Validation of an Agent-based Civil Violence Model Michael Jaye, Ph.D. COL Robert Burks, Ph.D.

Slides:



Advertisements
Similar presentations
Modeling of Complex Social Systems MATH 800 Fall 2011.
Advertisements

Lect.3 Modeling in The Time Domain Basil Hamed
Brian A. Harris-Kojetin, Ph.D. Statistical and Science Policy
Britt Cartrite.  Ph.D., University of Colorado at Boulder (2003) Student of Sven Steinmo Dissertation focused on the dynamics of the politicization of.
SECOND MIDTERM REVIEW CS 580 Human Computer Interaction.
Modeling Civil Disorder Phil Graves Computer Systems Research,
New Mexico Computer Science for All Agent-based modeling By Irene Lee December 27, 2012.
Modelling Infectious Disease … And other uses for Compartment Models.
FIN 685: Risk Management Topic 5: Simulation Larry Schrenk, Instructor.
Agent-based Modeling: Methods and Techniques for Simulating Human Systems Eric Bonabaun (2002) Proc. National Academy of Sciences, 99 Presenter: Jie Meng.
VV&A in Human, Social, Cultural Behavior (HSCB) Simulation Dr. Jimmie McEver Dr. David T. Signori Dr. Mike Smeltzer Evidence Based Research, Inc.
Chess Review May 10, 2004 Berkeley, CA Modeling Subtilin Production in Bacillus subtilis Using Stochastic Hybrid Systems Jianghai Hu, Wei-Chung Wu Denise.
Lecture 7 Model Development and Model Verification.
Xiaohui Cui †, Laura L. Pullum ‡, Jim Treadwell †, Robert M. Patton †, and Thomas E. Potok † Particle Swarm Social Model for Group Social Learning in an.
1 Validation and Verification of Simulation Models.
Modelling the control of epidemics by behavioural changes in response to awareness of disease Savi Maharaj (joint work with Adam Kleczkowski) University.
Dynamic Models Lecture 13. Dynamic Models: Introduction Dynamic models can describe how variables change over time or explain variation by appealing to.
Hilton’s Game of Life (HGL) A theoretical explanation of the phenomenon “life” in real nature. Hilton Tamanaha Goi Ph.D. 1st Year, KAIST, Dept. of EECS.
Statistical Natural Language Processing. What is NLP?  Natural Language Processing (NLP), or Computational Linguistics, is concerned with theoretical.
Lars-Erik Cederman and Luc Girardin Center for Comparative and International Studies (CIS) Swiss Federal Institute of Technology Zurich (ETH)
Bottom-Up Coordination in the El Farol Game: an agent-based model Shu-Heng Chen, Umberto Gostoli.
1 © Alexis Kwasinski, 2011 DC micro-grids comprise cascade distributed power architectures – converters act as interfaces Point-of-load converters present.
Integrated Capability Maturity Model (CMMI)
1 Validation & Verification Chapter VALIDATION & VERIFICATION Very Difficult Very Important Conceptually distinct, but performed simultaneously.
Emerging Infectious Disease: A Computational Multi-agent Model.
Simulation of Global Warming in the Continental United States Using Agent-Based Modeling By Marika Lohmus.
V5 Epidemics on networks
What is a model Some notations –Independent variables: Time variable: t, n Space variable: x in one dimension (1D), (x,y) in 2D or (x,y,z) in 3D –State.
1 Science as a Process Chapter 1 Section 2. 2 Objectives  Explain how science is different from other forms of human endeavor.  Identify the steps that.
How tough should you be Inflation targeting, fiscal feedbacks, and multiple equilibria Alexandre Schwartsman Unibanco.
Analysis of Simulation Results Chapter 25. Overview  Analysis of Simulation Results  Model Verification Techniques  Model Validation Techniques  Transient.
MA354 Mathematical Modeling T H 2:45 pm– 4:00 pm Dr. Audi Byrne.
Multi-Agent Modeling of Societal Development and Cultural Evolution Yidan Chen, 2006 Computer Systems Research Lab.
This presentation is made available through a Creative Commons Attribution- Noncommercial license. Details of the license and permitted uses are available.
Models, Agent-Based Models and the Modeling Cycle Universidad Politécnica Salesiana.
Introduction to Spatial Microsimulation Dr Kirk Harland.
Landscape Ecology: Conclusions and Future Directions.
A Stochastic Model of Platoon Formation in Traffic Flow USC/Information Sciences Institute K. Lerman and A. Galstyan USC M. Mataric and D. Goldberg TASK.
MODES-650 Advanced System Simulation Presented by Olgun Karademirci VERIFICATION AND VALIDATION OF SIMULATION MODELS.
Chapter 10 Verification and Validation of Simulation Models
Web Science & Technologies University of Koblenz ▪ Landau, Germany Micro-interactions and Macro-observations Deciding Between Competing Models Steffen.
Irregular Warfare Modeling/Data Validation Best Practices 11 th Annual MOVES Research Education Summit 12 July 2011.
L – Modelling and Simulating Social Systems with MATLAB © ETH Zürich | Lesson 3 – Dynamical Systems Anders Johansson and Wenjian.
An Agent Epidemic Model Toward a general model. Objectives n An epidemic is any attribute that is passed from one person to others in society è disease,
MA354 An Introduction to Math Models (more or less corresponding to 1.0 in your book)
Spatial ABM H-E Interactions, Lecture 4 Dawn Parker, George Mason University Notes on Grimm and Railsback Chapter 1, “Individual-based modeling and ecology”
Simulation of the Spread of a Virus Throughout Interacting Populations with Varying Degrees and Methods of Vaccination Jack DeWeese Computer Systems Lab.
At what level do I trust the outcomes of the model? Verification Calibration Validation Exploration of the model structure. the activity of adjusting the.
MA354 Math Modeling Introduction. Outline A. Three Course Objectives 1. Model literacy: understanding a typical model description 2. Model Analysis 3.
Working with the Causal Model of Political Violence.
Genetic algorithms: A Stochastic Approach for Improving the Current Cadastre Accuracies Anna Shnaidman Uri Shoshani Yerach Doytsher Mapping and Geo-Information.
Csci 418/618 Simulation Models Dr. Ken Nygard, IACC 262B
Ms. Lisa Jean Moya WernerAnderson, Inc. 01 May 2007 Validation Methodology for Agent-Based Simulations Workshop DoD Validation Baseline.
WHAT IS RESEARCH? According to Redman and Morry,
SIR Epidemics: How to model its behavior? Soonmook Lee 1.
December 3, 2014AISC-CODISCO 2014, revised Nov From Agent-based models to network analysis (and return): the policy-making perspective Magda Fontana.
Modeling Changes in Exploitative vs. Protective Behavior Joseph Blass Motivation and Questions Humans exploit others for selfish reasons Humans also protect.
MECH 373 Instrumentation and Measurement
L – Modeling and Simulating Social Systems with MATLAB
Public Policy and Managing Bioterrorism
Sistemi per la Gestione Aziendale.
An Investigation of Market Dynamics and Wealth Distributions
Early Contingency Theories of Effective Leadership
Chapter 10 Verification and Validation of Simulation Models
Simulation of Global Warming in the Continental United States Using Agent-Based Modeling By Marika Lohmus.
Kaivan Munshi Brown University Mark Rosenzweig Yale University
Sociological Analysis: Theoretical Perspectives
Simulating the Tragedy of the Commons Using Agent-Based Modeling
Presentation transcript:

Validation of an Agent-based Civil Violence Model Michael Jaye, Ph.D. COL Robert Burks, Ph.D.

Model Validation Validation: ascertains whether or not a model represents and correctly reproduces behaviors of the intended real-world system Required by some agencies Agent-based model (ABM) validation: – Is the process of ABM validation different than that for any other model? – Defense-related validation work: Appleget, et.al, “Irregular Warfare Model Validation Best Practices Guide” USMC “Agent-Based Simulation Verification, Validation, and Accreditation Framework Study”

Model Validation Conceptual Validation Establishes credibility of model – Underlying theories – Structure, logic – Sufficiently accurate for intended purpose – Includes submodel(s) Must be well-documented Operational Validation Establishes that output behavior has accuracy required for model’s intended purpose Techniques vary – depend on system of interest (observable) and approach (subjective/objective ); include statistical comparison, face validation (SME), docking, etc.

Conceptual Validation Establishes credibility of model – Underlying theories – Structure, logic – Sufficiently accurate for intended purpose – Includes submodel(s) Must be well-documented Must include the rules by which agents behave & operate Operational Validation Establishes that output behavior has accuracy required for model’s intended purpose Techniques vary – depend on system of interest (observable) and approach (subjective/objective ); include statistical comparison, face validation (SME), docking, etc. Agent-Based Model Validation

Insurgencies Dynamic interaction between competing sides over contested political space. Theories include – Gurr, Why Men Rebel (Relative Deprivation & Cognitive Dissonance) – Leites & Wolf, “Rebellion and Authority: An analytic essay on insurgent conflicts” (Insurgency analyzed as a system) – Kuran, “Sparks and prairie fires: A theory of unanticipated political revolution” (Preference Falsification) – McCormick, “Revolutionary origins and conditional mobilization” (Expected Cost) – Epstein, “Modeling civil violence: An agent-based computational approach ” (Legitimacy, Hardship, Repression)

Two Conceptual Models Epstein’s Civil Violence agent-based model (ABM) implementation, with extensions – A member of the general population considers grievance, government (il-) legitimacy, “momentum”, risk aversion in the determination of whether or not to rebel S-I-R-S Ordinary Differential Equation (ODE) model – Likens insurgency spread to that of an infectious disease

Civil Violence Model Agent Specification Members of fixed (no births/deaths) population may be: – Inactive (not rebelling) – Actively rebelling – Jailed – Moving (randomly) to open space (Moore neighborhood) within “vision” – At end of jail term, agents return to population as inactive Political grievance a function of hardship and regime illegitimacy Agents decide to rebel based on: – Risk aversion – Hardship – Government illegitimacy – Arrest probability – Some threshold value Two Types of Agents State (“Cop”) General Population Two Types of Agents State (“Cop”) General Population

Civil Violence Model State Agent Specification Number of state agents (“cops”) specified and fixed Move randomly (Moore neighborhood) Can arrest active agents within some “vision” radius ‒ Arrested agent’s jail time is random, up to some max ‒ Jailed agent location frozen ‒ Freed agent re-enters as inactive agent

ABM Conceptual Model Agent Rules Agent Rules If (G – N) > T, become active (join rebellion); otherwise remain inactive. – G = H(1 – L) – N = R(1 – exp[-k(C/A) v ] – H and R are assigned from U[0, 1] – T is a threshold value, v is the agent “vision” radius, and k is a constant, each user prescribed Cop arrest rule: each turn, arrest one active agent chosen randomly from those within cop “vision” radius

S-I-R-S Conceptual Model Inactive - or Susceptible ( S ) - agents interact and can become part of insurgency, thereby Infected ( I ) Infected agents can be Removed ( R ); e.g. jail After serving jail term, agents revert back to Susceptible Insurgency spreads from S to I to R, then back to S Assume fixed population (no births, deaths) Yields a system of ordinary differential equations (ODEs) Many published works consider insurgency growth as the spread of an infectious disease

S-I-R-S System of ODEs With initial conditions: Now Rebelling Released from Jail Actively Rebelling Arrested Susceptible Infected Removed

S-I-R-S Analysis I(t) Solution Trajectories Implications ‒ Revolutionary ideas persist ‒ Herd immunity can be achieved due to indoctrination/repression S(t) Stable equilibrium condition in first quadrant (only meaningful quadrant)

S-I-R-S Analysis (Cont.) Susceptible Population Actively Rebelling Currently Arrested Solution Trajectories Slight oscillation, equilibrium conditions attained

Civil Violence ABM Implementation NETLOGO implementation (Initial Setup) User Interface Screen

Civil Violence ABM (Cont.) NETLOGO implementation (65 Time Steps)

Civil Violence ABM (Cont.) Slight oscillation, equilibrium conditions attained

ODE Model SolutionABM Implementation “Docking” results of two models is a means toward establishing operational validity. “Docking” Civil Violence ABM & S-I-R-S Model Result

Additional ABM Results ABM results - not attainable from the ODE model - observed behavior - riots Punctuated Equilibrium Agent vision 8 Cop vision 8 Agent vision 8 Cop vision 8

Additional ABM Results (Cont.) Average active agents ≈ 6 Agent vision 10 Cop vision 1 Agent vision 10 Cop vision 1 ABM results - not attainable from the ODE model - observed behavior - revolutionary war

New equilibrium: average active Agents ≈ 120 Additional ABM Results (Cont.) “Sparks and Prairie Fires” A Spark set off a sudden rebellion Equilibrium shift = Revolution! Equilibrium shift = Revolution! Mechanism: Threshold is a function Of agent vision radius Mechanism: Threshold is a function Of agent vision radius

Further establishing operational (face) validity “When Do Institutions Suddenly Collapse? Zones of Knowledge and the Likelihood of Political Cascades” – Ian Lustick, Dan Miodownik Considers “zones of knowledge”, small worlds (flash mobs) Neighborhood size – akin to “vision” radius Cascades and threshold behaviors related

Further establishing operational (statistical) validity “Empirical Performance of a Decentralized Civil Violence Model” – Klemens, Epstein, Hammond, Raifman Examines Hardship, Legitimacy, Repression Draws from Political Instability Task Force data set Findings: - model’s explanatory power supported at high significance - results robust across a variety of statistical instruments

Future Work Stressing other insurgency theories through ABM implementation. – Kuran: agent preference falsification – McCormick: effect of insurgent violence on agent expectation Validation ‘best practices’

Questions? Comments?