English  |  正體中文  |  简体中文  |  Items with full text/Total items : 66984/66984 (100%)
Visitors : 22964390      Online Users : 424
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/29642

    Title: A Game Theory Approach for Evaluating Terrorist Threats and Deploying Response Agents in Urban Environments
    Authors: Chen,YM;Wu,D;Wu,CK
    Contributors: 資訊管理研究所
    Date: 2009
    Issue Date: 2010-06-29 20:37:10 (UTC+8)
    Publisher: 中央大學
    Abstract: The Homeland Security Advisory System (HSAS) lacks specific measures for rational decision making, and mathematical modeling has not been applied to capture the interaction between defender and attacker in terrorist attacks. An efficient emergency response system must determine how and when to alert and advise the critical and appropriate response agents to the danger of terrorist attacks, particularly when available resources are limited in an urban environment. We propose a framework for HSAS that incorporates two game theory models designed to advise response agents when raising the threat advisory level. In the first step, the interactive behaviors between the elements or participants of the multi-emergency event and the district response agent are modeled and analyzed as a noncooperative game, after which the terrorist threat value (TTV) is derived from the mixed strategy Nash equilibrium. In the second step, the TTV is used to compute the Shapley value of all district response agents for five different threat levels; a fair allocation of response agents based on the Shapley value creates a minimum set of resource deployment costs. Simulation results show that the emergency manager can use this framework to quantitatively evaluate the terrorist threat to each response agent and easily discover where response agents are most at risk within the five threat levels.
    Appears in Collections:[資訊管理研究所] 期刊論文

    Files in This Item:

    File Description SizeFormat

    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明