2012ICM O奖论文2
黄海,浙江理工大学硕士毕业论文-2012,实验部分(已删减)

黄海,浙江理⼯⼤学硕⼠毕业论⽂-2012,实验部分(已删减)第⼆章吡咯⾥西啶⽣物碱的提取分离和催化反应筛选2.1 引⾔内容未公开2.1.1 吡咯⾥西啶⽣物碱的提取分离内容未公开2.1.2 吡咯⾥西啶⽣物碱催化的不对称反应的筛选⼤环吡咯⾥西啶⽣物碱具有多个⼿性中⼼、碗形的刚性次碱母核、柔性次酸⼤环及其连接的功能基团,表现出结构的复杂性和空间、电⼦效应⽅⾯的精细特征。
根据我们查阅的⽂献,结合该催化剂⾃⾝的特点,我们考察了吡咯⾥西啶⽣物碱26催化的不对称Henry反应、不对称Michael加成反应以及不对称还原反应等多种不对称有机反应的筛选研究。
同时我们还考察了26⽤苄氯制备成季铵盐MCTBEC后对查尔酮的环氧化和Darzens反应。
如下图所⽰:OOPhCHO OEtOOEt O MCT (10 mol%)NH OPhOEtO OEt 不对称Hantzsch 反应不对称Henry 反应2CHOCH 3NO 2MCT (10 mol%)2NO 2OHaza-Michae 加成PhPhOPhNH 2PhPhONH Ph nitro-Mannich (aza-Henry)反应HN OMeCH 3NO 2MCT (20 mol%)HNOMeNO 2TFA (20 mol%) tolene, rtCHCl 3, rt35% yield 3% ee 66% yield nd. ee 22% yield nd. ee88% yield3% eeTHF, rtrtNH 4OAcPhNO 2PhNO 2MCT (5 mol%)不对称Michael 加成反应22OO PhNO 2N HN H PhNO 263% yield 6% eetoluene, rtOClCHOOOO 2NNO 223 rt, 3h65% yield 0% ee 1% yield nd ee Pudovik 反应HPOOEt NO 2CHONO 2O OEt P OH前⼿性酮还原OOHEtOH, rt不对称Diels-Alder 反应N OO Ph ON OO Ph HOCHCl 3, rt10% yield 8% ee35% yield 14% eeOOOrt环氧化MCT (9 mol%), tBuOOH, 20% NaOH(aq.), CHCl 3, 48h: 56% yield, 2% ee MCTBEC (5 mol%), 28% NaClO(aq.), CH 2Cl 2, 72h: 15% yield, 2% ee Darzens 反应Friedel-Crafts 烷基化48% yield 7% ee图2.4 MCT 和MCTBEC 筛选的反应2.2实验部分2.2.1 仪器和试剂仪器:微量旋光仪(Rodolph Autopol IV);Bruker 400 UltraShield TM核磁共振仪(Avance A V 400MHz Digital FT-NMR Spectrometer,CDCl3为溶剂,TMS内标);美国Nicolet Avatar 370红外光谱仪(KBr压⽚);Bruker APEX-Ⅱ质谱仪;XT-1型数字显⽰显微熔点仪(温度未校正);KY-Ⅲ型空⽓压缩机(绍兴卫星医疗设备有限公司)。
2012年诺贝尔生理学或医学奖剖析与启示.

2012年诺贝尔生理学或医学奖剖析与启示北京时间10月8日下午5点30分,2012年诺贝尔生理学或医学奖揭晓,英国科学家约翰·戈登(John B. Gurdon)和日本科学家山中伸弥(Shinya Yamanaka)获奖,获奖理由为“发现成熟细胞可被重组变为多能性”。
英国科学家约翰.格登在青蛙的卵与体细胞之间转换DNA,培育出世界上第一只“克隆”蛙;日本科学家山中伸弥基于约翰.格登的理念,将普通皮肤重新变回多能干细胞 (79)岁的约翰·戈登、50岁的山中伸弥,两位学者因在细胞核重编程研究领域的杰出贡献,获得2012年诺贝尔生理学或医学奖。
他们的重大贡献在于从理论上颠覆了人们对自然发育分化的传统观念,即认为干细胞分化为体细胞是不可逆的过程,从而为获取多能干细胞增添了一个新的途径。
而以此为核心技术的再生医学研究也将得以快速的发展,人类逆转生命的时钟,实现生命的再造不再是遥不可及的梦想。
[1]细胞核重编程,就是将已经分化了的成年体细胞进行诱导,让其重新回到发育早期多能干细胞状态,重新获得发育成各种类型细胞的能力。
按照对生命孕育、生长和成熟的传统看法,在生殖细胞配子(精子和卵子)结合形成胚胎的孕育之初,胚胎中的所有细胞都是不成熟的细胞,它们可以分化发育为身体的各种器官和组织。
例如,从胚胎细胞可以分化为神经细胞,再生成大脑、脊髓和周围神经,形成神经系统。
但是,它们形成之后,就成为定性、定型的特化细胞。
当这些神经细胞、肝细胞等特化成熟后,就不能逆转回到过去的非成熟细胞,即意味着生命是不可以逆转的。
然而,约翰·格登和山中伸弥的研究却打破了这一固有观念,发现成熟细胞可以逆转回原始状态,被重编程为多功能的干细胞。
他们的精彩成果彻底改变了人类对细胞和生物体发展的认识,关于细胞命运调控和发育的教科书内容已经被重新改写。
[2][4]约翰·格登和山中伸弥的突出贡献还在于其免除了使用人体胚胎提取干细胞的伦理道德制约。
2012年诺贝尔生理学或医学奖简介

2012年诺贝尔生理学或医学奖简介
曾武威
【期刊名称】《基础医学与临床》
【年(卷),期】2012(32)11
【摘要】2012年10月8日,瑞典卡罗林斯卡研究所诺贝尔生理学或医学委员会宣布,将2012年诺贝尔生理学或医学奖同时授予两位科学家:英国发育生物学家Sir John B.Gurdon(约翰·戈登爵士)和日本科学家Shinya Yamanaka(山中
伸弥),以表彰他们“发现成熟细胞可被重编程而成为多能性”的杰出贡献。
这两位科学家发现,成熟特化的细胞可被重编程为能发育成机体所有组织的未成熟细胞,他们的发现彻底颠覆了人们对细胞和生物体发育的认识,并开创了从基础研究到临床应用的一个全新视角。
【总页数】1页(PF0002-F0002)
【关键词】诺贝尔生理学或医学奖;瑞典卡罗林斯卡研究所;成熟细胞;科学家;生物学家;临床应用;委员会;Sir
【作者】曾武威
【作者单位】中国医学科学院基础医学研究所
【正文语种】中文
【中图分类】R445.2
【相关文献】
1.2009年诺贝尔生理学或医学奖和诺贝尔化学奖简介 [J],
2.丙肝病毒发现之旅——2020年诺贝尔生理学或医学奖简介 [J], 田地
3.基因的力量,让神秘的病毒无处躲藏——2020年诺贝尔生理学或医学奖简介 [J], 吴艳花;王培刚;安静
4.2021年诺贝尔生理学或医学奖简介 [J], 曾武威
5.人是如何感知外部世界的——2021年诺贝尔生理学或医学奖简介 [J], 田地
因版权原因,仅展示原文概要,查看原文内容请购买。
《基于缺陷型CeO2的金属基光催化材料设计及其高效催化小分子产氢研究》范文

《基于缺陷型CeO2的金属基光催化材料设计及其高效催化小分子产氢研究》篇一一、引言随着全球对清洁能源的需求日益增长,光催化技术已成为当前研究的重要方向之一。
在众多光催化材料中,基于缺陷型CeO2的金属基光催化材料因其高活性和良好的稳定性受到了广泛关注。
本篇论文将深入探讨缺陷型CeO2的金属基光催化材料的设计、制备及其在高效催化小分子产氢方面的应用研究。
二、文献综述(一)CeO2光催化材料概述CeO2作为一种重要的光催化材料,具有优异的氧化还原性能和良好的化学稳定性。
然而,其光催化效率受制于光生电子和空穴的快速复合。
为解决这一问题,研究者们通过引入缺陷来调控CeO2的电子结构,提高其光催化性能。
(二)缺陷型CeO2的制备与性能缺陷型CeO2的制备方法主要包括化学气相沉积、溶胶凝胶法、水热法等。
通过引入氧空位、铈离子间隙等缺陷,可以有效提高CeO2的光吸收能力和光生载流子的分离效率。
此外,缺陷型CeO2还具有较高的比表面积和丰富的表面活性位点,有利于提高光催化反应的活性。
(三)金属基复合光催化材料为进一步提高CeO2的光催化性能,研究者们将金属(如Pt、Au、Ag等)与CeO2复合,形成金属基复合光催化材料。
金属的引入可以改善CeO2的光吸收性能,同时作为助催化剂,促进光生电子和空穴的分离和传输,从而提高光催化产氢的效率。
三、实验方法(一)缺陷型CeO2的制备采用溶胶凝胶法制备缺陷型CeO2。
以硝酸铈为铈源,通过调节pH值、温度等参数,制备出具有不同缺陷浓度的CeO2样品。
(二)金属基复合光催化材料的制备将制备好的缺陷型CeO2与金属前驱体溶液混合,通过浸渍法、光还原法等方法,将金属负载到CeO2表面,形成金属基复合光催化材料。
四、实验结果与讨论(一)缺陷型CeO2的表征通过XRD、SEM、TEM等手段对制备的缺陷型CeO2进行表征。
结果表明,制备的CeO2具有较高的结晶度和良好的形貌。
氧空位、铈离子间隙等缺陷的存在可以通过XPS等手段进行证实。
2014ICM讲解(西电O奖)

集聚系数越小,重 要性相对越大
度 vs 集聚系数
• 度:度体现了该结点与其他结点建立直接 联系的能力, 但不能反映该节点的邻居节点 的连接情况。
• 集聚系数:集聚系数虽然在一定程度上能 够反映邻居节点的连接情况, 但不能反映邻 居节点的规模。
综上考虑,我们将两者综合考虑, 建立了基于度指标与聚合系数的结点 重要性综合评价模型。
– 如FISHBURN, PETER C虽然没有和Edors频 繁合作,但是与高影响力的学者合作,如
FUREDI, ZOLTAN,GRAHAM, RONALD LEWIS and SPENCER, JOEL HAROLD),所以 他的影响力排名有了提升。
• 结论:重要度低的学者也可以通过与高影 响力的学者合作,改变影响力排名。
ICM2014 用网络来衡量影响力度
参考西电Outstanding奖论文
1. 问题重述
通过对赛题进行近一步理解,最终将 2014年ICM赛题归结为以下5个问题: 1.建立学者的合作网络,分析此网络属性。 2.建立学者影响力模型,确定网络中最有影 响力的人。 3.建立论文的引用网络,确定网络中最有影 响力的论文。 4.收集数据,将网络模型应用到其他领域。 5.讨论网络模型的科学性和实用性。
4.2 模型2:基于PageRank算法的 结点影响力度量模型
PageRank算法的引入
– Google搜索引擎因其强大的检索功能以及高质量的检 索服务成为当今最受欢迎的搜索引擎之一,Google利 用其PageRank算法计算出每个网页的PageRank值, 通过权衡指向该搜索目标的链接数目以及这些链接的 重要性大小,从而决定网页在搜索结果中出现的位置, PageRank值越高,出现的位置便越靠前。
2012nature2 (2)

without the dye under irradiation of 100 mW cm–2 simulated AM 1.5 sunlight.
doi:10.1038/nature11067
Table S1. JV characteristics of the solar cell devices of that consist of CsSnI2.95F0.05 and TiO2
Figure S3. Optical absorption spectrum of CsSnI3/N719dye/TiO2 cell obtained by diffuse reflectance spectroscopy
W W W. N A T U R E . C O M / N A T U R E | 3
4 | W W W. N A T U R E . C O M / N A T U R E
CsSnI2.95F0.05 CsSnI2.90F0.10
Area (cm2) 0.282 0.326
Thickness (m) 12.3 16.8
Voc (V) 0.467 0.424
Jsc (mA cm−2) 0.809 0.807
FF (%) 59.3 61.5
(%) 0.224 0.211
15 10 5 0 0.0
-2
0.2
0.4 0.6 0.8 Photovoltage (V)
1.0
Figure S2. Photocurrent density-voltage (J-V) characteristics of the solar cell devices incorporating CsSnI2.95F0.05 doped with 5% SnF2 under irradiation of 100 mW cm–2 simulated AM 1.5 sunlight. Those of the pristine cell (yellow), the cell with ZnO photonic crystal (wine), the cell with ZnO photonic crystal (blue) and a mask are represented.
A multi-product multi-echelon inventory control model with joint replenishment strategy

A multi-product multi-echelon inventory control model with joint replenishment strategyWei-Qi Zhou ⇑,Long Chen,Hui-Ming GeSchool of Automobile and Traffic Engineering,Jiangsu University,Zhenjiang 212013,Chinaa r t i c l e i n f o Article history:Received 23January 2011Received in revised form 11April 2012Accepted 21April 2012Available online xxxx Keywords:InventoryMulti-product Multi-echelonGenetic Algorithm (GA)Joint replenishment strategya b s t r a c tOn the basis of analyzing the shortages of present studies on multi-echelon inventory con-trol,and considering some restrictions,this paper applies the joint replenishment strategy into the inventory system and builds a multi-product multi-echelon inventory control model.Then,an algorithm designed by Genetic Algorithm (GA)is used for solving the model.Finally,we respectively simulate the model under three different ordering strate-gies.The simulation result shows that the established model and the algorithm designed by GA have obvious superiority on reducing the total cost of the multi-product multi-echelon inventory system.Moreover,it illustrates the feasibility and the effectiveness of the model and the GA method.Crown Copyright Ó2012Published by Elsevier Inc.All rights reserved.1.IntroductionA supply chain is a network of nodes cooperating to satisfy customers’demands,and the nodes are arranged in echelons.In the network,each node’s position is corresponding to its relative position in reality.The nodes are interconnected through supply–demand relationships.These nodes serve external demand which generates orders to the downstream echelon,and they are served by external supply which responds to the orders of the upstream echelon.The problem of multi-echelon inventory control has been investigated as early as the 1950s by researchers such as Arrow et al.[1]and Love [2].The main challenge in these problems is to control the inventory levels by determining the size of the orders for each echelon during each period so as to optimize a given objective function.Many researchers have studied how to reduce the inventory cost of either suppliers or distributors,or have considered either the distribution system or the production system.Burns and Sivazlian [3]investigated the dynamic response of a multi-echelon supply chain to various demands placed upon the system by a final consumer.Van Beek [4]carried out a model in order to compare several alternatives for the way in which goods are forwarded from factory,via stores to the cus-tomers.Zijm [5]presented a framework for the planning and control of the materials flow in a multi-item production system.The prime objective was to meet a presanctified customer service level at minimum overall costs.Van der Heijden [6]deter-mined a simple inventory control rule for multi-echelon distribution systems under periodic review without lot sizing.Yoo et al.[7]proposed an improved DRP method to schedule multi-echelon distribution network.Diks and Kok [8]considered a divergent multi-echelon inventory system,such as a distribution system or a production system.Andersson and Melchiors [9]considered a one warehouse several retailers’inventory system,assuming lost sales at the retailers.Huang et al.[10]0307-904X/$-see front matter Crown Copyright Ó2012Published by Elsevier Inc.All rights reserved./10.1016/j.apm.2012.04.054⇑Corresponding author.Tel.:+8651188780074;fax:+8651188791900.E-mail address:zwqsky@ (W.-Q.Zhou).2W.-Q.Zhou et al./Applied Mathematical Modelling xxx(2012)xxx–xxxconsidered a one-warehouse multi-retailer system under constant and deterministic demand,which is subjected to transpor-tation capacity for every delivery godimos and Koukoumialos[11]developed closed-form customer service models.And many researchers have modeled an inventory system of only two-echelon or two-layer.Gupta and Albright[12] modeled a two-echelon multi-indentured repairable-item inventory system.Axsäter and Zhang[13]considered a two-level inventory system with a central warehouse and a number of identical retailers.Axsäter[14]considered a two-echelon distri-bution inventory system with stochastic demand.Chen et al.[15]considered a two-level inventory system in which there are one supplier and multiple retailers.Tee and Rossetti[16]developed a simulation model to explore the model’s ability to pre-dict system performance for a two-echelon one-warehouse,multiple retailer system.Seferlis and Giannelos[17]developed a new two-layered optimization-based control approach for multi-product,multi-echelon supply chain networks.Hill et al.[18]considered a single-item,two-echelon,continuous-review inventory model.Al-Rifai and Rossetti[19]presented a two-echelon non-repairable spare parts inventory system.Mitra[20]considered a two echelon system with returns under more generalized conditions,and developed a deterministic model as well as a stochastic model under continuous review for the system.There are also many researches on multi-echelon inventory control,considering either the distribution system or the sup-ply system.Choi et al.[21]evaluated conventional lot-sizing rules in a multi-echelon coalescence MRP system.Chikán and Vastag[22]described a multi-echelon production inventory system and developed a heuristic suggestion.Bregman et al.[23]introduced a heuristic algorithm for managing inventory in a multi-echelon environment.Van der Vorst et al.[24]pre-sented a method for modeling the dynamic behavior of multi-echelon food supply chains and evaluating alternative designs of the supply chain by applying discrete-event simulation.The model considered a producer,a distribution center and2re-tailer outlets.Iida[25]studied a dynamic multi-echelon inventory problem with nonstationary u and Lau[26] applied different demand-curve functions to a simple inventory/pricing model.Routroy and Kodali[27]developed a three-echelon inventory model for single product,which consists of single manufacturer,single warehouse and single retailer. Dong and Lee[28]considered a multi-echelon serial periodic review inventory system and3echelons for numerical exam-ple.The system extended the approximation to the time correlated demand process of Clark and Scarf[29],and studied in particular for an auto-regressive demand model the impact of leadtimes and auto-correlation on the performance of the se-rial inventory system.Gumus and Guneri[30]structured an inventory management framework and deterministic/stochas-tic-neurofuzzy cost models within the context of this framework for effective multi-echelon supply chains under stochastic and fuzzy environments.Caggiano et al.[31]described and validated a practical method for computing channelfill rates in a multi-item,multi-echelon service parts distribution system.Yang and Lin[32]provided a serial multi-echelon integrated just-in-time(JIT)model based on uncertain delivery lead time and quality unreliability considerations.Gumus et al.[33] structured an inventory management framework and deterministic/stochastic-neuro-fuzzy cost models within the context of the framework.Then,a numerical application in a three-echelon tree-structure chain is presented to show the applicabil-ity and performance of proposed framework.The model only handled one product type.Only one other paper we are aware of addresses a problem similar to ours and consideres inventory optimization in a multi-echelon system,considering both the distribution system and the supply system.Rau et al.[34]developed a multi-echelon inventory model for a deteriorating item and to derive an optimal joint total cost from an integrated perspective among the supplier,the producer,and the buyer.The model considered the single supplier,single producer and single buyer. The basic difference between our model and Rau et al.[34]is that our model considers multiple suppliers,one producer,and multiple distributors and buyers.Additionally,an algorithm designed by Genetic Algorithm(GA)is used for solving the mod-el,and we apply the joint replenishment strategy into the model.The remainder of this paper is organized as follows:In Section2,the various assumptions are made and the multi-product multi-echelon inventory control model is developed.In Section3,GA is used for solving the model and the algorithm based on GA is designed.Then,we simulate the model under three different ordering strategies,respectively.In Section4,conclu-sions and limitations in this research are presented.2.Mathematical model2.1.The multi-product multi-echelon inventory control model descriptionIn this model,the raw materials,accessories or products can be supplied from the nodal enterprise of layer k to the nodal enterprise of layer k +1,but there is no logistics between nodal enterprises of the same layer or the non-adjacent layers.And also there is no reverse logistics from the nodal enterprise of high-layer to the nodal enterprise of low-layer.The multi-prod-uct multi-echelon inventory system is divided into three subsystems (supply network,core enterprise and distribution net-work)by the core enterprise as a dividing line (Fig.1).The key issue to the multi-product multi-echelon inventory system is to determine the optimal order quantity and the optimal order cycle for each nodal enterprise in order to minimize the inventory cost of the whole system.In this paper,the (T ,S )inventory control strategy based on multi-product joint replenishment is used.The multi-product joint replenishment strategy is an ordering strategy that to order varieties of products in one order cycle.Each nodal enter-prise determines a minimum order cycle as the basic order cycle,and the order cycle of the same enterprise to order each product is an integral multiple of the basic order cycle.2.2.Assumptions(1)In this supply chain,there is only one core enterprise.(2)Allow a variety of products,but the price of each product is fixed.And also allow a variety of raw materials or acces-sories,but one supplier only provides one raw material or accessory.(3)The demand of each nodal enterprise per day is random,but it obeys Poisson distribution.(4)Lead time of each nodal enterprise is fixed.(5)Storage cost per product per unit time is constant.And the storage cost of different nodal enterprises is allowed to bedifferent.2.3.Notations P w price of product w (there are W kind of products,and w =1,2,...,W )P g k Àl price of raw material or accessory provided by the nodal enterprise g of layer k Àl (g =1,2,...,m k Àl ;l =1,2,...,k À1;m k Àl is the number of nodal enterprises of layer k Àl)T h k basic order cycle of the nodal enterprise h of layer k to order products from the nodal enterprises of layer k À1T ðg ;h Þk order cycle of the nodal enterprise h of layer k to order products from the nodal enterprise g of layer k À1Z ðg ;h Þkratio of T ðg ;h Þkand T h k ,which is a positive integer,so T ðg ;h Þk¼Z ðg ;h ÞkT hkA h k public ordering cost of the nodal enterprise h of layer k to order products from the nodal enterprises of layer k À1ineach order cycle,which is independent of the order quantity and the order varietiesA ðg ;h Þkindividual ordering cost of the nodal enterprise h of layer k to order products from the nodal enterprise g of layer k À1in each order cycle,which is dependent of the order quantity and the order varietiesA ðh ;i ;w Þk þl individual ordering cost of the nodal enterprise i of layer k +l to order the product w from the nodal enterprise h of layer k +l À1in each order cycle,in the distribution networkT i k þl basic order cycle of the nodal enterprise i of layer k +l to order products from the nodal enterprises of layer k +l À1,in the distribution networkT ði ;w Þk þl order cycle of the nodal enterprise i of layer k +l to order product w from the nodal enterprises of layer k À1,in the distribution networkZ ði ;w Þk þlratio of T ði ;w Þk þl and T i k þl ,which is a positive integer,so T ði ;w Þk þl ¼Z ði ;w Þk þl T i k þlS ðg ;h Þk maximum inventory level of the nodal enterprise h of layer k to order products from the nodal enterprise g of layer k À1E D ðg ;h Þk average demand of the nodal enterprise h of layer k to order products from the nodal enterprise g of layer k À1perdayL ðg ;h Þk lead time of the nodal enterprise h of layer k to order products from the nodal enterprise g of layer k À1L ði ;w Þk þl the average lead time of the nodal enterprise i of layer k +l to order the product w from the nodal enterprise of layer k +l À1H ðg ;h Þk storage cost of the nodal enterprise h of layer k per product per yearY ðg ;h Þk quantity demand of the nodal enterprise h of layer k to order products from the nodal enterprise g of layer k À1peryear,so Y ðg ;h Þk ¼365E D ðg ;h Þkn ðg ;h Þkthe number of trips from the nodal enterprise g of layer k À1to the nodal enterprise h of layer k per year,which isinversely proportional to order cycle,so n ðg ;h Þk ¼Z ðg ;h Þk T h kÀ1W.-Q.Zhou et al./Applied Mathematical Modelling xxx (2012)xxx–xxx3f ðg ;h Þkfixed transportation cost from the nodal enterprise g of layer k À1to the nodal enterprise h of layer k in each trans-portation (such as driver’s wage)t ðg ;h Þkvariable transportation cost to transport the unit product from the nodal enterprise g of layer k À1to the nodal enter-prise h of layer k (such as cost of fuels),which is the function of transport efficiency and order quantity in the case of fixed transportation distanceX ðh ;i ;w Þkthe expected value of the produce w of the nodal enterprise h of layer k relative to order quantity of the nodal enter-prise i of layer k +11ðg ;h ;w Þk conversion rate of product w produced by the nodal enterprise h of layer k relative to raw materials or accessories supplied by the nodal enterprise g of layer k À1g ðh ;i ;w Þksupply coefficient of product w supplied from the nodal enterprise h of layer k to the nodal enterprise i of layer k +1,and P m k þ1i ¼1g ðh ;i ;w Þk ¼1b ðg ;h ;w Þkproportionality coefficient of raw materials or accessories used to produce product w ,which are supplied from thenodal enterprise g of layer k À1to the nodal enterprise h of layer k ,and P W w ¼1b ðg ;h ;w Þk¼1B ðh ;i ;w Þkshortage penalty per produce w per order cycle from the nodal enterprise i of layer k +1to the nodal enterprise h of layer k2.4.Multi-product multi-echelon inventory control modelWe divide the inventory cost into ordering cost,holding cost,transportation cost and shortage cost.(1)Ordering costThe total ordering cost of the core enterprise per year is defined as follows:C Order C¼X m kh ¼1A h kT hkþXm k À1g ¼1X m k h ¼1A ðg ;h ÞkZ ðg ;h ÞkT hk:ð1ÞThe total ordering cost of the supply network per year is defined as follows:C Order S¼X k À2l ¼1X m k Àl g ¼1Ag k ÀlT g k ÀlþX k À2l ¼1X m k Àl À1f ¼1X m k Àl g ¼1A ðf ;g Þk Àl Z ðf ;g Þk Àl T g k Àl:ð2ÞThe total ordering cost of the distribution network per year is defined as follows:C Order D¼X N Àk l ¼1X m k þl i ¼1Ai k þl T ik þlþX N Àk l ¼1X m k þl À1h ¼1X m k þl i ¼1X W w ¼1A ðh ;i ;w Þk þl Z ði ;w Þk þl T ik þl:ð3ÞTherefore,the total ordering cost of the multi-product multi-echelon inventory system per year is defined as follows:TC Order ¼C Order C þC Order S þC Order D:ð4Þ(2)Holding costThe inventory level of the nodal enterprise h of layer k when it has received the order quantity from the nodal enter-prise of layer k À1is:S ðg ;h ÞkÀE D ðg ;h Þk L ðg ;h Þk ;ð5Þand the inventory level of the nodal enterprise h of layer k before it receives the order quantity next order cycle is:S ðg ;h ÞkÀE D ðg ;h Þk L ðg ;h Þk ÀE D ðg ;h Þk Z ðg ;h Þk T h k :ð6ÞTherefore,the average inventory level in one order cycle is:12S ðg ;h Þk ÀE D ðg ;h Þk L ðg ;h Þk þS ðg ;h Þk ÀE D ðg ;h Þk L ðg ;h Þk ÀE D ðg ;h Þk Z ðg ;h Þk T h k hi ¼S ðg ;h Þk ÀE D ðg ;h Þk L ðg ;h Þk ÀE D ðg ;h ÞkZ ðg ;h Þk T h k 2:ð7ÞThe total holding cost of the core enterprise per year is defined as follows:C Hold C¼Xm k À1g ¼1X m k h ¼1S ðg ;h Þk ÀE D ðg ;h Þk L ðg ;h Þk ÀE D ðg ;h Þk Z ðg ;h Þk T h k22435H ðg ;h Þk:ð8Þ4W.-Q.Zhou et al./Applied Mathematical Modelling xxx (2012)xxx–xxxAs a practical matter,we must ensure that the average inventory level is greater than zero,as shown in Eq.(9):Sðg;hÞk ÀE Dðg;hÞkLðg;hÞkÀE Dðg;hÞkZðg;hÞkT hk2>0:ð9ÞThe total holding cost of the supply network per year is defined as follows:C Hold S ¼X kÀ2l¼1Xm kÀlÀ1f¼1X m kÀlg¼1Sðf;gÞkÀlÀE Dðf;gÞkÀlLðf;gÞkÀlÀE Dðf;gÞkÀlZðf;gÞkÀlT gkÀl22435Hðf;gÞkÀl;ð10Þunder the following constraint:Sðf;gÞkÀl ÀE Dðf;gÞkÀlLðf;gÞkÀlÀE Dðf;gÞkÀlZðf;gÞkÀlT gkÀl2>0:ð11ÞThe total holding cost of the distribution network per year is defined as follows:C HoldD ¼X NÀkl¼1X m kþli¼1X Ww¼1Sði;wÞkþlÀE Dði;wÞkþlLði;wÞkþlÀE Dði;wÞkþlZði;wÞkþlT ikþl22435Hði;wÞkþl;ð12Þunder the following constraint:Sði;wÞkþl ÀE Dði;wÞkþlLði;wÞkþlÀE Dði;wÞkþlZði;wÞkþlT ikþl2>0:ð13ÞTherefore,the total holding cost of the multi-product multi-echelon inventory system per year is defined as follows:TC Hold¼C HoldC þC HoldSþC HoldD:ð14Þ(3)Transportation costThe total transportation cost of the core enterprise per year is defined as follows:C Trans C ¼Xm kÀ1g¼1X m kh¼1nðg;hÞkfðg;hÞkþtðg;hÞkYðg;hÞkh i:ð15ÞThe total transportation cost of the supply network per year is defined as follows:C Trans S ¼X kÀ2l¼1Xm kÀlÀ1f¼1X m kÀlg¼1nðf;gÞkÀlfðf;gÞkÀlþtðf;gÞkÀl Yðf;gÞkÀlh i;ð16Þwhere nðf;gÞkÀl ¼Zðf;gÞkÀlT gkÀlÀ1;Yðf;gÞkÀl¼365E Dðf;gÞkÀlThe total transportation cost of the distribution network per year is defined as follows:C TransD ¼X Ww¼1X NÀkl¼1Xm kþlÀ1h¼1X m kþli¼1nði;wÞkþlfðh;iÞkþlþtðh;iÞkþl Yðh;i;wÞkþlh i;ð17Þwhere nði;wÞkþl ¼Zði;wÞkþlT ikþlÀ1;Yðh;i;wÞkþl¼365E Dðh;i;wÞkþlTherefore,the total transportation cost of the multi-product multi-echelon inventory system per year is defined as follows:TC Trans¼C TransC þC TransSþC TransD:ð18Þ(4)Shortage costAssuming Xðh;i;wÞk obeys Poisson distribution p kðh;i;wÞkZðg;hÞkT hkþLðg;hÞkh iduring the period Zðg;hÞkT hkþLðg;hÞk,so:Xðh;i;wÞk ¼X1u¼AuÀgðh;i;wÞk1ðg;h;wÞkbðg;h;wÞkSðg;hÞkp kðh;i;wÞkZðg;hÞkT hkþLðg;hÞkh i:ð19ÞThe total shortage cost of the core enterprise per year is defined as follows:C Shortage C ¼X m kh¼1Xm kþ1i¼1X Ww¼1Bðh;i;wÞkXðh;i;wÞkZðg;hÞkT hk:ð20ÞW.-Q.Zhou et al./Applied Mathematical Modelling xxx(2012)xxx–xxx5The total shortage cost of the supply network per year is defined as follows:C Shortage S¼X k À2l ¼1X m k Àl g ¼1X m k Àl þ1h ¼1B ðg ;h Þk Àl X ðg ;h Þk ÀlZ k Àl T g k Àl;ð21ÞwhereX ðg ;h Þk Àl¼P 1u ¼Au Àgðg ;h Þk Àl 1ðf ;g Þk Àl S ðf ;g Þk Àlp k ðg ;h Þk Àl Z ðf ;g Þk Àl T g k Àl þL ðf ;g Þk Àl h i ;g ðg ;h Þk Àl ¼E D ðg ;h Þk Àl þ1ÀÁP m k Àl þ1h ¼1E Dðg ;h Þk Àl þ1ÀÁ,and P m k Àl þ1h ¼1g ðg ;h Þk Àl ¼1.The total shortage cost of the distribution network per year is defined as follows:C Shortage D¼X N Àk l ¼1X m k þl i ¼1X m k þl þ1j ¼1X W w ¼1B ði ;j ;w Þk þl X ði ;j ;w Þk þl Z ði ;w Þk þl T i k þl;ð22ÞwhereX ði ;j ;w Þk þl¼X 1u ¼Au Àg ði ;j ;w Þk þl S ði ;w Þk þl p k ði ;j ;w Þk þl Z ði ;w Þk þl T i k þl þL ði ;w Þk þl h i;gði ;j ;w Þk þl¼E D ði ;j ;w Þk þlk þl þ1j ¼1E D ði ;j ;w Þk þl;andX m k þl þ1j ¼1g ði ;j ;w Þk¼1:Therefore,the total shortage cost of the multi-product multi-echelon inventory system per year is defined as follows:TC Shortage ¼C Shortage C þC Shortage SþC Shortage D :ð23ÞIn conclusion,we develop the multi-product multi-echelon inventory control model as follows:minTC ¼TC Order þTC Hold þTC Trans þTC Shortage ;ð24Þs :t :E D ðg ;h ÞkL ðg ;h Þk þE D ðg ;h Þk Z ðg ;h Þk T h k 2ÀS ðg ;h Þk <0;ð25ÞE D ðf ;g Þk Àl L ðf ;g Þk Àl þE D ðf ;g Þk Àl Z ðf ;g Þk Àl T g k Àl 2ÀS ðf ;g Þk Àl <0;l ¼1;2;...;k À2;f ¼1;2;...;m k Àl À1;g ¼1;2;...;m k Àl ;ð26ÞE D ði ;w Þk þl L ði ;w Þk þl þE D ði ;w Þk þl Z ði ;w Þk þl T i k þl2ÀS ði ;w Þk þl <0;l ¼1;2;...;N Àk ;i ¼1;2;...;m k þl ;w ¼1;2;...;W ;ð27Þmin Z g ¼1;h ðÞk ;Z g ¼2;h ðÞk ;...;Z g ¼m k À1;h ðÞk h i¼1;ð28Þmin Z ðf ¼1;g Þk Àl ;Z ðf ¼2;g Þk Àl ;...;Z ðf ¼m k Àl À1;g Þk Àl h i¼1;l ¼1;2;3;...;k À2;ð29Þmin Z ði ;w ¼1Þk þl ;Z ði ;w ¼2Þk þl ;...;Z ði ;w ¼W Þk þl h i ¼1;l ¼1;2;3;...;N Àk :ð30Þ(28)–(30)can ensure that at least one product’s order cycle is the basic order cycle.The decision variables in the model are allintegers greater than or equal to zero.3.Simulation and analysis 3.1.Simulation model based on GAThe objective function of this optimization model is minimization,and the objective function of GA is maximization,so the objective function of this optimization model cannot be taken as the fitness function of GA.We must convert the objec-tive function to the fitness function of GA as follows:F ðX Þ¼TC max ÀTC ;TC <TC max ;0;TC P TC max ;&ð31Þwhere F (X )is the individual fitness.TC max is a relatively large number,and in this simulation model,we may put TC max as the largest objective function value during evolution.The multi-product multi-echelon inventory control model can be reduced to a nonlinear programming problem as follows:6W.-Q.Zhou et al./Applied Mathematical Modelling xxx (2012)xxx–xxxmin f ðX Þ;ð32Þs :t :g i ðX Þ60ði ¼1;2;3;...;m Þ:In this paper,penalty function is used as constraint.So,we construct the penalty function as follows:/ðX ;c kÞ¼X m i ¼1c k i min g i ðX Þ;0ðÞ2;ð33Þwhere k is iteration times of GA.c k i is penalty factor,which is a monotone increasing sequence and positive value.Andc k þ1i ¼e i Ác ki .The experience in computation shows that if c k i ¼1and e i =5À10,we can achieve satisfactory results.So,we change (31)to the function as follows:F ðX Þ¼TC max ÀTC À/ðX ;c k Þ;TC <TC max ;0;TC P TC max :(ð34ÞMoreover,we use the floating point number coding (the chromosome’s length equals the number of decision variables),the roulette wheels selection mechanism as the selection operator,the arithmetic cross technique as the crossover operator,the Gauss mutation operator as the mutation operator,and algebra (its values range from 100to 500)as the termination criteria.3.2.SimulationAs an illustration,we develop a multi-product multi-echelon inventory control model which has four suppliers (the four suppliers are divided into two levels and each level has two suppliers),one core enterprise and two distributors,and has two products (Fig.2).The average demand of the customers to order product 1and product 2from the distributor 1of layer 4per day is 6units and 3units.The average demand of the customers to order product 1and product 2from the distributor 2of layer 4per day is 4units and 7units.The values of other parameters are shown in Tables 1–3.Table 2The values of the parameters of the supply network.Parameters A 12A ð1;1Þ2A ð2;1Þ2A 22A ð1;2Þ2A ð2;2Þ2L ð1;1Þ2L ð2;1Þ2L ð1;2Þ2Values $70$200$180$60$250$250666Parameters L ð2;2Þ2H ð1;1Þ2H ð2;1Þ2H ð1;2Þ2H ð2;2Þ2f ð1;1Þ2f ð2;1Þ2f ð1;2Þ2f ð2;2Þ2Values 6$3$6$3$15$200$140$250$150Parameters t ð1;1Þ2t ð2;1Þ2t ð1;2Þ2t ð2;2Þ2g ð1;1Þ2g ð2;1Þ2g ð1;2Þ2g ð2;2Þ21ð1;1Þ2Values $4$6$5$811111Parameters 1ð2;1Þ21ð1;2Þ21ð2;2Þ2B ð1;1Þ2B ð2;1Þ2B ð1;2Þ2B ð2;2Þ2Values0.510.5$150$120$160$140Table 1The values of the parameters of the core enterprise.Parameters A 13A ð1;1Þ3A ð2;1Þ3L ð1;1Þ3L ð2;1Þ3H ð1;1Þ3H ð2;1Þ3f ð1;1Þ3f ð2;1Þ3Values $100$240$32055$5$40$300$350Parameters t ð1;1Þ3t ð2;1Þ3g ð1;1;1Þ3g ð1;2;1Þ3g ð1;1;2Þ3g ð1;2;2Þ31ð1;1;1Þ31ð2;1;1Þ31ð1;1;2Þ3Values $15$100.60.40.30.70.510Parameters 1ð2;1;2Þ3b ð1;1;1Þ3b ð1;1;2Þ3b ð2;1;1Þ3b ð2;1;2Þ3B ð1;2;1Þ3B ð1;1;2Þ3B ð1;2;2Þ3B ð1;1;1Þ3Values110.50.5$150$120$180$200W.-Q.Zhouet al./Applied Mathematical Modelling xxx (2012)xxx–xxx 7。
历年MCMICM赛题、特等奖论文、教程全收入

【数学中国】历年MCM\ICM赛题、特等奖论文、教程全收入2008CUMCM结束了,2009MCM\ICM又如约而至。
刚刚放松下来,又要开始准备了。
整理了很多资料,很累!话不多说了,现开始第一季:历年赛题特等奖论文、教程下载中,共计450多篇,现在更新完毕!要拿,就来顶!【全集】1985 MCM A 动物群体的管理特等奖论文教程【全集】1985 MCM B 战购物资储备的管理特等奖论文教程【全集】1986 MCM A 水道测量数据特等奖论文评论教程【全集】1986 MCM B 应急设施的位置特等奖论文教程【全集】1987 MCM A 盐的存贮特等奖论文评论【全集】1987 MCM B 停车场设计特等奖论文教程【全集】1988 MCM A 确定毒品走私船的位置特等奖论文评论【全集】1988 MCM B 铁路平板车的装货问题特等奖论文评论【全集】1989 MCM B 飞机排队特等奖论文教程【全集】1990 MCM A 药物在脑内的分布特等奖论文教程【全集】1990 MCM B 扫雪问题特等奖论文教程【全集】1991 MCM A 估计水塔的水流量特等奖论文教程【全集】1991 MCM B 通讯网络的极小生成树特等奖论文教程【部分】1992 MCM A 空中交通控制雷达的功率问题特等奖论文教程【部分】1992 MCM B 应急电力修复系统的修复计划特等奖论文教程【部分】1993 MCM A 加速餐厅剩菜堆肥的生成特等奖论文教程【部分】1993 MCM B 倒煤台的操作方案特等奖论文教程【部分】1994 MCM A 住宅的保温特等奖论文教程【部分】1994 MCM B 计算机网络的最短传输时间特等奖论文教程【全集】1995 MCM A 单一螺旋线特等奖论文教程【全集】1995 MCM B Aluacha Balaclava学院特等奖论文教程【全集】1996 MCM A 噪音场中潜艇的探测特等奖论文教程【全集】1996 MCM B 竞赛评判问题特等奖论文教程【全集】1997 MCM A (疾走龙属)问题特等奖论文教程【全集】1997 MCM B 会议分组特等奖论文教程【全集】1998 MCM A 成绩给分的通胀特等奖论文教程【全集】1998 MCM B 成绩给分的通胀特等奖论文教程【全集】1999 ICM 大地污染特等奖论文教程【全集】1999 MCM A 大碰撞特等奖论文教程【全集】1999 MCM B “非法”聚会特等奖论文教程【全集】2000 ICM 大象群落的兴衰特等奖论文教程【全集】2000 MCM A 空间交通管制特等奖论文教程【全集】2000 MCM B 无线电信道分配特等奖论文教程【全集】2001 ICM 我们的水系—不确定的前景特等奖论文教程【全集】2001 MCM A 选择自行车车轮特等奖论文教程【全集】2001 MCM B 逃避飓风怒吼特等奖论文教程【全集】2002 ICM 蜥蜴问题特等奖论文教程【全集】2002 MCM A 风和喷水池特等奖论文教程【全集】2002 MCM B 航空公司超员订票特等奖论文教程【全集】2003 ICM 航空行李的扫描对策特等奖论文教程【全集】2003 MCM A 特技演员特等奖论文教程【全集】2003 MCM B Gamma刀治疗方案特等奖论文教程【全集】2004 ICM 不可再生资源管理特等奖论文教程【全集】2004 MCM A 指纹是独一无二的吗?特等奖论文教程【全集】2004 MCM B 更快的快通系统特等奖论文教程【全集】2005 ICM 不可再生资源管理特等奖论文教程【全集】2005 MCM A 洪水估计特等奖论文教程【全集】2005 MCM B 公路收费亭的设置特等奖论文教程【全集】2006 ICM 抗击艾滋病的协调特等奖论文教程【全集】2006 MCM A 灌溉喷洒系统的布置与移动问题特等奖论文教程【全集】2006 MCM B 在机场使用轮椅的问题特等奖论文教程【全集】2007 ICM 器官移植:肾交换问题特等奖论文教程【全集】2007 MCM A 不公正的选区划分特等奖论文教程【全集】2007 MCM B 飞机就座问题特等奖论文教程【全集】2008 ICM 寻找好的卫生保健系统特等奖论文教程【部分】2008 MCM A 给大陆洗个澡特等奖论文教程【部分】2008 MCM B 建立数独拼图游戏特等奖论文教程。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Team #: 15356 Page 1 of 20For office use onlyT1 ________________ T2 ________________ T3 ________________ T4 ________________Team Control Number15356Problem ChosencFor office use onlyF1 ________________F2 ________________F3 ________________F4 ________________iRank Model: A New Approach To Criminal Network DetectionSummaryHow to detect all the members and the leader of a conspiracy to commit a criminal act has long been the major concern of the Intergalactic Crime Modelers (ICM). The previous method is far from efficient for the current fund fraud conspiracy which involved over 21,000 words of message traffic. Here we will develop a more reliable network analysis model for large volumes of crime conspiracies data and other kinds of network data.With the assumption of neglecting the time effect of the communication and assigning specific weightings to conspiratorial and irrelevant messages respectively, we develop an iRank rating model to unearth the hidden structure of the criminal network in the current fund fraud conspiracy. It is a modified version of PageRank algorithm which considers both the conspiratorial communication records and the communication density in conspirators network to determine the ranking of conspirators. Also inspired by Social Network Analysis clustering, the model contains a closeness factor to separate the conspirators and non-conspirators and the factor can help us detect the leader of the conspirators. The model outputs the suspicion level of each suspect quantitatively as a priority list.To further improve the models, we take other elements like time series and contents of the messages into consideration. In the advanced criminal network detection model, we can detect the initiator of all the conspiratorial topics thus to lock the major suspect and avoid suing some innocent people who unconsciously spread conspiratorial in the network. Moreover, we will demonstrate how semantic network analysis and text analysis can improve the accuracy of the judgments by detecting some well-hidden conspirators like Inez and Bob in the first example. In the final step, we validate the results by setting a critical value to the iRank value through conspirator group size estimation and visualization. Furthermore we will analyze the strengths and weaknesses of the models comparing with PageRank algorithm and Social Network Analysis. In addition, we discuss how the model can be extended to other social network applications like biological systemsIntroductionDetecting criminal network within large amount of data is a well-studied problem in the real world. It is especially important to develop techniques for uncovering conspiracy networks involving white-collar crimes. In most of the cases, such well-organized criminal activities will follow some patterns. Thus we can uncover the structures of this kind of criminal network and nominate the leader of the group by studying reliable data with sophisticated techniques. It would save a lot of endeavors and time for the ICM to conduct their investigation and arrest work in the future.In the given ICM case, it is known that some conspirators are taking place to embezzle funds from the company and use internet fraud to steal funds from credit cards of people who do business with the company.Here, our goal is to separate the non-conspirators from the ones who are most likely to be conspirators. We will consider:●the development of criteria and methods to detect the criminal network andthe leader of the group●the application of semantic network analysis and text analysis to improve themethod●further recommendations and other applications of the modelDataset Observations and Basic Statistical AnalysisTo better understand different communication behaviors of conspirators and non-conspirators and to elaborate our assumptions, we conduct a statistical analysis for the given data. In task 1, given that Jean, Alex, Elsie, Paul, Ulf, Yao, and Harvey are conspirators while Darlene, Tran, Jia, Ellin, Gard, Chris, Paige, and Este are innocent, we reach some useful findings for model building. There are two “Elsie’s”in the company, No.7 and No.37. As the No.7 obviously has more connections with the other known conspirators, we lock No.7 as the conspirator.Figure 1: Comparison of number of topics conversed by conspirators ornon-conspiratorsIn Figure 1, from the total number of conversations (left bar), we can see that conspirators are significantly more active than non-conspirators. They tend to communicate more often with other people. The information exchanges among known conspirators groups are also significantly more frequent than that among known non-conspirators.Carefully examining into the patterns of information exchanges and social connections in the network, we can see that only 24% messages carry conspiratorial information, which seems not systematically significant given that 20% of all the topics are conspiratorial. Therefore, two patterns can be inferred from the statistical results:●Although conspirators are generally more active than the known innocentpeople, they exchange irrelevant information with each other. Conspiratorial messages only take a small portion in their message traffic.●Since the existing 7 conspirators have already involved in spreading about 40%of the total conspiratorial messages, it is very likely that the total number of conspirators is less than 20.Figure 2: Messages with conspiratorial topics conveyed by conspiracies andnon-conspiraciesAnother pattern we can derive from the original dataset is the correlation between the involvement of conspiratorial activities and the identity of the worker. We observe a few non-conspirators who have involved in talks with conspiratorial topics. Nevertheless, most of the non-conspirators only receive those messages and seldom give responses to them. Thus, the initiators of such a conversation should have more suspicion. Therefore, we can assume that the motivation of participating in conspiratorial topics is one of the most important indicators of a given worker’s identity.Symbols and DefinitionsAssumptionsThe criminal network problems can be really complicated if we take every effect into consideration. In Task 1 and Task 2, we simplify the model by assuming that: ●Only the7th, the 11st and the 13rd topics are related to conspiracy in Task 1,and in Task 2 the 1st topic is added to the topics related to conspiracy;●All the messages are exchanged in a very short period, thus the impact oftime can be neglected;●The contents of the messages can be temporarily ignored, thus all theconspiratorial topics are equally weighted.● A message that involves k (k>1) topics is equivalent to k messages that eachinvolves 1 corresponding topic. This is valid because we ignore the time effect of communication, and focus on the amount of information exchanged only.Meanwhile, according to the basic statistical results of the dataset, we can have the following assumptions.●Non-conspirators do not know about who are conspirators.●Non-conspirators seldom talk about conspiratorial topics with conspirators.●Conspirators do talk conspiratorial topics with non-conspirators.●The identity of an unknown node is determined by its neighboring nodes andthe links incident with it.Task 1The Mathematical Model —iRank ModelThe aim of the task is to obtain a priority list according to the likelihood of being part of the conspiracy and to determine whether any of the senior managers are involved. In this task we develop an iRank Model which is a combination of PageRank Algorithm and SNA technique. We apply this modified model in this problem as the original PageRank Algorithm cannot deal with links with different weights and the SNA technique does not take the identities of the nodes into consideration(Xu and Chen 2005).For the likelihood of being a conspirator, intuitively a person’s suspicious level relates to the percentage of conspirators he contacts and the percentage of suspicious messages he involves in. Furthermore, a person seems even more suspicious when he sends a suspicious message to a known conspirator, or receives a suspicious message from a known conspirator. Therefore we can consider a function that ranks each suspect by the factors mentioned above as our selection criteria to find out possible conspirators.In addition, in a normal social group the social activities should be evenly emerged along with the organizational structure to a certain extent. We believe the conspirator group as a sub-group in this company would cause abnormal social activity patterns reflected on their behaviors of communication. Specifically, based on Small World Theory(Natarajan 2006)which raised the relationship closeness of any two people among a social group, we pay attention to patterns of all n u connect to the conspirator group as well as the non-conspirator group. By our model, the abnormal distribution of social activities within the company caused by conspirator group can be tracked and relate d useful information, which helps us to distinguish people’s identities, can also be derived from it.To determine the conspiracy leaders, we will iteratively review how a person makes influence on the conspirator groups, or the degree of centrality we defined as follow, to find out a person’s impact among known conspirators.The iRank Model includes two steps: initialization and iteration.Step 1: InitializationThe initialization offers a initial suspicious level to all nodes with unknownidentity n u. Consider the iRank value IR(n) as the suspicious level of node n. Intuitively we have:IR(n) = Suspicion raised by the frequency of contacting n c+Suspicion raised by the frequency of exchanging l c+ Suspicion raised by the communication distance to n c (1.1)Let , denote the number of messages the n-th node sends to and receives from n c, respectively, and let , denote the number of times the n-th node sends and receives l c, respectively. Also let C n be the centrality of node n and CL(n c ), CL(n n) denote the closeness from node n to n c and n n. Assume each part in (1.1) plays an equal importance in detecting conspiracy. Let , ,, and denote the adjusting factor used to standardize the units into a same scale so that each part is assigned a same weight in IR(n). Therefore we can set up the following iRank function to assign an initial weight to each node.where hs(n), hr(n)are the harmonic series of the number of times that node n sends a suspicious message to a known conspirator, or receives a suspicious message from a known conspirator, andwhereis a heuristic function of closeness from node n to n c and n n. Statistical analysis shows that the strong positive correlation of closeness to conspirator group and the closeness to non-conspirator group, expect that a few nodes demonstrating significantly more closeness towards conspirator group against non-conspirator group as following graph shows.abnormal nodesFigure 3 Abnormal nodes observed by correlation of closeness to conspiratorgroup and non-conspirator groupStep 2: IterationAfter obtaining the initial value, we can iteratively adjust the ranking weight of each node to get a more precise iRank value because for a node n its suspicious level IR(n) changes as the iRank values of its neighboring nodes have changed. Consider a rating system that contacting with a more suspicious node will results in a higher IR(n), we can set up the following rating function:where adj(n) denotes a node that receives a message from the n-th node, and denotes the weight of the message from i-th node to j-th node that satisfies .By Markov property, for every ,IR(n) will eventually reach the limit after a large number of iterations, and the final IR(n) will be a credible estimate of the suspicious level of the node.Estimation of ParametersBy analyzing the sample data, we have the following statistical results:Table 1: The statistics of suspicious action counts in Task 1 Assume that the sample distribution is coherent with the total distribution, based on the observation on the sample data, we can find outAs the messages including suspicious topics are more useful for our detection of conspirators than irrelevant messages, we can definewhere is the indicator function of whether the message from node n to node x contains suspicious topic, that is.Output and EvaluationTable 2: Significant suspects ranked by IR in Task 1Figure 4: Suspicious level shown by IRTo distinguish leaders from the conspirator group we found by our iRank model, we further develope the analytical model to demonstrate the leadership within the group. Firstly, we make following assumptions about the behavior of the leader in a group:●The leader usually acts as an intermediate node to connect differentfunctional sub-groups●The leader prefers to communicate with heads in different functionalsub-groups rather than common members.●Sub-group heads, as an intermediate node among the leader and the othermembers, can access all of their group members.From the above assumptions, the following facts can be inferred:●Normally, the leader can achieve one of the highest neighborhoodconnectivity among all members, since the leader can connect to all members through those sub-group heads.●The leader may not have the smallest average shortest path length since thenumber of members in different sub-groups may differ greatly.leadershipFigure 5: the correlation between neighborhood connectivity and averageshortest path lengthObviously, from the chart we infer that those two nodes showing abnormal patterns are very likely the leaders of the whole group. There are No.16 Jerome and No.10 Dolores.Task2Adjusting to the iRank ModelWe can apply the same model illustrated in Task 1, but we should calculate the new parameters according to the new condition added.From the sample statistics we can findOutput0.940990.869620.631880.605220.584040.571650.553540.543280.524340.517880.487130.453340.451700.451490.448960.425290.41772Figure 6: Visualization of the Criminal Network Based on Task 2 ResultsEvaluation and DiscussionStrength●The iRank model perfectly distinguishes every different node and ranks thesuspicion level of all nodes quantitatively because IR(n)considers both the suspicious communication made by node n and the communication density of node n in a social network. For example, in the data set both Node 16 and Node 34 are called Jerome, but the model indicates that Node 16 is the senior manager and further shows that Node 16 is involved in the conspiracy.●The iRank model generates an appropriate initial value for each node usingall the information known from the data set, which is better than the original Page Rank algorithm that generates the initial value randomly(Graham and Tsiatas 2010).●The iRank model keeps track of the information flow by following thenumerical node weightings and link weightings, which is not considered in general Social Network Analysis clustering(Coffman, Greenblatt et al. 2004).●The iRank model is highly efficient in time complexity and space complexitybecause it can dynamically adjust the ranking of each node by iteration without performing high dimensional matrix operations by iterations.Weakness●The data structure of communication ignores the timing and the sequence ofmessages, causing the information loss at the beginning stage. Our iRank model purely regards that, all conversations within the social group are organized as a static directed path of which a node denotes a group member and an edge denotes a message. Obviously, the information of timing and message sequence is fairly helpful in busting up crime syndicates, e.g. it is believed that one initiating a message carrying suspicious topics is more conspiratorial than one replying it.●Another major weakness of iRank model is that, our model is not able toindicate a critical value of conspirators and non-conspirators before reviewing the result of the priority list. Actually, to decide whether a person isa conspirator or not appropriately, we have to go over the data of results indetail and set the critical value manually based on our assumptions.Task 3Improvements on the Criminal Detection ModelIn the above mathematical model, we assume every irrelevant topic is equally important, and we may ignore some underlying correlations between any two topics. Next we will improve our model using semantic network analysis and text analysis.Semantic Network Analysis and Text AnalysisSemantic Network Analysis is a technique in which the content of a message is extracted from text and represented as a network of semantic relations between actors and issues, which can be queried to look for specific patterns and answer various research qu estions.”(Morselli 2010) In our crime busting model, we can apply this technique to help us extract critical words or messages from the heavy message traffic.As the original messages are not given, here we will just demonstrate our method following the process below. Meanwhile, we will show in detail how this improvement to the criminal network detection model can help lock Inez and Bob in the first example.Figure 7: Semantic Network Analysis Work FlowIn the first step, we will extract some conspiratorial or informative messages out from the message traffic.According to some basic criminal psychology knowledge, we can assume that conspirators are usually under more pressures. We can ask the model to extract any phrases or words that can reveal the abnormal emotions of certain people. For example, in the first case, Inez mentioned two times that she was “tired”or “exhausted”, while Jaye did not have “much going on”.Harry also detected that George was stressed.●Secondly, we should also extract messages in other language or which havesome ambiguous statements. It is likely that those are used as codes within the conspirators.●Contents or conversations which show high exclusiveness should be payattention to, including the invitings to some private talks or meetings.●Some messages which contain strong feelings should be extracted antanalyzed.●Also, if the conversation or message has mentioned other people, we willextract the names and the related activities or descriptive words.The Mathematical ModelThe model applied is similar to the iRank model in Task 1, but link weight of link l is determined by a text analysis function f(m) instead of a constant that is related to topic involved only.The text analysis function f(m) is judged by comparing the similarity with the message sent by n c or n i. Inspired by the principal of supervised learning(Wiil, Memon et al. 2010), we can set the initial link weight of l c sent or received by n c to 1, and set the initial link weight of l i sent or received by n n is -1. In this way f(m) is a value from continuous interval [-1,1], and a larger f(m) value implies a greater likelihood of being a suspicious message.Hence we can rewrite the model in the iterative step as:where:Evaluation and DiscussionWe believe the semantic network analysis and the text analysis can efficiently enhance our model by assigning an appropriate weight for each message according to its own message content rather than assigning a same weight on messages of different importance. For one hand, as a more irrelevant message owns a smaller weight and a more suspicious message owns a greater weight, the interactions of suspicious message flow will be clearer. On the other hand, an effective text analysis take the correlation among messages into account, which can provide more accurate link weights and help us find out the underlying relationship among the communication network so that we can get a more credible result.The influence of a suspicious link on the corresponding node is strengthened in the improved model, which can be shown in the following simple numeric example. In the picture below we can see that in previous model the significant message only contributes 0.5 to IR(n), equal to the contribution of irrelevant messages, whereas in the improved model the significant message contributes 0.9 to IR(n) under same circumstance.Figure 8: The suspicious link contributes more on IR(n) in the improved model The correlation between messages can be found via semantic network analysis and text analysis. For example, in the topic description given, we can find that the suspicious topic 7 involves Spanish words as codes, and we may further induce that the Spanish words in topic 2 and topic 12 can also be suspicious. Also in topic 4, 5, and 6 we can see some negative feelings like anxiety and complaints, which might infer that the sender is suffering from guilty conscience.Task 4Recommendations and Future DevelopmentThe IR model performs well in separating the non-conspirators and the conspirators as well as detecting the leader in the criminal network. However, our models can be further improved by considering the following:●Build a thorough network with more messages in the traffic with more linksbetween any two nodes. It will increase the accuracy of the results of the model by considering more explicit interactions between the nodes.●Introduce time series into the model. A clear timeline may help us detectthe initiators of certain highly conspiratorial topics. It will also show the pattern changes in the network before and after a conspiracy occurred.●Apply text analysis to deal with large volumes of data. Text analysis can helpus in detecting conspiratorial messages or some abnormal expressions efficiently when the dataset is large.●Introduce the semantic network analysis. With accumulation of database, wecan uncover some usual tactics in high‐tech conspiracy crimes. For example, some sudden changes in attitudes and conversational styles between two workers may indicate a conspiracy. Also, the increasing frequency of some anxious or stressed words may suggest a conspiratorial event is taking place in the company.Other ApplicationsBesides the study of criminal network detection, we can use this model to deal with various network problems by adjusting the weighting parameters or adding new constraint equations. Here is an example about how this model can be implemented to find infected or diseased cell in biological network.●The probability of getting infected is inversely proportional to the distancebetween one infected cell and other healthy cells(Chen, Ding et al. 2009), so the weight of being infected between two cells can be seen as 1/distance.●Given some known infected cells, we can assume the infection ability ofdifferent cells have some different probabilities IR(n).Figure 7: The Model of the Infection Cells DetectionReferencesChen, H., L. Ding, et al. (2009). "Semantic web for integrated network analysis in biomedicine." Briefings in Bioinformatics 10(2): 177-192.Coffman, T., S. Greenblatt, et al. (2004). "Graph-based technologies for intelligence analysis." Communications of the ACM 47(3): 45.Graham, F. and A. Tsiatas (2010). Finding and Visualizing Graph Clusters Using PageRank OptimizationAlgorithms and Models for the Web-Graph. R. Kumar and D. Sivakumar, Springer Berlin / Heidelberg. 6516: 86-97.Morselli, C. (2010). "Assessing Vulnerable and Strategic Positions in a Criminal Network." Journal of Contemporary Criminal Justice 26(4): 382-392.Natarajan, M. (2006). "Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data." Journal of Quantitative Criminology 22(2): 171-192.Wiil, U. K., N. Memon, et al. (2010). "Detecting New Trends in Terrorist Networks." 435-440.Xu, J. and H. Chen (2005). "Criminal network analysis and visualization." Communications of the ACM 48(6): 100-107.。