Compartir
A Dynamic Game on Network Topology for Counterinsurgency Applications (en Inglés)
Air Force Institute of Technology
(Autor)
·
Penny Hill Press Inc
(Ilustrado por)
·
Createspace Independent Publishing Platform
· Tapa Blanda
A Dynamic Game on Network Topology for Counterinsurgency Applications (en Inglés) - Penny Hill Press Inc ; Air Force Institute of Technology
$ 44.622
$ 55.777
Ahorras: $ 11.155
Elige la lista en la que quieres agregar tu producto o crea una nueva lista
✓ Producto agregado correctamente a la lista de deseos.
Ir a Mis Listas
Origen: Estados Unidos
(Costos de importación incluídos en el precio)
Se enviará desde nuestra bodega entre el
Jueves 01 de Agosto y el
Lunes 12 de Agosto.
Lo recibirás en cualquier lugar de Argentina entre 1 y 3 días hábiles luego del envío.
Reseña del libro "A Dynamic Game on Network Topology for Counterinsurgency Applications (en Inglés)"
Successful military operations are increasingly reliant upon an advanced understanding of relevant networks and their topologies. The methodologies of network science are uniquely suited to inform senior military commanders; however, there is a lack of research in the application of these methods in a realistic military scenario. This study creates a dynamic game on network topology to provide insight into the effectiveness of offensive targeting strategies determined by various centrality measures given limited states of information and varying network topologies. Improved modeling of complex social behaviors is accomplished through incorporation of a distance-based utility function. Moreover, insights into effective defensive strategies are gained through incorporation of a hybrid model of network regeneration. Model functions and parameters are thoroughly presented, followed by a detailed sensitivity analysis of factors. Two designed experiments fully investigate the significance of factor main effects and two-factor interactions. Results show select targeting criteria utilizing uncorrelated network measures are found to outperform others given varying network topologies and defensive regeneration methods. Furthermore, the attacker state of information is only significant given certain defending network topologies. The costs of direct relationships significantly impact optimal methods of regeneration, whereas restructuring methods are insignificant. Model applications are presented and discussed.
- 0% (0)
- 0% (0)
- 0% (0)
- 0% (0)
- 0% (0)
Todos los libros de nuestro catálogo son Originales.
El libro está escrito en Inglés.
La encuadernación de esta edición es Tapa Blanda.
✓ Producto agregado correctamente al carro, Ir a Pagar.