Defense and homeland security applications of multi-agent simulations

被引:0
|
作者
Lucas, Thomas W. [1 ]
Sanchez, Susan M. [1 ]
Martinez, Felix [2 ]
Sickinger, Lisa R. [3 ]
Roginski, Jonathan W. [4 ]
机构
[1] USN, Postgrad Sch, Dept Operat Res, Monterey, CA 93943 USA
[2] Ctr Estudios Super Navales, Wargaming Dept, Mexico City, DF 04840, Mexico
[3] USS Laboon DDG 58, FPO, AE 09577 USA
[4] US Mil Acad, Dept Math Sci, West Point, NY 10996 USA
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Department of Defense and Homeland Security analysts are increasingly using multi-agent simulation (MAS) to examine national security issues. This paper summarizes three MAS national security studies conducted at the Naval Postgraduate School. The first example explores equipment and employment options for protecting critical infrastructure. The second case considers non-lethal weapons within the spectrum of force-protection options in a martitime environment. The final application investigates emergency (police, fire, and medical) responses to an urban terrorist attack. There are many potentially influential factors and many sources of uncertainty associated with each of these simulated scenarios. Thus, efficient experimental designs and computing clusters are used to enable us to explore many thousands of computational experiments, while simultaneously varying many factors. The results illustrate how MAS experiments can provide valuable insights into defense and homeland security operations.
引用
收藏
页码:126 / +
页数:4
相关论文
共 50 条
  • [41] Agents that learn to behave in multi-agent simulations
    Dávila, J
    Uzcátegui, M
    PROCEEDINGS OF THE FIFTH IASTED INTERNATIONAL CONFERENCE ON MODELLING, SIMULATION, AND OPTIMIZATION, 2005, : 51 - 55
  • [42] Multi-agent simulations and ecosystem management: a review
    Bousquet, F
    Le Page, C
    ECOLOGICAL MODELLING, 2004, 176 (3-4) : 313 - 332
  • [43] Multi-Agent Simulations of the Evolution of Combinatorial Phonology
    de Boer, Bart
    Zuidema, Willem
    ADAPTIVE BEHAVIOR, 2010, 18 (02) : 141 - 154
  • [44] A Multi-Agent Immunology Model for Security Computer
    Liang Yi wen
    Wuhan University Journal of Natural Sciences, 2001, (Z1) : 486 - 490
  • [45] A survey of security issue in multi-agent systems
    Jung, Youna
    Kim, Minsoo
    Masoumzadeh, Amirreza
    Joshi, James B. D.
    ARTIFICIAL INTELLIGENCE REVIEW, 2012, 37 (03) : 239 - 260
  • [46] Intelligent multi-agent information security system
    Kussul, N
    Shelestov, A
    Sidorenko, A
    Skakun, S
    Veremeenko, Y
    IDAACS'2003: PROCEEDINGS OF THE SECOND IEEE INTERNATIONAL WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2003, : 120 - 122
  • [47] Security measures in a medical multi-agent system
    Moreno, A
    Sánchez, D
    Isern, D
    ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT, 2003, 100 : 244 - 255
  • [48] Multi-agent systems and security requirements analysis
    Bresciani, P
    Giorgini, P
    Mouratidis, H
    Manson, G
    SOFTWARE ENGINEERING FOR MULTI-AGENT SYSTEMS II: RESEARCH ISSUES AND PRACTICAL APPLICATIONS, 2004, 2940 : 35 - 48
  • [49] Security for a multi-agent system based on JADE
    Vila, X.
    Schuster, A.
    Riera, A.
    COMPUTERS & SECURITY, 2007, 26 (05) : 391 - 400
  • [50] A survey of security issue in multi-agent systems
    Youna Jung
    Minsoo Kim
    Amirreza Masoumzadeh
    James B. D. Joshi
    Artificial Intelligence Review, 2012, 37 : 239 - 260