On the Production of Homeland Security Under True Uncertainty

Size: px
Start display at page:

Download "On the Production of Homeland Security Under True Uncertainty"

Transcription

1 Uiversity of Massahusetts Aherst Deartet of Resoure Eoois Workig Paer No htt:// O the Produtio of Hoelad Seurity Uder True Uertaity Joh K. Stralud 1 ad Barry C. Field Abstrat: Hoelad seurity agaist ossible terrorist attaks ivolves akig deisios uder true uertaity. Not oly are we igorat of the for, lae, ad tie of otetial terrorist attaks, we are also largely igorat of the likelihood of these attaks. I this aer, we oetualize hoelad seurity uder true uertaity as soiety s iuity to uaetable losses. We illustrate ad aalyze the osequees of this otio of seurity with a sile odel of alloatig a fixed budget for hoelad seurity to defedig the athways through whih a terrorist ay lauh a attak ad to itigatig the daage fro a attak that evades this defese. I this roble, iuity is the rage of uertaity about the likelihood of a attak withi whih the atual exeted loss will ot exeed soe ritial value. We aalyze the alloatio of a fixed hoelad seurity budget to defesive ad itigative efforts to axiize iuity to alterative levels of exeted loss. We show that the rodutio of hoelad seurity ivolves a fudaetal trade-off betwee iuity ad aetable loss; that is, for fixed resoures that are otially alloated to defese ad itigatio, ireasig iuity requires aetig higher exeted losses, ad reduig aetable exeted losses requires lower iuity. Greater ivestets i hoelad seurity allow soiety to irease its iuity to a artiular exeted loss, redue the exeted losses to whih we are iue while holdig the degree of iuity ostat, or soe obiatio of ireased iuity to a lower ritial exeted loss. Keywords: Hoelad Seurity, Terroris, True Uertaity. JEL Classifiatio: D0, D81, H56 1 Joh K Stralud, Deartet of Resoure Eoois Uiversity of Massahusetts, Stokbridge Hall, 80 Caus Ceter Way, Aherst, MA E: [email protected] P: F: Barry C. Field, Deartet of Resoure Eoois Uiversity of Massahusetts, Stokbridge Hall, 80 Caus Ceter Way, Aherst, MA E: [email protected] P: F:

2 August 006 O the Produtio of Hoelad Seurity Uder True Uertaity JOHN K. STRANLUND * Deartet of Resoure Eoois Uiversity of Massahusetts-Aherst BARRY C. FIELD Deartet of Resoure Eoois Uiversity of Massahusetts-Aherst Akowledgeets: Fudig for this researh was rovided by the U. S. Deartet of Agriulture uder USDA/ERS/PREISM Cooerative Agreeet No. 43-3AEM , ad the Cooerative State Researh Extesio, Eduatio Servie, U. S. Deartet of Agriulture, Massahusetts Agriultural Exeriet Statio uder Projet No. MAS The authors gratefully akowledge helful oets fro L. Joe Moffitt ad Yakov Be-Hai. * Corresodee to Joh K. Stralud, Deartet of Resoure Eoois, 80 Caus Ceter Way, 14 Stokbridge Hall, Uiversity of Massahusetts-Aherst, Aherst, MA 01003, USA. Phoe: (413) , Fax: (413) , E-ail: [email protected]. 1

3 O the Produtio of Hoelad Seurity Uder True Uertaity Abstrat: Hoelad seurity agaist ossible terrorist attaks ivolves akig deisios uder true uertaity. Not oly are we igorat of the for, lae, ad tie of otetial terrorist attaks, we are also largely igorat of the likelihood of these attaks. I this aer, we oetualize hoelad seurity uder true uertaity as soiety s iuity to uaetable losses. We illustrate ad aalyze the osequees of this otio of seurity with a sile odel of alloatig a fixed budget for hoelad seurity to defedig the athways through whih a terrorist ay lauh a attak ad to itigatig the daage fro a attak that evades this defese. I this roble, iuity is the rage of uertaity about the likelihood of a attak withi whih the atual exeted loss will ot exeed soe ritial value. We aalyze the alloatio of a fixed hoelad seurity budget to defesive ad itigative efforts to axiize iuity to alterative levels of exeted loss. We show that the rodutio of hoelad seurity ivolves a fudaetal trade-off betwee iuity ad aetable loss; that is, for fixed resoures that are otially alloated to defese ad itigatio, ireasig iuity requires aetig higher exeted losses, ad reduig aetable exeted losses requires lower iuity. Greater ivestets i hoelad seurity allow soiety to irease its iuity to a artiular exeted loss, redue the exeted losses to whih we are iue while holdig the degree of iuity ostat, or soe obiatio of ireased iuity to a lower ritial exeted loss. Keywords: Hoelad Seurity, Terroris, True Uertaity. JEL Classifiatios: D0, D81, H56 1. Itrodutio There are essetially three ways to rotet a oulatio fro terrorist attaks: (1) eutralizig terrorists before they a out attaks, () stoig attaks after they have bee started but before they are oleted, ad (3) takig stes to redue the severity of suessful attaks. There learly exists a eooi roble i deidig how to divide fixed resoures aog these differet futios. The last two, defedig athways through whih a attak ay our ad itigatig the effets of a failure of this defese, geerally orresod to the resosibilities of the U.S. Deartet of Hoelad Seurity (DHS). A substatial art of its budget goes to a variety of efforts to iteret terrorist attaks before they a be osuated. Chief aog these are the isetio rogras ut ito lae i the air, lad, ad sea etry orts of the outry. Aother ortio of its budget goes to hardeig otetial targets ad develoig strategies to itigate daage fro attaks that elude detetio.

4 Give kow, or ofidetly estiated robability desity futios over the for, lae, ad tie of otetial terrorist attaks, oe ould ast the roble of ivestig i seurity agaist terrorist attaks i the failiar ters of risk aalysis. 1 For oe exale aog several ossibilities, oe ould odel the hoies of defese ad itigatio to iiize the exeted losses fro terrorist attaks. I riile, robability distributio futios over terrorist attaks a be estiated fro the frequey of ast attaks. But while there has bee sigifiat work to develo ad exaie tie series of terrorist evets over reasoably log eriods (Eders ad Sadler, 00; Mikolus et al., 1989 ad 1993; Eders et al., 199; O Brie, 1996) it is ot straightforward to tur frequeies of ast attaks ito urret attak robabilities. Terrorists a hoose iovative tatis, as haeed o , i ways that are ot readily reditable fro ast atios. Moreover, tehologial hage (e.g., the iteret), the raid ae of globalizatio, ad the ebb ad flow of olitial oveets rodue ovel oortuities that a oly be roughly haraterized by ast attaks. Uder oteorary irustaes, we are extreely essiisti about our ability to estiate robability distributio futios over terrorist attaks with ay degree of ofidee. What this strogly suggests is that it ay ot be useful to thik about hoelad seurity agaist terroris as deisios ivolvig gables with kow robabilities. Istead, with reset to hoelad seurity, we are truly i a world of Kightia uertaity; that is, ot oly are we igorat of the for, lae, ad tie of otetial terrorist attaks, we are also igorat of the likelihood of these attaks. Thus, ay useful haraterizatio of the defiitio ad soial hoie of hoelad seurity ust aout for this uertaity. I this aer we roose that seurity uder true uertaity a be usefully thought of as the degree of iuity agaist uaetable exeted losses fro terrorist attaks. Moreover, it is reasoable to assue that soiety s referee for seurity is ootoially ireasig i the iuity to a artiular loss, ad dereasig i this loss while holdig iuity ostat. That is, we are ore seure if we a ahieve greater iuity to a artiular ritial loss, if we a redue the ritial loss without affetig the degree of iuity to this loss, or if we a ahieve both ireased iuity to lower loss. 1 This aroah has bee take by Kureuther ad Heal (003), Heal ad Kureuther (005), Keohae ad Zekhauser (003), Lakdawalla ad Zajai (005), Bueo de Mesquita (005), ad others. Kight was oered "with situatios whih are far too uique, geerally seakig, for ay sort of statistial tabulatio to have ay value for guidae. The oetio of a objetively easurable robability or hae is sily ialiable." Kight referred to this as true or ueasurable uertaity (Kight, 191, hater 7). 3

5 We illustrate ad aalyze the osequees of this otio of seurity with a sile odel of alloatig a fixed budget to hoelad seurity for efforts to sto a terrorist attak ad efforts to itigate the daage fro a attak that evades our defeses. Withi this roble iuity is the rage of uertaity about the likelihood of a attak withi whih the atual exeted loss will ot exeed soe ritial value. With this defiitio of seurity, we aalyze the alloatio of a fixed hoelad seurity budget to defesive ad itigative efforts to axiize seurity to a truly uertai terrorist attak. We deostrate that defese is a oral iut ito the rodutio of hoelad seurity, while itigatio is a iferior iut. That is, as soiety ireases its ivestet i hoelad seurity, ore of these resoures should be devoted to defese ad less to itigatio. Moreover, we show that the rodutio of hoelad seurity ivolves a fudaetal trade-off betwee iuity ad aetable loss; that is, for fixed resoures that are otially alloated to defese ad itigatio, ireasig iuity to loss requires aetig higher exeted losses, ad reduig aetable exeted losses requires lower iuity. Ireasig seurity i the sese of ireasig iuity to a artiular exeted loss, reduig the ritial exeted loss for the sae degree of iuity, or a obiatio of ireased iuity to a lower ritial exeted loss, is ahievable oly with a greater ivestet i hoelad seurity. Several aroahes have bee develoed to aalyze deisio akig uder true uertaity. These aroahes ilude aliatio of the axii, axiax, Lalae, ad Hurwitz riteria (Reder et al., 003). While oe of these riteria require kowledge of robability distributios for aliatio, the first two rereset olar extrees i ters of otiis ad essiis while the latter two require iforatio siilar to robabilities i order to be alied. Siilarly, quatifiatio of other otios related to uertaity suh as igorae ad surrise have also required the seifiatio of futios ofied to the uit iterval (Katzer, 1998; Hora et al., 00). Additioally, Kelsey (1993) has roosed a deisio theory requirig a rakig of evet robabilities rather tha a seifi robability distributio. Noe of these deisio riteria uder uertaity have ahieved the widesread aliatio i eoois afforded traditioal risk riteria. More iortatly for our uroses, oe of these deisio riteria rovide a atural oetualizatio of the defiitio ad ursuit of seurity uder true uertaity. 4

6 Our aalysis is a aliatio of Be-Hai s (006) iforatio-ga deisio theory. 3 The heart of Be-Hai s aroah is the ursuit of deisios that are robust i the sese that they axiize the rage of uertaity about odel araeters withi whih the deisio aker is ertai to ahieve a erforae riterio. 4 I our roble of hoelad seurity, we are uertai about the likelihood of a terrorist attak but we seek to axiize the rage of this uertaity over whih the exeted loss fro a attak will ot exeed soe ritial value. Thus, Be-Hai s aroah rovides a useful way to defie hoelad seurity as iuity to uaetable losses ad to aalyze its rodutio.. Hoelad Seurity Uder True Uertaity The rovisio of hoelad seurity agaist terroris is exeedigly olex, ivolvig defedig the literally thousads of aveues through whih terrorists ight oeivably attak ad ivestig i at least as ay ethods by whih the effets of a suessful attak a be itigated. Our urose, however, is ot to odel hoelad seurity i all its olexity, but rather to foralize a useful defiitio of seurity agaist uertai terrorist attaks ad to aalyze ertai harateristis of its rodutio. To that ed we exaie a situatio i whih a terrorist attak ay be lauhed with a ukow robability through a large uber of otetial athways. The uber of these athways is large eough that defedig all of the is rohibitively ostly. Sie ot all athways a be defeded, there is soe likelihood that a terrorist attak will be suessful, hee soiety ivests i efforts to itigate the loss fro a suessful attak. Though highly stylized, our aroah is aliable to ay situatio ivolvig defedig oe s borders agaist a attak that ours with ukow robability ad itigatig the effets of a failure i this defese. 3 Be-Hai s deisio theory has bee alied to a wide variety of robles, iludig fiaial risk assesset (Be-Hai 005), searh behavior i aial foragig odels (Carel ad Be-Hai 005), oliy deisios i arie reserve desig (Haler et al. 006), atural resoure oservatio deisios (Moilae et al. 006), isetio deisios by ort authorities to detet terrorist weaos (Moffitt et al. 005a) ad ivasive seies (Moffitt et al. 005b), tehologial fault diagosis (Piere et al. 006) ad egieerig odel-testig (Viot et al. 005). 4 This aroah is related to reet attets to develo robust oetary oliy, where the soure of uertaity is ukow variatio i the uderlyig oetary odels that are used to derive oliy rules. See the aers o robust deisios i Maroeooi Dyais, Vol. 6, No., 1, February 00. Poliy rules are evaluated usig a referee odel of the workigs of the oetary syste. Iortat araeters of the odel are the erturbed, leadig to variatios i outoes uder the oliy rule. The robustess of a rule is the axiu erturbatio that a be allowed while keeig the outoe of the rule withi seified bouds. By oarig alterative rules uder this roedure oe a idetify the oe with axial robustess. 5

7 .1 A odel of hoelad seurity Let N deote the uber of athways through whih a attak o a atio ay our. The robability of a attak that ay our through ay oe of these athways is. The uertaity i this odel is about the robability that a terrorist has lauhed a attak is oletely ukow. The athways are idetial i all regards, so a terrorist is idifferet about whih athway to attak. To defed agaist a otetial attak, N of the athways are defeded. Sie they are hoogeeous, defeded athways are hose at rado. A attak o a defeded athway will be thwarted. Thus, the robability of a suessful attak is the robability that a attak has bee lauhed ties the robability that the weao gets through the atio s defeses, ( N )/ N. A suessful terrorist attak results i a ertai loss L. 5 Mitigatio efforts,, redue this otetial loss, but at a dereasig rate. That is, the loss fro a suessful attak is L(), with L ( ) < 0 ad L ( ) > 0. Give the robability of a attak,, the exeted loss fro a attak is LN ( ) ( ) / N. This value is ukow beause the robability of a attak is oletely ukow. We ight, however, have olete ofidee that the robability of a attak is o ore tha soe value 1; that is, we ay be uertai of the true robability of a attak, but we are ertai that it does ot exeed.. The defiitio of hoelad seurity uder true uertaity We are ow ready to foralize a defiitio of hoelad seurity as the degree of iuity agaist uaetable loss. Let L be a ritial value for the exeted loss fro a terrorist attak, ad osider the roble of axiizig the rage of the robability of a attak withi whih the exeted loss fro a ossible attak does ot exeed L ; that is, ax LN ( ) ( ) / N L, [0, N], 0. [1] [0, ] 5 There are likely to be rado eleets of the daage aused by a suessfully deloyed weao, ad these eleets ay eve be truly uertai. We assue that this loss is kow with ertaity i order to fous o oe uertai eleet, that is, o the robability that a attak has bee lauhed. 6

8 Give defese ad itigatio efforts, LN ( ) ( ) / N, is ireasig i. Therefore, the solutio to [1] is to set LN ( ) ( )/ N= L ad solve for to obtai LN L (, ;, ) =, [0, ], [0, N], 0. [] L ( )( N ) The futio ( L, ;, ) haraterizes seurity agaist a uertai attak i the sese of iuity to otetial loss. Seifially, give defese ad itigatio efforts, ( L, ;, ) is the axiu robability of a attak for whih we are ertai that the exeted loss does ot exeed the ritial value L. I other words, soiety is iue to exeted loss L as log as the atual robability of a attak does ot exeed ( L, ;, )..3 The tehology of seurity Equatio [] desribes the tehology of hoelad seurity uder true uertaity. It haraterizes soiety s oortuities for takig atios (defese ad itigatio) to ahieve alterative degrees of iuity to alterative levels of exeted loss. I the ext setio, we will haraterize the rodutio of hoelad seurity as the alloatio of defese ad itigatio efforts that axiizes [], give the resoures devoted to hoelad seurity. Toward this ed we first eed to desribe how ( L, ;, ) varies with the uber of defeded athways ad efforts to itigate the effets of a suessful attak. The followig roositio, whih is roved i the aedix, rovides this desritio: Proositio 1: For ( L, ;, ) <, (0, N), ad > 0, ( L, ;, ) has the followig harateristis: i) > 0, > 0, ad > 0; ii) > 0, while the sig of is ideteriate; iii) ( L, ;, ) is stritly quasi-oave i (, ) if ad oly if < 0. ( L, ;, ) is stritly quasi-ovex if ad oly if > 0. 7

9 Part i) of the roositio idiates that ( L, ;, ) is otoially ireasig i ad so that ireasig the uber of defeded athways ad ireasig itigatio efforts both irease soiety s iuity to the ritial exeted loss L. Moreover, ilies that defese ad itigatio are oleets i the sese that ireased itigatio ireases the argial rodutivity of defese, ad vie-versa. Part ii) of the roositio reveals that the argial rodutivity of defese ireases as ore athways are defeded ( other had, it is ulear how ireased itigatio affets the argial rodutivity of itigatio. If but at a dereasig rate. O the other had, if > itigatio ireases with greater itigatio effort. Part iii) of the roositio reveals that whether the argial rodutivity of itigatio is ireasig or dereasig deteries whether 0 > 0). O the < 0, the ireasig itigatio ireases soiety s iuity to a ritial exeted loss, > 0 the the argial rodutivity of ( L, ;, ) is quasi-oave or quasi-ovex. This distitio has iliatios for the otial alloatio of hoelad seurity resoures to defese ad itigatio, whih we exlore ext. 3. The Produtio of Hoelad Seurity Obviously, levels of hoelad seurity deed o the resoures devoted to it. Moreover, give the resoures devoted to seurity, axial seurity is attaied by the effiiet alloatio of these resoures to defese ad itigatio efforts. Let R deote the oetary resoures devoted to hoelad seurity, ad let w ad deote the uit osts of defese ad itigatio efforts, resetively. The, the effiiet alloatio of resoures to defese ad itigatio to axiize iuity to a artiular exeted loss is the solutio to: w, ( ) ax ( L,,, ) = LN L ( )( N ) s.t. R w + w ( L, ;, ) [0, N], 0. [3] 8

10 At the outset this otiizatio roble a be silified a bit. First, the resoure ostrait always bids. The ootoiity of ( L, ;, ) i ad ilies that if R > w+ w, the ( L, ;, ) =. But the seurity a be ireased by dereasig L while ireasig ad/or util the budget is exhausted. There is a ossible solutio to [3] tha ivolves defedig all athways agaist ossible attak. Sie ( L,,, ) LN( L ( )( N ) ) =, the ostrait ( L, ;, ) a be writte as L L( )( N ) N. Settig = N so that all athways are defeded allows us to be erfetly iue to ay exeted loss; that is, we a ahieve ( L, ;, ) = for L = 0. It sees to us, though, that defedig all otetial targets of a terrorist attak is likely to be rohibitively exesive. Therefore, fro here o, we oly exaie solutios to [3] that ivolve < N. Moreover, let us assue that ( L, ;, ) is stritly quasi-oave i (, ) so that we a fous o solutios to [3] that ivolve > 0 ad > 0. 6 (We will briefly osider situatios ivolvig = 0 or = 0 later). The the hoies of defese ad itigatio solve ax ( L,,, ) subjet to R w w = 0. Let L deote the Lagrage equatio for this, roble ad let λ deote the ultilier for the budget ostrait. Uder our assutios the followig first-order oditios are both eessary ad suffiiet to solve [3]: LN L = w 0; L ( )( N ) λ = [4] LNL ( ) L = λw = 0; [5] [ L ( )] ( N ) L λ = R w w = 0. [6] 6 Quasi-oavity or quasi-ovexity deteries the urvature of the level urves of L (, ;, ). If L (, ;, ) is stritly quasi-ovex, the its level urves are stritly oave. I these ases, the otial hoies of defese ad itigatio will ertaily be a orer solutio. 9

11 Deote the solutio to [4] [6] as (,, λ ). The followig roositio haraterizes how seurity-axiizig hoies of defese ad itigatio deed o the ritial loss L ad the resoures devoted to seurity R. It is roved i the aedix. Proositio : Provided that ( L, ;, ) is stritly quasi-oave ad > 0 ad > 0 : i) ad are ideedet of L ; ii) is ireasig i R while is dereasig i R. Part i) idiates that otial defese ad itigatio are ideedet of the ritial exeted loss. This is true beause ( L, ;, ) is a liear futio of L. Part ii) of the roositio reveals that the uber of defeded athways is a oral iut i the rodutio of seurity, while itigatio is a iferior iut. Thus, ireased resoures alloated to hoelad seurity should be devoted to defese, while at the sae tie dereasig itigatio efforts. The ituitio behid this result is straightforward. Clearly, sie the argial rodutivity of defese is ireasig i higher levels of defese ( ), soiety should exloit this by alloatig at least a art of a irease i seurity resoures devoted to ireased defese. However, doig so ust be aoaied by a derease i itigatio efforts. To uderstad why this ust be the ase, ote that the first-order oditios [4] ad [5] ily that defese ad itigatio be hose so that the ratio of the argial roduts of these efforts i roduig seurity is equal to the ratio of the ries of these efforts. That is, [4] ad [5] a be obied to yield i.e., > 0 / = w / w. Alloatig at least a art of a irease i seurity resoures to additioal defese ireases, beause > 0. To aitai / = w / w, the, itigatio ust hage to irease by the sae aout as the irease i. Sie the argial rodutivity of itigatio is dereasig i this effort ( < 0 ), ireasig is aolished by reduig itigatio. 10

12 We will ot be aalyzig the effets of hages i the osts of defese ad itigatio o the otial solutio. 7 Therefore, Proositio 3 allows us to sily write the otial values for defese ad itigatio i ters of the resoures devoted to hoelad seurity; that is ad = ( R). The, axial iuity to exeted loss L is = ( R) LN ( LR,, ) = (, ; L, ) =. [7] L ( ( R))( N ( R)) Clearly, with reset to L, LN ( L( )( N )) has a zero iteret ad is liearly ireasig (this last follows beause ad are ideedet of L ). Figure 1 is a grah of LN ( L( )( N )) that we use to further refie the rodutio futio for seurity. As see i the grah, for suffiietly high values of L, ( ( )( )) LN L N exeeds. A exale of suh a outoe is ( +, L+ ). Clearly, sie + >, iuity to L + exeeds the axiu robability of a terrorist attak. The, oe ay be teted to sily say that axial seurity is give by the oit (, L + ) i the grah. Doig so suggests that otial seurity ( LR,, ) ireases u to ad the is ostat at this level for higher levels of ritial loss L. However, a oit like (, L + ) aot rereset the axial seurity attaiable with resoures R, beause suh a outoe ilies that soiety is willig to aet higher exeted losses tha it eeds to. Reduig the exeted ritial loss value fro L + to L k while holdig iuity to reresets greater seurity without additioal osts. Therefore, the otial rodutio of seurity is defied oly over exeted ritial losses betwee zero ad L k, ilusive. Thus, the followig roositio oletely haraterizes the otial rodutio of hoelad seurity. 7 As oe would guess, both defese ad itigatio are dereasig i their resetive uit osts. The ross-ost effets the effet o defese of a irease i the uit ost of itigatio ad the effet o itigatio of a irease i the uit ost of defese are abiguous. 11

13 Proositio 3: Give resoures R devoted to hoelad seurity, its otial rodutio is: where LN ( LR,, ) =, L [0, Lk( R, )], L ( ( R))( N ( R)) NL Lk( R, ) = L = L( ( R))( N ( R)) = L ( ( R))( N ( R)) N. [8] Our fial roositio rovides the fudaetal harateristis of the otial rodutio of hoelad seurity. It is roved i the aedix. Proositio 4: i) LR (,, ) = 0 for L = 0 ; ii) ( LR,, ) is liearly ireasig i L u to ; iii) ( LR,, ) is ireasig ad stritly ovex i R, for L < Lk( R, ) ; iv) LR (,, ) RL > 0, for L Lk( R, ) < ; Part i) of the roositio idiates zero iuity agaist zero exeted loss; that is, soiety has o ofidee that the exeted loss fro a terrorist attak is zero. Part ii) idiates a fudaetal tradeoff betwee iuity ad exeted loss. Give resoures devoted to hoelad seurity that are otially alloated to defese ad itigatio, ireased iuity agaist uaetable exeted losses is attaied oly by toleratig higher exeted losses. However, arts iii) ad iv) idiate that devotig ore resoures to hoelad seurity allows the attaiet of greater iuity to a artiular exeted loss, lower ritial exeted loss for the sae degree of iuity, or soe obiatio of greater iuity to lower ritial exeted loss. Moreover, give a ritial exeted loss L (0, L ( R, )), iuity to this loss ireases at a ireasig rate with greater resoures devoted to hoelad seurity. k 1

14 Figure is a grah of ( LR,, ) for two resoure levels, R0 < R1, whih we a use to illustrate the ai results of this aer. I the grah, L0 = Lk( R0, ) ad L1 = Lk( R1, ) as defied by [8]. Hoelad seurity uder true uertaity about the robability of a terrorist attak is the degree of iuity to uaetable exeted losses. More rigorously, a oit like ( A, L A) i Figure idiates the axiu robability of a terrorist attak, A, u to whih we are ertai that the exeted loss fro suh a attak does ot exeed L A. Suose that soiety devotes R 0 resoures to defedig agaist a terrorist attak ad itigatig the effets of a suessful attak, but ahieves oly ( A, L A). Clearly, the alloatio of R 0 to defese ad itigatio is ieffiiet beause greater seurity a be ahieved with these sae resoures. Cobiatios of iuity ad ritial exeted loss o the ab seget of ( LR, 0, ) rereset oits of greater seurity tha ( A, L A), beause they ivolve greater iuity to exeted loss L A, redued exeted loss while keeig iuity to that loss ostat at lower aetable exeted loss like oit ( B, L B). A, or soe obiatio of greater iuity to Give that soiety effiietly alloates R 0 to defese ad itigatio, hages i seurity ivolve a fudaetal tradeoff betwee iuity ad loss. Ahievig greater iuity requires toleratig a higher otetial exeted loss, ad vie versa. (Ideed, reduig the allowable loss to zero requires reduig iuity to zero). Ahievig greater seurity requires a greater ivestet i hoelad seurity. This is illustrated i Figure where a irease i this ivestet fro R 0 to R 1, allows the ahieveet of oits of greater seurity tha ( B, LB) o the d seget of ( LR, 1, ). Iterestigly, sie defese is oral iut ito the rodutio of seurity ad itigatio is a iferior iut (Proositio, art ii)), the irease i seurity resoures fro R 0 to R 1 alls for alloatig ore of these resoures to defese ad less to itigatio. To olete the aalysis let us very briefly exaie how ossible orer solutios for the hoie of defese or itigatio affet our ai results. These situatios ay our whe ( L, ;, ) is quasi-ovex i (, ). Or, give that we kow that defese is a oral iut ito the rodutio of seurity while itigatio i a iferior iut, very high levels of hoelad 13

15 seurity resoures ay all for devotig all of these resoures to defese ad oe to itigatio. Eve i these orer-solutio ases, ( LR,, ) retais its essetial harateristis rovided i Proositio 4. If = 0, all seurity resoures are alloated to itigatio so that = R w. / The, ( LR,, ) = LLR ( / w). As i Proositio 4, LR (,, ) = 0 for L= 0ad is liearly ireasig i L. Moreover, it is easy to show LR (,, ) R= LNL ( ) w[ L ( )] > 0, idiatig that ( LR,, ) is ireasig i R. O the other had, if = 0, the = R/ w ad ( LR,, ) = LNL(0)( N R/ w). It is straightforward to show that i these ases, ( LR,, ) retais the sae basi harateristis. The ushot the is that orer hoies of defese ad itigatio do ot hage the fudaetal struture of the rodutio of hoelad seurity as haraterized by Proositio Coludig Rearks: The Soial Choie of Hoelad Seurity We have exaied the defiitio ad rodutio of hoelad seurity uder true uertaity about terrorist attaks. We have argued that the degree of iuity to uaetable exeted losses fro terrorist attaks is a useful way to oetualize seurity uder true uertaity. We have illustrated this oet of seurity with a odel of alloatig a fixed budget for hoelad seurity to defedig the athways through whih a terrorist ay lauh a attak ad to efforts to itigate the daage fro a attak that evades this defese. Iuity to uaetable losses i this roble is the rage of uertaity about the likelihood of a attak withi whih the atual exeted loss will ot exeed soe ritial value. Hoelad seurity resoures are otially alloated to defese ad itigatio to axiize iuity to alterative levels of exeted loss. Our ost iortat result is that the rodutio of hoelad seurity ivolves a fudaetal trade-off betwee iuity ad aetable loss; that is, for fixed resoures that are otially alloated to defese ad itigatio, ireasig iuity to loss requires aetig higher exeted losses, ad reduig aetable exeted losses requires lower iuity. Greater ivestets i hoelad seurity allow soiety to irease seurity by ireasig iuity to soe ritial exeted loss, reduig the exeted loss we are willig to tolerate while holdig iuity to this loss ostat, or soe obiatio of ireased iuity to a lower ritial exeted loss. 14

16 Although we have show a useful way to thik about the roble of hoelad seurity ad have aalyzed harateristis of its rodutio, we have said little about soiety s referee ad hoie of seurity. Ideed, the variables that are iortat for defiig ad roduig seurity degree of iuity, ritial exeted loss, ad the resoures devoted to hoelad seurity are all atters of soial hoie. We have assued that soiety refers greater iuity to lower exeted loss, but we have show that ahievig both with fixed resoures is ot ossible. Therefore, a fuller desritio of the relative values that soiety laes o iuity ad ritial exeted loss is eessary to aalyze the soial hoie over these eleets of hoelad seurity. 15

17 Aedix Proof of Proositio 1: For arts i) ad ii) use [] to alulate = LN L ( )( N ) > 0 ; LNL ( ) = > 0 ; [ L ( )] ( N ) = LN 0 3 L ( )( N ) > LNL ( ) = > 0 ; [ L ( )] ( N ) ; { [ ( )] ( ) ( )} LN L L L = 3 3 [ L ( )] ( N ). Note that the sig of is equal to the sig of [ L ( )] L ( ) L( ), ad hee is ideteriate. For art iii), strit quasi-oavity requires ( ) ( ) > 0. Use the alulatios above to show that ( ) = 0. Therefore, ( L, ;, ) is stritly quasi-oave i (, ) if ad oly if >, whih requires < 0. Clearly, if ( ) 0 > 0, the ( L, ;, ) is stritly quasi-ovex, ad ( L, ;, ) is stritly quasi-ovex oly if > 0. QED. Proof of Proositio : For art i), set [4] ad [5] equal to eah other ad silify the result to obtai wl ( ) + wl ( )( N ) = 0. [A.1] This equatio ad the resoure ostrait, R w w = 0, deterie the otial values for ad. Note that L does ot eter either of these equatios, ilyig that the otial values of ad are ideedet of this ritial loss. To rove art ii), ote that the Hessia atrix assoiated with [4], [5], ad [6] is 16

18 w H = w. w w 0 The seod order oditio for a otiu is that the deteriat of this atrix be stritly ositive; that is H > 0. The oarative statis with reset to the budget are the solutios to the syste of equatios R 0 H R 0 =. λ R 1 [A.] Fro [A.] obtai R = ( w w) H > 0, The sig of R follows beause > 0 fro < 0, whih is required if ( L, ;, ) is stritly quasi- art ii) of Proositio 1 ad oave. Fro [A.] obtai = ( w w ) H. Calulate R w w = [ ( )( ) ( )] LN w L N w L [ L ( )] ( N ) 3. Fro [A.1], wl ( )( N ) = wl ( ). Substitutig this ito w w reveals that w w < 0. Cosequetly, R < 0. The roof is olete. QED. Proof of Proositio 4: Part i) follows fro [7] ad the fat that ad are ideedet of L (Proositio ). For art ii), use the eveloe theore to obtai LR (,, ) R= λ. If the first-order oditios [4] ad [5] hold, the λ > 0 ad LR (,, ) R> 0. Note that LR (,, ) R = λ R. Fro the first order oditios [4], [5], ad [6], ad [A.] obtai λ R = [( ) )] H > 0. The sig of R λ follows beause > 0 fro art ii) of 17

19 Proositio 1 ad < 0, whih is required for ( L, ;, ) to be stritly quasi-oave. Fially, to rove art iv) of the roositio ote that LR (,, ) RL = λ. Fro the first- L order oditio [4], λ ( )( ) 0 λ = LN w L( )( N ). Sie ad = N w L N >. This oletes the roof. QED. L are ideedet of L, 18

20 Referees Be-Hai, Yakov Ifo-Ga Deisio Theory: Deisios Uder Severe Uertaity. Seod Editio, Aadei Press. Be-Hai, Yakov Value at Risk with Ifo-Ga Uertaity. Joural of Risk Fiae 6(5), Bueo de Mesquita, Etha The Terrorist Edgae, A Model with Moral Hazard ad Learig. Joural of Coflit Resolutio 49(), Carel, Yohay ad Yakov Be-Hai Ifo-Ga Robust-Satisfiig Model of Foragig Behavior: Do Foragers Otiize or Satisfie? Aeria Naturalist 166(5), Eders, W., ad T. Sadler. 00. Patters of Trasatioal Terroris, : Alterative Ties Series Estiates. Iteratioal Studies Quarterly 46(), Eders, W.; G. F. Parise ad T. Sadler Tie Series Aalysis of Trasatioal Terroris: Treds ad Aalysis. Defee Eoois 3(4), Haler, Bejai S.; Hele M. Rega, Hugh P. Possigha ad Mihael A. MCarthy Aoutig for Uertaity i Marie Reserve Desig. Eology Letters 9, -11. Heal, Geoffrey ad Howard Kureuther IDS Models of Airlie Seurity. Joural of Coflit Resolutio 49(), Hora, R. D., C. Perrigs, F. Lui, ad E.H. Bulte. 00. Biologial Pollutio Prevetio Strategies Uder Igorae: The Case of Ivasive Seies. Aeria Joural of Agriultural Eoois 84(5), Katzer, D. W. Tie, Igorae, ad Uertaity i Eooi Models. The Uiversity of Mihiga Press. A Arbor, Mihiga Kelsey, D Choie Uder Partial Uertaity. Iteratioal Eooi Review 34(), Keohae, Nathaiel O. ad Rihard J. Zekhauser, 003. The Eology of Terror Defese. Joural of Risk ad Uertaity 6(/3), Kight, Frak H Risk, Uertaity, ad Profit. Houghto Miffli Co. Re-issued by Uiversity of Chiago Press. Kureuther, Howard ad Geoffrey Heal Iterdeedet Seurity. Joural of Risk ad Uertaity 6(/3), Lakdawalla, Darius ad George Zajai Isurae, Self-Protetio, ad the Eoois of Terroris. Joural of Publi Eoois 89, Moilae, Atte ad Breda A. Witle Uertaity Aalysis Favours Seletio of Satially Aggregated Reserve Strutures. Biologial Coservatio 19(3), Mikolus, E. F.; T. Sadler, J. M. Murdok ad P. Fleig Iteratioal Terroris: Attributes of Terrorist Evets, (ITERATE 3). Du Lorig, VA. Viyard Software. 19

21 Mikolus, E. F.; T. Sadler, J.M. Murdok, ad P. Fleig Iteratioal Terroris: Attributes of Terrorist Evets, (ITERATE 4). Du Lorig, VA. Viyard Software. Moffitt, L. Joe; Joh K. Stralud ad Barry C. Field. 005a. Isetios to Avert Terroris: Robustess uder Severe Uertaity. Joural of Hoelad Seurity ad Eergey Maageet (3), Artile 3. htt:// Moffitt L. Joe, Joh K. Stralud, Barry C. Field, ad Craig D. Ostee. 005b. "Robust Isetio for Ivasive Seies with a Liited Budget." Forthoig i The Eoois of Plat Health. Alfos Oude Lasik (ed.). Sriger. O Brie, S. P Foreig Poliy Crisis ad the Resort to Terroris: A Tie Series Aalysis of Coflit Likages. Joural of Coflit Resolutio 40(), Piere, S.G.; K. Worde ad G. Maso A Novel Iforatio-Ga Tehique to Assess Reliability of Neural Network-Based Daage Detetio. Joural of Soud ad Vibratio 93(1-), Reder, B.; R. M. Stair Jr. ad M. E. Haa Quatitative Aalysis for Maageet. Nith editio. Pretie Hall. Eglewood Cliffs, NJ. Viot, P.; S. Coga ad V. Ciolla A Robust Model-Based Test Plaig Proedure. Joural of Soud ad Vibratio 88(3),

22 ( ( )( )) LN L N (, L ) + + (, L + ) (, L ) k L L k Figure 1: Refiig the Produtio Futio for Hoelad Seurity. 1

23 ( LR,, ) LR (, 1, ) LR (, 0, ) a d b (, L ) B B (, L ) A A L1 L0 L Figure : The Produtio of Hoelad Seurity.

Fuzzy Task Assignment Model of Web Services Supplier

Fuzzy Task Assignment Model of Web Services Supplier Advaed Siee ad Tehology eers Vol.78 (Mulrab 2014),.43-48 h://dx.doi.org/10.14257/asl.2014.78.08 Fuzzy Task Assige Model of Web Servies Sulier Su Jia 1,2,Peg Xiu-ya 1, *, Xu Yig 1,3, Wag Pei-lei 2, Ma Na-ji

More information

An Intelligent E-commerce Recommender System Based on Web Mining

An Intelligent E-commerce Recommender System Based on Web Mining Iteratioal Joural of Busiess ad Maagemet A Itelliget E-ommere Reommeder System Based o We Miig Zimig Zeg Shool of Iformatio Maagemet, Wuha Uiversity Wuha 43007, Chia E-mail: [email protected]. The researh

More information

Traffic Flow Data Mining and Evaluation Based on Fuzzy Clustering Techniques

Traffic Flow Data Mining and Evaluation Based on Fuzzy Clustering Techniques 344 Iteratioal Joural of Fuzzy Systes, Vol. 3, No. 4, Deeber 0 Traffi Flow Data Miig ad Evaluatio Based o Fuzzy Clusterig Tehiques Hu Chuhu, Luo Niaxue, Ya Xiaohog, ad Shi Wezhog Abstrat Effetive iig tehology

More information

over an MC-MOmni network when has a capacity gain of 2π θ

over an MC-MOmni network when has a capacity gain of 2π θ O the Capaity of Multi-Chael ireless Networks Usig Diretioal Ateas Hog-Nig Dai Ka-ig Ng Rayod Chi-ig og ad Mi-You u The Chiese Uiversity of Hog Kog, Hog Kog {hdai,kwg,wwog}@se.uhk.edu.hk Shaghai Jiao Tog

More information

A Capacity Supply Model for Virtualized Servers

A Capacity Supply Model for Virtualized Servers 96 Iformatia Eoomiă vol. 3, o. 3/009 A apaity upply Model for Virtualized ervers Alexader PINNOW, tefa OTERBURG Otto-vo-Guerike-Uiversity, Magdeburg, Germay {alexader.piow stefa.osterburg}@iti.s.ui-magdeburg.de

More information

Supply Chain Network Design with Preferential Tariff under Economic Partnership Agreement

Supply Chain Network Design with Preferential Tariff under Economic Partnership Agreement roceedigs of the 2014 Iteratioal oferece o Idustrial Egieerig ad Oeratios Maageet Bali, Idoesia, Jauary 7 9, 2014 Suly hai Network Desig with referetial ariff uder Ecooic artershi greeet eichi Fuaki Yokohaa

More information

ABSTRACT INTRODUCTION MATERIALS AND METHODS

ABSTRACT INTRODUCTION MATERIALS AND METHODS INTENATIONAL JOUNAL OF AGICULTUE & BIOLOGY 156 853/6/8 1 5 9 http://www.fspublishers.org Multiplate Peetratio Tests to Predit Soil Pressure-siage Behaviour uder etagular egio M. ASHIDI 1, A. KEYHANI AND

More information

CHAPTER 4: NET PRESENT VALUE

CHAPTER 4: NET PRESENT VALUE EMBA 807 Corporate Fiace Dr. Rodey Boehe CHAPTER 4: NET PRESENT VALUE (Assiged probles are, 2, 7, 8,, 6, 23, 25, 28, 29, 3, 33, 36, 4, 42, 46, 50, ad 52) The title of this chapter ay be Net Preset Value,

More information

The dimensionless compressibility factor, Z, for a gaseous species is defined as the ratio

The dimensionless compressibility factor, Z, for a gaseous species is defined as the ratio Chater 3 3.4- The Comressibility Fator Equatio of State The dimesioless omressibility fator, Z, for a gaseous seies is defied as the ratio Z = (3.4-1) If the gas behaes ideally Z = 1. The extet to whih

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean 1 Social Studies 201 October 13, 2004 Note: The examples i these otes may be differet tha used i class. However, the examples are similar ad the methods used are idetical to what was preseted i class.

More information

A Load Balancing Algorithm for High Speed Intrusion Detection

A Load Balancing Algorithm for High Speed Intrusion Detection A Load Balacig Algorith for High Seed Itrusio Detectio LU Sheg, GONG Jia, RUI Suyig Deartet of Couter Sciece ad Egieerig, Southeast Uiversity, Naig, Chia Easter Chia (North) Network Ceter of CERNET (0096)

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

The Binomial Multi- Section Transformer

The Binomial Multi- Section Transformer 4/15/21 The Bioial Multisectio Matchig Trasforer.doc 1/17 The Bioial Multi- Sectio Trasforer Recall that a ulti-sectio atchig etwork ca be described usig the theory of sall reflectios as: where: Γ ( ω

More information

Convexity, Inequalities, and Norms

Convexity, Inequalities, and Norms Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for

More information

GSR: A Global Stripe-based Redistribution Approach to Accelerate RAID-5 Scaling

GSR: A Global Stripe-based Redistribution Approach to Accelerate RAID-5 Scaling : A Global -based Redistributio Approach to Accelerate RAID-5 Scalig Chetao Wu ad Xubi He Departet of Electrical & Coputer Egieerig Virgiia Coowealth Uiversity {wuc4,xhe2}@vcu.edu Abstract Uder the severe

More information

An Electronic Tool for Measuring Learning and Teaching Performance of an Engineering Class

An Electronic Tool for Measuring Learning and Teaching Performance of an Engineering Class A Electroic Tool for Measurig Learig ad Teachig Perforace of a Egieerig Class T.H. Nguye, Ph.D., P.E. Abstract Creatig a egieerig course to eet the predefied learig objectives requires a appropriate ad

More information

1 Correlation and Regression Analysis

1 Correlation and Regression Analysis 1 Correlatio ad Regressio Aalysis I this sectio we will be ivestigatig the relatioship betwee two cotiuous variable, such as height ad weight, the cocetratio of a ijected drug ad heart rate, or the cosumptio

More information

Infinite Sequences and Series

Infinite Sequences and Series CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. This documet was writte ad copyrighted by Paul Dawkis. Use of this documet ad its olie versio is govered by the Terms ad Coditios of Use located at http://tutorial.math.lamar.edu/terms.asp. The olie versio

More information

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations CS3A Hadout 3 Witer 00 February, 00 Solvig Recurrece Relatios Itroductio A wide variety of recurrece problems occur i models. Some of these recurrece relatios ca be solved usig iteratio or some other ad

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

SOLID MECHANICS DYNAMICS TUTORIAL DAMPED VIBRATIONS. On completion of this tutorial you should be able to do the following.

SOLID MECHANICS DYNAMICS TUTORIAL DAMPED VIBRATIONS. On completion of this tutorial you should be able to do the following. SOLID MECHANICS DYNAMICS TUTORIAL DAMPED VIBRATIONS This work overs elemets of the syllabus for the Egieerig Couil Eam D5 Dyamis of Mehaial Systems, C05 Mehaial ad Strutural Egieerig ad the Edeel HNC/D

More information

Queueing Analysis of Patient Flow in Hospital

Queueing Analysis of Patient Flow in Hospital IOSR Joural of Mathematis (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765X. Volume 10, Issue 4 Ver. VI (Jul-Aug. 2014), PP 47-53 Queueig Aalysis of Patiet Flow i Hospital Olorusola S. A, Adeleke R. A ad

More information

How to use what you OWN to reduce what you OWE

How to use what you OWN to reduce what you OWE How to use what you OWN to reduce what you OWE Maulife Oe A Overview Most Caadias maage their fiaces by doig two thigs: 1. Depositig their icome ad other short-term assets ito chequig ad savigs accouts.

More information

3 Energy. 3.3. Non-Flow Energy Equation (NFEE) Internal Energy. MECH 225 Engineering Science 2

3 Energy. 3.3. Non-Flow Energy Equation (NFEE) Internal Energy. MECH 225 Engineering Science 2 MECH 5 Egieerig Sciece 3 Eergy 3.3. No-Flow Eergy Equatio (NFEE) You may have oticed that the term system kees croig u. It is ecessary, therefore, that before we start ay aalysis we defie the system that

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich [email protected] [email protected] Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Generation of Synthetic Data Sets for Evaluating the Accuracy of Knowledge Discovery Systems

Generation of Synthetic Data Sets for Evaluating the Accuracy of Knowledge Discovery Systems Geeratio of Sythetic Data Sets for Evaluatig the Accuracy of Kowledge Discovery Systes Daiel R. Jeske Uiversity of Califoria Deartet of Statistics Riverside, CA 95-95-87-304 [email protected] Behrokh

More information

How To Solve The Homewor Problem Beautifully

How To Solve The Homewor Problem Beautifully Egieerig 33 eautiful Homewor et 3 of 7 Kuszmar roblem.5.5 large departmet store sells sport shirts i three sizes small, medium, ad large, three patters plaid, prit, ad stripe, ad two sleeve legths log

More information

Unit 8: Inference for Proportions. Chapters 8 & 9 in IPS

Unit 8: Inference for Proportions. Chapters 8 & 9 in IPS Uit 8: Iferece for Proortios Chaters 8 & 9 i IPS Lecture Outlie Iferece for a Proortio (oe samle) Iferece for Two Proortios (two samles) Cotigecy Tables ad the χ test Iferece for Proortios IPS, Chater

More information

arxiv:0903.5136v2 [math.pr] 13 Oct 2009

arxiv:0903.5136v2 [math.pr] 13 Oct 2009 First passage percolatio o rado graphs with fiite ea degrees Shakar Bhaidi Reco va der Hofstad Gerard Hooghiestra October 3, 2009 arxiv:0903.536v2 [ath.pr 3 Oct 2009 Abstract We study first passage percolatio

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: [email protected] Supervised

More information

Professional Networking

Professional Networking Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market

More information

Transient Vibration of the single degree of freedom systems.

Transient Vibration of the single degree of freedom systems. Trasiet Vibratio of the sigle degree of freedo systes. 1. -INTRODUCTION. Trasiet vibratio is defied as a teporarily sustaied vibratio of a echaical syste. It ay cosist of forced or free vibratios, or both

More information

Solving Logarithms and Exponential Equations

Solving Logarithms and Exponential Equations Solvig Logarithms ad Epoetial Equatios Logarithmic Equatios There are two major ideas required whe solvig Logarithmic Equatios. The first is the Defiitio of a Logarithm. You may recall from a earlier topic:

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Case Study. Normal and t Distributions. Density Plot. Normal Distributions

Case Study. Normal and t Distributions. Density Plot. Normal Distributions Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca

More information

A Multivariate Survey Analysis: Evaluation of Technology Integration in Teaching Statistics

A Multivariate Survey Analysis: Evaluation of Technology Integration in Teaching Statistics A Multivariate Survey Aalysis: Evaluatio of Tehology Itegratio i Teahig Statistis Abdellatif Thathae ad Paulie Carolye Fortes Teahig ad learig i higher eduatio has bee iflueed by the rapid rate of iovatio

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

Basic Elements of Arithmetic Sequences and Series

Basic Elements of Arithmetic Sequences and Series MA40S PRE-CALCULUS UNIT G GEOMETRIC SEQUENCES CLASS NOTES (COMPLETED NO NEED TO COPY NOTES FROM OVERHEAD) Basic Elemets of Arithmetic Sequeces ad Series Objective: To establish basic elemets of arithmetic

More information

Laws of Exponents. net effect is to multiply with 2 a total of 3 + 5 = 8 times

Laws of Exponents. net effect is to multiply with 2 a total of 3 + 5 = 8 times The Mathematis 11 Competey Test Laws of Expoets (i) multipliatio of two powers: multiply by five times 3 x = ( x x ) x ( x x x x ) = 8 multiply by three times et effet is to multiply with a total of 3

More information

Ant Colony Algorithm Based Scheduling for Handling Software Project Delay

Ant Colony Algorithm Based Scheduling for Handling Software Project Delay At Coloy Algorith Based Schedulig for Hadlig Software Project Delay Wei Zhag 1,2, Yu Yag 3, Juchao Xiao 4, Xiao Liu 5, Muhaad Ali Babar 6 1 School of Coputer Sciece ad Techology, Ahui Uiversity, Hefei,

More information

RISK TRANSFER FOR DESIGN-BUILD TEAMS

RISK TRANSFER FOR DESIGN-BUILD TEAMS WILLIS CONSTRUCTION PRACTICE I-BEAM Jauary 2010 www.willis.com RISK TRANSFER FOR DESIGN-BUILD TEAMS Desig-builD work is icreasig each quarter. cosequetly, we are fieldig more iquiries from cliets regardig

More information

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the

More information

Strategic Remanufacturing Decision in a Supply Chain with an External Local Remanufacturer

Strategic Remanufacturing Decision in a Supply Chain with an External Local Remanufacturer Assoiatio fo Ifomatio Systems AIS Eletoi Libay (AISeL) WHICEB 013 Poeedigs Wuha Iteatioal Cofeee o e-busiess 5-5-013 Stategi Remaufatuig Deisio i a Supply Chai with a Exteal Loal Remaufatue Xu Tiatia Shool

More information

Swaps: Constant maturity swaps (CMS) and constant maturity. Treasury (CMT) swaps

Swaps: Constant maturity swaps (CMS) and constant maturity. Treasury (CMT) swaps Swaps: Costat maturity swaps (CMS) ad costat maturity reasury (CM) swaps A Costat Maturity Swap (CMS) swap is a swap where oe of the legs pays (respectively receives) a swap rate of a fixed maturity, while

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Elementary Theory of Russian Roulette

Elementary Theory of Russian Roulette Elemetary Theory of Russia Roulette -iterestig patters of fractios- Satoshi Hashiba Daisuke Miematsu Ryohei Miyadera Itroductio. Today we are goig to study mathematical theory of Russia roulette. If some

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

Theorems About Power Series

Theorems About Power Series Physics 6A Witer 20 Theorems About Power Series Cosider a power series, f(x) = a x, () where the a are real coefficiets ad x is a real variable. There exists a real o-egative umber R, called the radius

More information

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n We will cosider the liear regressio model i matrix form. For simple liear regressio, meaig oe predictor, the model is i = + x i + ε i for i =,,,, This model icludes the assumptio that the ε i s are a sample

More information

Ekkehart Schlicht: Economic Surplus and Derived Demand

Ekkehart Schlicht: Economic Surplus and Derived Demand Ekkehart Schlicht: Ecoomic Surplus ad Derived Demad Muich Discussio Paper No. 2006-17 Departmet of Ecoomics Uiversity of Muich Volkswirtschaftliche Fakultät Ludwig-Maximilias-Uiversität Müche Olie at http://epub.ub.ui-mueche.de/940/

More information

How To Calculate Stretch Factor Of Outig I Wireless Network

How To Calculate Stretch Factor Of Outig I Wireless Network Stretch Factor of urveball outig i Wireless Network: ost of Load Balacig Fa Li Yu Wag The Uiversity of North arolia at harlotte, USA Eail: {fli, yu.wag}@ucc.edu Abstract outig i wireless etworks has bee

More information

GOAL PROGRAMMING BASED MASTER PLAN FOR CYCLICAL NURSE SCHEDULING

GOAL PROGRAMMING BASED MASTER PLAN FOR CYCLICAL NURSE SCHEDULING Joural of Theoretical ad Applied Iforatio Techology 5 th Deceber 202. Vol. 46 No. 2005-202 JATIT & LLS. All rights reserved. ISSN: 992-8645 www.jatit.org E-ISSN: 87-395 GOAL PROGRAMMING BASED MASTER PLAN

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

Connectivity and Capacity of Multi-Channel Wireless Networks with Channel Switching Constraints

Connectivity and Capacity of Multi-Channel Wireless Networks with Channel Switching Constraints This ull text paper was peer reviewed at the diretio o IEEE Commuiatios Soiety subjet matter experts or publiatio i the IEEE INFOCOM 2007 proeedigs. Coetivity ad Capaity o Multi-Chael Wireless Networks

More information

Estimating Probability Distributions by Observing Betting Practices

Estimating Probability Distributions by Observing Betting Practices 5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,

More information

What Is Required? You need to find the final temperature of an iron ring heated by burning alcohol. 4.95 g

What Is Required? You need to find the final temperature of an iron ring heated by burning alcohol. 4.95 g Calculatig Theral Eergy i a Bob Calorieter (Studet textbook page 309) 31. Predict the fial teperature of a 5.00 10 2 g iro rig that is iitially at 25.0 C ad is heated by cobustig 4.95 g of ethaol, C 2

More information

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem Lecture 4: Cauchy sequeces, Bolzao-Weierstrass, ad the Squeeze theorem The purpose of this lecture is more modest tha the previous oes. It is to state certai coditios uder which we are guarateed that limits

More information

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals Overview Estimatig the Value of a Parameter Usig Cofidece Itervals We apply the results about the sample mea the problem of estimatio Estimatio is the process of usig sample data estimate the value of

More information

Simple Annuities Present Value.

Simple Annuities Present Value. Simple Auities Preset Value. OBJECTIVES (i) To uderstad the uderlyig priciple of a preset value auity. (ii) To use a CASIO CFX-9850GB PLUS to efficietly compute values associated with preset value auities.

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Maximum Likelihood Estimators.

Maximum Likelihood Estimators. Lecture 2 Maximum Likelihood Estimators. Matlab example. As a motivatio, let us look at oe Matlab example. Let us geerate a radom sample of size 00 from beta distributio Beta(5, 2). We will lear the defiitio

More information

Distributed Storage Allocations for Optimal Delay

Distributed Storage Allocations for Optimal Delay Distributed Storage Allocatios for Optial Delay Derek Leog Departet of Electrical Egieerig Califoria Istitute of echology Pasadea, Califoria 925, USA derekleog@caltechedu Alexadros G Diakis Departet of

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Chapter 5: Inner Product Spaces

Chapter 5: Inner Product Spaces Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

3. Greatest Common Divisor - Least Common Multiple

3. Greatest Common Divisor - Least Common Multiple 3 Greatest Commo Divisor - Least Commo Multiple Defiitio 31: The greatest commo divisor of two atural umbers a ad b is the largest atural umber c which divides both a ad b We deote the greatest commo gcd

More information

1. C. The formula for the confidence interval for a population mean is: x t, which was

1. C. The formula for the confidence interval for a population mean is: x t, which was s 1. C. The formula for the cofidece iterval for a populatio mea is: x t, which was based o the sample Mea. So, x is guarateed to be i the iterval you form.. D. Use the rule : p-value

More information

Throughput and Delay Analysis of Hybrid Wireless Networks with Multi-Hop Uplinks

Throughput and Delay Analysis of Hybrid Wireless Networks with Multi-Hop Uplinks This paper was preseted as part of the ai techical progra at IEEE INFOCOM 0 Throughput ad Delay Aalysis of Hybrid Wireless Networks with Multi-Hop Upliks Devu Maikata Shila, Yu Cheg ad Tricha Ajali Dept.

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

Building Blocks Problem Related to Harmonic Series

Building Blocks Problem Related to Harmonic Series TMME, vol3, o, p.76 Buildig Blocks Problem Related to Harmoic Series Yutaka Nishiyama Osaka Uiversity of Ecoomics, Japa Abstract: I this discussio I give a eplaatio of the divergece ad covergece of ifiite

More information

Chapter 7: Confidence Interval and Sample Size

Chapter 7: Confidence Interval and Sample Size Chapter 7: Cofidece Iterval ad Sample Size Learig Objectives Upo successful completio of Chapter 7, you will be able to: Fid the cofidece iterval for the mea, proportio, ad variace. Determie the miimum

More information

WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER?

WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER? WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER? JÖRG JAHNEL 1. My Motivatio Some Sort of a Itroductio Last term I tought Topological Groups at the Göttige Georg August Uiversity. This

More information

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the.

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the. Cofidece Itervals A cofidece iterval is a iterval whose purpose is to estimate a parameter (a umber that could, i theory, be calculated from the populatio, if measuremets were available for the whole populatio).

More information

SINCLAIR COMMUNITY COLLEGE DAYTON, OHIO DEPARTMENT SYLLABUS FOR COURSE IN MAT 1355 - INTERMEDIATE ALGEBRA I (3 CREDIT HOURS)

SINCLAIR COMMUNITY COLLEGE DAYTON, OHIO DEPARTMENT SYLLABUS FOR COURSE IN MAT 1355 - INTERMEDIATE ALGEBRA I (3 CREDIT HOURS) SINCLAIR COMMUNITY COLLEGE DAYTON OHIO DEPARTMENT SYLLABUS FOR COURSE IN MAT 1355 - INTERMEDIATE ALGEBRA I (3 CREDIT HOURS) 1. COURSE DESCRIPTION: Ftorig; opertios with polyoils d rtiol expressios; solvig

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

TIAA-CREF Wealth Management. Personalized, objective financial advice for every stage of life

TIAA-CREF Wealth Management. Personalized, objective financial advice for every stage of life TIAA-CREF Wealth Maagemet Persoalized, objective fiacial advice for every stage of life A persoalized team approach for a trusted lifelog relatioship No matter who you are, you ca t be a expert i all aspects

More information

Exploratory Data Analysis

Exploratory Data Analysis 1 Exploratory Data Aalysis Exploratory data aalysis is ofte the rst step i a statistical aalysis, for it helps uderstadig the mai features of the particular sample that a aalyst is usig. Itelliget descriptios

More information

Trigonometric Form of a Complex Number. The Complex Plane. axis. ( 2, 1) or 2 i FIGURE 6.44. The absolute value of the complex number z a bi is

Trigonometric Form of a Complex Number. The Complex Plane. axis. ( 2, 1) or 2 i FIGURE 6.44. The absolute value of the complex number z a bi is 0_0605.qxd /5/05 0:45 AM Page 470 470 Chapter 6 Additioal Topics i Trigoometry 6.5 Trigoometric Form of a Complex Number What you should lear Plot complex umbers i the complex plae ad fid absolute values

More information

A Cyclical Nurse Schedule Using Goal Programming

A Cyclical Nurse Schedule Using Goal Programming ITB J. Sci., Vol. 43 A, No. 3, 2011, 151-164 151 A Cyclical Nurse Schedule Usig Goal Prograig Ruzzaiah Jeal 1,*, Wa Rosaira Isail 2, Liog Choog Yeu 3 & Ahed Oughalie 4 1 School of Iforatio Techology, Faculty

More information

Notes on exponential generating functions and structures.

Notes on exponential generating functions and structures. Notes o expoetial geeratig fuctios ad structures. 1. The cocept of a structure. Cosider the followig coutig problems: (1) to fid for each the umber of partitios of a -elemet set, (2) to fid for each the

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information