Low Price Guarantee
We Take School POs
A Dynamic Game on Network Topology for Counterinsurgency Applications
Contributor(s): Penny Hill Press Inc (Editor), Air Force Institute of Technology (Author)

View larger image

ISBN: 1523342080     ISBN-13: 9781523342082
Publisher: Createspace Independent Publishing Platform
OUR PRICE: $12.30  

Binding Type: Paperback - See All Available Formats & Editions
Published: January 2016
Qty:
Additional Information
BISAC Categories:
- Political Science | Terrorism
- History | Military - Strategy
Physical Information: 0.19" H x 8.5" W x 11.02" L (0.51 lbs) 90 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
Successful military operations are increasingly reliant upon an advanced understanding of relevant networks and their topologies. The methodologies of network science are uniquely suited to inform senior military commanders; however, there is a lack of research in the application of these methods in a realistic military scenario. This study creates a dynamic game on network topology to provide insight into the effectiveness of offensive targeting strategies determined by various centrality measures given limited states of information and varying network topologies. Improved modeling of complex social behaviors is accomplished through incorporation of a distance-based utility function. Moreover, insights into effective defensive strategies are gained through incorporation of a hybrid model of network regeneration. Model functions and parameters are thoroughly presented, followed by a detailed sensitivity analysis of factors. Two designed experiments fully investigate the significance of factor main effects and two-factor interactions. Results show select targeting criteria utilizing uncorrelated network measures are found to outperform others given varying network topologies and defensive regeneration methods. Furthermore, the attacker state of information is only significant given certain defending network topologies. The costs of direct relationships significantly impact optimal methods of regeneration, whereas restructuring methods are insignificant. Model applications are presented and discussed.
 
Customer ReviewsSubmit your own review
 
To tell a friend about this book, you must Sign In First!