US Coast Guard Modeling/Simulation Efforts: Foreign Fishing Vessel (FFV) Incursions
|
|
- Robert Shepherd
- 6 years ago
- Views:
Transcription
1 US Coast Guard Modeling/Simulation Efforts: Foreign Fishing Vessel (FFV) Incursions LCDR D. Blair Sweigart LCDR E. Taquechel USCG Atlantic Area, Operations Analysis Division 30 June 2015
2 Objective Problem: We will discuss ongoing efforts to: analyze FFV activity level and impact Possible solution: We will also discuss a USCG RDC initiative to intelligently randomize USCG enforcement efforts Game Theoretic Fish Patrol Schedule Model (GTFM) USC CREATE assisted in development
3 Overview - Problem Unknown Denominator We know what we saw, what didn t we see? Common in law enforcement / security missions Counter Drug Migrant Interdiction Foreign Fisheries Most applicable when no good use exists
4 Mission Background OLE (Other Law Enforcement) - Mission Background FFVs illegally fishing in US waters NOAA is lead agency USCG conducts majority of enforcement activity
5 Study Objective Provide insight into the quantity and economic impact of illegal fishing activity in areas of interest Gauge the unknown, based on the known What % of FFV activity do we detect? All models are wrong, some are useful.
6 Overview - Observed Incursions 100% - 50% - 10% - Likelihood of Discovery - 0 Number of Incursions Dashed lines represent hypothetical relationships and are not model based
7 Key Factors FFV locations CG asset locations Probability of Detection
8 P( Detection ) p x W 4x 1 e Sweep Width (W) 2 2 Predefined for asset/target combinations Monte Carlo (30K) to develop an overall POD for each asset type in a grid box.
9 P( Detection ) con t POD sj A j i s is m ij m p ij i POD sj average grid POD for month j, class s s asset class (surface, air) A j combined asset availability for month j m ij minutes in grid by asset type i p i POD for asset type i The factor on the far right is the weighted, average POD
10 Key Factors (revisited) FFV locations (SME input) CG asset locations (known) Probability of Detection (calculated) Each time step (t): Bernoulli Trial LOD = 1 P(complete trip undetected) 1 P 1 n t1 (1 p t )
11 Methodology Likelihood of Discovery CG Asset Locations FFV Location Preferences FFV Behavior Simulation Arrival Rate as Control Knob Number of Incursions Biomass Impact Illicit Economic Gains
12 Methodology Discrete Event Simulation (VBA in Excel) 30 minute time steps FFV subject to detection at each step Repeat until all fishing stop complete Arrival Transit to Fishing Area Fish Exit US Waters Tally Stats Detected by Coast Guard? (POD) Legend System Block Decision Block Modeling Block Intercepted Interdicted Tally Stats as Seized
13 CG Asset Presence Surface Assets Blue Force Data for CY Presence Factor Weighted Average POD Air Assets Hours on Mission / Month Location based on Assigned Patrol Boxes CG Surface Asset Presence Grid
14 Utility Grids Probabilistic Location Preferences Favorable conditions for fish Desirable locations for FFVs Observed locations for FFVs over CY
15 Assumptions / Limitations No day/night modeling Weather independent FFV location preferences from SME input No seasonal location preference variation Only basic FFV behavior modeled No evasion efforts or counter-intel based actions
16 Way Ahead Refinements Working through current limitations Modeling more advanced behavior Improved utility grid computations Validation Comparison of known vs. modeled detection info Continue model runs for subsequent years Trend analysis Work with partners Commercial and recreational quotas Model improvements Extension to other applicable mission areas
17 Overview GTFM: Possible Solution Game Theoretic Fish Patrol Schedule Model Being developed by CG Research and Development Center Applies game theory and robust optimization to produce USCG patrol schedule Models a repeated Stackelberg game Assumes bounded rationality Models heterogeneous FFV population Available data used to update model
18 Stackelberg Game USCG = defender, moves first Using optimal strategy reflected by Strong Stackelberg Equilibrium solution FFV = attacker, observes defender strategy and moves second Fishes in certain locations Iterated game, both players adapt to each other Model can be updated with new FFV preferences, equilibrium solution recalculated May yield new USCG patrol tactics
19 Payoffs Defender expected utility (DEU) before attacker strategy considered: where: U ( x) x R (1 x ) P d t t x t = patrol density or strategy (probability of presence in a location t ) d R t d t = defender reward for interdiction (value of seized boat) = defender penalty for failing to interdict (value of illegally taken catch) d P t t d t
20 Bounded Rationality Subjective Utility Quantal Response (SUQR) a SUt, x) 1xt 2Rt 3 ( P a t This is attacker expected utility (AEU) where: x t = weight vector over three factors = first factor: defender patrol density = second factor: attacker reward if avoid interdiction (value of illegal catch) a R t a P t = third factor: attacker penalty if interdicted (value of seized boat)
21 Bounded Rationality con t AEU is used to calculate the probability FFV will select a certain area: q t (, x) e t' SU e t (, x) SU t ' (, x) Ratio of attacker expected utility from one area, to total expected utility over all areas considered
22 Zero Sum Attacker reward = defender penalty Defender reward = attacker penalty
23 Objective Function Maximize DEU: max x min t U ( x) q (, x) Attacker wants to minimize DEU (since zerosum); we want to maximize it Robust optimization - across all possible FFV types in heterogeneous population Initial weight vector reflects historical FFV preference data d t t
24 Constraints (nonexhaustive) Number of CG assets (aviation) Patrol duration Search capabilities CG asset competing priorities Ratio of FFV to CG assets in certain locations
25 Model Output Intelligent randomization: output is mixed strategy probability distribution Patrol strategy for USCG aviation assets Initial solution was optimized over fishing locations Subsequent solutions optimized over patrols
26 Learning and Weight Calibration Model leverages publicly available fisheries data Execute model output collect new data: Weights updated Equilibrium output recalculated Intelligence informing operations additional intelligence
27 Assumptions/Limitations CG presence in a location guarantees successful interdiction Aviation asset notifies interdicting asset (boat, cutter) guaranteeing end game Boundedly rational attacker(selects fishing locations based on weights) Previous CG game theoretic approaches: attacker assumed to select pure strategy Fishing farther from maritime boundary line increases detection probability Zero-sum
28 Testing and Evaluation The model was tested in a Coast Guard District Feedback from the test informed the model s development
29 Way Ahead - GTFM Collect additional data Update weights, test model s learning algorithm Account for FFV observation of our absence from pier (SUQR weights?) Verification and validation Verified during initial field test Additional data may help validate (extent to which model reflects real world)
30 Summary The Coast Guard is analyzing the FFV illegal fishing problem by modeling incursions and estimating economic impact The Coast Guard is also exploring possible solutions by evaluating game theoretic models that intelligently randomize CG assets Intent is to improve interdiction and deterrence Explore potential for model confluence There is still work to be done!
COASTAL AREAS & MARITIME APPROACHES: DRUG THREAT/ VULNERABILITY RISK SELF-ASSESSMENT CHECKLIST
COASTAL AREAS & MARITIME APPROACHES: DRUG THREAT/ VULNERABILITY RISK SELF-ASSESSMENT CHECKLIST COASTAL AREAS & MARITIME APPROACHES: DRUG THREAT/ VULNERABILITY RISK SELF-ASSESSMENT CHECKLIST A. Measures
More informationToward Adaptive, Risk-Informed Allocation of Border Security Assets. Joel Predd and Henry Willis February 26, 2009
Toward Adaptive, Risk-Informed Allocation of Border Security Assets Joel Predd and Henry Willis February 26, 2009 RAND Research on Counter-IED Operations in Iraq Illustrates Benefits of Tools Problem:
More informationIntroduction to Homeland Security
Introduction to Homeland Security Chapter 5 Safety & Security: Borders and Transportation Border Control The borders of any country are strategically important because of the critical role they play in
More informationRisk-Based Resource Allocation in Maritime Security and Maritime Domain Awareness. Duane Boniface ABS Consulting
Risk-Based Resource Allocation in Maritime Security and Maritime Domain Awareness Duane Boniface ABS Consulting dboniface@absconsulting.com 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public
More informationDivide to Defend: Collusive Security Games
Divide to Defend: Collusive Security Games Shahrzad Gholami, Bryan Wilder, Matthew Brown, Dana Thomas, Nicole Sintov, and Milind Tambe Computer Science Department, University of Southern California {sgholami,bwilder,matthew.a.brown,danathom,
More informationBeyond Runtimes and Optimality: Challenges and Opportunities in Evaluating Deployed Security Systems
In The AAMAS workshop on Agent Design Advancing from Pratice to Theory (ADAPT-09), Budapest, Hungary, May 2009. Beyond Runtimes and Optimality: Challenges and Opportunities in Evaluating Deployed Security
More informationModeling of competition in revenue management Petr Fiala 1
Modeling of competition in revenue management Petr Fiala 1 Abstract. Revenue management (RM) is the art and science of predicting consumer behavior and optimizing price and product availability to maximize
More informationPh.D. Defense: Resource Allocation Optimization in the Smart Grid and High-performance Computing Tim Hansen
Ph.D. Defense: Resource Allocation Optimization in the Smart Grid and High-performance Computing Tim Hansen Department of Electrical and Computer Engineering Colorado State University Fort Collins, Colorado,
More informationPrice of anarchy in auctions & the smoothness framework. Faidra Monachou Algorithmic Game Theory 2016 CoReLab, NTUA
Price of anarchy in auctions & the smoothness framework Faidra Monachou Algorithmic Game Theory 2016 CoReLab, NTUA Introduction: The price of anarchy in auctions COMPLETE INFORMATION GAMES Example: Chicken
More informationGraham Romp Dynamic Game Theory.
Graham Romp Dynamic Game Theory. In the previous chapter we focused on static games. However for many important economic applications we need to think of the game as being played over a number of time
More informationMazzeo (RAND 2002) Seim (RAND 2006) Grieco (RAND 2014) Discrete Games. Jonathan Williams 1. 1 UNC - Chapel Hill
Discrete Games Jonathan Williams 1 1 UNC - Chapel Hill Mazzeo (RAND 2002) - Introduction As far back as Hotelling (1929), firms tradeoff intensity of competition against selection of product with strongest
More informationTransportation Research Board
Transportation Research Board Applying Game Theory To Promote Strategic Decision-Making In Marine Transportation Scenarios Presented by the Marine Environmental Committee Produced in June 2016 1 Overview
More informationOptimizing Defensive Investments in Energy-Based Cyber-Physical Systems
Optimizing Defensive Investments in Energy-Based Cyber-Physical Systems Paul Wood (Purdue University), Saurabh Bagchi (Purdue), and Alefiya Hussain (USC/ISI) DPDNS 15, May 29, 2015 Slide 1/33 Energy-Based
More informationEcon 3542: Experimental and Behavioral Economics Exam #1 Review Questions
Econ 3542: Experimental and Behavioral Economics Exam #1 Review Questions Chapter 1 (Intro) o Briefly describe the early history of market experiments. Chamberlin s original pit market experiments (1948)
More informationReaction Paper Influence Maximization in Social Networks: A Competitive Perspective
Reaction Paper Influence Maximization in Social Networks: A Competitive Perspective Siddhartha Nambiar October 3 rd, 2013 1 Introduction Social Network Analysis has today fast developed into one of the
More informationSimulation Analytics
Simulation Analytics Powerful Techniques for Generating Additional Insights Mark Peco, CBIP mark.peco@gmail.com Objectives Basic capabilities of computer simulation Categories of simulation techniques
More informationSpatial Information in Offline Approximate Dynamic Programming for Dynamic Vehicle Routing with Stochastic Requests
1 Spatial Information in Offline Approximate Dynamic Programming for Dynamic Vehicle Routing with Stochastic Requests Ansmann, Artur, TU Braunschweig, a.ansmann@tu-braunschweig.de Ulmer, Marlin W., TU
More informationCombining AI and Game Theory to Model Negotiation and Cooperation
Combining AI and Game Theory to Model Negotiation and Cooperation Geoff Gordon Miroslav Dudík ggordon@cs.cmu.edu mdudik@cmu.edu CMU Machine Learning Dep t validation Virtual Humans USC Computational Models
More informationGame Theoretic Methods for the Smart Grid
Game Theoretic Methods for the Smart Grid Walid Saad 1, Zhu Han 2, H. Vincent Poor 3, and Tamer Başar 4 1 Electrical and Computer Engineering Department, University of Miami, Coral Gables, FL, USA, email:
More informationLecture #2: Introduction to Game Theory. Prof. Dr. Sven Seuken
Lecture #2: Introduction to Game Theory Prof. Dr. Sven Seuken 27.2.2012 Outline 1. Recap of last lecture 2. Go over Game Theory concepts 3. Play some in-class experiments 4. Discussion 5. Questions Quick
More informationIncentives in Crowdsourcing: A Game-theoretic Approach
Incentives in Crowdsourcing: A Game-theoretic Approach ARPITA GHOSH Cornell University NIPS 2013 Workshop on Crowdsourcing: Theory, Algorithms, and Applications Incentives in Crowdsourcing: A Game-theoretic
More informationIndustrial Organisation ECON309
Industrial Organisation ECON309 Introduction Industrial Organisation is the study of how firms behave in markets. Industrial organisation takes a strategic view of how firms interact and it deals with
More informationUniversity Question Paper Two Marks
University Question Paper Two Marks 1. List the application of Operations Research in functional areas of management. Answer: Finance, Budgeting and Investment Marketing Physical distribution Purchasing,
More informationMarxan and Reserve Selection Process: Next Steps
Marxan and Reserve Selection Process: Next Steps Desert Renewable Energy Conservation Plan Covered Species Working Group Meeting November 21, 2011 Overview Where does Marxan fit in the conservation planning
More informationOptimizing BC Hydro Generation Assets Using an Iterative Approach Based on System Marginal Prices. Tim Blair System Optimization, BC Hydro
Optimizing BC Hydro Generation Assets Using an Iterative Approach Based on System Marginal Prices Tim Blair System Optimization, BC Hydro Iterative Optimization Using System Marginal Prices Tim Blair System
More informationPredictive Port Resilience Tool to Assess Regional Impact of Hurricanes - Project Work Plan
Predictive Port Resilience Tool to Assess Regional Impact of Hurricanes - Project Work Plan Participants: Dr. Manhar Dhanak*, Dr. Evangelos Kaisar* and Dr. Scott Parr + *Florida Atlantic University, Boca
More informationUtilizing Optimization Techniques to Enhance Cost and Schedule Risk Analysis
1 Utilizing Optimization Techniques to Enhance Cost and Schedule Risk Analysis Colin Smith, Brandon Herzog SCEA 2012 2 Table of Contents Introduction to Optimization Optimization and Uncertainty Analysis
More informationINDIAN INSTITUTE OF MATERIALS MANAGEMENT Post Graduate Diploma in Materials Management PAPER 18 C OPERATIONS RESEARCH.
INDIAN INSTITUTE OF MATERIALS MANAGEMENT Post Graduate Diploma in Materials Management PAPER 18 C OPERATIONS RESEARCH. Dec 2014 DATE: 20.12.2014 Max. Marks: 100 TIME: 2.00 p.m to 5.00 p.m. Duration: 03
More informationTransactive Energy Challenge Kickoff Workshop: Tata Consultancy Services Ltd. (TCS)
Transactive Energy Challenge Kickoff Workshop: Tata Consultancy Services Ltd. (TCS) Area of Interest: Functionality / Capabilities: Proposed Scenario: Impacts/Why: Partners Needed: Integrated What-if Analyzer
More informationEcon 101A Solutions for Final exam - Fall 2006
Econ 101A Solutions for Final exam - Fall 2006 Problem 1. Shorter problems. (35 points) Solve the following shorter problems. 1. Consider the following (simultaneous) game of chicken. This is a game in
More informationC2 ADVANCED MULTI-DOMAIN ENVIRONMENT AND LIVE OBSERVATION TECHNOLOGIES
C2 ADVANCED MULTI-DOMAIN ENVIRONMENT AND LIVE OBSERVATION TECHNOLOGIES FLYSEC Final Info Day and Risk-Based Security Projects Cluster meeting 28/06/2018 1 OVERVIEW 2 Source: FRONTEX THE PROBLEM IRREGULAR
More informationINTEGRATED MARITIME SERVICES OPERATIONAL AWARENESS ACROSS SECTORS AND SEAS
INTEGRATED SERVICES OPERATIONAL AWARENESS ACROSS SECTORS AND SEAS A TAILORED APPROACH TO AWARENESS DATA EXCHANGE AND DISTRIBUTION The Integrated Maritime Services platform integrates and combines many
More informationOpen Business Model (OBM)
Open Business Model (OBM) DoD Maintenance Symposium & Exhibition - 2004 Gerry Moorman Vice President Operations Integrated Coast Guard Systems, LLC Today s Topics Deepwater Partnering for Success Program
More informationAn Evolutionary Trust Game for the Sharing Economy
An Evolutionary Trust Game for the Sharing Economy Manuel Chica, Raymond Chiong, Marc Adam, Sergio Damas, Timm Teubner University of Newcastle, Australia // University of Granada, Spain 1 What is the sharing
More informationSimple Market Equilibria with Rationally Inattentive Consumers
Simple Market Equilibria with Rationally Inattentive Consumers Filip Matějka and Alisdair McKay January 16, 2012 Prepared for American Economic Review Papers and Proceedings Abstract We study a market
More informationOptimizing a Containership Stowage Plan. using a modified Differential Evolution algorithm
Optimizing a Containership Stowage Plan using a modified Differential Evolution algorithm Speaker: Dr. Yun Dong ydong@tli.neu.edu.cn Supervisor: Pro. Lixin Tang Lixintang@mail.neu.edu.com The Logistics
More informationReliability Modelling: Review Process & Methodology
Reliability Modelling: Review Process & Methodology Adequacy and Demand Curve Workgroup Sept 20 th, 2017 Public Reliability Modelling Background Per SAM 2.0: AESO is the responsible party for modelling
More informationDISTRIBUTED ARTIFICIAL INTELLIGENCE
DISTRIBUTED ARTIFICIAL INTELLIGENCE LECTURE 3: PROBLEM MODELING INTRODUCTION There are different approaches for modeling of agent-based systems. The model that has gained most attention ti is modeling
More informationNear-Balanced Incomplete Block Designs with An Application to Poster Competitions
Near-Balanced Incomplete Block Designs with An Application to Poster Competitions arxiv:1806.00034v1 [stat.ap] 31 May 2018 Xiaoyue Niu and James L. Rosenberger Department of Statistics, The Pennsylvania
More informationEffects of changes in biotoxin closures on recreational shellfish harvest demand
Effects of changes in biotoxin closures on recreational shellfish harvest demand Leif Anderson and Stephanie Moore Northwest Fisheries Science Center NOAA Fisheries Recreational clam and oyster harvesting
More informationStrategic Analysis for Prediction Markets
Strategic Analysis for Prediction Markets Michael P. Wellman University of Michigan Joint work with David Pennock, others Prediction Market Games Agent has Beliefs (about uncertain proposition, other agents)
More informationRecent Advances in Research on Unmanned Aerial Vehicles
iii Recent Advances in Research on Unmanned Aerial Vehicles Fariba Fahroo, Le Yi Wang, and George Yin Editors iv Fariba Fahroo Le Yi Wang George Yin Air Force Office of Department of Electrical Department
More informationWaterborne Commerce Statistics Center
Waterborne Commerce Statistics Center Amy Tujague, Special Requests Project Manager Waterborne Commerce Statistics Center Navigation & Civil Works Decision Support Center USACE 30 March 2016 US Army Corps
More informationEl-Ghazali Talbi (Ed.) Metaheuristics for Bi-level Optimization. ^ Springer
El-Ghazali Talbi (Ed.) Metaheuristics for Bi-level Optimization ^ Springer Contents 1 A Taxonomy of Metaheuristics for Bi-level Optimization 1 El-Ghazali Talbi 1.1 Introduction 1 1.2 Bi-level Optimization
More informationCitation for published version (APA): Kopányi, D. (2015). Bounded rationality and learning in market competition Amsterdam: Tinbergen Institute
UvA-DARE (Digital Academic Repository) Bounded rationality and learning in market competition Kopányi, D. Link to publication Citation for published version (APA): Kopányi, D. (2015). Bounded rationality
More informationStatistical Methods for Quantitative Trait Loci (QTL) Mapping
Statistical Methods for Quantitative Trait Loci (QTL) Mapping Lectures 4 Oct 10, 011 CSE 57 Computational Biology, Fall 011 Instructor: Su-In Lee TA: Christopher Miles Monday & Wednesday 1:00-1:0 Johnson
More informationC-TPAT Security Criteria. Sea Carriers
C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum security criteria. Where a sea carrier does
More informationStrategic behaviour in fisheries management Practical applications. Associate Professor Lone Grønbæk Kronbak University of Southern Denmark
Strategic behaviour in fisheries management Practical applications Associate Professor Lone Grønbæk Kronbak University of Southern Denmark Outline Baltic Sea cod fishery; Example of application of c-games,
More informationTechnology Insertion. 8 March Walt Dickey. Deepwater brief template.ppt 1
Technology Insertion 8 March 2005 Walt Dickey Deepwater brief template.ppt 1 U. S. Coast Guard Missions Maritime Safety Search and Rescue International Ice Patrol Maritime Mobility Lightering Zone Enforcement
More informationMonte-Carlo Tree Search
Introduction Selection and expansion References An introduction Jérémie DECOCK May 2012 Introduction Selection and expansion References Introduction 2 Introduction Selection and expansion References Introduction
More informationGame Theory and Effectiveness of Logistic Processes Under Uncertainty and Risk Conditions 2
Michał Tymiński 1 Jan Kochanowski University Kielce Branch in Piotrków Trybunalski (Poland) Game Theory and Effectiveness of Logistic Processes Under Uncertainty and Risk Conditions 2 Introduction The
More informationPortSec: Port Security Risk and Resource Management System
CREATE Research Archive Research Project Summaries 2010 PortSec: Port Security Risk and Resource Management System Michael D. Orosz University of Southern California, mdorosz@isi.edu Petros Ioannou University
More informationWHEN THE SMART GRID MEETS ENERGY-EFFICIENT COMMUNICATIONS: GREEN WIRELESS CELLULAR NETWORKS POWERED BY THE SMART GRID
WHEN THE SMART GRID MEETS ENERGY-EFFICIENT COMMUNICATIONS: GREEN WIRELESS CELLULAR NETWORKS POWERED BY THE SMART GRID Authors S. Bu, F. R. Yu, Y. Cai, and X. P. Liu IEEE Transactions on Wireless Communications,
More informationASSESSING THE TRADEOFF BETWEEN COST AND AVAILABILITY USING SIMULATION
2017 NDIA GROUND VEHICLE SYSTEMS ENGINEERING AND TECHNOLOGY SYMPOSIUM SYSTEMS ENGINEERING (SE) TECHNICAL SESSION AUGUST 8-10, 2017 NOVI, MICHIGAN ASSESSING THE TRADEOFF BETWEEN COST AND AVAILABILITY USING
More informationCan Complexity Be Captured with Agent- Based Modeling and Simulation? Michael North
Can Complexity Be Captured with Agent- Based Modeling and Simulation? Michael North north@anl.gov www.cas.anl.gov The Name Game ABMS is known by many names: ABM: Agent-based modeling or anti-ballistic
More informationAAPA PORT SECURITY SEMINAR & EXHIBITION July 16 18, 2008 HOUSTON, TX REGIONAL SECURITY INITIATIVES Mitch Smith Operations Director Port of South
AAPA PORT SECURITY SEMINAR & EXHIBITION July 16 18, 2008 HOUSTON, TX REGIONAL SECURITY INITIATIVES Mitch Smith Operations Director Port of South Louisiana Table of Contents The Port of South Louisiana
More informationCS626 Data Analysis and Simulation
CS626 Data Analysis and Simulation Instructor: Peter Kemper R 14A, phone 221-3462, email:kemper@cs.wm.edu Office hours: Monday, Wednesday 2-4 pm Today: Stochastic Input Modeling based on WSC 21 Tutorial
More informationSome Thoughts on the Traveler s Dilemma. 1 Introduction. 1.1 Statement of the problem. by Guillaume Alain
Some Thoughts on the Traveler s Dilemma by Guillaume Alain Abstract In this paper, we will discuss the traveler s dilemma, a problem famous for its ability to point out how theoretical results of game
More informationUsing Game Theory to analyze Risk to Privacy. Lisa Rajbhandari Einar A. Snekkenes
Using Game Theory to analyze Risk to Privacy Lisa Rajbhandari Einar A. Snekkenes Agenda Introduction Background Issues focused on this paper Why Game Theory? A privacy scenario Limitations Conclusion 2
More informationUSACE Integration of Metrics
USACE Integration of Metrics CMANC Annual Fall Meeting Anne K. Sturm, P.E. Navigation and Coastal Business Line Manager South Pacific Division Anne.K.Sturm@usace.army.mil 11 October 2012 US Army Corps
More informationJ.C. Seijo Marist University of Merida. CLIFFMA Workshop Tromso, Norway November 27-28, 2012
J.C. Seijo Marist University of Merida CLIFFMA Workshop Tromso, Norway November 27-28, 2012 From homogeneous to heterogeneous resource distribution S-G and B-H models are based on dynamic pool assumptions,
More informationTradeoffs Between Ef/iciency and Risk in the Future Grid. Munther A. Dahleh
Tradeoffs Between Ef/iciency and Risk in the Future Grid Munther A. Dahleh 1 Collaborators on Power Grid Risk QinqQing Huang: MIT Mardavij Roozbehani: MT Control Architecture Donatello Materassi Saverio
More informationCyber physical social systems: Modelling of consumer assets and behavior in an integrated energy system
Cyber physical social systems: Modelling of consumer assets and behavior in an integrated energy system in Energy Systems Integration 102 Research Challenges 1 by Tim Hansen and Sid Suryanarayanan Department
More informationFINAL Version A Friday, June 11, 2004 FILL IN THE BLANK. (5 points per blank)
ECN 460/560, Spring 2004 Prof. Bruce Blonigen SS#: FINAL Version A Friday, June 11, 2004 FILL IN THE BLANK. (5 points per blank) 1) In the theory of the firm, the short-run is defined as that period of
More informationLearning theory: SLT what is it? Parametric statistics small number of parameters appropriate to small amounts of data
Predictive Genomics, Biology, Medicine Learning theory: SLT what is it? Parametric statistics small number of parameters appropriate to small amounts of data Ex. Find mean m and standard deviation s for
More informationMeeting Operational Demand Determining Output for the Royal Canadian Navy
Determining Output for the Royal Canadian Navy Dr. Van Fong Jean-Denis Caron Defence Research & Development Canada Centre for Operational Research and Analysis 101 Colonel By Drive, Ottawa, Ontario K1A
More informationSELF AWARE VEHICLES FOR URBAN AIR MOBILITY: CHALLENGES AND OPPORTUNITIES
SELF AWARE VEHICLES FOR URBAN AIR MOBILITY: CHALLENGES AND OPPORTUNITIES Irene M. Gregory, Ph.D., S.T. NASA Senior Technologist for Advanced Control Theory and Applications 2017 AFOSR Dynamics and Control
More informationPredicting the Operational Effectiveness of Aircraft Survivability Equipment Suite
2012 World Conference on Science and Engineering (WCSE 2012) IPCSIT Press, Singapore Predicting the Operational Effectiveness of Aircraft Survivability Equipment Suite Sanguk Noh 1 and Chaetaek Choi 2
More informationOPERATIONS RESEARCH Code: MB0048. Section-A
Time: 2 hours OPERATIONS RESEARCH Code: MB0048 Max.Marks:140 Section-A Answer the following 1. Which of the following is an example of a mathematical model? a. Iconic model b. Replacement model c. Analogue
More informationEstimating Demand Response Potential for Resource Planning
Estimating Demand Response Potential for Resource Planning Stuart Schare and Cory Welch, Summit Blue Consulting, LLC ABSTRACT As electricity demand increases, utility planners are faced with many options
More informationHidden Chinese Restaurant Game: Grand Information Extraction for Stochastic Network Learning
1 Hidden Chinese Restaurant Game: Grand Information Extraction for Stochastic Network Learning Chih-Yu Wang, Member, IEEE, Yan Chen, Senior Member, IEEE, K. J. Ray Liu, Fellow, IEEE Abstract Agents in
More informationEfficiency of Dynamic Pricing in Priority-based Contents Delivery Networks
Efficiency of Dynamic Pricing in Priority-based Contents Delivery Networks Noriyuki YAGI, Eiji TAKAHASHI, Kyoko YAMORI, and Yoshiaki TANAKA, Global Information and Telecommunication Institute, Waseda Unviersity
More informationNo Longer at a Loss for Words
No Longer at a Loss for Words Christopher G. Irwin DOE Office of Electricity Delivery & Energy Reliability 2017 Transactive Energy Systems Conference June 13, 2017 Pillars of our Community 2 and yet, here
More informationTutorial: Introduction to Game Theory
July, 2013 Tutorial: Introduction to Game Theory Jesus Rios IBM T.J. Watson Research Center, USA jriosal@us.ibm.com Approaches to decision analysis Descriptive Understanding of how decisions are made Normative
More informationAlgorithmic Mechanisms for Internet-based Master-Worker Computing with Untrusted and Selfish Workers
Algorithmic Mechanisms for Internet-based Master-Worker Computing with Untrusted and Selfish Workers Antonio Fernández Anta 1 Chryssis Georgiou 2 Miguel A. Mosteiro 1,3 1 LADyR, GSyC, Universidad Rey Juan
More informationMARCH 09, 2011 CIRCULAR NO. 11/11 TO MEMBERS OF THE ASSOCIATION. Dear Member:
MARCH 09, 2011 CIRCULAR NO. 11/11 TO MEMBERS OF THE ASSOCIATION Dear Member: US ENVIRONMENTAL PROTECTION AGENCY (EPA) AND COAST GUARD: AGREEMENT TO COORDINATE EFFORTS TO ENSURE COMPLIANCE WITH EPA VESSEL
More informationRAM Model and Simulation of U.S. Army Aviation Fleet
Presented to: RAM X Training Summit RAM Model and Simulation of U.S. Army Aviation Fleet DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited. 8 November 2017 Presented by: Seth
More informationFactored Customer Models for Agent-based Smart Grid Simulation
Factored Customer Models for Agent-based Smart Grid Simulation Prashant Reddy Manuela Veloso Machine Learning Department Computer Science Department School of Computer Science Carnegie Mellon University
More informationAlternative High Occupancy/Toll Lane Pricing Strategies and their Effect on Market Share
Alternative High Occupancy/Toll Lane Pricing Strategies and their Effect on Market Share Michael Janson and David Levinson High Occupancy/Toll (HOT) Lanes typically charge a varying to single occupant
More informationKeith Moffat 290 O 10/31/17
Game-Theoretic Models of Electricity Theft Detection in Smart Utility Networks Saurabh Amin, Galina A. Schwartz, Alvaro A. Cárdenas, and S. Shankar Sastry Keith Moffat 290 O 10/31/17 Historically, widespread
More informationModule Descriptions Computer-Based Training (CBT) Programme
Module Descriptions Computer-Based Training (CBT) Programme MODULE NUMBER NAME DESCRIPTION 1 GENERAL COURSES This category includes general modules. These modules are meant for all students. Please note
More informationFROM DATA TO PREDICTIONS
FROM DATA TO PREDICTIONS Translating Theory to Action Presented by Eric Torkia, MASc @etorkia www.technologypartnerz.com 3 6 9 12 15 18 21 24 27 30 33 36 39 42 45 48 51 54 57 60 1 MEET YOUR PRESENTER:
More informationMachine learning for Dynamic Social Network Analysis
Machine learning for Dynamic Social Network Analysis Applications: Control Manuel Gomez Rodriguez Max Planck Institute for Software Systems IIT HYDERABAD, DECEMBER 2017 Outline of the Seminar REPRESENTATION:
More information1 Session 16: Wrap up
Page 1 1 Session 16: Wrap up 1. Strategic commitment (from Session 15). 2. Entry as a congestion game. 3. Wrap up. 2 An entry deterrance game Part of Exercise 15.1 The figure below illustrates the following
More informationGame-Theoretic Model of Incentivizing Privacy- Aware Users to Consent to Location Tracking
Game-Theoretic Model of Incentivizing Privacy- Aware Users to Consent to Location Tracking Emmanouil (Manos) Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, and Tansu Alpcan Secure and Dependable
More informationModeling and Analysis of Air Campaign Resource Allocation: A Spatio Temporal Decomposition Approach
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART A: SYSTEMS AND HUMANS, VOL. 32, NO. 3, MAY 2002 403 Modeling and Analysis of Air Campaign Resource Allocation: A Spatio Temporal Decomposition Approach
More informationAGENT-BASED SIMULATIONS OF SERVICE POLICY DECISIONS. Richard B. Lam
Proceedings of the 2007 Winter Simulation Conference S. G. Henderson, B. Biller, M.-H. Hsieh, J. Shortle, J. D. Tew, and R. R. Barton, eds. AGENT-BASED SIMULATIONS OF SERVICE POLICY DECISIONS Richard B.
More informationUsing an Annealing Mediator to Solve the Prisoners Dilemma in the Negotiation of Complex Contracts
Using an Annealing Mediator to Solve the Prisoners Dilemma in the Negotiation of Complex Contracts Mark Klein 1, Peyman Faratin 1, and Yaneer Bar-Yam 2 1 Massachusetts Institute of Technology, NE20-336
More informationIvana LJUBIC ESSEC Business School, Paris. OR 2018, Brussels EURO Plenary
Ivana LJUBIC ESSEC Business School, Paris OR 2018, Brussels EURO Plenary Stackelberg Games Two-player sequential-play game: LEADER and FOLLOWER LEADER moves before FOLLOWER - first mover advantage Perfect
More informationOPEC CARTEL BEHAVIOR: WHAT IS THEIR OBJECTIVE AND WHAT MAY HAPPEN NOW?
OPEC CARTEL BEHAVIOR: WHAT IS THEIR OBJECTIVE AND WHAT MAY HAPPEN NOW? Peter Volkmar Rice University 19 June 2016 Is OPEC a Cartel? Is this a good question? Let s assume it is a cartel and see, given underlying
More informationMulti-UAV Task Allocation using Team Theory
DRDO IISc Programme on Advanced Research in Mathematical Engineering Multi-UAV Task Allocation using Team Theory (TR-PME-2005-10) by P. B. Sujit, A. Sinha and D. Ghose Department of Aerospace Engineering
More informationStudy of Optimization Assigned on Location Selection of an Automated Stereoscopic Warehouse Based on Genetic Algorithm
Open Journal of Social Sciences, 206, 4, 52-58 Published Online July 206 in SciRes. http://www.scirp.org/journal/jss http://dx.doi.org/0.4236/jss.206.47008 Study of Optimization Assigned on Location Selection
More informationECON 4100: Industrial Organization. Lecture 1- Introduction and a review of perfect competition versus monopoly
ECON 4100: Industrial Organization Lecture 1- Introduction and a review of perfect competition versus monopoly 1 Introductory Remarks Overview study of firms and markets strategic competition Different
More informationProfessor Christina Romer SUGGESTED ANSWERS TO PROBLEM SET 2
Economics 2 Spring 2018 rofessor Christina Romer rofessor David Romer SUGGESTED ANSWERS TO ROBLEM SET 2 1.a. In this problem we are dividing everything the household buys into two categories child care
More informationStudy programme in Sustainable Energy Systems
Study programme in Sustainable Energy Systems Knowledge and understanding Upon completion of the study programme the student shall: - demonstrate knowledge and understanding within the disciplinary domain
More informationMarket mechanisms and stochastic programming
Market mechanisms and stochastic programming Kjetil K. Haugen and Stein W. Wallace Molde University College, Servicebox 8, N-6405 Molde, Norway E-mail: Kjetil.Haugen/Stein.W.Wallace@himolde.no 18.12.01
More informationSAIC TASK MANAGEMENT PLAN. TASK ORDER RFP SOW: 05-TOS-21 for Unscheduled Maintenance and Repair of NDBC Marine Observation Network Alaskan Region
PERIOD OF PERFORMANCE: 01 July 2005 to 30 June 2006 TO TYPE: CPFF 1.0 SCOPE, STATEMENT of WORK AND TECHNICAL/MANAGEMENT APPROACH: 1.1 General Scope: This Task Order assigns responsibility to SAIC to maintain
More informationAlgorithms and Methods for Influencing a Flock
Fly with Me: Algorithms and Methods for Influencing a Flock The University of Texas at Austin katie@cs.utexas.edu June 22, 2017 1 Bird Strikes in Aviation $3 billion per year (PreciseFlight) 2 Common Bird
More informationSpecial request, Advice May 2013
9.3.3.1 Special request, Advice May 2013 ECOREGION SUBJECT Widely distributed and migratory stocks NEAFC request to ICES to evaluate the harvest control rule element of the long-term management plan for
More informationFinal Project - Social and Information Network Analysis
Final Project - Social and Information Network Analysis Factors and Variables Affecting Social Media Reviews I. Introduction Humberto Moreira Rajesh Balwani Subramanyan V Dronamraju Dec 11, 2011 Problem
More information