interdicting social networks

14
Interdicting Social Networks Cpt Tobias Uwe Kuhn (Lt Paul Ortiz)

Upload: odina

Post on 24-Feb-2016

22 views

Category:

Documents


0 download

DESCRIPTION

Interdicting Social Networks. Cpt Tobias Uwe Kuhn (Lt Paul Ortiz). Outline. Introduction Assumptions Defining the Model Scenarios 1 - 4 Conclusions. Introduction. Show Video. Question. http://www.casos.cs.cmu.edu/computational_tools/datasets/index.html - PowerPoint PPT Presentation

TRANSCRIPT

Interdicting Social Networks

Cpt Tobias Uwe Kuhn(Lt Paul Ortiz)

2

Outline

• Introduction• Assumptions• Defining the Model• Scenarios 1 - 4• Conclusions

3

Introduction

Show Video

4

Question

http://www.casos.cs.cmu.edu/computational_tools/datasets/index.html

How can we interdict a social network by identifying potential detainees, such that a group as big as possible is separated.

5

Assumptions

• Perfect knowledge about terrorists’ social network

• We cannot detain the ways of communication• We cannot detain bin Laden himself• We can detain everyone else (for now)

6

Defining the Model

∞AIN AOUT

1 BIN BOUT

1

XIN XOUT

1 DIN DOUT

1

CIN COUT

1

∞ ∞

∞ ∞

∞∞

A

X

B

D

C

7

Defining the Model

AIN AOUT

1 BIN BOUT

1

XIN XOUT

1 DIN DOUT

1

CIN COUT

1

∞ ∞

∞ ∞

∞∞

∞∞

1

1

s

t

s-t cut

8

First Run

Additional Constraint: Don’t use terrorist leader’s direct contacts as target nodes

9

Scenario 1: biggest possible group

Result: Detain Wadih El Hage and Mohamed Owhali separates 12 terrorists from bin Laden.

10

Scenario 2: maximal group size of 4

Result: Detain Khalfan Mohamed and Achmed Ghailani separates 4 terrorists from bin Laden.

11

Scenario 3: El Hage, Owhali save

Result: Detain Khalfan Mohamed and Achmed Ghailani separates 4 terrorists from bin Laden. (Yes, it is the same as in the previous scenario.)

12

Scenario 4: Commander briefing

• “I need to know: What are the groups we can separate and who do we have to detain for that!”

• Means all groups and detainees

Show in GAMS

13

Conclusions

• This model can be used on any social network• It gives crucial information on how to separate

groups from the leader• Further research

– Limit number of potential detainees– Add costs/probabilities of detaining a terrorist– Weighted connections– …

14

Questions?

• Other separated groups: