没有合适的资源?快使用搜索试试~ 我知道了~
2015年第四届认证杯数学中国数学建模国际赛优秀论文-1196 C题.pdf
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
0 下载量 20 浏览量
2022-05-09
15:11:43
上传
评论
收藏 614KB PDF 举报
温馨提示
试读
23页
2015年第四届认证杯数学中国数学建模国际赛优秀论文-1196 C题
资源推荐
资源详情
资源评论
第四届“认证杯”数学中国
数学建模国际赛
承诺书
我们仔细阅读了第四届“认证杯”数学中国数学建模国际赛的竞赛规则。
我们完全明白,在竞赛开始后参赛队员不能以任何方式(包括电话、电子邮
件、网上咨询等)与队外的任何人(包括指导教师)研究、讨论与赛题有关的问
题。
我们知道,抄袭别人的成果是违反竞赛规则的, 如果引用别人的成果或其他
公开的资料(包括网上查到的资料),必须按照规定的参考文献的表述方式在正
文引用处和参考文献中明确列出。
我们郑重承诺,严格遵守竞赛规则,以保证竞赛的公正、公平性。如有违反
竞赛规则的行为,我们将受到严肃处理。
我们允许数学中国网站(www.madio.net)公布论文,以供网友之间学习交流,
数学中国网站以非商业目的的论文交流不需要提前取得我们的同意。
我们的参赛队号为:1196
我们选择的题目是:Can Science Solve Terrorism?
参赛队员 (签名) :
队员 1:JinYanrui
队员 2:Lu Yuleng
队员 3:Luo Jinjing
参赛队教练员 (签名):No
Team 1196 Page 2 of 23
第四届“认证杯”数学中国
数学建模国际赛
编号专用页
参赛队伍的参赛队号:(请各个参赛队提前填写好):1196
竞赛统一编号(由竞赛组委会送至评委团前编号):
竞赛评阅编号(由竞赛评委团评阅前进行编号):
Team 1196 Page 3 of 23
How to Solve Terrorism with Science
Abstract
As we know, terrorism is becoming more and more serious and, thus, how to solve
terrorism with science is becoming more important. This paper provides 4
mathematical models to solve the questions.
As for question one, we can build Grey Model to handle the data about net-surfing
behaviors by using Matlab. After getting the personalities’ information, we can build
a Personality Matrix on the basis of the personalities’ information. And then, we can
build the relationship between Mood Matrix and Personality Matrix. In the meantime,
we can build the relationship between the Mood. And then, we can acquire the
equation about Emotion Matrix and Mood Matrix, Personality Matrix through Matlab.
Because of emotion theorythat emotion’s proportions can result in different tendency
to the terrorism, we can build an Emotion Model to make further processing. After
acquiring data about emotion, we can use Matlab to sort, filter and handle the data in
order to cancel the problem data, so we can get a approximately proper value called
threshold value. This threshold value is risk index that question want.
As for the second question, we should process a huge amount of information, thus, we
preprocess the network information data first, by using the fuzzy clusteringalgorithm.
After we get the useful data, we use theArtificial Immune Algorithm(AIA) to
compare the terrorists’ network information data with the monitored data. Then we
can get the relevance degree of everyone to the terrorists. Sorting by the relevance
degree, we will have a descending list of potential terrorist name. This list can be
divided into several parts, which contains terrorists’ part, potential terrorists part and
normal people part. And this classification is just the thing that we want.
We should carry out anti-terrorism activitiesfrom two aspects: fighting and preventing.
Military fighting is inevitable and vital. Our mathematical model can apply to
preventing. However, no matter how complicated the model is, there is a big problem
–that is understanding terrorist behavior. Only with further psychological research can
we develop a better model to describe the terrorist tendency, can we build a strategic
framework to reduce terrorist behaviors. Further psychological research is a long-term
investment. Except these,we should unify as a whole ,increase intelligence sharing
and distribute the military tasks equal to every partner’s hard and soft power.
Moreover, the reliability and operability of the model have been also analyzed. Then
the data analyzed is not very huge because we can attain so many precious passage,
our system also can be improved.
Keywords:Grey Model, Emotion Model, Risk Index, Fuzzy ClusteringAlgorithm,
Artificial Immune Algorithm, Psychological Research
Team 1196 Page 4 of 23
Contents
1. Introduction...............................................................................................................................................5
1.1What is terrorism?...............................................................................................................................5
1.2 Why people turn to terrorism......................................................................................................5
2. The Description of Problem………………………………………………………………………6
2.1 The relation between internet usage and the tendency to be a
terrorism…….............................................................................................................................................….…6
2.2 How to process the Internet usage from monitored
people…………………………............................................................................................................................6
3.Models……………........................................................................................................................ ..................6
3.1 QUESTION 1
BASIC MODEL........................................................................................................................................6
3.1.1 Symbols and Definitions………………………………..…...……………………………. ....6
3.1.2 Assumptions……………………………………………………………….……..……………….7
3.1.3 The Foundation of Model........................................................................................................7
3.1.4Analysis of the Result……………………………………………….………………………..……….….11
3.1.5Strength and Weakness………………………………………………….…………….………11
3.2QUESTION 2.
BASIC MODEL......................................................................................................................................12
3.2.1 Symbols and Definitions………………………………..…...……………………………….12
3.2.2 Assumptions……………………………………………………………….……..………..…….12
3.2.3The Foundation of Model.........................................................................................................12
3.2.4Solution and Result…………………………………………………………..……….……..15
3.2.5 Strength and Weakness……………………………………………….……………….………15
3.3QUESTION 3
3.3.1 Advice on fighting terrorism……………………...…..……………………………………...16
4. Conclusions..................................................................................................................................................17
4.1Conclusions of the problem…………………………………..…………………..……………...17
4.2Methods used in our models…………………………………...……………………..……….…17
4.3.1Greymodel………………………………………………………………………...….……17
4.2.2Emotion model..........................................................................................................................17
4.2.3Fuzzy clustering algorithm……………………………………………………….………18
4.2.4 Artificial immune algorithm………………………………………………………..........18
5. Future Work...............................................................................................................................................18
5.1Advantages of the model………………………………..………………………………………..18
5.2 Disadvantages of the models…………………………….………………………………….…..18
5.3 Improved method of the model………………………………………………………………...19
6.References.....................................................................................................................................................20
7.Appendix.......................................................................................................................................................21
7.1Code of Grey Model…………………………………………………………..……………………21
Team 1196 Page 5 of 23
I. Introduction
In order to indicate the origin ofterrorism, the following background is worth
mentioning.
1.1 What is terrorism?
In its broadest sense, terrorism is any act designed to cause terror. In a narrower sense,
terrorism can be understood to feature a political objective. The word terrorism is
politically loaded and emotionally charged.
A broad array of political organizations have practiced terrorism to further
theirobjectives. Ithas been practiced by both right-wing and left-wing political
parties, nationalist groups, religious groups, revolutionaries, and ruling governments.
The symbolism of terrorism can exploit human fear to help achieve these goals.
1
1.2 Why people turn to terrorism?
From the definition of terrorism, we know that it is used for political goal and there is
no doubt that terrorists regarded as bigots possibly get hurt , even die. So why are they
willing to become terrorists? This is not an easy question.
The reasons are ineluctably personal, born variously of grievance and frustration;
religious piety or the desire for systemic socio-economic change; irredentist
conviction or commitment to revolution.
No terrorist personality , no universal profile has been produced. But we know
something about them. They are stimulated by misguided altruism or a strong sense of
self-defense,
or devoted to their faith and believe that their actions are justified and divinely
commanded. We have to admit that recruiters really get what the potential terrorists
want.
To be specific, all terrorists consider themselves as altruists: they are doing good
deeds for a wider citizens which the organization purport to represent. This sense of
responsibility and self-sacrifice which helps them to justify the criminal they commit
motivates people into radicalism and further terrorism. Terrorists also see them as
defensive and having no alternative except taking up arms to fight against a repressive
state, a predatory rival ethnic or nationalist group, or an unresponsive international
order.
It seems that religion is a strong reason for justification. Yeah, it is ,especially for
suicide terrorism. However , it is just one more justification.
1
Wikipedia
剩余22页未读,继续阅读
资源评论
普通网友
- 粉丝: 12w+
- 资源: 9337
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功