Publications

Results 1–25 of 32
Skip to search filters

Detecting Communities and Attributing Purpose to Human Mobility Data

Proceedings - Winter Simulation Conference

John, Esther W.; Cauthen, Katherine R.; Brown, Nathanael J.; Nozick, Linda K.

Many individuals' mobility can be characterized by strong patterns of regular movements and is influenced by social relationships. Social networks are also often organized into overlapping communities which are associated in time or space. We develop a model that can generate the structure of a social network and attribute purpose to individuals' movements, based solely on records of individuals' locations over time. This model distinguishes the attributed purpose of check-ins based on temporal and spatial patterns in check-in data. Because a location-based social network dataset with authoritative ground-truth to test our entire model does not exist, we generate large scale datasets containing social networks and individual check-in data to test our model. We find that our model reliably assigns community purpose to social check-in data, and is robust over a variety of different situations.

More Details

A Complex Systems Approach to More Resilient Multi-Layered Security Systems

Jones, Katherine A.; Bandlow, Alisa B.; Waddell, Lucas W.; Nozick, Linda K.; Levin, Drew L.; Brown, Nathanael J.

In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for a performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (PI) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.

More Details

Risk Evaluation for Identification and Intervention in Dual Use Research of Concern (DURC) for International Biological R&D Activity

Jones, Katherine A.; DeMenno, Mercy D.; Hoffman, Matthew J.; Pierson, Adam J.; Nozick, Linda K.; Gearhart, Jared L.; Meyer, Lozanne M.; Caskey, Susan A.; Astuto Gribble, Lisa A.; Lopez, Elizabeth L.; Arguello, Bryan A.

This report summarizes the work performed as part of a Laboratory Directed Research and Development project focused on evaluating and mitigating risk associated with biological dual use research of concern. The academic and scientific community has identified the funding stage as the appropriate place to intervene and mitigate risk, so the framework developed here uses a portfolio-level approach and balances biosafety and biosecurity risks, anticipated project benefits, and available mitigations to identify the best available investment strategies subject to cost constraints. The modeling toolkit was designed for decision analysis for dual use research of concern, but is flexible enough to support a wide variety of portfolio-level funding decisions where risk/benefit tradeoffs are involved. Two mathematical optimization models with two solution methods are included to accommodate stakeholders with varying levels of certainty about priorities between metrics. An example case study is presented.

More Details

Multi-layered security investment optimization using a simulation embedded within a genetic algorithm

Proceedings - Winter Simulation Conference

Brown, Nathanael J.; Jones, Katherine A.; Nozick, Linda K.; Xu, Ningxiong

The performance of a multi-layered security system, such as those protecting high-value facilities or critical infrastructures, is characterized using several different attributes including detection and interruption probabilities, costs, and false/nuisance alarm rates. The multitude of technology options, alternative locations and configurations for those technologies, threats to the system, and resource considerations that must be weighed make exhaustive evaluation of all possible architectures extremely difficult. This paper presents an optimization model and a computationally efficient solution procedure to identify an estimated frontier of system configuration options which represent the best design choices for the user when there is uncertainty in the response time of the security force, once an intrusion has been detected. A representative example is described.

More Details

Estimation of an origin-destination table for U.S. imports of waterborne containerized freight

Transportation Research Record

Wang, Hao; Gearhart, Jared L.; Jones, Katherine A.; Frazier, Christopher R.; Nozick, Linda K.; Levine, Brian; Jones, Dean A.

This paper presents a probabilistic origin-destination table for waterborne containerized imports. The analysis makes use of 2012 Port Import/Export Reporting Service data, 2012 Surface Transportation Board waybill data, a gravity model, and information on the landside transportation mode split associated with specifc ports. This analysis suggests that about 70% of the origin-destination table entries have a coeffcient of variation of less than 20%. This 70% of entries is associated with about 78% of the total volume. This analysis also makes evident the importance of rail interchange points in Chicago, Illinois; Memphis, Tennessee; Dallas, Texas; and Kansas City, Missouri, in supporting the transportation of containerized goods from Asia through West Coast ports to the eastern United States.

More Details
Results 1–25 of 32
Results 1–25 of 32