2,205 research outputs found
SOPHIA
The Iraqi Insurgency (2003β2011) has commonly been characterized as demonstrating the tendency for violence to cluster and diffuse at the local level. Recent research has demonstrated that insurgent attacks in Iraq cluster in time and space in a manner similar to that observed for the spread of a disease. The current study employs a variety of approaches common to the scientific study of criminal activities to advance our understanding of the correlates of observed patterns of the incidence and contagion of insurgent attacks. We hypothesize that the precise patterns will vary from one place to another, but that more attacks will occur in areas that are heavily populated, where coalition forces are active, and along road networks. To test these hypotheses, we use a fishnet to build a geographical model of Baghdad that disaggregates the city into more than 3000 grid cell locations. A number of logistic regression models with spatial and temporal lags are employed to explore patterns of local escalation and diffusion. These models demonstrate the validity of arguments under each of three models but suggest, overall, that risk heterogeneity arguments provide the most compelling and consistent account of the location of insurgency. In particular, the results demonstrate that violence is most likely at locations with greater population levels, higher density of roads, and military garrisons
Using casualty assessment and weighted hit rates to calibrate spatial patterns of Boko Haram insurgency for emergency response preparedness
Since the beginning of the current millennium, Boko Haram has terrorised the residents of Northern Nigeria with devastating and high profile campaigns resuming in 2010. First responders struggle to cope with planning for and responding to the aftermath of these attacks. This paper describes analysis that can help emergency services pre-empt the geography and magnitude of susceptibility to attacks and the potential of the terrorists to generate severe attacks. The data used for the study were five years of terrorist activities. Results suggest that the efficiency of Boko Haram is not necessarily random and that attacks are generally well calculated to hit communities with disproportionate concentrations of vulnerable residents. The analysis is the first attempt to examine how a spatial segmentation framework might offer insight and intelligence towards understanding the configuration of terrorism for operational response
Deep Neural Network for Anomaly Detection
νμλ
Όλ¬Έ(μμ¬)--μμΈλνκ΅ λνμ :곡과λν νλκ³Όμ κΈ°μ κ²½μΒ·κ²½μ Β·μ μ±
μ 곡,2019. 8. ν©μ€μ.Human insurgency is one of the prevalent, incessant, and threatening events happening worldwide. Among many topics of developmental studies, one of the seminal research focuses is to understand and model armed conflicts, which have been suspected to be linked to the capacity of a country in various ways, such as food security, child nutrition, economic welfare, and even environmental issues. Mapping human insurgencies is, therefore, imperative.
To cope with the atrocities, there have been previous attempts to uncover the latent patterns of human insurgent incidents. The salient behavior of these insurgencies follows the 'power-law' distribution, which exhibits a heavy-tail. This feature implies that events far from the norm are nontrivial when compared with the normal distribution, where essentially no weight is far from the mean. This pattern indicates that the insurgencies are the few incidents happening with relentless severity, while the majority of the events occur with mere severity. To fully exploit the latent behavior of human insurgencies, this research focuses on the anomalies β the events that have a great number of fatalities but little probability of occurrence, lying on the heavy tailβ.
To detect such anomalies, a novel approach, variational autoencoder, is used. The seminal essence of this model lies in processing high-volume data and capturing their non-linearity, which makes data-driven detection possible. The results show that the trained model successfully detects anomalies when given test data, showing no false negatives (Type III error) or false positives (Type I error). This predictive model, if well deployed, can provide humanitarian aid agencies and governments the ability to efficiently allocate resources,
reducing wastes and mitigating the level of conflict through targeted preventive policies무λ ₯ μΆ©λ, κΈμ§μ μΈ ν
λ¬ λ±μ ν¬ν¨νλ μΈκ° νλ± (Human Insurgency)μ μ§κΈκ» λ§μ°νκ³ λμμμ΄ μ μΈκ³μ μΌλ‘ μνμ μ£Όλ νμμ΄λ€. μΈκ³ κ°λ° λΆμΌμ μ¬λ¬ μ£Όμ μ€ κΈ°κ΄ λ° μ‘°μ§μ μ£Όμν κ΄μ¬μ μ΄λ¬ν μΆ©λμ μ΄ν΄νκ³ λͺ¨λΈ νλ κ²μ΄μλ€. μ΄λ¬ν νμμ ν 체μ μ μλ μ보, μλ μμ, κ²½μ μ , κ·Έλ¦¬κ³ νκ²½μ λ¬Έμ μλ μ°κ΄μ΄ λλ κ²μΌλ‘ κ°μ£Όλκ³ μλ€. λ°λΌμ 무λ ₯ μΆ©λμ ν¬ν¨ν μΈκ° νλ± νμμ 맀ννλ κ²μ νμμ μΌλ‘ μꡬλκ³ μλ€.
κΈ°μ‘΄μ μ°κ΅¬λ€μμλ μ΄λ° νμλ€μ μ¨μ΄ μλ ν¨ν΄μ λΆμνκ³ μ νλ μλλ€μ΄ μμλ€. κ·Έμ€ λλλ¬μ§ νΉμ§μ λ©±λ²μΉ (power law) λΆν¬λ₯Ό λ°λ₯Έλ€λ κ²μ΄λ€. λ©±λ²μΉ λΆν¬λ κΌ¬λ¦¬κ° κΈ΄ ννλ₯Ό κ°μ§κ³ μλ€. κΈ°μ‘΄ μ κ·λΆν¬μλ λ¬λ¦¬, λ©±λ²μΉ λΆν¬λ μ€μ¬μμ λ©λ¦¬ μμΉνκ³ μλ νμμ΄ λ μ΄μ κ°μν μ‘΄μ¬νλ κ²μ΄ μλλΌ, μλΉν μ‘΄μ¬νλ€κ³ λ³Ό μ μλ€. μ΄λ¬ν κΈμ¦ κ·μΉμ μμμ μ¬κ±΄λ€μ΄ μμ νλ₯ λ‘ ν° κ·λͺ¨λ‘ λ°μνλ λ°λ©΄, λ€μμ μ¬κ±΄λ€μ μμ κ·λͺ¨λ‘ λ°μνλ€λ κ²μ μμνκ³ μλ€. μ΄λ¬ν κ·μΉλ€μ νμ©νμ¬, λ³Έ μ°κ΅¬μμλ νλ±μ 맀ννκΈ° μν΄ λΉμ΄μμ μ¬κ±΄λ€μ μ΄μ μ λ§μΆλ€. λΉμ΄μμ μ¬κ±΄λ€μ λ©±λ²μΉμ 꼬리μ μμΉνλ, κ·λͺ¨κ° ν¬μ§λ§ μμ νλ₯ λ‘ λ°μνλ μ¬κ±΄λ€μ μΌμ»«λλ€.
μ΄λ¬ν λΉμ΄μμ μ¬κ±΄λ€μ νλ³νκΈ° μν΄, Variational Autoencoder (VAE)λΌλ μλ‘μ΄ λ°©λ²λ‘ μ λμ
νμλ€. μ΄ λͺ¨λΈμ μ₯μ μ λ§μ λμ λ°μ΄ν°λ₯Ό μ²λ¦¬νκ³ , λΉ μ νμ μΈ κ΄κ³λ€μ ν¬μ°©ν μ μλ€λ κ²μ΄λ€. μ΄λ¬ν λ°©λ²μΌλ‘ data-driven νλ³μ ν μ μκ² νλ€. μ΄λ¬ν λͺ¨λΈλ‘ νλ ¨ν κ²°κ³Ό, False Negative (Type III error)μ False Positive (Type I error)μ΄ λ°μνμ§ μμκ³ , λΉμ΄μμ μΈ μ¬κ±΄λ€μ μ±κ³΅μ μΌλ‘ νλ³ν μ μμλ€. λ³Έ μ°κ΅¬μμλ μ΄λ¬ν λͺ¨λΈμ μ μν¨μΌλ‘ μ€μ μΈλμ£Όμ λ¨μ²΄λ μ λΆμ μ μ©λμμ κ²½μ°, μ νλ μμμ ν¨μ¨μ μΌλ‘ λ°°μΉνμ¬ ν₯ν νλ± κ·λͺ¨λ₯Ό μνν μ μλ€κ³ λ³Έλ€.Abstract i
Contents iii
List of Tables v
List of Figures vi
Chapter 1. Introduction 1
Chapter 2. Literature Review 5
2.1 Human Insurgency 5
2.1.1 Definition of Human Insurgency 7
2.2 Predictive Models of Human Insurgency 8
2.2.1 The limitation of previous literature 10
2.3 Latent Behavior of Human Insurgency 10
2.4 Anomaly Detection 12
2.4.1 Anomaly Detection Methods 13
Chapter 3. Methodology and Data 15
3.1 Model 15
3.1.1 Variational Inference 15
3.1.2 Autoencoder 17
3.1.3 Variational Autoencoder (VAE) 18
3.2 VAE Anomaly detection 23
3.3 Analysis Sequence 25
3.4 Data Description 26
Chapter 4. Result 31
4.1 Reconstruction Error 31
4.2 Performance Analysis 33
4.2.1 Accuracy 34
4.2.2 ROC (Receiver Operating Characteristics) 35
4.2.3 Precision 36
4.2.4 Recall (Sensitivity) 37
4.2.5 Precision vs Recall 38
Chapter 5. Discussion and Conclusion 40
5.1 Implication 40
5.2 Limitations 41
5.3 Further Research 42
Bibliography 43
Abstract (Korean) 51Maste
The geo-temporal evolution of violence in civil conflicts
Existing works on diffusion fail to account for the incapacitating effects conflict events may have on the operational capability of the combatant sides and how these effects may determine the evolution of a conflict. I hypothesize that it is those events with losses on the state side that are likely to be associated with geo-temporal spillovers, whereas events with insurgency losses are less likely to be associated with future mayhem in their vicinity. To test my arguments, I first introduce a new, comprehensive and detailed event dataset on the long-running civil conflict in Turkey. The Turkish StateβPKK Conflict Event Database (TPCONED) includes the exact date and county-level location for the fatal events of the armed conflict between the Turkish state and the rebel organization PKK since its very beginning in 1984 with detailed information on combatant casualties. I then employ a split population bi-probit model which allows me to comprehensively depict the geotemporal evolution of the conflict by acknowledging, estimating and accounting for the variation in the underlying conflict proneness across locations as a latent variable that shapes the diffusion of events. The results of the statistical analyses offer support for my hypotheses and reveal that how events evolve over space and time is conditioned by the damages suffered by the combatant sides. I demonstrate the robustness of these results on a matched sample I obtain by employing the Coarsened Exact Matching (CEM) on the data
Spatio-temporal patterns of IED usage by the Provisional Irish Republican Army
In this paper, a unique dataset of improvised explosive device attacks during βThe Troublesβ in Northern Ireland (NI) is analysed via a Hawkes process model. It is found that this past dependent model is a good fit to improvised explosive device attacks yielding key insights about the nature of terrorism in NI. We also present a novel approach to quantitatively investigate some of the sociological theory surrounding the Provisional Irish Republican Army which challenges previously held assumptions concerning changes seen in the organisation. Finally, we extend our use of the Hawkes process model by considering a multidimensional version which permits both self and mutual-excitations. This allows us to test how the Provisional Irish Republican Army responded to past improvised explosive device attacks on different geographical scales from which we find evidence for the autonomy of the organisation over the six counties of NI and Belfast. By incorporating a second dataset concerning British Security Force (BSF) interventions, the multidimensional model allows us to test counter-terrorism (CT) operations in NI where we find subsequent increases in violence
- β¦