Preprint
Article

Computing Nash Equilibria for Multiplayer Symmetric Games Based on Tensor Form

This version is not peer-reviewed.

Submitted:

24 April 2023

Posted:

24 April 2023

You are already at the latest version

A peer-reviewed article of this preprint also exists.

Abstract
In an $m$-person symmetric game, all players are identical and indistinguishable. In this paper, we find that the payoff tensor of the player $k$ in an $m$-person symmetric game is $k$-mode symmetric, and the payoff tensors of two different individuals are the transpose of each other. Furthermore, we reformulate the $m$-person symmetric game as a tensor complementary problem and demonstrate that locating a symmetric Nash equilibrium is equivalent to finding a solution to the resulting tensor complementary problem. Finally, we use the hyperplane projection algorithm to solve the resulting tensor complementary problem, and we present some numerical results to find the symmetric Nash equilibrium.
Keywords: 
;  ;  ;  

1. Introduction

A game is symmetric if all players have the same strategy set and the payoff of a given strategy is determined merely by the strategy itself and has nothing to do with who plays it. Symmetric games have been widely studied since the dawn of game theory, and together with zero-sum games, they form one of the most classical subclasses of games. For example, Nash [1,2] proposed a very important concept of equilibrium, called Nash equilibrium, which is a strategy profile in which each player’s strategy is an optimal response to the strategies of the other players. This concept has a nice property that there is at least one Nash equilibrium for every finite game, and every finite symmetric game leads to a symmetric Nash equilibrium (an equilibrium in which all players use the same strategy) [1,2,3,4]. Some researchers were devoted to symmetric games; for additional statements, one can refer to [5,6,7,8,9,10,11,12,13,14,15].
The symmetric game, in particular, is important in the study of economic and biological models [16,17,18,19]. As we know, many interactions have been modeled in terms of one-shot and some of them have been reported as symmetric two-player cooperative dilemmas, including the Prisoner’s Dilemma [20,21], Hawk Dove Game [21], Snowdrift Game [22], and Stag-Hunt Game [23]. If each player has n actions to choose in a 2-player symmetric game, the game can be represented by two n-by-n matrices [24,25]. It is known that the 2-player symmetric game can be formulated as a linear complementary problem. The Lemke-Howson algorithm [24] is a well known method which was designed to solve the above mentioned linear complementary problem.
However, in many real-life situations, decisions are made by groups of people that include more than two individuals [19]. This type of collective action problem is better to be described as an m-person symmetric game [26,27,28]. We prefer to find symmetric equilibria for an m-person symmetric game because asymmetric behavior appears relatively unintuitive [6] and difficult to explain in a one-shot interaction [29]. Nash proved that there is a symmetric equilibrium in every m-person symmetric game [2], but the Nash equilibrium equations for m-person games are non-linear which are difficult to be solved analytically in general.
To better address the m-person game, Huang and Qi [30] extended the classic form of a game to a tensor form by using a tensor to represent the utility function of each player. They reformulated the m-person game as a tensor complementary problem, and showed that finding a Nash equilibrium of the m-person is equivalent to finding a solution to the resulting tensor complementary problem. Abdou et al. [31] presented an efficient method to solve the pure Nash equilibrium by using tensor operations. However, they did not take the Nash equilibrium of a multiplayer symmetric game into consideration.
In this paper, we consider the tensor-based m-person symmetric games. We demonstrate that the payoff tensors of the k-th player in an m-person symmetric game are k-mode symmetric and that the payoff tensors between different players are the transpose of each other. We also reformulate the m-person symmetric games as a tensor complementary problem. It is worth noting that the order of tensors in the tensor complementary problem is less than that resulting in [30]. In addition, we show that finding a symmetric Nash equilibrium of the m-person symmetric game is equivalent to finding a solution to the resulting tensor complementary problem. Finally, we apply a hyperplane projection algorithm to solve the resulting tensor complementary problem and provide some numerical results for solving the symmetric Nash equilibrium.
The rest of this paper is organized as follows: In Section 2, we present some definitions and notations that will be frequently used in the following parts. In Section 3, we provide a brief description of the m-person symmetric game. Some experimental results that can be used to explain our proposed theory’s reliability are shown in Section 4. Finally, we provide a brief summary in Section 5.

2. Preliminaries

In this section, we introduce some definitions and notations, which will be used in the sequel. Throughout this paper, we use small letters (e.g.,a), small bold letters (e.g., a ), capital letters (e.g.,A), and calligraphic letters (e.g., A ) to denote scalars, vectors, matrices, and tensors, respectively. For a positive integer n, let [ n ] = { 1 , 2 , , n } .
A real m-th order n 1 × n 2 × × n m -dimensional tensor is a multidimensional array, and its elementwise form can be denoted as
A = ( a i 1 i 2 i m ) , i j [ n j ] , j = 1 , 2 , , m .
When m = 2 , A is an n 1 -by- n 2 matrix. If n 1 = n 2 = = n m = n , A is called a real m-th order n-dimensional tensor. We denote the set of all real m-th order n 1 × n 2 × × n m -dimensional tensors by R n 1 × n 2 × × n m and denote the set of all real m-th order n-dimensional tensors by R [ m , n ] . When m = 1 , R [ 1 , n ] is simplified as R n , which is the set of all n-dimensional real vectors. We denote the set of all nonnegative n-dimensional real vectors by R + n . Let 1 n , e i , and 0 denote the n-dimensional vector of all ones, the i-th column of the n-dimensional identity matrix, and the zero vector, respectively. The order x 0 means that each component of x is nonnegative.
The definition of the k-mode product of a tensor with a vector is recalled as follows.
 Definition 1.
[32]The k-mode (vector) product of a tensor A = ( a i 1 i k i m ) R n 1 × × n k × × n m multiplied by a vector v = ( v i ) R n k is denoted by A × ¯ k v , which leads to a real ( m 1 ) -th order n 1 × × n k 1 × n k + 1 × × n m -dimensional tensor with
( A × ¯ k v ) i 1 i k 1 i k + 1 i m = i k = 1 n k a i 1 i k i m v i k ,
for any i j [ n j ] with j [ m ] { k } .
Let A = ( a i 1 i 2 i m ) R n 1 × n 2 × × n m and u ( k ) = ( u i j ( k ) ) R n k with k [ m ] . According to Definition 1, it follows that
A × ¯ m u ( m ) × ¯ m 1 × ¯ 2 u ( 2 ) × ¯ 1 u ( 1 ) = i 1 = 1 n 1 i 2 = 1 n 2 i m = 1 n m a i 1 i 2 i m u i m ( m ) u i 2 ( 2 ) u i 1 ( 1 ) ,
where A × ¯ m u ( m ) × ¯ m 1 × ¯ 2 u ( 2 ) is an n 1 -dimensional vector with entries
( A × ¯ m u ( m ) × ¯ m 1 × ¯ 2 u ( 2 ) ) i = i 2 = 1 n 2 i m = 1 n m a i i 2 i m u i m ( m ) u i 2 ( 2 ) .
For simplicity of notion, we use A u ( m ) u ( 2 ) u ( 1 ) to denote the scale
A × ¯ m u ( m ) × ¯ m 1 × ¯ 2 u ( 2 ) × ¯ 1 u ( 1 ) ,
and use A u ( m ) u ( 2 ) to denote the real n 1 -dimensional vector
A × ¯ m u ( m ) × ¯ m 1 × ¯ 2 u ( 2 ) .
Particularly, when n 1 = n 2 = = n m = n , and u , u * R n , we take the symbols A u m , A u * m 1 u , and A u * m k u u * k 1 to denote the scales
A × ¯ m u × ¯ m 1 × ¯ 2 u × ¯ 1 u ,
A × ¯ m u * × ¯ m 1 × ¯ 2 u * × ¯ 1 u ,
and
A × ¯ m u * × ¯ m 1 × ¯ k + 1 u * × ¯ k u × ¯ k 1 u * × ¯ 2 u * × ¯ 1 u * ,
respectively. The symbol A u m 1 is short for the n-dimensional vector A × ¯ m u × ¯ m 1 × ¯ 2 u .
The definitions of symmetric and semi-symmetric tensors are given as follows.
 Definition 2.
[33,34]A tensor A = ( a i 1 i 2 i m ) R [ m , n ] is called symmetric, if
a i 1 i 2 i m = a i σ ( 1 ) i σ ( 2 ) i σ ( m ) , σ Π m ,
where Π m is the set of permutations of length m.
 Definition 3.
[32]A tensor A = ( a i 1 i 2 i m ) R [ m , n ] is called semi-symmetric, if for any i 1 [ n ] ,
a i 1 i 2 i m = a i 1 i σ ( 2 ) i σ ( m ) , σ Π m 1 .
We provide a more general definition about k-mode symmetric of a tensor.
 Definition 4.
A tensor A R [ m , n ] is called k-mode symmetric, if for any i k [ n ] ,
a i 1 i k 1 i k i k + 1 i m = a i σ ( 1 ) i σ ( k 1 ) i k i σ ( k + 1 ) i σ ( m ) , σ Π m 1 .
 Remark 1.
When k = 1 , A is 1-mode symmetric if and only if A is semi-symmetric. An m-th order n-dimensional tensor A has n m independent entries. If A is k-mode symmetric, then A has n m + n 2 m 1 independent entries. If A is symmetric, then A has only m + n 1 m independent entries.
By Definitions 1, 2, and 4, we have the following lemma.
 Lemma 1.
Let A R [ m , n ] . Then A is k-mode symmetric if and only if A × ¯ k e i R [ m 1 , n ] is a symmetric tensor for all i [ n ] .
 Proof. 
From Definition 1, we get
( A × ¯ k e i ) j 1 j k 1 j k + 1 j m = j k = 1 n a j 1 j k 1 j k j k + 1 j m ( e i ) j k = a j 1 j k 1 i j k + 1 j m ,
which implies that for all i [ n ] ,
a j 1 j k 1 i j k + 1 j m = a j σ ( 1 ) j σ ( k 1 ) i j σ ( k + 1 ) j σ ( m ) , σ Π m 1 ,
if and only if
( A × ¯ k e i ) j 1 j k 1 j k + 1 j m = ( A × ¯ k e i ) j σ ( 1 ) j σ ( k 1 ) j σ ( k + 1 ) j σ ( m ) , σ Π m 1 .
According to Definitions 2 and 4, it comes with that A is k-mode symmetric if and only if A × ¯ k e i R [ m 1 , n ] is a symmetric tensor for all i [ n ] .    □
In [35], the definition of transpose of a tensor was introduced as follows:
 Definition 5. 
[35] Let A = ( a i 1 i 2 i m ) R [ m , n ] and σ Π m . The σ-transpose of A is an m-th order n-dimensional tensor, denoted by A < σ > = ( b i 1 i 2 i m ) R [ m , n ] , with entries
b i 1 i 2 i m = a i σ ( 1 ) i σ ( 2 ) i σ ( m ) .
 Remark 2. 
When m = 2 , A is an n-by-n matrix. Let σ Π 2 with σ ( 1 ) = 2 and σ ( 2 ) = 1 , then A < σ > reduces to its matrix transpose.
We recall the psdudomonotone mapping and projection operator, which will be used in Section 4.
 Definition 6. 
A mapping F : R + n R n is said to be pseudomonotone on R + n if for every x and y in R + n , and it follows that if ( x y ) F ( y ) 0 is true then ( x y ) F ( x ) 0 is true.
 Definition 7. 
Let X be a nonempty convex subset of R n . P X denotes the projection operator that maps from R ( n ) to X and is defined as
P X ( y ) = arg min { x y : x X } , y R n ,
where · is l 2 -norm in R n .
 Remark 3. 
When X = R + n , P R + n ( y ) is simplified as [ y ] + . The projection operator [ y ] + can be computed as follows
[ y ] + = max { 0 , y } ,
where the max operator denotes the componentwise maximum of two vectors.

3. Description of the m-person symmetric game

In this section, we first provide the definition of a tensor form of an m-person game, adapted from [30] and [31].
 Definition 8. 
[30,31] An m-person game in a tensor form is a tuple
G = ( [ m ] ; { [ n k ] } k = 1 m ; { A ( k ) } k = 1 m ) ,
where [ m ] is the set of players, [ n k ] is the pure strategy set of player k, A ( k ) = ( a i 1 i 2 i m ( k ) ) R n 1 × n 2 × × n m is the payoff tensor of player k, that is, for any i j [ n j ] with any j [ m ] , if the player 1 plays his i 1 -th pure strategy, the player 2 plays his i 2 -th pure strategy, ⋯, and the player m plays his i m -th pure strategy, then the payoffs of player 1, player 2, ⋯, and player m are a i 1 i 2 i m ( 1 ) , a i 1 i 2 i m ( 2 ) , ⋯, and a i 1 i 2 i m ( m ) , respectively.
Given an m-person game G = ( [ m ] ; { [ n k ] } k = 1 m ; { A ( k ) } k = 1 m ) . A mixed strategy of player k is the probability distribution on pure strategy set [ n k ] . Let
Ω k = { u R n k : u 0 and 1 n k u = 1 }
denote the set of the all probability distributions on [ n k ] . For u ( k ) = ( u i j ( k ) ) Ω k , the probability assigned to i j -th pure strategy of player k is u i j ( k ) .
Using
Ω : = × k [ m ] Ω k = { ( u ( 1 ) , , u ( m ) ) : u ( k ) Ω k , k = 1 , , m }
denote the set of strategy profiles. We say that ( u ( 1 ) , , u ( m ) ) Ω is a mixed strategy combination if u ( k ) Ω k is a mixed strategy of player k for any k [ m ] . If a mixed strategy combination ( u ( 1 ) , , u ( m ) ) Ω is played, then the expected payoff of player k is
A ( k ) u ( m ) u ( 2 ) u ( 1 ) = i 1 = 1 n 1 i m = 1 n m a i 1 i 2 i m ( k ) u i m ( m ) u i 2 ( 2 ) u i 1 ( 1 ) .
 Definition 9. 
[2,30] A mixed strategy combination ( u ( 1 * ) , , u ( m * ) ) Ω is a Nash equilibrium of the m-person game, if for each strategy combination ( u ( 1 ) , , u ( m ) ) Ω and k [ m ] , it holds that
A ( k ) u ( m * ) u ( 1 * ) A ( k ) u ( m * ) u ( k + 1 * ) u ( k ) u ( k 1 * ) u ( 1 * ) .
What we consider here is the m-person symmetric games. In such games, all players play the same role in the game and moreover the payoff of any player depends only upon its strategy and the combination of the strategies of its opponents.
 Definition 10. 
An m-person game G = ( [ m ] ; { [ n k ] } k = 1 m ; { A ( k ) } k = 1 m ) is symmetric if the players have identical pure strategy set, that is n 1 = n 2 = = n m = n , and every payoff tensor A ( k ) R [ m , n ] satisfies
a i 1 i 2 i m ( k ) = a i σ ( 1 ) i σ ( 2 ) i σ ( m ) ( σ 1 ( k ) ) , σ Π m ,
where σ 1 is the inverse of the permutation σ.
It is well know that the payoff matrices of the 2-person symmetric game are transpose of each other [20]. Furthermore, we come to a similar conclusion for the m-person symmetric game.
 Theorem 1. 
Suppose that G = ( [ m ] ; { [ n k ] } k = 1 m ; { A ( k ) } k = 1 m ) be an m-person game. Then G is symmetric if and only if
(i)
A ( k ) is k-mode symmetric for all k [ m ] ;
(ii)
if k j , then ( A ( k ) ) < σ > = A ( j ) , for all σ Π m satisfies σ ( k ) = j .
 Proof. 
Firstly, we show the necessity. By Definition 10, it comes with n 1 = n 2 = = n m = n . Combing it with Definition 1, we have
( A ( k ) × ¯ k e i ) j 1 j k 1 j k + 1 j m = j k = 1 n a j 1 j k 1 j k j k + 1 j m ( k ) ( e i ) j k = a j 1 j k 1 i j k + 1 j m ( k ) .
Let p Π m 1 be a permutation on set [ m ] { k } and π Π m satisfies
π ( i ) = p ( i ) , if i [ m ] { k } , k , if i = k .
By (1) and Definition 10, we have
( A ( k ) × ¯ k e i ) j p ( 1 ) j p ( k 1 ) j p ( k + 1 ) j p ( m ) = a j p ( 1 ) j p ( k 1 ) i j p ( k + 1 ) j p ( m ) ( k ) = a j π ( 1 ) j π ( k 1 ) i j π ( k + 1 ) j π ( m ) ( π 1 ( k ) ) = a j 1 j k 1 i j k + 1 j m ( k ) = ( A ( k ) × ¯ k e i ) j 1 j k 1 j k + 1 j m .
Therefore, A ( k ) × ¯ k e i is a symmetric tensor for all i [ n ] . By Lemma 1, A ( k ) is k-mode symmetric. Hence, the statement (i) holds.
Since σ Π m satisfies σ ( k ) = j . From Definition 5, we have
( ( A ( k ) ) < σ > ) l 1 l j l k l m = a l σ ( 1 ) l σ ( j ) l σ ( k ) l σ ( m ) ( k ) = a l σ ( 1 ) l σ ( j ) l σ ( k ) l σ ( m ) ( σ 1 ( j ) ) = a l 1 l j l k l m ( j ) = ( A ( j ) ) l 1 l j l k l m ,
which implies ( A ( k ) ) < σ > = A ( j ) . Hence, the statement (ii) holds.
Now, we show the sufficiency. It is comes to n 1 = n 2 = = n m for A ( k ) is k-mode symmetric. For any σ Π m and fixed index j, we have σ ( j ) = j or σ ( k ) = j ( k j ) . To prove our statement we have to talk about it in the following two cases.
Case 1: σ ( j ) = j . Let p Π m 1 be a permutation on set [ m ] { j } that satisfies p ( i ) = σ ( i ) . Since A ( k ) is k-mode symmetric, we have
a i 1 i j 1 i j i j + 1 i m ( j ) = a i p ( 1 ) i p ( j 1 ) i j i p ( j + 1 ) i p ( m ) ( j ) = a i σ ( 1 ) i σ ( j 1 ) i j i σ ( j + 1 ) i σ ( m ) ( j ) = a i σ ( 1 ) i σ ( j 1 ) i σ ( j ) i σ ( j + 1 ) i σ ( m ) ( σ 1 ( j ) ) .
Case 2: σ ( k ) = j ( k j ) . According to ( A ( k ) ) < σ > = A ( j ) , we obtain
a i 1 i j 1 i j i j + 1 i m ( j ) = a i σ ( 1 ) i σ ( j 1 ) i σ ( j ) i σ ( j + 1 ) i σ ( m ) ( k ) = a i σ ( 1 ) i σ ( j 1 ) i σ ( j ) i σ ( j + 1 ) i σ ( m ) ( σ 1 ( j ) ) .
By Definition 10, we have G = ( [ m ] ; { [ n k ] } k = 1 m ; { A ( k ) } k = 1 m ) is an m-person symmetric game.    □
Remark 4. (I) Consider the m-player Volunteer’s Dilemma[36,37], m individuals observe an approaching predator and need to decide whether  or not to sound the alarm, independently and without coordination. If an individual alarms, the predator’s ambush may be ruined. Each individual has two choices: volunteer (alarm) or ignore (no alarm). An alarm call would benefit everyone because it would deter the predator from attacking again; each player, however, prefers that the other players report the presence of the predator because giving the alarm has a cost c > 0 . If one sets the alarm, he has a payoff of b c , while the others who do not set the alarm have a payoff of b. If nobody raises the alarm, the predator attacks, inflicting damage a > c and a payoff of b a on everyone. Herein, we use the digits “1” and “2" to denote the alarm and non-alarm strategies, respectively. Therefore, the tensor form of the m-player Volunteer’s Dilemma can be represented as G = ( [ m ] , { [ 2 ] } k = 1 m , { A ( k ) } k = 1 m ) , where
a i 1 i k 1 1 i k + 1 i m ( k ) = b c
and
a i 1 i k 1 2 i k + 1 i m ( k ) = b a , if i 1 = = i k 1 = i k + 1 = = i m = 2 , b , otherwise .
By calculation, we get that the statements (i) and (ii) of Theorem 1 are held. Therefore, the m-player Volunteer’s Dilemma is symmetric.
 (II) From Theorem 1, we have the first player’s payoff tensor A ( 1 ) is 1-mode symmetric. The payoffs in m-person symmetric games are uniquely determined by the first player’s payoff tensor A ( 1 ) . Therefore, in the rest of this paper, we denote an m-person symmetric game by the tuple G = ( [ m ] ; [ n ] ; A ( 1 ) ) , and let
Ω 1 = = Ω m = { u R n : u 0 and 1 n u = 1 } .
 Definition 11.
[2] A Nash equilibrium ( u ( 1 * ) , u ( 2 * ) , , u ( m * ) ) Ω is symmetric if all players take the same strategy, that is, u ( 1 * ) = u ( 2 * ) = = u ( m * ) .
Nash proved the existence of equilibrium for m-person games and symmetric equilibrium for symmetric m-person games in 1951 [2], and the statement is summarized in the following Lemma.
 Lemma 2. 
[2] Every m-person symmetric game has a symmetric Nash equilibrium.
Now, we are going to propose two equivalent conditions to ensure that a mixed strategy combination is a symmetric Nash equilibrium, which are shown in Theorems 2 and 3.
 Lemma 3. 
Suppose that G = ( [ m ] ; [ n ] ; A ( 1 ) ) be an m-person symmetric game, then ( x * , x * , , x * ) Ω is a symmetric Nash equilibrium if and only if x * is an optimal solution to the following optimization problem,
max A ( 1 ) x * m 1 x s . t . x { x = ( x i ) R n : x 0 and 1 n x = 1 } .
 Proof. 
By Definition 9, ( x * , x * , , x * ) Ω is a symmetric Nash equilibrium if and only if for any strategy combination ( u ( 1 ) , , u ( n ) ) Ω and any k [ m ] , namely,
A ( k ) x * m A ( k ) x * m k u ( k ) x * k 1 .
Let σ Π m with σ ( k ) = 1 , σ ( 1 ) = k , and σ ( i ) = i for all i [ m ] { 1 , k } . By Definition 1, we have
A ( k ) x * m = ( A ( k ) ) < σ > x * m
and
A ( k ) x * m k u ( k ) x * k 1 = ( A ( k ) ) < σ > x * m 1 u ( k ) .
Together with Theorem 1, we can get ( A ( k ) ) < σ > = A ( 1 ) . Therefore, the inequality (3) is equivalent to
A ( 1 ) x * m A ( 1 ) x * m 1 u ( k ) .
The proof is completed.    □
Let
A = η E A ( 1 ) ,
where η = max i 1 , i 2 , , i m [ n ] a i 1 i 2 i m ( 1 ) + 1 and E R [ m , n ] is an m-th order n-dimensional tensor whose all entries are ones. According to A ( 1 ) is 1-mode symmetric we can see that A is also a 1-mode symmetric tensor with all entries are positive.
 Theorem 2. 
Suppose that G = ( [ m ] ; [ n ] ; A ( 1 ) ) be an m-person symmetric game, and A is defined as (4), then ( x * , x * , , x * ) Ω is a symmetric Nash equilibrium if and only if x * is an optimal solution to the following optimization problem:
min A x * m 1 x . s . t . x { x = ( x i ) R n : x 0 and 1 n x = 1 }
 Proof. 
For any mix strategy ( x * , , x * , x ) Ω , we have
A x * m 1 x = i 1 , , i m 1 , i m = 1 n a i 1 i m 1 i m x i 1 * x i m 1 * x i m = i 1 , , i m 1 , i m = 1 n ( η a i 1 i m 1 i m ( 1 ) ) x i 1 * x i m 1 * x i m = η i 1 , , i m 1 , i m = 1 n a i 1 i m 1 i m ( 1 ) x i 1 * x i m 1 * x i m = η A ( 1 ) x * m 1 x .
Therefore, x * is an optimal solution to the optimization problem (5) if and only if x * is an optimal solution to the optimization problem (2).    □
We consider the following model: Find a mixed strategy combination ( x * , x * , , x * ) Ω such that x * is an optimal solution to the optimization problem (5). Given a tensor B R [ m , n ] and a vector q R n , the tensor complementary problem, denoted by TCP ( q , B ) , is to find a vector z R n such that
z 0 , B z m 1 + q 0 , z ( B z m 1 + q ) = 0 .
The TCP ( q , B ) was introduced by Song and Qi [38] and was further studied by many researchers [39,40,41,42,43,44,45,46,47,48]. The tensor complementary problem is a generalization of the linear complementary problem (corresponding to m = 2 ) [49] and also a special instance of a nonlinear complementary problem, as well as a particular case of a variational inequality problem corresponding to the close convex cone R + n [50]. Denote the solution set of the TCP( q , B ) by SOL( q , B ). In this section, we show that the m-person symmetric game can be reformulated as a specific tensor complementary problem.
Let G = ( [ m ] ; [ n ] ; A ( 1 ) ) be an m-person symmetric game and A defined as (4). We construct a tensor complementary problem as follows,
y 0 , A y m 1 1 n 0 , y ( A y m 1 1 n ) = 0 .
There is an explicit corresponding relation between the solutions of a symmetric Nash equilibrium of the m-person symmetric game and a solution to the TCP ( 1 n , A ) (7).
 Theorem 3.
Suppose that G = ( [ m ] ; [ n ] ; A ( 1 ) ) be an m-person symmetric game and A defined as (4). If ( x * , x * , , x * ) Ω is a symmetric Nash equilibrium of the game G = ( [ m ] ; [ n ] ; A ( 1 ) ) , then y * SOL ( 1 n , A ) , where
y * = x * A x * m m 1 .
Conversely, if y * SOL ( 1 n , A ) , then y * 0 and ( x * , x * , , x * ) Ω with
x * = y * 1 n y *
is a symmetric Nash equilibrium of the game G = ( [ m ] ; [ n ] ; A ( 1 ) ) .
 Proof. 
Firstly, we show the necessity. Suppose that ( x * , x * , , x * ) Ω is a symmetric Nash equilibrium of the m-person symmetric game G = ( [ m ] ; [ n ] ; A ( 1 ) ) . By the Karush-Kuhn-Tucker conditions of problem (5), there exist a number λ * R and a nonnegative vector b * R n such that
A x * m 1 λ * 1 n b * = 0
and
1 n x * = 1 , x * 0 , b * 0 , b * x * = 0 .
By (10), we have
A x * m λ * 1 n x * b * x * = 0 ,
which together with (11) it yields
λ * = A x * m .
Thus,
y * = 1 λ * m 1 x * 0 .
According to (10), we obtain
A y * m 1 1 n = 1 λ * ( λ * 1 n + b * ) 1 n = 1 λ * b * 0 .
Combing (13) with (11), we get
y * ( A y * m 1 1 n ) = 1 λ * m 1 x * b * = 0 .
Apply the results of (13) and (14) to (12) we obtain that y * defined by (8) is a solution to the TCP ( 1 n , A ) . That is, y * SOL ( 1 n , A ) .
Now, we show the sufficiency. Suppose that y * SOL ( 1 n , A ) , then
y * 0 , A y * m 1 1 n 0 , y * ( A y * m 1 1 n ) = 0 .
By the first and second inequalities of (15), we have y * 0 . Next, we prove that ( x * , x * , , x * ) Ω defined by (9) is a symmetric Nash equilibrium of the m-person symmetric game G = ( [ m ] ; [ n ] ; A ( 1 ) ) . For this purpose, we need to prove that there exists a number λ * R and a nonnegative vector b * R n such that (10) and (11) hold.
We get the following equation from the iequalities of (15).
A y * m 1 n y * = 0 .
Since y * 0 and y * 0 follow, this implies that 1 n y * > 0 follows, and then
A y * 1 n y * m 1 ( 1 n y * ) m 1 = 0 .
By (9), the above equality becomes
A x * m 1 ( 1 n y * ) m 1 = 0 .
From y * 0 , 1 n y * > 0 , and the definition of x * , it follows that x * 0 and 1 n x * = 1 . In addition, by the second inequality of (15), we have
A x * m 1 1 n ( 1 n y * ) m 1 0 ,
which implies that there exists a nonnegative vector b * R n such that
b * = A x * m 1 1 n ( 1 n y * ) m 1 .
The above result together with (16), yields
b * x * = x * A x * m 1 1 n ( 1 n y * ) m 1 = A x * m x * 1 n ( 1 n y * ) m 1 = A x * m 1 ( 1 n y * ) m 1 = 0 .
So, we obtain that (10) and (11) hold with
λ * = 1 ( 1 n y * ) m 1 .
Therefore, ( x * , x * , , x * ) Ω defined by (9) is a symmetric Nash equilibrium of the m-person symmetric game G = ( [ m ] ; [ n ] ; A ( 1 ) ) .    □

4. Algorithm and numerical results

It is well known that the hyperplane projection algorithm [50] is a class of effective methods for solving variational inequalities and complementary problems. In this section, we apply the hyperplane projection algorithm to solve the TCP ( 1 n , A ) and provide some preliminary numerical results for solving the m-person symmetric game.
Let G = ( [ m ] ; [ n ] ; A ( 1 ) ) be an m-person symmetric game and A defined as (4). Denote F ( y ) = A y m 1 1 n , then we can rewrite the TCP ( 1 n , A ) (7) as follows,
y 0 , F ( y ) 0 , y F ( y ) = 0 .
It is well know that (17) is equivalent to the variational inequality problem: Find a nonnegative vector y R + n such that
( x y ) F ( y ) 0 , x R + n ,
and it is equivalent to finding a root of the following equations
y = [ y τ F ( y ) ] + , τ > 0 .
We use the hyperplane projection algorithm, see Algorithm 1, to solve the problem (17), which can be described geometrically as follows. Let τ R be a fixed scale, and y ( k ) R n is a given vector. Firstly, we compute the point [ y ( k ) τ F ( y ( k ) ) ] + . Secondly, based on the Armijo-type search routine, we search the line segment joining the y ( k ) and [ y ( k ) τ F ( y ( k ) ) ] + and get a point u ( k ) such that the hyperplane
H k : = { y R n : F ( u ( k ) ) ( y u ( k ) ) = 0 }
strictly separates y ( k ) from SOL ( 1 n , A ) . We project y ( k ) onto H k and get a point w ( k ) , and project the point w ( k ) onto R + n , then y ( k + 1 ) is obtained. It can be shown that y ( k + 1 ) is closer to SOL ( 1 n , A ) than y ( k ) [50].
Preprints 71715 i001
From [50], we obtain the following theorems.
 Theorem 4.
Suppose that y ( k ) is not a solution to the TCP ( 1 n , A ) (17). Then there exists a finite integer i k 0 such that (19) holds and
F ( u ( k ) ) ( y ( k ) u ( k ) ) > 0 .
 Remark 5.
If F ( y ) is pseudomonotone on R + n , the inequality (20) shows that the hyperplane H k strictly separates y ( k ) from SOL ( 1 n , A ) . Based on u ( k ) R + n and the inequality(18), it follows that for any solution y * of the TCP ( 1 n , A ) , we have
( u ( k ) y * ) F ( y * ) 0 .
Based on the fact that F ( y ) is pseudomonotone on R + n , then combing (20) and (21) it yields
( u ( k ) y * ) F ( u ( k ) ) 0 > ( u ( k ) y ( k ) ) F ( u ( k ) ) .
 Theorem 5.
Suppose that F ( y ) is pseudomonotone on R + n , then there exists y * S O L ( 1 n , A ) such that
lim k y ( k ) = y * .
In the following, we give some preliminary numerical results of Algorithm 1 for solving the symmetric Nash equilibrium of the m-person symmetric game. Throughout our experiments, the parameters used in Algorithm 1 are chosen as
τ : = 0.5 , σ : = 0.01 , y ( 0 ) : = 0.1 * 1 n .
We use y ( k + 1 ) y ( k ) 10 6 as the stopping rule. All tests are conducted in MATLAB R2015a with the configuration: Intel(R) Core(TM)i7-7500U CPU 2.70GHz and 8.00G RAM.
 Example 1.
According to Remark 4. The tensor form of the m-player Volunteer’s Dilemma can be represented as G = ( [ m ] , [ 2 ] , A ( 1 ) ) , where
a 1 i 2 i m ( 1 ) = b c , a 2 i 2 i m ( 1 ) = b a , if i 2 = i 3 = = i m = 2 , b , otherwise .
We use Algorithm 1 to solve the symmetric Nash equilibrium of the m-player Volunteer’s Dilemma and the numerical results are reported in Table 1. In this table, the number of iteration steps are denoted by No.Iter, the CPU time in seconds are denoted by CPU(s). As the algorithm stops the value of y ( k + 1 ) y ( k ) is computed and denoted by Res and the first player’s strategy in symmetric Nash equilibrium is denoted by SNE( x * ).
 Example 2.
In the m-player Snowdrift Game [51], m individuals are driving on a crossroad that is blocked by a snowdrift. Each individual has the option to cooperate by shoveling the snow or not. The snow need to be removed before they continue their journey home. Again, everyone wants to go home, but not everyone is willing to shovel. If the benefit of getting home is defined as b and the cost of shoveling is defined as c. Assuming that the benefit exceeds the cost, i.e., b > c . If everyone shovels, then everyone gets b c m . But if only k individuals shovel, they get b c k whereas those who refuse to shovel get home for free and get b. Nobody gets anything if everyone refuses to shovel. Let 1 and 2 denote the shovel snow and do not shovel snow strategies, respectively. It is easy to obtain that the m-player Snowdrift Game is symmetric. Let ϕ ( 1 ) denote the number of 1 in i 2 i 3 i m . The tensor form of the m-player Snowdrift Game can be represented as G = ( [ m ] , [ 2 ] , A ( 1 ) ) , where
a 1 i 2 i m ( 1 ) = b c 1 + ϕ ( 1 ) , a 2 i 2 i m ( 1 ) = 0 , if ϕ ( 1 ) = 0 , b , if ϕ ( 1 ) 0 .
We use Algorithm 1to solve the symmetric Nash equilibrium of m-player Snowdrift Game. The numerical results are reported in Table 2, where No.Iter, CPU(s), Res and SNE ( x * ) are the same as those used in Table 1.
 Example 3.
Consider the bimatrix symmetric game “Rock-Paper-Scissors”[9,52]. The tensor form of “Rock-Paper-Scissors” can be represented as G = ( [ 2 ] , [ 3 ] , A ( 1 ) ) , where
A ( 1 ) = 0 1 1 1 0 1 1 1 0 .
We use Algorithm1to solve the symmetric Nash equilibrium of “Rock-Paper-Scissors”. A symmetric Nash equilibrium ( x * , x * ) with
x * = 1 3 , 1 3 , 1 3
is obtained with 23 iteration steps in 0.2921 seconds.

5. Conclusions

In this paper, we show that the payoff tensor of the kth player in an m-person symmetric game is k-mode symmetric, and the payoff tensors of two different individuals are the transpose of each other. We also reformulate the m-person symmetric games as tensor complementary problems and demonstrate that finding a symmetric Nash equilibrium of the m-person symmetric game is equivalent to finding a solution to the resulting tensor complementary problem. Finally, we apply the hyperplane projection algorithm to solve the resulting tensor complementary problem and provide some numerical results for solving the symmetric Nash equilibrium.

Author Contributions

Conceptualization, Q. Liu and Q. Liao; methodology, Q. Liu and Q. Liao; software, Q. Liu; writing—original draft preparation, Q. Liu; writing—review and editing, Q. Liao. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partially funded by the Natural Science Foundation of the Educational Commission of Guizhou Province under Grant Qian-Jiao-He KY Zi [2021]298 and Guizhou Provincial Science and Technology Projects under Grant QKHJC-ZK[2023]YB245.

Institutional Review Board Statement

Not applicable

Informed Consent Statement

Not applicable

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Nash, J. Equilibrium points in n-person games. Proc. Natl. Acad. Sci. 1950, 36, 48–49. [Google Scholar] [CrossRef]
  2. Nash, J. Non-cooperative games. Ann. Math. 1951, 54, 286–295. [Google Scholar] [CrossRef]
  3. He, K.; Wu, H.; Wang, Z.; Li, H. Finding Nash equilibrium for imperfect information games via fictitious play based on local regret minimization. Int. J. Intell. Syst. 2022, 37, 6152–6167. [Google Scholar] [CrossRef]
  4. Berthelsen, M.L.T.; Hansen, K.A. On the computational complexity of decision problems about multi-player Nash equilibria. Theor. Comput. Syst. 2022, 66, 519–545. [Google Scholar] [CrossRef]
  5. Palm, G. Evolutionary stable strategies and game dynamics for n-person games. J. Math. Biol. 1984, 19, 329–334. [Google Scholar] [CrossRef]
  6. Kreps, D.M. Game theory and economic modelling; Oxford University Press, 1990.
  7. Von Stengel, B. Computing equilibria for two-person games. Handbook of game theory with economic applications 2002, 3, 1723–1759. [Google Scholar]
  8. Govindan, S.; Wilson, R. A global Newton method to compute Nash equilibria. J. Econ. Theory 2003, 110, 65–86. [Google Scholar] [CrossRef]
  9. Cheng, S.F.; Reeves, D.M.; Vorobeychik, Y.; Wellman, M.P. Notes on equilibria in symmetric games 2004. pp. 71–78.
  10. Roughgardenl, T. Computing equilibria in multi-player games. Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, 2005, Vol. 118, p. 82.
  11. Amir, R.; Jakubczyk, M.; Knauff, M. Symmetric versus asymmetric equilibria in symmetric supermodular games. Int. J. Game Theory 2008, 37, 307–320. [Google Scholar] [CrossRef]
  12. Hefti, A. Equilibria in symmetric games: Theory and applications. Theor. Econ. 2017, 12, 979–1002. [Google Scholar] [CrossRef]
  13. Reny, P.J. Nash equilibrium in discontinuous games. Annu. Rev. Econ. 2020, 12, 439–470. [Google Scholar] [CrossRef]
  14. Bilò, V.; Mavronicolas, M. The complexity of computational problems about Nash equilibria in symmetric win-lose games. Algorithmica 2021, 83, 447–530. [Google Scholar] [CrossRef]
  15. Armony, M.; Roels, G.; Song, H. Capacity choice game in a multiserver queue: Existence of a Nash equilibrium. Nav. Res. Log. 2021, 68, 663–678. [Google Scholar] [CrossRef]
  16. Bomze, I.M. Non-cooperative two-person games in biology: A classification. Int. J. Game Theory 1986, 15, 31–57. [Google Scholar] [CrossRef]
  17. Myerson, R.B. Nash equilibrium and the history of economic theory. J. Econ. Lit. 1999, 37, 1067–1082. [Google Scholar] [CrossRef]
  18. Smith, J.M. Evolutionary game theory. Physica D. 1986, 22, 43–49. [Google Scholar] [CrossRef]
  19. Broom, M.; Rychtár, J. Game-theoretical models in biology; CRC Press, 2013.
  20. Rapoport, A.; Chammah, A.M.; Orwant, C.J. Prisoner’s dilemma: A study in conflict and cooperation; Vol. 165, University of Michigan press, 1965.
  21. Axelrod, R.; Hamilton, W.D. The evolution of cooperation. Sci. 1981, 211, 1390–1396. [Google Scholar] [CrossRef] [PubMed]
  22. Sugden, R.; others. The economics of rights, co-operation and welfare; Springer, 2004.
  23. Skyrms, B. The stag hunt and the evolution of social structure; Cambridge University Press, 2004.
  24. Lemke, C.E.; Howson, Jr, J. T. Equilibrium points of bimatrix games. J. Soc. Indust. Appl. Math. 1964, 12, 413–423. [Google Scholar] [CrossRef]
  25. Gowda, M.S.; Sznajder, R. A generalization of the Nash equilibrium theorem on bimatrix games. Int. J. Game Theory 1996, 25, 1–12. [Google Scholar] [CrossRef]
  26. Wilson, R. Computing equilibria of n-person games. SIAM J. Appl. Math. 1971, 21, 80–87. [Google Scholar] [CrossRef]
  27. Souza, M.O.; Pacheco, J.M.; Santos, F.C. Evolution of cooperation under N-person snowdrift games. J. Theor. Biol. 2009, 260, 581–588. [Google Scholar] [CrossRef]
  28. Santos, M.D.; Pinheiro, F.L.; Santos, F.C.; Pacheco, J.M. Dynamics of N-person snowdrift games in structured populations. J. Theor. Biol. 2012, 315, 81–86. [Google Scholar] [CrossRef] [PubMed]
  29. Rosenschein, J.S.; Zlotkin, G. Rules of encounter: designing conventions for automated negotiation among computers; MIT press, 1994.
  30. Huang, Z.; Qi, L. Formulating an n-person noncooperative game as a tensor complementarity problem. Comput. Optim. Appl. 2017, 66, 557–576. [Google Scholar] [CrossRef]
  31. Abdou, J.; Safatly, E.; Nakhle, B.; Khoury, A.E. High-dimensional nash equilibria problems and tensors applications. Int. Game Theory Rev. 2017, 19. [Google Scholar] [CrossRef]
  32. Kolda, T.G.; Bader, B.W. Tensor decompositions and applications. SIAM Rev. 2009, 51, 455–500. [Google Scholar] [CrossRef]
  33. Kofidis, E.; Regalia, P.A. On the best rank-1 approximation of higher-order supersymmetric tensors. SIAM J. Matrix Anal. Appl. 2002, 23, 863–884. [Google Scholar] [CrossRef]
  34. Qi, L. Eigenvalues of a real supersymmetric tensor. J. Symb. Comput. 2005, 40, 1302–1324. [Google Scholar] [CrossRef]
  35. Ragnarsson, S.; Van Loan, C.F. Block tensors and symmetric embeddings. Linear Algebra Appl. 2013, 438, 853–874. [Google Scholar] [CrossRef]
  36. Murnighan, J.K.; Kim, J.W.; Metzger, A.R. The volunteer dilemma. Admin. Sci. Quart. 1993, pp. 515–538.
  37. Archetti, M. The volunteer’s dilemma and the optimal size of a social group. J. Theor. Biol. 2009, 261, 475–480. [Google Scholar] [CrossRef]
  38. Song, Y.; Qi, L. Properties of some classes of structured tensors. J. Optimiz. Theory App. 2015, 165, 854–873. [Google Scholar] [CrossRef]
  39. Bai, X.; Huang, Z.; Wang, Y. Global uniqueness and solvability for tensor complementarity problems. J. Optimiz. Theory App. 2016, 170, 72–84. [Google Scholar] [CrossRef]
  40. Che, M.; Qi, L.; Wei, Y. Positive-definite tensors to nonlinear complementarity problems. J. Optimiz. Theory App. 2016, 168, 475–487. [Google Scholar] [CrossRef]
  41. Ding, W.; Luo, Z.; Qi, L. P-tensors, P0-tensors, and their applications. Linear Algebra Appl. 2018, 555, 336–354. [Google Scholar] [CrossRef]
  42. Luo, Z.; Qi, L.; Xiu, N. The sparsest solutions to Z-tensor complementarity problems. Optim. Lett. 2017, 11, 471–482. [Google Scholar] [CrossRef]
  43. Song, Y.; Qi, L. Tensor complementarity problem and semi-positive tensors. J. Optimiz. Theory App. 2016, 169, 1069–1078. [Google Scholar] [CrossRef]
  44. Song, Y.; Qi, L. Properties of tensor complementarity problem and some classes of structured tensors. arXiv preprint arXiv:1412.0113 2014.
  45. Xie, S.; Li, D.; Hongru, X. An iterative method for finding the least solution to the tensor complementarity problem. J. Optimiz. Theory App. 2017, 175, 119–136. [Google Scholar] [CrossRef]
  46. Ling, L.; He, H.; Ling, C. On error bounds of polynomial complementarity problems with structured tensors. Optimization 2018, 67, 341–358. [Google Scholar] [CrossRef]
  47. Song, Y.; Yu, G. Properties of solution set of tensor complementarity problem. J. Optimiz. Theory App. 2016, 170, 85–96. [Google Scholar] [CrossRef]
  48. Wang, Y.; Huang, Z.; Bai, X. Exceptionally regular tensors and tensor complementarity problems. Optimi. Method. Softw. 2016, 31, 815–828. [Google Scholar] [CrossRef]
  49. Cottle, R.; Pang, J.; Stone, R. The linear complementarity problem, 1992.
  50. Facchinei, F.; Pang, J. Finite-dimensional variational inequalities and complementarity problems, Volume II; Springer Science & Business Media, 2007.
  51. Souza, M.O.; Pacheco, J.M.; Santos, F.C. Evolution of cooperation under N-person snowdrift games. J. Theor. Biol. 2009, 260, 581–588. [Google Scholar] [CrossRef]
  52. Sinervo, B.; Lively, C.M. The rock–paper–scissors game and the evolution of alternative male strategies. Nature 1996, 380, 240. [Google Scholar] [CrossRef]
Table 1. The numerical results of the problem in Example 1
Table 1. The numerical results of the problem in Example 1
m b a c No.Iter CPU(s) Res SNE ( x * )
3 200 4 1 10 0.0582 4.18e-7 (0.5000,0.5000)
4 2 41 0.2277 9.99e-7 (0.2929,0.7071)
16 2 47 0.2644 7.62e-7 (0.6465,0.3235)
32 1 50 0.3912 7.42e-7 (0.8232,0.1768)
64 3 21 0.1919 9.82e-7 (0.7835,0.2165)
192 3 72 0.6176 9.19e-7 (0.8750,0.1250)
6 200 4 1 121 0.8751 9.18e-7 (0.2422,0.7578)
4 2 101 0.7523 9.17e-7 (0.1295,0.8705)
16 2 63 0.5111 8.43e-7 (0.3403,0.6597)
32 1 9 0.1503 3.53e-7 (0.5000,0.5000)
64 3 11 0.0818 3.54e-7 (0.4578,0.5422)
192 3 14 0.1152 4.32e-7 (0.5647,0.4353)
9 600 64 0.25 14 0.1891 5.95e-7 (0.5000,0.5000)
64 0.5 59 0.5382 8.54e-7 (0.4548,0.5452)
64 1 30 0.2826 5.90e-7 (0.4054,0.5946)
512 0.25 88 0.7381 8.84e-7 (0.6145,0.3855)
512 0.5 77 0.7354 6.79e-7 (0.5796,0.4204)
512 1 54 0.6315 7.15e-7 (0.5415,0.4585)
12 600 64 0.25 206 2.1890 9.43e-7 (0.3960,0.6040)
64 0.5 143 1.8373 9.61e-7 (0.3567,0.6433)
64 1 114 1.2770 9.67e-7 (0.3149,0.6851)
512 0.25 11 0.5486 5.97e-7 (0.5000,0.5000)
512 0.5 53 0.7763 9.67e-7 (0.4675,0.5325)
512 1 27 0.5974 8.64e-7 (0.4329,0.5671)
15 2500 2048 0.125 8 3.1455 3.90e-7 (0.5000,0.5000)
2048 64 63 3.6172 4.56e-7 (0.2193,0.7807)
2048 128 65 3.8518 9.35e-7 (0.1797,0.8203)
1024 0.125 177 4.6659 9.93e-7 (0.4747,0.5253)
1024 64 47 3.3835 8.62e-7 (0.1797,0.8203)
1024 128 85 4.4102 7.11e-7 (0.1380,0.8620)
Table 2. The numerical results of the problem in Example 2
Table 2. The numerical results of the problem in Example 2
m b c No.Iter CPU(s) Res SNE ( x * )
3 8 1 71 0.3320 8.84e-7 (0.7686,0.2314)
8 2 34 0.1822 8.49e-7 (0.6496,0.3504)
10 5 26 0.1606 8.69e-7 (0.4418,0.5582)
10 8 161 0.8231 8.92e-7 (0.1886,0.8114)
20 1 20 0.1729 9.22e-7 (0.8611,0.1389)
20 10 27 0.1719 7.46e-7 (0.4417,0.5583)
6 8 1 136 0.8696 8.79e-7 (0.4653,0.5347)
8 2 134 0.7635 9.08e-7 (0.3595,0.6405)
10 5 132 0.8305 9.62e-7 (0.2162,0.7838)
10 8 157 0.9867 8.08e-7 (0.0817,0.9183)
20 1 92 0.5705 8.62e-7 (0.5711,0.4289)
20 10 92 0.6909 7.21e-7 (0.2162,0.7838)
9 8 1 95 0.7384 2.12e-7 (0.3291,0.6709)
8 2 68 0.5151 8.84e-7 (0.2466,0.7534)
10 5 59 0.4447 3.20e-7 (0.1436,0.8574)
10 8 84 0.7784 8.17e-7 (0.0520,0.9480)
20 1 164 1.2335 9.53e-7 (0.4179,0.5821)
20 10 56 0.5454 4.96e-7 (0.1426,0.8574)
12 8 1 370 3.4376 9.99e-7 (0.2542,0.7458)
8 2 283 2.6579 9.51e-7 (0.1876,0.8124)
10 5 191 1.8678 7.55e-7 (0.1065,0.8935)
10 8 198 1.9516 7.56e-7 (0.0383,0.9617)
20 1 319 3.0998 9.39e-7 (0.3283,0.6717)
20 10 161 1.5762 9.82e-7 (0.1066,0.8934)
15 8 1 357 6.1214 9.91e-7 (0.2068,0.7932)
8 2 249 5.3642 9.38e-7 (0.1512,0.8488)
10 5 199 4.5910 9.94e-7 (0.0850,0.9150)
10 8 214 4.7155 8.20e-7 (0.0304,0.9696)
20 1 338 6.1258 9.69e-7 (0.2699,0.7301)
20 10 180 4.7217 9.65e-7 (0.0850,0.9150)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.

Downloads

105

Views

19

Comments

0

Subscription

Notify me about updates to this article or when a peer-reviewed version is published.

Email

Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2025 MDPI (Basel, Switzerland) unless otherwise stated