Dear Editor,This letter addresses the Nash equilibrium seeking problem for games with second-order players subject to unknown input deadzones and denial-of-service(DoS)attacks.By using ideas from the digital twin,a di...Dear Editor,This letter addresses the Nash equilibrium seeking problem for games with second-order players subject to unknown input deadzones and denial-of-service(DoS)attacks.By using ideas from the digital twin,a distributed Nash equilibrium seeking strategy is proposed.In the proposed strategy,the twin players are designed to be second-order integrators,based on which a distributed control law is provided so as to find the Nash equilibrium under DoS attacks.Moreover,adaptive control laws and sliding mode control laws are synthesized for the actual players such that they can track the twin players under unknown input dead-zones.Theoretical investigations show that the proposed strategy is effective to drive the actions of actual players to the Nash equilibrium under the given conditions.A numerical example is provided to verify the effectiveness of the proposed strategy.展开更多
The developing market of information technologies i s the most dynamical and thriving business in the modern world. The law of supply and demand establishes repeating, steady cause and effect relation between three ec...The developing market of information technologies i s the most dynamical and thriving business in the modern world. The law of supply and demand establishes repeating, steady cause and effect relation between three economic phenomena-price, supply and demand. Demand is an ideal need and a real opportunity of the customer to buy the goods. Supply is an ideal readiness and a real opportunity of the commodity producer to put the goods on the market . A plethora of factors affect the supply and demand. There is inverse dependenc e between the market price of the goods and the quantity which is in the demand. There is direct dependence between the market price of the goods and the qu antity which is offered to the buyer. The following features distinguish the sof tware from the usual goods in the consumer market: high science intensity, simpl icity of replicating, relative simplicity of modification and updating, high req uirements to quality of the software, at sale the buyer gets it, but it does no t disappear in sale, there is no physical deterioration, but there is a fast ob solescence. To protect the programs against the non-authorized access (the copy ings and operation) technical and legal methods are used: the patent protection, status of industrial secret, license agreements.展开更多
For years, rumors have circulated that the code for the original DOS operating system created by Microsoft for the IBM personal computer is actually copied from the CP/M operating system developed by Digital Research ...For years, rumors have circulated that the code for the original DOS operating system created by Microsoft for the IBM personal computer is actually copied from the CP/M operating system developed by Digital Research Incorporated. In this paper, scientifically tested and accepted forensic analysis mathematical techniques, step-by-step processes, and advanced software code comparison tools are used to compare early versions of the two code bases. The conclusion is reached that no copying of code takes place1.展开更多
基金supported by the National Natural Science Foundation of China(NSFC)(62222308,62173181,62221004)the Natural Science Foundation and Maojiao Ye of Jiangsu Province(BK20220139).
文摘Dear Editor,This letter addresses the Nash equilibrium seeking problem for games with second-order players subject to unknown input deadzones and denial-of-service(DoS)attacks.By using ideas from the digital twin,a distributed Nash equilibrium seeking strategy is proposed.In the proposed strategy,the twin players are designed to be second-order integrators,based on which a distributed control law is provided so as to find the Nash equilibrium under DoS attacks.Moreover,adaptive control laws and sliding mode control laws are synthesized for the actual players such that they can track the twin players under unknown input dead-zones.Theoretical investigations show that the proposed strategy is effective to drive the actions of actual players to the Nash equilibrium under the given conditions.A numerical example is provided to verify the effectiveness of the proposed strategy.
文摘The developing market of information technologies i s the most dynamical and thriving business in the modern world. The law of supply and demand establishes repeating, steady cause and effect relation between three economic phenomena-price, supply and demand. Demand is an ideal need and a real opportunity of the customer to buy the goods. Supply is an ideal readiness and a real opportunity of the commodity producer to put the goods on the market . A plethora of factors affect the supply and demand. There is inverse dependenc e between the market price of the goods and the quantity which is in the demand. There is direct dependence between the market price of the goods and the qu antity which is offered to the buyer. The following features distinguish the sof tware from the usual goods in the consumer market: high science intensity, simpl icity of replicating, relative simplicity of modification and updating, high req uirements to quality of the software, at sale the buyer gets it, but it does no t disappear in sale, there is no physical deterioration, but there is a fast ob solescence. To protect the programs against the non-authorized access (the copy ings and operation) technical and legal methods are used: the patent protection, status of industrial secret, license agreements.
文摘For years, rumors have circulated that the code for the original DOS operating system created by Microsoft for the IBM personal computer is actually copied from the CP/M operating system developed by Digital Research Incorporated. In this paper, scientifically tested and accepted forensic analysis mathematical techniques, step-by-step processes, and advanced software code comparison tools are used to compare early versions of the two code bases. The conclusion is reached that no copying of code takes place1.