von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 088 01 - Diskussion Zuletzt bearbeitet: 2012-05-07 16:24:15 Hindemith | CNS 2002, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 88, Zeilen: 1-20 |
Quelle: CNS_2002 Seite(n): 18, 105, Zeilen: 105:23-29; 18:18-21;23-24 |
---|---|
[In this] system authors compared results of low alert states to known influenza epidemics and to data containing emergency room visits, pharmacy purchases and absenteeism. Although the peak incidence of the simulated outbreak is larger than the peak incidence seen in the population data, the simulation results are temporally similar to those seen in the population data. They hoped that this simulation framework will allow them to ask ‘what-if’ questions regarding appropriate response and detection strategies for both natural and man-made epidemics. This is a city scale multi-agent model of weaponized bioterrorist attacks for intelligence and training. At present the model is running with 100,000 agents (this number will be increased). All agents have real social networks and the model contains real city data -hospitals, schools etc. Agents are as realistic as possible and contain a cognitive model.
|
[page 105]
We have compared results of low alert states to known influenza epidemics and to data containing emergency room visits, pharmacy purchases and absenteeism. Although the peak incidence of the simulated outbreak is larger than the peak incidence seen in the population data, the simulation results are temporally similar to those seen in the population data. [...]. It is hoped that this simulation framework will allow us to ask ‘what-if’ questions regarding appropriate response and detection strategies for both natural and man-made epidemics. [page 18] this is a cityscale multi-agent model of weaponized bioterrorist attacks for intelligence and training. At present the model is running with 100,000 agents (this number will be increased). All agents have real social networks and the model contains real city data - hospitals, schools etc. Agents are as realistic as possible and contain a cognitive model. [...] DYNET – Dynamic Networks. The team is building a model of how networks adapt, evolve and change in response to various types of attacks e.g. infowar or assassination |
No source given |
|
[2.] Nm/Fragment 088 21 - Diskussion Zuletzt bearbeitet: 2012-05-11 21:03:43 WiseWoman | Dombroski Carley 2002, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 88, Zeilen: 21-33 |
Quelle: Dombroski Carley 2002 Seite(n): 1, Zeilen: 14-24 |
---|---|
NETEST – It is based on the combination of multi-agent technology with hierarchical Bayesian inference models and biased net models to produce accurate posterior network representations. Bayesian inference models produce representations of a network’s structure and informant accuracy by combining prior network and accuracy data with informant perceptions of a network. Biased net theory examines and captures the biases that may be present within a specific network or group of networks. NETEST provides functionalities to estimate a network’s size, determine its membership and structure, determine areas of the network where data is missing, perform cost and benefit analysis of additional information, assess group level capabilities [embedded in the network, and pose “what if” scenarios to destabilize a network and predict its evolution over time.] | NETEST is a tool that combines multiagent technology with hierarchical Bayesian inference models and biased net models to produce accurate posterior representations of a network. Bayesian inference models produce representations of a network’s structure and informant accuracy by combining prior network and accuracy data with informant perceptions of a network. Biased net theory examines and captures the biases that may exist in a specific network or set of networks. Using NETEST, an investigator has the power to estimate a network’s size, determine its membership and structure, determine areas of the network where data is missing, perform cost/benefit analysis of additional information, assess group level capabilities embedded in the network, and pose “what if” scenarios to destabilize a network and predict its evolution over time. |
The source is given in the bibliography, but nowhere close to this text fragment. |
|
Letzte Bearbeitung dieser Seite: durch Benutzer:WiseWoman, Zeitstempel: 20120511210550