han2

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.1, pp. 291-307, 2021, DOI:10.32604/cmes.2021.014347

    Abstract With the continuous development of artificial intelligence technology, its application field has gradually expanded. To further apply the deep reinforcement learning technology to the field of dynamic pricing, we build an intelligent dynamic pricing system, introduce the reinforcement learning technology related to dynamic pricing, and introduce existing research on the number of suppliers (single supplier and multiple suppliers), environmental models, and selection algorithms. A two-period dynamic pricing game model is designed to assess the optimal pricing strategy for e-commerce platforms under two market conditions and two consumer participation conditions. The first step is to analyze the pricing strategies of e-commerce… More >

  • Open Access

    ARTICLE

    Privacy Protection Algorithm for the Internet of Vehicles Based on Local Differential Privacy and Game Model

    Wenxi Han1, 2, Mingzhi Cheng3, *, Min Lei1, 2, Hanwen Xu2, Yu Yang1, 2, Lei Qian4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1025-1038, 2020, DOI:10.32604/cmc.2020.09815

    Abstract In recent years, with the continuous advancement of the intelligent process of the Internet of Vehicles (IoV), the problem of privacy leakage in IoV has become increasingly prominent. The research on the privacy protection of the IoV has become the focus of the society. This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms, proposes a privacy protection system structure based on untrusted data collection server, and designs a vehicle location acquisition algorithm based on a local differential privacy and game model. The algorithm first meshes the road network space. Then, the dynamic… More >

  • Open Access

    ARTICLE

    Defense Strategies Against Network Attacks in Cyber-Physical Systems with Analysis Cost Constraint Based on Honeypot Game Model

    Wen Tian1, Xiaopeng Ji1,*, Weiwei Liu1, Guangjie Liu1, Rong Lin1,2, Jiangtao Zhai3, Yuewei Dai3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 193-211, 2019, DOI:10.32604/cmc.2019.05290

    Abstract Cyber-physical system (CPS) is an advanced system that integrats physical processes, computation and communication resources. The security of cyber-physical systems has become an active research area in recent years. In this paper, we focus on defensive strategies against network attacks in CPS. We introduce both low- and highinteraction honeypots into CPS as a security management tool deliberately designed to be probed, attacked and compromised. In addition, an analysis resource constraint is introduced for the purpose of optimizing defensive strategies against network attacks in CPS. We study the offensive and defensive interactions of CPS and model the offensive and defensive process… More >

Displaying 1-10 on page 1 of 5. Per Page