SlideShare a Scribd company logo
1 of 12
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018
DOI:10.5121/ijcsit.2018.10201 1
THE EFFECT OF SEGREGATION IN NON-
REPEATED PRISONER'S DILEMMA
Thomas Nordli
University of South-Eastern Norway, Norway
ABSTRACT
This article consolidates the idea that non-random pairing can promote the evolution of cooperation in a
non-repeated version of the prisoner’s dilemma. This idea is taken from[1], which presents experiments
utilizing stochastic simulation. In the following it is shown how the results from [1] is reproducible by
numerical analysis. It is also demonstrated that some unexplained findings in [1], is due to the methods
used.
KEYWORDS
Evolution, cooperation, segregation, prisoner’s dilemma.
1. INTRODUCTION
The problem of how cooperation can emerge in a population dominated by asocial behavior, is
addressed by Axelrod and Hamilton in [2]. To answer this, they use clustering in a game of
repeated prisoner’s dilemma. It is called repeated because the players are given the possibility to
play several rounds against the same opponent and the ability to remember the previous action of
each opponent. This repetition together with a limited amount of memory give the players the
opportunity to reciprocate. To model clustering they manipulate the probability of meeting an
opponent with similar strategy the pairing is thus non-random. Axelrod and Hamilton found:
Given conditions highly favoring cooperation in the long run, a low degree of clustering is
sufficient for cooperation to survive. In [1] it were reported that several others (e.g. [3], [4], [5])
previously had been dealing with this idea, and that the work in [5] were the most similar.
The paper [1] goes further and argues that this may happen even in a non-repeating prisoner’s
dilemma where there are no possibilities for reciprocation. The players aka agents are given two
possible strategies: always cooperate (applied by the cooperators) and always defect (applied by
the defectors). By a simulated evolution, it is demonstrated that cooperation will prosper given
certain initial parameter values. The parameters being (i) degree of clustering aka segregation,
and (ii) initial fraction of cooperators. The paper also explores how variations on these parameters
affect the dynamics of the simulated evolution and presents some findings of which some are
unexplained.
One unexplained finding in [1] appears in an experiment presented as an initial benchmark
without clustering. The share of cooperators starts with 90% but decreases fast almost linear. In
the fourth generation, it reaches about 50% and the drop stops temporary. During the following
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018
2
generations — about ten — the share fluctuates around this level. This fluctuation period is called
a plateau. After the plateau, the rapid decline continues until the total extinction of the
cooperators.
A second unexplained finding appears in table 1 in [1] that presents different convergence ratios
for cooperators and defectors on varying values on the two parameters segregation and initial
fraction of cooperators. In this table three distinct regions appear: One region where no
cooperators survive (region α), a second where both cooperators and defectors survive (region β)
and a third where no defectors survive (region γ). It is remarked that a segregation parameter
value of 0.5 (50%) works as a crossover point: To end up with cooperators exclusively, the initial
segregation parameter value has to be set above this point (region γ). If the value is set below this,
both types of players may sustain (region α and β). If the segregation parameter is set to this
crossover point (or nearby), the simulation needs considerably more generations to converge. The
paper [1] gives no explanation of neither the formation of these regions nor why the crossover
point falls at 0.5.
The following two sections will introduce details from [1]: The model used (section 2. The
Model) and the simulation algorithm that implements this model (section 3. The Simulation
Algorithm). Section 4. The Numerical Analysis reproduces its results by numerical analysis.
Then two sections follow dealing with the above-mentioned unexplained findings: The three
regions (section 5. The three regions) and the choice of selection algorithm and its parameter
setting (section 6. Changing a Parameter in the Algorithm). Finally a conclusion is made in
section 7. Conclusion.
2. THE MODEL
This section explains the model used in [1].
The segregation is modelled as in [5] with one exception: The players are not given the ability to
remember any previous meetings. Without memory, reciprocal strategies are not possible. Thus,
only the two following strategies are used: (i) always cooperate and (ii) always defect. The model
is based on a classical prisoner’s dilemma where the players receive a payoff of either a, b, c or d
where a > b > c > d. When a defector meets a cooperator, the defector gets a and the cooperator
gets d. When two defectors meet, they both get c. And finally if two cooperators meet, each
receive b. This is illustrated in table1.
Table 1: The payoffs in the Prisoner's Dilemma where a > b > c > d.
2.1 THE PARAMETERS
Two parameters, proportion of cooperators (named p) and degree of randomness (named r) act on
the model. Each of these parameters vary from 0 to 1. An overview of these parameters are
shown in table 2.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018
3
The first parameter, proportion of cooperators in the population, is given as p, where 0 ≤ p ≤ 1,p
∈R. Here 0 means that there are no cooperators and 1 means that the population consists
exclusively of cooperators. As there are only one alternative strategy, namely defecting, the share
of defectors will always be 1 − p.
The second parameter is the degree of randomness in the process of matching pairs of agents. It is
indicated by a parameter r, where 0 ≤ r ≤ 1,r ∈R. This parameter is also called segregation
parameter. When r is 0 there is no segregation, and when r is 1 there is full segregation. In full
segregation, the meeting opponents always have the same strategy.
Table 2: The parameters of the model
2.2 MODELLING SEGREGATION
The probability of a cooperating agent meeting another cooperating agent is modelled as r +
(1−r)p and the probability of a defecting agent meeting another defecting agent as r +(1 − r)(1 −
p). If we need to calculate the probability of meeting an opponent with a different strategy one
simply have to subtract these expressions from 1. This is summarized in in table 3.
Table 3: Modelling segregation
3. THE SIMULATION ALGORITHM
This section introduce the simulation algorithm presented in [1]. A refined algorithm, including
details of the implementation necessary to understand the analysis done later in this document, is
also included here. The evolution model is implemented as a stochastic agent based simulation.
In this simulation each player is represented by an agent and the players’ opponents are randomly
picked (line 4 in algorithm 1).
The algorithm found in [1] is listed in algorithm 1. The choice of selection strategy is not
documented in [1], but because I participated in the initiation of the project, I know that that
truncation selection, with a truncation threshold of 0.5, was used. This was also confirmed (by
personal communication) after publication (in 2013-2014). An extended version of the algorithm,
including details of the selection algorithm, is shown in algorithm2.
International Journal of Computer Science & Information
Algorithm 1 as documented in [1].
1: Initialize random population of players
2: For all players: Set payoff =0
3: while not stop do
4: Choose pairs for playing
5: For all players: Calculate payoff
6: Select players for surviving
7: Duplicate selected players with payoff
8: For all players: Set payoff =0
9: end while
Algorithm 2 elaborating details on the selection strategy.
1: Initialize random population of players
2: For all players: Set payoff =0
3: while not stop do
4: Choose pairs for playing
5: For all players: Calculate payoff
6: Sort the agents by payoff
7: Truncate the worst half of population
8: Replace the truncated players by duplicating the remaining ones,
9: For all players: Set payoff =0
10: end while
When using truncation selection, the individuals will be sorted by decreasing payoff. Duplicates
of the players above the truncation threshold, given as
done by cloning the survivors
Truncation selection is also described in [6] and [7].
As the truncation threshold used in [1] is 0.5, the population is cut in two equal sized halves, and
the best half will be duplicated. The duplicates will repla
algorithmically in algorithm 2, where line 6 and 7 from algorithm 1 are replaced with line 6, 7
and 8 as seen in algorithm 2.
4. THE NUMERICAL ANALYSIS
The results presented in [1] where found by stochastic simulation. Th
these results by numerical analysis. The proportion of cooperators in a following generation will
be estimated by a function of the two parameters, (
reproduction of the results appears wh
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018
as documented in [1].
1: Initialize random population of players
2: For all players: Set payoff =0
pairs for playing
For all players: Calculate payoff
Select players for surviving
Duplicate selected players with payoff>0
For all players: Set payoff =0
elaborating details on the selection strategy.
1: Initialize random population of players
2: For all players: Set payoff =0
Choose pairs for playing
For all players: Calculate payoff
payoff
Truncate the worst half of population
Replace the truncated players by duplicating the remaining ones, with payoff > 0.
For all players: Set payoff =0
When using truncation selection, the individuals will be sorted by decreasing payoff. Duplicates
of the players above the truncation threshold, given as s, will then replace those below. This is
done by cloning the survivors times, which in this case gives
Truncation selection is also described in [6] and [7].
As the truncation threshold used in [1] is 0.5, the population is cut in two equal sized halves, and
the best half will be duplicated. The duplicates will replace the worst half. This is shown
algorithmically in algorithm 2, where line 6 and 7 from algorithm 1 are replaced with line 6, 7
NALYSIS
The results presented in [1] where found by stochastic simulation. This section will reproduce
these results by numerical analysis. The proportion of cooperators in a following generation will
be estimated by a function of the two parameters, (p and r) as expressed in equation (1). The
reproduction of the results appears when iterating this equation.
p∗ = P (p,r)
Technology (IJCSIT) Vol 10, No 2, April 2018
4
with payoff > 0.
When using truncation selection, the individuals will be sorted by decreasing payoff. Duplicates
, will then replace those below. This is
time.
As the truncation threshold used in [1] is 0.5, the population is cut in two equal sized halves, and
ce the worst half. This is shown
algorithmically in algorithm 2, where line 6 and 7 from algorithm 1 are replaced with line 6, 7
is section will reproduce
these results by numerical analysis. The proportion of cooperators in a following generation will
) as expressed in equation (1). The
(1)
International Journal of Computer Science & Information
4.1 ESTIMATING NUMBER OF
The cooperators will be paid either
sum of qb and qd, where qb and q
shown in equation (2):
In the following let a, b, c and d
overview of the notation used in this section, is given in table 4.
When all the payoffs are calculated for one generation, the agents are sorted by payoff (line 6 in
algorithm 2). This will bring all
the ds at the bottom. Thus, for any
Each time a defector is being paid
When a cooperator gets d, a defector gets
cooperator meeting a defector is of course equal to the probability of a defector meeting a
cooperator.
Table 4: Overview
Since qd and qa always will be of equal size, they will always each be less or equal to
shown in equation (3). This means that as long as the truncation threshold is
will always stay below the threshold an
The cooperators in the population will therefore exclusively consist of the
To estimate the number of cooperators after the truncation we must only consider the portion of
qb that will end up above the truncation threshold. There are two cases that needs to be calculated
separately: (i) and (ii)
In the first case the better half will consist of
counted. As each of them is duplicated, this number is doubled, giving us
the better half will consist only of
agents in the upper half, we end up with the number of
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018
UMBER OF SURVIVING COOPERATORS
The cooperators will be paid either b or d. Their proportion, p, can therefore be calculated as the
qd is the portion of population getting paid b and d respectively, as
p = qb + qd
d denote the players that where paid a, b, c and d respectively. An
overview of the notation used in this section, is given in table 4.
When all the payoffs are calculated for one generation, the agents are sorted by payoff (line 6 in
of the as to the top, followed first by the bs, then by the
s at the bottom. Thus, for any d to survive, qd has to be greater than the truncation threshold.
Each time a defector is being paid a, a cooperator is paid d. The other way around is also true:
, a defector gets a. Intuitively we can see this as the probability of a
cooperator meeting a defector is of course equal to the probability of a defector meeting a
Table 4: Overview of notation used
always will be of equal size, they will always each be less or equal to
shown in equation (3). This means that as long as the truncation threshold is 0.5 or greater, the
will always stay below the threshold and none of them will ever survive to the next generation.
The cooperators in the population will therefore exclusively consist of the bs and their clones.
0 ≤ qd = qa ≤ 0.5
To estimate the number of cooperators after the truncation we must only consider the portion of
that will end up above the truncation threshold. There are two cases that needs to be calculated
and (ii) .
half will consist of a’s, b’s and c’s. Then all of the b
counted. As each of them is duplicated, this number is doubled, giving us 2qb. In the second case
the better half will consist only of a’s and b’s. If we subtract the a’s from the total n
agents in the upper half, we end up with the number of b’s. The difference will thus give
Technology (IJCSIT) Vol 10, No 2, April 2018
5
, can therefore be calculated as the
respectively, as
(2)
respectively. An
When all the payoffs are calculated for one generation, the agents are sorted by payoff (line 6 in
s, then by the cs and
has to be greater than the truncation threshold.
. The other way around is also true:
. Intuitively we can see this as the probability of a
cooperator meeting a defector is of course equal to the probability of a defector meeting a
always will be of equal size, they will always each be less or equal to 0.5, as
or greater, the ds
d none of them will ever survive to the next generation.
s and their clones.
(3)
To estimate the number of cooperators after the truncation we must only consider the portion of
that will end up above the truncation threshold. There are two cases that needs to be calculated
b’s should be
. In the second case
’s from the total number of
will thus give
International Journal of Computer Science & Information
the portion of b’s residing in the better half. This is multiplied by
giving us . Equation (4) shows how the estimation of the
forthcoming generation is modelled as a function of
4.2 ESTIMATING DISTRIBUTION OF
If we assume a big enough population, we can estimate how the different payments will be
distributed in the population, based on the probabilities in the model. In addition we will assume
that there is no restriction on how many times the agents can play in the same round. This is
possibly a simplification and may not model exactly the way the simulation was imp
[1], but the reproduction of their results indicates that such a deviation is negligible.
The probability of choosing a cooperator or a defector as the first agent is
respectively. To calculate the probability of the second agent (
multiply the probability of the first player with the second agent (given the first), the latter
probabilities we take from the model in [1] (as shown in table 3). The probabilities are
summarized in table 5.
If we assume a big enough population, the probabilities will be equal to the distribution of payoff
in the population. The proportion of players being paid
respectively, may thus be calculated using the table 5.
We will to use these expressions to substitute
table 5, but first we will simplify them.
r)p and (p)(r +(1 − r)p) becomes
Table 6: Distribution of Payment in Non
After the substitution of qa and q
difference equation that is a function of
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018
’s residing in the better half. This is multiplied by 2 to model the duplication,
. Equation (4) shows how the estimation of the share of cooperators in a
forthcoming generation is modelled as a function of qa and qb.
ISTRIBUTION OF PAYOFF
If we assume a big enough population, we can estimate how the different payments will be
population, based on the probabilities in the model. In addition we will assume
that there is no restriction on how many times the agents can play in the same round. This is
possibly a simplification and may not model exactly the way the simulation was imp
[1], but the reproduction of their results indicates that such a deviation is negligible.
The probability of choosing a cooperator or a defector as the first agent is p
respectively. To calculate the probability of the second agent (i2) given the first (i1
multiply the probability of the first player with the second agent (given the first), the latter
probabilities we take from the model in [1] (as shown in table 3). The probabilities are
Table 5: Probability distribution
If we assume a big enough population, the probabilities will be equal to the distribution of payoff
in the population. The proportion of players being paid a, b, c or d, denoted qa
calculated using the table 5.
We will to use these expressions to substitute qa and qb in equation (4) by their equivalents from
table 5, but first we will simplify them. (1 − p)(1 − (r +(1 − r)(1 − p))) is rewritten as
becomes p(r +(1 − r)p). This is summarized in table 6.
Table 6: Distribution of Payment in Non-random Environment
qb with the expressions from table 6 in equation (4), we get a new
difference equation that is a function of p and r. This is shown in equation (5).
Technology (IJCSIT) Vol 10, No 2, April 2018
6
to model the duplication,
share of cooperators in a
(4)
If we assume a big enough population, we can estimate how the different payments will be
population, based on the probabilities in the model. In addition we will assume
that there is no restriction on how many times the agents can play in the same round. This is
possibly a simplification and may not model exactly the way the simulation was implemented in
p and 1 − p
1), we have to
multiply the probability of the first player with the second agent (given the first), the latter
probabilities we take from the model in [1] (as shown in table 3). The probabilities are
If we assume a big enough population, the probabilities will be equal to the distribution of payoff
a, qb, qc or qd
in equation (4) by their equivalents from
is rewritten as (1 − p)(1 −
with the expressions from table 6 in equation (4), we get a new
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018
7
4.3 ITERATING
As we are interested in the iterated version of the prisoner’s dilemma, we use an algorithm that
loops the difference equation (5), which is implemented as the function PC(p,r).
This function, PC(p,r), returns p∗. Initial values are set in the two parameters, p and r, for the first
round of the loop round number 0. A variable named n is used to count the number of rounds. In
the subsequent rounds, r is set to the value returned by PC in the previous round. Only p will
change during the run. This algorithm is repeated until p reaches 0 or 1. If this does not happens
within max iterations (n > max), the proportion of cooperators have stopped changing from
generation (round) to generation, and no further repetitions are done. This is presented in the lines
3 to 9 in algorithm 4.
4.4. REPRODUCING THE RESULT FROM [1]
To reproduce the results from [1] (reprinted as figure 1), algorithm 3 has to be run for all the
combinations of p and r as they vary from 0.1 to 0.9 (with the step size of 0.1), as presented in
algorithm 4.
The results of running this algorithm are shown in table 7. It clearly shows correspondence with
the results of the simulation reported in [1]. In both the simulation and the calculation, three
regions appear in the tables, as indicated in figure 2(a).
Algorithm 3 Iterating the prisoner’s dilemma using numerical methods
n ← 0 {counting rounds, starting at 0}
pn ← some initial value
r ← some initial value repeat
pn+1 ← PC(pn,r) {equation (5)}
n ← n +1
until p = 0 or p = 1 or n >max
return
pn
Algorithm 4 Reproducing the results from the simulation
1: for p0 = 0.1 to 0.9 (step size: 0.1) do
2: for r = 0.1 to 0.9 (step size: 0.1) do
3: tp0r ← Algorithm 3(p0,r) {store resulting p in table 7}
4: end for
5: end for
International Journal of Computer Science & Information
5. THE THREE REGIONS
This section will give an intuitive explanation of how three regions,
To get an intuitive understanding of why these three regions shown in figure 2(a) appear, we take
a closer look at how the share of cooperators change from generation to generation. By
comparing the values of p in two following generations, we get a value
cooperators given p and r. We call this the growth rate of cooperators and de ne it as
table 8 the signs of these growth rates are shown.
By looking at this table, it becomes clear how the three regions shown in fi
Figure 1: Reprint of results presented in [1].
Table 7: Final proportion of cooperators as a function of
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018
EGIONS
This section will give an intuitive explanation of how three regions, α, βand γ, appears.
To get an intuitive understanding of why these three regions shown in figure 2(a) appear, we take
a closer look at how the share of cooperators change from generation to generation. By
in two following generations, we get a value representing the growth of
cooperators given p and r. We call this the growth rate of cooperators and de ne it as
table 8 the signs of these growth rates are shown.
By looking at this table, it becomes clear how the three regions shown in figure 2(a) are formed.
Figure 1: Reprint of results presented in [1].
Table 7: Final proportion of cooperators as a function of r and p, with a truncation threshold of
Technology (IJCSIT) Vol 10, No 2, April 2018
8
, appears.
To get an intuitive understanding of why these three regions shown in figure 2(a) appear, we take
a closer look at how the share of cooperators change from generation to generation. By
representing the growth of
cooperators given p and r. We call this the growth rate of cooperators and de ne it as pn+1 − pn. In
gure 2(a) are formed.
, with a truncation threshold of
International Journal of Computer Science & Information
(a) Truncation threshold:
Figure 2: Three regions, named
The area where the cooperators are driven to extinction, the corresponding area have negative
growth. In the following, this region is referred to as area
upwards in the table from generation to generation, until
In addition, the second area β, is divided in two, one negative and one positive. The negative part
is below the positive part. Players in the negat
getting positive growth rate, and switch direction. This again gives them a negative rate. In the
stochastic simulation from [1] the rate will oscillate like this and converge to a stable situation
containing both cooperators and defectors.
In the last area called γ, where the defectors are wiped out, the growth rate is positive. Here the
players will continue downwards in the table until
6. CHANGING A PARAMETER
This section will investigate the effect of lowering the truncation threshold below the crossover
point found in [1].
As indicated above, the choice of 0.5 as a truncation threshold results in that no d
from one generation to the other, in the numerical analysis.
The simulation done in [1] has a stochastic element which is absent from the numerical analysis
which is completely deterministic. It is established above, that the numerical analysis reproduce
the main results of the simulation in spite of the lack of randomness.
Choosing a truncation threshold below 0.5 will make some of the d
The equation is now changed so that only the better third of the population is considered and
tripled. Everything else is the same. The modified equation is shown in equation (6).
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018
(a) Truncation threshold: (b) Truncation threshold:
Figure 2: Three regions, named α, β and γ, appears in the results
The area where the cooperators are driven to extinction, the corresponding area have negative
growth. In the following, this region is referred to as area α.The players in this area will move
upwards in the table from generation to generation, until p reach zero.
, is divided in two, one negative and one positive. The negative part
is below the positive part. Players in the negative part will rise until they reach the
getting positive growth rate, and switch direction. This again gives them a negative rate. In the
stochastic simulation from [1] the rate will oscillate like this and converge to a stable situation
taining both cooperators and defectors.
, where the defectors are wiped out, the growth rate is positive. Here the
players will continue downwards in the table until p is 1, and no defectors are left.
ARAMETER IN THE ALGORITHM
This section will investigate the effect of lowering the truncation threshold below the crossover
As indicated above, the choice of 0.5 as a truncation threshold results in that no d-s will survive
the other, in the numerical analysis.
The simulation done in [1] has a stochastic element which is absent from the numerical analysis
which is completely deterministic. It is established above, that the numerical analysis reproduce
simulation in spite of the lack of randomness.
Choosing a truncation threshold below 0.5 will make some of the d-s survive even in the analysis.
The equation is now changed so that only the better third of the population is considered and
Everything else is the same. The modified equation is shown in equation (6).
Technology (IJCSIT) Vol 10, No 2, April 2018
9
The area where the cooperators are driven to extinction, the corresponding area have negative
The players in this area will move
, is divided in two, one negative and one positive. The negative part
positive part,
getting positive growth rate, and switch direction. This again gives them a negative rate. In the
stochastic simulation from [1] the rate will oscillate like this and converge to a stable situation
, where the defectors are wiped out, the growth rate is positive. Here the
This section will investigate the effect of lowering the truncation threshold below the crossover
s will survive
The simulation done in [1] has a stochastic element which is absent from the numerical analysis
which is completely deterministic. It is established above, that the numerical analysis reproduce
s survive even in the analysis.
The equation is now changed so that only the better third of the population is considered and
Everything else is the same. The modified equation is shown in equation (6).
International Journal of Computer Science & Information
Table 8: Sign of growth rate as a function of
Table 9: Final proportion of cooperators as a function of
6.7 TRUNCATION THRESHOLD
Figure 3(a) corresponds to the benchmark case without cooperation. This corresponds to figure 3
in [1]. Even when starting with 90% cooperators, they are quickly exterminated. We see
when using a truncation threshold of
threshold is set to .
The figures 3(b), 3(c) and 3(d), corresponds to the figures 4, 5 and 6 in [1] by having the same
values on r and p. Where the tr
matches the stochastic simulation. Setting the threshold to
as shown in figure 2(b), making all three of end up in area
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018
Table 8: Sign of growth rate as a function of r and p, with a truncation threshold of
Table 9: Final proportion of cooperators as a function of r and p, with a truncation threshold of
HRESHOLD : vs .
Figure 3(a) corresponds to the benchmark case without cooperation. This corresponds to figure 3
in [1]. Even when starting with 90% cooperators, they are quickly exterminated. We see
when using a truncation threshold of , the plateau is present, just as in [1], but absent when the
The figures 3(b), 3(c) and 3(d), corresponds to the figures 4, 5 and 6 in [1] by having the same
. Where the truncation threshold is 0.5, the result of the numerical analysis
matches the stochastic simulation. Setting the threshold to makes changes to the three regions,
as shown in figure 2(b), making all three of end up in area β.
Technology (IJCSIT) Vol 10, No 2, April 2018
10
, with a truncation threshold of .
, with a truncation threshold of
Figure 3(a) corresponds to the benchmark case without cooperation. This corresponds to figure 3
in [1]. Even when starting with 90% cooperators, they are quickly exterminated. We see that
, the plateau is present, just as in [1], but absent when the
The figures 3(b), 3(c) and 3(d), corresponds to the figures 4, 5 and 6 in [1] by having the same
uncation threshold is 0.5, the result of the numerical analysis
makes changes to the three regions,
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018
11
(a) Numerical analysis with r =0.0, and p=0.9 (corresponds to figure 3 in [1].)
(b) Numerical analysis with r =0.3, and p=0.2 (corresponds to figure 4 in [1].)
(c) Numerical analysis with r =0.3, and p=0.5 (corresponds to figure 5 in [1].)
(d) Numerical analysis with r =0.5, and p=0.3 (corresponds to figure 6 in [1].)
Figure 3: Visualizing the result of changing the truncation threshold.
International Journal of Computer Science & Information
Table 10: Sign of growth rate as a function of
7. CONCLUSION
This paper support the conclusion from [1] that segregation plays a considerable role in evolution
of cooperation in a game of Prisoner’s Dilemma
reciprocity. However, it argues that the choice of truncation selection
together with a truncation threshold of 0.5 is the cause of the plateau and crossover point from
[1]. It also explains the formation of the three regions.
REFERENCES
[1] J. Reiersen and N. Bouhmala, Matching structure and the evolut
dilemma, International journal of computer science & information technology (IJCSIT), vol. 5, pp.
109 119, Aug. 2013.
[2] R. Axelrod and W. D. Hamilton, The evolution of cooperation, Science, vol. 211, no. 4489, pp. 13
1396, 1981.
[3] W. D. Hamilton, The genetical evolution of social behaviour. ii, Journal of theoretical biology, vol. 7,
no. 1, pp. 17 52, 1964.
[4] M. A. Nowak, Five rules for the evolution of cooperation, science, vol. 314, no. 5805, pp. 1560 1563,
2006.
[5] R. Boyd and P. J. Richerson, The evolution of reciprocity in sizable groups, Journal of theoretical
Biology, vol. 132, no. 3, pp. 337 356, 1988.
[6] D. Thierens and D. Goldberg, Convergence models of genetic algorithm selection schemes, in
Parallel Problem Solving from Nature PPSN III (Y. Davidor, H.
vol. 866 of Lecture Notes in Computer Science, pp. 119 129, Springer Berlin Heidelberg, 1994.
[7] H. M hlenbein and D. Schlierkamp
continuous parameter optimization, Evolutionary computation, vol. 1, no. 1, pp. 25 49, 1993.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018
Table 10: Sign of growth rate as a function of r and p, with a truncation threshold of
support the conclusion from [1] that segregation plays a considerable role in evolution
of cooperation in a game of Prisoner’s Dilemma, in spite of the absence of repeated action and
reciprocity. However, it argues that the choice of truncation selection as selection strategy
together with a truncation threshold of 0.5 is the cause of the plateau and crossover point from
[1]. It also explains the formation of the three regions.
, Matching structure and the evolution of cooperation in the prisoner’s
dilemma, International journal of computer science & information technology (IJCSIT), vol. 5, pp.
R. Axelrod and W. D. Hamilton, The evolution of cooperation, Science, vol. 211, no. 4489, pp. 13
W. D. Hamilton, The genetical evolution of social behaviour. ii, Journal of theoretical biology, vol. 7,
M. A. Nowak, Five rules for the evolution of cooperation, science, vol. 314, no. 5805, pp. 1560 1563,
R. Boyd and P. J. Richerson, The evolution of reciprocity in sizable groups, Journal of theoretical
Biology, vol. 132, no. 3, pp. 337 356, 1988.
D. Thierens and D. Goldberg, Convergence models of genetic algorithm selection schemes, in
llel Problem Solving from Nature PPSN III (Y. Davidor, H.-P. Schwefel, and R. M nner, eds.),
vol. 866 of Lecture Notes in Computer Science, pp. 119 129, Springer Berlin Heidelberg, 1994.
H. M hlenbein and D. Schlierkamp-Voosen, Predictive models for the breeder genetic algorithm i.
continuous parameter optimization, Evolutionary computation, vol. 1, no. 1, pp. 25 49, 1993.
Technology (IJCSIT) Vol 10, No 2, April 2018
12
, with a truncation threshold of .
support the conclusion from [1] that segregation plays a considerable role in evolution
peated action and
as selection strategy
together with a truncation threshold of 0.5 is the cause of the plateau and crossover point from
ion of cooperation in the prisoner’s
dilemma, International journal of computer science & information technology (IJCSIT), vol. 5, pp.
R. Axelrod and W. D. Hamilton, The evolution of cooperation, Science, vol. 211, no. 4489, pp. 1390
W. D. Hamilton, The genetical evolution of social behaviour. ii, Journal of theoretical biology, vol. 7,
M. A. Nowak, Five rules for the evolution of cooperation, science, vol. 314, no. 5805, pp. 1560 1563,
R. Boyd and P. J. Richerson, The evolution of reciprocity in sizable groups, Journal of theoretical
D. Thierens and D. Goldberg, Convergence models of genetic algorithm selection schemes, in
P. Schwefel, and R. M nner, eds.),
vol. 866 of Lecture Notes in Computer Science, pp. 119 129, Springer Berlin Heidelberg, 1994.
he breeder genetic algorithm i.
continuous parameter optimization, Evolutionary computation, vol. 1, no. 1, pp. 25 49, 1993.

More Related Content

What's hot

Stability criterion of periodic oscillations in a (16)
Stability criterion of periodic oscillations in a (16)Stability criterion of periodic oscillations in a (16)
Stability criterion of periodic oscillations in a (16)Alexander Decker
 
HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY
HOW TO FIND A FIXED POINT IN SHUFFLE  EFFICIENTLYHOW TO FIND A FIXED POINT IN SHUFFLE  EFFICIENTLY
HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLYIJNSA Journal
 
Cpt sampling theory revision sheet
Cpt sampling theory revision sheetCpt sampling theory revision sheet
Cpt sampling theory revision sheetVXplain
 
Factor analysis in R with Five Personality Survey Mini Sample
Factor analysis in R with Five Personality Survey Mini SampleFactor analysis in R with Five Personality Survey Mini Sample
Factor analysis in R with Five Personality Survey Mini SampleFangyaTan
 
Sociocast CF Benchmark
Sociocast CF BenchmarkSociocast CF Benchmark
Sociocast CF BenchmarkAlbert Azout
 
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular AutomataCost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automataijait
 
Application of Semiparametric Non-Linear Model on Panel Data with Very Small ...
Application of Semiparametric Non-Linear Model on Panel Data with Very Small ...Application of Semiparametric Non-Linear Model on Panel Data with Very Small ...
Application of Semiparametric Non-Linear Model on Panel Data with Very Small ...IOSRJM
 
Simulation Study of Hurdle Model Performance on Zero Inflated Count Data
Simulation Study of Hurdle Model Performance on Zero Inflated Count DataSimulation Study of Hurdle Model Performance on Zero Inflated Count Data
Simulation Study of Hurdle Model Performance on Zero Inflated Count DataIan Camacho
 
Data Mining using SAS
Data Mining using SASData Mining using SAS
Data Mining using SASTanu Puri
 
Chapter3 hundred page machine learning
Chapter3 hundred page machine learningChapter3 hundred page machine learning
Chapter3 hundred page machine learningmustafa sarac
 
Hepatic injury classification
Hepatic injury classificationHepatic injury classification
Hepatic injury classificationZheliang Jiang
 
Discriminant Analysis-lecture 8
Discriminant Analysis-lecture 8Discriminant Analysis-lecture 8
Discriminant Analysis-lecture 8Laila Fatehy
 
Statistik 1 10 12 edited_anova
Statistik 1 10 12 edited_anovaStatistik 1 10 12 edited_anova
Statistik 1 10 12 edited_anovaSelvin Hadi
 
Solving linear programming model by simplex method
Solving linear programming model by simplex methodSolving linear programming model by simplex method
Solving linear programming model by simplex methodRoshan Kumar Patel
 
Chap13 additional topics in regression analysis
Chap13 additional topics in regression analysisChap13 additional topics in regression analysis
Chap13 additional topics in regression analysisJudianto Nugroho
 

What's hot (18)

Stability criterion of periodic oscillations in a (16)
Stability criterion of periodic oscillations in a (16)Stability criterion of periodic oscillations in a (16)
Stability criterion of periodic oscillations in a (16)
 
HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY
HOW TO FIND A FIXED POINT IN SHUFFLE  EFFICIENTLYHOW TO FIND A FIXED POINT IN SHUFFLE  EFFICIENTLY
HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY
 
Excel solver
Excel solverExcel solver
Excel solver
 
Cpt sampling theory revision sheet
Cpt sampling theory revision sheetCpt sampling theory revision sheet
Cpt sampling theory revision sheet
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Factor analysis in R with Five Personality Survey Mini Sample
Factor analysis in R with Five Personality Survey Mini SampleFactor analysis in R with Five Personality Survey Mini Sample
Factor analysis in R with Five Personality Survey Mini Sample
 
Sociocast CF Benchmark
Sociocast CF BenchmarkSociocast CF Benchmark
Sociocast CF Benchmark
 
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular AutomataCost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
 
Application of Semiparametric Non-Linear Model on Panel Data with Very Small ...
Application of Semiparametric Non-Linear Model on Panel Data with Very Small ...Application of Semiparametric Non-Linear Model on Panel Data with Very Small ...
Application of Semiparametric Non-Linear Model on Panel Data with Very Small ...
 
Simulation Study of Hurdle Model Performance on Zero Inflated Count Data
Simulation Study of Hurdle Model Performance on Zero Inflated Count DataSimulation Study of Hurdle Model Performance on Zero Inflated Count Data
Simulation Study of Hurdle Model Performance on Zero Inflated Count Data
 
Data Mining using SAS
Data Mining using SASData Mining using SAS
Data Mining using SAS
 
Chapter3 hundred page machine learning
Chapter3 hundred page machine learningChapter3 hundred page machine learning
Chapter3 hundred page machine learning
 
Hepatic injury classification
Hepatic injury classificationHepatic injury classification
Hepatic injury classification
 
Statsci
StatsciStatsci
Statsci
 
Discriminant Analysis-lecture 8
Discriminant Analysis-lecture 8Discriminant Analysis-lecture 8
Discriminant Analysis-lecture 8
 
Statistik 1 10 12 edited_anova
Statistik 1 10 12 edited_anovaStatistik 1 10 12 edited_anova
Statistik 1 10 12 edited_anova
 
Solving linear programming model by simplex method
Solving linear programming model by simplex methodSolving linear programming model by simplex method
Solving linear programming model by simplex method
 
Chap13 additional topics in regression analysis
Chap13 additional topics in regression analysisChap13 additional topics in regression analysis
Chap13 additional topics in regression analysis
 

Similar to THE EFFECT OF SEGREGATION IN NONREPEATED PRISONER'S DILEMMA

2014-mo444-final-project
2014-mo444-final-project2014-mo444-final-project
2014-mo444-final-projectPaulo Faria
 
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...IJITCA Journal
 
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...IJITCA Journal
 
A Novel Hybrid Voter Using Genetic Algorithm and Performance History
A Novel Hybrid Voter Using Genetic Algorithm and Performance HistoryA Novel Hybrid Voter Using Genetic Algorithm and Performance History
A Novel Hybrid Voter Using Genetic Algorithm and Performance HistoryWaqas Tariq
 
Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)IJCI JOURNAL
 
AN IMPROVED ITERATIVE METHOD FOR SOLVING GENERAL SYSTEM OF EQUATIONS VIA GENE...
AN IMPROVED ITERATIVE METHOD FOR SOLVING GENERAL SYSTEM OF EQUATIONS VIA GENE...AN IMPROVED ITERATIVE METHOD FOR SOLVING GENERAL SYSTEM OF EQUATIONS VIA GENE...
AN IMPROVED ITERATIVE METHOD FOR SOLVING GENERAL SYSTEM OF EQUATIONS VIA GENE...Zac Darcy
 
An Improved Iterative Method for Solving General System of Equations via Gene...
An Improved Iterative Method for Solving General System of Equations via Gene...An Improved Iterative Method for Solving General System of Equations via Gene...
An Improved Iterative Method for Solving General System of Equations via Gene...Zac Darcy
 
An Improved Iterative Method for Solving General System of Equations via Gene...
An Improved Iterative Method for Solving General System of Equations via Gene...An Improved Iterative Method for Solving General System of Equations via Gene...
An Improved Iterative Method for Solving General System of Equations via Gene...Zac Darcy
 
Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...
Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...
Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...CSCJournals
 
OPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTION
OPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTIONOPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTION
OPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTIONsipij
 
Log Message Anomaly Detection with Oversampling
Log Message Anomaly Detection with Oversampling Log Message Anomaly Detection with Oversampling
Log Message Anomaly Detection with Oversampling gerogepatton
 
PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...
PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...
PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...IJMIT JOURNAL
 
PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...
PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...
PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...IJMIT JOURNAL
 
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...CSCJournals
 
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...Waqas Tariq
 
Dh3211231128
Dh3211231128Dh3211231128
Dh3211231128IJMER
 
COMPARATIVE ANALYSIS OF CONVENTIONAL PID CONTROLLER AND FUZZY CONTROLLER WIT...
COMPARATIVE  ANALYSIS OF CONVENTIONAL PID CONTROLLER AND FUZZY CONTROLLER WIT...COMPARATIVE  ANALYSIS OF CONVENTIONAL PID CONTROLLER AND FUZZY CONTROLLER WIT...
COMPARATIVE ANALYSIS OF CONVENTIONAL PID CONTROLLER AND FUZZY CONTROLLER WIT...IJITCA Journal
 
An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...
An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...
An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...IJRESJOURNAL
 

Similar to THE EFFECT OF SEGREGATION IN NONREPEATED PRISONER'S DILEMMA (20)

2014-mo444-final-project
2014-mo444-final-project2014-mo444-final-project
2014-mo444-final-project
 
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
 
Differential Evolution Algorithm with Triangular Adaptive Control Parameter f...
Differential Evolution Algorithm with Triangular Adaptive Control Parameter f...Differential Evolution Algorithm with Triangular Adaptive Control Parameter f...
Differential Evolution Algorithm with Triangular Adaptive Control Parameter f...
 
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
 
A Novel Hybrid Voter Using Genetic Algorithm and Performance History
A Novel Hybrid Voter Using Genetic Algorithm and Performance HistoryA Novel Hybrid Voter Using Genetic Algorithm and Performance History
A Novel Hybrid Voter Using Genetic Algorithm and Performance History
 
Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)
 
AN IMPROVED ITERATIVE METHOD FOR SOLVING GENERAL SYSTEM OF EQUATIONS VIA GENE...
AN IMPROVED ITERATIVE METHOD FOR SOLVING GENERAL SYSTEM OF EQUATIONS VIA GENE...AN IMPROVED ITERATIVE METHOD FOR SOLVING GENERAL SYSTEM OF EQUATIONS VIA GENE...
AN IMPROVED ITERATIVE METHOD FOR SOLVING GENERAL SYSTEM OF EQUATIONS VIA GENE...
 
AROPUB-IJPGE-14-30
AROPUB-IJPGE-14-30AROPUB-IJPGE-14-30
AROPUB-IJPGE-14-30
 
An Improved Iterative Method for Solving General System of Equations via Gene...
An Improved Iterative Method for Solving General System of Equations via Gene...An Improved Iterative Method for Solving General System of Equations via Gene...
An Improved Iterative Method for Solving General System of Equations via Gene...
 
An Improved Iterative Method for Solving General System of Equations via Gene...
An Improved Iterative Method for Solving General System of Equations via Gene...An Improved Iterative Method for Solving General System of Equations via Gene...
An Improved Iterative Method for Solving General System of Equations via Gene...
 
Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...
Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...
Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...
 
OPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTION
OPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTIONOPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTION
OPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTION
 
Log Message Anomaly Detection with Oversampling
Log Message Anomaly Detection with Oversampling Log Message Anomaly Detection with Oversampling
Log Message Anomaly Detection with Oversampling
 
PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...
PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...
PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...
 
PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...
PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...
PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, A...
 
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
 
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
 
Dh3211231128
Dh3211231128Dh3211231128
Dh3211231128
 
COMPARATIVE ANALYSIS OF CONVENTIONAL PID CONTROLLER AND FUZZY CONTROLLER WIT...
COMPARATIVE  ANALYSIS OF CONVENTIONAL PID CONTROLLER AND FUZZY CONTROLLER WIT...COMPARATIVE  ANALYSIS OF CONVENTIONAL PID CONTROLLER AND FUZZY CONTROLLER WIT...
COMPARATIVE ANALYSIS OF CONVENTIONAL PID CONTROLLER AND FUZZY CONTROLLER WIT...
 
An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...
An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...
An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...
 

More from AIRCC Publishing Corporation

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!AIRCC Publishing Corporation
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarAIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)AIRCC Publishing Corporation
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...AIRCC Publishing Corporation
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3AIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesAIRCC Publishing Corporation
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...AIRCC Publishing Corporation
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 

More from AIRCC Publishing Corporation (20)

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSIT
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information Technology
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...
 

Recently uploaded

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 

Recently uploaded (20)

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 

THE EFFECT OF SEGREGATION IN NONREPEATED PRISONER'S DILEMMA

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018 DOI:10.5121/ijcsit.2018.10201 1 THE EFFECT OF SEGREGATION IN NON- REPEATED PRISONER'S DILEMMA Thomas Nordli University of South-Eastern Norway, Norway ABSTRACT This article consolidates the idea that non-random pairing can promote the evolution of cooperation in a non-repeated version of the prisoner’s dilemma. This idea is taken from[1], which presents experiments utilizing stochastic simulation. In the following it is shown how the results from [1] is reproducible by numerical analysis. It is also demonstrated that some unexplained findings in [1], is due to the methods used. KEYWORDS Evolution, cooperation, segregation, prisoner’s dilemma. 1. INTRODUCTION The problem of how cooperation can emerge in a population dominated by asocial behavior, is addressed by Axelrod and Hamilton in [2]. To answer this, they use clustering in a game of repeated prisoner’s dilemma. It is called repeated because the players are given the possibility to play several rounds against the same opponent and the ability to remember the previous action of each opponent. This repetition together with a limited amount of memory give the players the opportunity to reciprocate. To model clustering they manipulate the probability of meeting an opponent with similar strategy the pairing is thus non-random. Axelrod and Hamilton found: Given conditions highly favoring cooperation in the long run, a low degree of clustering is sufficient for cooperation to survive. In [1] it were reported that several others (e.g. [3], [4], [5]) previously had been dealing with this idea, and that the work in [5] were the most similar. The paper [1] goes further and argues that this may happen even in a non-repeating prisoner’s dilemma where there are no possibilities for reciprocation. The players aka agents are given two possible strategies: always cooperate (applied by the cooperators) and always defect (applied by the defectors). By a simulated evolution, it is demonstrated that cooperation will prosper given certain initial parameter values. The parameters being (i) degree of clustering aka segregation, and (ii) initial fraction of cooperators. The paper also explores how variations on these parameters affect the dynamics of the simulated evolution and presents some findings of which some are unexplained. One unexplained finding in [1] appears in an experiment presented as an initial benchmark without clustering. The share of cooperators starts with 90% but decreases fast almost linear. In the fourth generation, it reaches about 50% and the drop stops temporary. During the following
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018 2 generations — about ten — the share fluctuates around this level. This fluctuation period is called a plateau. After the plateau, the rapid decline continues until the total extinction of the cooperators. A second unexplained finding appears in table 1 in [1] that presents different convergence ratios for cooperators and defectors on varying values on the two parameters segregation and initial fraction of cooperators. In this table three distinct regions appear: One region where no cooperators survive (region α), a second where both cooperators and defectors survive (region β) and a third where no defectors survive (region γ). It is remarked that a segregation parameter value of 0.5 (50%) works as a crossover point: To end up with cooperators exclusively, the initial segregation parameter value has to be set above this point (region γ). If the value is set below this, both types of players may sustain (region α and β). If the segregation parameter is set to this crossover point (or nearby), the simulation needs considerably more generations to converge. The paper [1] gives no explanation of neither the formation of these regions nor why the crossover point falls at 0.5. The following two sections will introduce details from [1]: The model used (section 2. The Model) and the simulation algorithm that implements this model (section 3. The Simulation Algorithm). Section 4. The Numerical Analysis reproduces its results by numerical analysis. Then two sections follow dealing with the above-mentioned unexplained findings: The three regions (section 5. The three regions) and the choice of selection algorithm and its parameter setting (section 6. Changing a Parameter in the Algorithm). Finally a conclusion is made in section 7. Conclusion. 2. THE MODEL This section explains the model used in [1]. The segregation is modelled as in [5] with one exception: The players are not given the ability to remember any previous meetings. Without memory, reciprocal strategies are not possible. Thus, only the two following strategies are used: (i) always cooperate and (ii) always defect. The model is based on a classical prisoner’s dilemma where the players receive a payoff of either a, b, c or d where a > b > c > d. When a defector meets a cooperator, the defector gets a and the cooperator gets d. When two defectors meet, they both get c. And finally if two cooperators meet, each receive b. This is illustrated in table1. Table 1: The payoffs in the Prisoner's Dilemma where a > b > c > d. 2.1 THE PARAMETERS Two parameters, proportion of cooperators (named p) and degree of randomness (named r) act on the model. Each of these parameters vary from 0 to 1. An overview of these parameters are shown in table 2.
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018 3 The first parameter, proportion of cooperators in the population, is given as p, where 0 ≤ p ≤ 1,p ∈R. Here 0 means that there are no cooperators and 1 means that the population consists exclusively of cooperators. As there are only one alternative strategy, namely defecting, the share of defectors will always be 1 − p. The second parameter is the degree of randomness in the process of matching pairs of agents. It is indicated by a parameter r, where 0 ≤ r ≤ 1,r ∈R. This parameter is also called segregation parameter. When r is 0 there is no segregation, and when r is 1 there is full segregation. In full segregation, the meeting opponents always have the same strategy. Table 2: The parameters of the model 2.2 MODELLING SEGREGATION The probability of a cooperating agent meeting another cooperating agent is modelled as r + (1−r)p and the probability of a defecting agent meeting another defecting agent as r +(1 − r)(1 − p). If we need to calculate the probability of meeting an opponent with a different strategy one simply have to subtract these expressions from 1. This is summarized in in table 3. Table 3: Modelling segregation 3. THE SIMULATION ALGORITHM This section introduce the simulation algorithm presented in [1]. A refined algorithm, including details of the implementation necessary to understand the analysis done later in this document, is also included here. The evolution model is implemented as a stochastic agent based simulation. In this simulation each player is represented by an agent and the players’ opponents are randomly picked (line 4 in algorithm 1). The algorithm found in [1] is listed in algorithm 1. The choice of selection strategy is not documented in [1], but because I participated in the initiation of the project, I know that that truncation selection, with a truncation threshold of 0.5, was used. This was also confirmed (by personal communication) after publication (in 2013-2014). An extended version of the algorithm, including details of the selection algorithm, is shown in algorithm2.
  • 4. International Journal of Computer Science & Information Algorithm 1 as documented in [1]. 1: Initialize random population of players 2: For all players: Set payoff =0 3: while not stop do 4: Choose pairs for playing 5: For all players: Calculate payoff 6: Select players for surviving 7: Duplicate selected players with payoff 8: For all players: Set payoff =0 9: end while Algorithm 2 elaborating details on the selection strategy. 1: Initialize random population of players 2: For all players: Set payoff =0 3: while not stop do 4: Choose pairs for playing 5: For all players: Calculate payoff 6: Sort the agents by payoff 7: Truncate the worst half of population 8: Replace the truncated players by duplicating the remaining ones, 9: For all players: Set payoff =0 10: end while When using truncation selection, the individuals will be sorted by decreasing payoff. Duplicates of the players above the truncation threshold, given as done by cloning the survivors Truncation selection is also described in [6] and [7]. As the truncation threshold used in [1] is 0.5, the population is cut in two equal sized halves, and the best half will be duplicated. The duplicates will repla algorithmically in algorithm 2, where line 6 and 7 from algorithm 1 are replaced with line 6, 7 and 8 as seen in algorithm 2. 4. THE NUMERICAL ANALYSIS The results presented in [1] where found by stochastic simulation. Th these results by numerical analysis. The proportion of cooperators in a following generation will be estimated by a function of the two parameters, ( reproduction of the results appears wh International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018 as documented in [1]. 1: Initialize random population of players 2: For all players: Set payoff =0 pairs for playing For all players: Calculate payoff Select players for surviving Duplicate selected players with payoff>0 For all players: Set payoff =0 elaborating details on the selection strategy. 1: Initialize random population of players 2: For all players: Set payoff =0 Choose pairs for playing For all players: Calculate payoff payoff Truncate the worst half of population Replace the truncated players by duplicating the remaining ones, with payoff > 0. For all players: Set payoff =0 When using truncation selection, the individuals will be sorted by decreasing payoff. Duplicates of the players above the truncation threshold, given as s, will then replace those below. This is done by cloning the survivors times, which in this case gives Truncation selection is also described in [6] and [7]. As the truncation threshold used in [1] is 0.5, the population is cut in two equal sized halves, and the best half will be duplicated. The duplicates will replace the worst half. This is shown algorithmically in algorithm 2, where line 6 and 7 from algorithm 1 are replaced with line 6, 7 NALYSIS The results presented in [1] where found by stochastic simulation. This section will reproduce these results by numerical analysis. The proportion of cooperators in a following generation will be estimated by a function of the two parameters, (p and r) as expressed in equation (1). The reproduction of the results appears when iterating this equation. p∗ = P (p,r) Technology (IJCSIT) Vol 10, No 2, April 2018 4 with payoff > 0. When using truncation selection, the individuals will be sorted by decreasing payoff. Duplicates , will then replace those below. This is time. As the truncation threshold used in [1] is 0.5, the population is cut in two equal sized halves, and ce the worst half. This is shown algorithmically in algorithm 2, where line 6 and 7 from algorithm 1 are replaced with line 6, 7 is section will reproduce these results by numerical analysis. The proportion of cooperators in a following generation will ) as expressed in equation (1). The (1)
  • 5. International Journal of Computer Science & Information 4.1 ESTIMATING NUMBER OF The cooperators will be paid either sum of qb and qd, where qb and q shown in equation (2): In the following let a, b, c and d overview of the notation used in this section, is given in table 4. When all the payoffs are calculated for one generation, the agents are sorted by payoff (line 6 in algorithm 2). This will bring all the ds at the bottom. Thus, for any Each time a defector is being paid When a cooperator gets d, a defector gets cooperator meeting a defector is of course equal to the probability of a defector meeting a cooperator. Table 4: Overview Since qd and qa always will be of equal size, they will always each be less or equal to shown in equation (3). This means that as long as the truncation threshold is will always stay below the threshold an The cooperators in the population will therefore exclusively consist of the To estimate the number of cooperators after the truncation we must only consider the portion of qb that will end up above the truncation threshold. There are two cases that needs to be calculated separately: (i) and (ii) In the first case the better half will consist of counted. As each of them is duplicated, this number is doubled, giving us the better half will consist only of agents in the upper half, we end up with the number of International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018 UMBER OF SURVIVING COOPERATORS The cooperators will be paid either b or d. Their proportion, p, can therefore be calculated as the qd is the portion of population getting paid b and d respectively, as p = qb + qd d denote the players that where paid a, b, c and d respectively. An overview of the notation used in this section, is given in table 4. When all the payoffs are calculated for one generation, the agents are sorted by payoff (line 6 in of the as to the top, followed first by the bs, then by the s at the bottom. Thus, for any d to survive, qd has to be greater than the truncation threshold. Each time a defector is being paid a, a cooperator is paid d. The other way around is also true: , a defector gets a. Intuitively we can see this as the probability of a cooperator meeting a defector is of course equal to the probability of a defector meeting a Table 4: Overview of notation used always will be of equal size, they will always each be less or equal to shown in equation (3). This means that as long as the truncation threshold is 0.5 or greater, the will always stay below the threshold and none of them will ever survive to the next generation. The cooperators in the population will therefore exclusively consist of the bs and their clones. 0 ≤ qd = qa ≤ 0.5 To estimate the number of cooperators after the truncation we must only consider the portion of that will end up above the truncation threshold. There are two cases that needs to be calculated and (ii) . half will consist of a’s, b’s and c’s. Then all of the b counted. As each of them is duplicated, this number is doubled, giving us 2qb. In the second case the better half will consist only of a’s and b’s. If we subtract the a’s from the total n agents in the upper half, we end up with the number of b’s. The difference will thus give Technology (IJCSIT) Vol 10, No 2, April 2018 5 , can therefore be calculated as the respectively, as (2) respectively. An When all the payoffs are calculated for one generation, the agents are sorted by payoff (line 6 in s, then by the cs and has to be greater than the truncation threshold. . The other way around is also true: . Intuitively we can see this as the probability of a cooperator meeting a defector is of course equal to the probability of a defector meeting a always will be of equal size, they will always each be less or equal to 0.5, as or greater, the ds d none of them will ever survive to the next generation. s and their clones. (3) To estimate the number of cooperators after the truncation we must only consider the portion of that will end up above the truncation threshold. There are two cases that needs to be calculated b’s should be . In the second case ’s from the total number of will thus give
  • 6. International Journal of Computer Science & Information the portion of b’s residing in the better half. This is multiplied by giving us . Equation (4) shows how the estimation of the forthcoming generation is modelled as a function of 4.2 ESTIMATING DISTRIBUTION OF If we assume a big enough population, we can estimate how the different payments will be distributed in the population, based on the probabilities in the model. In addition we will assume that there is no restriction on how many times the agents can play in the same round. This is possibly a simplification and may not model exactly the way the simulation was imp [1], but the reproduction of their results indicates that such a deviation is negligible. The probability of choosing a cooperator or a defector as the first agent is respectively. To calculate the probability of the second agent ( multiply the probability of the first player with the second agent (given the first), the latter probabilities we take from the model in [1] (as shown in table 3). The probabilities are summarized in table 5. If we assume a big enough population, the probabilities will be equal to the distribution of payoff in the population. The proportion of players being paid respectively, may thus be calculated using the table 5. We will to use these expressions to substitute table 5, but first we will simplify them. r)p and (p)(r +(1 − r)p) becomes Table 6: Distribution of Payment in Non After the substitution of qa and q difference equation that is a function of International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018 ’s residing in the better half. This is multiplied by 2 to model the duplication, . Equation (4) shows how the estimation of the share of cooperators in a forthcoming generation is modelled as a function of qa and qb. ISTRIBUTION OF PAYOFF If we assume a big enough population, we can estimate how the different payments will be population, based on the probabilities in the model. In addition we will assume that there is no restriction on how many times the agents can play in the same round. This is possibly a simplification and may not model exactly the way the simulation was imp [1], but the reproduction of their results indicates that such a deviation is negligible. The probability of choosing a cooperator or a defector as the first agent is p respectively. To calculate the probability of the second agent (i2) given the first (i1 multiply the probability of the first player with the second agent (given the first), the latter probabilities we take from the model in [1] (as shown in table 3). The probabilities are Table 5: Probability distribution If we assume a big enough population, the probabilities will be equal to the distribution of payoff in the population. The proportion of players being paid a, b, c or d, denoted qa calculated using the table 5. We will to use these expressions to substitute qa and qb in equation (4) by their equivalents from table 5, but first we will simplify them. (1 − p)(1 − (r +(1 − r)(1 − p))) is rewritten as becomes p(r +(1 − r)p). This is summarized in table 6. Table 6: Distribution of Payment in Non-random Environment qb with the expressions from table 6 in equation (4), we get a new difference equation that is a function of p and r. This is shown in equation (5). Technology (IJCSIT) Vol 10, No 2, April 2018 6 to model the duplication, share of cooperators in a (4) If we assume a big enough population, we can estimate how the different payments will be population, based on the probabilities in the model. In addition we will assume that there is no restriction on how many times the agents can play in the same round. This is possibly a simplification and may not model exactly the way the simulation was implemented in p and 1 − p 1), we have to multiply the probability of the first player with the second agent (given the first), the latter probabilities we take from the model in [1] (as shown in table 3). The probabilities are If we assume a big enough population, the probabilities will be equal to the distribution of payoff a, qb, qc or qd in equation (4) by their equivalents from is rewritten as (1 − p)(1 − with the expressions from table 6 in equation (4), we get a new
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018 7 4.3 ITERATING As we are interested in the iterated version of the prisoner’s dilemma, we use an algorithm that loops the difference equation (5), which is implemented as the function PC(p,r). This function, PC(p,r), returns p∗. Initial values are set in the two parameters, p and r, for the first round of the loop round number 0. A variable named n is used to count the number of rounds. In the subsequent rounds, r is set to the value returned by PC in the previous round. Only p will change during the run. This algorithm is repeated until p reaches 0 or 1. If this does not happens within max iterations (n > max), the proportion of cooperators have stopped changing from generation (round) to generation, and no further repetitions are done. This is presented in the lines 3 to 9 in algorithm 4. 4.4. REPRODUCING THE RESULT FROM [1] To reproduce the results from [1] (reprinted as figure 1), algorithm 3 has to be run for all the combinations of p and r as they vary from 0.1 to 0.9 (with the step size of 0.1), as presented in algorithm 4. The results of running this algorithm are shown in table 7. It clearly shows correspondence with the results of the simulation reported in [1]. In both the simulation and the calculation, three regions appear in the tables, as indicated in figure 2(a). Algorithm 3 Iterating the prisoner’s dilemma using numerical methods n ← 0 {counting rounds, starting at 0} pn ← some initial value r ← some initial value repeat pn+1 ← PC(pn,r) {equation (5)} n ← n +1 until p = 0 or p = 1 or n >max return pn Algorithm 4 Reproducing the results from the simulation 1: for p0 = 0.1 to 0.9 (step size: 0.1) do 2: for r = 0.1 to 0.9 (step size: 0.1) do 3: tp0r ← Algorithm 3(p0,r) {store resulting p in table 7} 4: end for 5: end for
  • 8. International Journal of Computer Science & Information 5. THE THREE REGIONS This section will give an intuitive explanation of how three regions, To get an intuitive understanding of why these three regions shown in figure 2(a) appear, we take a closer look at how the share of cooperators change from generation to generation. By comparing the values of p in two following generations, we get a value cooperators given p and r. We call this the growth rate of cooperators and de ne it as table 8 the signs of these growth rates are shown. By looking at this table, it becomes clear how the three regions shown in fi Figure 1: Reprint of results presented in [1]. Table 7: Final proportion of cooperators as a function of International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018 EGIONS This section will give an intuitive explanation of how three regions, α, βand γ, appears. To get an intuitive understanding of why these three regions shown in figure 2(a) appear, we take a closer look at how the share of cooperators change from generation to generation. By in two following generations, we get a value representing the growth of cooperators given p and r. We call this the growth rate of cooperators and de ne it as table 8 the signs of these growth rates are shown. By looking at this table, it becomes clear how the three regions shown in figure 2(a) are formed. Figure 1: Reprint of results presented in [1]. Table 7: Final proportion of cooperators as a function of r and p, with a truncation threshold of Technology (IJCSIT) Vol 10, No 2, April 2018 8 , appears. To get an intuitive understanding of why these three regions shown in figure 2(a) appear, we take a closer look at how the share of cooperators change from generation to generation. By representing the growth of cooperators given p and r. We call this the growth rate of cooperators and de ne it as pn+1 − pn. In gure 2(a) are formed. , with a truncation threshold of
  • 9. International Journal of Computer Science & Information (a) Truncation threshold: Figure 2: Three regions, named The area where the cooperators are driven to extinction, the corresponding area have negative growth. In the following, this region is referred to as area upwards in the table from generation to generation, until In addition, the second area β, is divided in two, one negative and one positive. The negative part is below the positive part. Players in the negat getting positive growth rate, and switch direction. This again gives them a negative rate. In the stochastic simulation from [1] the rate will oscillate like this and converge to a stable situation containing both cooperators and defectors. In the last area called γ, where the defectors are wiped out, the growth rate is positive. Here the players will continue downwards in the table until 6. CHANGING A PARAMETER This section will investigate the effect of lowering the truncation threshold below the crossover point found in [1]. As indicated above, the choice of 0.5 as a truncation threshold results in that no d from one generation to the other, in the numerical analysis. The simulation done in [1] has a stochastic element which is absent from the numerical analysis which is completely deterministic. It is established above, that the numerical analysis reproduce the main results of the simulation in spite of the lack of randomness. Choosing a truncation threshold below 0.5 will make some of the d The equation is now changed so that only the better third of the population is considered and tripled. Everything else is the same. The modified equation is shown in equation (6). International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018 (a) Truncation threshold: (b) Truncation threshold: Figure 2: Three regions, named α, β and γ, appears in the results The area where the cooperators are driven to extinction, the corresponding area have negative growth. In the following, this region is referred to as area α.The players in this area will move upwards in the table from generation to generation, until p reach zero. , is divided in two, one negative and one positive. The negative part is below the positive part. Players in the negative part will rise until they reach the getting positive growth rate, and switch direction. This again gives them a negative rate. In the stochastic simulation from [1] the rate will oscillate like this and converge to a stable situation taining both cooperators and defectors. , where the defectors are wiped out, the growth rate is positive. Here the players will continue downwards in the table until p is 1, and no defectors are left. ARAMETER IN THE ALGORITHM This section will investigate the effect of lowering the truncation threshold below the crossover As indicated above, the choice of 0.5 as a truncation threshold results in that no d-s will survive the other, in the numerical analysis. The simulation done in [1] has a stochastic element which is absent from the numerical analysis which is completely deterministic. It is established above, that the numerical analysis reproduce simulation in spite of the lack of randomness. Choosing a truncation threshold below 0.5 will make some of the d-s survive even in the analysis. The equation is now changed so that only the better third of the population is considered and Everything else is the same. The modified equation is shown in equation (6). Technology (IJCSIT) Vol 10, No 2, April 2018 9 The area where the cooperators are driven to extinction, the corresponding area have negative The players in this area will move , is divided in two, one negative and one positive. The negative part positive part, getting positive growth rate, and switch direction. This again gives them a negative rate. In the stochastic simulation from [1] the rate will oscillate like this and converge to a stable situation , where the defectors are wiped out, the growth rate is positive. Here the This section will investigate the effect of lowering the truncation threshold below the crossover s will survive The simulation done in [1] has a stochastic element which is absent from the numerical analysis which is completely deterministic. It is established above, that the numerical analysis reproduce s survive even in the analysis. The equation is now changed so that only the better third of the population is considered and Everything else is the same. The modified equation is shown in equation (6).
  • 10. International Journal of Computer Science & Information Table 8: Sign of growth rate as a function of Table 9: Final proportion of cooperators as a function of 6.7 TRUNCATION THRESHOLD Figure 3(a) corresponds to the benchmark case without cooperation. This corresponds to figure 3 in [1]. Even when starting with 90% cooperators, they are quickly exterminated. We see when using a truncation threshold of threshold is set to . The figures 3(b), 3(c) and 3(d), corresponds to the figures 4, 5 and 6 in [1] by having the same values on r and p. Where the tr matches the stochastic simulation. Setting the threshold to as shown in figure 2(b), making all three of end up in area International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018 Table 8: Sign of growth rate as a function of r and p, with a truncation threshold of Table 9: Final proportion of cooperators as a function of r and p, with a truncation threshold of HRESHOLD : vs . Figure 3(a) corresponds to the benchmark case without cooperation. This corresponds to figure 3 in [1]. Even when starting with 90% cooperators, they are quickly exterminated. We see when using a truncation threshold of , the plateau is present, just as in [1], but absent when the The figures 3(b), 3(c) and 3(d), corresponds to the figures 4, 5 and 6 in [1] by having the same . Where the truncation threshold is 0.5, the result of the numerical analysis matches the stochastic simulation. Setting the threshold to makes changes to the three regions, as shown in figure 2(b), making all three of end up in area β. Technology (IJCSIT) Vol 10, No 2, April 2018 10 , with a truncation threshold of . , with a truncation threshold of Figure 3(a) corresponds to the benchmark case without cooperation. This corresponds to figure 3 in [1]. Even when starting with 90% cooperators, they are quickly exterminated. We see that , the plateau is present, just as in [1], but absent when the The figures 3(b), 3(c) and 3(d), corresponds to the figures 4, 5 and 6 in [1] by having the same uncation threshold is 0.5, the result of the numerical analysis makes changes to the three regions,
  • 11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018 11 (a) Numerical analysis with r =0.0, and p=0.9 (corresponds to figure 3 in [1].) (b) Numerical analysis with r =0.3, and p=0.2 (corresponds to figure 4 in [1].) (c) Numerical analysis with r =0.3, and p=0.5 (corresponds to figure 5 in [1].) (d) Numerical analysis with r =0.5, and p=0.3 (corresponds to figure 6 in [1].) Figure 3: Visualizing the result of changing the truncation threshold.
  • 12. International Journal of Computer Science & Information Table 10: Sign of growth rate as a function of 7. CONCLUSION This paper support the conclusion from [1] that segregation plays a considerable role in evolution of cooperation in a game of Prisoner’s Dilemma reciprocity. However, it argues that the choice of truncation selection together with a truncation threshold of 0.5 is the cause of the plateau and crossover point from [1]. It also explains the formation of the three regions. REFERENCES [1] J. Reiersen and N. Bouhmala, Matching structure and the evolut dilemma, International journal of computer science & information technology (IJCSIT), vol. 5, pp. 109 119, Aug. 2013. [2] R. Axelrod and W. D. Hamilton, The evolution of cooperation, Science, vol. 211, no. 4489, pp. 13 1396, 1981. [3] W. D. Hamilton, The genetical evolution of social behaviour. ii, Journal of theoretical biology, vol. 7, no. 1, pp. 17 52, 1964. [4] M. A. Nowak, Five rules for the evolution of cooperation, science, vol. 314, no. 5805, pp. 1560 1563, 2006. [5] R. Boyd and P. J. Richerson, The evolution of reciprocity in sizable groups, Journal of theoretical Biology, vol. 132, no. 3, pp. 337 356, 1988. [6] D. Thierens and D. Goldberg, Convergence models of genetic algorithm selection schemes, in Parallel Problem Solving from Nature PPSN III (Y. Davidor, H. vol. 866 of Lecture Notes in Computer Science, pp. 119 129, Springer Berlin Heidelberg, 1994. [7] H. M hlenbein and D. Schlierkamp continuous parameter optimization, Evolutionary computation, vol. 1, no. 1, pp. 25 49, 1993. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018 Table 10: Sign of growth rate as a function of r and p, with a truncation threshold of support the conclusion from [1] that segregation plays a considerable role in evolution of cooperation in a game of Prisoner’s Dilemma, in spite of the absence of repeated action and reciprocity. However, it argues that the choice of truncation selection as selection strategy together with a truncation threshold of 0.5 is the cause of the plateau and crossover point from [1]. It also explains the formation of the three regions. , Matching structure and the evolution of cooperation in the prisoner’s dilemma, International journal of computer science & information technology (IJCSIT), vol. 5, pp. R. Axelrod and W. D. Hamilton, The evolution of cooperation, Science, vol. 211, no. 4489, pp. 13 W. D. Hamilton, The genetical evolution of social behaviour. ii, Journal of theoretical biology, vol. 7, M. A. Nowak, Five rules for the evolution of cooperation, science, vol. 314, no. 5805, pp. 1560 1563, R. Boyd and P. J. Richerson, The evolution of reciprocity in sizable groups, Journal of theoretical Biology, vol. 132, no. 3, pp. 337 356, 1988. D. Thierens and D. Goldberg, Convergence models of genetic algorithm selection schemes, in llel Problem Solving from Nature PPSN III (Y. Davidor, H.-P. Schwefel, and R. M nner, eds.), vol. 866 of Lecture Notes in Computer Science, pp. 119 129, Springer Berlin Heidelberg, 1994. H. M hlenbein and D. Schlierkamp-Voosen, Predictive models for the breeder genetic algorithm i. continuous parameter optimization, Evolutionary computation, vol. 1, no. 1, pp. 25 49, 1993. Technology (IJCSIT) Vol 10, No 2, April 2018 12 , with a truncation threshold of . support the conclusion from [1] that segregation plays a considerable role in evolution peated action and as selection strategy together with a truncation threshold of 0.5 is the cause of the plateau and crossover point from ion of cooperation in the prisoner’s dilemma, International journal of computer science & information technology (IJCSIT), vol. 5, pp. R. Axelrod and W. D. Hamilton, The evolution of cooperation, Science, vol. 211, no. 4489, pp. 1390 W. D. Hamilton, The genetical evolution of social behaviour. ii, Journal of theoretical biology, vol. 7, M. A. Nowak, Five rules for the evolution of cooperation, science, vol. 314, no. 5805, pp. 1560 1563, R. Boyd and P. J. Richerson, The evolution of reciprocity in sizable groups, Journal of theoretical D. Thierens and D. Goldberg, Convergence models of genetic algorithm selection schemes, in P. Schwefel, and R. M nner, eds.), vol. 866 of Lecture Notes in Computer Science, pp. 119 129, Springer Berlin Heidelberg, 1994. he breeder genetic algorithm i. continuous parameter optimization, Evolutionary computation, vol. 1, no. 1, pp. 25 49, 1993.