期刊文献+
共找到272篇文章
< 1 2 14 >
每页显示 20 50 100
Privacy Preserving Federated Anomaly Detection in IoT Edge Computing Using Bayesian Game Reinforcement Learning
1
作者 Fatima Asiri Wajdan Al Malwi +4 位作者 Fahad Masood Mohammed S.Alshehri Tamara Zhukabayeva Syed Aziz Shah Jawad Ahmad 《Computers, Materials & Continua》 2025年第8期3943-3960,共18页
Edge computing(EC)combined with the Internet of Things(IoT)provides a scalable and efficient solution for smart homes.Therapid proliferation of IoT devices poses real-time data processing and security challenges.EC ha... Edge computing(EC)combined with the Internet of Things(IoT)provides a scalable and efficient solution for smart homes.Therapid proliferation of IoT devices poses real-time data processing and security challenges.EC has become a transformative paradigm for addressing these challenges,particularly in intrusion detection and anomaly mitigation.The widespread connectivity of IoT edge networks has exposed them to various security threats,necessitating robust strategies to detect malicious activities.This research presents a privacy-preserving federated anomaly detection framework combined with Bayesian game theory(BGT)and double deep Q-learning(DDQL).The proposed framework integrates BGT to model attacker and defender interactions for dynamic threat level adaptation and resource availability.It also models a strategic layout between attackers and defenders that takes into account uncertainty.DDQL is incorporated to optimize decision-making and aids in learning optimal defense policies at the edge,thereby ensuring policy and decision optimization.Federated learning(FL)enables decentralized and unshared anomaly detection for sensitive data between devices.Data collection has been performed from various sensors in a real-time EC-IoT network to identify irregularities that occurred due to different attacks.The results reveal that the proposed model achieves high detection accuracy of up to 98%while maintaining low resource consumption.This study demonstrates the synergy between game theory and FL to strengthen anomaly detection in EC-IoT networks. 展开更多
关键词 IOT edge computing smart homes anomaly detection bayesian game theory reinforcement learning
在线阅读 下载PDF
One-Time Rational Secret Sharing Scheme Based on Bayesian Game 被引量:8
2
作者 TIAN Youliang MA Jianfeng +2 位作者 PENG Changgen CHEN Xi JI Wenjiang 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期430-434,共5页
The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-... The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-out-of-2 rational secret sharing based on Bayesian game and considering different classes of protocol parties, we propose a 2-out-of-2 secret sharing scheme to solve cooperative problem of a rational secret sharing scheme being played only once. Moreover, we prove that the strategy is a perfect Bayesian equilibrium, adopted only by the parties in their decision-making according to their belief system (denoted by the probability distribution) and Bayes rule, without requiring simultaneous channels. 展开更多
关键词 rational secret sharing one-time rational secret sharing bayesian game perfect bayesian equilibrium
原文传递
Clustering routing algorithm of wireless sensor networks based on Bayesian game 被引量:9
3
作者 Gengzhong Zheng Sanyang Liu Xiaogang Qi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第1期154-159,共6页
To avoid uneven energy consuming in wireless sen- sor networks, a clustering routing model is proposed based on a Bayesian game. In the model, Harsanyi transformation is introduced to convert a static game of incomple... To avoid uneven energy consuming in wireless sen- sor networks, a clustering routing model is proposed based on a Bayesian game. In the model, Harsanyi transformation is introduced to convert a static game of incomplete information to the static game of complete but imperfect information. In addition, the existence of Bayesian nash equilibrium is proved. A clustering routing algorithm is also designed according to the proposed model, both cluster head distribution and residual energy are considered in the design of the algorithm. Simulation results show that the algorithm can balance network load, save energy and prolong network lifetime effectively. 展开更多
关键词 wireless sensor networks (WSNs) clustering routing bayesian game energy efficiency.
在线阅读 下载PDF
Learning implicit information in Bayesian games with knowledge transfer 被引量:1
4
作者 Guanpu CHEN Kai CAO Yiguang HONG 《Control Theory and Technology》 EI CSCD 2020年第3期315-323,共9页
In this paper,we consider to learn the inherent probability distribution of types via knowledge transfer in a two-player repeated Bayesian game,which is a basic model in network security.In the Bayesian game,the attac... In this paper,we consider to learn the inherent probability distribution of types via knowledge transfer in a two-player repeated Bayesian game,which is a basic model in network security.In the Bayesian game,the attacker's distribution of types is unknown by the defender and the defender aims to reconstruct the distribution with historical actions.lt is dificult to calculate the distribution of types directly since the distribution is coupled with a prediction function of the attacker in the game model.Thus,we seek help from an interrelated complete-information game,based on the idea of transfer learning.We provide two different methods to estimate the prediction function in difftrent concrete conditions with knowledge transfer.After obtaining the estimated prediction function,the deiender can decouple the inherent distribution and the prediction function in the Bayesian game,and moreover,reconstruct the distribution of the attacker's types.Finally,we give numerical examples to illustrate the effectiveness of our methods. 展开更多
关键词 bayesian game repeated game knowledge transfer SECURITY
原文传递
V2V Energy Trading Considering User Satisfaction under Low-Carbon Objectives via Bayesian Game 被引量:1
5
作者 Yue Yu Yu Liu +1 位作者 Xiang Feng Huaichao Wen 《Journal of Power and Energy Engineering》 2023年第12期15-35,共21页
In response to the additional load impact caused by the integration of electric vehicles (EVs) into the grid or microgrids (MGs), as well as the issue of low responsiveness of EV users during vehicle-to-vehicle (V2V) ... In response to the additional load impact caused by the integration of electric vehicles (EVs) into the grid or microgrids (MGs), as well as the issue of low responsiveness of EV users during vehicle-to-vehicle (V2V) power exchange processes, this paper explores a multi-party energy trading model considering user responsiveness under low carbon goals. The model takes into account the stochastic charging and discharging characteristics of EVs, user satisfaction, and energy exchange costs, and formulates utility functions for participating entities. This transforms the competition in multi-party energy trading into a Bayesian game problem, which is subsequently resolved. Furthermore, this paper primarily employs sensitivity analysis to evaluate the impact of multi-party energy trading on user responsiveness and green energy utilization, with the aim of promoting incentives in the electricity trading market and aligning with low-carbon requirements. Finally, through case simulations, the effectiveness of this model for the considered scenarios is demonstrated. 展开更多
关键词 Multi Electric Vehicles Multi Microgrid Energy Trading bayesian game Multi Party game Network Constraints
在线阅读 下载PDF
IoT Security Situational Awareness Based on Q-Learning and Bayesian Game
6
作者 Yang Li Tianying Liu +1 位作者 Jianming Zhu Xiuli Wang 《国际计算机前沿大会会议论文集》 2021年第2期190-203,共14页
IoT security is very crucial to IoT applications,and security situational awareness can assess the overall security status of the IoT.Traditional situational awareness methods only consider the unilateral impact of at... IoT security is very crucial to IoT applications,and security situational awareness can assess the overall security status of the IoT.Traditional situational awareness methods only consider the unilateral impact of attack or defense,but lackconsideration of joint actions by both parties.Applying gametheory to security situational awareness can measure the impact of the opposition and interdependence of the offensive and defensive parties.This paper proposes an IoT security situational awareness method based on Q-Learning and Bayesian game.Through Q-Learning update,the long-term benefits of action strategies in specific states were obtained,and static Bayesian game methods were used to solve the Bayesian Nash Equilibrium of participants of different types.The proposed method comprehensively considers offensive and defensive actions,obtains optimal defense decisions in multi-state and multi-type situations,and evaluates security situation.Experimental results prove the effectiveness of this method. 展开更多
关键词 IoT security Q-LEARNING bayesian game
原文传递
Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks
7
作者 Hua Wei Hao Sun 《International Journal of Communications, Network and System Sciences》 2010年第7期602-607,共6页
Wireless ad ho network is becoming a new research fronter, in which security is an important issue. Usually some nodes act maliciously and they are able to do different kinds of Denial of Service (Dos). Because of the... Wireless ad ho network is becoming a new research fronter, in which security is an important issue. Usually some nodes act maliciously and they are able to do different kinds of Denial of Service (Dos). Because of the limited resource, intrusion detection system (IDS) runs all the time to detect intrusion of the attacker which is a costly overhead. In our model, we use game theory to model the interactions between the intrusion detection system and the attacker, and a realistic model is given by using Bayesian game. We solve the game by finding the Bayesian Nash equilibrium. The results of our analysis show that the IDS could work intermittently without compromising on its effectiveness. At the end of this paper, we provide an experiment to verify the rationality and effectiveness of the proposed model. 展开更多
关键词 Wireless Ad HOC Networks game Theory INTRUSION Detection System bayesian NASH EQUILIBRIUM
在线阅读 下载PDF
Optimization of a Bayesian game for Peer-to-Peer trading among prosumers under incomplete information via a CNN-LSTM-ATT
8
作者 Hongjie Jia Wanxin Tang +4 位作者 Xiaolong Jin Yunfei Mu Dengxin Ai Xiaodan Yu Wei Wei 《Energy and AI》 2024年第4期550-561,共12页
In modern low-carbon industrial parks,various distributed renewable energy resources are employed to fulfill production needs.Despite the growing capacity of renewable energy generation,a significant portion of the po... In modern low-carbon industrial parks,various distributed renewable energy resources are employed to fulfill production needs.Despite the growing capacity of renewable energy generation,a significant portion of the power produced by these renewable resources remains unconsumed,resulting in a waste of resources.Within an industrial park,microgrids that both generate and consume energy resources act as energy prosumers.Peer-topeer(P2P)trading provides an efficient means of utilizing renewable energy among these energy prosumers,who possess both power generation and consumption capabilities.However,within the current market mechanism,each prosumer retains private information that is not disclosed on the network.To address the issue of incomplete information among multiple prosumers during the decision-making process,we develop a Bayesian game model based on the CNN-LSTM-ATT prediction method for P2P electricity transactions among multiple prosumers.The energy prosumers in each industrial park aim to minimize their energy consumption costs by adjusting strategies that include P2P energy trading and managing thermal loads.Prosumers make decisions on the basis of their own characteristics and estimates of other prosumer characteristics,which are obtained from the joint probability distribution predicted by the CNN-LSTM-ATT method.These decisions are aimed at mini-mizing each prosumer’s electricity costs.The simulation results demonstrate the effectiveness of the Bayesian game model proposed in this study. 展开更多
关键词 bayesian game Electricity energy price forecasting Peer-to-peer transaction Renewable energy consumption Thermal dynamics
在线阅读 下载PDF
A Bayesian Game Approach for Demand Response Management Considering Incomplete Information 被引量:6
9
作者 Xiaofeng Liu Difei Tang Zhicheng Dai 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2022年第2期492-501,共10页
Residential flexible resource is attracting much attention in demand response(DR)for peak load shifting.This paper proposes a scenario for multi-stage DR project to schedule energy consumption of residential communiti... Residential flexible resource is attracting much attention in demand response(DR)for peak load shifting.This paper proposes a scenario for multi-stage DR project to schedule energy consumption of residential communities considering the incomplete information.Communities in the scenario can decide whether to participate in DR in each stage,but the decision is the private information that is unknown to other communities.To optimize the energy consumption,a Bayesian game approach is formulated,in which the probability characteristic of the decision-making of residential communities is described with Markov chain considering human behavior of bounded rationality.Simulation results show that the proposed approach can benefit all residential communities and power grid,but the optimization effect is slightly inferior to that in complete information game approach. 展开更多
关键词 Demand response(DR) bayesian game energy consumption scheduling Markov chain.
原文传递
HYPERGAMES AND BAYESIAN GAMES:A THEORETICAL COMPARISON OF THE MODELS OF GAMES WITH INCOMPLETE INFORMATION 被引量:1
10
作者 Yasuo SASAKI Kyoichi KIJIMA 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2012年第4期720-735,共16页
The present study discusses the relationships between two independently developed models of games with incomplete information, hypergames (Bennett, 1977) and Bayesian games (Harsanyi, 1967). The authors first show... The present study discusses the relationships between two independently developed models of games with incomplete information, hypergames (Bennett, 1977) and Bayesian games (Harsanyi, 1967). The authors first show that any hypergame can naturally be reformulated in terms of Bayesian games in an unified way. The transformation procedure is called Bayesian representation of hypergame. The authors then prove that some equilibrium concepts defined for hypergames are in a sense equivalent to those for Bayesian games. Furthermore, the authors discuss carefully based on the proposed analysis how each model should be used according to the analyzer's purpose. 展开更多
关键词 bayesian game bayesian representations of hypergame hypergame incomplete information."
原文传递
Hierarchical Hypergames and Bayesian Games:A Generalization of the Theoretical Comparison of Hypergames and Bayesian Games Considering Hierarchy of Perceptions 被引量:2
11
作者 SASAKI Yasuo KIJIMA Kyoichi 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2016年第1期187-201,共15页
This paper discusses the relationship of two independently developed models of games with incomplete information,hierarchical hypergames and Bayesian games.It can be considered as a generalization of the previous stud... This paper discusses the relationship of two independently developed models of games with incomplete information,hierarchical hypergames and Bayesian games.It can be considered as a generalization of the previous study on the theoretical comparison of simple hypergames and Bayesian games(Sasaki and Kijima,2012) by taking into account hierarchy of perceptions,i.e.,an agent's perception about the other agents' perceptions,and so on.The authors first introduce the general way of transformation of any hierarchical hypergames into corresponding Bayesian games,which was called as the Bayesian representation of hierarchical hypergames.The authors then show that some equilibrium concepts for hierarchical hypergames can be associated with those for Bayesian games and discuss implications of the results. 展开更多
关键词 bayesian games game theory hierarchy of perceptions hypergames incomplete information
原文传递
The impact of honesty and trickery on a Bayesian quantum prisoners’ dilemma game
12
作者 Bo-Yang Liu Xin Zhao +4 位作者 Hong-Yi Dai Ming Zhang Ying Liao Xiao-Feng Guo Wei Gao 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第7期221-227,共7页
To explore the influence of quantum information on the common social problem of honesty and trickery,we propose a Bayesian model for the quantum prisoners’dilemma game.In this model,the players’strategy formation is... To explore the influence of quantum information on the common social problem of honesty and trickery,we propose a Bayesian model for the quantum prisoners’dilemma game.In this model,the players’strategy formation is regarded as a negotiation of their move contract based on their types of decision policies,honesty or trickery.Although the implementation of quantum information cannot eliminate tricky players,players in our model can always end up with higher payoffs than in the classical game.For a good proportion of a credibility parameter value,a rational player will take an honest action,which is in remarkable contrast to the observation that players tend to defect in the classical prisoners’dilemma game.This research suggests that honesty will be promoted to enhance cooperation with the assistance of quantum information resources. 展开更多
关键词 quantum game bayesian game quantum contract
原文传递
基于Bayesian-Stackelberg博弈的无人机抗干扰通信功率控制方法
13
作者 宋海伟 苏哲 +3 位作者 田达 魏阳杰 高阳 刘东 《航天电子对抗》 2024年第6期25-28,共4页
在非合作环境下开展了无人机功率控制问题的研究,考虑到无人机与干扰源的对抗竞争关系,假设无人机作为领导者选择功率策略首先进行行动,干扰源作为跟随者感知到无人机行为后选择干扰功率策略。此外,由于无人机获知干扰源信息的不完全性... 在非合作环境下开展了无人机功率控制问题的研究,考虑到无人机与干扰源的对抗竞争关系,假设无人机作为领导者选择功率策略首先进行行动,干扰源作为跟随者感知到无人机行为后选择干扰功率策略。此外,由于无人机获知干扰源信息的不完全性,提出Bayesian-Stackelberg博弈模型来刻画二者对抗行为,并进一步提出分层Q学习算法求解博弈均衡解,以实现无人机功率控制方案的稳定收敛。最后,仿真实验验证了所提方法的有效性。 展开更多
关键词 功率控制 Q学习 bayesian-Stackelberg
在线阅读 下载PDF
基于动态贝叶斯博弈的工业控制网络恶意接入检测研究 被引量:1
14
作者 刘浩含 陈泽茂 《计算机科学》 北大核心 2025年第1期383-392,共10页
针对工业控制网络(Industrial Control Network, ICN)远程接入场景下未经授权访问、拒绝服务攻击、欺骗攻击以及信息披露等安全问题,通过STRIDE威胁建模方法对该场景下的潜在威胁进行分析,提出一种基于动态贝叶斯博弈的接入检测框架。... 针对工业控制网络(Industrial Control Network, ICN)远程接入场景下未经授权访问、拒绝服务攻击、欺骗攻击以及信息披露等安全问题,通过STRIDE威胁建模方法对该场景下的潜在威胁进行分析,提出一种基于动态贝叶斯博弈的接入检测框架。该方法能够将试图接入ICN的非法、恶意请求筛选出来并阻断,同时利用持续进行的多轮博弈迭代以及SDN灵活动态的特性对策略参数进行实时调整,以防止相同恶意接入源的再次访问。仿真实验结果表明,随着博弈轮数的增加,相比于现有的两类恶意接入防御方法,该框架的检测准确性提升了3%以上,假阳性比例下降了1.2%以上,检测效率提升了14.7%以上,且具有较好的鲁棒性。 展开更多
关键词 工业控制网络 软件定义网络 动态贝叶斯博弈 恶意接入检测
在线阅读 下载PDF
基于马尔可夫博弈与多智能体强化学习的云原生移动目标防御决策方法
15
作者 耿致远 张恒巍 +1 位作者 谭晶磊 齐高鑫 《通信学报》 北大核心 2025年第9期141-152,共12页
随着云原生网络中攻击者的类型多样化与行为智能化趋势加剧,传统移动目标防御方法难以应对攻击者类型分布未知的情形。基于贝叶斯马尔可夫博弈模型对云原生攻防场景进行建模,结合独立多智能体强化学习方法,实现了信息不对称条件下的移... 随着云原生网络中攻击者的类型多样化与行为智能化趋势加剧,传统移动目标防御方法难以应对攻击者类型分布未知的情形。基于贝叶斯马尔可夫博弈模型对云原生攻防场景进行建模,结合独立多智能体强化学习方法,实现了信息不对称条件下的移动目标防御智能决策。首先,分析了云原生网络环境中移动目标防御的攻防过程,针对攻防双方的不完全信息特征,将攻击类型分布未知的防御决策问题构建为贝叶斯马尔可夫博弈模型。其次,从网络攻防对抗实际出发,针对攻击者和防御者具有同等或不同智能程度的情况,设计了基于独立近端策略优化的配置转换决策算法。最后,通过实验验证了所提模型和方法能够有效应对攻击类型未知的云原生网络攻防场景,相较其他强化学习决策方法具有显著优势。 展开更多
关键词 云原生 移动目标防御 贝叶斯马尔可夫博弈 独立近端策略优化 最优策略选取
在线阅读 下载PDF
有限理性下的公司定价策略 被引量:1
16
作者 李淑嘉 郭永江 《哈尔滨商业大学学报(自然科学版)》 2025年第4期480-488,502,共10页
研究单一产品垄断企业面对有限理性顾客时的最优定价问题,利用顾客无法准确估计产品预期质量的模型来捕获有限理性.同时从利润最大化企业的角度来考察有限理性的影响,在具有最优价格的完全信息下,有限理性较低时会导致公司收益损失,有... 研究单一产品垄断企业面对有限理性顾客时的最优定价问题,利用顾客无法准确估计产品预期质量的模型来捕获有限理性.同时从利润最大化企业的角度来考察有限理性的影响,在具有最优价格的完全信息下,有限理性较低时会导致公司收益损失,有限理性水平较高时对公司收益没有产生影响.另外,假设公司可以通过价格向顾客表明产品的质量,从而制定了公司战略定价信号博弈的贝叶斯均衡.进一步考虑了顾客异质以及顾客完全不了解产品预期质量两种情况. 展开更多
关键词 最优定价 有限理性 购买概率 信号博弈 贝叶斯劝说 顾客异质
在线阅读 下载PDF
基于贝叶斯博弈的网联自主车辆跟驰行为建模
17
作者 陈意成 王韬 +2 位作者 杨宇翔 邵德栋 曲大义 《青岛理工大学学报》 2025年第3期133-140,共8页
伴随高级驾驶辅助技术的日益成熟,网联自主车辆可以精确地感知复杂交通场景,并自主做出驾驶行为决策,但如何使网联车辆自主做出符合驾驶员习惯风格的行为决策,尚需深度挖掘制约自主决策行为的内在机理。博弈论作为科学有效的理论工具,... 伴随高级驾驶辅助技术的日益成熟,网联自主车辆可以精确地感知复杂交通场景,并自主做出驾驶行为决策,但如何使网联车辆自主做出符合驾驶员习惯风格的行为决策,尚需深度挖掘制约自主决策行为的内在机理。博弈论作为科学有效的理论工具,合理分析行为策略的相互依存关系,可直观解析驾驶员的决策过程;基于贝叶斯博弈理论,分析驾驶员决策机理,结合加速度与安全裕度效用函数,优化智能驾驶员模型(IDM),建立贝叶斯博弈跟驰模型。采用CitySim数据集的车辆运行数据,使用深度学习方法对模型进行校准,运用SUMO软件对建立的模型进行有效性验证分析。结果显示,贝叶斯博弈跟驰模型所模拟的微观交互行为符合人类驾驶员的驾驶习惯,可识别驾驶员的驾驶行为风格并模仿,在一定程度上提高了驾驶的安全性;在宏观角度可以重现单车道与多车道的交通流波动演变,保障未来网联环境中自主驾驶车辆队列的稳态运行,从而提高交通容量和交通效率。 展开更多
关键词 网联自主车辆 驾驶风格 交互关系 贝叶斯博弈 深度学习
在线阅读 下载PDF
基于熵变博弈-贝叶斯网络的川藏线交通安全主要影响因素研究
18
作者 李世中 代谨樯 +2 位作者 余海兵 申晨明 王辛岩 《汽车实用技术》 2025年第10期164-170,共7页
文章旨在识别川藏线交通安全的主要影响因素,为改善该线路交通安全状况、降低交通事故发生率提供科学依据。以川藏线G317那曲段作为研究对象,对其道路交通事故发生的主要因素进行筛选,采用熵权-变异系数-博弈组合法对引发事故的重要因... 文章旨在识别川藏线交通安全的主要影响因素,为改善该线路交通安全状况、降低交通事故发生率提供科学依据。以川藏线G317那曲段作为研究对象,对其道路交通事故发生的主要因素进行筛选,采用熵权-变异系数-博弈组合法对引发事故的重要因素进行权重计算分析,继而采用贝叶斯网络分析法对道路风险程度进行划分,并以此对川藏线那曲段道路进行安全风险评价。结果表明,该区域的道路安全等级偏低,4大子系统中人为因素和环境因素为重要影响因素,疲劳驾驶和天气因素是影响道路安全的重要因子。由此可见,在川藏线那曲段的交通安全管理中,应重点针对人为因素和环境因素制定相应措施。针对人为因素,应加强对驾驶员疲劳驾驶的监管,确保驾驶员有足够的休息,以减少疲劳驾驶现象;针对环境因素,需建立完善的天气监测和预警系统。同时,在恶劣天气条件下及时采取交通管制措施或向驾驶员发布路况信息,引导其安全驾驶,从而提升交通安全水平,降低事故发生率。 展开更多
关键词 道路安全评价 评价因子 变异系数 博弈组合法 贝叶斯网络分析法
在线阅读 下载PDF
基于博弈论组合赋权-贝叶斯网络的装配式建筑施工风险评估研究
19
作者 张宇航 《重庆科技大学学报(自然科学版)》 2025年第4期29-39,共11页
研究装配式建筑的施工风险评估方法,提出基于博弈论组合赋权-贝叶斯网络的融合模型,以解决传统评估方法的指标权重赋值不合理问题。构建基于博弈论组合赋权的贝叶斯网络技术路线,并通过文献研究确定人为因素、环境因素、管理因素、设备... 研究装配式建筑的施工风险评估方法,提出基于博弈论组合赋权-贝叶斯网络的融合模型,以解决传统评估方法的指标权重赋值不合理问题。构建基于博弈论组合赋权的贝叶斯网络技术路线,并通过文献研究确定人为因素、环境因素、管理因素、设备因素4个维度的风险因素。分别运用层次分析法、熵权法确定主观权重和客观权重,再通过博弈论组合赋权得到综合权重。以广东省某人才保障房项目为例,搭建包含2组评价指标的评价体系,通过贝叶斯网络分析计算各因素总权重与二级指标条件概率,通过正逆向推理及敏感性分析确定关键风险因素。研究结果显示,该模型可揭示动态风险传导机制,对高发风险的预测能力及对极端工况的敏感性更强。 展开更多
关键词 装配式建筑 熵权法 层次分析法 博弈论 贝叶斯网络
在线阅读 下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部