Micro-Simulation of Diffusion of Warnings - PowerPoint PPT Presentation

About This Presentation
Title:

Micro-Simulation of Diffusion of Warnings

Description:

ts. ts. Interactions. Me. My Friend. My Mother. Media. Stranger {S,V} {S,V} {S,V} ... Observe behavior in networks with different density and connectivity properties ... – PowerPoint PPT presentation

Number of Views:27
Avg rating:3.0/5.0
Slides: 29
Provided by: cind75
Learn more at: http://www.cs.rpi.edu
Category:

less

Transcript and Presenter's Notes

Title: Micro-Simulation of Diffusion of Warnings


1
Micro-Simulation of Diffusion of Warnings
  • Cindy Hui
  • Mark Goldberg
  • Malik Magdon-Ismail
  • William A. Wallace
  • Rensselaer Polytechnic Institute

This material is based upon work partially
supported by the U.S. National Science Foundation
(NSF) under Grant Nos. IIS-0621303, IIS-0522672,
IIS-0324947, CNS-0323324, NSF IIS-0634875 and by
the U.S. Office of Naval Research (ONR) Contract
N00014-06-1-0466 and by the U.S. Department of
Homeland Security (DHS) through the Center for
Dynamic Data Analysis for Homeland Security
administered through ONR grant number
N00014-07-10150 to Rutgers University. The
content of this paper does not necessarily
reflect the position or policy of the U.S.
Government, no official endorsement should be
inferred or implied.
2
Outline
  • Problem
  • Past Work
  • Model
  • Axioms
  • Simulation Experiments
  • Ongoing Work

3
Problem
Warnings in Evacuation Situations
4
Past Work
Diffusion Models
5
Dynamic Social Network
6
Social Network Structure
Interaction layer
Social layer
Physical layer
7
Node Characteristics
Individual Nodes
Thresholds
Source
8
Characteristics
Media
Me
My Friend
My Mother
Stranger
9
Characteristics
Media
Me
My Friend
t3
ts
t4
t1
t2
ts
My Mother
Stranger
10
Interactions
S,V
Media
Me
S,V
My Friend
S,V
My Mother
Stranger
11
Node States for Evacuation
State Description Behavior
Uninformed Individual has not received the message No action
Disbelieved Individual received the message, but does not understand or has not personalized the message No action
Undecided Individual received the message and is uncertain of what to do Query
Believer Individual received the message and believes the value of the message Take necessary action
Evacuated Individual has left the network No action
12
Information Loss Axiom
  • When a message is passed from one node to
    another, the information value of the message is
    non-increasing.
  • The information value of the message is a
    function of the social relationship between the
    sender and the receiver.

trust
S,V
A
B
13
Source Union Axiom
  • The source-value pairs are updated in a receiver
    node when a message is received.
  • The resulting source set is a union of the source
    sets of the incoming messages.

14
Value Min-Max Axiom
  • When a source is found in multiple messages, the
    combined information value for the source at the
    node is computed as follows.

S1
S2
S
S,V1
S,V2
S1,V1
S2,V2
S,V
15
Threshold Utility Axiom
  • If the nodes information fused value exceeds one
    of the thresholds, the node will enter a new
    state.

1
Believer
Evacuated
Upper bound
Undecided
Lower bound
Disbelieved
0
Uninformed
16
Experimental Network
  • Erdos-Renyi Random Graph 600 nodes connected
    randomly with p 0.006
  • Average of 3.6 neighbors for each individual
    node
  • Total of 1102 edges
  • One source node connected to 60 nodes from each
    group
  • (0.20 of the population receives the initial
    broadcast message)
  • Initial message sent by source has high
    information value of 0.95

17
Experimental Population
  • Population of 600 nodes consists of two equally
    sized groups of nodes, A and B, randomly assigned
    over the network
  • Group A and B nodes have the same node
    characteristics
  • Thresholds
  • Lower bound 0.1 low tendency to disbelieve a
    message
  • Upper bound 0.5 medium tendency to take action
  • Probability of successful communication between
    two nodes 75
  • Social relationships, the trust values, between
    them are varied

18
Trust Scenarios
  • Average trust is fixed for all scenarios 0.75
  • Trust differentials 0.1 and 0.3

Scenarios A ? A A ? B B ? A B ? B
1 SAME SAME SAME SAME
2 HIGH LOW LOW HIGH
3 HIGH LOW HIGH LOW
0.75
LOW
HIGH
0.1
Trust differentials
0.3
19
Node Believer State
Believer
Undecided
Disbelieved
Uninformed
20
Node Action Taken
5 steps later
Believer
Undecided
Disbelieved
Uninformed
21
Proportion of Evacuated Nodes
High trust in source 0.90
High trust in same group
Equal trust
22
Comparison of Scenarios
High trust in source 0.90
23
Proportion of Evacuated Nodes
Moderate trust in source 0.80
High trust in same group
High trust in specific group
Equal trust
24
Comparison of Scenarios
Moderate trust in source 0.80
25
Proportion of Evacuated Nodes
Very high trust in source 0.99
26
Comparison of Scenarios
Very high trust in source 0.99
27
Ongoing Work
  • Explore effects of trust variants in sources
  • Utilize multiple types of sources
  • Vary information value of initial message
  • Observe behavior in networks with different
    density and connectivity properties
  • Grid Network, Scale free Network
  • Map simulation framework to actual cases

28
Thank you. Questions?
Write a Comment
User Comments (0)
About PowerShow.com