首页> 外文学位 >Applications of Network Science to Criminal Networks, University Education, and Ecology.
【24h】

Applications of Network Science to Criminal Networks, University Education, and Ecology.

机译:网络科学在犯罪网络,大学教育和生态学中的应用。

获取原文
获取原文并翻译 | 示例

摘要

Networks are a powerful tool to investigate complex systems. In this work, we apply network--theoretic tools to study criminal, educational, and ecological systems.;First, we propose two generative network models for recruitment and disruption in a hierarchal organized crime network. Our network models alternate between recruitment and disruption phases. In our first model, we simulate recruitment as Galton--Watson branching. We simulate disruption with an agent that moves towards the root and arrests nodes in ac- cordance with a stochastic process. We prove a lower bound on the probability that the agent reaches the kingpin and verify this numerically. In our second model, we propose a network attachment mechanism to simulate recruitment. We define an attachment probability based on an existing node's distance to the leaf set (terminal nodes), where this distance is a proxy for how close a criminal is to visible illicit activity. Using numerical simulation, we study the network structures such as the degree distribution and total attachment weight associated with large networks that evolve according to this recruitment process. We then introduce a disruptive agent that moves through the network according to a self-avoiding random walk and can remove nodes (and an associated subtree) according to different disruption strate- gies. We quantify basic law enforcement incentives with these different disruption strategies and study costs and eradication probability within this model.;In our next chapter, we adapt rank aggregation methods to study how Mathematics students navigate their coursework. We first translate 15 years of grade data from the UCLA Department of Mathematics into a network whose nodes are the various Mathematics courses and whose edges encode the flow of students between these courses. Applying rank aggregation on such networks, we extract a linear sequence of courses that reflects the order students select courses. Using this methodology, we identify possible trends and hidden course dependencies without investigating the entire space of possible schedules. Specifically, we identify Mathematics courses that high--performing students take significantly earlier than low--performing students in various Mathematics majors. We also compare the extracted sequence of several rank aggregation methods on this data set and demonstrate that many methods produce similar sequences.;In our last chapter, we review core--periphery structure and analyze this structure in mu- tualistic (bipartite) fruigivore--seed networks. We first relate classical graph cut problems to previous work on core--periphery structure to provide a general mathematical framework. We also review how core--periphery structure is traditionally identified in mutualistic networks. Next, using a method from Rombach et al., we analyze the core--periphery structure of 10 mutualistic fruigivore--seed networks that encode the interaction patterns between birds and fruit--bearing plants. Our collaborators use our network analysis with other ecological data to identify important species in the observed habitats. In particular, they identify certain types of birds (mashers) that play crucial roles at a variety of sites, which are though to be less important due to their feeding behaviors.
机译:网络是研究复杂系统的强大工具。在这项工作中,我们使用网络理论工具研究犯罪,教育和生态系统。首先,我们提出了两个用于在有组织的有组织犯罪网络中进行招募和破坏的生成网络模型。我们的网络模型在招募和破坏阶段之间交替。在第一个模型中,我们将招聘模拟为高尔顿-沃森分支。我们用一种可以模拟根源的代理来模拟破坏,该代理可以根据随机过程来逮捕节点。我们证明了代理到达主销的概率的下限,并进行了数值验证。在我们的第二个模型中,我们提出了一种网络附着机制来模拟招聘。我们基于现有节点到叶子集(终端节点)的距离来定义附着概率,其中该距离是犯罪分子离可见非法活动有多近的代理。使用数值模拟,我们研究了与大型网络相关的网络结构,例如度分布和总附着权重,这些网络根据此招聘过程而发展。然后,我们引入破坏性代理,该代理根据自我避免的随机游走在网络中移动,并可以根据不同的破坏策略删除节点(和关联的子树)。我们用这些不同的干扰策略来量化基本的执法激励措施,并在此模型中研究成本和根除概率。在下一章中,我们将采用等级汇总方法来研究数学学生如何进行课程学习。我们首先将UCLA数学系的15年成绩数据转换为一个网络,该网络的节点是各种数学课程,并且其边缘编码这些课程之间的学生流。在此类网络上应用排名汇总,我们提取了一系列反映学生选择课程顺序的线性课程。使用这种方法,我们可以确定可能的趋势和隐藏的课程依存关系,而无需调查可能的时间表的整个空间。具体而言,我们确定了各个数学专业中成绩优异的学生比成绩较差的学生早得多的数学课程。我们还比较了该数据集上几种秩聚合方法的提取序列,并证明了许多方法可产生相似的序列。在上一章中,我们回顾了核心-外围结构,并在多元(二分)fruigivore-中分析了该结构。种子网络。我们首先将经典的图割问题与之前关于核-外围结构的工作联系起来,以提供一个通用的数学框架。我们还将回顾传统上如何在互惠网络中确定核心-外围结构。接下来,使用Rombach等人的方法,我们分析了10种互惠的果蝇种子网络的核心-外围结构,这些网络编码了鸟类与水果植物之间的相互作用模式。我们的合作者使用我们的网络分析和其他生态数据来识别观察到的栖息地中的重要物种。特别是,他们确定了某些类型的禽类(捣碎器)在各种场所起着至关重要的作用,但由于它们的觅食行为,它们的重要性并不那么重要。

著录项

  • 作者

    Marshak, Charles Zachary.;

  • 作者单位

    University of California, Los Angeles.;

  • 授予单位 University of California, Los Angeles.;
  • 学科 Applied mathematics.;Ecology.;Higher education.
  • 学位 Ph.D.
  • 年度 2017
  • 页码 184 p.
  • 总页数 184
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:37:45

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号