2,205 research outputs found

    SOPHIA

    Get PDF
    The Iraqi Insurgency (2003–2011) has commonly been characterized as demonstrating the tendency for violence to cluster and diffuse at the local level. Recent research has demonstrated that insurgent attacks in Iraq cluster in time and space in a manner similar to that observed for the spread of a disease. The current study employs a variety of approaches common to the scientific study of criminal activities to advance our understanding of the correlates of observed patterns of the incidence and contagion of insurgent attacks. We hypothesize that the precise patterns will vary from one place to another, but that more attacks will occur in areas that are heavily populated, where coalition forces are active, and along road networks. To test these hypotheses, we use a fishnet to build a geographical model of Baghdad that disaggregates the city into more than 3000 grid cell locations. A number of logistic regression models with spatial and temporal lags are employed to explore patterns of local escalation and diffusion. These models demonstrate the validity of arguments under each of three models but suggest, overall, that risk heterogeneity arguments provide the most compelling and consistent account of the location of insurgency. In particular, the results demonstrate that violence is most likely at locations with greater population levels, higher density of roads, and military garrisons

    Using casualty assessment and weighted hit rates to calibrate spatial patterns of Boko Haram insurgency for emergency response preparedness

    Get PDF
    Since the beginning of the current millennium, Boko Haram has terrorised the residents of Northern Nigeria with devastating and high profile campaigns resuming in 2010. First responders struggle to cope with planning for and responding to the aftermath of these attacks. This paper describes analysis that can help emergency services pre-empt the geography and magnitude of susceptibility to attacks and the potential of the terrorists to generate severe attacks. The data used for the study were five years of terrorist activities. Results suggest that the efficiency of Boko Haram is not necessarily random and that attacks are generally well calculated to hit communities with disproportionate concentrations of vulnerable residents. The analysis is the first attempt to examine how a spatial segmentation framework might offer insight and intelligence towards understanding the configuration of terrorism for operational response

    Deep Neural Network for Anomaly Detection

    Get PDF
    ν•™μœ„λ…Όλ¬Έ(석사)--μ„œμšΈλŒ€ν•™κ΅ λŒ€ν•™μ› :κ³΅κ³ΌλŒ€ν•™ ν˜‘λ™κ³Όμ • κΈ°μˆ κ²½μ˜Β·κ²½μ œΒ·μ •μ±…μ „κ³΅,2019. 8. 황쀀석.Human insurgency is one of the prevalent, incessant, and threatening events happening worldwide. Among many topics of developmental studies, one of the seminal research focuses is to understand and model armed conflicts, which have been suspected to be linked to the capacity of a country in various ways, such as food security, child nutrition, economic welfare, and even environmental issues. Mapping human insurgencies is, therefore, imperative. To cope with the atrocities, there have been previous attempts to uncover the latent patterns of human insurgent incidents. The salient behavior of these insurgencies follows the 'power-law' distribution, which exhibits a heavy-tail. This feature implies that events far from the norm are nontrivial when compared with the normal distribution, where essentially no weight is far from the mean. This pattern indicates that the insurgencies are the few incidents happening with relentless severity, while the majority of the events occur with mere severity. To fully exploit the latent behavior of human insurgencies, this research focuses on the anomalies β€” the events that have a great number of fatalities but little probability of occurrence, lying on the heavy tailβ€”. To detect such anomalies, a novel approach, variational autoencoder, is used. The seminal essence of this model lies in processing high-volume data and capturing their non-linearity, which makes data-driven detection possible. The results show that the trained model successfully detects anomalies when given test data, showing no false negatives (Type III error) or false positives (Type I error). This predictive model, if well deployed, can provide humanitarian aid agencies and governments the ability to efficiently allocate resources, reducing wastes and mitigating the level of conflict through targeted preventive policies무λ ₯ 좩돌, 급진적인 ν…ŒλŸ¬ 등을 ν¬ν•¨ν•˜λŠ” 인간 폭등 (Human Insurgency)은 μ§€κΈˆκ» λ§Œμ—°ν•˜κ³  λŠμž„μ—†μ΄ μ „ μ„Έκ³„μ μœΌλ‘œ μœ„ν˜‘μ„ μ£ΌλŠ” ν˜„μƒμ΄λ‹€. 세계 개발 λΆ„μ•Όμ˜ μ—¬λŸ¬ 주제 쀑 κΈ°κ΄€ 및 쑰직의 μ£Όμš”ν•œ 관심은 μ΄λŸ¬ν•œ μΆ©λŒμ„ μ΄ν•΄ν•˜κ³  λͺ¨λΈ ν•˜λŠ” κ²ƒμ΄μ—ˆλ‹€. μ΄λŸ¬ν•œ ν˜„μƒμ€ ν•œ 체제의 μ‹λŸ‰ μ•ˆλ³΄, 아동 μ˜μ–‘, 경제적, 그리고 ν™˜κ²½μ  λ¬Έμ œμ™€λ„ 연관이 λ˜λŠ” κ²ƒμœΌλ‘œ κ°„μ£Όλ˜κ³  μžˆλ‹€. λ”°λΌμ„œ 무λ ₯ μΆ©λŒμ„ ν¬ν•¨ν•œ 인간 폭등 ν˜„μƒμ„ λ§€ν•‘ν•˜λŠ” 것은 ν•„μˆ˜μ μœΌλ‘œ μš”κ΅¬λ˜κ³  μžˆλ‹€. 기쑴의 μ—°κ΅¬λ“€μ—μ„œλŠ” 이런 ν˜„μƒλ“€μ˜ μˆ¨μ–΄ μžˆλŠ” νŒ¨ν„΄μ„ λΆ„μ„ν•˜κ³ μž ν•˜λŠ” μ‹œλ„λ“€μ΄ μžˆμ—ˆλ‹€. 그쀑 λ‘λ“œλŸ¬μ§„ νŠΉμ§•μ€ 멱법칙 (power law) 뢄포λ₯Ό λ”°λ₯Έλ‹€λŠ” 것이닀. 멱법칙 λΆ„ν¬λŠ” 꼬리가 κΈ΄ ν˜•νƒœλ₯Ό 가지고 μžˆλ‹€. κΈ°μ‘΄ μ •κ·œλΆ„ν¬μ™€λŠ” 달리, 멱법칙 λΆ„ν¬λŠ” μ€‘μ‹¬μ—μ„œ 멀리 μœ„μΉ˜ν•˜κ³  μžˆλŠ” ν˜„μƒμ΄ 더 이상 κ°„μ†Œνžˆ μ‘΄μž¬ν•˜λŠ” 것이 μ•„λ‹ˆλΌ, μƒλ‹Ήνžˆ μ‘΄μž¬ν•œλ‹€κ³  λ³Ό 수 μžˆλ‹€. μ΄λŸ¬ν•œ 급증 κ·œμΉ™μ€ μ†Œμˆ˜μ˜ 사건듀이 μž‘μ€ ν™•λ₯ λ‘œ 큰 규λͺ¨λ‘œ λ°œμƒν•˜λŠ” 반면, λ‹€μˆ˜μ˜ 사건듀은 μž‘μ€ 규λͺ¨λ‘œ λ°œμƒν•œλ‹€λŠ” 것을 μ•”μ‹œν•˜κ³  μžˆλ‹€. μ΄λŸ¬ν•œ κ·œμΉ™λ“€μ„ ν™œμš©ν•˜μ—¬, λ³Έ μ—°κ΅¬μ—μ„œλŠ” 폭등을 λ§€ν•‘ν•˜κΈ° μœ„ν•΄ 비이상적 사건듀에 μ΄ˆμ μ„ λ§žμΆ˜λ‹€. 비이상적 사건듀은 λ©±λ²•μΉ™μ˜ 꼬리에 μœ„μΉ˜ν•˜λŠ”, 규λͺ¨κ°€ ν¬μ§€λ§Œ μž‘μ€ ν™•λ₯ λ‘œ λ°œμƒν•˜λŠ” 사건듀을 μΌμ»«λŠ”λ‹€. μ΄λŸ¬ν•œ 비이상적 사건듀을 νŒλ³„ν•˜κΈ° μœ„ν•΄, Variational Autoencoder (VAE)λΌλŠ” μƒˆλ‘œμš΄ 방법둠을 λ„μž…ν•˜μ˜€λ‹€. 이 λͺ¨λΈμ˜ μž₯점은 λ§Žμ€ λŸ‰μ˜ 데이터λ₯Ό μ²˜λ¦¬ν•˜κ³ , λΉ„ μ„ ν˜•μ μΈ 관계듀을 포착할 수 μžˆλ‹€λŠ” 것이닀. μ΄λŸ¬ν•œ λ°©λ²•μœΌλ‘œ data-driven νŒλ³„μ„ ν•  수 있게 ν•œλ‹€. μ΄λŸ¬ν•œ λͺ¨λΈλ‘œ ν›ˆλ ¨ν•œ κ²°κ³Ό, False Negative (Type III error)와 False Positive (Type I error)이 λ°œμƒν•˜μ§€ μ•Šμ•˜κ³ , 비이상적인 사건듀을 μ„±κ³΅μ μœΌλ‘œ νŒλ³„ν•  수 μžˆμ—ˆλ‹€. λ³Έ μ—°κ΅¬μ—μ„œλŠ” μ΄λŸ¬ν•œ λͺ¨λΈμ„ μ œμ‹œν•¨μœΌλ‘œ μ‹€μ œ μΈλ„μ£Όμ˜ λ‹¨μ²΄λ‚˜ 정뢀에 μ μš©λ˜μ—ˆμ„ 경우, μ œν•œλœ μžμ›μ„ 효율적으둜 λ°°μΉ˜ν•˜μ—¬ ν–₯ν›„ 폭등 규λͺ¨λ₯Ό μ™„ν™”ν•  수 μžˆλ‹€κ³  λ³Έλ‹€.Abstract i Contents iii List of Tables v List of Figures vi Chapter 1. Introduction 1 Chapter 2. Literature Review 5 2.1 Human Insurgency 5 2.1.1 Definition of Human Insurgency 7 2.2 Predictive Models of Human Insurgency 8 2.2.1 The limitation of previous literature 10 2.3 Latent Behavior of Human Insurgency 10 2.4 Anomaly Detection 12 2.4.1 Anomaly Detection Methods 13 Chapter 3. Methodology and Data 15 3.1 Model 15 3.1.1 Variational Inference 15 3.1.2 Autoencoder 17 3.1.3 Variational Autoencoder (VAE) 18 3.2 VAE Anomaly detection 23 3.3 Analysis Sequence 25 3.4 Data Description 26 Chapter 4. Result 31 4.1 Reconstruction Error 31 4.2 Performance Analysis 33 4.2.1 Accuracy 34 4.2.2 ROC (Receiver Operating Characteristics) 35 4.2.3 Precision 36 4.2.4 Recall (Sensitivity) 37 4.2.5 Precision vs Recall 38 Chapter 5. Discussion and Conclusion 40 5.1 Implication 40 5.2 Limitations 41 5.3 Further Research 42 Bibliography 43 Abstract (Korean) 51Maste

    The geo-temporal evolution of violence in civil conflicts

    Get PDF
    Existing works on diffusion fail to account for the incapacitating effects conflict events may have on the operational capability of the combatant sides and how these effects may determine the evolution of a conflict. I hypothesize that it is those events with losses on the state side that are likely to be associated with geo-temporal spillovers, whereas events with insurgency losses are less likely to be associated with future mayhem in their vicinity. To test my arguments, I first introduce a new, comprehensive and detailed event dataset on the long-running civil conflict in Turkey. The Turkish State–PKK Conflict Event Database (TPCONED) includes the exact date and county-level location for the fatal events of the armed conflict between the Turkish state and the rebel organization PKK since its very beginning in 1984 with detailed information on combatant casualties. I then employ a split population bi-probit model which allows me to comprehensively depict the geotemporal evolution of the conflict by acknowledging, estimating and accounting for the variation in the underlying conflict proneness across locations as a latent variable that shapes the diffusion of events. The results of the statistical analyses offer support for my hypotheses and reveal that how events evolve over space and time is conditioned by the damages suffered by the combatant sides. I demonstrate the robustness of these results on a matched sample I obtain by employing the Coarsened Exact Matching (CEM) on the data

    Spatio-temporal patterns of IED usage by the Provisional Irish Republican Army

    Get PDF
    In this paper, a unique dataset of improvised explosive device attacks during β€œThe Troubles” in Northern Ireland (NI) is analysed via a Hawkes process model. It is found that this past dependent model is a good fit to improvised explosive device attacks yielding key insights about the nature of terrorism in NI. We also present a novel approach to quantitatively investigate some of the sociological theory surrounding the Provisional Irish Republican Army which challenges previously held assumptions concerning changes seen in the organisation. Finally, we extend our use of the Hawkes process model by considering a multidimensional version which permits both self and mutual-excitations. This allows us to test how the Provisional Irish Republican Army responded to past improvised explosive device attacks on different geographical scales from which we find evidence for the autonomy of the organisation over the six counties of NI and Belfast. By incorporating a second dataset concerning British Security Force (BSF) interventions, the multidimensional model allows us to test counter-terrorism (CT) operations in NI where we find subsequent increases in violence
    • …
    corecore