Investigating Social Network Analysis Methods for Identifying Emergent Behaviors in Agent-Based Models
MetadataShow full item record
Understanding social networks, their nature in influencing events and ways to impact them is critical to supporting key military activities such as counter-insurgency and counter-improvised explosive devices (C-IED). Preliminary work has been performed to explore methods of extracting, analyzing, and visualizing social networks that are emergent from many agent-based models. A simplified interaction scenario has been created to generate data to serve as the starting point for exploring the proposed techniques and tools. Test tools and prototype methods for data-farming the scenario, extracting network data, analyzing end-of-run network statistics, and visualizing network behaviors are identified and explored. Supporting tools include the agent-based model Pythagoras, the Social Network Image Animator (SoNIA), R Project for Statistical Computing (S routines for social network analysis), and PlotGL. This paper summarizes preliminary work with the data farming and analysis techniques being explored.
Showing items related by title, author, creator and subject.
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ...
Alt, Jonathan K.; Lieberman, Stephen (2010);One of the key structural components of social systems is the social network. The representation of this network structure is key to providing a valid representation of the society under study. The social science concept ...
Raabe, Leopele S.; Blount, Gary S. (Monterey, California: Naval Postgraduate School, 2016-03);This thesis poses the question, What is the nature of the relationships between social embeddedness, structural efficiency, and organizational behavior within dark networks? The objectives of this thesis are twofold. The ...