212 research outputs found

    Learning the optimum as a Nash equilibrium

    Get PDF
    Cataloged from PDF version of article.This paper shows the computational benefits of a game theoretic approach to optimization of high dimensional control problems. A dynamic noncooperative game framework is adopted to partition the control space and to search the optimum as the equilibrium of a k-person dynamic game played by k-parallel genetic algorithms. When there are multiple inputs, we delegate control authority over a set of control variables exclusively to one player so that k artificially intelligent players explore and communicate to learn the global optimum as the Nash equilibrium. In the case of a single input, each player's decision authority becomes active on exclusive sets of dates-so that k GAs construct the optimal control trajectory as the equilibrium of evolving best-to-date responses. Sample problems are provided to demonstrate the gains in computational speed and accuracy. (C) 2000 Elsevier Science B.V. All rights reserved

    On-line Computation of Stackelberg Equilibria with Synchronous Parallel Genetic Algorithms

    Get PDF
    Cataloged from PDF version of article.This paper develops a method to compute the Stackelberg equilibria in sequential games. We construct a normal form game which is interactively played by an artificially intelligent leader, GAL, and a follower, GA(F). The leader is a genetic algorithm breeding a population of potential actions to better anticipate the follower's reaction. The follower is also a genetic algorithm training on-line a suitable neural network to evolve a population of rules to respond to any move in the leader's action space. When GAs repeatedly play this game updating each other synchronously, populations converge to the Stackelberg equilibrium of the sequential game. We provide numerical examples attesting to the efficiency of the algorithm. (C) 2002 Elsevier Science B.V. All rights reserved

    Economic growth, trade and environmental quality in a two-region world economy

    Get PDF
    Cataloged from PDF version of article.This paper examines the linkages between international trade, environmental degradation, and economic growth, in a dynamic North-South trade game. The North produces manufactured goods by employing capital, labor, and a natural resource that it imports from the South, using a neoclassical production function subject to an endogenously improving technology. The South extracts the resource using raw labor, in the process generating local pollution. Genetic algorithms (GA) are used to search for optimal policies in the presence of local pollution and technology spillovers from North to South. In the GA search for optimal regional policies, both noncooperative and cooperative modes of trade are considered. Noncooperative trade results in inefficiencies stemming from externalities. Though cooperative trade policies are efficient, they lack credibility. A joint maximization of the global welfare shows that transfer of technology is a viable route to improve world welfare

    Brain function assessment in different conscious states

    Get PDF
    Background: The study of brain functioning is a major challenge in neuroscience fields as human brain has a dynamic and ever changing information processing. Case is worsened with conditions where brain undergoes major changes in so-called different conscious states. Even though the exact definition of consciousness is a hard one, there are certain conditions where the descriptions have reached a consensus. The sleep and the anesthesia are different conditions which are separable from each other and also from wakefulness. The aim of our group has been to tackle the issue of brain functioning with setting up similar research conditions for these three conscious states.Methods: In order to achieve this goal we have designed an auditory stimulation battery with changing conditions to be recorded during a 40 channel EEG polygraph (Nuamps) session. The stimuli (modified mismatch, auditory evoked etc.) have been administered both in the operation room and the sleep lab via Embedded Interactive Stimulus Unit which was developed in our lab. The overall study has provided some results for three domains of consciousness. In order to be able to monitor the changes we have incorporated Bispectral Index Monitoring to both sleep and anesthesia conditions.Results: The first stage results have provided a basic understanding in these altered states such that auditory stimuli have been successfully processed in both light and deep sleep stages. The anesthesia provides a sudden change in brain responsiveness; therefore a dosage dependent anesthetic administration has proved to be useful. The auditory processing was exemplified targeting N1 wave, with a thorough analysis from spectrogram to sLORETA. The frequency components were observed to be shifting throughout the stages. The propofol administration and the deeper sleep stages both resulted in the decreasing of N1 component. The sLORETA revealed similar activity at BA7 in sleep (BIS 70) and target propofol concentration of 1.2 μg/mL.Conclusions: The current study utilized similar stimulation and recording system and incorporated BIS dependent values to validate a common approach to sleep and anesthesia. Accordingly the brain has a complex behavior pattern, dynamically changing its responsiveness in accordance with stimulations and states. © 2010 Ozgoren et al; licensee BioMed Central Ltd

    Italian guidelines for primary headaches: 2012 revised version

    Get PDF
    The first edition of the Italian diagnostic and therapeutic guidelines for primary headaches in adults was published in J Headache Pain 2(Suppl. 1):105–190 (2001). Ten years later, the guideline committee of the Italian Society for the Study of Headaches (SISC) decided it was time to update therapeutic guidelines. A literature search was carried out on Medline database, and all articles on primary headache treatments in English, German, French and Italian published from February 2001 to December 2011 were taken into account. Only randomized controlled trials (RCT) and meta-analyses were analysed for each drug. If RCT were lacking, open studies and case series were also examined. According to the previous edition, four levels of recommendation were defined on the basis of levels of evidence, scientific strength of evidence and clinical effectiveness. Recommendations for symptomatic and prophylactic treatment of migraine and cluster headache were therefore revised with respect to previous 2001 guidelines and a section was dedicated to non-pharmacological treatment. This article reports a summary of the revised version published in extenso in an Italian version

    A multivariant secure framework for smart mobile health application

    Get PDF
    This is an accepted manuscript of an article published by Wiley in Transactions on Emerging Telecommunications Technologies, available online: https://doi.org/10.1002/ett.3684 The accepted version of the publication may differ from the final published version.Wireless sensor network enables remote connectivity of technological devices such as smart mobile with the internet. Due to its low cost as well as easy availability of data sharing and accessing devices, the Internet of Things (IoT) has grown exponentially during the past few years. The availability of these devices plays a remarkable role in the new era of mHealth. In mHealth, the sensors generate enormous amounts of data and the context-aware computing has proven to collect and manage the data. The context aware computing is a new domain to be aware of context of involved devices. The context-aware computing is playing a very significant part in the development of smart mobile health applications to monitor the health of patients more efficiently. Security is one of the key challenges in IoT-based mHealth application development. The wireless nature of IoT devices motivates attackers to attack on application; these vulnerable attacks can be denial of service attack, sinkhole attack, and select forwarding attack. These attacks lead intruders to disrupt the application's functionality, data packet drops to malicious end and changes the route of data and forwards the data packet to other location. There is a need to timely detect and prevent these threats in mobile health applications. Existing work includes many security frameworks to secure the mobile health applications but all have some drawbacks. This paper presents existing frameworks, the impact of threats on applications, on information, and different security levels. From this line of research, we propose a security framework with two algorithms, ie, (i) patient priority autonomous call and (ii) location distance based switch, for mobile health applications and make a comparative analysis of the proposed framework with the existing ones.Published onlin
    corecore