12
Research Article Games Based Study of Nonblind Confrontation Yixian Yang, 1,2,3 Xinxin Niu, 1,2,3 and Haipeng Peng 2,3 1 Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, China 2 Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China 3 National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China Correspondence should be addressed to Haipeng Peng; [email protected] Received 4 January 2017; Accepted 20 March 2017; Published 19 April 2017 Academic Editor: Liu Yuhong Copyright ยฉ 2017 Yixian Yang et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Security confrontation is the second cornerstone of the General eory of Security. And it can be divided into two categories: blind confrontation and nonblind confrontation between attackers and defenders. In this paper, we study the nonblind confrontation by some well-known games. We show the probability of winning and losing between the attackers and defenders from the perspective of channel capacity. We establish channel models and ๏ฌnd that the attacker or the defender wining one time is equivalent to one bit transmitted successfully in the channel. is paper also gives uni๏ฌed solutions for all the nonblind confrontations. 1. Introduction e core of all security issues represented by cyberspace security [1], economic security, and territorial security is confrontation. Network confrontation [2], especially in big data era [3], has been widely studied in the ๏ฌeld of cyberspace security. ere are two strategies in network confrontation: blind confrontation and nonblind confrontation. e so- called โ€œblind confrontationโ€ is the confrontation in which both the attacker and defender are only aware of their self- assessment results and know nothing about the enemyโ€™s assessment results a๏ฌ…er each round of confrontation. e superpower rivalry, battle๏ฌeld ๏ฌght, network attack and defense, espionage war, and other brutal confrontations, usually belong to the blind confrontation. e so-called โ€œnonblind confrontationโ€ is the confrontation in which both the attacker and defender know the consistent result a๏ฌ…er each round. e games studied in this paper are all belonging to the nonblind confrontation. โ€œSecurity meridianโ€ is the ๏ฌrst cornerstone of the General eory of Security which has been well established [4, 5]. Security confrontation is the second cornerstone of the General eory of Security, where we have studied the blind confrontation and gave the precise limitation of hacker attack ability (honker defense ability) [4, 5]. Comparing with the blind confrontation, the winning or losing rules of nonblind confrontation are more complex and not easy to study. In this paper, based on the Shannon Information eory [6], we study several well-known games of the nonblind confronta- tion: โ€œrock-paper-scissorsโ€ [7], โ€œcoin tossingโ€ [8], โ€œpalm or back,โ€ โ€œdraw boxing,โ€ and โ€œ๏ฌnger guessingโ€ [9], from a novel point of view. e famous game, โ€œrock-paper-scissors,โ€ has been played for thousands of years. However, there are few related analyses on it. e interdisciplinary team of Zhejiang University, Chinese Academy of Sciences, and other institutions, in cooperation with more than three hundred volunteers, spent four years playing โ€œrock-paper-scissorsโ€ and giving corresponding analysis of game. And the ๏ฌndings were awarded as โ€œBest of 2014: MIT technology review.โ€ We obtain some signi๏ฌcant results. e contributions of this paper are as follows: (i) Channel models of all the above three games are established. (ii) e conclusion that the attacker or the defender wining one time is equivalent to one bit transmitted successfully in the channel is found. Hindawi Mathematical Problems in Engineering Volume 2017, Article ID 8679079, 11 pages https://doi.org/10.1155/2017/8679079

ResearchArticle Games Based Study of Nonblind Confrontation

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: ResearchArticle Games Based Study of Nonblind Confrontation

Research ArticleGames Based Study of Nonblind Confrontation

Yixian Yang,1,2,3 Xinxin Niu,1,2,3 and Haipeng Peng2,3

1Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, China2Information Security Center, State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications, Beijing 100876, China3National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications,Beijing 100876, China

Correspondence should be addressed to Haipeng Peng; [email protected]

Received 4 January 2017; Accepted 20 March 2017; Published 19 April 2017

Academic Editor: Liu Yuhong

Copyright ยฉ 2017 Yixian Yang et al. This is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Security confrontation is the second cornerstone of the GeneralTheory of Security. And it can be divided into two categories: blindconfrontation and nonblind confrontation between attackers and defenders. In this paper, we study the nonblind confrontation bysome well-known games. We show the probability of winning and losing between the attackers and defenders from the perspectiveof channel capacity. We establish channel models and find that the attacker or the defender wining one time is equivalent to one bittransmitted successfully in the channel. This paper also gives unified solutions for all the nonblind confrontations.

1. Introduction

The core of all security issues represented by cyberspacesecurity [1], economic security, and territorial security isconfrontation. Network confrontation [2], especially in bigdata era [3], has been widely studied in the field of cyberspacesecurity. There are two strategies in network confrontation:blind confrontation and nonblind confrontation. The so-called โ€œblind confrontationโ€ is the confrontation in whichboth the attacker and defender are only aware of their self-assessment results and know nothing about the enemyโ€™sassessment results after each round of confrontation. Thesuperpower rivalry, battlefield fight, network attack anddefense, espionage war, and other brutal confrontations,usually belong to the blind confrontation. The so-calledโ€œnonblind confrontationโ€ is the confrontation in which boththe attacker and defender know the consistent result aftereach round.The games studied in this paper are all belongingto the nonblind confrontation.

โ€œSecurity meridianโ€ is the first cornerstone of the GeneralTheory of Security which has been well established [4, 5].Security confrontation is the second cornerstone of theGeneral Theory of Security, where we have studied the blindconfrontation and gave the precise limitation of hacker attack

ability (honker defense ability) [4, 5]. Comparing with theblind confrontation, the winning or losing rules of nonblindconfrontation are more complex and not easy to study. Inthis paper, based on the Shannon InformationTheory [6], westudy several well-known games of the nonblind confronta-tion: โ€œrock-paper-scissorsโ€ [7], โ€œcoin tossingโ€ [8], โ€œpalm orback,โ€ โ€œdraw boxing,โ€ and โ€œfinger guessingโ€ [9], from anovel point of view.The famous game, โ€œrock-paper-scissors,โ€has been played for thousands of years. However, there arefew related analyses on it. The interdisciplinary team ofZhejiang University, Chinese Academy of Sciences, and otherinstitutions, in cooperation with more than three hundredvolunteers, spent four years playing โ€œrock-paper-scissorsโ€and giving corresponding analysis of game. And the findingswere awarded as โ€œBest of 2014: MIT technology review.โ€

We obtain some significant results. The contributions ofthis paper are as follows:

(i) Channel models of all the above three games areestablished.

(ii) The conclusion that the attacker or the defenderwining one time is equivalent to one bit transmittedsuccessfully in the channel is found.

HindawiMathematical Problems in EngineeringVolume 2017, Article ID 8679079, 11 pageshttps://doi.org/10.1155/2017/8679079

Page 2: ResearchArticle Games Based Study of Nonblind Confrontation

2 Mathematical Problems in Engineering

(iii) Unified solutions for all the nonblind confrontationsare given.

The rest of the paper is organized as follows. The modelof rock-paper-scissors is introduced in Section 2, models ofcoin tossing and palm or back are introduced in Section 3,models of finger guessing and drawing boxing are introducedin Section 4, unified model of linear separable nonblind con-frontation is introduced in Section 5, and Section 6 concludesthis paper.

2. Model of Rock-Paper-Scissors

2.1. Channel Modeling. Suppose ๐ด and ๐ต play โ€œrock-paper-scissors,โ€ whose states can be, respectively, represented byrandom variables๐‘‹ and ๐‘Œ:๐‘‹ = 0, ๐‘‹ = 1, and ๐‘‹ = 2 denote the โ€œscissors,โ€ โ€œrock,โ€and โ€œpaperโ€ of ๐ด, respectively;๐‘Œ = 0, ๐‘Œ = 1, and ๐‘Œ = 2 denote the โ€œscissors,โ€ โ€œrock,โ€and โ€œpaperโ€ of ๐ต, respectively.

Law of Large Numbers indicates that the limit of thefrequency tends to probability; thus the choice habits of ๐ดand ๐ต can be represented as the probability distribution ofrandom variables๐‘‹ and ๐‘Œ:

Pr(๐‘‹ = 0) = ๐‘means the probability of ๐ด for โ€œscissorsโ€;Pr(๐‘‹ = 1) = ๐‘žmeans the probability of ๐ด for โ€œrockโ€;Pr(๐‘‹ = 2) = 1 โˆ’ ๐‘ โˆ’ ๐‘ž means the probability of ๐ด for

โ€œpaperโ€, where 0 < ๐‘, ๐‘ž and ๐‘ + ๐‘ž < 1;Pr(๐‘Œ = 0) = ๐‘Ÿmeans the probability of ๐ต for โ€œscissorsโ€;Pr(๐‘Œ = 1) = ๐‘ means the probability of ๐ต for โ€œrockโ€;Pr(๐‘Œ = 2) = 1 โˆ’ ๐‘Ÿ โˆ’ ๐‘  means the probability of ๐ต for

โ€œpaper,โ€ where 0 < ๐‘Ÿ, ๐‘  and ๐‘Ÿ + ๐‘  < 1.Similarly, the joint probability distribution of two-

dimensional random variables (๐‘‹, ๐‘Œ) can be listed as follows:Pr(๐‘‹ = 0, ๐‘Œ = 0) = ๐‘Ž means the probability of ๐ด for

โ€œscissorsโ€ and ๐ต for โ€œscissorsโ€;Pr(๐‘‹ = 0, ๐‘Œ = 1) = ๐‘ means the probability of ๐ด for

โ€œscissorsโ€ and ๐ต for โ€œrockโ€;Pr(๐‘‹ = 0, ๐‘Œ = 2) = ๐‘ โˆ’ ๐‘Ž โˆ’ ๐‘means the probability of ๐ด

for โ€œscissorsโ€ and ๐ต for โ€œpaper,โ€ where 0 < ๐‘Ž, ๐‘, and ๐‘Ž+๐‘ < ๐‘;Pr(๐‘‹ = 1, ๐‘Œ = 0) = ๐‘’ means the probability of ๐ด for

โ€œrockโ€ and ๐ต for โ€œscissorsโ€;Pr(๐‘‹ = 1, ๐‘Œ = 1) = ๐‘“ means the probability of ๐ด for

โ€œrockโ€ and ๐ต for โ€œrockโ€;Pr(๐‘‹ = 1, ๐‘Œ = 2) = ๐‘ž โˆ’ ๐‘’ โˆ’ ๐‘“means the probability of ๐ด

for โ€œrockโ€ and ๐ต for โ€œpaper,โ€ where 0 < ๐‘’, ๐‘“, and ๐‘’ + ๐‘“ < ๐‘ž;Pr(๐‘‹ = 2, ๐‘Œ = 0) = ๐‘” means the probability of ๐ด for

โ€œpaperโ€ and ๐ต for โ€œscissorsโ€;Pr(๐‘‹ = 2, ๐‘Œ = 1) = โ„Ž means the probability of ๐ด for

โ€œpaperโ€ and ๐ต for โ€œrockโ€;Pr(๐‘‹ = 2, ๐‘Œ = 2) = 1โˆ’๐‘โˆ’๐‘žโˆ’๐‘”โˆ’โ„Žmeans the probability

of๐ด for โ€œpaperโ€ and๐ต for โ€œpaper,โ€ where 0 < ๐‘’, ๐‘“, and ๐‘’+๐‘“ <1 โˆ’ ๐‘ โˆ’ ๐‘ž.Construct another random variable ๐‘ = [2(1 + ๐‘‹ +๐‘Œ)] mod 3 from๐‘‹ and ๐‘Œ. Because any two random variables

can form a communication channel, we get a communicationchannel (๐‘‹; ๐‘)with๐‘‹ as the input and๐‘ as the output, whichis called โ€œChannel ๐ด,โ€ which is shown in Figure 1.

Channel A

Channel B

X

Y

Z

Z

Figure 1: Block diagram of the channel model.

If ๐ด wins, then there are only three cases.

Case 1. โ€œ๐ด chooses scissors, ๐ต chooses paperโ€; namely, โ€œ๐‘‹ =0, ๐‘Œ = 2.โ€ This is also equivalent to โ€œ๐‘‹ = 0, ๐‘ = 0โ€; namely,the input of โ€œChannel ๐ดโ€ is equal to the output.Case 2. โ€œ๐ด chooses stone, ๐ต chooses scissorsโ€; namely, โ€œ๐‘‹ =1, ๐‘Œ = 0.โ€ This is also equivalent to โ€œ๐‘‹ = 1, ๐‘ = 1โ€; namely,the input of โ€œChannel ๐ดโ€ is equal to the output.Case 3. โ€œ๐ด chooses cloth, ๐ต chooses stoneโ€; namely, โ€œ๐‘‹ = 2,๐‘Œ = 1.โ€ This is also equivalent to โ€œ๐‘‹ = 2, ๐‘ = 2โ€; namely, theinput of โ€œChannel ๐ดโ€ is equal to the output.

In contrast, if โ€œChannel ๐ดโ€ sends one bit from the senderto the receiver successfully, then there are only three possiblecases.

Case 1. The input and the output equal 0; namely, โ€œ๐‘‹ = 0,๐‘ = 0.โ€ This is also equivalent to โ€œ๐‘‹ = 0, ๐‘Œ = 2โ€; namely, โ€œ๐ดchooses scissors, ๐ต chooses paperโ€; ๐ด wins.

Case 2. The input and the output equal 1; namely, โ€œ๐‘‹ = 1,๐‘ = 1.โ€ This is also equivalent to โ€œ๐‘‹ = 1, ๐‘Œ = 0โ€; namely, โ€œ๐ดchooses rock, ๐ต chooses scissorsโ€; ๐ด wins.

Case 3. The input and the output equal 2; namely, โ€œ๐‘‹ = 2,๐‘ = 2.โ€ This is also equivalent to โ€œ๐‘‹ = 2, ๐‘Œ = 1โ€; namely, โ€œ๐ดchooses paper, ๐ต chooses rockโ€; ๐ด wins.

Based on the above six cases, we get an important lemma.

Lemma 1. ๐ด wins once if and only if โ€œChannel ๐ดโ€ sends onebit from the sender to the receiver successfully.

Now we can construct another channel (๐‘Œ; ๐‘) by usingrandom variables ๐‘Œ and ๐‘ with ๐‘Œ as the input and ๐‘ as theoutput, which is called โ€œChannel ๐ต.โ€ Then similarly, we canget the following lemma.

Lemma 2. ๐ต wins once if and only if โ€œChannel ๐ตโ€ sends onebit from the sender to the receiver successfully.

Thus, the winning and losing problem of โ€œrock-paper-scissorsโ€ played by ๐ด and ๐ต converts to the problem ofwhether the information bits can be transmitted successfullyby โ€œChannel ๐ดโ€ and โ€œChannel ๐ต.โ€ According to Shannonโ€™ssecond theorem [3], we know that channel capacity is equalto the maximal number of bits that the channel can transmit

Page 3: ResearchArticle Games Based Study of Nonblind Confrontation

Mathematical Problems in Engineering 3

successfully. Therefore, the problem is transformed into thechannel capacity problem. More accurately, we have thefollowing theorem.

Theorem 3 (โ€œrock-paper-scissorsโ€ theorem). If one does notconsider the case that both ๐ด and ๐ต have the same state; then

(1) for ๐ด, there must be some skills (corresponding to theShannon coding) for any ๐‘˜/๐‘› โ‰ค ๐ถ, such that ๐ด wins ๐‘˜times in ๐‘›๐ถ rounds of the game; if ๐ด wins ๐‘ข times in๐‘š rounds of the game, then ๐‘ข โ‰ค ๐‘š๐ถ, where ๐ถ is thecapacity of โ€œChannel ๐ดโ€;

(2) for ๐ต, there must be some skills (corresponding to theShannon coding) for any ๐‘˜/๐‘› โ‰ค ๐ท, such that ๐ต wins ๐‘˜times in ๐‘›๐ท rounds of the game; if ๐ต wins ๐‘ข times in๐‘š rounds of the game, then ๐‘ข โ‰ค ๐‘š๐ท, where ๐ท is thecapacity of โ€œChannel ๐ตโ€;

(3) statistically, if ๐ถ < ๐ท, ๐ต will win; if ๐ถ > ๐ท, ๐ด will win;if ๐ถ = ๐ท, ๐ด and ๐ต are evenly matched.

Here, we calculate the channel capacity of โ€œChannel ๐ดโ€and โ€œChannel ๐ตโ€ as follows.

For channel (๐‘‹; ๐‘) of ๐ด: ๐‘ƒ denotes its transition proba-bility matrix with 3 โˆ— 3 order,๐‘ƒ (0, 0) = Pr (๐‘ = 0 | ๐‘‹ = 0) = (๐‘ โˆ’ ๐‘Ž โˆ’ ๐‘)๐‘ ,๐‘ƒ (0, 1) = Pr (๐‘ = 1 | ๐‘‹ = 0) = ๐‘๐‘ ,๐‘ƒ (0, 2) = Pr (๐‘ = 2 | ๐‘‹ = 0) = ๐‘Ž๐‘ ,๐‘ƒ (1, 0) = Pr (๐‘ = 0 | ๐‘‹ = 1) = ๐‘“๐‘ž ,๐‘ƒ (1, 1) = Pr (๐‘ = 1 | ๐‘‹ = 1) = ๐‘’๐‘ž ,๐‘ƒ (1, 2) = Pr (๐‘ = 2 | ๐‘‹ = 1) = (๐‘ž โˆ’ ๐‘’ โˆ’ ๐‘“)๐‘ž ,๐‘ƒ (2, 0) = Pr (๐‘ = 0 | ๐‘‹ = 2) = ๐‘”(1 โˆ’ ๐‘ โˆ’ ๐‘ž) ,๐‘ƒ (2, 1) = Pr (๐‘ = 1 | ๐‘‹ = 2) = (1 โˆ’ ๐‘ โˆ’ ๐‘ž โˆ’ ๐‘” โˆ’ โ„Ž)(1 โˆ’ ๐‘ โˆ’ ๐‘ž) ,๐‘ƒ (2, 2) = Pr (๐‘ = 2 | ๐‘‹ = 2) = โ„Ž(1 โˆ’ ๐‘ โˆ’ ๐‘ž) .

(1)

The channel transfer probability matrix is used to calculatethe channel capacity: solve the equations ๐‘ƒ๐‘š = ๐‘›, where๐‘š isthe column vector:

๐‘š = (๐‘š0, ๐‘š1, ๐‘š2)๐‘‡ ,๐‘› = ( 2โˆ‘

๐‘—=0

๐‘ƒ (0, ๐‘—) log2๐‘ƒ (0, ๐‘—) , 2โˆ‘๐‘—=0

๐‘ƒ (1, ๐‘—) log2๐‘ƒ (1, ๐‘—) ,2โˆ‘๐‘—=0

๐‘ƒ (2, ๐‘—) log2๐‘ƒ (2, ๐‘—)) .(2)

Consider the transition probability matrix ๐‘ƒ.

(1) If ๐‘ƒ is reversible, there is a unique solution; that is,๐‘š = ๐‘ƒโˆ’1๐‘›; then ๐ถ = log2(โˆ‘2๐‘—=0 2๐‘š๐‘—).According to the formula ๐‘ƒ๐‘ง(๐‘—) = 2๐‘š๐‘—โˆ’๐ถ, ๐‘ƒ๐‘ง(๐‘—) =โˆ‘2๐‘—=0 ๐‘ƒ๐‘ฅ(๐‘–)๐‘ƒ(๐‘–, ๐‘—), ๐‘–, ๐‘— = 0, 1, 2, where ๐‘ƒ๐‘ง(๐‘—) is the probability

distribution of ๐‘.And the probability distribution of ๐‘‹ is obtained. If๐‘ƒ๐‘‹(๐‘–) โ‰ฅ 0, ๐‘– = 0, 1, 2, the channel capacity can be confirmed

as ๐ถ.(2) If๐‘ƒ is irreversible, the equation hasmultiple solutions.

Repeat the above steps; then we can get multiple ๐ถ and thecorresponding ๐‘ƒ๐‘‹(๐‘–). If ๐‘ƒ๐‘‹(๐‘–) does not satisfy ๐‘ƒ๐‘‹(๐‘–) โ‰ฅ 0, ๐‘– =0, 1, 2, we delete the corresponding ๐ถ.

For channel (๐‘Œ; ๐‘) of ๐ต:๐‘„ denotes its transition probabil-ity matrix with 3 โˆ— 3 order,

๐‘„ (0, 0) = Pr (๐‘ = 0 | ๐‘Œ = 0) = ๐‘”๐‘Ÿ ,๐‘„ (0, 1) = Pr (๐‘ = 1 | ๐‘Œ = 0) = ๐‘’๐‘Ÿ ,๐‘„ (0, 2) = Pr (๐‘ = 2 | ๐‘Œ = 0) = (๐‘Ÿ โˆ’ ๐‘” โˆ’ ๐‘’)๐‘Ÿ ,๐‘„ (1, 0) = Pr (๐‘ = 0 | ๐‘Œ = 1) = ๐‘“๐‘  ,๐‘„ (1, 1) = Pr (๐‘ = 1 | ๐‘Œ = 1) = ๐‘๐‘  ,๐‘„ (1, 2) = Pr (๐‘ = 2 | ๐‘Œ = 1) = (๐‘  โˆ’ ๐‘“ โˆ’ ๐‘)๐‘  ,๐‘„ (2, 0) = Pr (๐‘ = 0 | ๐‘Œ = 2) = (1 โˆ’ ๐‘Ž โˆ’ ๐‘)(1 โˆ’ ๐‘Ÿ โˆ’ ๐‘ ) ,๐‘„ (2, 1) = Pr (๐‘ = 1 | ๐‘Œ = 2) = (1 โˆ’ ๐‘” โˆ’ โ„Ž)(1 โˆ’ ๐‘Ÿ โˆ’ ๐‘ ) ,๐‘„ (2, 2) = Pr (๐‘ = 2 | ๐‘Œ = 2) = (1 โˆ’ ๐‘’ โˆ’ ๐‘“)(1 โˆ’ ๐‘Ÿ โˆ’ ๐‘ ) .

(3)

The channel transfer probability matrix ๐‘„ is used tocalculate the channel capacity ๐ต.

Solution equation group ๐‘„๐‘ค = ๐‘ข, where ๐‘ค, ๐‘ข are thecolumn vector:

๐‘ค = (๐‘ค0, ๐‘ค1, ๐‘ค2)๐‘‡ ,๐‘ข = ( 2โˆ‘

๐‘—=0

๐‘„ (0, ๐‘—) log2๐‘„ (0, ๐‘—) , 2โˆ‘๐‘—=0

๐‘„ (1, ๐‘—) log2๐‘„ (1, ๐‘—) ,2โˆ‘๐‘—=0

๐‘„ (2, ๐‘—) log2๐‘„ (2, ๐‘—)) .(4)

Consider the transition probability matrix ๐‘„.(1) If ๐‘„ is reversible, there is a unique solution; that is,๐‘ค = ๐‘„โˆ’1๐‘ข; then๐ท = log2(โˆ‘2๐‘—=0 2๐‘ค๐‘—).According to the formula ๐‘„๐‘ง(๐‘—) = 2๐‘ค๐‘—โˆ’๐ท, ๐‘„๐‘ง(๐‘—) =โˆ‘2๐‘—=0 ๐‘„๐‘ฆ(๐‘–)๐‘„(๐‘–, ๐‘—), ๐‘–, ๐‘— = 0, 1, 2.And the probability distribution of ๐‘Œ is obtained. If๐‘„๐‘Œ(๐‘–) โ‰ฅ 0, ๐‘– = 0, 1, 2, the channel capacity can be confirmed

as๐ท.

Page 4: ResearchArticle Games Based Study of Nonblind Confrontation

4 Mathematical Problems in Engineering

(2) If๐‘„ is irreversible, the equation hasmultiple solutions.Repeat the above steps, then we can get multiple ๐ท and thecorresponding ๐‘„๐‘Œ(๐‘–). If ๐‘„๐‘Œ(๐‘–) does not satisfy ๐‘„๐‘Œ(๐‘–) โ‰ฅ 0, ๐‘– =0, 1, 2, we delete the corresponding๐ท.

In the above analysis, the problem of โ€œrock-paper-scissorsโ€ game has been solved perfectly, but the correspond-ing analysis is complex. Here, we give a more abstract andsimple solution.

Law of Large Numbers indicates that the limit of thefrequency tends to probability; thus the choice habits of ๐ดand ๐ต can be represented as the probability distribution ofrandom variables๐‘‹ and ๐‘Œ:0 < Pr (๐‘‹ = ๐‘ฅ) = ๐‘๐‘ฅ < 1,๐‘ฅ = 0, 1, 2, ๐‘0 + ๐‘1 + ๐‘2 = 1;0 < Pr (๐‘Œ = ๐‘ฆ) = ๐‘ž๐‘ฆ < 1,

๐‘ฆ = 0, 1, 2, ๐‘ž0 + ๐‘ž1 + ๐‘ž2 = 1;0 < Pr (๐‘‹ = ๐‘ฅ, ๐‘Œ = ๐‘ฆ) = ๐‘ก๐‘ฅ๐‘ฆ < 1,

๐‘ฅ, ๐‘ฆ = 0, 1, 2, โˆ‘0โ‰ค๐‘ฅ,๐‘ฆโ‰ค2

๐‘ก๐‘ฅ๐‘ฆ = 1;๐‘๐‘ฅ = โˆ‘0โ‰ค๐‘ฆโ‰ค2

๐‘ก๐‘ฅ๐‘ฆ, ๐‘ฅ = 0, 1, 2;๐‘ž๐‘ฆ = โˆ‘0โ‰ค๐‘ฆโ‰ค2

๐‘ก๐‘ฅ๐‘ฆ, ๐‘ฆ = 0, 1, 2.

(5)

The winning and losing rule of the game is if ๐‘‹ = ๐‘ฅ, ๐‘Œ =๐‘ฆ, then the necessary and sufficient condition of the winningof ๐ด(๐‘‹) is (๐‘ฆ โˆ’ ๐‘ฅ) mod 3 = 2.

Now construct another random variable ๐น = (๐‘Œ โˆ’2) mod 3. Considering a channel (๐‘‹; ๐น) consisting of ๐‘‹ and๐น, that is, a channel with ๐‘‹ as an input and ๐น as an output,then, there are the following event equations.

If๐ด(๐‘‹) wins in a certain round, then (๐‘Œโˆ’๐‘‹) mod 3 = 2,so ๐น = (๐‘Œ โˆ’ 2) mod 3 = [(2 + ๐‘‹) โˆ’ ๐‘‹] mod 3 = ๐‘‹. That is,the input (๐‘‹) of the channel (๐‘‹; ๐น) always equals its output(๐น). In other words, one bit is successfully transmitted fromthe sender to the receiver in the channel.

Conversely, if โ€œone bit is successfully transmitted from thesender to the receiver in the channel,โ€ it means that the input(๐‘‹) of the channel (๐‘‹; ๐น) always equals its output (๐น).That is,๐น = (๐‘Œ โˆ’ 2) mod 3 = ๐‘‹, which is exactly the necessary andsufficient conditions for๐‘‹ winning.

Based on the above discussions, ๐ด(๐‘‹) winning oncemeans that the channel (๐‘‹; ๐น) sends one bit from the senderto the receiver successfully and vice versa. Therefore, thechannel (๐‘‹; ๐น) can also play the role of โ€œChannel ๐ดโ€ in thethird section.

Similarly, if the random variable๐บ = (๐‘‹โˆ’2) mod 3, thenthe channel (๐‘Œ; ๐บ) can play the role of the above โ€œChannel ๐ต.โ€

And now the form of channel capacity for channel (๐‘‹; ๐น)and channel (๐‘Œ; ๐บ) will be simpler. We have๐ถ(๐‘‹; ๐น) = max๐‘‹ [๐ผ(๐‘‹, ๐น)] = max๐‘‹ [๐ผ(๐‘‹, (๐‘Œ โˆ’ 2) mod3)] = max๐‘‹ [๐ผ(๐‘‹, ๐‘Œ)] = max๐‘‹ [โˆ‘ ๐‘ก๐‘ฅ๐‘ฆlog(๐‘ก๐‘ฅ๐‘ฆ/(๐‘๐‘ฅ๐‘ž๐‘ฆ))]. Themaximal value here is taken for all possible ๐‘ก๐‘ฅ๐‘ฆ and ๐‘๐‘ฅ. So,๐ถ(๐‘‹; ๐น) is actually the function of ๐‘ž0, ๐‘ž1, and ๐‘ž2.

Similarly, ๐ถ(๐‘Œ; ๐บ) = max๐‘Œ [๐ผ(๐‘Œ, ๐บ)] = max๐‘Œ [๐ผ(๐‘Œ, (๐‘‹โˆ’2) mod 3)] = max๐‘Œ [I(๐‘‹, ๐‘Œ)] = max๐‘Œ [โˆ‘ ๐‘ก๐‘ฅ๐‘ฆlog(๐‘ก๐‘ฅ๐‘ฆ/(๐‘๐‘ฅ๐‘ž๐‘ฆ))].The maximal value here is taken for all possible ๐‘ก๐‘ฅ๐‘ฆ and ๐‘ž๐‘ฆ.So, ๐ถ(๐‘Œ; ๐บ) is actually the function of ๐‘0, ๐‘1, and ๐‘2.2.2. The Strategy of Win. According to Theorem 3, if theprobability of a specific action is determined, the victory ofboth parties in the โ€œrock-paper-scissorsโ€ game is determinedas well. In order to obtain the victory with higher probability,one must adjust his strategy.

2.2.1.The Game between Two Fools. The so-called โ€œtwo foolsโ€means that ๐ด and ๐ต entrench their habits; that is, theychoose their actions in accordance with the established habitsno matter who won in the past. According to Theorem 3,statistically, if ๐ถ < ๐ท, ๐ด will lose; if ๐ถ > ๐ท, then ๐ด will win;and if ๐ถ = ๐ท, then both parties are well-matched in strength.

2.2.2. The Game between a Fool and a Sage. If ๐ด is a fool,he still insists on his inherent habit; then after confronting asufficient number of times, ๐ต can calculate the distributionprobabilities ๐‘ and ๐‘ž of random variable ๐‘‹ correspondingto ๐ด. And ๐ต can get the channel capacity of ๐ด by somerelated conditional probability distribution at last, and thenby adjusting their own habits (i.e., the probability distributionof the random variable ๐‘Œ and the corresponding conditionalprobability distribution, etc.); then ๐ต enlarges his own chan-nel capacity to make the rest of game more beneficial tohimself; moreover, the channel capacity of ๐ต is larger enough,๐ถ(๐ต) > ๐ถ(๐ด); then ๐ต win the success at last.

2.2.3. The Game between Two Sages. If both๐ด and ๐ต get usedto summarizing the habits of each other at any time, andadjust their habits, enlarge their channel capacity. At last, thetwo parties can get the equal value of channel capacities; thatis, the competition between them will tend to a balance, adynamically stable state.

3. Models of (Coin Tossing) and(Palm or Back)

3.1. The Channel Capacity of โ€œCoin Tossingโ€ Game. โ€œCointossingโ€ game: โ€œbankerโ€ covers a coin under his hand on thetable, and โ€œplayerโ€ guesses the head or tail of the coin. Theโ€œplayerโ€ will win when he guesses correctly.

Obviously, this game is a kind of โ€œnonblind confronta-tion.โ€ We will use the method of channel capacity to analyzethe winning or losing of the game.

Based on the Law of Large Numbers in the probabilitytheory, the frequency tends to probability. Thus, accordingto the habits of โ€œbankerโ€ and โ€œplayer,โ€ that is, the statisticalregularities of their actions in the past, we can give theprobability distribution of their actions.

We use the random variable ๐‘‹ to denote the state of theโ€œbanker.โ€ ๐‘‹ = 0 (๐‘‹ = 1) means the coin is head (tail).So the habit of โ€œbankerโ€ can be described by the probabilitydistribution of ๐‘‹; that is, Pr(๐‘‹ = 0) = ๐‘, Pr(๐‘‹ = 1) = 1 โˆ’ ๐‘,where 0 โ‰ค ๐‘ โ‰ค 1.

We use the random variable ๐‘Œ to denote the state of theโ€œplayer.โ€ ๐‘Œ = 0 (๐‘Œ = 1) means that he guesses head (tail).

Page 5: ResearchArticle Games Based Study of Nonblind Confrontation

Mathematical Problems in Engineering 5

So the habit of โ€œplayerโ€ can be described by the probabilitydistribution of ๐‘Œ; that is, Pr(๐‘Œ = 0) = ๐‘ž, Pr(๐‘Œ = 1) =1 โˆ’ ๐‘ž, where 0 โ‰ค ๐‘ž โ‰ค 1. Similarly, according to the paststates of โ€œbankerโ€ and โ€œplayer,โ€ we have the joint probabilitydistribution of random variables (๐‘‹,๐‘Œ); namely,

Pr (๐‘‹ = 0, ๐‘Œ = 0) = ๐‘Ž;Pr (๐‘‹ = 0, ๐‘Œ = 1) = ๐‘;Pr (๐‘‹ = 1, ๐‘Œ = 0) = ๐‘;Pr (๐‘‹ = 1, ๐‘Œ = 1) = ๐‘‘,

(6)

where 0 โ‰ค ๐‘, ๐‘ž, ๐‘Ž, ๐‘, ๐‘, ๐‘‘ โ‰ค 1 and๐‘Ž + ๐‘ + ๐‘ + ๐‘‘ = 1;

๐‘ = Pr (๐‘‹ = 0)= Pr (๐‘‹ = 0, ๐‘Œ = 0) + Pr (๐‘‹ = 0, ๐‘Œ = 1)= ๐‘Ž + ๐‘;

๐‘ž = Pr (๐‘Œ = 0)= Pr (๐‘‹ = 0, ๐‘Œ = 0) + Pr (๐‘‹ = 1, ๐‘Œ = 0)= ๐‘Ž + ๐‘.

(7)

Taking ๐‘‹ as the input and ๐‘Œ as the output, we obtain thechannel (๐‘‹;๐‘Œ) which is called โ€œChannel๐‘‹โ€ in this paper.

Because ๐‘Œ guesses correctly = {๐‘‹ = 0, ๐‘Œ = 0} โˆช {๐‘‹ =1, ๐‘Œ = 1} = one bit is successfully transmitted from the sender๐‘‹ to the receiver ๐‘Œ in โ€œChannel ๐‘‹,โ€ โ€œ๐‘Œ wins one timeโ€ isequivalent to transmitting one bit of information successfullyin โ€œChannel๐‘‹.โ€

Based on the channel coding theorem of Shannonโ€™s Infor-mation Theory, if the capacity of โ€œChannel ๐‘‹โ€ is ๐ถ, for anytransmission rate ๐‘˜/๐‘› โ‰ค ๐ถ, we can receive ๐‘˜ bits successfullyby sending ๐‘› bits with an arbitrarily small probability ofdecoding error. Conversely, if โ€œChannel๐‘‹โ€ can transmit ๐‘  bitsto the receiver by sending ๐‘› bits without error, there must be๐‘† โ‰ค ๐‘›๐ถ. In a word, we have the following theorem.

Theorem 4 (banker theorem). Suppose that the channelcapacity of โ€œChannel ๐‘‹โ€ composed of the random variable(๐‘‹;๐‘Œ) is ๐ถ. Then one has the following: (1) if ๐‘Œ wants to win๐‘˜ times, he must have a certain skill (corresponding to theShannon coding) to achieve the goal by any probability closeto 1 in the ๐‘˜/๐ถ rounds; conversely, (2) if ๐‘Œ wins ๐‘† times in ๐‘›rounds, there must be ๐‘† โ‰ค ๐‘›๐ถ.

According to Theorem 3, we only need to figure out thechannel capacity ๐ถ of โ€œChannel ๐‘‹โ€; then the limitation oftimes that โ€œ๐‘Œ winsโ€ is determined. So we can calculate thetransition probability matrix ๐ด = [๐ด(๐‘–, ๐‘—)], ๐‘–, ๐‘— = 0, 1 ofโ€œChannel๐‘‹โ€:

๐ด (0, 0) = Pr (๐‘Œ = 0 | ๐‘‹ = 0) = Pr (๐‘Œ = 0,๐‘‹ = 0)Pr (๐‘‹ = 0)

= ๐‘Ž๐‘ ;

๐ด (0, 1) = Pr (๐‘Œ = 1 | ๐‘‹ = 0) = Pr (๐‘Œ = 1,๐‘‹ = 0)Pr (๐‘‹ = 0)

= ๐‘๐‘ = 1 โˆ’ ๐‘Ž๐‘ ;๐ด (1, 0) = Pr (๐‘Œ = 0 | ๐‘‹ = 1) = Pr (๐‘Œ = 0,๐‘‹ = 1)

Pr (๐‘‹ = 1)= ๐‘(1 โˆ’ ๐‘) = (๐‘ž โˆ’ ๐‘Ž)(1 โˆ’ ๐‘) ;

๐ด (1, 1) = Pr (๐‘Œ = 1 | ๐‘‹ = 1) = Pr (๐‘Œ = 1,๐‘‹ = 1)Pr (๐‘‹ = 1)

= ๐‘‘(1 โˆ’ ๐‘) = 1 โˆ’ (๐‘ž โˆ’ ๐‘Ž)(1 โˆ’ ๐‘) .(8)

Thus, the mutual information ๐ผ(๐‘‹, ๐‘Œ) of๐‘‹ and ๐‘Œ equals

๐ผ (๐‘‹, ๐‘Œ) = โˆ‘๐‘‹

โˆ‘๐‘Œ

๐‘ (๐‘‹, ๐‘Œ) log( ๐‘ (๐‘‹, ๐‘Œ)[๐‘ (๐‘‹) ๐‘ (๐‘Œ)])= ๐‘Ž log[ ๐‘Ž(๐‘๐‘ž)] + ๐‘ log[ ๐‘[๐‘ (1 โˆ’ ๐‘ž)]]+ ๐‘ log[ ๐‘[(1 โˆ’ ๐‘) ๐‘ž]]+ ๐‘‘ log[ ๐‘‘[(1 โˆ’ ๐‘) (1 โˆ’ ๐‘ž)]]

= ๐‘Ž log[ ๐‘Ž(๐‘๐‘ž)] + (๐‘ โˆ’ ๐‘Ž) log[ (๐‘ โˆ’ ๐‘Ž)[๐‘ (1 โˆ’ ๐‘ž)]]+ (๐‘ž โˆ’ ๐‘Ž) log[ (๐‘ž โˆ’ ๐‘Ž)[(1 โˆ’ ๐‘) ๐‘ž]]+ (1 + ๐‘Ž โˆ’ ๐‘ โˆ’ ๐‘ž) log[ (1 + ๐‘Ž โˆ’ ๐‘ โˆ’ ๐‘ž)[(1 โˆ’ ๐‘) (1 โˆ’ ๐‘ž)]] .

(9)

Thus, the channel capacity ๐ถ of โ€œChannel ๐‘‹โ€ is equalto max[๐ผ(๐‘‹, ๐‘Œ)] (the maximal value here is taken fromall possible binary random variables ๐‘‹). In a word, ๐ถ =max[๐ผ(๐‘‹, ๐‘Œ)] 0 < ๐‘Ž, ๐‘ < 1 (where ๐ผ(๐‘‹, ๐‘Œ) is the mutualinformation above).Thus, the channel capacity๐ถ of โ€œChannel๐‘‹โ€ is a function of ๐‘ž, which is defined as ๐ถ(๐‘ž).

Suppose the random variable ๐‘ = (๐‘‹+ 1) mod 2. Taking๐‘Œ as the input and ๐‘ as the output, we obtain the channel(๐‘Œ; ๐‘) which is called โ€œChannel ๐‘Œโ€ in this paper.Because {๐‘‹wins} = {๐‘Œ = 0,๐‘‹ = 1} โˆช {๐‘Œ = 1,๐‘‹ = 0} ={๐‘Œ = 0, ๐‘ = 0} โˆช {๐‘Œ = 1, ๐‘ = 1} = {one bit is successfully

transmitted from the sender ๐‘Œ to the receiver ๐‘ in theโ€œChannelYโ€}, โ€œ๐‘‹wins one timeโ€ is equivalent to transmittingone bit of information successfully in โ€œChannel ๐‘Œ.โ€

Based on theChannel coding theoremof Shannonโ€™s Infor-mation Theory, if the capacity of โ€œChannel ๐‘Œโ€ is ๐ท, for anytransmission rate ๐‘˜/๐‘› โ‰ค ๐ท, we can receive ๐‘˜ bits successfullyby sending ๐‘› bits with an arbitrarily small probability of

Page 6: ResearchArticle Games Based Study of Nonblind Confrontation

6 Mathematical Problems in Engineering

decoding error. Conversely, if โ€œChannel๐‘Œโ€ can transmit ๐‘  bitsto the receiver by sending ๐‘› bits without error, there must be๐‘† โ‰ค ๐‘›๐ท. In a word, we have the following theorem.

Theorem5 (player theorem). Suppose that the channel capac-ity of โ€œChannel ๐‘Œโ€ composed of the random variable (๐‘Œ;๐‘) is๐ท. Then one has the following: (1) if ๐‘‹ wants to win ๐‘˜ times,he must have a certain skill (corresponding to the Shannoncoding) to achieve the goal by any probability close to 1 in the๐‘˜/๐ถ rounds; conversely, (2) if ๐‘‹ wins ๐‘† times in the n rounds,there must be ๐‘† โ‰ค ๐‘›๐ท.

According to Theorem 4, we can determine the winninglimitation of๐‘‹ as long as we know the channel capacity๐ท ofโ€œChannel ๐‘Œ.โ€

Similarly, we can get the channel capacity ๐ท =max [๐ผ(๐‘Œ, ๐‘)], 0 < ๐‘Ž, ๐‘ž < 1, of โ€œChannel๐‘Œ.โ€Thus, the channelcapacity๐ท of โ€œChannel๐‘Œโ€ is a function of๐‘, which is denotedas๐ท(๐‘).๐ผ (๐‘Œ, ๐‘) = โˆ‘

๐‘Œ

โˆ‘๐‘

๐‘ (๐‘Œ, ๐‘) log( ๐‘ (๐‘Œ, ๐‘)[๐‘ (๐‘Œ) ๐‘ (๐‘)])= ๐‘Ž log[ ๐‘Ž(๐‘๐‘ž)] + (๐‘ โˆ’ ๐‘Ž) log[ (๐‘ โˆ’ ๐‘Ž)[๐‘ (1 โˆ’ ๐‘ž)]]+ (๐‘ž โˆ’ ๐‘Ž) log[ (๐‘ž โˆ’ ๐‘Ž)[(1 โˆ’ ๐‘) ๐‘ž]]+ (1 + ๐‘Ž โˆ’ ๐‘ โˆ’ ๐‘ž) log[ (1 + ๐‘Ž โˆ’ ๐‘ โˆ’ ๐‘ž)[(1 โˆ’ ๐‘) (1 โˆ’ ๐‘ž)]] .

(10)

From Theorems 3 and 4, we can obtain the quantitativeresults of โ€œthe statistical results of winning and losingโ€ andโ€œthe game skills of banker and player.โ€

Theorem 6 (strength theorem). In the game of โ€œcoin tossing,โ€if the channel capacities of โ€œChannel ๐‘‹โ€ and โ€œChannel ๐‘Œโ€ are๐ถ(๐‘ž) and๐ท(๐‘), respectively, one has the following.Case 1. If both๐‘‹ and๐‘Œ do not try to adjust their habits in theprocess of game, that is, ๐‘ and ๐‘ž are constant, statistically, if๐ถ(๐‘ž) > ๐ท(๐‘), ๐‘Œ will win; if ๐ถ(๐‘ž) < ๐ท(๐‘), ๐‘‹ will win; and if๐ถ(๐‘ž) = ๐ท(๐‘), the final result of the game is a โ€œdraw.โ€

Case 2. If๐‘‹ implicitly adjusts his habit and๐‘Œ does not, that is,change the probability distribution ๐‘ of the random variable๐‘‹ to enlarge the๐ท(๐‘) of โ€œChannel๐‘Œโ€ such that๐ท(๐‘) > ๐ถ(๐‘),statistically,๐‘‹will win.On the contrary, if๐‘Œ implicitly adjustshis habit and๐‘‹ does not, that is,๐ท(๐‘) < ๐ถ(๐‘), ๐‘Œ will win.

Case 3. If both ๐‘‹ and ๐‘Œ continuously adjust their habits andmake ๐ถ(๐‘ž) and ๐ท(๐‘) grow simultaneously, they will achievea dynamic balance when ๐‘ = ๐‘ž = 0.5, and there is no winneror loser in this case.

3.2. The Channel Capacity of โ€œPalm or Backโ€ Game. Theโ€œpalm or backโ€ game: three participants (๐ด, ๐ต, and๐ถ) choosetheir actions of โ€œpalmโ€ or โ€œbackโ€ at the same time; if one of theparticipants choose the opposite action to the others (e.g., the

others choose โ€œpalmโ€ when he chooses โ€œbackโ€), he will winthis round.

Obviously, this game is also a kind of โ€œnonblind con-frontation.โ€ We will use the method of channel capacity toanalyze the winning or losing of the game.

Based on the Law of Large Numbers in the probabilitytheory, the frequency tends to probability.Thus, according tothe habits of ๐ด, ๐ต, and ๐ถ, that is, the statistical regularities oftheir actions in the past, we have the probability distributionof their actions.

We use the random variable ๐‘‹ to denote the state of ๐ด.๐‘‹ = 0 (๐‘Œ = 1) means that he chooses โ€œpalm (back).โ€ Thus,the habit of๐ด can be described as the probability distributionof ๐‘‹; that is, Pr(๐‘‹ = 0) = ๐‘, Pr(๐‘‹ = 1) = 1 โˆ’ ๐‘, where0 โ‰ค ๐‘ โ‰ค 1.

We use random variable ๐‘Œ to denote the state of ๐ต. ๐‘Œ =0 (๐‘Œ = 1) means that he chooses โ€œpalm (back)โ€. Thus, thehabit of ๐ต can be described as the probability distribution of๐‘‹, that is, Pr(๐‘Œ = 0) = ๐‘ž, Pr(๐‘Œ = 1) = 1 โˆ’ ๐‘ž, where 0 โ‰ค ๐‘ž โ‰ค 1.

We use the random variable ๐‘ to denote the state of ๐ถ.๐‘ = 0 (๐‘ = 1) means that he chooses โ€œpalm (back).โ€ Thus,the habit of๐ถ can be described as the probability distributionof๐‘; that is, Pr(๐‘ = 0) = ๐‘Ÿ, Pr(๐‘ = 1) = 1โˆ’๐‘Ÿ, where 0 โ‰ค ๐‘Ÿ โ‰ค 1.

Similarly, according to the Law of Large Numbers, wecan obtain the joint probability distributions of the randomvariables (๐‘‹, ๐‘Œ, ๐‘) from the records of their game results aftersome rounds; namely,

Pr (๐ด for palm, ๐ต for palm, ๐ถ for palm)= Pr (๐‘‹ = 0 ๐‘Œ = 0 ๐‘ = 0) = ๐‘Ž;

Pr (๐ด for palm, ๐ต for palm, ๐ถ for back)= Pr (๐‘‹ = 0 ๐‘Œ = 0 ๐‘ = 1) = ๐‘;

Pr (๐ด for palm, ๐ต for back, ๐ถ for palm)= Pr (๐‘‹ = 0 ๐‘Œ = 1 ๐‘ = 0) = ๐‘;

Pr (๐ด for palm, ๐ต for back, ๐ถ for back)= Pr (๐‘‹ = 0 ๐‘Œ = 1 ๐‘ = 1) = ๐‘‘;

Pr (๐ด for back, ๐ต for palm, ๐ถ for palm)= Pr (๐‘‹ = 1 ๐‘Œ = 0 ๐‘ = 0) = ๐‘’;

Pr (๐ด for back, ๐ต for palm, ๐ถ for back)= Pr (๐‘‹ = 1 ๐‘Œ = 0 ๐‘ = 1) = ๐‘“;

Pr (๐ด for back, ๐ต for back, ๐ถ for palm)= Pr (๐‘‹ = 1 ๐‘Œ = 1 ๐‘ = 0) = ๐‘”;

Pr (๐ด for back, ๐ต for back, ๐ถ for back)= Pr (๐‘‹ = 1 ๐‘Œ = 1 ๐‘ = 1) = โ„Ž,

(11)

where 0 โ‰ค ๐‘, ๐‘ž, ๐‘Ÿ, ๐‘Ž, ๐‘, ๐‘, ๐‘‘, ๐‘’, ๐‘“, ๐‘”, โ„Ž โ‰ค 1 and๐‘Ž + ๐‘ + ๐‘ + ๐‘‘ + ๐‘’ + ๐‘“ + ๐‘” + โ„Ž = 1;๐‘ = Pr (๐ด for palm) = Pr (๐‘‹ = 0) = ๐‘Ž + ๐‘ + ๐‘ + ๐‘‘;๐‘ž = Pr (๐ต for palm) = Pr (๐‘Œ = 0) = ๐‘Ž + ๐‘ + ๐‘’ + ๐‘“;๐‘Ÿ = Pr (๐ถ for palm) = Pr (๐‘ = 0) = ๐‘Ž + ๐‘ + ๐‘’ + ๐‘”.

(12)

Page 7: ResearchArticle Games Based Study of Nonblind Confrontation

Mathematical Problems in Engineering 7

Suppose the random variable๐‘€ = (๐‘‹ + ๐‘Œ + ๐‘) mod 2;then the probability distribution of๐‘€ is

Pr (๐‘€ = 0) = Pr (๐‘‹ = 0, ๐‘Œ = 0, ๐‘ = 0)+ Pr (๐‘‹ = 0, ๐‘Œ = 1, ๐‘ = 1)+ Pr (๐‘‹ = 1, ๐‘Œ = 1, ๐‘ = 0)+ Pr (๐‘‹ = 1, ๐‘Œ = 0, ๐‘ = 1)

= ๐‘Ž + ๐‘‘ + ๐‘” + ๐‘“,Pr (๐‘€ = 1) = Pr (๐‘‹ = 0, ๐‘Œ = 0, ๐‘ = 1)

+ Pr (๐‘‹ = 0, ๐‘Œ = 1, ๐‘ = 0)+ Pr (๐‘‹ = 1, ๐‘Œ = 0, ๐‘ = 0)+ Pr (๐‘‹ = 1, ๐‘Œ = 1, ๐‘ = 1)

= ๐‘ + ๐‘ + ๐‘’ + โ„Ž.

(13)

Taking๐‘‹ as the input and๐‘€ as the output, we obtain thechannel (๐‘‹;๐‘€) which is called โ€œChannel ๐ดโ€ in this paper.

After removing the situations in which three participantschoose the same actions, we have the following equation:{๐ด wins} = {๐ด for palm, ๐ต for back, ๐ถ for back} โˆช{๐ด for back, ๐ต for palm, ๐ถ for palm} = {๐‘‹ = 0, ๐‘Œ = 1, ๐‘ =1}โˆช{๐‘‹ = 1, ๐‘Œ = 0, ๐‘ = 0} = {๐‘‹ = 0,๐‘€ = 0}โˆช{๐‘‹ = 1,๐‘€ = 1}= {one bit is successfully transmitted from the sender (๐‘‹) tothe receiver (๐‘€) in the โ€œChannel Aโ€}.

Conversely, after removing the situations that three par-ticipants choose the same actions, if {one bit is successfullytransmitted from sender (๐‘‹) to the receiver (๐‘€) in theโ€œChannel Aโ€}, there is {๐‘‹ = 0,๐‘€ = 0} โˆช {๐‘‹ = 1,๐‘€ = 1} ={๐‘‹ = 0, ๐‘Œ = 1, ๐‘ = 1} โˆช {๐‘‹ = 1, ๐‘Œ = 0, ๐‘ = 0} = {๐ด forpalm, ๐ต for back, ๐ถ for back} โˆช {๐ด for back, ๐ต for palm, ๐ถfor palm} = {๐ด wins}. Thus, โ€œ๐ด wins one timeโ€ is equivalentto transmitting one bit successfully from the sender ๐‘‹ to thereceiver ๐‘€ in the โ€œChannel ๐ด.โ€ From the channel codingtheorem of Shannonโ€™s Information Theory, if the capacity ofthe โ€œChannel ๐ดโ€ is ๐ธ, for any transmission rate ๐‘˜/๐‘› โ‰ค ๐ธ,we can receive ๐‘˜ bits successfully by sending ๐‘› bits with anarbitrarily small probability of decoding error. Conversely, ifthe โ€œChannel๐ดโ€ can transmit ๐‘  bits to the receiver by sending๐‘› bits without error, there must be ๐‘† โ‰ค ๐‘›๐ธ. In a word, we havethe following theorem.

Theorem7. Suppose that the channel capacity of the โ€œChannel๐ดโ€ composed of the random variable (๐‘‹;๐‘€) is ๐ธ. Then, afterremoving the situations in which three participants choose thesame actions, one has the following: (1) if ๐ด wants to win๐‘˜ times, he must have a certain skill (corresponding to theShannon coding theory) to achieve the goal by any probabilityclose to 1 in the ๐‘˜/๐ธ rounds; conversely, (2) if ๐ด wins ๐‘† times inthe ๐‘› rounds, there must be ๐‘† โ‰ค ๐‘›๐ธ.

In order to calculate the channel capacity of the channel(๐‘‹;๐‘€), we should first calculate the joint probability distri-bution of the random variable (๐‘‹,๐‘€):

Pr (๐‘‹ = 0,๐‘€ = 0) = Pr (๐‘‹ = 0, ๐‘Œ = 0, ๐‘ = 0)+ Pr (๐‘‹ = 0, ๐‘Œ = 1, ๐‘ = 1)

= ๐‘Ž + ๐‘‘;

Pr (๐‘‹ = 0,๐‘€ = 1) = Pr (๐‘‹ = 0, ๐‘Œ = 1, ๐‘ = 0)+ Pr (๐‘‹ = 0, ๐‘Œ = 0, ๐‘ = 1)

= ๐‘ + ๐‘;Pr (๐‘‹ = 1,๐‘€ = 0) = Pr (๐‘‹ = 1, ๐‘Œ = 1, ๐‘ = 0)

+ Pr (๐‘‹ = 1, ๐‘Œ = 0, ๐‘ = 1)= ๐‘” + ๐‘“;

Pr (๐‘‹ = 1,๐‘€ = 1) = Pr (๐‘‹ = 1, ๐‘Œ = 0, ๐‘ = 0)+ Pr (๐‘‹ = 1, ๐‘Œ = 1, ๐‘ = 1)

= ๐‘’ + โ„Ž.(14)

Therefore, the mutual information between ๐‘‹ and ๐‘€equals

๐ผ (๐‘‹,๐‘€) = (๐‘Ž + ๐‘‘) log[ (๐‘Ž + ๐‘‘)[๐‘ (๐‘Ž + ๐‘‘ + ๐‘” + ๐‘“)]]+ (๐‘” + ๐‘“) log[ (๐‘” + ๐‘“)[(1 โˆ’ ๐‘) (๐‘Ž + ๐‘‘ + ๐‘” + ๐‘“)]]+ (๐‘ + ๐‘) log[ (๐‘ + ๐‘)[๐‘ (๐‘ + ๐‘ + ๐‘’ + โ„Ž)]] + (๐‘’ + โ„Ž)โ‹… log[ (๐‘’ + โ„Ž)[(1 โˆ’ ๐‘) (๐‘ + ๐‘ + ๐‘’ + โ„Ž)]] = (๐‘Ž + ๐‘‘)โ‹… log[ (๐‘Ž + ๐‘‘)[๐‘ (๐‘Ž + ๐‘‘ + ๐‘” + ๐‘“)]] + (๐‘” + ๐‘“)โ‹… log[ (๐‘” + ๐‘“)[(1 โˆ’ ๐‘) (๐‘Ž + ๐‘‘ + ๐‘” + ๐‘“)]] + (๐‘ โˆ’ ๐‘Ž โˆ’ ๐‘‘)โ‹… log[ (๐‘ โˆ’ ๐‘Ž โˆ’ ๐‘‘)[๐‘ (1 โˆ’ (๐‘Ž + ๐‘‘ + ๐‘“ + ๐‘”))]]+ (1 โˆ’ (๐‘ + ๐‘“ + ๐‘”))โ‹… log[ (1 โˆ’ (๐‘ + ๐‘“ + ๐‘”))[(1 โˆ’ ๐‘) (1 โˆ’ (๐‘Ž + ๐‘‘ + ๐‘“ + ๐‘”))]] .

(15)

Thus, the channel capacity of โ€œchannel ๐ดโ€ is equal to ๐ธ =max[๐ผ(๐‘‹,๐‘€)] and it is a function of ๐‘ž and ๐‘Ÿ, which is definedas ๐ธ(๐‘ž, ๐‘Ÿ).

Taking ๐‘Œ as the input and ๐‘€ as the output, we obtainthe channel (๐‘Œ,๐‘€)which is called โ€œChannel ๐ต.โ€ Similarly, wehave the following.

Theorem8. Suppose that the channel capacity of the โ€œChannel๐ตโ€ composed of the random variable (๐‘Œ;๐‘€) is ๐น. Then, afterremoving the situation in which the three participants choosethe same action, one has the following: (1) if ๐ต wants to win๐‘˜ times, he must have a certain skill (corresponding to theShannon coding) to achieve the goal by any probability close

Page 8: ResearchArticle Games Based Study of Nonblind Confrontation

8 Mathematical Problems in Engineering

to 1 in the ๐‘˜/๐น rounds; conversely, (2) if ๐ต wins ๐‘† times in the nrounds, there must be ๐‘† โ‰ค ๐‘›๐น.

The channel capacity ๐น can be calculated as the sameway of calculating ๐ธ. Here, the capacity of โ€œChannel ๐ตโ€ is afunction of ๐‘ and ๐‘Ÿ, which can be defined as ๐น(๐‘, ๐‘Ÿ).

Similarly, taking ๐‘ as the input and๐‘€ as the output, weobtain the channel (๐‘,๐‘€)which is called โ€œChannel๐ถ.โ€ So wehave the following.

Theorem9. Suppose that the channel capacity of the โ€œChannel๐ถโ€ composed of the random variable (๐‘;๐‘€) is ๐บ. Then, afterremoving the situations in which three participants choose thesame actions, one has the following: (1) if ๐ถ wants to win๐‘˜ times, he must have a certain skill (corresponding to theShannon coding theory) to achieve the goal by any probabilityclose to 1 in the ๐‘˜/๐น rounds; conversely, (2) if ๐ถ wins ๐‘† times inthe ๐‘› rounds, there must be ๐‘† โ‰ค ๐‘›๐บ.

The channel capacity ๐บ can be calculated by the sameway of calculating ๐ธ. Now the capacity of โ€œChannel ๐ถโ€ is afunction of ๐‘ and ๐‘ž, which can be defined as ๐บ(๐‘, ๐‘ž).

FromTheorems 6, 7, and 8, we can qualitatively describethe winning or losing situations of๐ด, ๐ต, and ๐ถ in the palm orback game.

Theorem 10. If the channel capacities of โ€œChannel๐ด,โ€ โ€œChan-nel ๐ต,โ€ and โ€œChannel ๐ถโ€ are ๐ธ, ๐น, and ๐บ, respectively, thestatistical results of winning or losing depend on the values of๐ธ, ๐น, and ๐บ. The one who has the largest channel capacity willgain the priority.We can know that the three channel capacitiescannot be adjusted only by one participant individually. It isdifficult to change the final results by adjusting oneโ€™s habit(namely, only change one of the ๐‘, ๐‘ž, and ๐‘Ÿ separately), unlesstwo of them cooperate secretly.

4. Models of (Finger Guessing) and(Draw Boxing)

4.1. Model of โ€œFinger Guessingโ€. โ€œFinger guessingโ€ is a gamebetween the host and guest in the banquet. The rules of thegame are the following. The host and the guest, respectively,choose one of the following four gestures at the same timein a round: bug, rooster, tiger, and stick. Then they decidethe winner by the following regulations: โ€œBugโ€ is inferior toโ€œroosterโ€; โ€œroosterโ€ is inferior to โ€œtigerโ€; โ€œtigerโ€ is inferior toโ€œstickโ€; and โ€œstickโ€ is inferior to โ€œbugโ€. Beyond that, the gameis ended in a draw and nobody will be punished.

The โ€œhost ๐ดโ€ and โ€œguest ๐ตโ€ will play the โ€œfinger guessinggameโ€ again after the complete end of this round.Themathe-matical expression of โ€œfinger guessing gameโ€ is as follows:suppose ๐ด and ๐ต are denoted by random variables ๐‘‹ and ๐‘Œ,respectively; there are 4 possible values of them. Specifically,

๐‘‹ = 0 (or ๐‘Œ = 0) when ๐ด (or ๐ต) shows โ€œbugโ€;๐‘‹ = 1 (or ๐‘Œ = 1) when ๐ด (or ๐ต) shows โ€œcockโ€;๐‘‹ = 2 (or ๐‘Œ = 2) when ๐ด (or ๐ต) shows โ€œtigerโ€;๐‘‹ = 3 (or ๐‘Œ = 3) when ๐ด (or ๐ต) shows โ€œstickโ€.If ๐ด shows ๐‘ฅ (namely, ๐‘‹ = ๐‘ฅ, 0 โ‰ค ๐‘ฅ โ‰ค 3) and ๐ต shows๐‘ฆ (namely, ๐‘Œ = ๐‘ฆ, 0 โ‰ค ๐‘ฆ โ‰ค 3) in a round, the necessary and

sufficient condition of ๐ด wins in this round is (๐‘ฅ โˆ’ ๐‘ฆ) mod4 = 1. The necessary and sufficient condition of ๐ต wins inthis round is (๐‘ฆ โˆ’ ๐‘ฅ) mod 4 = 1. Otherwise, this round endsin a draw and proceeds to the next round of the game.

Obviously, the โ€œfinger guessingโ€ game is a kind of โ€œnon-blind confrontation.โ€Who is thewinner and howmany timesthe winner wins? How can they make themselves win more?We will use the โ€œchannel capacity methodโ€ of the โ€œGeneralTheory of Securityโ€ to answer these questions.

Based on the Law of Large Numbers in the probabilitytheory, the frequency tends to probability.Thus, according tothe habits of โ€œhost (๐‘‹)โ€ and โ€œguest (๐‘Œ),โ€ that is, the statisticalregularities of their actions in the past (if they meet for thefirst time, we can require them to play a โ€œwarm-up gameโ€ andrecord their habits), we can give the probability distribution of๐‘‹,๐‘Œ and the joint probability distribution of (๐‘‹, ๐‘Œ), respectively:0 < Pr (๐‘‹ = ๐‘–) = ๐‘๐‘– < 1,๐‘– = 0, 1, 2, 3; ๐‘0 + ๐‘1 + ๐‘2 + ๐‘3 = 1;0 < Pr (๐‘Œ = ๐‘–) = ๐‘ž๐‘– < 1,๐‘– = 0, 1, 2, 3; ๐‘ž0 + ๐‘ž1 + ๐‘ž2 + ๐‘ž3 = 1;0 < Pr (๐‘‹ = ๐‘–, ๐‘Œ = ๐‘—) = ๐‘ก๐‘–๐‘— < 1,

๐‘–, ๐‘— = 0, 1, 2, 3; โˆ‘0โ‰ค๐‘–,๐‘—โ‰ค3

๐‘ก๐‘–๐‘— = 1.๐‘๐‘ฅ = โˆ‘0โ‰ค๐‘ฆโ‰ค3

๐‘ก๐‘ฅ๐‘ฆ, ๐‘ฅ = 0, 1, 2, 3;๐‘ž๐‘ฆ = โˆ‘0โ‰ค๐‘ฅโ‰ค3

๐‘ก๐‘ฅ๐‘ฆ, ๐‘ฆ = 0, 1, 2, 3.

(16)

In order to analyze the winning situation of ๐ด, weconstruct a random variable ๐‘ = (๐‘Œ + 1) mod 4. Then weuse the random variables ๐‘‹ and ๐‘ to form a channel (๐‘‹; ๐‘),which is called โ€œchannel ๐ดโ€; namely, the channel takes ๐‘‹as the input and ๐‘ as the output. Then we analyze someequations of the events. If ๐ด shows ๐‘ฅ (namely, ๐‘‹ = ๐‘ฅ, 0 โ‰ค๐‘ฅ โ‰ค 3) and ๐ต shows ๐‘ฆ (namely, ๐‘Œ = ๐‘ฆ, 0 โ‰ค ๐‘ฆ โ‰ค 3) in a round,one has the following.

If ๐ด wins in this round, there is (๐‘ฅ โˆ’ ๐‘ฆ) mod 4 = 1; thatis, ๐‘ฆ = (๐‘ฅ โˆ’ 1) mod 4, so we have ๐‘ง = (๐‘ฆ + 1) mod 4 = [(๐‘ฅ โˆ’1) + 1] mod 4 = ๐‘ฅ mod 4 = ๐‘ฅ. In other words, the output ๐‘is always equal to the input ๐‘‹ in the channel ๐ด at this time.That is, a โ€œbitโ€ is successfully transmitted from the input๐‘‹ toits output ๐‘.

In contrast, if a โ€œbitโ€ is successfully transmitted from theinput ๐‘‹ to the output ๐‘ in the โ€œchannel ๐ด,โ€ โ€œthe output ๐‘ง isalways equal to its input ๐‘ฅ; namely, ๐‘ง = ๐‘ฅโ€ is true at this time.Then there is (๐‘ฅ โˆ’ ๐‘ฆ) mod 4 = (๐‘ง โˆ’ ๐‘ฆ) mod 4 = [(๐‘ฆ + 1) โˆ’๐‘ฆ] mod 4 = 1 mod 4 = 1. Hence, we can judge that โ€œ๐ด winsโ€according to the rules of this game.

Combining with the situations above, one has the follow-ing.

Lemma 11. In the โ€œfinger guessingโ€ game, โ€œ๐ดwins one timeโ€ isequivalent to โ€œa โ€˜bitโ€™ is successfully transmitted from the inputto its output in the โ€˜channel A.โ€™โ€ Combine Lemma 1 with theโ€œchannel coding theoremโ€ of Shannonโ€™s Information Theory; ifthe capacity of the โ€œchannel ๐ดโ€ is ๐ถ, for any transmission rate๐‘˜/๐‘› โ‰ค ๐ถ, we can receive ๐‘˜ bits successfully by sending ๐‘› bits with

Page 9: ResearchArticle Games Based Study of Nonblind Confrontation

Mathematical Problems in Engineering 9

an arbitrarily small probability of decoding error. Conversely, ifthe โ€œchannel ๐ดโ€ can transmit ๐‘  bits to the receiver by sending ๐‘›bits without error, there must be ๐‘† โ‰ค ๐‘›๐ถ. In a word, we havethe following theorem.

Theorem 12. Suppose that the channel capacity of the โ€œchannel๐ดโ€ composed of the random variable (๐‘‹; ๐‘) is ๐ถ. Then afterremoving the situation of โ€œdraw,โ€ one has the following: (1)if ๐ด wants to win ๐‘˜ times, he must have a certain skill(corresponding to the Shannon coding) to achieve the goal byany probability close to 1 in the ๐‘˜/๐ถ rounds; conversely, (2) if๐ดwins ๐‘† times in the ๐‘› rounds, there must be ๐‘† โ‰ค ๐‘›๐ถ.

According to Theorem 12, we only need to figure out thechannel capacity ๐ถ of the โ€œchannel ๐ด,โ€ then the limitation ofthe times of โ€œ๐ด winsโ€ is determined. So we can calculate thechannel capacity ๐ถ: first, the joint probability distribution of(๐‘‹, ๐‘) is Pr(๐‘‹ = ๐‘–, ๐‘ = ๐‘—) = Pr(๐‘‹ = ๐‘–, (๐‘Œ + 1) mod 4 = ๐‘—) =Pr(๐‘‹ = ๐‘–, ๐‘Œ = (๐‘— โˆ’ 1) mod 4) = ๐‘ก๐‘–(๐‘—โˆ’1) mod 4, ๐‘–, ๐‘— = 0, 1, 2, 3, 4.

Therefore, the channel capacity of the channel ๐ด(๐‘‹;๐‘) is๐ถ = max [๐ผ (๐‘‹, ๐‘)]= max

{{{ โˆ‘0โ‰ค๐‘–,๐‘—โ‰ค3

[๐‘ก๐‘–(๐‘—โˆ’1) mod 4] log [๐‘ก๐‘–(๐‘—โˆ’1) mod 4](๐‘๐‘–๐‘ž๐‘—)}}} .

(17)

The max in the equation is the maximal value taken from thereal numbers which satisfy the following conditions: 0 < ๐‘๐‘–,๐‘ก๐‘–๐‘— < 1, ๐‘–, ๐‘— = 0, 1, 2, 3;๐‘0+๐‘1+๐‘2+๐‘3 = 1;โˆ‘0โ‰ค๐‘–,๐‘—โ‰ค3 ๐‘ก๐‘–๐‘— = 1;๐‘๐‘ฅ =โˆ‘0โ‰ค๐‘ฆโ‰ค3 ๐‘ก๐‘ฅ๐‘ฆ. Thus, the capacity๐ถ is actually the function of thepositive real variables which satisfy the following conditions๐‘ž0 + ๐‘ž1 + ๐‘ž2 + ๐‘ž3 = 1 and 0 < ๐‘ž๐‘– < 1, ๐‘– = 0, 1, 2, 3; namely, itcan be written as ๐ถ(๐‘ž0, ๐‘ž1, ๐‘ž2, ๐‘ž3), where ๐‘ž0 + ๐‘ž1 + ๐‘ž2 + ๐‘ž3 = 1.

Similarly, we can analyze the situation of โ€œ๐ตwins.โ€We cansee that the times of โ€œ๐ดwinsโ€ (๐ถ(๐‘ž0, ๐‘ž1, ๐‘ž2, ๐‘ž3)) depend on thehabit of ๐ต(๐‘ž0, ๐‘ž1, ๐‘ž2, ๐‘ž3). If both ๐ด and ๐ต stick to their habits,their winning or losing situation is determined; if either ๐ด or๐ต adjusts his habit, he can win statistically when his channelcapacity is larger; if both ๐ด and ๐ต adjust their habits, theirsituations will eventually reach a dynamic balance.

4.2. Model of โ€œDraw Boxingโ€. โ€œDraw boxingโ€ is more compli-cated than โ€œfinger guessing,โ€ and it is also a game between thehost and guest in the banquet.The rule of the game is that thehost (๐ด) and the guest (๐ต) independently show one of the sixgestures from 0 to 5 and shout one of eleven numbers from0 to 10. That is, in each round, โ€œhost ๐ดโ€ is a two-dimensionalrandom variable ๐ด = (๐‘‹, ๐‘Œ), where 0 โ‰ค ๐‘‹ โ‰ค 5 is the gestureshowed by the โ€œhostโ€ and 0 โ‰ค ๐‘Œ โ‰ค 10 is the number shoutedby him. Similarly, โ€œguest๐ตโ€ is also a two-dimensional randomvariable ๐ต = (๐น, ๐บ), where 0 โ‰ค ๐น โ‰ค 5 is the gesture showed bythe โ€œguestโ€ and 0 โ‰ค ๐บ โ‰ค 10 is the number shouted by him. If๐ด and ๐ต are denoted by (๐‘ฅ, ๐‘ฆ) and (๐‘“, ๐‘”) in a certain round,respectively, the rules of the โ€œdraw boxingโ€ game are

If ๐‘ฅ + ๐‘“ = ๐‘ฆ, ๐ด wins;If ๐‘ฅ + ๐‘“ = ๐‘”, ๐ต wins.

If the above two cases donot occur, the result of this roundis a โ€œdraw,โ€ and๐ด and๐ต continue the next round. Specifically,when the numbers shouted by both sides are the same

(namely, ๐‘” = ๐‘ฆ), the result of this round is a โ€œdraw.โ€ However,the numbers shouted by both sides are different and the ges-tures showed by them are not equal to โ€œthe number shoutedby any sideโ€; the result of this round also comes to a โ€œdraw.โ€

Obviously, the โ€œdraw boxingโ€ game is a kind of โ€œnonblindconfrontation.โ€ Who is the winner and how many times thewinner wins? How can they make themselves win more? Wewill use the channel capacity method of the โ€œGeneral Theoryof Securityโ€ to answer these questions.

Based on the Law of Large Numbers in the probabilitytheory, the frequency tends to probability.Thus, according tothe habits of โ€œhost (๐ด)โ€ and โ€œguest (๐ต)โ€, that is the statisticalregularities of their actions in the past (if they meet for thefirst time, we can require them to play a โ€œwarm-up gameโ€ andrecord their habits), we can give the probability distributionof ๐ด, ๐ต and their components ๐‘‹, ๐‘Œ, ๐น, and ๐บ, and the jointprobability distribution of (๐‘‹, ๐‘Œ, ๐น, ๐บ), respectively.

The probability of โ€œ๐ด shows ๐‘ฅโ€:0 < Pr(๐‘‹ = ๐‘ฅ) = ๐‘๐‘ฅ < 1, 0 โ‰ค ๐‘ฅ โ‰ค 5; ๐‘ฅ0 + ๐‘ฅ1 + ๐‘ฅ2 +๐‘ฅ3 + ๐‘ฅ4 + ๐‘ฅ5 = 1;

The probability of โ€œ๐ต shows ๐‘“โ€:0 < Pr(๐น = ๐‘“) = ๐‘ž๐‘“ < 1, 0 โ‰ค ๐‘“ โ‰ค 5; ๐‘“0 + ๐‘“1 + ๐‘“2 +๐‘“3 + ๐‘“4 + ๐‘“5 = 1;

The probability of โ€œ๐ด shouts ๐‘ฆโ€:0 < Pr(๐‘Œ = ๐‘ฆ) = ๐‘Ÿ๐‘ฆ < 1, 0 โ‰ค ๐‘ฆ โ‰ค 10; โˆ‘0โ‰ค๐‘ฆโ‰ค10 ๐‘Ÿ๐‘ฆ = 1;The probability of โ€œ๐ต shouts ๐‘”โ€:0 < Pr(๐บ = ๐‘”) = ๐‘ ๐‘” < 1, 0 โ‰ค ๐‘” โ‰ค 10; โˆ‘0โ‰ค๐‘”โ‰ค10 ๐‘ ๐‘” = 1;The probability of โ€œ๐ด shows ๐‘ฅ and shouts ๐‘ฆโ€:0 < Pr[๐ด = (๐‘ฅ, ๐‘ฆ)] = Pr(๐‘‹ = ๐‘ฅ, ๐‘Œ = ๐‘ฆ) = ๐‘๐‘ฅ๐‘ฆ < 1,0 โ‰ค ๐‘ฆ โ‰ค 10, 0 โ‰ค ๐‘ฅ โ‰ค 5, โˆ‘0โ‰ค๐‘ฆโ‰ค10,0โ‰ค๐‘ฅโ‰ค5 ๐‘๐‘ฅ๐‘ฆ = 1;The probability of โ€œ๐ต shows ๐‘“ and shouts ๐‘”โ€:0 < Pr[๐ต = (๐‘“, ๐‘”)] = Pr(๐น = ๐‘“, ๐บ = ๐‘”) = โ„Ž๐‘“๐‘” < 1,0 โ‰ค ๐‘” โ‰ค 10, 0 โ‰ค ๐‘“ โ‰ค 5, โˆ‘0โ‰ค๐‘”โ‰ค10,0โ‰ค๐‘“โ‰ค5 โ„Ž๐‘“๐‘” = 1;The probability of โ€œ๐ด shows๐‘ฅ and shouts๐‘ฆโ€ and โ€œ๐ต shows๐‘“ and shouts ๐‘”โ€ at the same time:0 < Pr[๐ด = (๐‘ฅ, ๐‘ฆ), ๐ต = (๐‘“, ๐‘”)] = Pr(๐‘‹ = ๐‘ฅ, ๐‘Œ =๐‘ฆ, ๐น = ๐‘“, ๐บ = ๐‘”) = ๐‘ก๐‘ฅ๐‘ฆ๐‘“๐‘” < 1, where 0 โ‰ค ๐‘ฆ, ๐‘” โ‰ค 10,0 โ‰ค ๐‘ฅ, ๐‘“ โ‰ค 5, โˆ‘0โ‰ค๐‘ฆ,๐‘”โ‰ค10,0โ‰ค๐‘ฅ,๐‘“โ‰ค5 ๐‘ก๐‘ฅ๐‘ฆ๐‘“๐‘” = 1.

In order to analyze the situation of ๐ด wins, we constructa two-dimensional random variable๐‘ = (๐‘ˆ,๐‘‰) = (๐‘‹๐›ฟ (๐บ โˆ’ ๐‘Œ) ,๐‘‹ + ๐น) . (18)The function ๐›ฟ is defined as ๐›ฟ(0) = 0; ๐›ฟ(๐‘ฅ) = 1 when ๐‘ฅ ฬธ= 0.Therefore,Pr [๐‘ = (๐‘ข, V)] = โˆ‘

๐‘ฅ+๐‘“=V,๐‘ฅ๐›ฟ(๐‘”โˆ’๐‘ฆ)=๐‘ข๐‘ก๐‘ฅ๐‘ฆ๐‘“๐‘” ลก ๐‘‘๐‘ขV,

where 0 โ‰ค V โ‰ค 10, 0 โ‰ค ๐‘ข โ‰ค 5. (19)

Then, we use the random variables๐ด and๐‘ to form a channel(๐ด; ๐‘), which is called โ€œchannel ๐ดโ€ and takes ๐ด as the inputand ๐‘ as the output.

Then we analyze some equations. In a certain round, ๐ดshows ๐‘ฅ (i.e.,๐‘‹ = ๐‘ฅ, 0 โ‰ค ๐‘ฅ โ‰ค 5) and shouts ๐‘ฆ (i.e., ๐‘Œ = ๐‘ฆ, 0 โ‰ค๐‘ฆ โ‰ค 10); meanwhile, ๐ต shows ๐‘“ (i.e., ๐น = ๐‘“, 0 โ‰ค ๐‘“ โ‰ค 5) and

Page 10: ResearchArticle Games Based Study of Nonblind Confrontation

10 Mathematical Problems in Engineering

shouts๐‘” (i.e.,๐บ = ๐‘”, 0 โ‰ค ๐‘” โ‰ค 10). According to the evaluationrules, we have the following: if๐ดwins in this around, we have๐‘ฅ + ๐‘“ = ๐‘ฆ and ๐‘ฆ ฬธ= ๐‘”. Thus, ๐›ฟ(๐‘” โˆ’ ๐‘ฆ) = 1 and ๐‘ = (๐‘ข, V) =(๐‘ฅ๐›ฟ(๐‘” โˆ’ ๐‘ฆ), ๐‘ฅ + ๐‘“) = (๐‘ฅ, ๐‘ฆ) = ๐ด. In other words, the output ๐‘of the โ€œchannel ๐ดโ€ is always equal to its input ๐ด at this time;that is to say, a โ€œbitโ€ is sent successfully from the input ๐ด toits output ๐‘.

In contrast, if one bit is successfully sent from the input๐ดto the output ๐‘ in the โ€œchannel ๐ด,โ€ โ€œthe output ๐‘ง = (๐‘ข, V) =(๐‘ฅ๐›ฟ(๐‘” โˆ’ ๐‘ฆ)๐‘ฅ + ๐‘“)โ€ is always equal to the โ€œinput (๐‘ฅ, ๐‘ฆ)โ€ at thistime; also there is ๐‘ฅ๐›ฟ(๐‘” โˆ’ ๐‘ฆ) = ๐‘ฅ when ๐‘ฅ + ๐‘“ = ๐‘ฆ; that is,๐‘ฆ ฬธ= ๐‘” and ๐‘ฅ + ๐‘“ = ๐‘ฆ. Thus, ๐ด wins this round according tothe evaluation rules.

Combining with the cases above, we have the following.

Lemma 13. In a โ€œdraw boxingโ€ game, โ€œ๐ด wins one timeโ€ isequivalent to one bit is successfully sent from the input ofโ€œchannel ๐ดโ€ to its output.

Combining Lemma 13with the โ€œchannel coding theoremโ€of Shannonโ€™s Information Theory, if the capacity of theโ€œchannel ๐ดโ€ is ๐ท, for any transmission rate ๐‘˜/๐‘› โ‰ค ๐ท, wecan receive ๐‘˜ bits successfully by sending ๐‘› bits with anarbitrarily small probability of decoding error. Conversely, ifthe โ€œchannel ๐ดโ€ can transmit ๐‘  bits to the receiver by sending๐‘› bits without error, there must be ๐‘† โ‰ค ๐‘›๐ท. In a word, we havethe following theorem.

Theorem 14. Suppose that the channel capacity of the โ€œchannel๐ดโ€ composed of the random variable (๐ด; ๐‘) is ๐ท. Then afterremoving the situation of โ€œdraw,โ€ one has the following: (1)if ๐ด wants to win ๐‘˜ times, he must have a certain skill(corresponding to the Shannon coding) to achieve the goal byany probability close to 1 in the ๐‘˜/๐ท rounds; conversely, (2) if๐ด wins ๐‘† times in the ๐‘› rounds, there must be ๐‘† โ‰ค ๐‘›๐ท.

According to Theorem 4, we only need to figure out thechannel capacity๐ท of the โ€œchannel ๐ดโ€; then the limitation oftimes that โ€œ๐ด winsโ€ is determined. So we can calculate thechannel capacity๐ท:

๐ท = max [๐ผ (๐ด, ๐‘)] = max{โˆ‘๐‘Ž,๐‘ง

Pr (๐‘Ž, ๐‘ง)โ‹… log [ Pr (๐‘Ž, ๐‘ง)[Pr (๐‘Ž)Pr (๐‘ง)]]}= max

{{{ โˆ‘๐‘ฅ,๐‘ฆ,๐‘“,๐‘”

Pr (๐‘ฅ, ๐‘ฆ, ๐‘ฅ๐›ฟ (๐‘” โˆ’ ๐‘ฆ) , ๐‘ฅ + ๐‘“)

โ‹… log[ Pr (๐‘ฅ, ๐‘ฆ, ๐‘ฅ๐›ฟ (๐‘” โˆ’ ๐‘ฆ) , ๐‘ฅ + ๐‘“)[Pr (๐‘ฅ, ๐‘ฆ)Pr (๐‘ฅ๐›ฟ (๐‘” โˆ’ ๐‘ฆ) , ๐‘ฅ + ๐‘“)]]}}}= max

{{{ โˆ‘๐‘ฅ,๐‘ฆ,๐‘“,๐‘”

๐‘ก๐‘ฅ,๐‘ฆ,๐‘ฅ๐›ฟ(๐‘”โˆ’๐‘ฆ),๐‘ฅ+๐‘“โ‹… log[ ๐‘ก๐‘ฅ,๐‘ฆ,๐‘ฅ๐›ฟ(๐‘”โˆ’๐‘ฆ),๐‘ฅ+๐‘“[๐‘๐‘ฅ๐‘ฆ๐‘‘๐‘ฅ๐›ฟ(๐‘”โˆ’๐‘ฆ),๐‘ฅ+๐‘“]]

}}} .

(20)

Themaximal value in the equation is a real number whichsatisfies the following conditions:

โˆ‘0โ‰ค๐‘ฆโ‰ค10

๐‘Ÿ๐‘ฆ = 1; 0 โ‰ค ๐‘ฆ โ‰ค 10;โˆ‘

0โ‰ค๐‘ฆโ‰ค10,0โ‰ค๐‘ฅโ‰ค5

๐‘๐‘ฅ๐‘ฆ = 1; 0 โ‰ค ๐‘ฆ โ‰ค 10, 0 โ‰ค ๐‘ฅ โ‰ค 5,โˆ‘

0โ‰ค๐‘”โ‰ค10,0โ‰ค๐‘“โ‰ค5

โ„Ž๐‘“๐‘” = 1; 0 โ‰ค ๐‘” โ‰ค 10, 0 โ‰ค ๐‘“ โ‰ค 5.(21)

Thus, the capacity ๐ท is actually the function of ๐‘“๐‘–, ๐‘”๐‘—,which satisfies the following conditions: 0 โ‰ค ๐‘“ โ‰ค 5; ๐‘“0 + ๐‘“1 +๐‘“2 + ๐‘“3 + ๐‘“4 + ๐‘“5 = 1; 0 โ‰ค ๐‘” โ‰ค 10; โˆ‘0โ‰ค๐‘”โ‰ค10 ๐‘ ๐‘” = 1, where0 โ‰ค ๐‘– โ‰ค 5 and 0 โ‰ค ๐‘— โ‰ค 10.

Similarly, we can analyze the situation of โ€œ๐ต wins.โ€ Wecan see that the times of โ€œ๐ด winsโ€ (๐ท(๐‘”๐‘—, ๐‘“๐‘–)) depend on thehabit of ๐ต(๐‘”๐‘—, ๐‘“๐‘–). If both ๐ด and ๐ต stick to their habits, theirwinning or losing is determined; if either ๐ด or ๐ต adjusts hishabit, he can win statistically when his channel capacity islarger; if both๐ด and ๐ต adjust their habits, their situations willeventually reach a dynamic balance.

5. Unified Model of Linear Separable(Nonblind Confrontation)

Suppose that the hacker (๐‘‹) has n methods of attack; that is,the random variable ๐‘‹ has ๐‘› values which can be denoted as{๐‘ฅ0, ๐‘ฅ1, . . . , ๐‘ฅ๐‘›โˆ’1} = {0, 1, 2, . . . , ๐‘› โˆ’ 1}. These ๐‘›methods makeup the entire โ€œarsenalโ€ of the hacker.

Suppose that the honker (๐‘Œ) has ๐‘š methods of defense;that is, the random variable ๐‘Œ has ๐‘š values, which can bedenoted as {๐‘ฆ0, ๐‘ฆ1, ๐‘ฆ๐‘šโˆ’1} = {0, 1, 2, . . . , ๐‘š โˆ’ 1}. These ๐‘šmethods make up the entire โ€œarsenalโ€ of the honker.

Remark 15. In the following, we will equivalently transformbetween โ€œthe methods ๐‘ฅ๐‘–, ๐‘ฆ๐‘—โ€ and โ€œthe numbers ๐‘–, ๐‘—โ€ asneeded; that is, ๐‘ฅ๐‘– = ๐‘– and ๐‘ฆ๐‘— = ๐‘—. By the transformation, wecan make the problem clear in the interpretation and simplein the form.

In the nonblind confrontation, there is a rule of winningor losing between each hackerโ€™s method ๐‘ฅ๐‘– (๐‘– = 0, 1, . . . , ๐‘› โˆ’1) and each honkerโ€™s method ๐‘ฆ๐‘— (๐‘— = 0, 1, . . . , ๐‘š โˆ’ 1). Sothere must exist a subset of the two-dimensional number set{(๐‘–, ๐‘—), 0 โ‰ค ๐‘– โ‰ค ๐‘› โˆ’ 1, 0 โ‰ค ๐‘— โ‰ค ๐‘š โˆ’ 1}, which makesโ€œ๐‘ฅ๐‘– is superior to ๐‘ฆ๐‘—โ€ true if and only if (๐‘–, ๐‘—) โˆˆ ๐ป. If thestructure of the subset๐ป is simple, we can construct a certainchannel to make โ€œthe hacker wins one timeโ€ equivalentto โ€œone bit is successfully transmitted from the sender tothe receiver.โ€ Then, we analyze it using Shannonโ€™s โ€œchannelcoding theorem.โ€ For example,

in the game of โ€œrock-paper-scissors,โ€๐ป = (๐‘–, ๐‘—) : 0 โ‰ค๐‘–, ๐‘— โ‰ค 2(๐‘— โˆ’ ๐‘–) mod 3 = 2;in the game of โ€œcoin tossing,โ€๐ป = (๐‘–, ๐‘—) : 0 โ‰ค ๐‘– = ๐‘— โ‰ค1;in the game of โ€œpalm or back,โ€๐ป = (๐‘–, ๐‘—, ๐‘˜) : 0 โ‰ค ๐‘– ฬธ=๐‘— = ๐‘˜ โ‰ค 1;

Page 11: ResearchArticle Games Based Study of Nonblind Confrontation

Mathematical Problems in Engineering 11

in the game of โ€œfinger guessing,โ€๐ป = (๐‘–, ๐‘—) : 0 โ‰ค ๐‘–, ๐‘— โ‰ค3(๐‘– โˆ’ ๐‘—) mod 4 = 1;in the game of โ€œdraw boxing,โ€ ๐ป = (๐‘ฅ, ๐‘ฆ, ๐‘“, ๐‘”) : 0 โ‰ค๐‘ฅ, ๐‘“ โ‰ค 50 โ‰ค ๐‘” ฬธ= ๐‘ฆ โ‰ค 10๐‘ฅ + ๐‘“ = ๐‘ฆ.

We have constructed corresponding communicationchannels for each ๐ป above in this paper. However, it isdifficult to construct such a communication channel for ageneral ๐ป. But if the above set ๐ป can be decomposed into๐ป = {(๐‘–, ๐‘—) : ๐‘– = ๐‘“(๐‘—), 0 โ‰ค ๐‘– โ‰ค ๐‘› โˆ’ 1, 0 โ‰ค ๐‘— โ‰ค๐‘š โˆ’ 1} (namely, the first component ๐‘— of ๐ป is a function ofits second component), we can construct a random variable๐‘ = ๐‘“(๐‘Œ). Then considering the channel (๐‘‹; ๐‘), we can givethe following equations.

If the โ€œhacker๐‘‹โ€ attacks with themethod ๐‘ฅ๐‘–, and โ€œhonker๐‘Œโ€ defends with the method ๐‘ฆ๐‘— in a certain round, then if โ€œ๐‘‹wins,โ€ that is, ๐‘– = ๐‘“(๐‘—), the output of the channel (๐‘‹; ๐‘) is๐‘ = ๐‘“(๐‘ฆ๐‘—) = ๐‘“(๐‘—) = ๐‘– = ๐‘ฅ๐‘–. So the output of the channelis the same as its input now; that is, one bit is successfullytransmitted from the input of the channel (๐‘‹; ๐‘) to its output.Conversely, if โ€œone bit is successfully transmitted from theinput of the channel (๐‘‹; ๐‘) to its output,โ€ there is โ€œinput =outputโ€; that is, โ€œ๐‘– = ๐‘“(๐‘—)โ€, which means โ€œ๐‘‹ wins.โ€

Combining the cases above, we obtain the followingtheorem.

Theorem 16 (the limitation theorem of linear nonblindconfrontation). In the โ€œnonblind confrontationโ€, supposethe hacker ๐‘‹ has n attack methods {๐‘ฅ0, ๐‘ฅ1, . . . , ๐‘ฅ๐‘›โˆ’1} ={0, 1, 2, . . . , ๐‘› โˆ’ 1} and the honker ๐‘Œ has m defense methods{๐‘ฆ0, ๐‘ฆ1, ๐‘ฆ๐‘šโˆ’1} = {0, 1, 2, . . . , ๐‘š โˆ’ 1}, and both sides complywith the rule of winning or losing: โ€œ๐‘ฅ๐‘– is superior to ๐‘ฆ๐‘—โ€ if andonly if (๐‘–, ๐‘—) โˆˆ ๐ป, where ๐ป is a subset of the rectangular set{(๐‘–, ๐‘—), 0 โ‰ค ๐‘– โ‰ค ๐‘› โˆ’ 1, 0 โ‰ค ๐‘— โ‰ค ๐‘š โˆ’ 1}.

For๐‘‹, if๐ป is linear and can be written as๐ป = {(๐‘–, ๐‘—) : ๐‘– =๐‘“(๐‘—), 0 โ‰ค ๐‘– โ‰ค ๐‘› โˆ’ 1, 0 โ‰ค ๐‘— โ‰ค ๐‘š โˆ’ 1} (i.e., the first component๐‘– of ๐ป is a certain function ๐‘“(โ‹…) of its second component ๐‘—),we can construct a channel (๐‘‹; ๐‘) with ๐‘ = ๐‘“(๐‘Œ) to get that,if ๐ถ is the channel capacity of channel (๐‘‹; ๐‘), we have thefollowing.

(1) If๐‘‹ wants to win ๐‘˜ times, he must have a certain skill(corresponding to the Shannon coding) to achieve the goalby any probability close to 1 in the ๐‘˜/๐ถ rounds.

(2) If๐‘‹wins ๐‘† times in ๐‘› rounds, there must exist ๐‘† โ‰ค ๐‘›๐ถ.For๐‘Œ, if๐ป is linear and can be written as๐ป = {(๐‘–, ๐‘—) : ๐‘— =๐‘”(๐‘–), 0 โ‰ค ๐‘– โ‰ค ๐‘›โˆ’1, 0 โ‰ค ๐‘— โ‰ค ๐‘šโˆ’1} (i.e., the second component๐‘— of ๐ป is a certain function ๐‘”(โ‹…) of its first component ๐‘–), we

can construct a channel (๐‘Œ; ๐บ) with ๐บ = ๐‘”(๐‘‹) to get that,if ๐ท is the channel capacity of channel (๐‘Œ; ๐บ), we have thefollowing.

(3) If ๐‘Œ wants to win ๐‘˜ times, he must have a certain skill(corresponding to the Shannon coding) to achieve the goalby any probability close to 1 in the ๐‘˜/๐ท rounds.

(4) If๐‘Œwins ๐‘† times in ๐‘› rounds, there must exist ๐‘† โ‰ค ๐‘›๐ท.6. Conclusion

It seems that these games of nonblind confrontation aredifferent. However, we use an unified method to get the

distinctive conclusion; that is, we establish a channel modelwhich can transform โ€œthe attacker or the defender wins onetimeโ€ to โ€œone bit is transmitted successfully in the channel.โ€Thus, โ€œthe confrontation between attacker and defenderโ€ istransformed to โ€œthe calculation of channel capacitiesโ€ by theShannon coding theorem [6]. We find that the winning orlosing rules sets of these games are linearly separable. Forlinearly inseparable case, it is still an open problem. Thesewinning or losing strategies can be applied in big data field,which provides a new perspective for the study of the big dataprivacy protection.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This paper is supported by the National Key Research andDevelopment Programof China (Grant nos. 2016YFB0800602,2016YFB0800604), the National Natural Science Founda-tion of China (Grant nos. 61573067, 61472045), the BeijingCity Board of Education Science and technology project(Grant no. KM201510015009), and the Beijing City Board ofEducation Science and Technology Key Project (Grant no.KZ201510015015).

References

[1] R. J. Deibert and R. Rohozinski, โ€œRisking security: policiesand paradoxes of cyberspace security,โ€ International PoliticalSociology, vol. 4, no. 1, pp. 15โ€“32, 2010.

[2] L. Shi, C. Jia, and S. Lv, โ€œResearch on end hopping for activenetwork confrontation,โ€ Journal of China Institute of Communi-cations, vol. 29, no. 2, p. 106, 2008.

[3] H. Demirkan and D. Delen, โ€œLeveraging the capabilities ofservice-oriented decision support systems: putting analyticsand big data in cloud,โ€ Decision Support Systems, vol. 55, no. 1,pp. 412โ€“421, 2013.

[4] Y. Yang, H. Peng, L. Li, and X. Niu, โ€œGeneral theory of securityand a study case in internet of things,โ€ IEEE Internet of ThingsJournal, 2016.

[5] Y. Yang, X.Niu, L. Li,H. Peng, J. Ren, andH.Qi, โ€œGeneral theoryof security and a study of hackerโ€™s behavior in big data era,โ€Peer-to-Peer Networking and Applications, 2016.

[6] C. E. Shannon, โ€œCoding theorems for a discrete source with afidelity criterion,โ€ IRE National Convention Record, vol. 4, pp.142โ€“163, 1959.

[7] B. Kerr, M. A. Riley, M. W. Feldman, and B. J. M. Bohannan,โ€œLocal dispersal promotes biodiversity in a real-life game ofrock-paper-scissors,โ€ Nature, vol. 418, no. 6894, pp. 171โ€“174,2002.

[8] K. L. Chung and W. Feller, โ€œOn fluctuations in coin-tossing,โ€Proceedings of the National Academy of Sciences of the UnitedStates of America, vol. 35, pp. 605โ€“608, 1949.

[9] K.-T. Tseng, W.-F. Huang, and C.-H. Wu, โ€œVision-based fingerguessing game in humanmachine interaction,โ€ in Proceedings ofthe IEEE International Conference on Robotics and Biomimetics(ROBIO โ€™06), pp. 619โ€“624, December 2006.

Page 12: ResearchArticle Games Based Study of Nonblind Confrontation

Submit your manuscripts athttps://www.hindawi.com

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttp://www.hindawi.com

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

CombinatoricsHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 201

The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Decision SciencesAdvances in

Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com

Volume 2014 Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Stochastic AnalysisInternational Journal of