The Applications and Complexity Analysis Based on Network Embedding Behaviors under Evolutionary Game Framework

被引:1
|
作者
Su, Xin [1 ,2 ]
Zhang, Hui [1 ]
Guo, Shubing [3 ]
机构
[1] Shandong Univ Finance & Econ, Sch Business Adm, Jinan 250014, Peoples R China
[2] Shandong Univ Finance & Econ, Res Ctr Govt Performance Evaluat, Jinan 250002, Peoples R China
[3] Tianjin Univ, Coll Management & Econ, Tianjin, Peoples R China
关键词
SUPPLY-CHAIN; SOCIAL-STRUCTURE; COMPETITION; STRATEGY;
D O I
10.1155/2020/3714564
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In this paper, we use the dynamic mechanism of biological evolution to simulate the enterprises' bounded rational game. We construct game models of network embedding behaviors of horizontal and vertical enterprises in supply chain, explain the repeated games of random pairs of enterprises by replication dynamic differential equations, study the characteristics and evolution trend of this flow, conduct simulation experiments, clarify the evolution direction and law of network embedding strategy selection of supply chain enterprises, and discuss the stable state of evolutionary game and its dynamic convergence process. The results show that the probability of supply chain enterprises choosing a network embedding strategy is related to the enterprises' special assets investment cost, cooperation cost, network income, and cooperation benefits. Supply chain enterprises should reduce the special assets investment cost and cooperation cost, maximize network income and cooperation income, narrow the gap between the extra-cooperation profit and the current cooperation profit, and restrain them from violating cooperation contracts or taking opportunistic actions.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] The Applications and Complexity Analysis Based on Supply Chain Enterprises' Green Behaviors under Evolutionary Game Framework
    Zhang, Hui
    Su, Xin
    SUSTAINABILITY, 2021, 13 (19)
  • [2] The coordination behaviors of robots in the framework of evolutionary game theory
    Li, Qiaoyu
    Yang, Xiaolong
    Zhu, Yuying
    Zhang, Jianlei
    2017 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND BIOMIMETICS (IEEE ROBIO 2017), 2017, : 1862 - 1867
  • [3] Analysis of network trust dynamics based on the evolutionary game
    Liu, F.
    Wang, L.
    Johnson, H.
    Zhao, H.
    SCIENTIA IRANICA, 2015, 22 (06) : 2548 - 2557
  • [4] Embedding Evolutionary Game Theory into an Optimal Control Framework for Drug Dosage Design
    Bewick, Sharon
    Yang, Ruoting
    Zhang, Mingjun
    2009 ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-20, 2009, : 6026 - 6029
  • [5] Default Behaviors of Contractors under Surety Bond in Construction Industry Based on Evolutionary Game Model
    Jing, Jiabao
    Deng, Xiaomei
    Maqbool, Rashid
    Rashid, Yahya
    Ashfaq, Saleha
    SUSTAINABILITY, 2020, 12 (21) : 1 - 28
  • [6] Evolutionary Game Analysis of Construction Workers' Unsafe Behaviors Based on Incentive and Punishment Mechanisms
    Zhu, Jianbo
    Zhang, Ce
    Wang, Shuyi
    Yuan, Jingfeng
    Li, Qiming
    FRONTIERS IN PSYCHOLOGY, 2022, 13
  • [7] Analysis of the behaviors about scientific research innovation and management in university based on evolutionary game
    Liu, Xuwang
    Zhang, Zhengzuan
    Qi, Wei
    PROCEEDINGS OF THE 30TH CHINESE CONTROL AND DECISION CONFERENCE (2018 CCDC), 2018, : 1766 - 1771
  • [8] Complexity Analysis and Evolutionary Game Model on Technological Innovation System
    Fan Ruguo
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON PRODUCT INNOVATION MANAGEMENT, VOLS I AND II, 2008, : 716 - 721
  • [9] A RDEU Evolutionary Game Model and Analysis for Network Emergency Under the big Data era
    Liu, Yuxi
    Xiong, Guoqiang
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON IS MANAGEMENT AND EVALUATION (ICIME 2015), 2015, : 169 - 175
  • [10] Evolution Analysis and Survival Condition for Altruistic Behaviors in Evolutionary Game
    Xiang, Qi
    Yong, Zhao
    2008 3rd International Conference on Intelligent System and Knowledge Engineering, Vols 1 and 2, 2008, : 560 - 564