Application of network flow: Protecting coral reef ecosystems

Slides:



Advertisements
Similar presentations
F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Finding the Optimal Strategies in Robotic Patrolling with Adversaries in Topologically-Represented.
Advertisements

1 LP Duality Lecture 13: Feb Min-Max Theorems In bipartite graph, Maximum matching = Minimum Vertex Cover In every graph, Maximum Flow = Minimum.
Linear Programming (LP) (Chap.29)
Introduction to Graph “theory”
Inspection Planning for Sensor Coverage of 3d Marine Structures Brendan Englot and Franz Hover Presented by Arvind Pereira for the CS599 Class on Sequential.
Interconnect Estimation without Packing via ACG Floorplans Jia Wang and Hai Zhou Electrical & Computer Engineering Northwestern University U.S.A.
Optimal Sleep-Wakeup Algorithms for Barriers of Wireless Sensors S. Kumar, T. Lai, M. Posner and P. Sinha, BROADNETS ’ 2007.
Mobility Improves Coverage of Sensor Networks Benyuan Liu*, Peter Brass, Olivier Dousse, Philippe Nain, Don Towsley * Department of Computer Science University.
Duality Lecture 10: Feb 9. Min-Max theorems In bipartite graph, Maximum matching = Minimum Vertex Cover In every graph, Maximum Flow = Minimum Cut Both.
Nash Equilibria in Competitive Societies Eyal Rozenberg Roy Fox.
Shortest Path Problems
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Towards Modelling Information Security with Key-Challenge Petri Nets Teijo Venäläinen
Computing Equilibria in Electricity Markets Tony Downward Andy Philpott Golbon Zakeri University of Auckland.
15.082J and 6.855J and ESD.78J November 2, 2010 Network Flow Duality and Applications of Network Flows.
Package Transportation Scheduling Albert Lee Robert Z. Lee.
1 Adding & Subtracting Fractions and Mixed Numbers MATH.
Introduction to Operations Research
CS774. Markov Random Field : Theory and Application Lecture 13 Kyomin Jung KAIST Oct
The Power of the Defender M. Gelastou  M. Mavronicolas  V. Papadopoulou  A. Philippou  P. Spirakis §  University of Cyprus, Cyprus § University of.
Presenter: Jen Hua Chi Adviser: Yeong Sung Lin Network Games with Many Attackers and Defenders.
“Graph theory” for the master degree program “Geographic Information Systems” Yulia Burkatovskaya Department of Computer Engineering Associate professor.
Introduction A GENERAL MODEL OF SYSTEM OPTIMIZATION.
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
Patrolling Games Katerina Papadaki London School of Economics with Alec Morton and Steven Alpern.
Evaluating Network Security with Two-Layer Attack Graphs Anming Xie Zhuhua Cai Cong Tang Jianbin Hu Zhong Chen ACSAC (Dec., 2009) 2010/6/151.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Game-theoretic Resource Allocation for Protecting Large Public Events Yue Yin 1, Bo An 2, Manish Jain 3 1 Institute of Computing Technology, Chinese Academy.
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD),
Slides for “Data Mining” by I. H. Witten and E. Frank.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
Comp. Genomics Recitation 10 Clustering and analysis of microarrays.
1 a1a1 A1A1 a2a2 a3a3 A2A Mixed Strategies When there is no saddle point: We’ll think of playing the game repeatedly. We continue to assume that.
Vasilis Syrgkanis Cornell University
MAIN RESULT: We assume utility exhibits strategic complementarities. We show: Membership in larger k-core implies higher actions in equilibrium Higher.
TU/e Algorithms (2IL15) – Lecture 12 1 Linear Programming.
Introduction to Multiple-multicast Routing Chu-Fu Wang.
Balanced Billing Cycles and Vehicle Routing of Meter Readers by Chris Groër, Bruce Golden, Edward Wasil University of Maryland, College Park American University,
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Approximation Algorithms based on linear programming.
::Network Optimization:: Minimum Spanning Trees and Clustering Taufik Djatna, Dr.Eng. 1.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
TRUSTS Scheduling Randomized Patrols for Fare Inspection in Transit Systems.
Satisfaction Games in Graphical Multi-resource Allocation
C. Kiekintveld et al., AAMAS 2009 (USC) Presented by Neal Gupta
CSPs: Search and Arc Consistency Computer Science cpsc322, Lecture 12
Advanced Wireless Networks
Non-additive Security Games
CSPs: Search and Arc Consistency Computer Science cpsc322, Lecture 12
The minimum cost flow problem
Results for p = 0.1 Graphs at different values of Call Arrival Rate for Call Blocking Probability (in %) System Utilization (Efficiency) (in %) Average.
WALLACE RESOURCE LIBRARY
Abstraction Transformation & Heuristics
Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security Fang et al.
Artificial Intelligence
When Security Games Go Green
Systems of Inequalities
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Network Flow 2016/04/12.
3-3 Optimization with Linear Programming
Artificial Intelligence
Network Formation Games
Solution: Assume
Minimum Spanning Trees
Design of Networks based on multiple rings
Chapter 6 Network Flow Models.
Maximum Flow Neil Tang 4/8/2008
Normal Form (Matrix) Games
Complexity Theory: Foundations
Presentation transcript:

Application of network flow: Protecting coral reef ecosystems

Coral Reef Ecosystems Coral reefs are threatened by human activities The Great Barrier Reef Marine Park Coral reefs are threatened by human activities Marine protected areas (MPAs) are built to protect them

Challenges in Patrolling MPA Limited resources v.s. Large open water e.g.,Yalongwan MPA, 3 patrol boats v.s. 85km2 30m 85km2

Challenges in Patrolling MPA Limited resources v.s. Large open water e.g.,Yalongwan MPA, 3 patrol boats v.s. 85km2 Dynamic value of different zones Different zones have different values Value of a zone changes over time

Challenges in Patrolling MPA Limited resources v.s. Large open water e.g.,Yalongwan MPA, 3 patrol boats v.s. 85km2 Dynamic value of different zones Different zones have different values Value of a zone changes over time When the marine creatures move, values of zones change.

Challenges in Patrolling MPA Limited resources v.s. Large open water e.g.,Yalongwan MPA, 3 patrol boats v.s. 85km2 Dynamic value of different zones Different zones have different values Value of a zone changes over time Complicated strategy space Defender strategy: time and path to patrol Attacker strategy: time and path to get to the target zone, time duration of attack in the target zone Strategic attacker Observe,analyze, and respond

Challenges in Patrolling MPA Limited resources v.s. Large open water e.g.,Yalongwan MPA, 3 patrol boats v.s. 85km2 Dynamic value of different zones Different zones have different values Value of a zone changes over time Complicated strategy space Time, path, durations Strategic attacker Observe,analyze, and respond Problem: How to design the most efficient patrol strategy?

Each node in the MPA is a potential attack target Model: MPA graph a a b c b c Marine protected area MPA graph Each node in the MPA is a potential attack target

Model: Transition graph Time: <8am, 9am, 10am> ; Travel time between zones: 1hour a a,8 a,9 a,10 b,8 b,9 b,10 c,8 c,9 c,10 t s b c From MPA graph to transition graph, we have a better view of time-dependent paths and varying values of zones. Assume that defender’s patrol begins at 8am and ends at 10am. Add a virtual starting zone and a virtual terminal zone, an s-t flow is a feasible patrol path. The above figure shows an example: patrol begins at 8am at zone a, the defender immediately travels from zone a to zone b at 8am, and arrives at zone b at 9am. Then the defender stays at zone b and patrols this zone during 9am and 10am. Assume that the defender has m resources, a pure strategy of the defender includes m patrol paths. A mixed strategy of the defender is a distribution over pure strategies, i.e., the probability that each pure strategy (m patrol paths) is used. We can prove that a mixed strategy of the defender is equivalent to an m-unit s-t fractional flow. The flow coverage on each edge indicates the expected number of resources on this edge. MPA graph Transition graph Defender’s mixed strategies: Net flow (The probability of covering each edge)

Probability of being caught: Model: Payoffs Each edge has: A detection factor, probability that the attacker is detected by the defender if they are at the same zone during the same period Each horizontal edge also has: Probability of being caught: 0.2*0.3 + 0.3*0.4 =0.18 A value, damage caused by attacking a zone in a period a,8 a,9 b,9 c,9 a,10 For the attacker, any path in the graph is a feasible attack path. However, since the attacker needs to stay in a zone to perform illegal activities, only paths ending with horizontal edges can lead to positive utilities. Given a defender’s mixed strategy and an attacker’s pure strategy, the utility of the attacker depends on the probability that the attacker is caught, and the value of the attacker’s activities. Given a mixed strategy of the defender, which corresponds to a network flow as is shown by ‘cov’ in the figure. Also given an attack path, we can compute the expected utility of the attacker and the defender. We assume that the probability of being caught is the sum of the probability of being caught on every edge of the attacker’s path (capped by 1). This is only an approximation to simplify the computation. Attacker’s payoff: 5*(1 – 0.18) = 4.1 cov: 0.3 dec: 0.4 val: 5 b,8 b,10 cov: 0.2 dec: 0.3 Defender’s payoff: -4.1 c,8 c,10

Computing the equilibrium Defender commits to a mixed strategy first c = <ce>, the expected number of resources on edge e Attacker knows the defender’s mixed strategy and responds the best The attacker’s best response is always a pure strategy, i.e., a path Y is any feasible attacker strategy. This inequality ensures that the attacker chooses he best response given the defender’s mixed strategy c. Together with the objective, we compute the optimal defender strategy given the attacker’s best response. U(Y) is the sum of the values of the ending horizontal edges of path Y. f_e is the detection factor of an edge. m-unit s-t fractional flow

Expand the model Starting zones and ending zones of paths Maximum continuous patrol time Constraints More virtual starting points and ending points Maximum path length Solutions