QQ登录

只需要一步,快速开始

 注册地址  找回密码

tag 标签: 美国大学生

相关帖子

版块 作者 回复/查看 最后发表
2009年美国大学生建模比赛MCM试题C attachment 美国大学生数学建模竞赛(MCM/ICM) ...酱油瓶 2011-9-6 4 2656 1946589001 2014-2-8 16:07
2012年美国大学生数学建模竞赛参赛通知 attach_img 美国大学生数学建模竞赛(MCM/ICM) 厚积薄发 2011-9-28 233 47211 Sakura_ 2015-2-1 21:05
【数学中国翻译】2012美国大学生数学建模竞赛(MCM/ICM)参赛规则中英文对照 美国大学生数学建模竞赛(MCM/ICM) 厚积薄发 2011-10-18 458 95458 Beyond2009 2018-2-2 16:54
美国大学生数学建模群,一起来分享! 美国大学生数学建模竞赛(MCM/ICM) zhipenglv 2011-10-25 3 1969 刘358812234 2015-1-17 14:36
2004-2011美国大学生数学建模竞赛特等奖论文全集 美国大学生数学建模竞赛(MCM/ICM) a3141592653589 2011-11-14 130 2561 w20092495 2012-1-4 12:25
活动 【已截止】2012数学中国美赛培训报名通知帖 attach_img MADIO数模培训 厚积薄发 2011-12-9 289 77779 流雨星月 2014-8-31 09:43
2011美国大学生数学建模特等奖论文全集 attachment 数模资源交流 luckytyc 2011-12-15 25 7454 just耳界 2015-7-10 22:09
美国大学生数学建模竞赛特等奖论文全集ICM(07-10) attachment 美国大学生数学建模竞赛(MCM/ICM) neimeng0 2011-12-22 31 6589 skkkq 2018-1-23 20:49
1985-2011美国大学生数学建模赛题题目icm/mcm(中文版) attachment 往届竞赛参考文献 羽叶 2012-1-10 30 7420 模天大楼 2014-11-8 18:55
美国大学生数学建模竞赛评审流程及评审侧重点 数模经验分享 wangzheno2 2012-1-11 13 4079 xchyi 2012-1-31 18:07
常见问题 美国大学生数学建模竞赛(MCM/ICM) 萧邦很忙 2012-2-1 0 1975 萧邦很忙 2012-2-1 15:59
美国大学生数学建模竞赛获奖比例 美国大学生数学建模竞赛(MCM/ICM) mm梦幻 2012-2-3 26 14581 小屁 2013-1-30 20:17
关于2012美赛期间数学中国网站管理规定 论坛公告区 厚积薄发 2012-2-4 251 31909 咕哒子 2017-12-24 15:19
MCM求助 美国大学生数学建模竞赛(MCM/ICM) shuiliutian 2012-2-5 5 1867 天海星云 2012-2-6 10:40
2012美赛资料共享QQ群 美国大学生数学建模竞赛(MCM/ICM) 柏厷ふ 2012-2-7 56 23178 王一豪 2012-2-10 12:29
2011美国大学生建模特等奖 attachment 美国大学生数学建模竞赛(MCM/ICM) 依然我自己 2012-2-8 8 2348 zekaigood 2014-2-4 23:09
美国大学生数学建模竞赛评审流程及评审侧重点 attachment 往届竞赛参考文献 w20092495 2012-2-13 29 4030 wwj4900 2012-2-16 10:24
求问!!!! 往届竞赛参考文献 若水1998 2012-2-13 2 919 lzy901025 2012-2-13 17:31
2012美国大学生数学建模竞赛word优秀模版(排版效果可以跟tex一模一样) attachment 美国大学生数学建模竞赛(MCM/ICM) wuyuwenxmyz 2012-2-18 174 29170 674288076 2018-2-10 17:32
2012年美国大学生优秀论文 attach_img 美国大学生数学建模竞赛(MCM/ICM) 袁海亮 2013-12-12 192 22624 18317510991 2018-2-9 21:51

相关日志

分享 美国大学生建模比赛
天天XMU 2014-2-4 23:47
美国大学生建模比赛要开始了,心情好激动,第一次参加。
205 次阅读|0 个评论
分享 2010年美国大学生数学建模竞赛一等奖
背水一战 2014-1-16 11:00
Team #26031 Page 1 of 26 Summary Faced with serial crimes, we usually estimate the possible location of next crime by narrowing search area. We build three models to determine the geographical profile of a suspected serial criminal based on the locations of the existing crimes. Model One assumes that the crime site only depends on the average distance between the anchor point and the crime site. To ground this model in reality, we incorporate the geographic features G, the decay function D and a normalization factor N. Then we can get the geographical profile by calculating the probability density. Model Two is Based on the assumption that the choice of crime site depends on ten factors which is specifically described in Table 5 in this paper. By using analytic hierarchy process (AHP) to generate the geographical profile. Take into account these two geographical profiles and the two most likely future crime sites. By using mathematical dynamic programming method, we further estimate the possible location of next crime to narrow the search area. To demonstrate how our model works, we apply it to Peter's case and make a prediction about some uncertainties which will affect the sensitivity of the program. Both Model One and Model Two have their own strengths and weaknesses. The former is quite rigorous while it lacks considerations of practical factors. The latter takes these into account while it is too subjective in application. Combined these two models with further analysis and actual conditions, our last method has both good precision and operability. We show that this strategy is not optimal but can be improved by finding out more links between Model One and Model Two to get a more comprehensive result with smaller deviation. Key words: expected utility geographic profiling, the probability density, anchor point, Team # 6539 Page 2 of 26 Executive Summary Nowadays, in a serial crime, the spatial distribution of crime sites is arousing the more and more attention of the criminologists and the geographers. The Serial criminals, in a spirit of defiance, have endangered public security, gravely infringed on the citizens' personal safety, lives and property, and are abhorred by the people across the country. Since the offenders usually have no stable residence, it is very difficult for the police to find out and arrest them. Therefore, in order to help the police solve the crime as soon as possible to maintain social security and stability, a more sophisticated technique is in urgent need to be developed to determine the “geographical profile” of a suspected serial criminal based on the locations of the crimes. This paper presents three methods, especially a new mathematical method combining the advantages of the two previous models, which can generate a useful prediction for law enforcement officers about possible locations of the next crime. Based on Bayesian statistical methods, Model One makes explicit connections between assumptions on offender behavior and the components of the mathematical model. It also takes into account local geographic features that either influence the selection of a crime site or influence the selection of an offender’s anchor point. What’s more, with rigorous inference formulas, this model has both precision and operability. Model Two uses analytic hierarchy process (AHP). It takes full account of a variety of factors relevant to the crime sites, assisting the police to take measures adapted to local conditions so as to improve our work. The last method is composed from Model One and Model Two. Taken the expected utility and other practical factors into consideration, it further estimate the geographic profile generated by the previous two models. To conclude, we suggest the policemen put this mathematical method about geographical profiling into practice for it will be of significant assistance to law enforcement. The technical details are as follows: First of all, enhance the consciousness of the public social security and its improvement in the potential criminal area and inform the local people that a series of crimes have occurred recently, reminding them to keep vigilant and not to go into remote areas alone. Second, the police departments should focus their activities, geographically prioritize suspects, and concentrate saturation or directed patrolling efforts in those zones where the criminal predator is most likely to be active. Third, after arresting the criminal, the police need to make experiential analysis on all these kinds of serial crimes to prevent a similar case. What’s more, the police departments set up an enhanced intelligence exchange network, especially in the area which is the next crime site according to our prediction. Finally, search the suspect in the predicted criminal location or the likely Team # 6539 Page 3 of 26 residence of the offender. Generally speaking, our method has good maneuverability and practicability. However, there are various uncertain factors in the situation which cannot be predicted such as the weather condition and the traffic conditions. Additionally, the determination and analysis of weight-coefficients on the various factors is very subjective. As a result, the actual site scene of next crime may be outside of our geographical profiling. Therefore, the police deployments must be based on the analysis of local actual condition instead of applying our model blindly. Furthermore, our prerequisite that the offender has the only one stable anchor point differs from the actual conditions. Since the offender is very likely to change his residence, the police had better search the suspect according to the latest information. Maintaining social stability and ensuring the safety of residents will bring well- being and peace to all mankind. Every one of us should make effort to make our society become better. Hope that this paper will be of some help to prevent the criminal behaviors. Team # 6539 Page 4 of 26 1. Introduction Clues derived from the locations connected to violent repeat criminal offenders, such as serial murderers, arsonists, and rapists, can be of significant assistance to law enforcement. Such information helps police departments to focus their activities, geographically prioritize suspects, and to concentrate directed patrolling efforts in those zones where the criminal offender is most likely to be active. By examining spatial data connected to a series of crime sites, this methodological model generates a probability map that indicates the area most likely to be the locations of the next crime. This paper presents two mathematical models to illustrate how geographical analysis of serial crime conducted within a geographic information system can assist crime investigation. Techniques are illustrated for determining the possible residence of offenders and for predicting the location of the next crime based on the time and locations of the existing crimes. First, we present a mathematical survey of some of the algorithms that have been used to solve the geographic profiling problem. The geographic profiling problem is the problem of constructing an estimate for the location of the anchor point of a serial offender from the locations of the offender’s crime sites. The approach that we develop will make use of at these two different schemes to generate a geographical profile. What’s more, we develop a third technique to combine the results of the two previous schemes and generate a useful prediction for law enforcement officers. The prediction provides some kind of estimate or guidance about possible locations of the next crime based on the time and locations of the past crime scenes. Our method will also provide some kind of estimate about how reliable the estimate will be in a given situation, including appropriate warnings. The executive summary will provide a broad overview of the potential issues. It will also provide an overview of our approach and describe situations when it is an appropriate tool and situations in which it is not an appropriate tool. The purpose is to apply geographical analysis to serial crime investigations to predict the location of future targets and determine offender residence. 1.1 Restatement of the Problem1.1 In order to indicate the origin of geographical profiling problems, the following background is worth mentioning. In 1981 Peter Sutcliffe was convicted of thirteen murders and subjecting a number of other people to vicious attacks. One of the methods used to narrow the search for Mr. Sutcliffe was to find a “center of mass” of the locations of the attacks. In the end, the suspect happened to live in the same town predicted by this technique. Since that time, a number of more sophisticated techniques have been developed to determine the “geographical profile” of a suspected serial criminal based on the locations of the crimes. Our team has been asked by a local police agency to develop a method to aid in Team # 6539 Page 5 of 26 their investigations of serial criminals. The approach that we develop will make use of at least two different schemes to generate a geographical profile. We also develop a technique to combine the results of the different schemes and generate a useful prediction for law enforcement officers. The prediction will provide some kind of estimate or guidance about possible locations of the next crime based on the time and locations of the past crime scenes. Our method will also provide some kind of estimate about how reliable the estimate will be in a given situation, including appropriate warnings. 1.2 Survey of Previous Research1.2 Existing Methods To understand how we might proceed let us begin by adopting some common notation: ● A point x will have two components x = ( x 1 , x 2 , ) . These can be latitude and longitude ● These can be the distances from a pair of reference axes ● ● The series consists of n crimes at the locations x 1 , x 2 , … , x n . The offender’s anchor point will be denoted by z . Distance between the points x and y will be d ( x , y ) . Existing algorithms begin by first making a choice of distance metric d ; they ● ● then select a decay function f and construct a hit score function S ( y ) by computing S ( y ) = ∑ f ( d ( x i , y )) = f ( d ( x 1 , y )) + … + f ( d ( x n , y )) i = 1 n Regions with a high hit score are considered to be more likely to contain the offender’s anchor point than regions with a low hit score. In practice, the hit score S ( y ) is not evaluated everywhere, but simply on some rectangular array of points y jk = ( y 1 j , y k 2 ) for j ∈ { 1, 2, … , J } and k ∈ { 1, 2, … , K } giving us the array of values S jk = S ( y jk ) . Rossmo’s method, as described in (Rossmo, 2000, Chapter10) chooses the Manhattan distance function for d and the decay function Team # 6539 Page 6 of 26 ⎧ k ⎪ d h ⎪ f ( d ) = ⎨ kB g − h ⎪ ⎪ (2 B − d ) g ⎩ if d B if d ≥ B Other Studies In the study of Crime Analyst’s task, Bryan Hill considers that the use of the “probability grid method” (PGM) can narrow the search as it pertains to tactical crime analysis in the ArcView Geographic Information Systems (GIS) environment. The main point of his theory will be that any current statistical method of predicting the next hit location in a crime series is operationally ineffectual when the suspect covers a large geographic area. When the analyst combines several statistical methods and intuitive, logical thought processes into a combined “grid” score, the analysis product can be made more operationally effective. This new grid surface allows the analyst to make a better prediction of the next hit in a crime series and is useful in isolating specific target locations for law enforcement deployment efforts. This easy to apply “PGM method” allows the analyst to use sound statistical methods, as well as their experience and knowledge of a crime series to narrow the focus and potential hit area. In addition, when the crime series has sufficient suspect information, journey to crime analysis using the CrimeStat software can be used to provide investigators with a list of probable offenders from law enforcement records available to the analyst . 2. Model Overview 1 、 Model OneModel In Model One, we assume that the crime sites depend on the distance between the anchor point and the crime site. Generate a hot zone model according to probability formula, then combine the geographic features G with the decay function D and add a normalization factor N into the model .At last, we can get the “geographical profile”. Model2 、 Model Two In Model Two, we take account of other factors relevant to crime site location, we have studied various literature to summary two aspects denoted by U( Utility from crimes) and P(the probability of success) specifically including the following ten factors: the responding speed of the police, public security situation, resistances’ diathesis, density of registered inhabitants, the advantageous position, the number of offenses, the distance from the anchor point of the offender, the time required for committing the crime, number of target persons, offender’s mental satisfaction from the crime. Then, we use Analytic Hierarchy Process (AHP) to get weighted factors. Finally, according to the formula we can draw E of some areas. A wide range of criminal area Team # 6539 Page 7 of 26 can then be divided into several small areas. Then, we give the proper scores for each small area according to the actual condition. When the area is small enough, we can get the geographical profile. Sites with higher scores have high probability to be crime areas. The3 、 The two models can be synthesized as one method For their different emphasis (The theory of Model One is quite rigorous, but it ignores the factors such as the geographic features and criminal motivation while these factors is important for selecting criminal crime sites. On the other hand, Model Two takes these into account, while it is too subjective in practical application which may easily cause the deviation), the geographical profiles we get from two models must be different. By using mathematical dynamic programming method to establish the model, this method explains the common rules of the offender’s choice on the crime sites. Therefore, when we get several geographical profiles from the previous two models, we can use this method to predict the next offence site. To sum up , we can generate the geographical profile in the investigations of serial criminals, providing some kind of estimate or guidance about possible locations of the next crime and narrow the search. 3. Model One Symbols: symbols P ( x) x z a D G N meaning probability density function the crime sites the location of the offender’s anchor point The average distance that the offender is willing to travel to offend. the effect of distance decay the geographic features a normalization factor Hypothesis : 1 、 We assume that our offender chooses potential locations to commit crimes randomly according to some unknown probability density function P . 2 、 We assume that P depends upon z and a. 3 、 We suppose that that the values of the anchor point z and average offense distance a are unknown, but the form of the distribution P is known. 4 、 The offender has only one residence which is unchanged. Team # 6539 Page 8 of 26 3.1 A Mathematical Approach In order to looking for an appropriate model, we start with the simplest possible situation. Since we know nothing about the offender, we assume that our offender chooses potential locations to commit crimes randomly according to some unknown probability density function P . For any geographic region R , the probability that our offender will choose a crime location in R can be found by adding up the values of P in R , giving us the probability ∫∫ R P (x) d ( x ) 1 d ( x ) 2 Upon what sorts of variables should the probability density P ( x ) depend? The fundamental assumption of geographic profiling is that the choice of an offender’s target locations is influenced by the location of the offender’s anchor point z. Therefore, we first assume that P depends upon z. (Provided that the offender has a single anchor point and that it is stable during the crime series.) A second important factor is the distance the offender is willing to travel to commit a crime from their anchor point.(Different offender’s have different levels of mobility- an offender will need to travel farther to commit some types of crimes than others ) Let a denote the average distance that the offender is willing to travel to offend. So a varies between offenders and crime types . Let us suppose that that the values of the anchor point z and average offense distance a are unknown, but the form of the distribution P is known. Then the problem can be stated mathematically as: Given a sample x 1 , … , x n (the crime sites) from the distribution P ( x z , a ) with parameters z and a to determine the best way to estimate the parameter z (the anchor point). One approach of this mathematical problem is the theory of maximum likelihood. First, construct the likelihood function : n L (y, a ) = ∏ P ( x i y , a ) = P ( x 1 y , a ) … P ( x n y , a ) i = 1 In order to get the best choice of z, make the likelihood as large as possible by maximizing the log-likelihood: λ (y, a ) = ∑ lnP ( x i y , a ) = l n P ( x 1 y , a ) + … + l n P ( x n y , a ) i = 1 n This approach is rigorous; however, it is unsuitable as simple point estimates for the offender’s anchor point are not operationally useful. Therefore, we continue our analysis by using Bayes Theorem . Bayes Theorem then implies: Team # 6539 Page 9 of 26 P (z, a x ) = P (z, a x ) π ( z , a ) p ( x ) ( 1 ) Here π ( z , a ) is the prior distribution. It represents our knowledge of the probability density for the anchor point z and the average offense distance a before we incorporate information about the crime. If we assume that the choice of anchor point is independent of the average offense distance, we can write: π ( z , a ) = H ( z ) π ( a ) (2) H ( z ) is the prior distribution of anchor points, and π ( a ) is the prior distribution of average offense distances. We will assume that the offender’s choices of crime sites are mutually independent, so that P ( x 1 , … , x n z , a ) = P ( x 1 z , a ) … P ( x n z , a ) Suppose that an unknown offender has committed crimes at x 1 , … , x n , and that (3) The offender has a unique stable anchor point z. The offender chooses targets to offend according to the probability density P ( x z , a ) where a is the average distance the offender is willing to travel. The target locations in the series are chosen independently. The prior distribution of anchor points is H ( z ) , the prior distribution of the average offense distance is π ( a ) and these are independent of one another. Then the probability density that the offender has anchor point at the location z satisfies P ( z x 1 , … , x n ) ∝ ∫ P x 1 z , a ) P x n z , a ) H ( z ) π ( a ) da ( … ( (4) 3.2 Simple Models for Offender Behavior What’s more, we need to be able to construct reasonable choices for our model of offender behavior, if our fundamental mathematical result is to have any practical or investigative value. One simple model is to assume that the offender chooses a target location based only on the Euclidean distance from the offender’s anchor point to the offense location and that this distribution is normal. In this case we obtain Team # 6539 Page 10 of 26 P( x z ,a ) = 1 ⎛ π ⎞ exp ⎜ − 2 ( x − z ) 2 ⎟ 4 a 2 ⎝ 4 a ⎠ (5) If we make the prior assumptions that the average offense distance and the anchor point are unchanged, and the offender commits n crimes at the crime site locations x 1 , … , x n , then 1 ⎛ π P( z x 1 , … , x n ) =( 2 ) n exp ⎜ − 2 4 a ⎝ 4 a n ∑ i = 1 ⎞ ( x i − z ) 2 ⎟ ⎠ We see that the anchor point probability distribution is just a product of normal distributions; the maximum likelihood estimate for the anchor point is simply the mean center of the crime site locations. We also mention that in this model of offender behavior, this is also the mode of the posterior anchor point probability distribution . Another reasonable model for offender behavior is to assume that the offender still chooses a target location based only on the Euclidean distance from the offense location to the offender’s anchor point, but now the distribution is a negative exponential so that P( x z,a ) = 2 ⎛ 2 ⎞ exp ⎜ − x − z ⎟ π a 2 ⎝ a ⎠ (6) Once again, because of our prior assumptions that the average offense distance and the anchor point are unchanged, and the offender commits n crimes at the crime site locations x 1 , … , x n , then we have 2 n ⎛ 2 n ⎞ P( z x 1 , … , x n ) =( 2 ) exp ⎜ − ∑ x i − z ⎟ π a ⎝ a i = 1 ⎠ We see that this is just a product of negative exponentials centered at each crime site. Further, the corresponding maximum likelihood estimate for the offender’s anchor point is simply the center of minimum distance for the crime series locations . This preceding analysis was predicated on the prior assumptions that the average offense distance and it is known in advance. Similarly, the existing methods mentioned in this paper all rely on decay functions f with one or more parameters which also need to be determined in advance. Unlike those methods, our method does not require that we make a choice for the parameter in advance. 3.3 Realistic Models for Offender Behaviorffender What would a more realistic model for offender behavior look like? Consider a model in the form : P ( x z , a ) = D ( d ( x , z ), a ) G ( x ) N ( z ) (7) Team # 6539 Page 11 of 26 ▲ D models the effect of distance decay using the distance metric d(x, z) 1 、 We can specify a normal decay, so that D ( d , a ) = 1 ⎛ π ⎞ exp ⎜ − 2 d 2 ⎟ 4 a 2 ⎝ 4 a ⎠ 2 、 We can specify a negative exponential decay, so that D ( d , a ) = 2 ⎛ 2 ⎞ exp ⎜ − d ⎟ π a 2 ⎝ a ⎠ Any choice can be made for the distance metric (Euclidean, Manhattan, et.al) ▲ G models the geographic features that influence crime site selection High values for G(x) indicate that x is a likely target for typical offenders; Low values for G(x) indicate that x is a less likely target ▲ N is a normalization factor, required to ensure that P is a probability distribution N ( z ) = 1 ∫∫ D ( d ( y , z ), a ) G (y) d ( y ) d ( y ) 1 2 N is completely determined by the choices for D and G. G models the geographic features that influence crime site selection, with high values indicating the location was more likely to be targeted by an offender. Then, how can we calculate G? Use available geographic and demographic data and the correlations between crime rates and these variables that have already been published to construct an appropriate choice for G(x). Different crime types have different etiologies; in particular their relationship to the local geographic and demographic backcloth depends strongly on the particular type of crime. This would limit the method to only those crimes where this relationship has been well studied. Some crimes can only occur at certain, well-known locations, which are known to law enforcement For example, gas station robberies, ATM robberies, bank robberies; liquor store robberies .This does not apply to all crime types- e.g. street robberies, vehicle thefts. We can assume that historical crime patterns are good predictors of the likelihood that a particular location will be the site of a crime. Suppose that historical crimes have occurred at the locations c 1 , c 2 . . . c n . Choose a kernel density function K y λ )( λ is the bandwidth of the kernel density function. Figure 1 Team # 6539 Page 12 of 26 Calculate N G (x) = ∑ K (x- c i λ ) i = 1 (8) The bandwidth λ can be e.g. the mean nearest neighbor distance. We have assumed: Each offender has a unique, well-defined anchor point that is stable throughout the crime series The function H(z) represents our prior knowledge of the distribution of anchor points before we incorporate information about the crime series. Suppose that anchor points are residences- can we estimate H(z)? ●Population density information is available from the U.S. Census at the block level, sorted by age, sex, and race/ethnic group. 1 、 We can use available demographic information about the offender N blocks 2 、 Set H ( z ) = ∑ = p K ( z − q i i = 1 i A i ) 3 、 Here block i has population pi, center q i , and area A i . ●Distribution of residences of past offenders can be used. Calculate H ( z ) using the same techniques used to calculate G(x). 3.4 Future Offense Predictionffense Given a series of crimes at the locations x 1 , … , x n committed by a single serial offender, estimate the probability density P ( x next x 1 , … , x n ) , that X next will be the location of the next offense . The Bayesian approach to this problem is to calculate the posterior predictive distribution: P ( x next x 1 , … , x n ) = ∫∫∫ P ( x next z , a ) P ( z , a x 1 , … , x n ) d ( z ) 1 d ( z ) 2 d ( a ) We can use the method above to simplify, and so obtain the expression: P ( x next x 1 , … , x n ) ∝ ∫∫∫ P ( x next z , a ) P ( z , a x 1 , … , x n ) H ( z ) π ( a ) d ( z ) 1 d ( z ) 2 d ( a ) This approach makes the same independence assumptions about offender behavior as our fundamental result. Team # 6539 Page 13 of 26 4. Model Two Symbols: symbols w E r B1 , …r B10 m B1 ,…m B10 P U Meaning Weight Total score Each score Various factors The probability of success The utility from crimes Assumption : The selection for crime sites depends on ten factors that demonstrated in Table 5 in the paper. 4.1 Analysis of models The selection for crime sites depends on various factors instead of only one factor that the distance from the anchor point to the crime site. Therefore, Combine a large number of previous studies and related papers with our own thinking, we have summed up 10 key factors and a grading system about how to make the decisions on where the criminal locations will be (see Table 5), which are listed as follows: the responding speed of the police, public security situation, resistances’ diathesis, density of registered inhabitants, the advantageous position, the number of offenses, the distance from the anchor point of the offender, the time required for committing the crime, number of target persons, offender’s mental satisfaction from the crime. Classify these 10 index factors into two categories P and U, based on the actual situation. Let the former six factors belong to P and the latter four belong to U. Next, we use Analytic hierarchy process (AHP) to get weighted factors (Table 4). Then we give the proper scores for each small area according to the actual condition. (Table 5). (There are some data which is difficult for us to achieve but they may be easily achieved by the local police . ) Finally, we can work out the total score of E: E = w P 1 × r P 1 + … + w P 6 × r P 6 + w U 1 × r U 1 + … + w U 4 × r U 4 4.2 Use AHP to get the weighted factors Then we can get a comparison matrix as follows: The probability of success (P) is as important as the expected utility (U), so E PU = 1 , E UP =1 Team # 6539 Page 14 of 26 ⎡ 1 1 ⎤ E = ⎢⎥ ⎣ 1 1 ⎦ Ui and the judgment matrix of U : ⎡ 1 ⎢ 1 ⎢ ⎢ 7 U = ⎢ 1 ⎢ ⎢ 5 ⎢ 1 ⎢ ⎣ 2 7 1 3 7 5 1 3 1 5 2 ⎤ 1 ⎥ ⎥ 7 ⎥ 1 ⎥ ⎥ 5 ⎥ ⎥ 1 ⎥ ⎦ 5 4 1 2 1 6 5 4 2 1 7 1 6 1 1 3 6 ⎤ ⎥ 3 ⎥ ⎥ 1 ⎥ ⎥ 5 ⎥ 1 ⎥ ⎥ 5 ⎥ ⎥ 3 ⎥ ⎥ 1 ⎥ ⎥ ⎦ Pi and the judgment matrix of P: ⎡ 1 ⎢ 1 ⎢ ⎢ 3 ⎢ 1 ⎢ ⎢ 7 P = ⎢ 1 ⎢ ⎢ 5 ⎢ 1 ⎢ 4 ⎢ ⎢ 1 ⎢ 6 ⎣ 3 1 1 6 1 4 1 2 1 3 7 6 1 2 7 5 According to all levels of comparison matrix, let’s obtain its maximum of eigenvalue, coincidence indicator and the weight corresponding to all factors by using Matlab. The results are shown in the table below: comparisonMaximumcoincidencethe weight of evaluation indexes matrix w eigenvalue λ max indicator C I E λ λ max =2 0 U max =4.1341 0.0447 0.1127 P λ max = 6.5633 Table 1 The coincidence indicator can be computed by the formula Team # 6539 Page 15 of 26 C I = λ max − n n − 1 The results are shown in the form below. Find the average random coincidence indicator R I . The average random coincidence indicator (exponent number is within 15) is as follows: exponent 1 number 0 2 0 10 1.49 3 0.52 11 1.52 4 0.89 12 1.54 Table 2 Based on = C I , we can work out coincidence ratios: C R 5 1.12 13 1.56 6 1.26 14 1.58 7 1.36 15 1.59 8 1.41 R I exponent 9 number 1.46 R I R I C Rw C RU C RP 0 0.0502 Table 3 0.0894 C Rw 、 C RU 、 C RP are all less than 0.1 within the scope of consistency, which shows that the index factors we set meet the requirements, that is, they have some credibility within the error range. Combination weight for all levels. Calculate the weight of the index factors Ui, Pi. For example, w U 1 =0.4971 × 0.5000=0.24855 ( i=1, 2, …6) ,and In the same way, we can work out w Pi See Table 4: w Ui ( i=1, 2, …4). w w P 1 w w P 2 w w P 3 w w P 4 w P 5 w P 6 0.21595 U 1 0.10525 U 2 0.0149 U 3 0.0224 U 4 0.0899 0.05165 0.24855 0.02475 0.0508 Table 4 0.17595 Team # 6539 Page 16 of 26 4.3 Scoring system for factors The responding speed of the police ⎧ 1 ⎪ m ⎪ r P 1 = ⎨ 1 − P 1 ⎪ 10 ⎪ 0 ⎩ m P 1 = 0 m P 1 stands for the 0 m P 1 10 responding speed of the police. 10 represents very m P 1 = 10 fast, 6 represents fast,3 represents slow, 0 represents very slow. public security situation ⎧ 1 ⎪ m ⎪ r P 2 = ⎨ 1 − P 2 50 ⎪ ⎪ 0 ⎩ m P 2 ≥ 50 m P 2 stands for the region's 0 m P 2 50 monthly criminal records. If criminal record is 0, then the m P 2 = 0 public security situation is good; if Criminal record is larger than 50, then the public security situation is bad. Resistances’ diathesis The probability of success density of registered inhabitants ⎧ 1 ⎪ m ⎪ r P 3 = ⎨ 1 − P 3 10 ⎪ ⎪ 0 ⎩ ⎧ 1 ⎪ m ⎪ r P 4 = ⎨ P 4 ⎪ 10 ⎪ 0 ⎩ m P 3 = 0 m P 3 stands for resistances’ 0 m P 3 10 diathesis,10 stands for very good, 0 stands for very bad. m P 3 = 10 m P 4 = 10 0 m P 4 10 m P 4 stands for density of registered inhabitants.10 for the highest, 6 for the general, 3 for few people in that area and 0 for no one there. m P 4 = 0 the advantageo us position ⎧ 1 ⎪ m ⎪ r P 5 = ⎨ P 5 ⎪ 10 ⎪ 0 ⎩ ⎧ 1 ⎪ m ⎪ r P 6 = ⎨ P 6 ⎪ 3 ⎪ 0 ⎩ m P 5 = 10 0 m P 5 10 m P 5 stands for the extent of favorableness. 10 for the quite favorable, 6 for general, 3 for not going well, 0 for not executable. m P 5 = 0 The number of crimes m P 6 ≥ 3 0 m P 6 3 m P 6 stands for the number of crimes, greater than 3 times, for the very skilled and unskilled times for 0 m P 6 = 0 Team # 6539 Page 17 of 26 the distance from the anchor point of the offender ⎧ 1 ⎪ m ⎪ r u 1 = ⎨ u 1 ⎪ 10 ⎪ 0 ⎩ m u 1 = 10 0 m u 1 10 m u 1 stands for the distance from the anchor point of the offender. Advantageous distance for 10, disadvantageous distance for 0. m u 1 = 0 The time required for committing the crimes m u 2 stands for the time ⎧ 1 ⎪ m ⎪ r u 2 = ⎨ u 2 ⎪ 10 ⎪ 0 ⎩ ⎧ 1 ⎪ m ⎪ r u 3 = ⎨ u 3 ⎪ 10 ⎪ 0 ⎩ ⎧ 1 ⎪ m ⎪ r u 4 = ⎨ u 4 ⎪ 10 ⎪ 0 ⎩ m u 2 = 10 0 m u 2 10 m u 2 = 0 required for committing the crimes. Long time for 0, less longer time for 3, normal long for 6, short time for 8, very short time for 10 Utility from crimes Number of target persons m u 3 = 10 0 m u 3 10 m u 3 stands for the intensity of the target population. Very intensive for 10, intensive for 8, generally for 6, less- intensive 3, no goals for 0 m u 3 = 0 Offender’s mental satisfaction m u 4 = 10 0 m u 4 10 m u 4 stands for the offender’s mental satisfaction in that criminal location. Very satisfied for 10, satisfied for 8, general for 6, not very satisfied for 3,not satisfied at all for 0 m u 4 = 0 Table 5 4.4 Results We can get a wide range of criminal area and divide it into several small regions. Next, we give the proper scores for each small region according to the actual condition. Finally, using the formula E = w P 1 × r P 1 + … + w P 6 × r P 6 + w U 1 × r U 1 + … + w U 4 × r U 4 to calculate the E of each area. Sites with higher scores have high probability to be crime areas. The police should enhance the patrols in these areas, and people should strengthen the awareness of safety. Team # 6539 Page 18 of 26 5. The synthesized method Up until now, we have already given two different models to show the geographic profile of next possible crime site. But both these two models have advantages and disadvantages. Model One allows us to find possible locations of the next crime as well as the offender’s resistance based on only the time and locations of the past crime scenes, but it ignores some critical factors related to the crime, such as the geographical environment and the motive for the crime and other factors. Model Two takes 10 factors which affects the selection of crime sites into consideration and qualify them to work out the geographic profile, but it is too subjective and easily leads to deflection when put into practice. Because of their different emphases, the two models will not give the same geographical profile. Assume we work out n geographical profiles through Model One and m geographical profiles through Model Two. Apparently these geographical profiles will not be the same. Therefore, we come up with the following new method which can combine the two models together. Symbols: symbols U s I P ( x ) E meaning Total income the number of crimes income for the offender the probability of success for each crime expected utility Hypothesis : 1 、 we assume that the net income in of each crime occurred in the same region is unchanged, that is, for any i, j, 2 、 we assume in the same area, each time the probability of successfully committing a crime is also unchanged, i.e. P i 1 = P j 1 , P i 2 = P j 2 With the method of dynamic programming, two spatial variables, the expected utility and the probability of success for each offense, are used to model the criminal’s location choices. A criminal usually commits his first offence in the district which has the highest probability of success but a lowest expected utility. If an area has both higher expected utility and a higher probability of success, the criminal will commit all his offences in this place. The model also suggests that crime prevention measures should be adopted in the local conditions. “Covering” measures, such as patrolling, should be taken in the poor residential districts or delinquency districts, while more sophisticated and advanced measures should be introduced in the richer districts or the districts where career criminals haunt. Team # 6539 Page 19 of 26 5.1 The Foundation of Model First, let the utility function for a certain criminal be given: U = U 1 ( I 1 ) + U 2 ( I 2 ) + … + U S ( I S ) (8) In this function, s indicates the number of crimes; Ii (i=1,2,…s) indicates the net income for the ith time offender. Then, denote Pi as the probability of success for each crime (i.e., the probability of not being caught). If the criminal is caught when he commits the hth crime, he will lose I h . Then we can get the total net income I 1 + I 2 + … + I h − 1 Meanwhile, we get the expected utility when the cumulative number of crime reaches s. E = U 1 P (1 − P 2 ) + ( U 1 + U 2 ) P P 2 (1 − P ) + … + ( U 1 + U 2 + … + U s ) P P 2 … P s 1131 s h = 1 h i = 1 h = ∑ ( ∑ U i ) ∏ P i (1 − P h + 1 ) i = 1 (9) For here P s + 1 ≡ 0 so we can change Function (9) into E = U 1 ∑ ∏ P i (1 − P h + 1 ) + U 2 ∑ ∏ P (1 − P + 1 ) + … + U s ∏ P ihi h = 1 i = 1 h = 2 i = 1 i = 1 s h s h s (10) For: s h 1 − P + ∑∏ P i (1 − P h + 1 ) ≡ 1 1 h = 1 i = 1 So in Equation (10), the coefficient of U 1 can be abbreviated as P , and the 1 coefficient of U 2 can be simplified as P P 2 , the coefficient of U h can be simplified as 1 h ∏ P i i = 1 In this way, Equation (9) can be further abbreviated as: E = U 1 P + U 2 P P 2 + … + U s P P 2 … P s ≡ ∑ ( U h ) ∏ P i 111 h = 1 i = 1 s h (11) Now assume that there are two potential criminal regions in a city, which are labeled by superscripts l and 2. For the sake of simplicity, further assume that the net income in of each crime occurred in the same region is unchanged, that is, for any i, j, I i 1 = I j 1 , I i 2 = I j 2 Team # 6539 Page 20 of 26 But I 1 does not necessarily equal I 2 Meanwhile, assume in the same area, each time the probability of successfully committing a crime is also unchanged, i.e. P i 1 = P j 1 , P i 2 = P j 2 Therefore, if the offender intends to commit s crimes, he needs to make location choices for 2 s times. The following dynamic programming method reveals the optimal solution of the offender’s location choice of committing the crime. Here assume that during the planning period, the offender implement all his crimes. What’s more, he determines all the optimal locations one by one from the back to the front. The planning period can be any time that a crime will happen. Suppose the offender has already determined the locations of the crimes for the first s − 1 times and attempts to optimize the location of sth crime. Denote the expected utility for committing sth crime in district 1 and district 2 as E 1 = U 1 P 1 + U 1 P 1 P 2 + … + U s 1 P 1 P 2 … P s 1 E 1 = U 1 P 1 + U 2 P 1 P 2 + … + U s 2 P 1 P 2 … P s 2 (12) (13) The first s-1 terms on the right side in Equation (12) and (12) has no region label, because of the assumption of they are the same in the two equations mentioned above and the only difference exits in the sth term. Therefore, the difference between the expecting utilities of committing sth crime in district1 and district 2 is s − 1 ∆ E = E − E = ( U P − U P ) ∏ P i i = 1 1 2 1 s 1 2 s 2 (14) Equation (14) indicates that whatever the probability of success P or the probability of being caught (1-P) is, the offender will choose the place which has the highest expected profit to commit his last crime. When the utility function is monotone, and the offender does not care about his location of crime activity, the results mentioned above also suggest that the offender will commit sth crime in the location where the expected utility is highest . Generally, if the offender has already determined the crime locations of the first time, the second time, the (k-1)th time, the (k+1)th time, …the sth time, the expected utility of committing the kth crime in district1 and district2 are as follows: k − 1 1 h 1 k 1 k − 1 1 s i h h = k + 1 s 2 h i E = ∑ U h ∏ P i + U P h = 1 i = 1 h 2 k ∏ P + P ∑ U ∏ P i = 1 i = 1 i ≠ k k − 1 h h i (15) k − 1 2 E = ∑ U h ∏ P i + U P h = 1 i = 1 2 ∏ P + P ∑ U ∏ P i i = 1 h = k + 1 i = 1 i ≠ k (16) The difference between Equation (15) and Equation (16) is Team # 6539 Page 21 of 26 h − 1 1 2 1 k 1 2 k 2 1 2 s h = k + 1 h ∆ E = E − E = ( U P − U P ) ∏ P i + ( P − P ) ∑ U h ∏ P i i = 1 i = 1 i ≠ k (17) or sh ⎡ 12 ⎤ 22 E = ∏ P i ⎢ U k P − U k P + ( P − P 2 ) ∑ U h ∏ P i ⎥ 1 i = 1 h = k + 1 i = k + 1 ⎣⎦ k − 1 (17’) When k=s, we can change Equation (17’) into Equation (14). Here k is the offender’s last crime during his planning period. The offender will commit this crime in the district which has the highest expected utility. Similarly, k can be replaced by s − 1, s − 2, … ,1 . By repeating the calculation, we can track the criminal’s optimal locations of committing the crimes each time . Equation (17’) shows that there are several possible locations for the criminal to 1 select. When U k P 1 U k 2 P 2 , I 1 P 1 I 2 P 2 . If P 1 P 2 , the value of equation (17’) is positive, which means the region with the highest expected utility, is also the most secure region. In this case, region 1 is a perfect location of crime, so the offender will commit all the crimes in this region. For an offender who constantly changing places for committing crimes between the two regions, there is no ideal region with both high E and P. If U 1 P 1 U 2 P 2 or I 1 P 1 I 2 P 2 , then P 1 P 2 . It means that areas with the highest expected profit, is also the highest risk areas, the probability of being captured (l-P) reaches its maximum in the same time. From the Equation (17’) and (14) we can see, in this case, the last crime the offender planned will occur in region 1. When the offender reduces the number of crimes to s times or less, the coefficient ( ( P 1 − P 2 ) ) of the equation (l7’) will increase. The larger the coefficient is, the fewer the certain number of actually committed crimes will be as long as s is certain. Therefore, the fewer the number of actually committed crimes is, the greater the second term’s absolute value in the second square brackets in equation (17’) will be. Because of ( P 1 − P 2 ) 0 , this term should be negative. So probably there exists a number of crimes that makes the whole equation (17’) be negative. Then region 1 is not perfect for committing crimes, so the offender will change his criminal location to region 2. From then on, as the coefficient of equation (17’), i.e. ( P 1 − P 2 ) is increasing, the offender will choose Region 2 as criminal location instead of Region 1. In other word, If an offender is faced with this situation, in order to change his criminal places, the best option is to commit his initial crime in Region 2 at a lower expected return and a lower the probability of being arrested, and then go to commit the crimes in zone 1 where both the benefits and risks are higher. Team # 6539 Page 22 of 26 5.2 Choice of multi-regional areas We have already discussed the situation of making choices of criminal locations when there exist only two regions. However, it is very likely that there are many regions in one area. The distribution of their criminal scenes is very similar to the situation with the two regions. Now suppose there are n potential criminal locations and the offender has determined all these areas except the kth criminal location. The difference between expected utility of region c and region m for committing kth crime is as follows: k − 1 ∆ E = ∏ P 1 ( U kc P c − U km P m ) i = 1 (18) Therefore, the offender will commit the crime in the region which has the highest U k P . This result works out the same as the situation of two-region area . Equation (18) shows that if U kn P n U km P m , P n P m , Region c is better for the offender to commit crimes than region m in all respects, so the offender will exclude region m from its location decisions. Therefore, for ith crime (i is arbitrary), the criminal location is decided by the following sequences U i 1 P 1 U i 2 P 2 … U n P n (19) (20) P 1 P 2 … P n In our real life, these two kinds of arrangement rarely exist at the same time; it is only a theoretical solution. Regions in Sequence (19) and (20) are all criminal locations. If the offender commits crimes in all those regions to, then there are some offsets among the various regions. If an area is foolproof, then he will focus on here to implement all the criminal activities. In reality, criminals always tend to be concentrated in a few areas of crime. Therefore, suppose n is small, then there are large chances of Sequence (19) and (20). According to Sequence (19) and (20), the offender will commit the last crime in region n. Now let’s find out where the (k-1)th crime will be committed. First, the regions can be arranged according to the following ratio 1 U n P k − 1 − U k − 1 P 1 ≡ W 1 n P − P ( k = 1, 2, … , n ) (21) When (18) is negative, the offender will leave region n for another region which has the smallest value of W. W is the marginal expected return with the risk of committing the crime. The offender optimizes his criminal acts by selecting the area with smallest W value, such that the expected profit will reach its maximum. Other crime locations k − 2, k − 1, … ,1 can also be determined by the order of the ratio of W. Team # 6539 Page 23 of 26 The result turns out to be the same as the two-region situation. No matter the offender is faced up with the situation of a two-region area or a multi-region area; he will optimize his choices of the criminal locations and commit the serial crimes according to expected utility and the probability of success. 5.3 Solution and Result With the method of dynamic programming, two spatial variables, the expected utility and the probability of success for each offense, are used to model the criminal’s location choices.It shows a single offender’s criminal acts in two regions and various districts, and conversions throughout the various regions. The results showed that: If a region has both high expected utility and high probability of success, then the offender will concentrate in this region committing all the crimes and will never go to other areas. Once the two regions has different expected utility and probability of success, the offender will change his location of committing crimes. 6. Application In the case of Peter Sutcliffe, we use the Google Earth to find out the sites of 13 victims and 10 survivors. We also find out the anchor point. See Figure Figure 2 As we have seen, the offender’s anchor point is like the mean center of the crime site locations. Then, according to the Model One, we can get the geographic profile. See figure 3 : Team # 6539 Page 24 of 26 Figure 3 In Model Two, a wide range of criminal area can then be divided into several small areas. See figure 4 : Figure 4 Next , we give the proper score for each factor according to each area’s actual situation. It’s a pity that we don’t have detailed information, so we can’t give the score .However, we believe it’s easy for local police .Now we assume that we have got the geographical profile and n hot points. Then, we use our synthesized method to Team # 6539 Page 25 of 26 analyze the n+2 hot points to predict the next crime. The detail of steps: Find the crime sites x 1 , … , x n Find geographic profiles according to Model One Find all hotspots Divide criminal locations and work out E Find geographic profiles according to Model Two Serial crime s Find next crime site location according to Model 3 Narrow the coverage of search Figure 5 Evaluat7 . Evaluat ion and improvementsEvaluation Model One:One: Strength: Geographic profiles generated in Model One is based on the assumption and computed from the theoretical formulas, which makes it rigorous. What’s more, it takes into account local geographic features, in particular, it account for geographic features that influence the selection of a crime site and geographic features that influence the potential anchor points of offenders. Weakness: Since the offender is very likely to change his residence, the prerequisite that the offender has the only anchor point and it keeps stable differs from the actual situation. Put too much emphasis on theoretical formulas while lack of adequate thinking about practical factors, such as the geographical environment and the criminal motives and so on. Model Two:Two: Strength: Model Two aims to make up for the application of the method of geographical profiling through using analytic hierarchy process (AHP). It takes full account of a variety of factors relevant to the crime site selection, quantify those factors and give the appropriate weighting factor to them in accordance with local conditions. Weakness: Require large amounts of data which are difficult to obtain accurately. And it is difficult to make accurate ratings of various factors, which takes long time to work them out. Team # 6539 Page 26 of 26 The synthesized methodmethod : Strength: Formulize the factors, estimate the nest crime site location more rigorously. Additionally, we can further estimate where the crime site location is according to the number of crimes by combining two geographical profiles generated respectively from Model One and Model Two. Weakness: Repeatedly take the concepts of the expected utility of crime and the probability of the success into account, which may make the results close to that of Model Two which focus on these factors, so that the conclusions of Model One will be neglected. The model is still an approximate on a large scale. This has doomed to limit the applications of it. Further improvements :improvements: After consolidating the previous two methods, a major improvement to the methodology is to score the factors more precisely and more objectively. It is best if there is a special program designed for analyzing data and data processing. In addition, we should find out more links between Model One and Model Two, to get a more comprehensive result with smaller deviation. 8. References Smith, C. and Guillen, T. 1991 The search for the Green River Killer, New York: Onyx. Beltrami, E. J. (1993). Mathematical models in the social and biological sciences. Jones and Bartlett Publishers. Canter, D., Coffey, T., Huntley, M., Missen, C. (2000). Predictingserial killers’ home base using a decision support system.Journal of Quantitative Criminology, 16(4), 457–478. O'Leary, M.(2009). The mathematics of geographic profiling. preprint. Rossmo, K. (2000). Geographic Profiling. CRC Press. George O. Mohler and Martin B.(2009).Short Geographic profiling from kinetic models of criminal behavior Janet Warren, Roland Reboussin, Robert R.(1998).Hazelwood,Crime Scene and Distance Correlates of Serial Rape . Journal of Quantitative Criminology. D. Kim Rossmo.(2003).A Methodological Model. Brantingham, P. L., Brantingham, P. J. (1993). Nodes, paths and edges: considerations on the complexity of crime and the physical environment. Journal of Environmental Psychology,13, 3–28. Canter, D., Larkin, P. (1993). The environmental range of serial rapists. Journal of Environmental Psychology, 13, 63-69.
139 次阅读|0 个评论
分享 数学中国社区 › 论坛 › 【建模区】国家竞赛 › 美国大学生数学建模竞 ...
zljgfy 2012-2-6 14:36
var fid = parseInt('1414'), tid = parseInt('105031'); zoomstatus = parseInt(1);var imagemaxwidth = '750';var aimgcount = new Array(); #portal_block_188 { margin-top:0px !important;margin-right:0px !important;margin-bottom:10px !important;margin-left:0px !important;border:0px none !important;}#portal_block_188 .dxb_bc { margin:0px !important;}#frame6l77Nz { margin:0px !important;border:0px !important;} 数学中国社区 › 论坛 › 【建模区】国家竞赛 › 美国大学生数学建模竞赛(MCM/ICM) › 2011 ICM C题参考资料 › 2011年ICM的C题资料
298 次阅读|0 个评论
分享 美国大学生数学建模竞赛(MCM/ICM)简介
蘼荼花香 2012-2-5 09:16
美国大学生数学建模竞赛( MCM/ICM ),是一项国际级的竞赛项目,为现今各类数学建模竞赛之鼻祖。    MCM/ICM 是 Mathematical Contest in Modeling 和 Interdisciplinary Contest in Modeling 的缩写,即 “ 数学建模竞赛 ” 和 “ 交叉学科建模竞赛 ” 。 MCM 始于 1985 年, ICM 始于 2000 年,由 COMAP ( the Consortium for Mathematics and Its Application ,美国数学及其应用联合会)主办,得到了 SIAM , NSA , INFORMS 等多个组织的赞助。 MCM/ICM 着重强调研究问题、解决方案的原创性、团队合作、交流以及结果的合理性。   竞赛以三人(本科生)为一组,在四天时间内,就指定的问题完成从建立模型、求解、验证到论文撰写的全部工作。竞赛每年都吸引大量著名高校参赛。 2008 年 MCM/ICM 有超过 2000 个队伍参加,遍及五大洲。 MCM/ICM 已经成为最著名的国际大学生竞赛之一。 发展历史    1985 年,在美国科学基金会的资助下,创办了一个名为 “ 数学建模竞赛 ” ( Mathematical Competition in Modeling 后改名 Mathematical Contest in Modeling ,简称 MCM )一年一度的大学水平的竞赛, MCM 的宗旨是鼓励大学师生对范围并不固定的各种实际问题予以阐明、分析并提出解法,通过这样 一种结构鼓励师生积极参与并强调实现完整的模型构造的过程。它是一种彻底公开的竞赛,每年只有若干个来自不受限制的任何领域的实际问题,学生以三人组成一 队的形式参赛,在三天( 72 小时)(近年改为四天,即 96 小时)内任选一题,完成该实际问题的数学建模的全过程,并就问题的重述、简化和假设及其合理性的 论述、数学模型的建立和求解(及软件)、检验和改进、模型的优缺点及其可能的应用范围的自我评述等内容写出论文。由专家组成的评阅组进行评阅,评出优秀论 文,并给予某种奖励,它只有唯一的禁律,就是在竞赛期间不得与队外任何人(包括指导教师)讨论赛题,但可以利用任何图书资料、互联网上的资料、任何类型的 计算机和软件等,为充分发挥参赛学生的创造性提供了广阔的空间。第一届 MCM 时,就有美国 70 所大学 90 个队参加,到 1992 年已经有美国及其它一些国家 的 189 所大学 292 个队参加,在某种意义下,已经成为一种国际性的竞赛,影响极其广泛。 奖项设置  美国大学生数学建模竞赛共设置四个奖项,分别为 Outstanding Winner , Finalist , Meritorious Winner , Honorable Mentions 。 在国内,约定俗成地将这四个奖项分别对应为特等奖、特等奖候选奖、一等奖、二等奖 报名时间: 美国大学生数学建模竞赛每年的比赛时间一般定在二月初,需要通过官方网站报名,而且需要有固定的指导教师。一般各大高校均会组织感兴趣的同学进行赛前培训以及报名、交费等事宜。 比赛时间    2011 年: 2 月 11 - 15 号    2012 年: 2 月 09 - 13 号
275 次阅读|0 个评论
分享 2012数学中国“美赛MCM/ICM培训”报名通知
陈华良 2011-12-16 17:17
2012数学中国“美赛MCM/ICM培训”报名通知 2012年美国大学生数学建模竞赛将于:2012年2月9号晚上8:01分(美国东部时间)——2012年2月13号晚上8:00(美国东部时间)举行!(注明:北京时间2012年2月10日早上9:01分——2012年2月14日早上9:00截止) 为了帮助参加美赛的同学更好的应对美赛,弥补美赛准备不足的短板,帮助大家进一步提升应对美赛的能力。数学中国培训团队根据大家的迫切需求,精心准备了2012年数学中国美赛系列培训,邀请了数学中国教师顾问团的老师、数学中国讲师团、美赛成功参赛者等来主讲培训主题。 详情:http://www.madio.net/thread-128232-1-1.html
个人分类: 通知|861 次阅读|0 个评论
qq
收缩
  • 电话咨询

  • 04714969085

关于我们| 联系我们| 诚征英才| 对外合作| 产品服务| QQ

手机版|Archiver| |繁體中文 手机客户端  

蒙公网安备 15010502000194号

Powered by Discuz! X2.5   © 2001-2013 数学建模网-数学中国 ( 蒙ICP备14002410号-3 蒙BBS备-0002号 )     论坛法律顾问:王兆丰

GMT+8, 2024-5-24 01:31 , Processed in 0.244323 second(s), 28 queries .

回顶部