81 research outputs found

    Optimal preventive strike strategy vs. optimal attack strategy in a defense-attack game

    Get PDF
    This paper analyzes an attack-defense game between one defender and one attacker. Among, the defender moves first and allocates its resources to three different methods: employing a preventive strike, founding false targets, and protecting its genuine object. The preventive strike may expose the genuine object, and different from previous literature, a false target may also be detected to be false. The attacker, observing the actions taken by the defender and allocating its resources to three methods: protecting its own base from the preventive strike, founding false bases, and attacking the defender's genuine object. Similarly, a false base may be correctly identified. Different from previous methods in evaluating the potential outcome, for each of the defender's given strategies, the attacker tries to maximize its cumulative prospect value considering different possible outcomes. Similarly, the defender maximizes its cumulative prospect value, assuming that the attacker chooses the strategy to maximize the attacker's cumulative prospect value. Numerical examples are presented to illustrate the optimal number of bases to attack by preventive strike, and the optimal number of targets to attack by attacker

    Energy Efficient Power Allocation for Distributed Antenna System over Shadowed Nakagami Fading Channel

    Get PDF
    In this paper, the energy efficiency (EE) of downlink distributed antenna system (DAS) with multiple receive antennas is investigated over composite fading channel that takes the path loss, shadow fading and Nakagami-m fading into account. Our aim is to maximize EE which is defined as the ratio of the transmission rate to the total consumed power under the constraints of maximum transmit power of each remote antenna. According to the definition of EE and using the upper bound of average EE, the optimized objective function is provided. Based on this, utilizing Karush-Kuhn-Tucker (KKT) conditions and mathematical derivation, a suboptimal energy efficient power allocation (PA) scheme is developed, and closed-form PA coefficients are obtained. The developed scheme has the EE performance close to the existing optimal scheme. Moreover, it has relatively lower complexity than the existing scheme because only the statistic channel information and less iteration are required. Besides, it includes the scheme in composite Rayleigh channel as a special case. Simulation results show the effectiveness of the developed scheme

    Direct relationship between levels of TNF-α expression and endothelial dysfunction in reperfusion injury

    Get PDF
    We previously found that myocardial ischemia/ reperfusion (I/R) initiates expression of tumor necrosis factor-α (TNF) leading to coronary endothelial dysfunction. However, it is not clear whether there is a direct relationship between levels of TNF expression and endothelial dysfunction in reperfusion injury. We studied levels of TNF expression by using different transgenic animals expressing varying amounts of TNF in I/R. We crossed TNF overexpression (TNF++/++) with TNF knockout (TNF-/-) mice; thus we have a heterozygote population of mice with the expression of TNF "in between" the TNF-/- and TNF++/++ mice. Mouse hearts were subjected to 30 min of global ischemia followed by 90 min of reperfusion and their vasoactivity before and after I/R was examined in wild type (WT), TNF-/-, TNF++/++ and TNF heterozygote (TNF -/++, cross between TNF-/- and TNF++/++) mice. In heterozygote TNF-/++ mice with intermediate cardiac-specific expression of TNF, acetyl-choline-induced or flow-induced endothelial-dependent vasodilation following I/R was between TNF++/++ and TNF-/- following I/R. Neutralizing antibodies to TNF administered immediately before the onset of reperfusion-preserved endothelial-dependent dilation following I/R in WT, TNF-/++ and TNF++/++ mice. In WT, TNF -/++ and TNF++/++ mice, I/R-induced endothelial dysfunction was progressively lessened by administration of free-radical scavenger TEMPOL immediately before initiating reperfusion. During I/R, production of superoxide (O2-) was greatest in TNF ++/++ mice as compared to WT, TNF-/++ and TNF -/- mice. Following I/R, arginase mRNA expression was elevated in the WT, substantially elevated in the TNF-/++ and TNF ++/++mice and not affected in the TNF-/- mice. These results suggest that the level of TNF expression determines arginase expression in endothelial cells during myocardial I/R, which is one of the mechanisms by which TNF compromises coronary endothelial function in reperfusion injury

    Optimal defence-attack strategies between one defender and two attackers

    Get PDF
    This paper analyses the optimal strategies for one defender and two attackers in a defence-attack game, where a) the defender allocates its resource into defending against and attacking the two attackers, and b) the two attackers, after observing the action of the defender, allocate their resources into attacking and defending against the defender, on either a cooperative or non-cooperative basis. On a cooperative basis, for each of the defender’s given strategies, the two attackers work together to maximise the sum of their cumulative prospect values while anticipating the eight possible game outcomes. On a non-cooperative basis, for each of the defender’s given strategies, each attacker simultaneously yet independently tries to maximise their own cumulative prospect value. In both cases, the defender maximises its cumulative prospect value while anticipating the attackers’ actions. Backward induction is employed to obtain the optimal defence and attack strategies for all scenarios. Numerical examples are performed to illustrate the applications of the strategies. In general, we find two opposing effects considering the attackers’ strategies and analyse the alteration of strategies for the participants under two different risk preferences: risk-averse and risk seeking. The reasons for the alteration are also performed to illustrate the practical applications

    Coordinated Formation Control for Intelligent and Connected Vehicles in Multiple Traffic Scenarios

    Full text link
    In this paper, a unified multi-vehicle formation control framework for Intelligent and Connected Vehicles (ICVs) that can apply to multiple traffic scenarios is proposed. In the one-dimensional scenario, different formation geometries are analyzed and the interlaced structure is mathematically modelized to improve driving safety while making full use of the lane capacity. The assignment problem for vehicles and target positions is solved using Hungarian Algorithm to improve the flexibility of the method in multiple scenarios. In the two-dimensional scenario, an improved virtual platoon method is proposed to transfer the complex two-dimensional passing problem to the one-dimensional formation control problem based on the idea of rotation projection. Besides, the vehicle regrouping method is proposed to connect the two scenarios. Simulation results prove that the proposed multi-vehicle formation control framework can apply to multiple typical scenarios and have better performance than existing methods

    Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets

    Get PDF
    This paper analyzes the optimal strategies for the attacker and the defender in an attack–defense game, considering the risk attitudes of both parties. The defender moves first, allocating its limited resources to three different measures: launching a proactive strike or preventive strike, building false targets, and protecting its genuine object. It is assumed that (a) launching a proactive strike has limited effectiveness on its rival and does not expose the genuine object itself, (b) a false target might be correctly identified as false, and (c) launching a preventive strike consumes less resources than a proactive strike and might expose the genuine object. The attacker moves after observing the defender's movements, allocating its limited resources to three measures: protecting its own base from a proactive strike or preventive strike, building false bases, and attacking the defender's genuine object. For each of the defender's given strategies, the attacker chooses the attack strategy that maximizes its cumulative prospect value, which accounts for the players’ risk attitudes. Similarly, the defender maximizes its cumulative prospect value by anticipating that the attacker will always choose the strategy combination that maximizes its own cumulative prospect value. Backward induction is used to obtain the optimal defense, attack strategies, and their corresponding cumulative prospect values. Our results show that the introduction of risk attitudes leads the game to a lose-lose situation under some circumstances and benefits one party in other cases
    • …
    corecore