| Literature DB >> 29584679 |
Zhengqiu Zhu1, Bin Chen2, Sihang Qiu3,4, Rongxiao Wang5, Feiran Chen6, Yiping Wang7, Xiaogang Qiu8.
Abstract
Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker's parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker's observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants.Entities:
Keywords: bounded rationality; chemical plant environmental protection game; human cognition; learning curves; limited observation
Mesh:
Year: 2018 PMID: 29584679 PMCID: PMC5923651 DOI: 10.3390/ijerph15040609
Source DB: PubMed Journal: Int J Environ Res Public Health ISSN: 1660-4601 Impact factor: 3.390
Pure strategy of defender and attacker in one day with two time slices.
| Notation | Defender’s Strategy | Notation | Attacker’s Strategy |
|---|---|---|---|
Payoff matrix in a time slice with only one defender and one attacker.
| Defender | Close | ||
|---|---|---|---|
| Attacker | |||
| Release | |||
| No release | |||
Figure 1Learning curves under different functions (the values of parameters in (a) are: a = 0.04, b = 0, = 0.3, = 3; the value of parameter in (b) is: = 0.4; the values of parameters in (c) are: = 0.2, k = 10).
Figure 2Layout of the case study (the triangles indicate the high-accuracy air quality monitoring stations, while the circles represent gas sensor modules in this figure).
Value of parameters.
| Parameters | Value | Parameters | Value |
|---|---|---|---|
| 2 | 900 | ||
| 40 | 800 | ||
| 600 | −1600 | ||
| −350 | 24 | ||
| −400 | 0.5 | ||
| 0.1 | 2 | ||
| 1 | 2 | ||
| 5 | 6 |
Results of the extended chemical plant environmental protection (CPEP) game computed by COBRA under different observation conditions (the notation of time represents the running time of the solver and the notation of s in this table denotes seconds).
| Learning Curve | Observation Number | Alpha | Def Strategy | Compliance Number | Def Payoff | Time |
|---|---|---|---|---|---|---|
| Piecewise function | 1 | (1, 0, 0, 0) | 0 | 205.9485 | 0.155 s | |
| 0.97 | (1, 0, 0, 0) | 0 | 205.9485 | 0.099 s | ||
| 0.88 | (1, 0, 0, 0) | 0 | 205.9485 | 0.130 s | ||
| 0.0025 | (0.386, 0.307, 0.307, 0) | 24 | −13.8596 | 1073.5 s | ||
| 3.3546 × 10−4 | (0.6926, 0, 0, 0.3074) | 24 | −13.8474 | 1460.7 s | ||
| 4.5400 × 105 | (0.6925, 0, 0, 0.3075) | 24 | −13.8474 | 1568.3 s | ||
| Exponential fall function | 1 | (1, 0, 0, 0) | 0 | 205.9485 | 0.183 s | |
| 0.1353 | (0.434, 0.283, 0.283, 0) | 22 | −14.356 | 3097.9 s | ||
| 0.0183 | (0.392, 0.304, 0.304, 0) | 24 | −13.9218 | 3604.8 s | ||
| 0.0025 | (0.386, 0.307, 0.307, 0) | 24 | −13.8596 | 1085.5 s | ||
| 3.3546 × 10−4 | (0.6926, 0, 0, 0.3074) | 24 | −13.8474 | 1473.6 s | ||
| 4.5400 × 10−5 | (0.6925, 0, 0, 0.3075) | 24 | −13.8474 | 1580.7 s | ||
| Power law function | 1 | (1, 0, 0, 0) | 0 | 205.9485 | 0.263 s | |
| 0.25 | (0.478, 0.261,0.261, 0) | 20 | −10.629 | 822.56 s | ||
| 0.1111 | (0.433, 0.2835, 0.2835,0) | 24 | −14.3312 | 2390.9 s | ||
| 0.0625 | (0.41, 0.295, 0.295, 0) | 24 | −14.1067 | 4372.9 s | ||
| 0.0400 | (0.7005, 0, 0, 0.2995) | 24 | −14.0104 | 1867.3 s | ||
| 0.0278 | (0.698, 0, 0, 0.302) | 24 | −13.96 | 3908.3 s |
Figure 3Defender’s payoff and compliance number under different observation number ((a) is the defender’s payoff under piecewise function; (b) is the compliance number under piecewise function; (c) is the defender’s payoff under exponential fall function; (d) is the compliance number under exponential fall function; (e) is the defender’s payoff under power law function; (f) is the compliance number under power law function).
Results computed by MAXIMIN under different observation conditions (the notation of time represents the running time of the solver and the notation of s in this table denotes seconds).
| Observation Number | Def Strategy | Def Payoff | Time |
|---|---|---|---|
| (0.562, 0.185, 0.185, 0.068) | −14.98797595 | 0.0223 s | |
| (0.562, 0.185, 0.185, 0.068) | −14.98797595 | 0.0242 s | |
| (0.562, 0.185, 0.185, 0.068) | −14.98797595 | 0.0100 s | |
| (0.561975, 0.185019, 0.185019, 0.067987) | −14.988 | 0.0100 s | |
| (0.561975, 0.185019, 0.185019, 0.067987) | −14.988 | 0.0089 s | |
| (0.561975, 0.185019, 0.185019, 0.067987) | −14.988 | 0.0099 s |
Results computed by COBRA under different rationality levels of attackers (the notation of time represents the running time of the solver and the notation of s in this table denotes seconds).
| Value of Epsilon | Def Strategy | Compliance Number | Def Payoff | Time |
|---|---|---|---|---|
| (0.6358, 0.1821, 0.1821, 0) | 11 | 33.7456 | 466.3 s | |
| (0.6338, 0.1831, 0.1831, 0) | 11 | 33.3042 | 360.1 s | |
| (0.6317, 0.18415, 0.18415, 0) | 11 | 32.8629 | 259.8 s | |
| (0.6297, 0.18515, 0.18515, 0) | 11 | 32.4216 | 2669.1 s | |
| (0.6277, 0.1862, 0.1862, 0) | 11 | 31.9802 | 562.7 s | |
| (0.6172, 0.1914, 0.1914, 0) | 9 | 30.3536 | 675.8 s | |
| (0.6043, 0.19785, 0.19785, 0) | 8 | 28.4175 | 2347.2 s | |
| (0.5971, 0.20145, 0.20145, 0) | 7 | 26.7566 | 8157.8 s |
Figure 4Defender’s payoff and compliance number under different rationality levels of attackers ((a) denotes the defender’s payoff when the value of epsilon increases while (b) denotes the compliance number in the same case).
Figure 5Attacker’s payoff under different rationality levels of attackers.