A Double Oracle Algorithm for Zero-Sum Security Games. Graphs, Manish Jain, Dmytro Korzhyk, Ondřej Vaněk, Vincent Conitzer,

Size: px
Start display at page:

Download "A Double Oracle Algorithm for Zero-Sum Security Games. Graphs, Manish Jain, Dmytro Korzhyk, Ondřej Vaněk, Vincent Conitzer,"

Transcription

1 A Double Oracle Algorithm for Zero-Sum Security Game on Graph Manih Jain, Dmytro Korzhyk, Ondřej Vaněk +, Vincent Conitzer, Michal Pěchouček +, Milind Tambe Computer Science Department, Univerity of Southern California, Lo Angele, CA Department of Computer Science, Duke Univerity, Durham, NC Department of Cybernetic, Czech Technical Univerity, Prague. Czech Republic. ABSTRACT In repone to the Mumbai attack of 2008, the Mumbai police have tarted to chedule a limited number of inpection checkpoint on the road network throughout the city. Algorithm for imilar ecurity-related cheduling problem have been propoed in recent literature, but ecurity cheduling in networked domain when target have varying importance remain an open problem at large. In thi paper, we cat the network ecurity problem a an attackerdefender zero-um game. The trategy pace for both player are eponentially large, o thi require the development of novel, calable technique. We firt how that eiting algorithm for approimate olution can be arbitrarily bad in general etting. We preent RUGGED (Randomization in Urban Graph by Generating trategie for Enemy and Defender), the firt calable optimal olution technique for uch network ecurity game. Our technique i baed on a double oracle approach and thu doe not require the enumeration of the entire trategy pace for either of the player. It cale up to realitic problem ize, a i hown by our evaluation of map of outhern Mumbai obtained from GIS data. Categorie and Subject Decriptor I.2.11 [Artificial Intelligence]: Ditributed Artificial Intelligence General Term Algorithm, Security, Performance Keyword Game theory, Double oracle, Zero-um game, Minima equilibrium 1. INTRODUCTION Securing urban city network, tranportation network, computer network and other critical infratructure i a large and growing Cite a: A Double Oracle Algorithm for Zero-Sum Security Game on Graph, Manih Jain, Dmytro Korzhyk, Ondřej Vaněk, Vincent Conitzer, Michal Pěchouček, Milind Tambe, Proc. of 10th Int. Conf. on Autonomou Agent and Multiagent Sytem (AAMAS 2011), Tumer, Yolum, Sonenberg and Stone (ed.), May, 2 6, 2011, Taipei, Taiwan, pp Copyright c 2011, International Foundation for Autonomou Agent and Multiagent Sytem ( All right reerved. area of concern. The key challenge faced in thee domain i to effectively chedule a limited number of reource to protect againt an intelligent and adaptive attacker. For eample, a police force ha limited peronnel to patrol, operate checkpoint, or conduct earche. The adverarial apect poe ignificant challenge for the reource allocation problem. An intelligent attacker may oberve the trategy of the defender, and then plan more effective attack. Predictable cheduling of defender reource can be eploited by the attacker. Randomization ha thu been ued to keep attacker at bay by increaing the uncertainty they face. Game theory offer a principled way of achieving effective randomization. It model the varying preference of both the defender and the attacker, and allow u to olve for optimal trategie. Recent work ha alo ued and deployed game-theoretic technique in real-world attacker-defender cenario, for eample, ARMOR [13] and IRIS [10]. In thi paper, we model an urban network ecurity problem a a game with two player: the defender and the attacker. The pure trategie of the defender correpond to allocation of reource to edge in the network for eample, an allocation of police checkpoint to road in the city. The pure trategie of the attacker correpond to path from any ource node to any target node for eample, a path from a landing pot on the coat to the airport. The trategy pace of the defender grow eponentially with the number of available reource, wherea the trategy pace of the attacker grow eponentially with the ize of the network. For eample, in a fully connected graph with 20 node and 190 edge, the number of defender action for only 5 reource i ( ) billion, while the number of poible attacker path without any cycle i Real-world network are ignificantly larger, e.g., a implified graph repreenting the road network in outhern Mumbai ha more than 250 node (interection) and 600 edge (treet), and the ecurity force can deploy ten of reource. We model the cenario a a zero-um game, where the attacker get a poitive payoff in cae of a ucceful attack and 0 otherwie, and the payoff to the defender i the negative of the attacker payoff. Our goal i to find a minima trategy for the defender, that i, a trategy that minimize the maimum epected utility that the attacker can obtain. 1 The etremely large ize of the game 1 Becaue in thi work, we aume the game to be zero-um, a minima trategy i equivalent to a Stackelberg trategy (where the defender find the optimal mied trategy to commit to); moreover, via von Neumann minima theorem [12] (or linear programming duality), minima trategie alo correpond eactly to Nah equi- 327

2 inhibit the direct application of tandard method for finding minima trategie. Thu, we propoe a double-oracle baed approach that doe not require the e-ante enumeration of all pure trategie for either of the player. We propoe algorithm for both the defender and the attacker oracle problem, which are ued iteratively to provide pure-trategy bet repone for both player. While we preent NP-hardne proof for the oracle problem for both player, the entire approach remain calable in practice, a i hown in our eperiment. We alo provide eperimental reult on real-city network, pecifically on graph obtained from the GIS data of outhern Mumbai. The graph repreentation of outhern Mumbai ha 250 node and 600 edge. The placement of ource and target in the eperiment wa inpired by the Mumbai 2008 attack where the target were important economic and political center and the ource were placed along the coat line. Our eperimental reult how that thi problem remain etremely difficult to olve. While we how the previou approimation method to not be ready for deployment, our own technique will need to be enhanced further for real deployment in the city of Mumbai. We believe the problem remain within reach, and i clearly an eciting and important area for continued reearch. 2. RELATED WORK Game theory ha been applied to a wide range of problem where one player the evader trie to minimize the probability of detection by and/or encounter with the other player the patroller; the patroller want to thwart the evader plan by detecting and/or capturing him. The formalization of thi problem led to a family of game, often called puruit-evaion game [1]. A there are many potential application of thi general idea, more pecialized game type have been introduced, e.g., hider-eeker game [7, 9] and infiltration game [2] with mobile patroller and mobile evader; earch game [8] with mobile patroller and immobile evader; and ambuh game [14] with the mobility capabilitie revered. In the game model propoed in thi paper, the evader i mobile wherea the patroller i not, jut like in ambuh game. However, in contrat with ambuh game, we conider target (termed detination in ambuh game) of varying importance. Our game model i mot imilar to that of interdiction game [17], where the evading player the attacker move on an arbitrary graph from one of the origin to one of the detination (aka. target); and the interdicting player the defender inpect one or more edge in the graph in order to detect the attacker and prevent him from reaching the target. A oppoed to interdiction game, we do not conider the detection probability on edge, but we allow different value to be aigned to the target, which i crucial for real-world application. Recent work ha alo conidered cheduling multiple-defender reource uing cooperative game-theory, a in path diruption game [3], where the attacker trie to reach a ingle known target. In contrat with the tatic aet protection problem [6], we attribute different importance to individual target and unlike it dynamic variant [6], we conider only tatic target poition. Recent work in ecurity game and robotic patrolling [4, 10] ha focued on concrete application. However, they have not conidered the cale-up for both defender and attacker trategie. For eample, in ASPEN, the attacker pure trategy pace i polynomially large, ince the attacker i not following any path and jut chooe eactly one target to attack. Our game model wa introduced by Tai et al. [15]; librium trategie. For a dicuion of the relationhip among thee concept in ecurity game, which include zero-um game, ee Yin et al. [18]. however, their approimate olution technique can be uboptimal. We dicu the hortcoming of their approach in Section 4, and provide an optimal olution algorithm for the general cae. Technique ued by RUGGED are baed on a double oracle approach, a propoed by McMahan et al. [11] (correponding eactly to the notion of contraint and column generation in linear programming). Thi technique i intended to olve large-cale game, and i epecially ueful in etting where efficient algorithm for the bet-repone oracle problem are available. Double oracle algorithm have ubequently been applied to variou puruit-evaion game [9, 16]. While the bet-repone oracle problem are NPhard in our etting (a we how in Section 5.3 and 5.4), we give algorithm for thee problem that allow the approach to till cale to realitic intance. 3. PROBLEM DESCRIPTION A network ecurity domain, a introduced by Tai et al. [15], i modeled uing a graph G = (N, E). The attacker tart at one of the ource node S N and travel along a path of hi chooing to any one of the target t T N. The attacker pure trategie are thu all the poible t path from any ource S to any target t T. The defender trie to catch the attacker before he reache any of the target by placing k available (homogeneou) reource on edge in the graph. The defender pure trategie are thu all the poible allocation of k reource to edge, o there are ( ) E k in total. Auming the defender play allocation Xi E, and the attacker chooe path A j E, the attacker ucceed if and only if X i A j =. Additionally, a payoff T (t) i aociated with each target t, uch that the attacker get T (t) for a ucceful attack on t and 0 otherwie. The defender receive T (t) in cae of a ucceful attack on t and 0 otherwie. The network ecurity domain i modeled a a complete-information zero-um game, where the et S of ource, T of target, the payoff T for all the target and the number of defender reource k are known to both the player a-priori. The objective i to find the mied trategy of the defender, correponding to a Nah equilibrium (equivalently, a minima trategy) of thi network ecurity game. The notation ued in the paper i decribed in Table 1. G(N, E) Urban network graph T Target payoff k Defender reource X Set of defender allocation, X = {X 1, X 2,..., X n} X i i th defender allocation. X i = {X ie} e, X ie {0, 1} A Set of attacker path, A = {A 1, A 2,..., A m} A j j th attacker path. A j = {A je} e, A je {0, 1} Defender mied trategy over X a Adverary mied trategy over A U d (, A j) Defender epected utility playing againt A j Λ Defender pure trategy bet repone Γ Attacker pure trategy bet repone Table 1: Notation 4. RANGER COUNTEREXAMPLE RANGER wa introduced by Tai et al. [15] and wa deigned to obtain approimate olution for the defender for the network ecurity game. It main component i a polynomial-ized linear program that, rather than olving for a ditribution over allocation, olve for the marginal probability with which the defender cover 328

3 each edge. It doe thi by approimating the capture probability a the um of the marginal along the attacker path. It further preent ome ampling technique to obtain a ditribution over defender allocation from thee marginal. What wa known before wa that the RANGER olution (regardle of the ampling method ued) i uboptimal in general, becaue it i not alway poible to find a ditribution over allocation uch that the capture probability i indeed the um of marginal on the path. In thi paper, we how that RANGER error can be arbitrarily large. Let u conider the eample graph hown in Figure 1. Thi multigraph 2 ha a ingle ource node,, and two target, t 1 and t 2; the defender ha 2 reource. Furthermore, the payoff T of the target are defined to be 1 and 2 for target t 1 and t 2 repectively. a a b a Figure 1: Thi eample i olved incorrectly by RANGER. The variable a, b are the coverage probabilitie on the correponding edge. RANGER olution: Suppoe RANGER put marginal coverage probability a on each of the three edge between and t 1, 3 and probability b on the edge between t 1 and t 2, a hown in Figure 1. RANGER etimate that the attacker get caught with probability a when attacking target t 1 and probability a + b when attacking target t 2. RANGER will attempt to make the attacker indifferent between the two target to obtain the minima equilibrium. Thu, RANGER output i a = 3/5, b = 1/5, obtained from the following ytem of equation: 1(1 a) = 2(1 (a + b)) (1) 3a + b = 2 (2) However, there can be no allocation of 2 reource to the edge uch that the probability of the attacker being caught on hi way to t 1 i 3/5 and the probability of the attacker being caught on hi way to t 2 i 4/5. (The reaon i that in thi eample, the event of there being a defenive reource on the econd edge in the path cannot be dijoint from the event of there being one on the firt edge.) In fact, for thi RANGER olution, the attacker cannot be caught with a probability of more than 3/5 when attacking target t 2, and o the defender utility cannot be greater than 2(1 3/5) = 4/5. Optimal olution: Figure 2 how the i poible allocation of the defender two reource to the four edge. Three of them block ome pair of edge between and t 1. Suppoe that each of thee three allocation i played by the defender with probability. 4 Each of the other three allocation block one edge between and t 1 a well a the edge between t 1 and t 2. Suppoe the defender chooe thee allocation with probability y each (refer Figure 2). The probability of the attacker being caught on hi way to t 1 i y, or We ue a multi-graph for implicity. Thi countereample can eaily be converted into a imilar countereample that ha no more than one edge between any pair of node in the graph. 3 We can aume without lo of olution quality that ymmetric edge will have equal coverage. 4 Again, thi can be aumed without lo of generality for ymmetric edge. Figure 2: The poible allocation of two reource to the four edge. The blocked edge are hown in bold. The probabilitie ( or y) are hown net to each allocation. y. Similarly, the probability of the attacker being caught on hi way to t 2 i 2 + 3y. Thu, a minima trategy for thi problem i the olution of Equation (3) and (4), which make the attacker indifferent between target t 1 and t 2. 1(1 2 y) = 2(1 2 3y) (3) 3 + 3y = 1 (4) The olution to the above ytem i = 2/9, y = 1/9, o that the epected attacker utility i 4/9. Thu, the epected defender utility i 4/9, which i higher than the epected defender utility of at mot 4/5 reulting from uing RANGER. RANGER ub-optimality: Suppoe the payoff T (t 2) of target t 2 in the eample above wa H, H > 1. The RANGER olution in thi cae, again obtained uing Equation 1 and 2, would be a = (H+1), b = (H 1). (2H+1) (2H+1) Then, conider an attacker who attack the target t 2 by firt going through one of the three edge from to t 1 uniformly at random (and then on to t 2). The attacker will fail to be caught on the way from t 1 to t 2 with probability (1 b), given that the defender trategy i conitent with the output of RANGER. Even conditional on thi failure, the attacker will fail to be caught on the way from to t 1 with probability at leat 1/3, becaue the defender ha only 2 reource. Thu, the probability of a ucceful attack on t 2 i at leat (1 b)(1/3), and the attacker bet-repone utility i at leat: H(1 b) 3 = H(H + 2) H(H + 0.5) > 3(2H + 1) 3(2H + 1) = H 6 Thu, the true defender utility for any trategy conitent with RAN- GER i at mot H. 6 Now, conider another defender trategy in which the defender alway block the edge from t 1 to t 2, and alo block one of the three edge between and t 1 uniformly at random. For uch a defender trategy, the attacker can reach t 1 with probability 2/3, but cannot reach target t 2 at all. Thu, the attacker bet-repone utility in thi cae i 2/3. Therefore, the optimal defender utility i at leat 2/3. Therefore, any olution conitent with RANGER i at leat H / 2 = H uboptimal. Since H i arbitrary, RANGER olution can be arbitrarily uboptimal. Thi motivate our eact, double-oracle algorithm, RUGGED. y y y (5) 5. DOUBLE-ORACLE APPROACH In thi ection, we preent RUGGED, a double-oracle baed algorithm for network ecurity game. We alo analyze the computational compleity of determining bet repone for both the defender and the attacker, and, to complete the RUGGED algorithm, we give algorithm for computing the bet repone. 329

4 5.1 Algorithm The algorithm RUGGED i preented a Algorithm 1. X i the et of defender allocation generated o far, while A i the et of attacker path generated o far. CoreLP(X, A) find an equilibrium (and hence, minima and maimin trategie) of the two-player zero-um game coniting of the et of pure trategie, X and A, generated o far. CoreLP return and a, which are the current equilibrium mied trategie for the defender and the attacker over X and A repectively. The defender oracle (DO) generate a defender allocation Λ that i a bet repone for the defender againt a. (Thi i a bet repone among all allocation, not jut thoe in X.) Similarly, the attacker oracle (AO) generate an attacker path Γ that i a bet repone for the attacker againt. Algorithm 1 Double Oracle for Urban Network Security 1. Initialize X by generating arbitrary candidate defender allocation. 2. Initialize A by generating arbitrary candidate attacker path. repeat 3. (, a) CoreLP(X, A). 4a. Λ DO(a). 4b. X X {Λ}. 5a. Γ AO(). 5b. A A {Γ}. until convergence 7. Return (, a) The double oracle algorithm thu tart with a mall et of pure trategie for each player, and then grow thee et in every iteration by applying the bet-repone oracle to the current olution. Eecution continue until convergence i detected. Convergence i achieved when the bet-repone oracle of both the defender and the attacker do not generate a pure trategy that i better for that player than the player trategy in the current olution (holding the other player trategy fied). In other word, convergence i obtained if, for both player, the reward given by the bet-repone oracle i no better than the reward for the ame player given by the CoreLP. The correctne of bet-repone-baed double oracle algorithm for two-player zero-um game ha been etablihed by McMahan et al [11]; the intuition for thi correctne i a follow. Once the algorithm converge, the current olution mut be an equilibrium of the game, becaue each player current trategy i a bet repone to the other player current trategy thi follow from the fact that the bet-repone oracle, which earche over all poible trategie, cannot find anything better. Furthermore, the algorithm mut converge, becaue at wort, it will generate all pure trategie. 5.2 CoreLP The purpoe of CoreLP i to find an equilibrium of the retricted game coniting of defender pure trategie X and attacker pure trategie A. Below i the tandard formulation for computing a maimin trategy for the defender in a two-player zero-um game. ma U U d, d (6).t. U d U d (, A j) j = 1,..., A (7) 1 T = 1 (8) [0, 1] X (9) The defender mied trategy, defined over X, and utility U d are the variable for thi problem. Inequality (7) i family of contraint; there i one contraint for every attacker path A j in A. The function U d (, A j) i the epected utility of the attacker path A j. Given A j, the probability that the attacker i caught i the um of the probabilitie of the defender allocation that would catch the attacker. (We can um thee probabilitie becaue they correpond to dijoint event.) More preciely, let z ij be an indicator for whether allocation X i interect with path A j, that i, { 1 if Xi A z ij = j (10) 0 otherwie Thee z ij are not variable of the linear program; they are parameter that are determined at the time the bet repone are generated. Then, the probability that an attacker playing path A j i caught i i ziji, and the probability that he i not caught i i (1 zij)i. Thu, the payoff function U d (, A j) for the defender for chooing a mied trategy when the attacker chooe path A j i given by Equation (11), where T (t j) i the attacker payoff for reaching t j. U d (, A j) = T (t j) ( i (1 z ij) i) (11) The dual variable correponding to Inequality (7) give the attacker mied trategy a, defined over A. The epected utility for the attacker i given by U d. 5.3 Defender Oracle Thi ection concern the bet-repone oracle problem for the defender. The Defender Oracle problem i tated a follow: generate the defender pure trategy (reource allocation) Λ allocating k reource over the edge E that maimize the defender epected utility againt a given attacker mied trategy a over path A. Defender Oracle problem i NP-hard: We how thi by reducing the et cover problem to it. The Set-Cover problem: Given are a et U, a collection S of ubet of U (that i, S 2 U ), and an integer k. The quetion i whether there i a cover C S of ize k or le, that i, c C c = U and C k. We will ue a modification of thi well-known NP-hard problem o that S alway contain all ingleton ubet of U, that i, U implie {} S. Thi modified problem remain NP-hard. THEOREM 1. The Defender Oracle problem i NP-hard, even if there i only a ingle ource and a ingle target. PROOF. Reduction from Set-Cover to Defender Oracle: We convert an arbitrary intance of the et cover problem to an intance of the defender oracle problem by contructing a graph G with jut 3 node, a hown in Figure 3. The graph G i a multi-graph 5 with jut three node, o that N = {, v, t}, where i the only ource and t i the only target (with arbitrary poitive value). There are up to S loop edge adjacent to node v; each loop edge correpond to a unique non-ingleton ubet in S. There are U edge between and v, each correponding to a unique element in U. There are alo U edge between v and t, each correponding to a unique element in U. The attacker path correpond to the element in U. A path that correpond to u U tart with the edge between and v that correpond to u, then loop through all the edge that correpond to non-ingleton ubet in S that contain u, and finally end with the edge between v and t that correpond to u. Hence, any two path ued by the attacker can only interect at the loop edge. The probabilitie that the defender place on thee path are arbitrary poitive number. We now how that et U can be covered with k ubet in S 2 U if and only if the defender can block all of the attacker path with k reource in the correponding defender oracle problem intance. 5 Having a multi-graph i not eential to the NP-hardne reduction. 330

5 e 1 e 1 ' v e 2 ' t e 3 ' e 2 e 3 e 1,2 e 1,3 Figure 3: A defender oracle problem intance correponding to the SET-COVER intance with U = {1, 2, 3}, S = {{1}, {2}, {3}, {1, 2}, {1, 3}}. Here, the attacker mied trategy ue three path: (e 1, e 1,2, e 1,3, e 1), (e 2, e 1,2, e 2), (e 3, e 1,3, e 3). Thu, the SET-COVER intance ha a olution of ize 2 (for eample, uing {1, 2} and {1, 3}); correpondingly, with 2 reource, the defender can alway capture the attacker (for eample, by covering e 1,2, e 1,3). The if direction: If the defender can block all the path ued by the attacker with k reource, then the et U can be covered with C S, where C = k and i contructed a follow. If the defender place a reource on a loop edge, then C include the non-ingleton ubet in S that correpond to that loop edge. If the defender block any other edge then C include the correponding ingleton ubet. The only if direction: If there eit a cover C of ize k, then the defender can block all the path by placing a defenive reource on every loop edge that correpond to a non-ingleton ubet in C, and placing a defenive reource on the correponding edge out of for every ingleton ubet in C. Formulation: The defender oracle problem, decribed below, can be formulated a a mied integer linear program (MILP). The objective of the MILP i to identify the allocation that cover a many attacker path a poible, where path are weighted by the product of the payoff of the target attacked by the path and probability of attacker chooing it. (In thi formulation, probabilitie a j are not variable; they are provided by CoreLP.) In the formulation, λ e = 1 indicate that we aign a reource to edge e, and z j = 1 indicate that path A j (refer Table 1) i blocked by the allocation. ma z,λ j (1 zj)ajtt j (12).t. z j A jeλ e (13) e e λe k (14) λ e {0, 1} (15) z j [0, 1] (16) THEOREM 2. The MILP decribed above correctly compute a bet-repone allocation for the defender. PROOF. The defender receive a payoff of T (t j)a j if the attacker uccefully attack target t j uing path A j, and 0 in the cae of an unucceful attack. Hence, if we make ure that 1 z j = 1 if path A j i not blocked, and 0 otherwie, then the objective function (12) correctly model the defender epected utility. Inequality (13) enure thi: it right-hand ide will be at leat 1 if there eit an edge on the path A j that defender i covering, and 0 otherwie. z j need not be retricted to take an integer value becaue the objective i increaing with z j and if the olver can puh it above 0, it will chooe to puh it all the way up to 1. Therefore, if we let Λ correpond to the et of edge covered by the defender, z j will be et by the olver o that: { 1 if Λ Aj e λ z j = e = A je = 1 (17) 0 otherwie Inequality (14) enforce that the defender cover at mot a many edge a the number of available reource k, and thu enure feaibility. Hence, the above MILP correctly capture the betrepone oracle problem for the defender. PROPOSITION 1. For any attacker mied trategy, the defender epected utility from the bet repone provided by the defender oracle i no wore than the defender equilibrium utility in the full zero-um game. PROOF. In any equilibrium, the attacker play a mied trategy that minimize the defender bet-repone utility; therefore, if the attacker play any other mied trategy, the defender betrepone utility can be no wore. 5.4 Attacker Oracle Thi ection concern the bet-repone oracle problem for the attacker. The Attacker Oracle problem i to generate the attacker pure trategy (path) Γ from ome ource S to ome target t T that maimize the attacker epected utility given the defender mied trategy over defender allocation X. Attacker Oracle i NP-hard: We how that the attacker oracle problem i alo NP-hard by reducing 3-SAT to it. THEOREM 3. The Attacker Oracle problem i NP-hard, even if there i only a ingle ource and a ingle target. PROOF. Reduction from 3-SAT to Attacker Oracle: We convert an arbitrary intance of 3-SAT to an intance of the attacker oracle problem a follow. Suppoe the 3-SAT intance contain n variable i, i = 1,..., n, and k claue. Each claue i a dijunction of three literal, where each literal i either a variable or the negation of the variable. Conider the following eample: E = ( 1 2 3) ( 1 2 4) (18) The formula E contain n = 4 variable and k = 2 claue. We contruct a multi-graph G 6 with n+k+1 node, v 0,..., v n+k o that the ource node i = v 0, and the target node i t = v n+k. Every edge connect ome pair of node with conecutive indice, o that every imple path from to t contain eactly n + k edge. Each edge correpond to a literal in the 3-SAT epreion (that i, either i or i). There are eactly three edge that connect node v i 1 and v i for i = 1,..., k. Thoe three edge correpond to the three literal in the i-th claue. There are eactly two edge that connect node v k+j 1 and v k+j for j = 1,..., n. Thoe two edge correpond to literal j and j. An eample graph that correpond to the epreion (18) i hown in Figure =v v 1 v 2 v 3 v 4 v 5 v 6 =t Figure 4: An eample graph correponding to the CNF formula ( 1 2 3) ( 1 2 4) There are 2n defender pure trategie (allocation of reource), each played with equal probability of 1/(2n). Each defender pure trategy correpond to a literal, and the edge that correpond to that literal are blocked in that pure trategy. In the eample hown in Figure 4, the defender play 8 pure trategie, each with probability 1/8. Three edge are blocked in the pure trategy that correpond to the literal 1 (namely, the top edge between v 0 and v 1, 6 We ue a multi-graph for implicity; having a multi-graph i not eential for the NP-hardne reduction. 331

6 the top edge between v1 and v2, and the top edge between v2 and v3 ); only one edge i blocked in the pure trategy that correpond to the literal 4 (the bottom edge between v5 and v6 ). (If it i deired that the defender alway ue the ame number of reource, thi i eaily achieved by adding dummy edge.) We now how that there i an aignment of value to the variable in the 3-SAT intance o that the formula evaluate to true if and only if there i a path from to t in the correponding attacker oracle problem intance which i blocked with probability at mot 1/2. The if direction: Suppoe there i a path Γ from to t that i blocked with probability at mot 1/2. Note that any path from to t i blocked by at leat one of the trategie {i, i }, for all i = 1,..., n, o the probability that the path i blocked i at leat n/(2n) = 1/2. Moreover, if for ome i, the path pae through both an edge labeled i and one labeled i, then the probability that the path i blocked i at leat (n + 1)/(2n) > 1/2 o thi cannot be the cae for Γ. Hence, we can aign the true value to the literal that correpond to the edge on the path Γ, and fale to all the other literal. Thi mut correpond to a olution to the 3-SAT intance, becaue each claue mut contain a literal that correpond to an edge on the path, and i thu aigned a true value. The only if direction: Suppoe there i an aignment of value to the variable uch that the 3-SAT formula evaluate to true. Conider a imple path Γ that goe from to t through edge that correpond to literal with true value in the aignment. Such a path mut eit becaue by aumption the aignment atifie every claue. Moreover, thi path i blocked only by the defender trategie that correpond to true literal, of which there are eactly n. So the probability that the path i blocked i n/(2n) = 1/2. allocation. Hence, if we make ure that 1 zi = 1 if allocation Xi doe not block the path, and 0 otherwie, then the objective function (19) correctly model the attacker epected utility. Inequality (23) enure thi: if the allocation Xi cover ome e for which γe = 1, then it will force zi to be et at leat to 1; otherwie, zi only need to be et to at leat 0 (and in each cae, the olver will puh it all the way down to thi value, which alo eplain why the zi variable do not need to be retricted to take integer value). Therefore, if we let Γ correpond to the path choen by the attacker, zi will be et by the olver o that 1 if Xi Γ 6= e γe = Xie = 1 zi = (26) 0 otherwie It follow that the MILP objective i correct. Hence, the above MILP capture the bet-repone oracle problem for the attacker. P ROPOSITION 2. For any defender mied trategy, the attacker epected utility from the bet repone provided by the attacker oracle i no wore than the attacker equilibrium utility in the full zero-um game. P ROOF. In any equilibrium, the defender play a mied trategy that minimize the attacker bet-repone utility; therefore, if the defender play any other mied trategy, the attacker betrepone utility can be no wore. Formulation: The attacker oracle problem can be formulated a a et of mied integer linear program, a decribed below. For every target in T, we olve for the bet path to that target; then we take the bet olution overall. Below i the formulation when the attacker i attacking target tm. (In thi formulation, probabilitie i are not variable; they are value produced earlier by CoreLP.) In the formulation, γe = 1 indicate that the attacker pae through edge e, and zi = 1 indicate that the allocation Xi block the attacker path. Equation (20) to (22) repreent the flow contraint for the attacker for every node n N. P (19) ma Ttm i i (1 zi ) z,γ X P.t. = γe n 6=, tm (20) e out(n) γe Figure 5: Eample graph of Southern Mumbai with 455 node. Source are depicted a green arrow and target are red bulleye. Bet viewed in color. e in(n) P e out() γe =1 (21) P γe =1 (22) e in(tm ) zi zi γe + Xie 1 0 γe {0, 1} e i 6. (23) (24) EVALUATION In thi ection, we decribe the reult we achieved with RUGGED. We conducted eperiment on graph obtained from road network GIS data for the city of Mumbai (inpired by the 2008 Mumbai incident [5]), a well a on artificially generated graph. We provide two type of reult: (1) Firtly, we compare the olution quality obtained from RUGGED with the olution quality obtained from R ANGER. Thee reult are hown in Section 6.1. (2) Secondly, we provide runtime reult howing the performance of RUGGED when the input graph are caled up.7 The following three type of graph were ued for the eperimental reult: (1) Weakly fully connected (WFC) graph, denoted GWFC (N, E), are graph where N i an ordered et of node {n1,..., nm ; S = {n1 }, T = {nm }}. For each node ni, there eit a et of directed (25) T HEOREM 4. The MILP decribed above correctly compute a bet-repone path for the attacker. P ROOF. The flow contrain are repreented in Equation (20) to (22). The ink for the flow i the target tm that we are currently conidering for attack. To deal with the cae where there i more than one poible ource node, we can add a virtual ource () to G that feed into all the real ource. in(n) repreent the edge coming into n, out(n) repreent thoe going out of n. The flow contraint enure that the choen edge indeed contitute a path from the (virtual) ource to the ink. The attacker receive a payoff of T (tm ) if he attack target tm uccefully, that i, if the path doe not interect with any defender 7 All eperiment were run on tandard dektop 2.8GHz machine with 2GB main memory. 332

7 edge, {(n i, n j) n i < n j}, in E. Thee graph were choen becaue of the etreme ize of the trategy pace for both player. Additionally, there are no bottleneck edge, o thee graph are deigned to be computationally challenging for RUGGED. (2) Braid-type graph, denoted G B (N, E), are graph where N i a equence of node n 1 to n m uch that each pair n i 1 and n i i connected by 2 to 3 edge. Node n 1 i the ource node. Any following node i a target node with probability 0.2, with payoff T randomly choen between 1 and 100. Thee graph have a imilar tructure a the graph in Figure 1, and were motivated by the countereample in Section 4. (3) City graph of different ize were etracted from the outhern part of Mumbai uing the GIS data provided by OpenStreet- Map. The placement of 2-4 target wa inpired by the Mumbai incident from 2008 [5]; 2-4 ource were placed on the border of the graph, 8 imulating an attacker approaching from the ea. We ran the tet for graph with the following number of node: 45, 129 and 252. Figure 5 how a ample Mumbai graph with 252 node, 4 ource and 3 target. 6.1 Comparion with RANGER Thi ection compare the olution quality of RUGGED and RAN- GER. Although we have already etablihed that RANGER olution can be arbitrarily bad in general, the objective of thee tet i to compare the actual performance of RANGER with RUGGED. The reult are given in Table 2, which how the average and maimum error from RANGER. We evaluated RANGER on the three type of graph city graph, braid graph and weakly fully connected graph of different ize, fiing the number of defender reource to 2 and placing 3 target, with varied value from the interval [0, 1000]. The actual defender utility from the olution provided by RANGER 9 i computed by uing the bet-repone oracle for the attacker with the RANGER defender trategy a input. The error of RANGER i then epreed a the difference between the defender utilitie in the olution provided by RANGER and by RUGGED. Table 2 how the comparion reult between RANGER and RUGGED, ummarized over 30 trial. It how the percentage of trial in which RANGER gave an incorrect olution (denoted pct ). It alo how the average and maimum error of RANGER (denoted a avg and ma repectively) over thee trial. It how that while RANGER wa wrong only about 1/3 of the time for Braid graph, it gave the wrong anwer in all the run on the fully connected graph. Furthermore, it wa wrong 90% of the time on city graph, with an average error of 215 unit and a maimum error of 721 unit. Given an average target value of 500, thee are high error indeed indicating that RANGER i unuitable for deployment in real-world domain. 6.2 Scale-up and analyi Thi ection concern the performance of RUGGED when the input problem intance are caled up. The eperiment were conducted on graph derived directly from portion of Mumbai road network. The runtime reult are hown in Table 3, where the row repreent the ize of the graph and the column repreent the number of defender reource that need to be cheduled. A an eample of the compleity of the graph, the number of attacker path in the Mumbai graph with 252 node i at leat a 10 12, while the number of defender allocation i approimately for 4 reource. 8 We placed more ource and target into larger graph. 9 Becaue RANGER provide a olution in the form of marginal probabilitie of defender allocation along edge, we ued Comb ampling [15] to convert thi into a (joint) probability ditribution over defender allocation. City Braid WFC node avg error ma error pct 90% 100% 30% 37% 100% 100% avg T Table 2: RANGER average and maimum error and percent of ample where RANGER provided a uboptimal olution. Target value T were randomly drawn from the interval [1, 1000] Table 3: Runtime (in econd) of RUGGED when the input problem intance are caled up. Thee tet were done on graph etracted from the road network of Mumbai. The row correpond to the number of node in the graph wherea the column correpond to the number of defender reource. The game matri for thi problem cannot even be repreented, let alone olved. The ability of RUGGED to compute optimal olution in uch ituation, while overcoming NP-hardne of both oracle, mark a ignificant advance in the tate of the art in deploying game-theoretic technique. Figure 6(a) eamine the performance of RUGGED when the ize of the trategy pace for both player i increaed. Thee tet were conducted on WFC graph, ince they are deigned to have large trategy pace. Thee problem have 20 to 100 node and up to 5 reource. The -ai in the figure how the number of node in the graph, while the y-ai how the runtime in econd. Different number of defender reource are repreented by different curve in the graph. For eample for 40 node, and 5 defender reource, RUGGED took 108 econd on average. To peed up the convergence of RUGGED, we tried to warm-tart the algorithm with an initial defender allocation uch a min-cutbaed allocation, target- and ource-centric allocation, RANGER allocation and combination of thee. No ignificant improvement of runtime wa meaured; in ome cae, the runtime increaed becaue of the larger trategy et for the defender. 6.3 Algorithm Dynamic Analyi Thi ection analyze the anytime olution quality and the performance of each of the three component of RUGGED: the defender oracle, the attacker oracle, and the CoreLP. When we olve the bet-repone oracle problem, they provide lower and upper bound on the optimal defender utility, a hown in Propoition 1 and 2. Figure 6(b) how the progre of the bound and the CoreLP olution for a ample problem intance cheduling 2 defender reource on a fully connected network with 50 node. The -ai how the number of iteration and the y-ai how the epected defender utility. The graph how that a good olution (i.e., one where the difference in the two bound i le than ɛ) can be computed reaonably quickly, even though the algorithm take longer to converge to the optimal olution. For eample, a olution with an allowed approimation of 10 unit 10 can be computed in about 210 iteration, wherea 310 iteration are required to find the optimal olution. The difference between thee two bound give an upper unit i 1% of the maimum target payoff (1000). 333

8 (a) (b) (c) Figure 6: Reult. Figure (a) how the cale-up analyi on WFC graph of different ize. Figure (b) how the convergence of oracle value to the final game value and the anytime bound. Figure (c) compare the runtime of oracle and the core LP. bound on the error in the current olution of the CoreLP; thi alo provide u with an approimation variant of RUGGED. Figure 6(c) compare the runtime needed by the three module in every iteration. The -ai how the iteration number and the y-ai how the runtime in econd in logarithmic cale. A epected, CoreLP olving a tandard linear program need coniderably le time in each iteration than both the oracle, which olve mied-integer program. The figure alo how that the module cale well a the number of iteration increae. 7. CONCLUSION AND FUTURE WORK Optimally cheduling defender reource in a network-baed environment i an important and challenging problem. Security in urban road network, computer network, and other tranportation network i of growing concern, requiring the development of novel calable approache. Thee domain have etremely large trategy pace; a graph with jut 20 node and 5 reource can have more than 2 billion trategie for both player. In thi paper, we preented RUGGED, a novel double-oracle baed approach for finding an optimal trategy for cheduling a limited number of defender reource in a network ecurity environment. We howed that previou approache can lead to arbitrarily bad olution in uch ituation, and the error can be very high even in practice. We applied RUGGED to real-city map generated from GIS data; we preented the reult of applying RUGGED to the road network of Mumbai. While enhancement to RUGGED are required for deployment in ome real-world domain, optimal olution even to thee problem are now within reach. The calability of RUGGED open up new avenue for deploying game-theoretic technique in real-world application. 8. ACKNOWLEDGEMENTS Thi reearch i upported by the United State Department of Homeland Security through Center for Rik and Economic Analyi of Terrorim Event (CREATE), the Czech Minitry of Education, Youth and Sport under project number N , the NSF CAREER grant and IIS , ARO CI, and an Alfred P. Sloan fellowhip. We thank Ron Parr, Michal Jakob and Zhengyu Yin for comment and dicuion. 9. REFERENCES [1] M. Adler, H. Räcke, N. Sivadaan, C. Sohler, and B. Vöcking. Randomized puruit-evaion in graph. In ICALP, page , [2] S. Alpern. Infiltration Game on Arbitrary Graph. Journal of Mathematical Analyi and Application, 163: , [3] Y. Bachrach and E. Porat. Path Diruption Game. In AAMAS, page , [4] N. Bailico, N. Gatti, and F. Amigoni. Leader-Follower Strategie for Robotic Patrolling in Environment with Arbitrary Topologie. In AAMAS, page , [5] R. Chandran and G. Beitchman. Battle for Mumbai End, Death Toll Rie to 195. Time of India, 29 November [6] J. Dickeron, G. Simari, V. Subrahmanian, and S. Krau. A Graph-Theoretic Approach to Protect Static and Moving Target from Adverarie. In AAMAS, page , [7] M. M. Flood. The Hide and Seek Game of Von Neumann. MANAGEMENT SCIENCE, 18(5-Part-2): , [8] S. Gal. Search Game. Academic Pre, New York, [9] E. Halvoron, V. Conitzer, and R. Parr. Multi-tep Multi-enor Hider-Seeker Game. In IJCAI, page , [10] M. Jain, E. Karde, C. Kiekintveld, F. Ordóñez, and M. Tambe. Security Game with Arbitrary Schedule: A Branch and Price Approach. In AAAI, page , [11] H. B. McMahan, G. J. Gordon, and A. Blum. Planning in the Preence of Cot Function Controlled by an Adverary. In ICML, page , [12] J. V. Neumann. Zur Theorie der Geellchaftpiele. Mathematiche Annalen, 100(1): , [13] J. Pita, M. Jain, F. Ordóñez, C. Portway, M. Tambe, C. Wetern, P. Paruchuri, and S. Krau. Uing Game Theory for Lo Angele Airport Security. AI Magazine, 30(1), [14] W. Ruckle, R. Fennell, P. T. Holme, and C. Fennemore. Ambuhing Random Walk I: Finite Model. Operation Reearch, 24: , [15] J. Tai, Z. Yin, J. young Kwak, D. Kempe, C. Kiekintveld, and M. Tambe. Urban ecurity: Game-theoretic reource allocation in networked phyical domain. In AAAI, page , [16] O. Vaněk, B. Bošanký, M. Jakob, and M. Pěchouček. Traniting Area Patrolled by a Mobile Adverary. In IEEE CIG, page 9 16, [17] A. Wahburn and K. Wood. Two-peron Zero-um Game for Network Interdiction. Operation Reearch, 43(2): , [18] Z. Yin, D. Korzhyk, C. Kiekintveld, V. Conitzer, and M. Tambe. Stackelberg v. Nah in Security Game: Interchangeability, Equivalence, and Uniquene. In AAMAS, page ,

Optimization for Bus Stop Design Based on Cellular Automaton Traffic Model

Optimization for Bus Stop Design Based on Cellular Automaton Traffic Model Modern Tranportation Volume 6, 2017, PP.1-7 Optimization for Bu Stop Deign Baed on Cellular Automaton Traffic Model Liankui Zhang 1, Chengyou Cui 1 1. Department of Technology Economic and Management,

More information

MEASUREMENT OF DYNAMIC STRESSES ON CARRIERS WITH DETACHABLE GRIP AT STATION ENTRANCE: LA.T.I.F. EXPERIENCES AND FUTURE PROSPECTS

MEASUREMENT OF DYNAMIC STRESSES ON CARRIERS WITH DETACHABLE GRIP AT STATION ENTRANCE: LA.T.I.F. EXPERIENCES AND FUTURE PROSPECTS MEASUREMENT OF DYNAMIC STRESSES ON CARRIERS WITH DETACHABLE GRIP AT STATION ENTRANCE: LA.T.I.F. EXPERIENCES AND FUTURE PROSPECTS dott.ing. Fabio Degaperi Introduction The importance of dynamic tre effect

More information

Fluid-structure interaction between trains and noise-reduction barriers: numerical and experimental analysis

Fluid-structure interaction between trains and noise-reduction barriers: numerical and experimental analysis Fluid Structure Interaction V 49 Fluid-tructure interaction between train and noie-reduction barrier: numerical and experimental analyi M. Belloli, B. Pizzigoni, F. Ripamonti & D. Rocchi Mechanical Engineering

More information

Coordination in CPG and its Application on Bipedal Walking

Coordination in CPG and its Application on Bipedal Walking Coordination in CPG and it Application on Bipedal Walking Weiwei Huang Department of Mechanical Engineering National Univerity of Singapore Singapore 96 huangweiwei@nu.edu.g Chee-Meng Chew Department of

More information

MEMORANDUM: INTERIM CONCEPTS

MEMORANDUM: INTERIM CONCEPTS roject 73845 I 15/Tropicana Interchange Feaibility Study MEMORANDUM: INTERIM CONCETS INTRODUCTION During the initial project creening and throughout the development of project concept, alternative concept

More information

INTERNATIONAL JOURNAL OF CIVIL AND STRUCTURAL ENGINEERING Volume 2, No 3, 2012

INTERNATIONAL JOURNAL OF CIVIL AND STRUCTURAL ENGINEERING Volume 2, No 3, 2012 INTERNATIONAL JOURNAL OF CIVIL AND STRUCTURAL ENGINEERING Volume 2, No 3, 2012 Copyright 2010 All right reerved Integrated Publihing ervice Reearch article ISSN 09 4399 Invetigation on fly ah concrete

More information

Mechanical Waves: Applications in Medicine. How Elastography is Helping Doctors Avoid the Biopsy Needle

Mechanical Waves: Applications in Medicine. How Elastography is Helping Doctors Avoid the Biopsy Needle Mechanical Wave: Application in Medicine How Elatography i Helping Doctor Avoid the Biopy Needle Purpoe Thi leon i meant to increae tudent undertanding of mechanical wave and provide them with example

More information

reviewed paper Public transport travel time simulation Tomáš CHLEBNICAN, Jiří CTYROKY, Marek ZDERADICKA

reviewed paper Public transport travel time simulation Tomáš CHLEBNICAN, Jiří CTYROKY, Marek ZDERADICKA reviewed paper Public tranport travel time imulation Tomáš CHLEBNICAN, Jiří CTYROKY, Marek ZDERADICKA (Mgr. Jiří ČTYROKÝ, Útvar rozvoje hl. m. Prahy, Vyšehradká 57, Prague, 18 00, ctyroky@urm.mepnet.cz)

More information

CREST LEVEL OPTIMIZATION OF THE MULTI LEVEL OVERTOPPING BASED WAVE ENERGY CONVERTER SEAWAVE SLOT-CONE GENERATOR. J. P. Kofoed 1 and E.

CREST LEVEL OPTIMIZATION OF THE MULTI LEVEL OVERTOPPING BASED WAVE ENERGY CONVERTER SEAWAVE SLOT-CONE GENERATOR. J. P. Kofoed 1 and E. 6 th European Wave and Tidal Energy Conference Glagow, UK Augut 29 th - September 2 nd 2005 CREST LEVEL OPTIMIZATION OF THE MULTI LEVEL OVERTOPPING BASED WAVE ENERGY CONVERTER SEAWAVE SLOT-CONE GENERATOR

More information

Calculation of Actual Concrete Shrinkage Magnitude

Calculation of Actual Concrete Shrinkage Magnitude Calculation of Actual Magnitude By: Emilio M. Morale, MSCE - Mater of Science in Civil Engineering major in Geotechnic and Structure, Carnegie Mellon Univerity, Pittburgh Pa. Chairman PICE Geotechnical

More information

A Study of Ocean Waves at Fisherman s Wharf, Victoria Harbour

A Study of Ocean Waves at Fisherman s Wharf, Victoria Harbour A Study of Ocean Wave at Fiherman Wharf, Victoria Harbour David B. Fiel, Jianhua Jiang and Dave Billenne ASL Environmental Science Inc., 1986 Mill Rd., Sidney, BC, V8L 5Y3, Canada, Phone Number (250) 656-0177

More information

WALTON-VERONA YOUTH FOOTBALL ASSOCIATION 2018 REGISTRATION FORM

WALTON-VERONA YOUTH FOOTBALL ASSOCIATION 2018 REGISTRATION FORM WALTON-VERONA YOUTH FOOTBALL AOCIATION 2018 REGITRATION FORM Pleae circle appropriate team / age for fall 2018: Refer to Helpful Fact and Tip heet for cut off date for each team. FLAG TARTER PEEWEE / MIDGET

More information

Robust Repositioning to Counter Unpredictable Demand in Bike Sharing Systems

Robust Repositioning to Counter Unpredictable Demand in Bike Sharing Systems Robut Repoitioning to Counter Unpredictable Demand in Bike Sharing Sytem Supriyo Ghoh School of Info. Sytem Singapore Management Univ. upriyog.2013@phdi.mu.edu.g Michael Trick Tepper School of Buine Carnegie

More information

SEISMIC RESPONSE ANALYSIS OF LONG-SPAN CONTINUOUS RIGID-FRAMED BRIDG

SEISMIC RESPONSE ANALYSIS OF LONG-SPAN CONTINUOUS RIGID-FRAMED BRIDG SEISMIC RESPONSE ANALYSIS OF LONG-SPAN CONTINUOUS RIGID-FRAMED BRIDG Song Wa-li 1, Liu Gao-jun 2, Song Wen-chao 3 and Ren Wen-jie 4 1 Profeor, School of Civil Engineering, Hebei Univerity of Technology,

More information

Hydraulic jump in stilling basin with vertical end sill

Hydraulic jump in stilling basin with vertical end sill International Journal of Phical Science Vol. (), pp. -9, Januar, Available online at http://www.academicjournal.org/ijps ISSN 99-9 Academic Journal Full Length Reearch Paper Hdraulic jump in tilling bain

More information

OPTIMISING A BREAKWATER LAYOUT USING AN ITERATIVE ALGORITHM

OPTIMISING A BREAKWATER LAYOUT USING AN ITERATIVE ALGORITHM OPTIMISING A BREAKWATER LAYOUT USING AN ITERATIVE ALGORITM Michael Rutell R Wallingford / Univerity of Surrey Due to the remote and expoed coatal location of mot liquefied natural ga (LNG) exportation

More information

The Feature of Weak Shock Wave Propagated in a Overlong Tunnel

The Feature of Weak Shock Wave Propagated in a Overlong Tunnel Open Journal of Fluid Dynamic 0 85-89 http://d.doi.org/0.436/ojfd.0.4a034 Publihed Online December 0 (http://www.scirp.org/journal/ojfd) The Feature of Weak Shock Wave Propagated in a Overlong Tunnel Xiao

More information

Original Article. Effectiveness of a specialized climbing method for beginners on the physical and technical fitness of 8-10 year old children

Original Article. Effectiveness of a specialized climbing method for beginners on the physical and technical fitness of 8-10 year old children Journal of Phyical Education and Sport (JPES), 18 Supplement iue 5, Art 308, pp. 2065-2069, 2018 online ISSN: 2247-806X; p-issn: 2247 8051; ISSN - L = 2247-8051 JPES Original Article Effectivene of a pecialized

More information

A Graphic Method to Estimate the Wind Speed under Urban Canopy Layer

A Graphic Method to Estimate the Wind Speed under Urban Canopy Layer Civil Engineering and Architecture 3(6): 172-188, 2015 DOI: 10.13189/cea.2015.030602 http://www.hrpub.org A raphic Method to Etimate the Wind Speed under Urban Canopy Layer Manoureh Tahba School of Architecture

More information

Synthesis of a multivariate extreme sea climate

Synthesis of a multivariate extreme sea climate Application of Statitic and Probability in Civil Engineering, Der Kiureghian, Madanat & Petana (ed) 3 Millpre, Rotterdam, ISBN 9 5966 4 8 Synthei of a multivariate extreme ea climate P.B. Webber Minitry

More information

CHANGE OF NEARSHORE SIGNIFICANT WAVES IN RESPONSE TO SEA LEVEL RISE. Se-Hyeon Cheon 1 and Kyung-Duck Suh 1

CHANGE OF NEARSHORE SIGNIFICANT WAVES IN RESPONSE TO SEA LEVEL RISE. Se-Hyeon Cheon 1 and Kyung-Duck Suh 1 CHANGE OF NEARSHORE SIGNIFICANT WAVES IN RESPONSE TO SEA EVE RISE Se-Hyeon Cheon 1 and Kyung-Duck Suh 1 In thi paper, a method ha been developed for etimating the change of nearhore ignificant wave in

More information

MEMORANDUM. TNC Fisher Slough Final Design and Permitting Subject: Large Wood Debris Design. Jenny Baker (TNC) Dave Olson (DD3)

MEMORANDUM. TNC Fisher Slough Final Design and Permitting Subject: Large Wood Debris Design. Jenny Baker (TNC) Dave Olson (DD3) MEMORANDUM TNC Fiher Slough Final Deign and Permitting Subject: Large Wood Debri Deign To: From: Jenny aker (TNC) Dave Olon (DD3) David Cline (Tetra Tech) Jon Olmted (Tetra Tech) Jay lair (Tetra Tech)

More information

THE DESIGN AND APPLICATION OF WIRELESS MEMS INERTIAL MEASUREMENT UNITS FOR THE MEASUREMENT AND ANALYSIS OF GOLF SWINGS

THE DESIGN AND APPLICATION OF WIRELESS MEMS INERTIAL MEASUREMENT UNITS FOR THE MEASUREMENT AND ANALYSIS OF GOLF SWINGS THE DESIGN AND APPLICATION OF WIRELESS MEMS INERTIAL MEASUREMENT UNITS FOR THE MEASUREMENT AND ANALYSIS OF GOLF SWINGS by Kevin W. King A diertation ubmitted in partial fulfillment of the requirement for

More information

Device-Free Passive Identity Identification via WiFi Signals

Device-Free Passive Identity Identification via WiFi Signals enor Article Device-Free Paive Identity Identification via WiFi Signal Jiguang Lv ID, Wu Yang * and Dapeng Man Information Security Reearch Center, Harbin Engineering Univerity, Harbin 5, China; lvjiguang@hrbeu.edu.cn

More information

VALIDATION OF THE ASAR WAVE MODE LEVEL 2 PRODUCT USING WAM AND BUOY SPECTRA

VALIDATION OF THE ASAR WAVE MODE LEVEL 2 PRODUCT USING WAM AND BUOY SPECTRA VALIDATION OF THE ASAR WAVE MODE LEVEL 2 PRODUCT USING WAM AND BUOY SPECTRA Harald Johnen (1), Geir Engen (1), Bertrand Chapron (2) (1) Norut Informajonteknologi AS, PP 6463 Forkningparken, N-9294 Tromø,

More information

Roulette Deluxe. Roulette Deluxe is a fixed odds betting game based on roulette.

Roulette Deluxe. Roulette Deluxe is a fixed odds betting game based on roulette. Roulette Deluxe Roulette Deluxe i a fixed odd betting game baed on roulette. The Roulette wheel ha 37 ed lot, 0 to 36 each of which can be bet on. The wheel i pun in one direction and a ball i pun in the

More information

Semi-Quantitative Freshwater Mussel Survey Date Prepared: 11/20/2017

Semi-Quantitative Freshwater Mussel Survey Date Prepared: 11/20/2017 PARTNERSHIP FOR THE DELAWARE ESTUARY Science Group Semi-Quantitative Frehwater Muel Survey Date Prepared: 11/20/2017 Prepared By: Kurt Cheng Suggeted Citation: Cheng, K. 2017. Semi-Quantitative Frehwater

More information

Heat Transfer Effect of Inert Gas on Multi-Tubular Reactor for Partial Oxidation Reaction

Heat Transfer Effect of Inert Gas on Multi-Tubular Reactor for Partial Oxidation Reaction Korean J. Chem. Eng., 18(2), 184-189 (2001) Heat Tranfer Effect of Inert Ga on Multi-Tubular Reactor for Partial Oxidation Reaction Kwang Ho Song, Sang Eon Han and Kwang-Ho Park LG Chem Reearch Park, LG

More information

VEHICLE NO X AND PM10 EMISSION FACTORS FROM SYDNEY S M5-EAST TUNNEL

VEHICLE NO X AND PM10 EMISSION FACTORS FROM SYDNEY S M5-EAST TUNNEL VEHICLE NO X AND PM1 EMISSION FACTORS FROM SYDNEY S M5-EAST TUNNEL Mark F. Hibberd 1 1 CSIRO Atmopheric Reearch, PB 1, Apendale, Vic 3195, Autralia Abtract Reult are preented on the vehicle emiion factor

More information

Calorimetric Validation of the Caltrac Accelerometer During Level Walking

Calorimetric Validation of the Caltrac Accelerometer During Level Walking Calorimetric Validation of the Caltrac Accelerometer During Level Walking The primary purpoe of thi tudy wa to compare the Caltrac accelerometer output with meaured energy expenditure (Ee). Twenty-five

More information

11 th Prima Pasta Badminton Championships 2018 Technical Guidelines

11 th Prima Pasta Badminton Championships 2018 Technical Guidelines 11 th Prima Pata Badminton Championhip 2018 Technical Guideline 1. DATE AND VENUE The 11 th Prima Pata Badminton Championhip 2018 will be held at Powermah, Makati City on February 16, 17, 18, 23, 24 and

More information

NIRSA CLUB BASKETBALL CONFERENCE MANUAL

NIRSA CLUB BASKETBALL CONFERENCE MANUAL 2018-2019 NIRSA CLUB BASKETBALL CONFERENCE MANUAL The NIRSA Club Baketball Conference i excited to provide league baketball for collegiate club team acro the country. The miion of the NIRSA Club Baketball

More information

Full Internal Relief Valves Instruction Manual

Full Internal Relief Valves Instruction Manual Full Internal Relief Valve Intruction Manual MEV200FIR & MEV00FIR Application: Deigned for ue in mobile LPG & NH container a a primary preure relief valve for bobtail and tranport trailer intallation.

More information

Lesson 16: More on Modeling Relationships with a Line

Lesson 16: More on Modeling Relationships with a Line Student Outcomes Students use the least squares line to predict values for a given data set. Students use residuals to evaluate the accuracy of predictions based on the least squares line. Lesson Notes

More information

Measuring and Evaluation on Priority Lanes

Measuring and Evaluation on Priority Lanes I.J. Intelligent Sytem and Application, 2010, 2, 56-63 Publihed Online December 2010 in MECS (http://www.mec-pre.org/) Meauring and Evaluation on Priority Lane Shan Jiang Beijing Intitute of Technology,

More information

Application of single-step genomic evaluation for crossbred performance in pig 1

Application of single-step genomic evaluation for crossbred performance in pig 1 Application of ingle-tep genomic evaluation for crobred performance in pig 1 T. Xiang* B. Nielen G. Su* A. Legarra and O. F. Chritenen* *Center for Quantitative Genetic and Genomic Department of Molecular

More information

Safe Routes to School Engineering Study

Safe Routes to School Engineering Study Safe Route to School Brunwick Local School Ditrict Safe Route to School Plan City of Brunwick, Medina County, Ohio Hickory Ridge Elementary School Viintainer Middle School Edward Middle School Saint Ambroe

More information

Essential Ingredients for Heavy Orographic Rainfall and their Potential Application for Prediction

Essential Ingredients for Heavy Orographic Rainfall and their Potential Application for Prediction 7.6 Eential Ingredient for eavy Orographic Rainfall and their Potential Application for Prediction Yuh-Lang Lin, Sen Chiao, Jame A. Thurman and Michael L. Kaplan North Carolina State Univerity, Raleigh,

More information

Wave Crest Distributions: Observations and Second-Order Theory

Wave Crest Distributions: Observations and Second-Order Theory 1AUGUST 000 FORRISTALL 1931 Wave Cret Ditribution: Obervation and Second-Order Theory GEORGE Z. FORRISTALL Shell E&P Technology, Houton, Texa (Manucript received February 1999, in final form 14 September

More information

Scientia Iranica, Vol. 14, No. 4, pp 358{368 c Sharif University of Technology, August 2007 Research Note Evaluation of Empirically Derived PVT Proper

Scientia Iranica, Vol. 14, No. 4, pp 358{368 c Sharif University of Technology, August 2007 Research Note Evaluation of Empirically Derived PVT Proper Scientia Iranica Vol. 14 No. 4 pp 358{368 c Sharif Univerity of Technoloy Auut 2007 Reearch Note Evaluation of Empirically Derived PVT Propertie for Middle Eat Crude Oil M.N. Hemmati and R. Kharrat 1 PVT

More information

Surface Tension Measurement with an Optofluidic Sensor

Surface Tension Measurement with an Optofluidic Sensor 1t International Conference on Sening Technology November 1-, 005 Palmerton North, New Zealand Surface Tenion eaurement with an Optofluidic Senor Abtract Nam-Trung Nguyen, Sumantri Laemono, Franck Alexi

More information

generator's nameplate - Datasheet generator's nameplate - Datasheet

generator's nameplate - Datasheet generator's nameplate - Datasheet Åpen informajon Foweb: Wind plant parameter (2018-11) Englih verion of 'Foweb: Data for produkjonanlegg vindkraftverk parameterveileder' (page 1 of 7) www.tatnett.no/foweb Diclaimer: Thi document i an

More information

INFLUENCE OF THE EXHAUST GAS RECIRCULATION ON THE OXYGEN CONTENTS AND ITS EXCESS RATIO IN THE ENGINE COMBUSTION CHAMBER

INFLUENCE OF THE EXHAUST GAS RECIRCULATION ON THE OXYGEN CONTENTS AND ITS EXCESS RATIO IN THE ENGINE COMBUSTION CHAMBER Journal of KONES Powertrain and Tranport Vol. 0 No. 3 013 INFLUENCE OF THE EXHAUST GAS ECICULATION ON THE OXYGEN CONTENTS AND ITS EXCESS ATIO IN THE ENGINE COMBUSTION CHAMBE Stan Potrzednik Zbigniew mudka

More information

Experimental Investigation of Pressure Flushing Technique in Reservoir Storages

Experimental Investigation of Pressure Flushing Technique in Reservoir Storages Experimental Invetigation of Preure Fluhing Technique in Reervoir Storage M. E. MESKATI SAMIRZADI 1, A. A. DEGANI 1, T. SUMI, A. MOSAEDI 1 and M. MEFTA. 1 1 Dept. of Water Engineering, Gorgan Univerity

More information

North East Regional Newsletter December 2012

North East Regional Newsletter December 2012 North Eat Regional Newletter December 2012 Welcome to the December 2012 North Eat Regional Newletter, thi edition i full of club new, good new, opportunitie and development! Now the new regional league

More information

Cold Formed Steel Tension Members with Two and Three Staggered Bolts

Cold Formed Steel Tension Members with Two and Three Staggered Bolts Miouri Univerity of Science and Technoloy Scholar' Mine International Specialty Conference on Cold- Formed Steel Structure (2010) - 20th International Specialty Conference on Cold-Formed Steel Structure

More information

Three New Methods to Find Initial Basic Feasible. Solution of Transportation Problems

Three New Methods to Find Initial Basic Feasible. Solution of Transportation Problems Applied Mathematical Sciences, Vol. 11, 2017, no. 37, 1803-1814 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ams.2017.75178 Three New Methods to Find Initial Basic Feasible Solution of Transportation

More information

Total 0/30. 0/1 points Walker3 2.P.068. [544577]

Total 0/30. 0/1 points Walker3 2.P.068. [544577] 9/9/13 Aignent Previewer Phy 111.HW#2b (3168643) Current Score: 0/30 Due: Wed Sep 11 2013 10:30 AM PDT Quetion Point 1 2 3 4 5 6 7 8 9 10 11 0/1 0/2 0/3 0/3 0/3 0/3 0/1 0/1 0/1 0/6 0/6 Total 0/30 Decription

More information

A New Surface Model for Cyclone Anticyclone Asymmetry

A New Surface Model for Cyclone Anticyclone Asymmetry VOL. 59, NO. 16 JOURNAL OF THE ATMOSPHERIC SCIENCES 15 AUGUST 2002 A New Surface Model for Cyclone Anticyclone Aymmetry GREGORY J. HAKIM Univerity of Wahington, Seattle, Wahington CHRIS SNYDER National

More information

2011 SEG SEG San Antonio 2011 Annual Meeting 3377

2011 SEG SEG San Antonio 2011 Annual Meeting 3377 Source-receiver pretack depth migration uing dreamlet Bangyu Wu *, Ru-han Wu and Jinghuai Gao Modeling and Imaging Laboratory, IGPP, Univerity of California, Santa Cruz Summary The dreamlet method add

More information

CAL. V657, VD57 CHRONOGRAPH

CAL. V657, VD57 CHRONOGRAPH CL. V657, VD57 TIME/CLENDR l Hour, minute and econd hand l Date diplayed in numeral ENGLISH l Meaure up to 60 minute in 1/10 econd increment l Split time meaurement DISPLY ND /UTTONS SCREW DOWN [for model

More information

FORUMS INSIGHTS BLOG VIDEOS PHYSICS NEWS INFO SEARCH Forums Physics Classical Physics

FORUMS INSIGHTS BLOG VIDEOS PHYSICS NEWS INFO SEARCH Forums Physics Classical Physics FORUMS INSIGHTS BLOG VIDEOS PHYSICS NEWS INFO SEARCH Forum Phyi Claial Phyi PF thrive by your haring of our ommunity with your friend, family and oial media. If you do, tell me and I'll give you Gold Memberhip.

More information

Self-Start Performance Evaluation in Darrieus-Type Vertical Axis Wind Turbines: Methodology and Computational Tool Applied to Symmetrical Airfoils

Self-Start Performance Evaluation in Darrieus-Type Vertical Axis Wind Turbines: Methodology and Computational Tool Applied to Symmetrical Airfoils Self-Start Performance Evaluation in Darrieu-Type Vertical Axi Wind Turbine: Methodology and Computational Tool Applied to Symmetrical Airfoil N.C. Batita 1, R. Melício 1, J.C.O. Matia 1,2 and J.P.S. Catalão

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Thi document i downloaded from DR-NTU, Nanyang Technological Univerity Library, Singapore. Title A microfluidic enor for dynamic urface tenion meaurement Author() Citation Nguyen, Nam-Trung; Laemono, Sumantri;

More information

Projectile Motion. Physics 6A. Prepared by Vince Zaccone For Campus Learning Assistance Services at UCSB

Projectile Motion. Physics 6A. Prepared by Vince Zaccone For Campus Learning Assistance Services at UCSB Projectile Motion Phic 6A Projectile motion i a combination of Horizontal and Vertical motion We ue eparate et of formula for each, but both motion happen imultaneoul. Horizontal In the cae of projectile,

More information

MACHINE MILKING AND DAILY CHANGES OF COW S TEAT CONDITION

MACHINE MILKING AND DAILY CHANGES OF COW S TEAT CONDITION 20 th Int. Symp. Animal Science Day, Kranjka gora, Slovenia, Sept. 19 th 21 t, 2012. COBISS: 1.08 Agri category code: L01 ACHINE ILKING AND DAILY CHANGES OF COW S TEAT CONDITION iomir STOJNOVIĆ 1, Damir

More information

Complete Streets: Best Policy and Implementation Practices. Barbara McCann and Suzanne Rynne, Editors. American Planning Association

Complete Streets: Best Policy and Implementation Practices. Barbara McCann and Suzanne Rynne, Editors. American Planning Association Complete Street: Bet Policy and Implementation Practice Barbara McCann and Suzanne Rynne, Editor American Planning Aociation Planning Adviory Service Report Number 559 Complete Street: Bet Policy and Implementation

More information

Effect of Altering Handle Position of a Rolling Walker on Gait in Children with Cerebral Palsy

Effect of Altering Handle Position of a Rolling Walker on Gait in Children with Cerebral Palsy Effect of Altering Handle Poition of a Rolling Walker on Gait in Children with Cerebral Paly The purpoe of thi tudy wa to determine whether altering the handle poition on a rolling walker would affect

More information

A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems

A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems The First International Workshop on Cyber-Physical Networking Systems A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems ChrisY.T.Ma Advanced Digital Sciences Center Illinois at Singapore

More information

U.S. UNCONVENTIONAL MONETARY POLICY AND TRANSMISSION TO EMERGING MARKET ECONOMIES. David Bowman, Juan M. Londono and Horacio Sapriza

U.S. UNCONVENTIONAL MONETARY POLICY AND TRANSMISSION TO EMERGING MARKET ECONOMIES. David Bowman, Juan M. Londono and Horacio Sapriza U.S. UNCONVENTIONAL MONETARY POLICY AND TRANSMISSION TO EMERGING MARKET ECONOMIES 1 David Bowman, Juan M. Londono and Horacio Sapriza Dicuion by Emmanuel C Mamatzaki Univerity of Suex Fifth BIS Conultative

More information

Redirection of center-of-mass velocity during the step-to-step transition of human walking

Redirection of center-of-mass velocity during the step-to-step transition of human walking 2668 The Journal of Experimental Biology 212, 2668-2678 Publihed by The Company of Biologit 29 doi:1.1242/jeb.27581 Redirection of center-of-ma elocity during the tep-to-tep tranition of human walking

More information

DESIGN & MODIFICATION OF ROLLERS IN TRACKS OF SURFACE DRILLING MACHINES

DESIGN & MODIFICATION OF ROLLERS IN TRACKS OF SURFACE DRILLING MACHINES DESIGN & ODIFICATION OF ROLLERS IN TRACKS OF SURFACE DRILLING ACHINES r. S.N. Shinde P.D.V.V.P.C.O.E.Ahmednagar Prof. R.R. Navthar Aociate Profeor Dept. of ech Engg. P.D.V.V.P.C.O.E.Ahmednagar ABSTRACT

More information

Turbulence and waves in numerically simulated slope flows

Turbulence and waves in numerically simulated slope flows 9 ème Congrè Françai de Mécanique Mareille, 4-8 août 9 Turbulence and wave in numerically imulated lope flow E. FEDOROVICH, A. SHAPIRO School of Meteorology, Univertiy of Oklahoma, David L. Boren Blvd.,

More information

CAPSIZING OF VESSELS IN FOLLOWING SEAS

CAPSIZING OF VESSELS IN FOLLOWING SEAS CAPSIZING OF VESSELS IN FOLLOWING SEAS By: M Reniton For Preentation at AQUAMARINE '95 OCTOBER 1995 REPORT AMECRC C 95/17 AUSTRALIAN MARITIME ENGINEERING CRC LIMITED ACN 060 208 577 Capizing of Veel in

More information

draft 5.2 CITY OF LARKSPUR

draft 5.2 CITY OF LARKSPUR 5 Acce, Circulation and ing A dicued in the Viion Chapter, thi Plan take an integrated land ue and tranportation approach which provide flexibility and monitor development o a to avoid or minimize traffic

More information

CORPS OF ENGINEERS, U. S. ARMY PLANS FOR IMPROVEMENT OF NAVIGATION CONDITIONS GREENVILLE BRIDGE, MISSISSIPPI RIVER MODEL INVESTIGATION

CORPS OF ENGINEERS, U. S. ARMY PLANS FOR IMPROVEMENT OF NAVIGATION CONDITIONS GREENVILLE BRIDGE, MISSISSIPPI RIVER MODEL INVESTIGATION TA7,vJ31 (\0 2..-.:;b c CORPS OF ENGINEERS, U. S. ARMY PLANS FOR IMPROVEMENT OF NAVIGATION CONDITIONS AT GREENVILLE BRIDGE, MISSISSIPPI RIVER MODEL INVESTIGATION TECHNICAL MEMORANDUM NO. 2 366 CONDUCTED

More information

Optimizing Cyclist Parking in a Closed System

Optimizing Cyclist Parking in a Closed System Optimizing Cyclist Parking in a Closed System Letu Qingge, Killian Smith Gianforte School of Computing, Montana State University, Bozeman, MT 59717, USA Abstract. In this paper, we consider the two different

More information

Gamblers Favor Skewness, Not Risk: Further Evidence from United States Lottery Games

Gamblers Favor Skewness, Not Risk: Further Evidence from United States Lottery Games Gamblers Favor Skewness, Not Risk: Further Evidence from United States Lottery Games Thomas A. Garrett Russell S. Sobel Department of Economics West Virginia University Morgantown, West Virginia 26506

More information

Name: Answer Key Date: Regents Physics. Projectiles

Name: Answer Key Date: Regents Physics. Projectiles Nae: Anwer Key Date: Regent Phyic Tet # 5 Review 1. Equation to know: Projectile (1) A y = Ainθ () A = Acoθ Δv vf vi vf + vi (3) a= = (4) vavg = (5) d=vit+½at Δ t tf ti (6) v f =vi+at (7) vf =vi +ad. Ter

More information

A IMPROVED VOGEL S APPROXIMATIO METHOD FOR THE TRA SPORTATIO PROBLEM. Serdar Korukoğlu 1 and Serkan Ballı 2.

A IMPROVED VOGEL S APPROXIMATIO METHOD FOR THE TRA SPORTATIO PROBLEM. Serdar Korukoğlu 1 and Serkan Ballı 2. Mathematical and Computational Applications, Vol. 16, No. 2, pp. 370-381, 2011. Association for Scientific Research A IMPROVED VOGEL S APPROXIMATIO METHOD FOR THE TRA SPORTATIO PROBLEM Serdar Korukoğlu

More information

CAL. VK63, VK67, VK73 CHRONOGRAPH

CAL. VK63, VK67, VK73 CHRONOGRAPH CL. VK63, VK67, VK73 TIME/CLENDR l Hour and with mall econd hand l Small 24-hour hand (VK63 & VK73 only) l Date diplayed in numeral ENGLISH l Meaure up to minute or hour in 1/5 econd increment [VK63] Hour

More information

A Method for Estimating Sound Speed and the Void Fraction of Bubbles from Sub-Bottom Sonar Images of Gassy Seabeds. T.G. Leighton

A Method for Estimating Sound Speed and the Void Fraction of Bubbles from Sub-Bottom Sonar Images of Gassy Seabeds. T.G. Leighton A Method for Etimating Sound Speed and the Void Fraction of Bubble from Sub-Bottom Sonar Image of Gay Seabed T.G. Leighton ISVR Technical Report No 320 December 2007 SCIENTIFIC PUBLICATIONS BY THE ISVR

More information

A Review on Experimental Analysis for Rectangular Perforated Fin Array

A Review on Experimental Analysis for Rectangular Perforated Fin Array A Review on Experimental Analyi for Rectangular Perforated Fin Array I.N. Wankhede 1, N. P. Salunke 2 1 PG Student, Mechanical Department, RCPIT Shirpur, Maharahtra, India 2 H. O. D., Mechanical Department,RCPIT

More information

LOCOMOTION CONTROL CYCLES ADAPTED FOR DISABILITIES IN HEXAPOD ROBOTS

LOCOMOTION CONTROL CYCLES ADAPTED FOR DISABILITIES IN HEXAPOD ROBOTS LOCOMOTION CONTROL CYCLES ADAPTED FOR DISABILITIES IN HEXAPOD ROBOTS GARY B. PARKER and INGO CYLIAX Department of Computer Science, Indiana University, Bloomington, IN 47405 gaparker@cs.indiana.edu, cyliax@cs.indiana.edu

More information

Proceedings: WORKSHOP ON MARINE "FOR-HIRE" RECREATIONAL FISHERIES SURVEY METHODOLOGY SEPTEMBER 1992

Proceedings: WORKSHOP ON MARINE FOR-HIRE RECREATIONAL FISHERIES SURVEY METHODOLOGY SEPTEMBER 1992 Proceeding: WORKSHOP ON MARINE "FORHIRE" RECREATIONAL FISHERIES SURVEY METHODOLOGY SEPTEMBER 1992 PROCEEDINGS: WORKSHOP ON MARINE 11 FORHIRE 11 RECREATIONAL FISHERIES SURVEY METHODOLOGY conducted by the

More information

Prediction Market and Parimutuel Mechanism

Prediction Market and Parimutuel Mechanism Prediction Market and Parimutuel Mechanism Yinyu Ye MS&E and ICME Stanford University Joint work with Agrawal, Peters, So and Wang Math. of Ranking, AIM, 2 Outline World-Cup Betting Example Market for

More information

CAL. VK68 CHRONOGRAPH

CAL. VK68 CHRONOGRAPH CL. VK68 CHRONOGRPH TIME/CLENDR l Hour and minute hand with mall econd and 24-hour hand l Date diplayed in numeral ENGLISH CHRONOGRPH l Meaure up to minute in 1/5 econd increment DISPLY ND CROWN/UTTONS

More information

ABSTRACT: Ocean wave energy contains the largest energy density

ABSTRACT: Ocean wave energy contains the largest energy density Deign and Modelling of Wave Energy Converter and Power Take-Off Sytem DESIGN AND MODELLING OF WAVE ENERGY CONVERTER AND POWER TAKE-OFF SYSTEM E. Chuah 1, K. Magawaran and M.Z. Haan 3 1 School of Engineering,

More information

The indications for home mechanical ventilation. Evaluation of the user-friendliness of 11 home mechanical ventilators

The indications for home mechanical ventilation. Evaluation of the user-friendliness of 11 home mechanical ventilators Eur Repir J 26; 27: 1236 1243 DOI: 1.1183/931936.6.7885 CopyrightßERS Journal Ltd 26 Evaluation of the uer-friendline of 11 home mechanical ventilator J. Gonzalez-Bermejo*, V. Laplanche*, F.E. Hueini #,

More information

MANOEUVRABILITY-BASED CRITICAL TIME FOR PREVENTING CLOSE-QUARTERS SITUATIONS

MANOEUVRABILITY-BASED CRITICAL TIME FOR PREVENTING CLOSE-QUARTERS SITUATIONS Journal of Marine Science and Technology, Vol. 25, No. 3,. 249-258 (2017) 249 DOI: 10.6119/JMST-016-1207-2 MANOEUVRABILITY-BASED CRITICAL TIME FOR PREVENTING CLOSE-QUARTERS SITUATIONS Chi-Cheng Tai 1,

More information

intended velocity ( u k arm movements

intended velocity ( u k arm movements Fig. A Complete Brain-Machine Interface B Human Subjects Closed-Loop Simulator ensemble action potentials (n k ) ensemble action potentials (n k ) primary motor cortex simulated primary motor cortex neuroprosthetic

More information

CAL. VD50 1/10 SECOND RETROGRADE CHRONOGRAPH

CAL. VD50 1/10 SECOND RETROGRADE CHRONOGRAPH CL. VD50 1/10 SECOND RETROGRDE CHRONOGRPH TIME/CLENDR l Hour, minute and econd hand l Date diplayed in numeral STOPWTCH l Meaure up to 60 minute in 1/10 econd increment. ENGLISH DISPLY ND /UTTONS SCREW

More information

Protecting Wildlife under Imperfect Observation

Protecting Wildlife under Imperfect Observation The Workshops of the Thirtieth AAAI Conference on Artificial Intelligence Computer Poker and Imperfect Information Games: Technical Report WS-16-06 Protecting Wildlife under Imperfect Observation Thanh

More information

#19 MONITORING AND PREDICTING PEDESTRIAN BEHAVIOR USING TRAFFIC CAMERAS

#19 MONITORING AND PREDICTING PEDESTRIAN BEHAVIOR USING TRAFFIC CAMERAS #19 MONITORING AND PREDICTING PEDESTRIAN BEHAVIOR USING TRAFFIC CAMERAS Final Research Report Luis E. Navarro-Serment, Ph.D. The Robotics Institute Carnegie Mellon University November 25, 2018. Disclaimer

More information

Hybrid Airfoil Design Method to Simulate Full-Scale Ice Accretion Throughout a Given a Range

Hybrid Airfoil Design Method to Simulate Full-Scale Ice Accretion Throughout a Given a Range JOURNAL OF AIRCRAFf Vol. 35, No.2, March-April 1998 Hybrid Airfoil Deign Method to Simulate Full-Scale Ice Accretion Throughout a Given a Range Farooq Saeed,* MichaelS. Selig.t and Michael B. Bragg:j:

More information

Basketball field goal percentage prediction model research and application based on BP neural network

Basketball field goal percentage prediction model research and application based on BP neural network ISSN : 0974-7435 Volume 10 Issue 4 BTAIJ, 10(4), 2014 [819-823] Basketball field goal percentage prediction model research and application based on BP neural network Jijun Guo Department of Physical Education,

More information

Murdoch University Melville Football Club

Murdoch University Melville Football Club CODE OF CONDUCT OF THE Murdoch Univerity Melville Football Club Thi code of conduct bind all member, and for junior member, alo their parent, by virtue of their memberhip of the Club. A breach of thi code

More information

CSE 3401: Intro to AI & LP Uninformed Search II

CSE 3401: Intro to AI & LP Uninformed Search II CSE 3401: Intro to AI & LP Uninformed Search II Required Readings: R & N Chapter 3, Sec. 1-4. 1 {Arad}, {Zerind, Timisoara, Sibiu}, {Zerind, Timisoara, Arad, Oradea, Fagaras, RimnicuVilcea }, {Zerind,

More information

Author s Name Name of the Paper Session. Positioning Committee. Marine Technology Society. DYNAMIC POSITIONING CONFERENCE September 18-19, 2001

Author s Name Name of the Paper Session. Positioning Committee. Marine Technology Society. DYNAMIC POSITIONING CONFERENCE September 18-19, 2001 Author s Name Name of the Paper Session PDynamic Positioning Committee Marine Technology Society DYNAMIC POSITIONING CONFERENCE September 18-19, 2001 POWER PLANT SESSION A New Concept for Fuel Tight DP

More information

Application of Dijkstra s Algorithm in the Evacuation System Utilizing Exit Signs

Application of Dijkstra s Algorithm in the Evacuation System Utilizing Exit Signs Application of Dijkstra s Algorithm in the Evacuation System Utilizing Exit Signs Jehyun Cho a, Ghang Lee a, Jongsung Won a and Eunseo Ryu a a Dept. of Architectural Engineering, University of Yonsei,

More information

Demand AssessmentRink BRUNSWICK LANDING ICE ARENA 3/16/2017

Demand AssessmentRink BRUNSWICK LANDING ICE ARENA 3/16/2017 3/16/2017 BRUNSWICK LANDING ICE ARENA Bill Patteron Midcoat Youth Hockey Aociation ltphockey@yahoo.com I 272-5141 Demand AementRink 1. Waton Arena overubcribed 2. Impact on program participant 3. Opportunitie

More information

Some rankings for the Athens Olympic Games using DEA models with a constant input

Some rankings for the Athens Olympic Games using DEA models with a constant input J.S. MELLO et al. / Invetigação Operacional, 28 (2008) 77-89 77 Some ranking for the Athen Olympic Game uing DEA model with a contant input João Carlo Correia Baptita Soare de Mello Lidia Angulo Meza Brenda

More information

Chapter 14. Gas-liquid Transfer

Chapter 14. Gas-liquid Transfer Chapter 14 Ga-liquid Tranfer 14.1 GAS TRANSFER By ga tranfer i meant the ma movement of ga to or from olution, which occur when a liquid urface i in contact with a ga phae with which it i not in equilibrium.

More information

Corinthian Yacht Club of Tacoma General Sailing Instructions 2019

Corinthian Yacht Club of Tacoma General Sailing Instructions 2019 Corinthian Yacht Club of Tacoma General Sailing Intruction 2019 On behalf of the Corinthian Yacht Club of Tacoma, we would like to thank you for participating in our racing program for 2019. Corinthian

More information

TECHNICAL BID T Subject : Supply of Pressure Gauges for Unit : 1 to 5 GSECL TPS Ukai. EMD Demand Draft No. Date :

TECHNICAL BID T Subject : Supply of Pressure Gauges for Unit : 1 to 5 GSECL TPS Ukai. EMD Demand Draft No. Date : GUJARAT STATE ELECTRICITY CORPORATION LIMITED Ukai Dam, Taluka: Fort Songadh, Dit:Tapi 394680. Ph. 91-64-3315, 3357 Fax: 91-64-33300, 33315.e-mail: ukaitp@gebmail.com. Webite: www.gecl.in CIN: U40100GJ1993SGC019988

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 2 We re going to look at a tennis game Assume two players (Federer and Nadal) Where Nadal is at the net Federer RIGHT Nadal right Viewpoint LEFT le- 3

More information

Ocean Fishing Fleet Scheduling Path Optimization Model Research. Based On Improved Ant Colony Algorithm

Ocean Fishing Fleet Scheduling Path Optimization Model Research. Based On Improved Ant Colony Algorithm 4th International Conference on Sensors, Measurement and Intelligent Materials (ICSMIM 205) Ocean Fishing Fleet Scheduling Path Optimization Model Research Based On Improved Ant Colony Algorithm Li Jia-lin2,

More information

CS472 Foundations of Artificial Intelligence. Final Exam December 19, :30pm

CS472 Foundations of Artificial Intelligence. Final Exam December 19, :30pm CS472 Foundations of Artificial Intelligence Final Exam December 19, 2003 12-2:30pm Name: (Q exam takers should write their Number instead!!!) Instructions: You have 2.5 hours to complete this exam. The

More information

MIKE NET AND RELNET: WHICH APPROACH TO RELIABILITY ANALYSIS IS BETTER?

MIKE NET AND RELNET: WHICH APPROACH TO RELIABILITY ANALYSIS IS BETTER? MIKE NET AND RELNET: WIC APPROAC TO RELIABILITY ANALYSIS IS BETTER? Alexandr Andrianov Water and Environmental Engineering, Department of Chemical Engineering, Lund University P.O. Box 124, SE-221 00 Lund,

More information

Product Decomposition in Supply Chain Planning

Product Decomposition in Supply Chain Planning Mario R. Eden, Marianthi Ierapetritou and Gavin P. Towler (Editors) Proceedings of the 13 th International Symposium on Process Systems Engineering PSE 2018 July 1-5, 2018, San Diego, California, USA 2018

More information