A. James Clark School of Engineering

Permanent URI for this communityhttp://hdl.handle.net/1903/1654

The collections in this community comprise faculty research works, as well as graduate theses and dissertations.

Browse

Search Results

Now showing 1 - 5 of 5
  • Thumbnail Image
    Item
    Equilibrium Programming for Improved Management of Water-Resource Systems
    (2024) Boyd, Nathan Tyler; Gabriel, Steven A; Mechanical Engineering; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)
    Effective water-resources management requires the joint consideration of multiple decision-makers as well as the physical flow of water in both built and natural environments. Traditionally, game-theory models were developed to explain the interactions of water decision-makers such as states, cities, industries, and regulators. These models account for socio-economic factors such as water supply and demand. However, they often lack insight into how water or pollution should be physically managed with respect to overland flow, streams, reservoirs, and infrastructure. Conversely, optimization-based models have accounted for these physical features but usually assume a single decision-maker who acts as a central planner. Equilibrium programming, which was developed in the field of operations research, provides a solution to this modeling dilemma. First, it can incorporate the optimization problems of multiple decision-makers into a single model. Second, the socio-economic interactions of these decision-makers can be modeled as well such as a market for balancing water supply and demand. Equilibrium programming has been widely applied to energy problems, but a few recent works have begun to explore applications in water-resource systems. These works model water-allocation markets subject to the flow of water supply from upstream to downstream as well as the nexus of water-quality management with energy markets. This dissertation applies equilibrium programming to a broader set of physical characteristics and socio-economic interactions than these recent works. Chapter 2 also focuses on the flow of water from upstream to downstream but incorporates markets for water recycling and reuse. Chapter 3 also focuses on water-quality management but uses a credit market to implement water-pollution regulations in a globally optimal manner. Chapter 4 explores alternative conceptions for socio-economic interactions beyond market-based approaches. Specifically, social learning is modeled as a means to lower the cost of water-treatment technologies. This dissertation's research contributions are significant to both the operations research community and the water-resources community. For the operations research community, this dissertation could serve as model archetypes for future research into equilibrium programming and water-resource systems. For instance, Chapter 1 organizes the research in this dissertation in terms of three themes: stream, land, and sea. For the water-resources community, this dissertation could make equilibrium programming more relevant in practice. Chapter 2 applies equilibrium programming to the Duck River Watershed (Tennessee, USA), and Chapter 3 applies it to the Anacostia River Watershed (Washington DC and Maryland, USA). The results also reinforce the importance of the relationships between socio-economic interactions and physical features in water resource systems. However, the risk aversion of the players acts as an important mediating role in the significance of these relationships. Future research could investigate mechanisms for the emergence of altruistic decision-making to improve equity among the players in water-resource systems.
  • Thumbnail Image
    Item
    A lionfish-inspired predation strategy in planar structured environments
    (Institute of Physics, 2023-06-30) Thompson, Anthony A.; Peterson, Ashley N.; McHenry, Matthew J.; Paley, Derek A.
    This paper investigates a pursuit-evasion game with a single pursuer and evader in a bounded environment, inspired by observations of predation attempts by lionfish (Pterois sp.). The pursuer tracks the evader with a pure pursuit strategy while using an additional bioinspired tactic to trap the evader, i.e. minimize the evader’s escape routes. Specifically, the pursuer employs symmetric appendages inspired by the large pectoral fins of lionfish, but this expansion increases its drag and therefore its work to capture the evader. The evader employs a bioinspired randomly-directed escape strategy to avoid capture and collisions with the boundary. Here we investigate the trade-off between minimizing the work to capture the evader and minimizing the evader’s escape routes. By using the pursuer’s expected work to capture as a cost function, we determine when the pursuer should expand its appendages as a function of the relative distance to the evader and the evader’s proximity to the boundary. Visualizing the pursuer’s expected work to capture everywhere in the bounded domain, yields additional insights about optimal pursuit trajectories and illustrates the role of the boundary in predator-prey interactions.
  • Thumbnail Image
    Item
    Diffusion Dynamics in Interconnected Communities
    (2015) Wei, Xiaoya; Abed, Eyad H.; Electrical Engineering; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)
    In this dissertation, multi-community-based Susceptible-Infected-Recovered (SIR) and Susceptible-Infected-Susceptible (SIS) models of infection/innovation diffusion are introduced for heterogeneous social networks in which agents are viewed as belonging to one of a finite number of communities. Agents are assumed to have well-mixed interactions within and between communities. The communities are connected through a backbone graph which defines an overall network structure for the models. The models are used to determine conditions for outbreak of an initial infection. The role of the strengths of the connections between communities in the development of an outbreak as well as long-term behavior of the diffusion is also studied. Percolation theory is brought to bear on these questions as an independent approach separate from the main dynamic multi-community modeling approach of the dissertation. Results obtained using both approaches are compared and found to be in agreement in the limit of infinitely large populations in all communities. Based on the proposed models, three classes of marketing problems are formulated and studied: referral marketing, seeding marketing and dynamic marketing. It is found that referral marketing can be optimized relatively easily because the associated optimization problem can be formulated as a convex optimization. Also, both seeding marketing and dynamic marketing are shown to enjoy a useful property, namely ``continuous monotone submodularity." Based on this property, a greedy heuristic is proposed which yields solutions with approximation ratio no less than 1-1/e. Also, dynamic marketing for SIS models is reformulated into an equivalent convex optimization to obtain an optimal solution. Both cost minimization and trade-off of cost and profit are analyzed. Next, the proposed modeling framework is applied to study competition of multiple companies in marketing of similar products. Marketing of two classes of such products are considered, namely marketing of durable consumer goods (DCG) and fast-moving consumer goods (FMCG). It is shown that an epsilon-equilibrium exists in the DCG marketing game and a pure Nash equilibrium exists in the FMCG marketing game. The Price of Anarchy (PoA) in both marketing games is found to be bounded by 2. Also, it is shown that any two Nash equilibria for the FMCG marketing game agree almost everywhere, and a distributed algorithm converging to the Nash equilibrium is designed for the FMCG marketing game. Finally, a preliminary investigation is carried out to explore possible concepts of network centrality for diffusions. In a diffusion process, the centrality of a node should reflect the influence that the node has on the network over time. Among the preliminary observations in this work, it is found that when an infection does not break out, diffusion centrality is closely related to Katz centrality; when an infection does break out, diffusion centrality is closely related to eigenvector centrality.
  • Thumbnail Image
    Item
    Dynamic Spectrum Allocation and Sharing in Cognitive Cooperative Networks
    (2009) Wang, Beibei; Liu, K. J. Ray; Electrical Engineering; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)
    The dramatic increase of service quality and channel capacity in wireless networks is severely limited by the scarcity of energy and bandwidth, which are the two fundamental resources for communications. New communications and networking paradigms such as cooperative communication and cognitive radio networks emerged in recent years that can intelligently and efficiently utilize these scarce resources. With the development of these new techniques, how to design efficient spectrum allocation and sharing schemes becomes very important, due to the challenges brought by the new techniques. In this dissertation we have investigated several critical issues in spectrum allocation and sharing and address these challenges. Due to limited network resources in a multiuser radio environment, a particular user may try to exploit the resources for self-enrichment, which in turn may prompt other users to behave the same way. In addition, cognitive users are able to make intelligent decisions on spectrum usage and communication parameters based on the sensed spectrum dynamics and other users' decisions. Thus, it is important to analyze the intelligent behavior and complicated interactions of cognitive users via game-theoretic approaches. Moreover, the radio environment is highly dynamic, subject to shadowing/fading, user mobility in space/frequency domains, traffic variations, and etc. Such dynamics brings a lot of overhead when users try to optimize system performance through information exchange in real-time. Hence, statistical modeling of spectrum variations becomes essential in order to achieve near-optimal solutions on average. In this dissertation, we first study a stochastic modeling approach for dynamic spectrum access. Since the radio spectrum environment is highly dynamic, we model the traffic variations in dynamic spectrum access using continuous-time Markov chains that characterizes future traffic patterns, and optimize access probabilities to reduce performance degradation due to co-channel interference. Second, we propose an evolutionary game framework for cooperative spectrum sensing with selfish users, and develop the optimal collaboration strategy that has better performance than fully cooperating strategy. Further, we study user cooperation enforcement for cooperative networks with selfish users. We model the optimal relay selection and power control problem as a Stackelberg game, and consider the joint benefits of source nodes as buyers and relay nodes as sellers. The proposed scheme achieves the same performance compared to traditional centralized optimization while reducing the signaling overhead. Finally, we investigate possible attacks on cooperative spectrum sensing under the evolutionary sensing game framework, and analyze their damage both theoretically and by simulations.
  • Thumbnail Image
    Item
    Robust Network Trust Establishment for Collaborative Applications and Protocols
    (2007-05-07) Theodorakopoulos, Georgios Efthymios; Baras, John S; Electrical Engineering; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)
    In networks without centralized control (e.g. ad-hoc or peer-to-peer networks) the users cannot always be assumed to follow the protocol that they are supposed to. They will cooperate in the operation of the network to the extent that they achieve their own personal objectives. The decision to cooperate depends on the trust relations that users develop for each other through repeated interactions. Users who have not interacted directly with each other can use direct trust relations, generated by others, in a transitive way as a type of recommendation. Network operation and trust generation can be affected by malicious users, who have different objectives, and against whom any proposed solution needs to be robust. We model the generation of trust relations using repeated games of incomplete information to capture the repetitive operation of the network, as well as the lack of information of each user about the others' objectives. We find equilibria that provide solutions for the legitimate users against which the malicious users cannot improve their gains. The transitive computation of trust is modeled using semiring operators. This algebraic model allows us to generalize various trust computation algorithms. More importantly, we find the maximum distortion that a malicious user can cause to the trust computation by changing the reported trust value of a trust relation.