Mengelola operasional dan perawatan kendaraan dan alat berat perusahaansutjiharso suwargo
HEMS berkembang sejak tahun 2009 akhir ternyata dari system dan alur kerja bengkel sepeda motor ini dapat diterapkan pada alur kerja workshop alat berat pada site pertambangan batubara , sehingga SIB berubah menjadi MMIS ( Maintenance Management Information System ) sebuah system manajemen maintenance
perawatan dan perbaikan kendaraan dan alat berat
dengan dukungan software desktop berbasis Microsoft access,
yang tahap awal di implementasikan pada workshop site
pertambangan batubara di Kintap – Kalimantan Selatan,
dilanjutkan ke Ampah Kalimantan Tengah, Melak – Kalimantan
Utara, serta Semboja – Kalimantan Timur.
HEMS - Heavy Equipment Management System sebagai Sistem
manajemen perawatan dan perbaikan kendaraan dan alat berat
sampai tahun 2011 MMIS
disamping diimplementasikan masih di lingkungan tambang
batubara di Jambi dan Tamiang - Kalteng, namun disini sudah
berkembang ke bidang lain yaitu galangan kapal, pengurugan,
di Gresik – Jawa Timur dan mulai merambah ke kontraktor sipil
di Rembang dan Denpasar.
Kelanjutan dari kontaktor inilah yang tingkat perkembangannya
jadi sedemikian besar, MMIS sebagai sistem perawatan kendaraan
dan alat berat mulai diterapkan untuk mengelola peralatan pada
perusahaan kontraktor pilling ( tiang pancang ), pada posisi
ini sudah mulai menggunakan software aplikasi berbasis web
Perkembangan yang cukup drastis sebagai sebuah sistem informasi
khusus pengelolaan peralatan konstruksi untuk operasional dan
perawatan kendaraan mesin dan alat berat manajemen terjadi di
tahun 2017 dimana MMIS diharuskan berubah karena tuntutan
implementasi lapangan untuk mengelola perawatan peralatan
proyek tol Cimanggis – Cibitung sebuah project negara yang
sangat besar milik PT. Waskita Karya ( persero ) Tbk. dan
juga PT. Nindya Karya ( persero ) dengan modul dan fitur
yang jauh lebih lengkap untuk perusahaan jasa konstruksi
sehingga MMIS harus berubah menjadi HEMS ( Heavy Equipment
Management System ), perubahan yang sangat drastis dari
software yang berbasis desktop menjadi web khusus untuk
manajemen operasional dan perawatan kendaraan mesin dan
alat berat.
Perkembangan selanjutnya masih di sekitar BUMN, HEMS dipercaya
sebagai system manajemen tidak saja perawatan namun sudah
melebar ke operasional peralatan pada usaha rental dan jasa
konstruksi, dan kontraktor pekerjaan sipil di Bandar Lampung
, Manado.dan Pomalaa- Sulawesi Tenggara.
HEMS berkembang terus di tahun 2019 ke bidang usaha di luar
tambang dan kontraktor yaitu untuk manajemen distribusi pada
perusahaan distributor bahan bangunan di Kalimantan Barat,
dan untuk pengelolaan bengkel rekanan dari PT. Freeport dan
PT.Petrosea di Timika Papua.
tahun 2020 ini HEMS dipercaya dalam penanganan manajemen operasional dan perawatan peralatan kendaraan dan alat pada project
pembangunan PLTA ( Pembangkit Listrik Tenaga Air ) di Kerinci
Jambi dari PT. Kerinci Merangin Hydro, ( Bukaka - Kalla Group )
Building Non-Linear Narratives in Horizon Zero DawnGuerrilla
The document describes the quest system used in Horizon: Zero Dawn. Quests are built as a graph of steps (plot points) linked by cause and effect. Each step is defined by an action the player must perform, chosen from a limited set of verbs. This allows for nonlinear quests while keeping creation simple. The system was successful, creating over 150 quests, but has issues with reverting player actions and could improve its verb set.
This document describes techniques for simulating water flow in video games. Artists create flow maps that define vector fields to distort normal maps over time, simulating flowing water. Techniques like dual layers with offset phases and additive noise reduce artifacts from repetition and pulsing. The flowing normal map approach was applied successfully in Left 4 Dead 2 to guide players through levels. It was later extended to flow color maps, allowing debris to flow realistically in the water in Portal 2. The methods achieved convincing water flow effects while meeting hardware constraints for older consoles.
Variational이라는 단어로는 아무것도 안떠오릅니다.
그래서, '꿩 대신 닭'이라고 표현해 봤습니다.
초반 독자적인 그림을 통해 개념잡기가 쉬워요.
설명부분은 초록색으로 표시했습니다.
확률변수(random variable)부터 막히면, 아래 블로그 글을 읽어 보세요.
https://blog.naver.com/nonezerok/221428251262
유니티 그래픽 최적화, 어디까지 해봤니 (Optimizing Unity Graphics) Unite Seoul Ver.ozlael ozlael
This document provides guidance on optimizing graphics in Unity. It discusses common bottlenecks like draw calls and provides techniques for reducing them, such as batching and profiling. Specific optimization techniques covered include image-based lighting, shadow mapping, physically based rendering, and level of detail systems. The document emphasizes identifying and addressing bottlenecks through profiling on target devices.
Mengelola operasional dan perawatan kendaraan dan alat berat perusahaansutjiharso suwargo
HEMS berkembang sejak tahun 2009 akhir ternyata dari system dan alur kerja bengkel sepeda motor ini dapat diterapkan pada alur kerja workshop alat berat pada site pertambangan batubara , sehingga SIB berubah menjadi MMIS ( Maintenance Management Information System ) sebuah system manajemen maintenance
perawatan dan perbaikan kendaraan dan alat berat
dengan dukungan software desktop berbasis Microsoft access,
yang tahap awal di implementasikan pada workshop site
pertambangan batubara di Kintap – Kalimantan Selatan,
dilanjutkan ke Ampah Kalimantan Tengah, Melak – Kalimantan
Utara, serta Semboja – Kalimantan Timur.
HEMS - Heavy Equipment Management System sebagai Sistem
manajemen perawatan dan perbaikan kendaraan dan alat berat
sampai tahun 2011 MMIS
disamping diimplementasikan masih di lingkungan tambang
batubara di Jambi dan Tamiang - Kalteng, namun disini sudah
berkembang ke bidang lain yaitu galangan kapal, pengurugan,
di Gresik – Jawa Timur dan mulai merambah ke kontraktor sipil
di Rembang dan Denpasar.
Kelanjutan dari kontaktor inilah yang tingkat perkembangannya
jadi sedemikian besar, MMIS sebagai sistem perawatan kendaraan
dan alat berat mulai diterapkan untuk mengelola peralatan pada
perusahaan kontraktor pilling ( tiang pancang ), pada posisi
ini sudah mulai menggunakan software aplikasi berbasis web
Perkembangan yang cukup drastis sebagai sebuah sistem informasi
khusus pengelolaan peralatan konstruksi untuk operasional dan
perawatan kendaraan mesin dan alat berat manajemen terjadi di
tahun 2017 dimana MMIS diharuskan berubah karena tuntutan
implementasi lapangan untuk mengelola perawatan peralatan
proyek tol Cimanggis – Cibitung sebuah project negara yang
sangat besar milik PT. Waskita Karya ( persero ) Tbk. dan
juga PT. Nindya Karya ( persero ) dengan modul dan fitur
yang jauh lebih lengkap untuk perusahaan jasa konstruksi
sehingga MMIS harus berubah menjadi HEMS ( Heavy Equipment
Management System ), perubahan yang sangat drastis dari
software yang berbasis desktop menjadi web khusus untuk
manajemen operasional dan perawatan kendaraan mesin dan
alat berat.
Perkembangan selanjutnya masih di sekitar BUMN, HEMS dipercaya
sebagai system manajemen tidak saja perawatan namun sudah
melebar ke operasional peralatan pada usaha rental dan jasa
konstruksi, dan kontraktor pekerjaan sipil di Bandar Lampung
, Manado.dan Pomalaa- Sulawesi Tenggara.
HEMS berkembang terus di tahun 2019 ke bidang usaha di luar
tambang dan kontraktor yaitu untuk manajemen distribusi pada
perusahaan distributor bahan bangunan di Kalimantan Barat,
dan untuk pengelolaan bengkel rekanan dari PT. Freeport dan
PT.Petrosea di Timika Papua.
tahun 2020 ini HEMS dipercaya dalam penanganan manajemen operasional dan perawatan peralatan kendaraan dan alat pada project
pembangunan PLTA ( Pembangkit Listrik Tenaga Air ) di Kerinci
Jambi dari PT. Kerinci Merangin Hydro, ( Bukaka - Kalla Group )
Building Non-Linear Narratives in Horizon Zero DawnGuerrilla
The document describes the quest system used in Horizon: Zero Dawn. Quests are built as a graph of steps (plot points) linked by cause and effect. Each step is defined by an action the player must perform, chosen from a limited set of verbs. This allows for nonlinear quests while keeping creation simple. The system was successful, creating over 150 quests, but has issues with reverting player actions and could improve its verb set.
This document describes techniques for simulating water flow in video games. Artists create flow maps that define vector fields to distort normal maps over time, simulating flowing water. Techniques like dual layers with offset phases and additive noise reduce artifacts from repetition and pulsing. The flowing normal map approach was applied successfully in Left 4 Dead 2 to guide players through levels. It was later extended to flow color maps, allowing debris to flow realistically in the water in Portal 2. The methods achieved convincing water flow effects while meeting hardware constraints for older consoles.
Variational이라는 단어로는 아무것도 안떠오릅니다.
그래서, '꿩 대신 닭'이라고 표현해 봤습니다.
초반 독자적인 그림을 통해 개념잡기가 쉬워요.
설명부분은 초록색으로 표시했습니다.
확률변수(random variable)부터 막히면, 아래 블로그 글을 읽어 보세요.
https://blog.naver.com/nonezerok/221428251262
유니티 그래픽 최적화, 어디까지 해봤니 (Optimizing Unity Graphics) Unite Seoul Ver.ozlael ozlael
This document provides guidance on optimizing graphics in Unity. It discusses common bottlenecks like draw calls and provides techniques for reducing them, such as batching and profiling. Specific optimization techniques covered include image-based lighting, shadow mapping, physically based rendering, and level of detail systems. The document emphasizes identifying and addressing bottlenecks through profiling on target devices.
Practical Occlusion Culling in Killzone 3Guerrilla
Killzone 3 features complex occluded environments. To cull non-visible geometry early in the frame, the game uses PlayStation 3 SPUs to rasterize a conservative depth buffer and perform fast synchronous occlusion queries against it. This talk presents an overview of the approach and key lessons learned during its development.
The document discusses algorithms used for game playing in artificial intelligence, including the minimax algorithm and alpha-beta pruning algorithm. It provides an overview and examples of how the minimax algorithm works using a game tree to evaluate all possible moves to minimize losses and maximize wins. It then explains how the alpha-beta pruning algorithm improves upon minimax by pruning branches of the game tree once it determines the optimal solution.
Game Programming 07 - Procedural Content GenerationNick Pruehs
Chapter 7 of the lecture Game Programming taught at HAW Hamburg.
Introduction to procedural content generation and its implication for the game design.
Multi-Agent Path Finding (MAPF) is the problem of finding collision-free paths for multiple agents from their starting locations to given goal destinations. It has applications in automated warehouse systems, autonomous aircraft towing vehicles, office robots, and video game characters. The problem is formulated by representing the area as a grid of cells, with obstacles blocking certain cells. The objective is to find paths for N agents that minimize the sum of costs or makespan. Key assumptions include discrete time steps and agents occupying the same cell at the same time resulting in collisions. Different algorithms that have been developed to solve MAPF include search-based approaches like A* and rule-based approaches like push-and-swap.
Pemampatan citra digunakan untuk mengurangi ukuran file citra dengan menghilangkan informasi redundansi. Terdapat beberapa metode pemampatan seperti Huffman, RLE, dan kuantisasi yang masing-masing memanfaatkan frekuensi derajat keabuan, kelompok pixel seragam, dan penggolongan derajat keabuan. Metode ini dapat menghasilkan citra yang hampir sama atau sama dengan aslinya dengan rasio pemampatan yang lebih tinggi.
1) The document explores the origins of complex numbers in quantum mechanics through three axioms: composability, consistency, and the separation axiom.
2) Applying the composability and consistency axioms to classical and quantum systems implies either real or complex numbers. The separation axiom eliminates real numbers, leaving complex numbers.
3) The author proposes that quantum mechanics can be derived from these axioms by defining symmetric and anti-symmetric products that satisfy certain identities for composable systems, implying the use of complex numbers in quantum mechanics.
Practical Occlusion Culling in Killzone 3Guerrilla
Killzone 3 features complex occluded environments. To cull non-visible geometry early in the frame, the game uses PlayStation 3 SPUs to rasterize a conservative depth buffer and perform fast synchronous occlusion queries against it. This talk presents an overview of the approach and key lessons learned during its development.
The document discusses algorithms used for game playing in artificial intelligence, including the minimax algorithm and alpha-beta pruning algorithm. It provides an overview and examples of how the minimax algorithm works using a game tree to evaluate all possible moves to minimize losses and maximize wins. It then explains how the alpha-beta pruning algorithm improves upon minimax by pruning branches of the game tree once it determines the optimal solution.
Game Programming 07 - Procedural Content GenerationNick Pruehs
Chapter 7 of the lecture Game Programming taught at HAW Hamburg.
Introduction to procedural content generation and its implication for the game design.
Multi-Agent Path Finding (MAPF) is the problem of finding collision-free paths for multiple agents from their starting locations to given goal destinations. It has applications in automated warehouse systems, autonomous aircraft towing vehicles, office robots, and video game characters. The problem is formulated by representing the area as a grid of cells, with obstacles blocking certain cells. The objective is to find paths for N agents that minimize the sum of costs or makespan. Key assumptions include discrete time steps and agents occupying the same cell at the same time resulting in collisions. Different algorithms that have been developed to solve MAPF include search-based approaches like A* and rule-based approaches like push-and-swap.
Pemampatan citra digunakan untuk mengurangi ukuran file citra dengan menghilangkan informasi redundansi. Terdapat beberapa metode pemampatan seperti Huffman, RLE, dan kuantisasi yang masing-masing memanfaatkan frekuensi derajat keabuan, kelompok pixel seragam, dan penggolongan derajat keabuan. Metode ini dapat menghasilkan citra yang hampir sama atau sama dengan aslinya dengan rasio pemampatan yang lebih tinggi.
1) The document explores the origins of complex numbers in quantum mechanics through three axioms: composability, consistency, and the separation axiom.
2) Applying the composability and consistency axioms to classical and quantum systems implies either real or complex numbers. The separation axiom eliminates real numbers, leaving complex numbers.
3) The author proposes that quantum mechanics can be derived from these axioms by defining symmetric and anti-symmetric products that satisfy certain identities for composable systems, implying the use of complex numbers in quantum mechanics.
Quantum is an OpenStack project to provide network connectivity as a service between interface devices. It will enable cloud tenants to create rich networking topologies, build advanced network services and innovative network capabilities.
The document provides an executive summary of a study on the feasibility of adopting concepts from quantum physics and quantum communications to a space infrastructure. It discusses key principles like superposition, qubits, and entanglement. It compares quantum and classical optical communications, highlighting increased capacity and perfect security from quantum cryptography. It proposes a series of photon-based experiments using the International Space Station to demonstrate fundamental quantum physics and quantum key distribution. The experiments would start simply and increase in complexity, providing a logical progression to validate the technology.
The document discusses interpretations of quantum mechanics including the Copenhagen interpretation, many-worlds interpretation, and transactional interpretation. It summarizes four quantum paradoxes around wave-particle duality, quantum measurement, and non-locality. It then provides more details on the transactional interpretation, explaining how it uses advanced and retarded waves to describe quantum events and resolve the paradoxes without needing observers or wavefunction collapse. Finally, it discusses how interpretations cannot be experimentally tested but notes one potential exception with a new experiment.
Quantum Physics for Dogs: Many Worlds, Many Treats?Chad Orzel
The document discusses interpretations of quantum mechanics, specifically the Copenhagen interpretation and the Many-Worlds interpretation. It explains that under the Copenhagen interpretation, measurement causes the quantum wavefunction to collapse, while under the Many-Worlds interpretation, the wavefunction never collapses and instead continuously splits the universe into many branches. Decoherence helps explain why we only observe single states despite the continuous splitting, as interactions with the environment make the effects of other branches undetectable. The document also notes challenges with both interpretations and how the combination of Many-Worlds and decoherence addresses these challenges.
Bo Ewald from D-Wave Systems presented this deck at the HPC Advisory Council Switzerland Conference.
"This talk will provide an introduction to quantum computing and briefly review different approached to implementing a quantum computer. D-Wave’s approach to implementing a quantum annealing architecture and the software and programming environment will be discussed. Finally, some potential applications of quantum computing will also be addressed."
Watch the video presentation: http://wp.me/p3RLHQ-f89
See more talks from the Switzerland HPC Conference:
http://insidehpc.com/2016-swiss-hpc-conference/
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Quantum Computing: Welcome to the FutureVernBrownell
Vern Brownell, CEO at D-Wave Systems, shares his thoughts on Quantum Computing in this presentation, which he delivered at Compute Midwest in November 2014. He addresses big questions that include: What is a quantum computer? How do you build one? Why does it matter? What does the future hold for quantum computing?
This document presents an overview of quantum computers. It begins with an introduction and brief outline, then discusses the history of quantum computing from 1982 onwards. It explains that quantum computers use quantum mechanics principles like qubits and superposition to potentially solve problems beyond the capabilities of classical computers. Some applications mentioned include cryptography, artificial intelligence, and teleportation. Challenges like decoherence and error correction are also noted. The conclusion states that if successfully built, quantum computers could revolutionize society.
This document provides an overview of Turing machines. It introduces Turing machines as a simple mathematical model of a computer proposed by Alan Turing in 1936. A Turing machine consists of a tape divided into cells, a read/write head, finite states, and a transition function. The transition function defines how the machine moves between states and reads/writes symbols on the tape based on its current state and tape symbol. Turing machines can accept languages and compute functions. Variations include multi-tape, non-deterministic, multi-head, offline, multi-dimensional, and stationary-head Turing machines. The properties of Turing machines include their ability to recognize any language generated by a phrase-structure grammar and the Church
Facebook promotes individualism and self-promotion through its features that allow users to personalize their profiles, customize their news feeds and friend lists, and share information about themselves. The average American user spends 14 minutes per day on Facebook, where over 500 million users communicate through sharing posts, private messages, and video calls. While Facebook's stated purpose is to connect users, its personalization tools serve the unintended function of enabling self-promotion and a focus on the individual over community.
A short conversation took place between two individuals, HussainQureshi and Hooria. HussainQureshi introduced himself, saying "Hi Its me". Hooria responded greeting back with "Hello Hooria".
Discussion continuum - Kto placi za rozwoj lekowXplore Health
Cały proces od badań naukowych nad nowym lekiem do jego umieszczenia na półkach aptecznych jest długi i skomplikowany i związany ze znacznymi inwestycjami. Dzięki tej grze będziesz mógł omówić koszty rozwoju leków i inwestowanie w leczenie rzadkich chorób.
This document provides an overview of the history and development of atomic structure theories from ancient Greece to modern times. It discusses key contributors including:
- Democritus (400 BC) who first proposed the idea of atoms as tiny indivisible particles.
- Dalton (1817-1844) who developed the first modern atomic theory stating that all matter is composed of atoms that combine in specific ratios.
- Rutherford (1898) whose gold foil experiment showed that atoms are mostly empty space with a small, dense positively charged nucleus at the center.
- Bohr (1922) who proposed the planetary model of electrons orbiting the nucleus like planets around the sun.
- Schröding
The document provides instructions for a chemistry lesson that involves identifying elements and compounds, describing chemical bonding and ion formation, and balancing chemical equations. Students are asked to complete tasks using resources like the periodic table, textbooks, and online learning modules. They will learn about chemical bonding, ion formation, and the properties of ionic compounds by creating examples like sodium chloride. Questions are provided to test their understanding.
O documento descreve um arquivo assinado digitalmente de acordo com a MP 2.200-2/2001, que estabeleceu a Infraestrutura de Chaves Públicas Brasileira (ICP-Brasil). O arquivo pode ser acessado online por meio de um número de identificação.
The document provides information about the Erasmus Mundus program which offers European scholarships and worldwide opportunities for students and researchers. It offers top-quality joint masters and doctorate programs across Europe, and full scholarships for excellent students and researchers from around the world to study in these programs. Successful students earn multiple or joint degrees from the participating universities upon completion.
ContactNet can be used for several business development and client management use cases. It can analyze relationships to an event attendee list to identify best contacts. It provides insight into how well a firm knows particular industries and companies. It also identifies important regional contacts when attorneys travel. Additionally, it monitors key clients and notifies users when important contacts are reached out to.
The document summarizes the author's experience in a 5-day, 25-hour service learning project at Fruitland Park Elementary School working in an autistic unit with 5 students. The author engaged in various activities like crafts, physical education, and field day. They observed the classroom, interactions between teachers and students, and gained a better understanding of teaching autistic students. The experience motivated the author to become more civically engaged and embrace service learning in the future.
This document provides an overview of game theory concepts including its assumptions, classifications, elements, significance, and limitations. It also describes methods for solving different types of games such as the prisoner's dilemma, 2-person zero-sum games, and pure strategy games. Game theory analyzes strategic decision making among interdependent parties and can provide insights into situations involving conflict or competition between rational opponents.
Solutions to Problem Set 2 The following note was very i.docxrafbolet0
Solution
s to Problem Set 2
The following note was very important for the solutions:
In all problems below a rational preference relation is understood as one that satisfies the axioms of
von Neumann and Morgenstern’s utility theory. When solving these problems involving the
expected utility theory use the von Neumann-Morgenstern theorem. In other words, you prove that
a preference relation is rational by showing utility values that satisfy corresponding conditions and
you prove that a preference relation is not rational by showing that no utility values can possibly
satisfy these conditions. SOLUTIONS THAT DON’T USE THIS METHOD WILL NOT BE
ACCEPTED !!!
Problem 1 (3p) Suppose you have asked your friend Peter if he prefers a sure payment of
$20 or a lottery in which he gets $15 with probability 0.5 and $10 with probability 0.5. Is it
rational for Peter to prefer the sure payment over the lottery? Is it rational to prefer the
lottery over the sure payment? Is it rational to be indifferent between the lottery and the sure
payment? Would your answer be any different had I asked you the same question but with
A substituted for $20, B for $15 and C for $10? What is the general lesson to learn from
this exercise?
SOLUTION: You can assign numbers to u($20), u($15) and u($10) in such a way that
u($20) will be larger than, or equal to, or smaller than 0.5u($15)+0.5u($10). This shows that
all three preferences are rational. If instead of $20, $15 and $10 you write A, B and C the
solution to this problem, which does not depend in any way on the specifics of the three
alternatives, should be obvious. A few general lessons here: (1) Expected utility theory,
just like preference theory, does not “impose any values” on your preferences. (2) Be
careful never to use assumptions that are not clearly stated. (3) If you are given a single
piece of information about decision maker’s preferences then no matter what this
information is it cannot be possibly irrational. Rationality is, in essence, a requirement of
consistency of preferences. If there is only one condition, what would it be possibly
inconsistent with?
Problem 2 (3p) George tells you that he prefers more money over less. George also tells
you about his preference between a lottery in which he gets $30 with probability 0.9 and 0
with probability 0.1 and a sure payment of $20. Assume that George is rational. Is it
possible for him to prefer the lottery over the sure payment? Is it possible to prefer the sure
payment over the lottery? Is it possible for him to be indifferent between the sure payment
and the lottery? What is the general lesson to learn from this exercise?
SOLUTION: Suppose you have assigned numbers to u($30), u($20) and u($0) in such a
way that u($30)>u($20)>u($0):
Can such numbers satisfy u($20) < 0.9u($30)+0.1u($0)? Yes, they can. For instance,
u($30)=1, u($20)=0.5 and u($0)=0. .
This document provides an overview of game theory concepts. It defines key terms like games, strategies, payoffs, optimal strategies, and payoff matrices. It discusses different types of games including zero-sum games, positive-sum games, negative-sum games, games with dominant strategies, and Nash equilibria. Specific examples analyzed include the prisoners' dilemma, the battle of the sexes, and mixed strategy equilibria. Repeated games and how they can be used to enforce cartels are also covered. The document concludes with a discussion of sequential games and how they relate to entry deterrence strategies by incumbent firms.
This document provides an overview of game theory concepts including:
- 2-player zero-sum games and minimax optimal strategies
- The minimax theorem which states that every 2-player zero-sum game has a value and optimal strategies for both players
- General-sum games and the concept of a Nash equilibrium as a stable pair of strategies where neither player benefits from deviating
- The proof of existence of Nash equilibria in general-sum games using Brouwer's fixed-point theorem
I am Tim D. I am a Computer Network Assignment Expert at computernetworkassignmenthelp.com. I hold a Master's in Computer Science from, West Virginia University, USA. I have been helping students with their assignments for the past 15 years. I solve assignments related to the Computer Network.
Visit computernetworkassignmenthelp.com or email support@computernetworkassignmenthelp.com.
You can also call on +1 678 648 4277 for any assistance with the Computer Network Assignment.
This is the 2nd of an 8 lecture series that I presented at University of Strathclyde in 2011/2012 as part of the final year AI course.
This lecture covers the fundamentals of probability theory, and is relatively basic to ensure that all students have a good grasp on the concept.
Nash equilibrium and Pareto optimality are discussed and compared using examples from game theory. In the Battle of Sexes game, the Nash equilibria coincide with the Pareto efficient outcomes. However, in other games like the Prisoner's Dilemma and the Tragedy of the Commons, the Nash equilibria are not Pareto optimal and there is a possibility of Pareto improvement by playing different strategies. Braess's Paradox is also discussed where adding more resources to a network can paradoxically decrease overall performance at equilibrium due to drivers taking suboptimal routes.
This document discusses game theory and the concept of reduction by dominance in two-person zero-sum games. It provides an example of the paper-scissors-rock game represented as a payoff matrix. It explains how to reduce a matrix by eliminating dominated rows and columns, where a row or column is dominated if its values are always less than or equal to the corresponding values in another row or column. Going through an example, it shows how repeatedly eliminating dominated options can reduce a game down to its simplest form.
A discussion of basic concepts from game theory, an incredibly useful lemma concerning auctions from mechanism design, and a discussion of TFNP, an interesting complexity class which captures search problems where an answer is guaranteed to exist, such as the problem of finding Nash equilibria in games
Game theory intro_and_questions_2009[1]evamstrauss
Here are the key steps:
Row
1. Check for dominant strategies - none exist
2. Find possible Nash equilibria by looking at best responses:
- Up, Left
- Down, Centre
3. Therefore, the two Nash equilibria are:
- (Up, Left)
- (Down, Centre)
The two Nash equilibria are (Up, Left) and (Down, Centre). There are no dominant strategies.
Reinforcement learning algorithms like Q-learning can model human behavior better than models of full rationality in games. The document describes experiments using Q-learning agents in repeated 2x2 games. In prisoner's dilemma games, Q-learning agents learned mutual cooperation more when it was the Pareto optimal outcome compared to when it was not. In asymmetric games, Q-learning agents also learned the Pareto optimal outcome when it provided sufficient incentive. In coordination games like Chicken, Q-learning agents sometimes learned alternating equilibrium strategies similar to human subjects.
Game theory is the study of strategic decision making between interdependent parties. It analyzes situations where players make decisions that will impact outcomes for themselves and others. The document provides examples of classic game theory scenarios like the prisoner's dilemma and discusses concepts like dominant strategies, Nash equilibriums, and mixed strategies. It also presents a two-player "two-finger Morra game" to illustrate game theory principles.
I am Irene M. I am a Computer Network Assignments Expert at computernetworkassignmenthelp.com. I hold a Master's in Computer Science from, the California University of Technology. I have been helping students with their assignments for the past 10 years. I solve assignments related to the Computer Network.
Visit computernetworkassignmenthelp.com or email support@computernetworkassignmenthelp.com.
You can also call on +1 678 648 4277 for any assistance with the Computer Network Assignments.
Game theory is the study of strategic decision making where outcomes depend on the choices of multiple players. It originated in the 1920s and was popularized by John von Neumann. Game theory analyzes cooperative and non-cooperative games with various properties like the number of players, information available, and whether choices are simultaneous or sequential. Important concepts in game theory include Nash equilibrium, where no player can benefit by changing strategy alone, and prisoner's dilemma, where defecting dominates but collective cooperation yields higher payoffs. Game theory is now used widely in economics, politics, biology, and other fields involving interdependent actors.
The document discusses Nash equilibrium, which is a solution concept in game theory where each player is making the best response given the other players' strategies. It provides an example of a simple game between two players, Tom and Sam, where choosing strategy A is the Nash equilibrium since neither player has an incentive to deviate. Mixed strategies are introduced where players randomize between different actions. An example game is used to illustrate finding the Nash equilibrium using mixed strategies. The document also discusses properties of Nash equilibria, including that every matrix game has at least one Nash equilibrium.
This document discusses equivariant estimation, which involves finding estimators that are invariant or equivariant under transformations of the data. Specifically:
- A statistical model is invariant under a transformation if applying the transformation to the data results in a model with the same form. This induces a transformation on the parameter space.
- For a model to be invariant, the loss function should also be invariant under a corresponding transformation of the decisions. This induces a transformation on the decision space.
- A decision problem is invariant under a transformation if the model and loss are invariant under the induced transformations on the parameter and decision spaces.
- Often a problem will be invariant under not just one transformation but a group of related transformations
This document summarizes a presentation on game theory and its applications. It introduces several classic games analyzed using game theory, including the Prisoner's Dilemma, Battle of the Sexes, and Rock-Paper-Scissors. Key game theory concepts are explained, such as the Nash equilibrium, mixed strategies, dynamic games represented using game trees, and applications in economics, auctions, mechanism design, and network routing. Computer science applications including Internet routing, job scheduling, and game programming using techniques like minmaxing are also discussed.
GameTheory_popular.ppt in the operations reearchssuser96912f1
This document summarizes a presentation on game theory and its applications. It introduces several classic games analyzed using game theory, including the Prisoner's Dilemma, Battle of the Sexes, and Rock-Paper-Scissors. It also discusses Nash equilibrium, mixed strategies, dynamic games represented using game trees, economic applications, auctions, and applications of game theory in computer science such as network routing and game programming.
PageRank is an algorithm created by Google's founders to rank the importance of websites in the network of links on the internet. It uses a probability-based model to determine the likelihood that a random user would arrive at a given page. PageRank is calculated through an iterative process of evaluating the inbound links from other pages, with more weight given to pages that are already highly ranked. The example demonstrates how PageRank is computed for a simple network of four pages, with the highest ranking going to the page that receives a link from the page with the strongest inbound links.
Rotating Wave Approximation (RWA) breaks down for few-cycle pulses. Using Gaussian pulses, quantum logic gates like NOT and Hadamard can be implemented, but their effectiveness decreases for pulses with a small frequency compared to the transition frequency between levels. Attosecond pulses cannot be used to study ultrafast phenomena in biology due to limitations of RWA - the required x-ray or gamma ray frequencies would damage living cells. The document examines how RWA breakdown affects population dynamics in a two-level system interacting with femtosecond and attosecond pulses.
Mysql Performance Optimization Indexing Algorithms and Data StructuresAbhijit Mondal
The document discusses various indexing strategies and data structures in MySQL for high performance, including:
1. Hash indexes use a hash table to store keys and row pointers for exact match queries in constant time, but don't support range queries.
2. B-tree indexes support range, prefix and multicolumn queries in O(log n) time and are widely used in databases like InnoDB.
3. Indexing strategies recommend isolating columns to be indexed and using prefix indexes for columns like text to improve selectivity and performance of queries.
This document discusses various MySQL performance optimization techniques, including:
- Choosing between the InnoDB and MyISAM storage engines, with InnoDB generally recommended due to its transactional capabilities and row-level locking.
- Selecting optimal data types to minimize storage size and improve indexing and query performance.
- Considering whether to normalize or denormalize database schemas based on query patterns to reduce the need for joins or minimize data duplication respectively.
- Using summary/cache tables to pre-aggregate data and improve performance of analytical queries that involve expensive joins across multiple tables.
- Understanding the EXPLAIN output to analyze indexes used, table access methods, and ways to improve queries by adding appropriate indexes.
The document describes simulation and experimentation of pulsed light interacting with multilevel quantum systems. It presents two coupled differential equations modeling the interaction and applies the rotating wave approximation to neglect fast oscillating terms. It also only considers the case of exact resonance between the light frequency and the system energy levels.
The document summarizes four cryptographic protocols:
1. Needham-Schroeder protocol authenticates users (A and B) to each other over a network with the help of a trusted authority (Trent).
2. Kerberos protocol allows a client (A) to authenticate to a server (S) in two steps by first authenticating to the Kerberos server and then to the ticket granting service (TGS) of the target server.
3. Secret sharing protocol partitions a secret key (K) into shares and distributes them among trustees, requiring a minimum number of shares to reconstruct the key and preventing any single trustee from accessing the secret.
4. Zero knowledge proofs allow a
This document summarizes several public key cryptosystems including the Knapsack cryptosystem, RSA cryptosystem, ElGamal cryptosystem, and elliptic curve cryptography applied to ElGamal. For each cryptosystem, it describes the key generation process, encryption, and decryption algorithms. It also discusses security aspects such as the hard computational problems that the cryptosystems rely on like integer factorization and discrete logarithms. Finally, it provides code examples for implementing some of the cryptosystems in C.
This document summarizes several number theory concepts and algorithms including:
1. Mersenne primes which are of the form 2^p - 1 where p is prime. It proves some theorems about their properties.
2. Fermat's Little Theorem and Euler's Theorem which relate to exponents modulo a prime. It includes proofs and an algorithm for computing modular inverses.
3. The Chinese Remainder Theorem and its application to finding solutions to systems of congruences.
4. Polynomial arithmetic over finite fields including finding remainders, GCDs, inverses and doing operations in Fp[x]. It describes using these to construct finite fields.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
2. Quantum Games !!!
● Can principles of Quantum communication be
used to develop efficient and unbiased marketing
strategies ?
● Quantum communication and Quantum
cryptography can be regarded as Games
played between 2 legal players Alice and Bob and
the illegal players in between them trying to decrypt
the secret message.
3. What is a Game ?
● We have a set of players i
● a strategy set Si for each player i.
● Pay-off for each player Pi(s1,s2,....), where siSi.
4. Where does “Quantum” comes into
“play”?
● Game theory does not explicitly concern itself with
how the information is transmitted once a decision is
taken. Bearing in mind that a game is also about
the transfer of information, it becomes legitimate
to ask what happens if these carriers of
information are taken to be quantum systems,
quantum information being a fundamental notion of
information.
5. Strategies and Equilibriums
● A quantum strategy sA is called dominant strategy of
Alice if PA (sA,s'B) ≥ PA (s′A, s′B )
for all s′A ∈ SA , s′B ∈ SB
● A pair ( sA , sB ) is said to be an equilibrium in
dominant strategies if sA and sB are the players’
respective dominant strategies
6. Strategies and Equilibriums
● A combination of strategies ( sA , sB ) is called a
Nash equilibrium if PA (sA,sB) ≥ PA (s′A, sB ) and
PB (sA,sB) ≥ PB (sA, s′B )for all s′A ∈ SA , s′B ∈ SB .
● A pair of strategies ( sA , sB ) is called Pareto
optimal, if it is not possible to increase one player’s
pay-off without lessening the pay-off of the other
player.
7. Nash Equilibrium
● A Nash equilibrium implies that neither player has a
motivation to unilaterally alter his or her strategy
from this equilibrium solution, as this action will
lessen his or her pay-off. Given that the other player
will stick to the strategy corresponding to the
equilibrium, the best result is achieved by also
playing the equilibrium solution.
8. The Prisoner's Dilemma
● Two prisoners are being questioned by the police.
They are held in separate cells and cannot talk to
each other. The police make the following offer to
both the prisoners: if one confesses that both
committed the crime then the confessor will be set
free and the other will spend 5 years in jail; if both
confess then they will each get 4 yr jail term: if
neither confess, then they will each spend 2 yrs in
jail
9. The Prisoner's Dilemma
● Table of Pay-offs :
P1 Cooperation Defection
P2
Cooperation (3,3) (0,5)
Defection (5,0) (1,1)
10. The Prisoner's Dilemma
● If both the prisoners co-operate with each other then
they are each awarded 3 yrs of freedom, if none of
them co-operate with each other then each will be
awarded 1 yr of freedom and if one of them has
conscience and the other is defected then the 'good'
prisoner has to serve full 5 yr in jail while the 'bad'
one will be set free immediately i.e. Full 5 yrs of
freedom for the 'bad' prisoner. So what is the optimal
strategy that both of them apply here?
11. Nash Equilibrium
● In the Prisoner's dilemma problem if the dominant
strategy is (D,D) with pay-offs (1,1) for Alice and
Bob. Now if Alice changes her strategy while Bob
sticks to his strategy, i.e. Alice decides to become
'good' then she pays the price with 0 pay-off or in
this case a complete 5yr jail sentence. Same is true
for Bob, thus if either of them decides to become
'good' while the other stays 'bad', the his/her pay-off
decreases, hence (D,D) is in Nash equilibrium. But
(D,D) is not Pareto optimal because (C,C) has better
pay-offs than (D,D).
12. Quantum Prisoner's Dilemma
● In traditional 2 × 2 games where each player has just
a single move, creating a superposition by utilizing a
quantum strategy will give the same results as a
mixed classical strategy. In order to see non-
classical results it is necessary to produce
entanglement between the players’ moves
● Initial state is the maximally entangled state
|> = (|00> + i|11>)/√2
13. Quantum Prisoner's Dilemma
● The final state is represented as following :
|ψf> = J†(UA ⊗UB) J |CC>
where J=exp(iγD' ⊗ D'/2), γ ∈ [0, π/2] is a real
parameter, UA and UB are respective strategies for
Alice and Bob.
● Expected Pay-off for Alice :
<$> = ACC|<ψf |CC>|2 + ACD|<ψf |CD>|2 + ADC|
<ψf |DC>|2 + ADD|<ψf |DD>|2
14. Quantum Prisoner's Dilemma
● The matrix representation of operators
corresponding to quantum strategies from this set is
given by U(,) = {( eicos(/2), sin(/2) ),
( -sin(/2), e-icos(/2) )}
● The strategies are :
C={(1,0),(0,1)} and D={(0,1),(-1,0)}
● γ is a measure for the game’s entanglement
17. Pay-Offs is what matters !!
● Assuming Bob chooses D'= U (π, 0), then
PA (θA , φA , , 0 ) = 5 |sin(φA ) cos(θA /2)| 2 +
|sin(θA /2)|2 <= 5 for θA = 0 and φA = /2
● Thus Alice’s best reply would be Q = U(0, /2) =
{(i,0),(0,-i)}
● While assuming Bob plays C'= U (0, 0) Alice’s best
strategy would be defection D'. Thus, there is no
dominant strategy left for Alice. The game being
symmetric, the same holds for Bob, i.e., D' ⊗ D' is
no longer an equilibrium in dominant strategies
19. Does the Prisoners escape the dilemma?
● It is interesting to see that Q ⊗ Q has the property to
be Pareto optimal , that is, by deviating from this
pair of strategies it is not possible to increase the
pay-off of one player without lessening the pay-off
of the other player. In the classical game only
mutual cooperation is Pareto optimal, but it is not an
equilibrium solution. One could say that by
allowing for quantum strategies the players
escape the dilemma .
20. Real Life Dilemmas !!
● Nuclear proliferation among nations: When a
nation tries to up its nuclear armory and sources
with the help of its more powerful allies, its rival
nations feels threatened and they too power up their
nuclear warfares and sources with powerful allies,
thus increasing tension between nations and
increasing possibility of nuclear war. Thus one
might speculate that Governments of nations using
Quantum strategies might even end the possibility of
a nuclear disaster in near future, but then
“everything” needs to be “Quantum” !!!
21. Real Life Dilemmas !!
This one's from “Batman-Dark Knight” : Joker
planted bombs on the 2 ferries where the triggers for
the bombs were given to the opposite parties. The
classical Nash equilibrium strategy would lead the 2
parties to trigger the bombs simulteneously thus
killing everybody. But in the movie they might have
figured out the “Quantum strategy” to co-operate
thus saving all of them. One might think “Quantum
strategies” as the most “socially acceptable” or
“near conscience” but wait till you have seen the
opposite face of the “coin”.
22. Real Life Dilemmas !!
● Breakdown of talks at the Climate change Summit at
Copenhagen: Rich nations having larger number of
industries are emmitting larger amount of CO2 in the
atmosphere. But only developing nations trying to build up
its commercial and industrial economy are asked to cut
down CO2 emmision. Such nations felt that the rich are
trying to suppress them down and they deny to decrease
CO2 emmision from factories etc. and thus talks broke
down. Defection( increased release of CO2 by all nations)
seemed the Nash equilibrium strategy compared to
Cooperation(decreased release of CO2 by all nations). Thus
a “Quantum World” should be the paradise or the heaven to
live in.
24. Should you exchange doors ?
● The answer is yes if you are a rational person !
● You win 2/3 of the time you exchange the doors and
lose 1/3 of the time !!
● From an information theoretic point of view, by
opening a door without a prize Monty has given
information about where the prize is. Let's see how?
25. Should you exchange doors ?
● The probability of originally choosing a goat is 2/3
and the probability of originally choosing the car is
1/3. Once Monty Hall has removed a "goat door,"
the contestant who chose the door with a goat
behind it will necessarily win the car, and the
contestant who originally chose the car will
necessarily "win" the goat. Because the chances are
2/3 of being a contestant who originally chose a
goat, probability will always favor switching
choices.
27. Quantum Monty Hall !!
● In our quantum version of the game let us call the
host as Alice and player as Bob.
● There is one quantum particle and three boxes |0 > ,
|1> , and |2>
● The state of the system can be expressed as
|> = |oba>
where a = Alice’s choice of box( prize door ),
b =Bob’s choice of box, and o = the box that has
been opened
28. Quantum Monty Hall !!
● The final state of the system is
|f> = (S' cos + N' sin )O'(I' B' A')|i>
● Where A' Alice’s choice operator or strategy, B'
Bob’s initial choice operator or initial strategy, O'
the opening box operator, S' Bob’s switching
operator, N' Bob’s not switching operator, I' the
identity operator, and = [0,/2]
29. Quantum Monty Hall !!
The open box operator is a unitary operator that can
be written as :
O' = ∑ijkl |∈ijk| |njk><ljk| + ∑jk |mjj><ljj|
● where |∈ijk| = 1 if i,j,k are different else 0.
m = (j+l+1) (mod 3) and n = (i+l)(mod 3).
● The first term considers the cases where Bob
chooses the door not having the car behind it and the
second term considers the cases where Bob initially
chooses the door having the car inside it
30. Quantum Monty Hall !!
● The possible cases are :
|010> ⇒|210>, |020> ⇒|120>, |001> ⇒|201>, |
021> ⇒|021>, |002> ⇒|102>, |012> ⇒|012>
● Thus the operator should be |210>< 010| +
|120>< 020| + |201>< 001| + |021>< 021| +
|102>< 002| + |012><012| to introduce unitarity we
use the complete operator ∑ijkl |∈ijk| |njk><ljk|
31. Quantum Monty Hall !!
● Bob's switch operator can be written as :
S' = ∑ijkl |∈ijk| |ikk><ijk| + ∑ji |imj><ijj| m=(3-i-j)
● The possible transformations we consider as
probable :
|120> ⇒|100>, |100> ⇒|120>, |011> ⇒|021>, |201>
⇒|211>, |021> ⇒|011>, |122> ⇒|102>, |
022> ⇒|012>, |012> ⇒|022>, |102> ⇒|122>, |200>
⇒|210>, |210> ⇒|200>, |211> ⇒|201>.
32. “Expectation”
● Bob wins if his choice of door is same as the door
Alice chooses to keep the car. Thus expectation
value of Bob's win = <$B> = ∑ij |<ijj|f>|2
● Alice wins if Bob is incorrect, so
<$A> = 1 - ∑ij |<ijj|f>|2
33. Quantum Monty Hall !!
● Without entanglement and one of Alice or Bob
applying the identity operator we get back the
classical case where Bob wins with 2/3 probability if
he switches doors.
● Consider the case with maximum entanglement
The initial state is
|i> = |0> (1/3)(|00> + |11> + |22>)
35. Quantum Monty Hall !!
● If now Alice chooses an unitary operator whose
diagonal element all have absolute value (1/ 2) and
off-diagonal elements have absolute value (1⁄2)
then :
<$B> = (1⁄2) sin2 + (1⁄2) cos2 hence payoff for
Bob if he switches = 1⁄2 .
36. Is the Game Fair Now ?
● For the Monty Hall game where both participants
have access to quantum strategies, maximal
entanglement of the initial states produces the same
payoffs as the classical game. That is, for the Nash
equilibrium strategy the player, Bob, wins two-thirds
of the time by switching boxes. If the host, Alice,
has access to a quantum strategy while Bob does
not, the game is fair, since Alice can adopt a strategy
with an expected payoff of 1/2 for each person,
while if Bob has access to a quantum strategy and
Alice does not he can win all the time.
37. Simple Penny Flipover
● There are 2 players involved in the penny flip game.
Let's name them P and Q. P is to place a penny, head
up, in a box, whereupon they will take turns (Q, then
P, then Q) flipping the penny over (or not), without
being able to see it. Q wins if the penny is head up
when they open the box
● Q
---- NN NF FN FF
P
N -1 1 1 -1
F 1 -1 -1 1
38. Simple Penny Flipover
● Suppose P doesn’t flip the penny over. Then if Q
flips it over an even number of times, P loses.
Similarly, if P flips the penny over, then if Q flips it
over only once, P loses. Thus PQ penny flipover has
no deterministic solution , no deterministic Nash
equilibrium : there is no pair of pure strategies, one
for each player, such that neither player improves
his result by changing his strategy while the other
player does not.
39. Simple Penny Flipover
● Since this is a two-person zero-sum strategic game
with only a finite number of strategies, there is a
probabilistic solution: It is easy to check that the
pair of mixed strategies consisting of P flipping the
penny over with probability 1⁄2 and Q playing each
of his four strategies with probability 1⁄4 is a
probabilistic Nash equilibrium: Neither player can
improve his expected payoff (which is 0 in this case)
by changing the probabilities with which he plays
each of his pure strategies while the other player
does not.
40. Simple Penny Flipover
● In the classical case both P and Q has a 1⁄2
probability of winning the game but if Q adopts a
quantum strategy then she will win with a
probability of 1
● |0> = |H> then
Q: |1> = H|0> = (1/2)(|H> +|T>) then
P(mixed classical strategy) : U= pF + (1-p)N,
|2> = U|1> = (1/2)(|H> + |T>), then again
Q: |3> = H|2> = |H>
41. Penny Flipover Applications
● This strategy is same as that of the game between
the oracle and the Grover's algorithm:
● In the problem of searching a database of size N, the
locations in the database correspond to pure
strategies. The oracle can be thought of as the player
P in the game who uses a mixed strategy to frustate
our search for an item at some specified location.
While the Grover's algorithm represents the player
Q who uses quantum strategy.
42. Penny Flipover Applications
● Even the Shor's algorithm can be interpreted as a
penny flipover game between a Quantum player and
a classical mixed strategist. After we apply the
inverse Quantum Fourier Transform, we measure a
certain value as the output measurement, then we
use classical continued fraction to find out the
period accurately with some probability. The
continued fraction implementation can be thought of
as the player P who uses mixed strategy to produce a
correct result with some probability.
43. Penny Flipover
● One might ask what if player P also uses a Quantum
strategy?
● In the penny flipover game P using the Quantum
operator U = √p X + ie- (1-p) Z where X is the
Pauli NOT gate and is the phase, would produce
the same result as before with Q winning with
probability of 1.
44. Penny Flipover
● Theorem : A two person zero sum game need not
have a (quantum, quantum) equilibrium.
● Proof : Let us assume that the quantum strategies
[(U2),(U1,U3)] is a (quantum, quantum) equilibrium.
Suppose that U3 U2 U1 |H> |H>. Then Q can
improve his expected payoff to 1 by changing his
strategy U3 to U1-1U2-1 which is unitary. Also suppose
U3 U2 U1 |H> |T> then P can improve his
expected payoff to 1 by changing his strategy U 2 to
U3-1XU1-1 which is also unitary.
45. Concluding Remarks
● One might speculate that game theoretic perspective
will suggest new possibilities for efficient quantum
algorithms.
46. Concluding Remarks
● It may be too soon to say that Quantum game theory
and quantum strategies are going to be the future of
decision making in fields like Finance, Marketing,
Adminstrative Policies, Quantum Algorithms,
Quantum communication(cryptography) and
everyday life decision processess, given that
efficient hardware implementation of quantum
computation is still an uphill task with the noise and
decoherence effects playing their parts
47. Still a Hope !!
● The day when the Quantum error correction codes
becomes so efficient that all noises and
decoherences can be cancelled out, “Quantum” will
be the order of the day, and the world will take the
next leap forward changing gears from the
“Classical” to “Quantum”. I strongly believe that the
day is not far away and it will change the whole
world, “Logic and reasoning will dominate over
emotions and feelings”.