Interdicting Networks to Competitively Minimize Evasion with Synergy Between Applied Resources

Similar documents
Given a directed graph G =(N A), where N is a set of m nodes and A. destination node, implying a direction for ow to follow. Arcs have limitations

BMBF Project ROBUKOM: Robust Communication Networks

Seminar - Organic Computing

Introduction to Simulation

Lecture 1: Machine Learning Basics

JONATHAN H. WRIGHT Department of Economics, Johns Hopkins University, 3400 N. Charles St., Baltimore MD (410)

The Strong Minimalist Thesis and Bounded Optimality

Math 1313 Section 2.1 Example 2: Given the following Linear Program, Determine the vertices of the feasible set. Subject to:

University of Groningen. Systemen, planning, netwerken Bosman, Aart

CS Machine Learning

A Stochastic Model for the Vocabulary Explosion

Software Maintenance

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

An Effective Framework for Fast Expert Mining in Collaboration Networks: A Group-Oriented and Cost-Based Method

BADM 641 (sec. 7D1) (on-line) Decision Analysis August 16 October 6, 2017 CRN: 83777

Team Formation for Generalized Tasks in Expertise Social Networks

Artificial Neural Networks written examination

DOCTOR OF PHILOSOPHY HANDBOOK

Pragmatic Use Case Writing

Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models

The use of mathematical programming with artificial intelligence and expert systems

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Generative models and adversarial training

Massachusetts Institute of Technology Tel: Massachusetts Avenue Room 32-D558 MA 02139

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC

GDP Falls as MBA Rises?

TIMSS ADVANCED 2015 USER GUIDE FOR THE INTERNATIONAL DATABASE. Pierre Foy

Laboratorio di Intelligenza Artificiale e Robotica

TABLE OF CONTENTS TABLE OF CONTENTS COVER PAGE HALAMAN PENGESAHAN PERNYATAAN NASKAH SOAL TUGAS AKHIR ACKNOWLEDGEMENT FOREWORD

Georgetown University School of Continuing Studies Master of Professional Studies in Human Resources Management Course Syllabus Summer 2014

An Introduction to the Minimalist Program

Running head: DUAL MEMORY 1. A Dual Memory Theory of the Testing Effect. Timothy C. Rickard. Steven C. Pan. University of California, San Diego

Lecture 10: Reinforcement Learning

Towards a Robuster Interpretive Parsing

An Introduction to Simulation Optimization

The Good Judgment Project: A large scale test of different methods of combining expert predictions

Machine Learning and Data Mining. Ensembles of Learners. Prof. Alexander Ihler

A Reinforcement Learning Variant for Control Scheduling

An Introduction to Simio for Beginners

Regret-based Reward Elicitation for Markov Decision Processes

Australian Journal of Basic and Applied Sciences

On-Line Data Analytics

ME 443/643 Design Techniques in Mechanical Engineering. Lecture 1: Introduction

Python Machine Learning

Executive Guide to Simulation for Health

MKTG 611- Marketing Management The Wharton School, University of Pennsylvania Fall 2016

Probabilistic Latent Semantic Analysis

Grade Dropping, Strategic Behavior, and Student Satisficing

Human Emotion Recognition From Speech

Knowledge based expert systems D H A N A N J A Y K A L B A N D E

P. Belsis, C. Sgouropoulou, K. Sfikas, G. Pantziou, C. Skourlas, J. Varnas

ISFA2008U_120 A SCHEDULING REINFORCEMENT LEARNING ALGORITHM

Softprop: Softmax Neural Network Backpropagation Learning

(Sub)Gradient Descent

Beyond the Pipeline: Discrete Optimization in NLP

A Game-based Assessment of Children s Choices to Seek Feedback and to Revise

Development of Multistage Tests based on Teacher Ratings

Three Strategies for Open Source Deployment: Substitution, Innovation, and Knowledge Reuse

A comparative study on cost-sharing in higher education Using the case study approach to contribute to evidence-based policy

Rule-based Expert Systems

Calibration of Confidence Measures in Speech Recognition

College Pricing. Ben Johnson. April 30, Abstract. Colleges in the United States price discriminate based on student characteristics

I N T E R P R E T H O G A N D E V E L O P HOGAN BUSINESS REASONING INVENTORY. Report for: Martina Mustermann ID: HC Date: May 02, 2017

Visit us at:

Transfer Learning Action Models by Measuring the Similarity of Different Domains

ENME 605 Advanced Control Systems, Fall 2015 Department of Mechanical Engineering

STA 225: Introductory Statistics (CT)

Document number: 2013/ Programs Committee 6/2014 (July) Agenda Item 42.0 Bachelor of Engineering with Honours in Software Engineering

Fragment Analysis and Test Case Generation using F- Measure for Adaptive Random Testing and Partitioned Block based Adaptive Random Testing

Requirements-Gathering Collaborative Networks in Distributed Software Projects

Results In. Planning Questions. Tony Frontier Five Levers to Improve Learning 1

Probability and Game Theory Course Syllabus

Major Milestones, Team Activities, and Individual Deliverables

Progress Monitoring for Behavior: Data Collection Methods & Procedures

Program Change Proposal:

Maximizing Learning Through Course Alignment and Experience with Different Types of Knowledge

Higher Education Six-Year Plans

SARDNET: A Self-Organizing Feature Map for Sequences

A simulated annealing and hill-climbing algorithm for the traveling tournament problem

Liquid Narrative Group Technical Report Number

MGT/MGP/MGB 261: Investment Analysis

College Pricing and Income Inequality

STUDENT LEARNING ASSESSMENT REPORT

A Pipelined Approach for Iterative Software Process Model

Introduction to Modeling and Simulation. Conceptual Modeling. OSMAN BALCI Professor

Abstractions and the Brain

AN EXAMPLE OF THE GOMORY CUTTING PLANE ALGORITHM. max z = 3x 1 + 4x 2. 3x 1 x x x x N 2

Laboratorio di Intelligenza Artificiale e Robotica

AUTOMATIC DETECTION OF PROLONGED FRICATIVE PHONEMES WITH THE HIDDEN MARKOV MODELS APPROACH 1. INTRODUCTION

MSW POLICY, PLANNING & ADMINISTRATION (PP&A) CONCENTRATION

CHAPTER 4: REIMBURSEMENT STRATEGIES 24

Learning and Transferring Relational Instance-Based Policies

Motivation to e-learn within organizational settings: What is it and how could it be measured?

Clouds = Heavy Sidewalk = Wet. davinci V2.1 alpha3

Evolutive Neural Net Fuzzy Filtering: Basic Description

Lecture 2: Quantifiers and Approximation

On the Polynomial Degree of Minterm-Cyclic Functions

COMPUTATIONAL COMPLEXITY OF LEFT-ASSOCIATIVE GRAMMAR

Testing A Moving Target: How Do We Test Machine Learning Systems? Peter Varhol Technology Strategy Research, USA

Transcription:

Interdicting Networks to Competitively Minimize Evasion with Synergy Between Applied Resources Brian J. Lunday 1 Hanif D. Sherali 2 1 Department of Mathematical Sciences, United States Military Academy at West Point 2 Grado Department of Industrial and Systems Engineering, Virginia Polytechnic Institute and State University INFORMS Annual Conference November 10, 2010 Acknowledgements: Dr. Nick Sahinidis of the Sahinidis-Optimization Group at CMU Omar Nelson Bradley Officer Research Fellowship in Mathematics 1/10

Motivation from Applied Problems Network interdiction During a military deployment by one author to Iraq, US and Iraqi Security Forces periodically conducted missions to physically interdict (detect) a single evader transiting a network: 1. Kidnapping and transport of a reporter for the Christian Science Monitor, Jan 2006 2. Capture and transport of a US Soldier, Oct/Nov 2006 3. *Transport of detainees between local and long-term detention facilities 4. *Transport of a detainee for testimony Synergy US and Iraqi forces had different capabilities that manifest superadditive synergy when utilized in local, combined operations Resource utilization Overt is highly visible, but allows for synergy Covert has a reduced signature, but often forgoes synergistic employment 2/10

Purpose and Scope of Research Examine the competitive probability of evasion problem (CPEP) with multiple resources, considering (1) no synergy, (2) linear synergy, (3) concave nonlinear synergy, and (4) a combined strategy with subsequent overt and covert resource deployments 0.2 Maximum (synergy on arc (i,a) 0.15 0.1 0.05 0 0 0.1 0.2 0.3 0.4 min k p k (probability of detection on arc (i,a by resource kk) Develop effective solution procedures Conduct theoretical and empirical comparison of strategies and develop insights, as appropriate 3/10

Overt Deployment Strategies and Models Objective: minimize the maximum probability of evasion Assumptions Known source and terminus nodes Evader will send one unit of flow across the network Resource types (kk) constrained by availability (R k ) Probabilities of detection on arcs are independent and cumulative Model r k : the amount of resource k allocated to overtly detect an evader on arc (i,, based on the cost of certain detection (c k ) Given values for r k, (i,a, kk, the additional probability of detection due to to synergy takes the form Problem CPEP: Problem CPEP-LS: Problem CPEP-NLS: 0, i, j A r k f, i, j A, k K c k 10 r g e k c 1 k, i, j A, k K 4/10

Covert Deployment Strategies and Models Objective: minimize the maximum probability of evasion Given Solution to Problem CPEP using subset of resource types to attain probabilities of evasion (p *) on arc (i, Subset of resource types for covert deployment r k : the amount of resource k allocated to covertly detect an evader on arc (i,, based on the cost of certain detection (c k ) Models Post-CPEP 1 (Revealed path) Motivation: directed intelligence collection and tactical patience Evader reveals the selection of a path through network after deployment of overt resources, allowing concentration of covert resources Post-CPEP (Unrevealed path) Evader is assumed to traverse any one of the paths having a maximal probability of evasion in the optimal solution to Problem CPEP 5/10

Solution Procedure Development CPEP, CPEP-LS, CPEP-NLS, Post-CPEP Resulting objective function Path-restricted reformulations Formulations allow commercial solver application, although cumbersome, given our network topography 3 x 3 49 directed acyclic paths 4 x 4 1000 directed acyclic paths 5 x 5 28,561 directed acyclic paths m x n L (3m) (n-1) paths Post-CPEP 1 with path denoted by (i,a* Proposition: One covert resource type optimal solution allocates resource to the most critical arc, defined by ( i, arg min ( i, A* min max r, p, More than one covert resource type Requires optimization of model p min * r, p c x 1 x px ( i, A P; s. t. P s ( i, l p, l L Non-interdictable arcs Interdictable arcs t 6/10

Covert Strategy Testing and Comparison Testing parameters 30 instances on a 3x3 network 2 resources: 1 overtly deployed and 1 deployed based on the strategy Detection costs correlated across resource types Solved with BARON Covert Strategy Modeled Revealed Path Integer-restricted Resource Applications Avg. Relative Gap (%) from Optimal Solns to: CPEP CPEP-LS CPEP-NLS 1 6.32E-07 11.32 25.94 2 X -59.13-51.71-48.16 3 X -92.68-89.09-91.88 4 X X -90.80-90.24-90.08 Relative optimality gaps Increased with greater relative availability of covert resource Increased in magnitude with greater total of both resources Strategy-specific computational results: 1. Never superior to an overt strategy 2. Average 61.85% reduction in the number of paths to be considered for covert resource application 3. Never inferior to an overt strategy 4. Never inferior to an overt strategy 7/10

Revealed Optimal Evader Path Theoretical Results For non-integer and integer-restricted resource applications: Proposition: In the presence of synergy, an overt strategy can yield a strictly better solution than a covert strategy based on a revealed evader path. Proposition: Without synergy, an overt strategy is never better than a covert strategy on a network having disjoint paths, each exhibiting the Monotone Allocation Property (MAP) MAP: probability of evasion on each path is monotonically decreasing with respect to the total resources assigned. Some demonstrated conditions for MAP: 1) c c, ( i, A, k K 2) c, ( i, A, k K k k k 8/10

Conclusions and Recommendations Results Novel formulations to represent alternative interdictor resource deployment strategies Identification of conditions preferable for deployment of resources covertly Future Research Sociological research on the forms of superadditive synergy between groups/agencies Consider the validity of alternate probability-resource and synergy-resource relationships that affect a convex program for CPEP and its variants Allow for fuzzy perceptions of interdicted network states by evader 9/10

References Bayrak, H., and Baily, M. (2008). Shortest Path Network Interdiction with Asymmetric Information. Networks, 52 (3), 133 140. Brown, S. S. (1980). Optimal Search for a Moving Target in Discrete Time and Space. Operations Research, 28 (6), 1275 1289. Brown, G., Carlyle, M., Salmerón, J., and Wood, R. K. (2006). Defending Critical Infrastructure. Interfaces, 36 (6), 530 544. Cormican, K. J. (1995). Computational Methods for Deterministic and Stochastic Network Interdiction Problems. Master's Thesis, US Naval Postgraduate School, Monterey, CA. Fulkerson, D. R., and Harding, G. C. (1977). Maximizing the Minimum Source-Sink Path Subject to a Budget Constraint. Mathematical Programming, 13 (1), 116 118. Israeli, E., and Wood, R. K. (2002). Shortest-Path Network Interdiction. Networks, 40 (2), 97 111. Koopman, B. O. (1979). Search and Its Optimization. The American Mathematical Monthly, 86, 527 540. Lunday, B. J., and Sherali, H. D. (2009). Network Flow Interdiction Models and Algorithms with Resource Synergy Considerations. Manuscript, Grado Department of Industrial and Systems Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA. Napier, R. W., and Gershenfeld, M. K. (1993). Groups: Theory and Experiences. Boston, MA: Houghton Mifflin Company. Osborne, M. J. (2004). An Introduction to Game Theory. New York, NY: Oxford University Press. Pan, F., Charlton, W. S., and Morton, D. P. (2003). A Stochastic Program for Interdicting Smuggled Nuclear Material. In D. L. Woodruff (Ed.), Network Interdiction and Stochastic Integer Programming (pp. 1 19). Norwell, MA: Kluwer Academic Publishers. von Eye, A., Schuster, C., and Rogers, W. M. (1998). Modelling Synergy using Manifest Categorical Variables. International Journal of Behavioral Development, 22 (3), 537 557. Washburn, A., and Wood, R. K. (1995). Two-Person Zero-Sum Games for Network Interdiction. Operations Research, 43 (2), 243 251. 10/10