37 research outputs found

    Inspection and crime prevention : an evolutionary perspective

    Get PDF
    In this paper, we analyse inspection games with an evolutionary perspective. In our evolutionary inspection game with a large population, each individual is not a rational payoff maximiser, but periodically updates his strategy if he perceives that other individuals' strategies are more successful than his own, namely strategies are subject to the evolutionary pressure. We develop this game into a few directions. Firstly, social norms are incorporated into the game and we analyse how social norms may influence individuals' propensity to engage in criminal behaviour. Secondly, a forward-looking inspector is considered, namely, the inspector chooses the level of law enforcement whilst taking into account the effect that this choice will have on future crime rates. Finally, the game is extended to the one with continuous strategy spaces

    Quasi-regular sequences and optimal schedules for security games

    Get PDF
    We study security games in which a defender commits to a mixed strategy for protecting a finite set of targets of different values. An attacker, knowing the defender's strategy, chooses which target to attack and for how long. If the attacker spends time tt at a target ii of value αi\alpha_i, and if he leaves before the defender visits the target, his utility is t⋅αit \cdot \alpha_i ; if the defender visits before he leaves, his utility is 0. The defender's goal is to minimize the attacker's utility. The defender's strategy consists of a schedule for visiting the targets; it takes her unit time to switch between targets. Such games are a simplified model of a number of real-world scenarios such as protecting computer networks from intruders, crops from thieves, etc. We show that optimal defender play for this continuous time security games reduces to the solution of a combinatorial question regarding the existence of infinite sequences over a finite alphabet, with the following properties for each symbol ii: (1) ii constitutes a prescribed fraction pip_i of the sequence. (2) The occurrences of ii are spread apart close to evenly, in that the ratio of the longest to shortest interval between consecutive occurrences is bounded by a parameter KK. We call such sequences KK-quasi-regular. We show that, surprisingly, 22-quasi-regular sequences suffice for optimal defender play. What is more, even randomized 22-quasi-regular sequences suffice for optimality. We show that such sequences always exist, and can be calculated efficiently. The question of the least KK for which deterministic KK-quasi-regular sequences exist is fascinating. Using an ergodic theoretical approach, we show that deterministic 33-quasi-regular sequences always exist. For 2≤K<32 \leq K < 3 we do not know whether deterministic KK-quasi-regular sequences always exist.Comment: to appear in Proc. of SODA 201

    Unit-Contingent Power Purchase Agreement and Asymmetric Information about Plant Outage

    Full text link
    This paper analyzes a unit-contingent power purchase agreement between an electricity distributor and a power plant. Under such a contract the distributor pays the plant a fixed price if the plant is operational and nothing if plant outage occurs. Pricing a unit-contingent contract is complicated by the fact that the plant’s true status is its private information. The difference between the electricity spot price and the unit-contingent contract price provides an incentive for the plant to misreport its status and earn profit at the distributor’s expense. To prevent misreporting, the distributor may inspect the plant and levy penalties if misreporting is discovered. We find that some type of misreporting under certain circumstances can benefit both the plant and the distributor, because it serves as a risk-allocation mechanism between the two parties. We show that such a risk-allocation mechanism is equivalent to using state-contingent options and prohibiting misreporting.http://deepblue.lib.umich.edu/bitstream/2027.42/61470/1/1120_OWu.pdfhttp://deepblue.lib.umich.edu/bitstream/2027.42/61470/4/1120_may09_OWu.pdfhttp://deepblue.lib.umich.edu/bitstream/2027.42/61470/6/1120_Aug11_Wu.pdfhttp://deepblue.lib.umich.edu/bitstream/2027.42/61470/8/1120_Wu_Oct11.pd

    Applications of delay time theory to maintenance practice of complex plant

    Get PDF
    This thesis is concerned with investigating and understanding the role andconsequence of different modelling options and parameter estimation options formodelling a complex plant. As systems become more complicated and required newtechnologies and methodologies, more sophisticated maintenance models and controlpolicies are need to solve the maintenance problems. The initial chapter introduces thereview of previous work on a single component system and multi-component system.Although in recent years there has been a shift in the maintenance literature fromconsideration of single items to systems composed of several components, so far only afew papers have tackled the modelling of actual multi-component plant. In the thirdchapter, delay time concept and analysis technique have been presented. Ofparticularly importance are parameter estimation methods, namely the objective methodand the subjective methods. In the fourth chapter the component PM model and thesystem PM model for downtimes and costs based upon various PM policies arediscussed. The key options within maintenance modelling are to determine regularMinspection periods for the system modelled as a whole, and to determine the periodsfor the plant as a set of separate component models. An extension to the downtimemodel is presented for the case when the downtime due to failures within system is notsmall, and impacts upon the estimate of the number of failures arising over a specifiedtime zone. In the following chapter, we address parameter estimation methods usingsimulated data, and assess the ability of estimation techniques to capture the trueparameter values. Particular attention is paid to the problem arising during theparameter estimating process because of the inadequate recording of PM data andimplied correlation between model parameters. Finally, a case study is presented ofmaintenance modelling of production plant in a local company with view to improvingcurrent practice. The model developed is based upon the delay time concept wherebecause of an absence of PM data, using the results of earlier chapters, the processparameters and the delay time distribution were estimated from failure data only using the method of maximum likelihood. The modelling was repeated based uponsubjective assessmentosf parameter,a nd considerablec onsistencyw ith the objectivelybased case obtained. For the plant study, modelling indicated the current PMinspection program was ineffective. A snap-shot approach is then applied to assessother ways of reducing the downtime, and the possibility of improving the PMinspection practice. This leads to readily adapted improvements
    corecore