Agent-based Model of Maritime Drug Smuggling. David Tomá²

Size: px
Start display at page:

Download "Agent-based Model of Maritime Drug Smuggling. David Tomá²"

Transcription

1 Czech Technical University in Prague Faculty of Electrical Engineering Department of Cybernetics Bachelor Thesis Agent-based Model of Maritime Drug Smuggling David Tomá² Supervisor: Ing. Ond ej Van k May 23, 2013

2 ii Aknowledgements I'd like to thank my supervisor, Ing. Ond ej Van k, for his numerous advices during making practical part and writing of this thesis.

3

4 Abstract Drug smuggling is a worldwide problem with many negative eects on the society. It is important to understand and predict smuggler's behavior in order to best position patrolling assets and disrupt his supply chain. The goal of this thesis is formalize smuggler's behavior and compare it with real-world data. Smuggler's route planner makes the main component of this thesis, it's formalized as bi-objective route optimizer, weighting route length and risk of interception along the route. Agent-based simulation of the problem is formed. Results show that smugglers can be divided into classes according to their willingness to risk. Keywords: Agent-based model, simulation, bi-objective optimization, drug smuggling, maritime security Abstrakt Pa²ování drog je celosv tový problém s mnoha negativními vlivy na spole nost. Pro co nejefektivn j²í rozloºení hlídek a pro naru²ení pa²eráckého et zce je d leºité porozum t a p edvídat pa²erákovo chování. Cílem práce je formalizovat chování pa²erák a porovnat ho s reálnými daty. Jedním z hlavních prvk je plánova tras, který je denován jako biobjektivní optimalizátor trasy, m ící vzdálenost trasy a riziko chycení v pr b hu plavby. Je vytvo ena agentní simulace tohoto problému. Z výsledk lze pozorovat rozd lení pa²erák do skupin podle jejich ochoty riskovat. Klí ová slova: Agentní model, simulace, bi-objektivní optimalizace, pa²ování drog, námo ní bezpe nost iv

5

6

7 Contents 1 Introduction Structure of the Thesis Problem Description 3 3 Related Work Agent-based Simulation AgentC Motion Planning Multicriteria Optimization Pareto Dominance Pareto Optimality Scalarization A* Algorithm Agent-based Model Data Geographical Data Behavioral Data Environment Model Behavior Model Smuggler's Behavior Diagram Patrol's Behavior Diagram Fishermen's Behavior Diagram Smuggler's Route Planner Distance Model Risk Model Planning as Multi-objective Optimization Problem Implementation Environment Planner Agents Behavior Structure Smugglers Patrols vii

8 CONTENTS viii Fishermen Conguration / Scenario Set up Conguration Scenario Simulation Execution Reporting Evaluation Planner Evaluation Simulation Evaluation Success Rate Dependency on Number of Patrols and Smugglers Success Rate Dependency on Number of Patrols and Visibility Radar Noise Conclusions 32 Bibliography 33 A CD Content 35

9 Chapter 1 Introduction Contemporary maritime drug smuggling is a pressing concern, requiring continuous eort from international forces. The distribution chain is rich, robust with respect to deployed anti-drug-tracking countermeasures and the smugglers are able to adapt to novel strategies deployed by the international forces. It is important to understand the behavior of the drug smuggler in order to design such strategies that minimize the probability of successful drugshipment delivering. Thesis is focused on smuggler's behavior modeling on the open sea. Agent-based approach is used to capture main decision-making process of drug smuggler when transporting a cargo. We focused on activity in Central and South America, especially smuggling from Colombia and Ecuador to Costa Rica and Mexico. Modeling of illegal sea borne activities is used in another contexts, however, mostly to predict illegal activity in following days of weeks to best position disruptive resources. Researchers in the Naval Research Laboratory (NRL) in Monterey are especially interested in this research. Their work has been so far focused on maritime piracy, e.g., Slootmaker [14] and Hansen et al. [6] describe piracy activity models which employ meteorological forecasts, intelligence reports and historical pirate incidents to predict areas conductive to pirate activity around the Horn of Africa. So far, they have been considering only equation-based models without intelligent reasoning. This research aims to ll this gap. Smuggler's activity is decomposed into a set of principal activities; we design behavior in each of the activity. The main contribution of this thesis is smuggler's route planner, which plans a transit route taking into account both the length of the route as well as potential risk of being caught. We use bi-objective formulation to express this mixed criterion and utilize A* algorithm to compute optimal routes. The results show that for each of the route in the realworld data, there exists a corresponding coecient weighting risk versus the distance taken by the smuggler to transport a shipment. This shows that dierent smugglers are willing to transit the area under dierent risk or that reasoning of every smuggler is dierent, however, we can group smuggler into dierent classes. A part of the work was successully presented on Internation Conference POSTER 2013 [16]. 1

10 CHAPTER 1. INTRODUCTION Structure of the Thesis 1. Study the problem of contemporary maritime drug tracking related to drug trade in Middle America Chapter 2 2. Collect data relevant to the operational behavior of drug smugglers and extract main factors having impact on their behavior Chapter 2, gure Formalize operational decision-making of a drug smuggler on the open sea as a state automata with parameters reecting main factors extracted in the previous point Section Design a movement planner, capturing movement patterns of the drug smuggler in given area Section Enrich the model for other actors - patrolling vessels, shing vessels etc. Section Implement the environment model and drug smuggler behavior model in the multiagent simulation AgentC Chapter 5 7. Compare the outputs of the simulation (simulating the modeled drug smuggler) with the real-world data. Chapter 6, gure 6.4

11 Chapter 2 Problem Description Drug smuggling is a worldwide problem with many negative eects on the society. For a specic group of people it represents very high (and often only one possible) stable income and it is improbable the problem will disappear in following decades. It is possible to tackle the problem on many levels, in this paper, we focus on disruption of the drug supply chain lead on the open sea. Specically, we aim to model the behavior of a drug smuggler which is transporting a shipment from one harbor to another over sea. This model should aid the decision makers in the area to best position their patrolling assets. As a test case, we have selected frequent drug shipping route leading from South American statesespecially from Ecuador and Colombiato Mexico and Costa Rica. The situation in Central America region in 2007 is depicted on Figure 2.1. The model presented in this paper captures behavior in the southern part of the region, i.e. the East Pacic Ocean 1. The problem of catching smugglers consists in size of open sea so using of high-quality is necessary. All types of ships are used for smuggling, from small high-speed cigarette boats to large commercial cargo carriers, [5]. More and more smugglers use direct route to Mexico and the US west coast which are more expensive from them. It also requires largers (and slower) vessels and better electronic equipment. Recently smugglers improve their go-fast boats to be able to carry more drugs and to be less visible on patrol's radars. Aune [1] depicts smuggler's strategies and gives us a description of the situation. We can observe that the smugglers do not choose the shortest path, but rather sail further from the coast. This is caused by presence of international forces trying to suppress the activity in the region. The smuggler thus weigh distance of the route taken and increased risk of being caught when sailing closer to the shore. Smugglers also use commercial carriers in their legitimate trade; drugs are hidden among the cargo. Sailing conditions for every ship are inuenced by weather which decreases their speed and make visible worse. Rain, fog, darkness and others are perfect for smuggling. Police ships also have a problem with shermen who burden their radars with unnecessary and unwanted entries. The aim of this thesis is thus capturing the behavior of the smuggler in form of an agent optimizing it's utility function in terms of distance sailed and risk taken. To solve this 1 Picture shows 155 samples in South America in 2007, 3

12 CHAPTER 2. PROBLEM DESCRIPTION 4 Figure 2.1: Figure discribing maritime smuggling activity in Caribbean Sea, Gulf of Mexico and East Pacic Ocean, specically coast of Mexico, Guatemala, El Salvador, Nicaragua, Ecuador and Colombia problem we dene the environment as a set of obstacles representing borders between sea and land, set of harbors as origin and target smuggler's destinations and some space for sailing ships which restricts their movement on open sea.

13 Chapter 3 Related Work 3.1 Agent-based Simulation Klügl [9] describes basic denition of agent-based simulation as follows: Multi-Agent Systems provide a description framework that is appropriate for many real world systems consisting of a set of interacting autonomously deciding actors. Human and animal societies form prominent and intuitive examples for real-world multi-agent systems. Multi-agent system has four important parts which describe it perfectly. The parts are: Agents Multi-agent System Interations Environment The agents interact in environment and form multi-agent systems [9]. Agent's denition is dened in [4]: An autonomous agent is a system situated within and a part of an environment that senses that environment and acts on it, over time, in pursuit of its own agenda and so as to eect what it senses in the future. We can consider environment as all parts which are in interactions with agents AgentC Project AgentC is a agent-based simulation framework used in maritime domain developed in ATG 1. It's focused on analysis of maritime domain data, modeling and predicting vessels behavior, planning of optimal routes of long range transport vessels which goes to sailing risk reducing. It oers method for creating agents including behavior model and agent's interactions with environment, which can include weather model. Simulation run can be displayed in Google Earth 2 which allows seeing actual situation with results. 1 Agent Technology Center in Faculty of Electrical Engineering, Czech Technical University in Prague

14 CHAPTER 3. RELATED WORK 6 Figure 3.1: Figure from [9] shows relationship between real and simulates world. 3.2 Motion Planning Multicriteria Optimization Talbi [15] denes multicriteria optimization problem as: Let be x a vector of decision variables from a set of feasible solutions S, then function F(x) = f(x),f2(x)...) is the vector of objectives to be optimized. { min F (x) = (f1 (x), f MOP = 2 (x),..., f n (x)) s.c. x S The search space S represents the decision space or the parameter space of Multicriteria optimization problem. The space in which the objective vector belongs to is called the objective space. The vector F can be dened as a cost function from the decision space in the objective space that evaluates the quality of th solution (or tness), [15] Pareto Dominance Let be v = (v 1,..., v n ) a vector and u = (u 1,..., u n ) an objective vector. We say u dominate v if no element from v is smaller than corresponding element from u and at least one element from u is strictly smaller. [2] Pareto Optimality We have Pareto optimal solution x S, where every F (x) does not dominates F (x ); x S. Graphically the optimality can be represented as shown in Figure 3.2, e.g. there is no complement in the box restricted by values x and y for every parete optimal element [15].

15 CHAPTER 3. RELATED WORK 7 Figure 3.2: Figure from [15] shows graphical representation of pareto optimality Scalarization Transformation of a MOP problem into a monoobjective one. Aggregation Method is one of the most used for generating Pareto optimal solutions [3]. Talbi [15] explains it as follows: It consists in using an aggregation function to transform a MOP into a moobjective problem by combining the various objective functions f i into a single objective function f generally in a linear way: f(x) = n λ i f i (x), x S (3.1) i=1 lambda i are weights in interval [0...1] with sum n i=1 λ i = 1. If lambda i > 0 for every i, than the solution is Pareto optimal A* Algorithm A* is computer algorithm used to nding a path in a graph with given start and end points [13]. It uses a best-rst search to nd optimal path from point A to B; optimal means the shortest, cheapest, etc., according to edge weight represenation. Function f(x) is a function which evaluates individual nodes to determine an order, in which these nodes will be visited. Function f(x) is composed of these 2 fuctions [10, 11]: cost function g(x)distance between start and given point

16 CHAPTER 3. RELATED WORK 8 heuristic function h(x)the best predicted distance to end, it must admissible (distance to target must not be overestimated), e.g. straight-line distance to target. and is given as: Pseudocode below shows how A* works 3. f(x) = g(x) + h(x) (3.2) init Priority Queue; init closed list; put start point to the queue; while open list is not empty do pop (q) o the queue; generate q's successors and set their parents to q; foreach successor do if successor == goal then return; end successor.c = q.c + distance between successor and q; successor.h = distance from goal to successor; successor.f = successor.g + successor.h; if queue contains node with the same position and with lower f than successor then break; end if closed list contains node with the same position and with lower f than successor then break; end put the node to the queue; end push q on the closed list; end Priority queue of open nodes is initialized. Lower value of f(x) means higher priority for given node x. In each step we take a node from queue and compute values f for its neighbor nodes, which are lately added to the queue. Algorithm ends if the rst node in queue is the end one, or when queue is empty. A* is complete algorithm; it will always nd a solution if there is someone. It's also optimal if: closed list (list of visited nodes) is not used 3

17 CHAPTER 3. RELATED WORK 9 closed list is used and heuristic function h(x) is consistent; for any pair of nearby nodes a, b: where d(a,b) is distance between a and b. h(x) h(y) + d(a, b) (3.3)

18 Chapter 4 Agent-based Model To properly model the behavior of the smuggler and evaluate it inside a simulation framework, we use agent-based approach, decomposing the scenario into an agent model and an environment model. 4.1 Data We split data also on the agent and the environment ones. To create agent's ship, we need to know its speed and radar visibility, envirnoment is made from data which dene its shape (polygons) and harbors as smuggler's destinations Geographical Data Environment is composed of obstacles (or borders), navigable waters and harbors. We use Google Earth to create these parts as a set of les with ".kml" extension 1. Borders are comprised of a set of polygons dening a land. If we set these polygons too accurate, too more edges will be added to visibility graph, and it slows down both creating graph and algorithm for planning routes. So it is necessary to choose compromise between precision and speed. Figure 4.1 represents polygons in their positions. We dene harbors as a GPS points lying on the borders of above mentioned polygons. Either harbor can be origin or destination. We are inspired by the data from Figure 2.1 because exact locations are not known. Figure 4.2 shows estimated harbors used in simulation. We use followings harbors as the origin ones (from the South), in Ecuador: Data de Posorja 2 43'14" J, 80 18'20" Z San Mateo 0 57'26" J, 80 48'28" Z and in Colombia: Tumaco 1 49'43" S, 78 47'39" Z

19 CHAPTER 4. AGENT-BASED MODEL Figure 4.1: Borders (yellow) as a polygons set in Google Earth. Isla del Gallo 1 59'19" S, 78 40'16" Z El Aticito 3 20'49" S, 77 33'53" Z Punta Bonita 3 35'10" S, 77 20'43" Z Punta Soldado 3 45'50" S, 77 11'5" Z Virudó 5 23'38" S, 77 25'36" Z Nuquí 5 44'17" S, 77 28'2" Z Destination harbors in Central America are only 3, (from the East) in Costa Rica: Tambor 9 39'38" S, 85 0'41" Z and in Mexico: Salina Cruz 16 3'43", 95 6'9" Z Galera 15 53'5" S, 97 41'37" Z 11

20 CHAPTER 4. AGENT-BASED MODEL 12 Figure 4.2: Origin and destination harbors for smuggler's routes Navigable waters together with borders form bounded part of the Earth. We restrict navigable waters because of optimization. This work is focused on Carribean, making graph in the South America is pointless. Figure 4.3 Environemnt is enriched with Weather model describing weather situation in given location using Esri grid. In this simulation there are wave height used. It in uence following quantities with some weight: Speed Current ship's speed in knots is decreased by half the waves' heights (in meters) in actual ship's position. Visibility One-meter wave reduces patrol's visibility by 5 percent. Esri grid is special le format used in Geographic information systems developed by Esri company. It's a tool for describing features of certain geographic space. Grid is localized by x and y coordinations determining left bottom corner of this grid. As other usual grids it has xed number of rows, columns and size of each square cell. For forming non-square shapes NODATA value is established. It tells us there is no data to use on certain grid position. Esri le example below de nes data from Figure 4.4: ncols 6 nrows 6

21 CHAPTER 4. AGENT-BASED MODEL 13 Figure 4.3: Navigable waters composed of visibility graph enriched with risk model heat map. The darker the heat map, the riskier the area. xllcenter yllcenter -6.5 cellsize 0.25 NODATA_value ncols and nrows are number of columns and rows, xllcenter and yllcenter denotes x and y coordinates of left bottom table cell, cellsize means cell's dimension in degrees and N ODAT A_value is above mentioned feature. Values below these properties are table data.

22 CHAPTER 4. AGENT-BASED MODEL 14 Figure 4.4: Esri grid visualization example. Left image shows graphic projection and the right one shows the values. Because we do not have any weather data from this location, we use (and customize) data from Indian Ocean oered by NRL Behavioral Data Patrol's agents are equipped with Rigid Hull Inatable Boat (RHIB) 3 with average speed equal to 10 knots for longer endurance. Smuggler sails on ships called cigarette boat (Gofast boat) 4 with speed of 9 knots because of endurance too (shortime max speed is about 30 knots in local conditions). US Navy also uses helicopters. In this simulation helicopters are not implemented, so the advantage of using them is substitute with increasing patrol's ship speed on 10 knots. 4.2 Environment Model Environment model denes the space where agents can move. The navigable waters are dened by a set of obstacles represented by polygons; the agent can move anywhere except inside of the obstacles. Additionally, we dene a set of origin and destination harbors on the borders of the obstacles. The smuggler then moves between any origin harbor and any destination harbor. As mentioned above weather model in esri format is used. Weather is given in strictly given square areas with their latitude and longitude position as described in Figure 4.4. Each cell has its value of wave height. Between neighbor cells there is no interpolation, because the values are quite low (from 0 to 6) and accurate (on the ten-thousandth), so no interpolation 2 Naval Research Laboratory in Monterey 3 US Navy ship 4 High speed boat used for smuggling

23 CHAPTER 4. AGENT-BASED MODEL 15 is needed. Agents nd out a weather information in each step while they are sailing. They get wave height in their current position and adjust the speed according to it. 4.3 Behavior Model Section is about modeling behavior of all types of agents. We will describe all the states and their reactions on events Smuggler's Behavior Diagram We decompose smuggler agent's behavior into following principal activities, captured in Figure 4.5: Waitthis is the initial activity of the agent. In this state, the smuggler chooses its destination harbor, having the origin harbor assigned during the initialization phase. Plan a routethis activity captures the decision-making process of the agent, i.e. route planning. This activity encapsulates route planner, main component of the model and main contribution of this work. Sail to destinationagent is following the route computed by the planner. average speed is given from conguration. His Reach destinationagent has reached the destination and he re-plans to sail home, now using only a simple planner not taking into account the risk component as he does not transport any shipment. Caughtthe agent was caught during the sailing phase by international forces. This is the terminal state of the agent and the agent is removed from the simulation. Sail homewhen sailing home, the agent does not consider the risk component anymore as moves legitimately over the ocean. After the home location has been reached, the cycle is repeated by switching to the Wait state Patrol's Behavior Diagram Diagram Figure 4.6 determines patrol's behavior activities: WaitThis activity is the initial one (as in smuggler's behavior). Patrol gets its starting (random) position in given area. There can be more patrol's in the same position. Static patrolpatrol holds its position and looks for smuggler ships to chase them. Patrol predicts smuggler's position to optimize chasing strategy. Duration of this state is set to 8 hours if no smuggler appears.

24 CHAPTER 4. AGENT-BASED MODEL 16 Figure 4.5: Figure describing smuggler's behavior. Star (*) denotes initial state and plus sign (+) is denotes terminal state. Change patrol positionagent takes the straight (shortest) path to his next static position while he is still looking for smugglers. He also predicts position to optimize. ChaseIn patrol's visibility range smuggler agent appears. Patrol tries to predict his location to catch him as soon as possible. Chase timeout is dened to avoid following uncatchable smugglers. Smuggler is caught when patrol gets close to his ship, exactly on distance of 100 meters. Patrol is predicting when it is at minimal distance of 1 nautical mile from target. Else it sails straight on him. Smuggler caughtpatrol is now searching smuggler's ship Fishermen's Behavior Diagram Fishing agent behaves according this simple diagram: WaitAgent is initializing his origin harbor and he is ready for next action. Sail to destinationrandom destination is choosen and agent is moving there. He goes along the shortest route, there no more complicated planner to create indirect route. FishingBoat anchored for 24 hours.

25 CHAPTER 4. AGENT-BASED MODEL 17 Figure 4.6: Figure describing patrol's behavior. Star (*) denotes initial state. 4.4 Smuggler's Route Planner The planner plans a route in navigable areas dened by polygonal obstacles. In the preplanning phase, a visibility graph is constructed. Visibility graph transforms the continuous space with potentially innite number of voyages into a computationally tractable form without the loss of expressiveness. Vertexes in the visibility graph represent known navigationaly signicant points and edges represents elementary shortest paths between these points. [7] The visibility graph 4.3 captures the distance-minimization component of agent's planning process. To take into account the risk component, we dene an area, where the smuggler can be caught. The area is dened by a polygon, which is discretized into a grid, driven by a discretization step parameter, determining granularity of the grid. The boundary cells of the grid are connected to the visibility graph Distance Model To measure the length of an edge in the visibility graph, we use Haversine formula [12], giving great-circle distance between any two points on sphere 5 For an angle θ, the Haversine formula is computed as: H (θ) = sin 2 ( θ 2 ) = 1 cos(θ) 2 (4.1) 5 We use spherical approximation of the Earth. For a more precise distance calculation, Vincenty's formulae can be used.

26 CHAPTER 4. AGENT-BASED MODEL 18 Figure 4.7: Figure describing sherman's behavior. Star (*) denotes initial state. For two points p 1 (φ 1, λ 1 ) and p 2 (φ 2, λ 2 ) dened by their latitudes φ and longitudes λ, the Haversine formula takes the following form: H(p 1, p 2 ) = H(φ 1 φ 2 ) + cos(φ 1 )cos(φ 2 )H(λ 2 λ 1 ) (4.2) The distance dist(p 1, p 2 ) between two points p 1 and p 2 is then computed as: ( ) dist(p 1, p 2 ) = 2r arcsin H(p1, p 2 ) (4.3) Finally, we dene length of a route x in the graph with edges (p i, p j ) as: Risk Model dist(x) = (p i,p j ) x dist(p i, p j ) (4.4) To capture the risk, we propose the following risk model, which is a function of distance from the nearest coast line: r(p) = 1 dist(p, b) + 1 (4.5) where r is risk value at point p and dist(p, b) is distance from point p to the nearest obstacle point b. To be able to assign a risk to an edge, we dene risk taken between any two points: r(p 1, p 2 ) = r(p 1) + r(p 2 ) dist(p 1, p 2 ) (4.6) 2 i.e., risk value for an edge on graph given by 2 points p 1 and p 2 is the arithmetic mean of risks at those points, multiplied by length of the edge (p 1, p 2 ) (so that the risk is proportional to the time spend by traversing the edge).

27 CHAPTER 4. AGENT-BASED MODEL 19 Finally, we dene the risk along a route x in the graph with edges (p i, p j ) as: r(x) = (p i,p j ) x r(p i, p j ) (4.7) Planning as Multi-objective Optimization Problem We use formalization of multi-objective optimization to describe the problem of nding an optimal smuggler's route, as the smuggler weights two criteriathe length of the route taken and the risk taken along the route. The multi-objective optimization problem is dened over a set of functions. It is possible to use linear scalarization to express the criterion in the optimization problem as a single function: min x X k w i f i (x) (4.8) i=1 where we assign a weight w i to each function f i (x). In our case we solve bi-objective optimazition problem (having distance and risk); our linear scalarization is thus following: x = arg min dist(x) + α r(x). (4.9) x X The sum of route length dist(x) and risk r(x) are weighted by a parameter α capturing the risk aversion (i.e. the willingness to risk) of the smuggler (if α is small, shorter routes with higher risk are preferred). X is set of all possible paths and x is the optimal path minimizing the criterion function. We use A* algorithm [13] to nd the optimal route x. A* algorithm is dened by a cost function g and a heuristics function h. A* uses evaluation function f(p i ) in form of: f(p i ) = g(p i ) + h(p i ) (4.10) where g(p i ) is cost function and h(p i ) is heuristics. The cost function is given as: g(p i ) = dist(home, p i ) + r(p i ) α (4.11) where dist(p i ) is distance from home harbor to p i, r(p i ) is risk along the edge from p i 's parent and α is risk weight coecient. The heuristic function h(p i ) is dened as the direct distance from p i to the destination harbor: h(p i ) = dist(p i, destination) (4.12)

28 Chapter 5 Implementation Both environment and agent model are implemented within the AgentC framework [7, 8], which oers features to model smuggler's behavior, allows simulating various scenarios and displaying the results in Google Earth. 5.1 Environment Environment consists of followings parts: Geographical data provider or GISDataProvider class; object with all geographical data for planning, behavior etc. It stores all sailing zones and harbor lists and provides methods for getting random point in a range or returning a harbor from list. The rst method is used by patrols, smugglers and shermen use the second one. Vessel data provider This class encapsulates all the informations and services around ship traces. It's mostly used to get all vessels in given distance and to get an information about certain vessel. Agent container basic container containing all the agents, manages simulation steps and eventreporting. For all its saved agents it starts method simulatestep(long stepduration), which execute agent's current state for given time quantum stepduration. 5.2 Planner As mentioned before planner makes routes on visibility graph. To avoid permanent graph making before each simulation, there is a cache used to save and restore it. New cache le is created when graph is changed. There can be many saved graph with dierent properites. Cache saves all important data which can be used later, e.g. harbors location, borders, etc. 20

29 CHAPTER 5. IMPLEMENTATION Agents This section describes agent's behavior implementation structure and important part of the behavior states Behavior Structure The substancial part of agent's behavior are classes FSMRealisticSmuggler, FSMCaribbean- Army and FSMFishermen which extend abstract class AbstractFiniteStateMachine. These classes are responsible for states management, behavior diagrams are made here. States are successors of abstract class AbstractState containing method simulatetimestep (long deltat), which evaluates given behavior in time quantum deltat and returns the remaining time after all state steps. If this time is greater then 0, actual state is done. 0 means given task is not complete yet and it continues Smugglers On the beggining origin and destination harbors are generated for each smuggler. Next step assigns FSM structure appropriate with behavior diagram. There are 2 main states in smuggler's behavior. The rst one is StateSailToDestination which is responsible for sailing loaded and the second one, StateSailHome, oers plan for sailing home, to origin harbor, unloaded. StateSailToDestination generates smuggler's risk weight, number from 0 to 1, which decides the trace character and move with ship on the given created trace by PlanMover oering method move(long deltat, double speed). This method moves the ship with average speed speed for time interval deltat. StateSailHome is similar to StateSailToDestination except for generating risk. When smuggler's ship is unloaded, it takes the shortest route home Patrols In addition to FSM structure patrol agents get only their rst position on the open sea when they are initialized. Class StateSailToDestinationArmy is the rst action state in patrol's behavior diagram. It generates destination position in given maximum distance and moves the ship there. While sailing it looks for smuggler ship in its radar range. When smuggler ship appears current state set target to this ship, reports event and ends. If more than one ship are in range, method ndsmuggler chooses the best choice for chasing according to the closest distance from the ships in given time step. It predicts smugglers locations by their speed and heading. It assumes ship straight trace, beacuse it's impossible to predict the location with direction changes. If there no smuggler ship found, state waits for reaching destination. StateStaticPatrolArmy is state when ship is anchored for given hours and checks its surroundings. The same method for looking for smugglers is used, as in previous state to optimize chasing strategy.

30 CHAPTER 5. IMPLEMENTATION 22 Figure 5.1: Figure indicates predicting proces, where blue mark is a patrol ship and the red one is a smuggler. The circle around is patrol's radar range, green dots show predict positions in dierent time intervals. Patrol chooses the one with red line as target destination. StateChaseArmy - patrol pursues set target with predicting its next position to catch him as soon as possible. Predicting is little bit dierent from the one above in states State- SailToDestinationArmy and StateStaticPatrolArmy. On Figure 5.1 the predicting process is sketched. Patrol (blue) estimates a set of uniformly distributed points (lying in a line) in maximum distance equal to distance between patrol and smuggler (red). Then the point closest to smuggler, where patrol ship will be earlier than the smuggler one, is choosen and set as destination point in current step Fishermen Fishermen are based on only two states. Their behavior aren't needed to be complicated because they don't react on any events. The rst step is assigning home harbor to each ship. Main behavior is the same as the patrol's in states StateSailToDestinationArmy and StateStaticPatrolArmy, e.g. random point in open sea is generated and set as destination point to shing. Specically StateSailToDestinationFish and inbuilt state called StateWait which is simple implemented state for waiting for given time.

31 CHAPTER 5. IMPLEMENTATION Conguration / Scenario Set up Conguration and scenarios inuence whole simulation. Scenario le have turned particular modules on or o before simulation starts, congurations store constants for using them in code Conguration Their extension is in form ".conf" and inside they have its specic tree structure which divide data to sections and subsections to make it transparent. All type of data types can be used. Behind double slash there can be commentary used. Following code shows short conguration example: module.smugglers = false agent { smugglers { origins_harbours_file = "data/agents/smuggler/harbours.kml"; number = 10; avg_speed = 8.0 // Smuggler average travel speed in knots graph { grid_size = 50 // Planning area grid size in km graph_construction = true; // make kml file } } } To get values from conguration, CongReader is used. It's embedded part of AgentC framework. It oers functions for getting dierent data types, which have common parameter part where the wanted item is written by dot notation. From example above, getting value number looks like: int number = AisConfig.getConfig().getInt("agent.smugglers.number"); It follows the conguration by exception paradigm [7]. We dene default conguration data in.conf les and scenario settings which can update some values from default conguration. Figure 5.2 shows the principal of this paradigm Scenario Application starts with scenario chooser which turn set modules on or o and determines future application character. Extension ".groovy" is typical of scenario le and it denotes groovy language 1. Groovy is na object-oriented programming language for Java, and it oers also scripting syntax for this platform. 1

32 CHAPTER 5. IMPLEMENTATION 24 Figure 5.2: Figure shows principal of conguration by exception. conguration are changed by scenario. Default values set in module.smugglers = true module.carmy = true module.fishermen = true agent.transport.long_range.number = 1; Code example above shows groovy le structure (dot notation, same as conguration) and updating default values from conguration. 5.5 Simulation Execution The simulation is step-based, i.e., it runs in steps dening temporal discretization of the model. In each step, the agent is given a time quantum to execute its actual state and perform an action. Simulation duration is set in conguration and it gives a total number of steps to execute in simulation. A step represents a time interval. Duration of this interval is the same for all steps and it is given in seconds. 5.6 Reporting During simulation all agents (except shermen) react on events which can change their current state or do some action, for example when smuggler is caught, he receives an event message changing his state. Agent includes event queue based on waiting for incoming events and follow-up processing of them. After sending event a note appears in visualization timeline so we can observe the simulation progress. Next part of reporting is saving simulation logs used for evaluation. Patrols and smugglers prints their results, each agent to his own le. Pros of saving to many les is that progress of temporary result can be watched, slower simulation speed is cons.

33 CHAPTER 5. IMPLEMENTATION 25 Smugglers update their les when they change the state to sail home. Their results are total number of journeys started with goods (i.e. number of state "StateSailToDestination" initialization) and number of successfully reached destinations. Patrols save their stats from radar, i.e. number of seen smugglers and shermen. Values are saved before start of states of static patroling, sailing and chasing.

34 Chapter 6 Evaluation 6.1 Planner Evaluation First, we evaluate the properties of the planner, i.e., we examine the trade-o between risk and distance taken. Second, we integrate the agent model into the simulation and to nd set of α coecients representing main behavior patterns of real-world smugglers. Figure 6.1 captures the trade-o between the risk and distance taken in form of a Pareto frontier for a number of routes between dierent origin-destination harbor pairs 1. For each pair, the Pareto frontier was constructed by varying the α parameter from 0 to Note that when increasing the value beyond 10000, the route was not dierent anymore due to boundaries of the risk graph. Having the Pareto frontier, we can ask, what α value corresponds to the real-world smuggler behavior. We executed the simulation with various α parameters to capture the behavior of the real-world smuggler, as depicted on Figure 2.1. Figure 6.4 shows result of the simulated behavior matched against the data overlay. Routes on this gure are representatives of the 3 classes of smugglers. Resulting risk weight coecient α was found to be (respectively from the North): 0, 1000 and This matching quality of the planned route was evaluated by visual comparison only. 6.2 Simulation Evaluation Second part of evaluations is based on running simulations with dierent parameters and nding result dependency on them. A nal result with certain parameter is measured as an arithmetic mean of results from 10 simulations. Because there is too many parameters which can be variable and make big dimension of results (unreal to simulate all of them), we xed some parameter and measure only in two dimensions. Simulation duration is 100,000 steps of 500 seconds, it's about 579 days. 1 For brevity, the harbors are denoted by their country only. 26

35 CHAPTER 6. EVALUATION 27 Figure 6.1: Pareto frontiers for a few dierent routes: Route 1) from CO to MEX. Route 2) from EC to MEX. Route 3) from EC to MEX. Route 4) from EC to MEX. Route 5) from CO to MEX. Route 6) from CO to MEX. Figure 6.2: Routes from Pareto frontiers 6.1 with risk weight α = 0 (direct routes). Route colors are identical with the ones in Pareto frontiers (best viewed in color).

36 CHAPTER 6. EVALUATION 28 Figure 6.3: Figure with generated routes with dierent risk weight α ; from the North 0 α

37 CHAPTER 6. EVALUATION 29 Figure 6.4: Result of the simulation with representatives of each class of smugglers which are displayed on the background. Generated routes almost exactly imitate the ones from data Success Rate Dependency on Number of Patrols and Smugglers The crucial observation is focused on success rate of smuggler's drugs delivery depending on number of patrols and smuggler ships. We xed visility and number of shermen. Visibility is equal to 50 nautical mile, shermen are 15. Graph on Figure 6.5 shows how success rate changes only when number of patrols is dierent. Number of smugglers does not aect total result because the more smugglers are there, the more crowded the space is. That goes to bigger patrol's eciency. On the other side, the more patrols we have, the more expensive the operation is. E.g. if we want to catch 60% of smugglers, we need 10 vessels to patrol the area Success Rate Dependency on Number of Patrols and Visibility The view of the situation with variable visibility is dierent. Better quality of ship equipment decrease smuggler's success rate and the same higher number of patrols. On Figure 6.6 the biggest fall is evident when visibility raises. It's better to equip vessels with superior equipment than deploy more patrol vessels Radar Noise Last evaluation is about comparing seen shing and smuggler ships after whole simulation. Fishing ships on patrol's radar make it unclear, which negatively aects patrol's eciency. It's necessary to lter shing ships and focus only on the smuggler ones.

38 CHAPTER 6. EVALUATION 30 Figure 6.5: Chart shows smuggler's success rate depending on number of smugglers and patrols; visibility is 50 nautical mile. Figure 6.6: Dependency on visibility and number of patrols with xed number of smuggler equal to 10.

39 CHAPTER 6. EVALUATION 31 Figure 6.7: Figure with mean number of smugglers and shermen who were seen by a patrol vessel during simulation. Left image shows number of smugglers which is lineary dependent on visibility. The right one represents the same with shermen. Here the total number dependent both on visibility and number of shermen in simulation. In simulation we xed number of patrols and smugglers to 10. Visibility is set from 10 to 50 nautical miles and number of shermen from 5 to 15. Results of these simulations are shown on Figure 6.7, where is evident linear dependence of total number of seen shermen and smugglers on vessel's visibility. Number of shermen has only a little eect on the results.

40 Chapter 7 Conclusions The goal of this thesis was to specify smuggler's behavior in Central and South America and to try model this behavior in simulation, where envirnoment contains patrolling and shing vessels and weather model. I studied the problem of smuggling in America and create a conceptual model of smuggler's behavior. It was necessary to nd out important data which can have eects on simulation progress, such as what boats smugglers use, how they sail to their destination, etc. From available data I determined smuggler's strategy which was later implemented into AgentC framework as a behavior structure which is designed as diagram. I dened risk weight α, which represents smuggler's willingness to risk. Smuggler's routes planner was the main component, which optimizes routes according to distance and risk. I used A* algorithm to solve this multi-objective optimization problem. Result of this optimization is Pareto Frontier which shows optimal route for all risk weithts. From simulation results I nd out we can divide smugglers into 3 classes according to their routes. The most risky smugglers belong to the rst class, they sail direct to their destination harbor with maximum risk. Smugglers, who are more careful, take longer routes further from coast and try to reduce the risk. The last group (class) represents smugglers taking the longest route at the expense of risk. I tested dependency of number of patrols and smugglers on total smuggler's delivery success. Results say to reduce smuggler's success rate we need to use more patrols or improve their equipment, especially radars. This work has certainly some limits, for example we did not consider smuggler's reactions on patrols, which could have inuence on their planning, so results would be dierent, we can use another attitude of this problem, instead of agent-based, we could involve cooperation of smugglers or we could add police helicopter etc. 32

41 Bibliography [1] B. R. Aune. Maritime drug tracking: an underrated problem. on-line, _1_page008.html. [2] Y. Collette and P. Siarry. Multiobjective Optimization: Principles and Case Studies. Decision Engineering. Springer, [3] G. Eichfelder. Adaptive Scalarization Methods in Multiobjective Optimization. Vector Optimization. Springer-Verlag Berlin Heidelberg, [4] S. Franklin and A. Graesser. Is it an agent, or just a program?: A taxonomy for autonomous agents. In Proceedings of the Workshop on Intelligent Agents III, Agent Theories, Architectures, and Languages, ECAI '96, London, UK, UK, Springer- Verlag. [5] M. Gonzales, K. McEnery, T. Sheehan, and S. Mellody. America's Habit: Drug Abuse, Drug Tracking, and Organized Crime : President's Commission on Organized Crime. Diane Publishing Company, [6] J. Hanson, L. Hsu, J. Dykes, J. Dastugue, R. Allard, C. Barron, M. Abramson, S. Russell, and R. Mittu. Information domination: Dynamically coupling METOC and INTEL for improved guidance for piracy interdiction. In NRL Review, pages Naval Research Laboratory, [7] M. Jakob, O. Van k, B. Bo²anský, O. Hrstka, and M. P chou ek. Adversarial Modeling and Reasoning in the Maritime Domain Year 3 Report. Technical report, ATG, CTU, Prague, [8] M. Jakob, O. Van k, and M. P chou ek. Using Agents to Improve International Maritime Transport Security. IEEE Intelligent Systems, 26(1):9096, january [9] F. Klügl. Agent-based simulation engineering. online /mas_pdfs/kluegl_habilitation.pdf. [10] S. LaValle. Planning Algorithms. Cambridge University Press, [11] G. Luger. Articial intelligence: structures and strategies for complex problem solving. Pearson education. Addison-Wesley,

42 BIBLIOGRAPHY 34 [12] C. C. Robusto. The cosine-haversine formula. The American Mathematical Monthly, 64(1):3840, [13] S. J. Russell, P. Norvig, J. F. Canny, J. M. Malik, and D. D. Edwards. Articial intelligence: a modern approach, volume 2. Prentice hall Englewood Clis, NJ, [14] L. Slootmaker. Countering piracy with the next-generation piracy performance surface model (master thesis). Technical report, NPS, Monterey California, [15] E.-G. Talbi. Metaheuristics : from design to implementation. J. Wiley & Sons, Hoboken (N.J.), [16] D. Tomá² and O. Van k. Agent-based Model of Maritime Drug Smuggling. International Conference POSTER, 2013.

43 Appendix A CD Content CD attached with the thesis contains: Runnable simulation \Application Source code \Source code Thesis in PDF \Thesis\tomasda2_BP.pdf 35

Approval Voting Theory with Multiple Levels of Approval

Approval Voting Theory with Multiple Levels of Approval Claremont Colleges Scholarship @ Claremont HMC Senior Theses HMC Student Scholarship 2012 Approval Voting Theory with Multiple Levels of Approval Craig Burkhart Harvey Mudd College Recommended Citation

More information

corruption since they might reect judicial eciency rather than corruption. Simply put,

corruption since they might reect judicial eciency rather than corruption. Simply put, Appendix Robustness Check As discussed in the paper, many question the reliability of judicial records as a proxy for corruption since they might reect judicial eciency rather than corruption. Simply put,

More information

Case Study: Border Protection

Case Study: Border Protection Chapter 7 Case Study: Border Protection 7.1 Introduction A problem faced by many countries is that of securing their national borders. The United States Department of Homeland Security states as a primary

More information

Zaatari refugee camp. Account not required. Build skills in these areas: What you need:

Zaatari refugee camp. Account not required. Build skills in these areas: What you need: Account not required Zaatari refugee camp Although refugee camps are defined as temporary settlements built to accommodate displaced people, the United Nations has had a refugee agency called the United

More information

PERTH COUNTER-PIRACY CONFERENCE JULY 2012 CHAIRMAN S FINAL STATEMENT OF THE MEETING

PERTH COUNTER-PIRACY CONFERENCE JULY 2012 CHAIRMAN S FINAL STATEMENT OF THE MEETING PERTH COUNTER-PIRACY CONFERENCE 15-17 JULY 2012 CHAIRMAN S FINAL STATEMENT OF THE MEETING [This is a personal, informal report of our meeting which I offer for consideration by the Australian Government

More information

ALON. Ocean Wave. Issue Topics of interest relating to the Philippine Maritime Industry and Shipping. GULF of ADEN

ALON. Ocean Wave. Issue Topics of interest relating to the Philippine Maritime Industry and Shipping. GULF of ADEN ALON Issue 1 2013 Ocean Wave Topics of interest relating to the Philippine Maritime Industry and Shipping Filipino Seafarers High Risk Area Gulf of Aden and ship owners contractual liability under the

More information

Zaatari refugee camp. Account not required. Build skills in these areas: What you need:

Zaatari refugee camp. Account not required. Build skills in these areas: What you need: Account not required Zaatari refugee camp Although refugee camps are defined as temporary settlements built to accommodate displaced people, the United Nations has had a refugee agency called the United

More information

Coalition and Party Formation in a Legislative. Voting Game. April 1998, Revision: April Forthcoming in the Journal of Economic Theory.

Coalition and Party Formation in a Legislative. Voting Game. April 1998, Revision: April Forthcoming in the Journal of Economic Theory. Coalition and Party Formation in a Legislative Voting Game Matthew O. Jackson and Boaz Moselle April 1998, Revision: April 2000 Forthcoming in the Journal of Economic Theory Abstract We examine a legislative

More information

Designing police patrol districts on street network

Designing police patrol districts on street network Designing police patrol districts on street network Huanfa Chen* 1 and Tao Cheng 1 1 SpaceTimeLab for Big Data Analytics, Department of Civil, Environmental, and Geomatic Engineering, University College

More information

GOALS 9 ISSUE AREAS. page 7. page 5. page 6. page 8. page 1 page 2. page 9

GOALS 9 ISSUE AREAS. page 7. page 5. page 6. page 8. page 1 page 2. page 9 The Stable Seas Maritime Security Index is a first-of-its-kind effort to measure and map a range of threats to maritime governance and the capacity of nations to counter these threats. By bringing diverse

More information

Subreddit Recommendations within Reddit Communities

Subreddit Recommendations within Reddit Communities Subreddit Recommendations within Reddit Communities Vishnu Sundaresan, Irving Hsu, Daryl Chang Stanford University, Department of Computer Science ABSTRACT: We describe the creation of a recommendation

More information

'Wave riding' or 'Owning the issue': How do candidates determine campaign agendas?

'Wave riding' or 'Owning the issue': How do candidates determine campaign agendas? 'Wave riding' or 'Owning the issue': How do candidates determine campaign agendas? Mariya Burdina University of Colorado, Boulder Department of Economics October 5th, 008 Abstract In this paper I adress

More information

Quality of Institutions : Does Intelligence Matter?

Quality of Institutions : Does Intelligence Matter? Quality of Institutions : Does Intelligence Matter? Isaac Kalonda-Kanyama 1,2,3 and Oasis Kodila-Tedika 3 1 Department of Economics and Econometrics, University of Johannesburg, South Africa. 2 Department

More information

Biogeography-Based Optimization Combined with Evolutionary Strategy and Immigration Refusal

Biogeography-Based Optimization Combined with Evolutionary Strategy and Immigration Refusal Biogeography-Based Optimization Combined with Evolutionary Strategy and Immigration Refusal Dawei Du, Dan Simon, and Mehmet Ergezer Department of Electrical and Computer Engineering Cleveland State University

More information

Estimating the Margin of Victory for Instant-Runoff Voting

Estimating the Margin of Victory for Instant-Runoff Voting Estimating the Margin of Victory for Instant-Runoff Voting David Cary Abstract A general definition is proposed for the margin of victory of an election contest. That definition is applied to Instant Runoff

More information

Testimony DRUG CONTROL. U.S. Counterdrug Activities in Central America

Testimony DRUG CONTROL. U.S. Counterdrug Activities in Central America GAO United States General Accounting Office Testimony Before the Subcommittee on Information, Justice, Transportation, and Agriculture, Committee on Government Operations, House of Representatives For

More information

Coalition formation among autonomous agents: Strategies and complexity. Abstract. Autonomous agents are designed to reach goals that were

Coalition formation among autonomous agents: Strategies and complexity. Abstract. Autonomous agents are designed to reach goals that were Coalition formation among autonomous agents: Strategies and complexity (preliminary report)? Onn Shehory Sarit Kraus Department of Mathematics and Computer Science Bar Ilan University Ramat Gan, 52900

More information

Thinking About a US-China War, Part 2

Thinking About a US-China War, Part 2 Thinking About a US-China War, Part 2 Jan. 4, 2017 Sanctions and blockades as an alternative to armed conflict would lead to armed conflict. By George Friedman This article is the second in a series. Read

More information

Learning and Visualizing Political Issues from Voting Records Erik Goldman, Evan Cox, Mikhail Kerzhner. Abstract

Learning and Visualizing Political Issues from Voting Records Erik Goldman, Evan Cox, Mikhail Kerzhner. Abstract Learning and Visualizing Political Issues from Voting Records Erik Goldman, Evan Cox, Mikhail Kerzhner Abstract For our project, we analyze data from US Congress voting records, a dataset that consists

More information

Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks

Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks Chuan Peng School of Computer science, Wuhan University Email: chuan.peng@asu.edu Kuai Xu, Feng Wang, Haiyan Wang

More information

Political Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries

Political Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries Political Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries Sebastian Goderbauer 1 Electoral Districts in Elections to

More information

A comparative analysis of subreddit recommenders for Reddit

A comparative analysis of subreddit recommenders for Reddit A comparative analysis of subreddit recommenders for Reddit Jay Baxter Massachusetts Institute of Technology jbaxter@mit.edu Abstract Reddit has become a very popular social news website, but even though

More information

Michael Laver and Ernest Sergenti: Party Competition. An Agent-Based Model

Michael Laver and Ernest Sergenti: Party Competition. An Agent-Based Model RMM Vol. 3, 2012, 66 70 http://www.rmm-journal.de/ Book Review Michael Laver and Ernest Sergenti: Party Competition. An Agent-Based Model Princeton NJ 2012: Princeton University Press. ISBN: 9780691139043

More information

Reforming the speed of justice: Evidence from an event study in Senegal

Reforming the speed of justice: Evidence from an event study in Senegal Reforming the speed of justice: Evidence from an event study in Senegal ABCDE, June 2015 Motivation (1) The speed of legal resolution is among the key markers of the investment climate Doing Business [World

More information

Hoboken Public Schools. College Algebra Curriculum

Hoboken Public Schools. College Algebra Curriculum Hoboken Public Schools College Algebra Curriculum College Algebra HOBOKEN PUBLIC SCHOOLS Course Description College Algebra reflects the New Jersey learning standards at the high school level and is designed

More information

Overview. Ø Neural Networks are considered black-box models Ø They are complex and do not provide much insight into variable relationships

Overview. Ø Neural Networks are considered black-box models Ø They are complex and do not provide much insight into variable relationships Neural Networks Overview Ø s are considered black-box models Ø They are complex and do not provide much insight into variable relationships Ø They have the potential to model very complicated patterns

More information

Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3)

Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3) B.Y. Choueiry 1 Instructor s notes #5 Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3) Introduction to Artificial Intelligence CSCE 476-876, Fall 2017 URL: www.cse.unl.edu/~choueiry/f17-476-876

More information

} { THE PRESIDENT OF THE UNITED STATES MESSAGE AGREEMENT WITH THE UNION OF SOVIET SOCIALIST REPUBLICS ON THE MARITIME BOUNDARY

} { THE PRESIDENT OF THE UNITED STATES MESSAGE AGREEMENT WITH THE UNION OF SOVIET SOCIALIST REPUBLICS ON THE MARITIME BOUNDARY } { 101ST CONGRESS TREATY DOC. SENATE 2d Session 101-22 AGREEMENT WITH THE UNION OF SOVIET SOCIALIST REPUBLICS ON THE MARITIME BOUNDARY MESSAGE FROM THE PRESIDENT OF THE UNITED STATES TRANSMITTING THE

More information

Cluster Analysis. (see also: Segmentation)

Cluster Analysis. (see also: Segmentation) Cluster Analysis (see also: Segmentation) Cluster Analysis Ø Unsupervised: no target variable for training Ø Partition the data into groups (clusters) so that: Ø Observations within a cluster are similar

More information

Thailand s Contribution to the Regional Security By Captain Chusak Chupaitoon

Thailand s Contribution to the Regional Security By Captain Chusak Chupaitoon Thailand s Contribution to the Regional Security By Captain Chusak Chupaitoon Introduction The 9/11 incident and the bombing at Bali on 12 October 2002 shook the world community and sharpened it with the

More information

Essential Questions Content Skills Assessments Standards/PIs. Identify prime and composite numbers, GCF, and prime factorization.

Essential Questions Content Skills Assessments Standards/PIs. Identify prime and composite numbers, GCF, and prime factorization. Map: MVMS Math 7 Type: Consensus Grade Level: 7 School Year: 2007-2008 Author: Paula Barnes District/Building: Minisink Valley CSD/Middle School Created: 10/19/2007 Last Updated: 11/06/2007 How does the

More information

!,!,!,!, !,!, !,!, !,!, !,!, !,!,!,!,!,!, !,!, !,!, KEY FINDINGS:

!,!,!,!, !,!, !,!, !,!, !,!, !,!,!,!,!,!, !,!, !,!, KEY FINDINGS: Security Event!" KEY INDINGS: - The overall pirate hijacking success rate for 2009 (vessel hijackings / total attacks) is currently at 23%. This is significantly lower than the average in 2008 of 40% and

More information

ARTICLE VIII SIGN REGULATIONS

ARTICLE VIII SIGN REGULATIONS ARTICLE VIII SIGN REGULATIONS 24-8 SIGNS. 24-8.1 Purpose. The purpose of these regulations is to protect the dual interest of the public and the advertiser. They are designed to protect public safety and

More information

The EU fight against piracy in the Horn of Africa

The EU fight against piracy in the Horn of Africa The EU fight against piracy in the Horn of Africa Speaking Notes: Actions under the Common Security and Defence Policy (CSDP) and the comprehensive approach Brussels, 28 March 2012 Thorsten Bargfrede Crisis

More information

Police patrol districting method and simulation evaluation using agent-based model & GIS

Police patrol districting method and simulation evaluation using agent-based model & GIS Zhang and Brown Security Informatics 2013, 2:7 RESEARCH Open Access Police patrol districting method and simulation evaluation using agent-based model & GIS Yue Zhang * and Donald E Brown Abstract Police

More information

A procedure to compute a probabilistic bound for the maximum tardiness using stochastic simulation

A procedure to compute a probabilistic bound for the maximum tardiness using stochastic simulation Proceedings of the 17th World Congress The International Federation of Automatic Control A procedure to compute a probabilistic bound for the maximum tardiness using stochastic simulation Nasser Mebarki*.

More information

Combating Human Trafficking Using Mathematics

Combating Human Trafficking Using Mathematics Duquesne University Duquesne Scholarship Collection Undergraduate Research and Scholarship Symposium 8th Annual Undergraduate Research & Scholarship Symposium April 6, 216 Combating Human Trafficking Using

More information

Telephone Survey. Contents *

Telephone Survey. Contents * Telephone Survey Contents * Tables... 2 Figures... 2 Introduction... 4 Survey Questionnaire... 4 Sampling Methods... 5 Study Population... 5 Sample Size... 6 Survey Procedures... 6 Data Analysis Method...

More information

Chapter 8: Recursion

Chapter 8: Recursion Chapter 8: Recursion Presentation slides for Java Software Solutions for AP* Computer Science 3rd Edition by John Lewis, William Loftus, and Cara Cocking Java Software Solutions is published by Addison-Wesley

More information

How to identify experts in the community?

How to identify experts in the community? How to identify experts in the community? Balázs Sziklai XXXII. Magyar Operációkutatás Konferencia, Cegléd e-mail: sziklai.balazs@krtk.mta.hu 2017. 06. 15. Sziklai (CERS HAS) 1 / 34 1 Introduction Mechanism

More information

A Global Economy-Climate Model with High Regional Resolution

A Global Economy-Climate Model with High Regional Resolution A Global Economy-Climate Model with High Regional Resolution Per Krusell Institute for International Economic Studies, CEPR, NBER Anthony A. Smith, Jr. Yale University, NBER February 6, 2015 The project

More information

THE CORPORATION OF THE TOWN OF INNISFIL BY-LAW NO

THE CORPORATION OF THE TOWN OF INNISFIL BY-LAW NO THE CORPORATION OF THE TOWN OF INNISFIL BY-LAW NO. 050-06 A By-Law of The Corporation of the Town of Innisfil to regulate the size, use, location and maintenance of large signs and advertising devices

More information

Coversheet: Interdicting drug shipments in international waters

Coversheet: Interdicting drug shipments in international waters Coversheet: Interdicting drug shipments in international waters Advising agencies Decision sought Proposing Ministers New Zealand Customs Service Agree to implement a domestic legislative framework for

More information

Cyclical Upgrading of Labor and Unemployment Dierences Across Skill Groups

Cyclical Upgrading of Labor and Unemployment Dierences Across Skill Groups Cyclical Upgrading of Labor and Unemployment Dierences Across Skill Groups Andri Chassamboulli University of Cyprus Economics of Education June 26, 2008 A.Chassamboulli (UCY) Economics of Education 26/06/2008

More information

Analyzing and Representing Two-Mode Network Data Week 8: Reading Notes

Analyzing and Representing Two-Mode Network Data Week 8: Reading Notes Analyzing and Representing Two-Mode Network Data Week 8: Reading Notes Wasserman and Faust Chapter 8: Affiliations and Overlapping Subgroups Affiliation Network (Hypernetwork/Membership Network): Two mode

More information

A Stochastic Model of Migrant Rescue in the Mediterranean Sea

A Stochastic Model of Migrant Rescue in the Mediterranean Sea MPRA Munich Personal RePEc Archive A Stochastic Model of Migrant Rescue in the Mediterranean Sea Amitrajeet Batabyal and Hamid Beladi Department of Economics, Rochester Institute of Technology, Department

More information

autonomous agents Onn Shehory Sarit Kraus fshechory, Abstract

autonomous agents Onn Shehory Sarit Kraus fshechory, Abstract Formation of overlapping coalitions for precedence-ordered task-execution among autonomous agents Onn Shehory Sarit Kraus Department of Mathematics and Computer Science Bar Ilan University Ramat Gan, 52900

More information

I A I N S T I T U T E O F T E C H N O L O G Y C A LI F O R N

I A I N S T I T U T E O F T E C H N O L O G Y C A LI F O R N DIVISION OF THE HUMANITIES AND SOCIAL SCIENCES CALIFORNIA INSTITUTE OF TECHNOLOGY PASADENA, CALIFORNIA 91125 DO VOTERS LEARN FROM PRESIDENTIAL ELECTION CAMPAIGNS? R. Michael Alvarez Garrett Glasgow I A

More information

Women s March Austin, Texas. Report Analysis

Women s March Austin, Texas. Report Analysis Women s March Austin, Texas Report Analysis January 2017 Completed by: Bert Bruyninckx, Eric Kant, Jade Patel and Marc Tubee 1 Contents Contents... 2 1 Summary... 3 2 Limitations... 4 3 Approach... 4 4

More information

Online Appendix: Trafficking Networks and the Mexican Drug War

Online Appendix: Trafficking Networks and the Mexican Drug War Online Appendix: Trafficking Networks and the Mexican Drug War Melissa Dell February 6, 2015 Contents A-1 Estimation appendix A 3 A-1.1 The shortest paths problem........................ A 3 A-1.2 Solving

More information

Introduction to Path Analysis: Multivariate Regression

Introduction to Path Analysis: Multivariate Regression Introduction to Path Analysis: Multivariate Regression EPSY 905: Multivariate Analysis Spring 2016 Lecture #7 March 9, 2016 EPSY 905: Multivariate Regression via Path Analysis Today s Lecture Multivariate

More information

Wasserman & Faust, chapter 5

Wasserman & Faust, chapter 5 Wasserman & Faust, chapter 5 Centrality and Prestige - Primary goal is identification of the most important actors in a social network. - Prestigious actors are those with large indegrees, or choices received.

More information

Online Appendix for The Contribution of National Income Inequality to Regional Economic Divergence

Online Appendix for The Contribution of National Income Inequality to Regional Economic Divergence Online Appendix for The Contribution of National Income Inequality to Regional Economic Divergence APPENDIX 1: Trends in Regional Divergence Measured Using BEA Data on Commuting Zone Per Capita Personal

More information

Hoboken Public Schools. Algebra II Honors Curriculum

Hoboken Public Schools. Algebra II Honors Curriculum Hoboken Public Schools Algebra II Honors Curriculum Algebra Two Honors HOBOKEN PUBLIC SCHOOLS Course Description Algebra II Honors continues to build students understanding of the concepts that provide

More information

Genetic Algorithms with Elitism-Based Immigrants for Changing Optimization Problems

Genetic Algorithms with Elitism-Based Immigrants for Changing Optimization Problems Genetic Algorithms with Elitism-Based Immigrants for Changing Optimization Problems Shengxiang Yang Department of Computer Science, University of Leicester University Road, Leicester LE1 7RH, United Kingdom

More information

Tariffs and Tariff Comparison

Tariffs and Tariff Comparison Tariffs and Tariff Comparison Imagicle Billing is bundled with the definition of the call costs of many well known telephony providers. Imagicle keeps the costs tables updated year by year, but probably

More information

Effect of Voting Machine Shortages in Franklin County, Ohio General Election

Effect of Voting Machine Shortages in Franklin County, Ohio General Election Page 1 of 8 Effect of Voting-Machine Allocations on the 2004 Election -- Franklin County, Ohio Despite unprecedented registration and get-out-the vote efforts in Franklin County, with predicted record

More information

United Nations Conference on the Law of the Sea

United Nations Conference on the Law of the Sea United Nations Conference on the Law of the Sea Geneva, Switzerland 24 February to 27 April 1958 Documents: A/CONF.13/C.1/L.52-L.85 Annexes Extract from the Official Records of the United Nations Conference

More information

TESTIMONY OF ADMIRAL ROBERT PAPP COMMANDANT, U.S. COAST GUARD ON ACCESSION TO THE 1982 LAW OF THE SEA CONVENTION

TESTIMONY OF ADMIRAL ROBERT PAPP COMMANDANT, U.S. COAST GUARD ON ACCESSION TO THE 1982 LAW OF THE SEA CONVENTION Commandant United States Coast Guard 2100 Second Street, S.W. Washington, DC 20593-0001 Staff Symbol: CG-0921 Phone: (202) 372-3500 FAX: (202) 372-2311 TESTIMONY OF ADMIRAL ROBERT PAPP COMMANDANT, U.S.

More information

International Public Notice

International Public Notice Old Confederation flag New Flag for The United States of America International Public Notice The flag below is hereby released of all claims by The United States of America to the Congress of the Confederation

More information

The Effect of Electoral Geography on Competitive Elections and Partisan Gerrymandering

The Effect of Electoral Geography on Competitive Elections and Partisan Gerrymandering The Effect of Electoral Geography on Competitive Elections and Partisan Gerrymandering Jowei Chen University of Michigan jowei@umich.edu http://www.umich.edu/~jowei November 12, 2012 Abstract: How does

More information

Jens Hainmueller Massachusetts Institute of Technology Michael J. Hiscox Harvard University. First version: July 2008 This version: December 2009

Jens Hainmueller Massachusetts Institute of Technology Michael J. Hiscox Harvard University. First version: July 2008 This version: December 2009 Appendix to Attitudes Towards Highly Skilled and Low Skilled Immigration: Evidence from a Survey Experiment: Formal Derivation of the Predictions of the Labor Market Competition Model and the Fiscal Burden

More information

Improving the accuracy of outbound tourism statistics with mobile positioning data

Improving the accuracy of outbound tourism statistics with mobile positioning data 1 (11) Improving the accuracy of outbound tourism statistics with mobile positioning data Survey response rates are declining at an alarming rate globally. Statisticians have traditionally used imputing

More information

Two-dimensional voting bodies: The case of European Parliament

Two-dimensional voting bodies: The case of European Parliament 1 Introduction Two-dimensional voting bodies: The case of European Parliament František Turnovec 1 Abstract. By a two-dimensional voting body we mean the following: the body is elected in several regional

More information

COULD SIMULATION OPTIMIZATION HAVE PREVENTED 2012 CENTRAL FLORIDA ELECTION LINES?

COULD SIMULATION OPTIMIZATION HAVE PREVENTED 2012 CENTRAL FLORIDA ELECTION LINES? Proceedings of the 2013 Winter Simulation Conference R. Pasupathy, S.-H. Kim, A. Tolk, R. Hill, and M. E. Kuhl, eds. COULD SIMULATION OPTIMIZATION HAVE PREVENTED 2012 CENTRAL FLORIDA ELECTION LINES? Jingsheng

More information

GLOBALIZACIÓN, CRECIMIENTO Y COMPETITIVIDAD. Patricio Pérez Universidad de Cantabria

GLOBALIZACIÓN, CRECIMIENTO Y COMPETITIVIDAD. Patricio Pérez Universidad de Cantabria GLOBALIZACIÓN, CRECIMIENTO Y COMPETITIVIDAD Patricio Pérez Universidad de Cantabria Lima, 10 de mayo de 2018 1. http://www.gifex.com/images/0x0/2009-12- 08-11364/Mapa-de-las-Comunidades- Autnomas-de-Espaa.png

More information

Support Vector Machines

Support Vector Machines Support Vector Machines Linearly Separable Data SVM: Simple Linear Separator hyperplane Which Simple Linear Separator? Classifier Margin Objective #1: Maximize Margin MARGIN MARGIN How s this look? MARGIN

More information

Robust Electric Power Infrastructures. Response and Recovery during Catastrophic Failures.

Robust Electric Power Infrastructures. Response and Recovery during Catastrophic Failures. Robust Electric Power Infrastructures. Response and Recovery during Catastrophic Failures. Arturo Suman Bretas Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University

More information

Cruising Los Roques. Brief Report - January Summary

Cruising Los Roques. Brief Report - January Summary Cruising Los Roques Brief Report - January 2018 - www.sy-moya.de Sabrina Kuttruff-Coqui - 21. Januar 2018 Summary After initial doubts, we - a family of four - decided to visit Los Roques (Venezuela) by

More information

Networked Games: Coloring, Consensus and Voting. Prof. Michael Kearns Networked Life NETS 112 Fall 2013

Networked Games: Coloring, Consensus and Voting. Prof. Michael Kearns Networked Life NETS 112 Fall 2013 Networked Games: Coloring, Consensus and Voting Prof. Michael Kearns Networked Life NETS 112 Fall 2013 Experimental Agenda Human-subject experiments at the intersection of CS, economics, sociology, network

More information

Fight against piracy

Fight against piracy Tuesday, 3 May, 2016-18:18 Fight against piracy Piracy in the Western Indian Ocean has been a growing threat to security, international shipping and development since the mid-2000s. Piracy in the Western

More information

Do two parties represent the US? Clustering analysis of US public ideology survey

Do two parties represent the US? Clustering analysis of US public ideology survey Do two parties represent the US? Clustering analysis of US public ideology survey Louisa Lee 1 and Siyu Zhang 2, 3 Advised by: Vicky Chuqiao Yang 1 1 Department of Engineering Sciences and Applied Mathematics,

More information

Constraint satisfaction problems. Lirong Xia

Constraint satisfaction problems. Lirong Xia Constraint satisfaction problems Lirong Xia Spring, 2017 Project 1 Ø You can use Windows Ø Read the instruction carefully, make sure you understand the goal search for YOUR CODE HERE Ø Ask and answer questions

More information

Vote Compass Methodology

Vote Compass Methodology Vote Compass Methodology 1 Introduction Vote Compass is a civic engagement application developed by the team of social and data scientists from Vox Pop Labs. Its objective is to promote electoral literacy

More information

Working Paper. Why So Few Women in Poli/cs? Evidence from India. Mudit Kapoor Shamika Ravi. July 2014

Working Paper. Why So Few Women in Poli/cs? Evidence from India. Mudit Kapoor Shamika Ravi. July 2014 Working Paper Why So Few Women in Poli/cs? Evidence from India Mudit Kapoor Shamika Ravi July 2014 Brookings Ins8tu8on India Center, 2014 Why So Few Women in Politics? Evidence from India Mudit Kapoor

More information

AmericasBarometer Insights: 2014 Number 105

AmericasBarometer Insights: 2014 Number 105 AmericasBarometer Insights: 2014 Number 105 Bridging Inter American Divides: Views of the U.S. Across the Americas By laura.e.silliman@vanderbilt.edu Vanderbilt University Executive Summary. The United

More information

The Effectiveness of Receipt-Based Attacks on ThreeBallot

The Effectiveness of Receipt-Based Attacks on ThreeBallot The Effectiveness of Receipt-Based Attacks on ThreeBallot Kevin Henry, Douglas R. Stinson, Jiayuan Sui David R. Cheriton School of Computer Science University of Waterloo Waterloo, N, N2L 3G1, Canada {k2henry,

More information

REPUBLIC OF MONTENEGRO GOVERNMENT OF THE REPUBLIC OF MONTENEGRO MINISTRY OF INTERIOR LAW ON THE STATE BORDER SURVEILLANCE. Podgorica, July 2005.

REPUBLIC OF MONTENEGRO GOVERNMENT OF THE REPUBLIC OF MONTENEGRO MINISTRY OF INTERIOR LAW ON THE STATE BORDER SURVEILLANCE. Podgorica, July 2005. REPUBLIC OF MONTENEGRO GOVERNMENT OF THE REPUBLIC OF MONTENEGRO MINISTRY OF INTERIOR LAW ON THE STATE BORDER SURVEILLANCE Podgorica, July 2005. The S A R Z A D J Z O N A K ON THE STATE BORDER SURVEILLANCE

More information

Hoboken Public Schools. Algebra I Curriculum

Hoboken Public Schools. Algebra I Curriculum Hoboken Public Schools Algebra I Curriculum Algebra One HOBOKEN PUBLIC SCHOOLS Course Description Algebra I reflects the New Jersey learning standards at the high school level and is designed to give students

More information

A survey of 200 adults in the U.S. found that 76% regularly wear seatbelts while driving. True or false: 76% is a parameter.

A survey of 200 adults in the U.S. found that 76% regularly wear seatbelts while driving. True or false: 76% is a parameter. A survey of 200 adults in the U.S. found that 76% regularly wear seatbelts while driving. True or false: 76% is a parameter. A. True B. False Slide 1-1 Copyright 2010 Pearson Education, Inc. True or false:

More information

OCTOBER 2017 RANGER. RAdars for long distance maritime surveillance and Search and Rescue operations.

OCTOBER 2017 RANGER. RAdars for long distance maritime surveillance and Search and Rescue operations. Newsletter #5 OCTOBER 2017 RANGER RAdars for long distance maritime surveillance and Search and Rescue operations www.ranger-project.eu 02/ #5 OCTOBER 2017 Dear Readers, Contents Welcome to the fifth issue

More information

Section 5. Off-Street Loading Space Regulations

Section 5. Off-Street Loading Space Regulations Section 5 Off-Street Loading Space Regulations 5.1 Number of Loading Spaces 5.1.1 General Requirements Unless otherwise provided in Schedule C or a CD-1 By-law, in all districts except FCCDD and BCPED

More information

Immigration and the use of public maternity services in England

Immigration and the use of public maternity services in England Immigration and the use of public maternity services in England George Stoye PRELIMINARY - PLEASE DO NOT CITE 29th September 2015 Abstract Immigration has a number of potentially signicant eects on the

More information

Chapter. Estimating the Value of a Parameter Using Confidence Intervals Pearson Prentice Hall. All rights reserved

Chapter. Estimating the Value of a Parameter Using Confidence Intervals Pearson Prentice Hall. All rights reserved Chapter 9 Estimating the Value of a Parameter Using Confidence Intervals 2010 Pearson Prentice Hall. All rights reserved Section 9.1 The Logic in Constructing Confidence Intervals for a Population Mean

More information

Google Consumer Surveys Presidential Poll Fielded 8/18-8/19

Google Consumer Surveys Presidential Poll Fielded 8/18-8/19 Google Consumer Surveys Presidential Poll Fielded 8/18-8/19 Results, Crosstabs, and Technical Appendix 1 This document contains the full crosstab results for Red Oak Strategic's Google Consumer Surveys

More information

(67686) Mathematical Foundations of AI June 18, Lecture 6

(67686) Mathematical Foundations of AI June 18, Lecture 6 (67686) Mathematical Foundations of AI June 18, 2008 Lecturer: Ariel D. Procaccia Lecture 6 Scribe: Ezra Resnick & Ariel Imber 1 Introduction: Social choice theory Thus far in the course, we have dealt

More information

Dissent in Monetary Policy Decisions

Dissent in Monetary Policy Decisions Dissent in Monetary Policy Decisions Alessandro Riboni and Francisco J. Ruge-Murcia June 2011 Abstract Voting records indicate that dissents in monetary policy committees are frequent and predictability

More information

Short-term International Migration Trends in England and Wales from 2004 to 2009

Short-term International Migration Trends in England and Wales from 2004 to 2009 Short-term International Migration Trends in England and Wales from 2004 to 2009 Simon Whitworth, Konstantinos Loukas and Ian McGregor Office for National Statistics Abstract Short-term migration estimates

More information

EUROPEAN UNION. Brussels, 11 October 2013 (OR. en) 2011/0427 (COD) PE-CONS 56/13 FRONT 86 COMIX 390 CODEC 1550

EUROPEAN UNION. Brussels, 11 October 2013 (OR. en) 2011/0427 (COD) PE-CONS 56/13 FRONT 86 COMIX 390 CODEC 1550 EUROPEAN UNION THE EUROPEAN PARLIAMT THE COUNCIL Brussels, 11 October 2013 (OR. en) 2011/0427 (COD) PE-CONS 56/13 FRONT 86 COMIX 390 CODEC 1550 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: REGULATION

More information

Was the Late 19th Century a Golden Age of Racial Integration?

Was the Late 19th Century a Golden Age of Racial Integration? Was the Late 19th Century a Golden Age of Racial Integration? David M. Frankel (Iowa State University) January 23, 24 Abstract Cutler, Glaeser, and Vigdor (JPE 1999) find evidence that the late 19th century

More information

Experimental Computational Philosophy: shedding new lights on (old) philosophical debates

Experimental Computational Philosophy: shedding new lights on (old) philosophical debates Experimental Computational Philosophy: shedding new lights on (old) philosophical debates Vincent Wiegel and Jan van den Berg 1 Abstract. Philosophy can benefit from experiments performed in a laboratory

More information

Intelligence brief 19 March 2014

Intelligence brief 19 March 2014 Intelligence brief 19 March 2014 Maritime insecurity in the Gulf of Guinea Summary 1. Maritime insecurity incorporates a range of criminal activities, including piracy, smuggling and illegal fishing. 2.

More information

Report No. UCB/CSD November Computer Science Division (EECS) University of California. Berkeley, California 94720

Report No. UCB/CSD November Computer Science Division (EECS) University of California. Berkeley, California 94720 A note on \The Limited Performance Benets of Migrating Active Processes for Load Sharing" Allen B. Downey and Mor Harchol-Balter Report No. UCB/CSD-95-888 November 1995 Computer Science Division (EECS)

More information

Parties, Candidates, Issues: electoral competition revisited

Parties, Candidates, Issues: electoral competition revisited Parties, Candidates, Issues: electoral competition revisited Introduction The partisan competition is part of the operation of political parties, ranging from ideology to issues of public policy choices.

More information

Section 5. Off-Street Loading Space Regulations

Section 5. Off-Street Loading Space Regulations Section 5 Section 5 Off-Street Loading Space Regulations 5.1 Number of Loading Spaces 5.1.1 General Requirements Unless otherwise provided in Schedule C or a CD-1 By-law, in all districts except FCCDD

More information

Immigrant Employment and Earnings Growth in Canada and the U.S.: Evidence from Longitudinal data

Immigrant Employment and Earnings Growth in Canada and the U.S.: Evidence from Longitudinal data Immigrant Employment and Earnings Growth in Canada and the U.S.: Evidence from Longitudinal data Neeraj Kaushal, Columbia University Yao Lu, Columbia University Nicole Denier, McGill University Julia Wang,

More information

When Transaction Costs Restore Eciency: Coalition Formation with Costly Binding Agreements

When Transaction Costs Restore Eciency: Coalition Formation with Costly Binding Agreements When Transaction Costs Restore Eciency: Coalition Formation with Costly Binding Agreements Zsolt Udvari JOB MARKET PAPER October 29, 2018 For the most recent version please click here Abstract Establishing

More information

Hyo-Shin Kwon & Yi-Yi Chen

Hyo-Shin Kwon & Yi-Yi Chen Hyo-Shin Kwon & Yi-Yi Chen Wasserman and Fraust (1994) Two important features of affiliation networks The focus on subsets (a subset of actors and of events) the duality of the relationship between actors

More information

Comparison of the Psychometric Properties of Several Computer-Based Test Designs for. Credentialing Exams

Comparison of the Psychometric Properties of Several Computer-Based Test Designs for. Credentialing Exams CBT DESIGNS FOR CREDENTIALING 1 Running head: CBT DESIGNS FOR CREDENTIALING Comparison of the Psychometric Properties of Several Computer-Based Test Designs for Credentialing Exams Michael Jodoin, April

More information

VOTING DYNAMICS IN INNOVATION SYSTEMS

VOTING DYNAMICS IN INNOVATION SYSTEMS VOTING DYNAMICS IN INNOVATION SYSTEMS Voting in social and collaborative systems is a key way to elicit crowd reaction and preference. It enables the diverse perspectives of the crowd to be expressed and

More information