2012美赛题目翻译.doc_第1页
2012美赛题目翻译.doc_第2页
2012美赛题目翻译.doc_第3页
2012美赛题目翻译.doc_第4页
2012美赛题目翻译.doc_第5页
已阅读5页,还剩4页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

2012美赛A题:一棵树的叶子(数学中国翻译) “一棵树的叶子有多重?”怎么能估计树的叶子(或者树的任何其它部分)的实际重量?怎样对叶子进行分类?建立一个数学模型来对叶子进行描述和分类。模型要考虑和回答下面的问题: 为什么叶子具有各种形状? 叶子之间是要将相互重叠的部分最小化,以便可以最大限度的接触到阳光吗?树叶的分布以及树干和枝杈的体积影响叶子的形状吗? 就轮廓来讲,叶形(一般特征)是和树的轮廓以及分枝结构有关吗? 你将如何估计一棵树的叶子质量?叶子的质量和树的尺寸特征(包括和外形轮廓有关的高度、质量、体积)有联系吗?除了你的一页摘要以外,给科学杂志的编辑写一封信,阐述你的主要发现B:沿着Big Long River野营【数学中国翻译】 游客在“大长河”(225英里)可以享受到秀丽的风光和令人兴奋的白色湍流。这条河对于背包客来说是进不去的, 因此畅游这条长河的唯一办法就是在这条河上露营上几天。这次旅行从开始的下水点到最终结束点,共225英里,且是顺流而下的。乘客可以选择平均4英里/小时的以浆作为动力的橡胶筏或者平均8英里/小时的机动帆船旅行。整个旅行从开始到结束会经历6至18个夜晚。负责管理这条河的政府机构希望到这里的每一次旅行都能够享受到野外经历, 以最少的接触到在河上其它的船只。目前, 每年在六个月期间(一年的其余部分的天气对于河流旅行来说太冷),共有X次旅行,有Y处露营地,露营地均匀的分布整个河道。由于漂流的受欢迎程度的上升,公园管理者已经被要求允许更多的旅行次数。所以他们想确定怎样可能安排一个最优的混合的旅行方案,不同的时间(单位为夜)和推动方式(马达或浆),最大限度的利用露营地。换句话说,在长河的漂流季,将会有多少更多的乘船旅行可以加进来?河流的管理者现在雇佣你,为他们提出最佳排程方式和河流承载能力的建议,记住两个露营者不能在同一时间内占据同一个露营地。除了你的一页摘要,准备一页备忘录,对河流的管理者描述你的主要发现。2012 ICM ProblemModeling for Crime BustingYour organization, the Intergalactic Crime Modelers (ICM), is investigating a conspiracy to commit acriminal act. The investigators are highly confident they know several members of the conspiracy, buthope to identify the other members and the leaders before they make arrests. The conspirators andthe possible suspected conspirators all work for the same company in a large office complex. Thecompany has been growing fast and making a name for itself in developing and marketing computersoftware for banks and credit card companies. ICM has recently found a small set of messages from agroup of 82 workers in the company that they believe will help them find the most likely candidates forthe unidentified coconspirators and unknown leaders. Since the message traffic is for all the officeworkers in the company, it is very likely that some (maybe many) of the identified communicators in themessage traffic are not involved in the conspiracy. In fact, they are certain that they know some peoplewho are not in the conspiracy. The goal of the modeling effort will be to identify people in the officecomplex who are the most likely conspirators. A priority list would be ideal so ICM could investigate,place under surveillance, and/or interrogate the most likely candidates. A discriminate line separatingconspirators from nonconspirators would also be helpful to distinctly categorize the people in eachgroup. It would also be helpful to the DAs office if the model nominated the conspiracy leaders.Before the data of the current case are given to your crime modeling team, your supervisor gives youthe following scenario (called Investig ation EZ) that she worked on a few years ago in another city. Eventhough she is very proud of her work on the EZ case, she says it is just a very small, simple example, butit may help you understand your task. Her data follow:The ten people she was considering as conspirators were: Anne#, Bob, Carol, Dave*, Ellen, Fred,George*, Harry, Inez, and Jaye#. (* indicates prior known conspirators, # indicate prior known nonconspirators)Chronology of the 28 messages that she had for her case with a code number for the topic of eachmessage that she assigned based on her analysis of the message:1 Anne to Bob: Why were you late today? (1)2 Bob to Carol: That darn Anne always watches me. I wasnt late. (1)3 Carol to Dave: Anne and Bob are fighting again over Bobs tardiness. (1)4 Dave to Ellen: I need to see you this morning. When can you come by? Bring the budget files. (2)5 Dave to Fred: I can come by and see you anytime today. Let me know when it is a good time. Should Ibring the budget files? (2)6 Dave to George: I will see you later lots to talk about. I hope the others are ready. It is important toget this right. (3)7 Harry to George: You seem stressed. What is going on? Our budget will be fine. (2) (4)8 Inez to George: I am real tired today. How are you doing? ( 5)9 Jaye to Inez: Not much going on today. Wanna go to lunch today? (5)10 Inez to Jaye: Good thing it is quiet. I am exhausted. Cant do lunch today sorry! (5)11 George to Dave: Time to talk now! (3)12 Jaye to Anne: Can you go to lunch today? (5)13 Dave to George: I cant. On my way to see Fred. (3)14 George to Dave: Get here after that. (3)15 Anne to Carol: Who is supposed to watch Bob? He is goofing off all the time. (1)16 Carol to Anne: Leave him alone. He is working well with George and Dave. (1)17 George to Dave: This is important. Darn Fred. How about Ellen? (3)18 Ellen to George: Have you talked with Dave? (3)19 George to Ellen: Not yet. Did you? (3)20 Bob to Anne: I wasnt late. And just so you know I am working through lunch. (1)21 Bob to Dave: Tell them I wasnt late. You know me. (1)22 Ellen to Carol: Get with Anne and figure out the budget meeting schedule for next week and help mecalm George. (2)23 Harry to Dave: Did you notice that George is stressed out again today? (4)24 Dave to George: Darn Harry thinks you are stressed. Dont get him worried or he will be nosing around.(4)25 George to Harry: Just working late and having problems at home. I will be fine. (4)26 Ellen to Harry: Would it be OK, if I miss the meeting today? Fred will be there and he knows thebudget better than I do. (2)27 Harry to Fred: I think next years budget is stressing out a few people. Maybe we should take time toreassure people today. (2) (4)28 Fred to Harry: I think our budget is pretty healthy. I dont see anything to stress over. (2)END of MESSAGE TRAFFICYour supervisor points outs that she assigned and coded only 5 different topics of messages: 1) Bobstardiness, 2) the budget, 3) important unknown issue but assumed to be part of conspiracy, 4) Georgesstress, and 5) lunch and other social issues. As seen in the message coding, some messages had twotopics assigned because of the content of the messages.The way your supervisor analyzed her situation was with a network that showed the communicationlinks and the types of messages. The following figure is a model of the message network that resultedwith the code for the types of messages annotated on the network graph.Figure 1: Network of messages from EZ CaseYour supervisor points out that in addition to known conspirators George and Dave, Ellen and Carolwere indicted for the conspiracy based on your supervisors analysis and later Bob selfadmitted hisinvolvement in a plea bargain for a reduced sentence, but the charges against Carol were later dropped.Your supervisor is still pretty sure Inez was involved, but the case against her was never established.Your supervisors advice to your team is identify the guilty parties so that people like Inez dont get off,people like Carol are not falsely accused, and ICM gets the credit so people like Bob do not have theopportunity to get reduced sentences.The current case:Your supervisor has put together a networklike database for the current case, which has the samestructure, but is a bit larger in scope. The investigators have some indications that a conspiracy is takingplace to embezzle funds from the company and use internet fraud to steal funds from credit cards ofpeople who do business with the company. The small example she showed you for case EZ had only 10people (nodes), 27 links (messages), 5 topics, 1 suspicious/conspiracy topic, 2 known conspirators, and 2known nonconspirators. So far, the new case has 83 nodes, 400 links (some involving more than 1topic), over 21,000 words of message traffic, 15 topics (3 have been deemed to be suspicious), 7 knownconspirators, and 8 known nonconspirators. These data are given in the attached spreadsheet files:Names.xls, Topics.xls, and Messages.xls. Names.xls contains the key of node number to the officeworkers names. Topics.xls contains the code for the 15 topic numbers to a short description of thetopics. Because of security and privacy issues, your team will not have direct transcripts of all themessage traffic. Messages.xls provides the links of the nodes that transmitted messages and the topiccode numbers that the messages contained. Several messages contained up to three topics. To helpvisualize the message traffic, a network model of the people and message links is provided in Figure 2.In this case, the topics of the messages are not shown in the figure as they were in Figure 1. These topicnumbers are given in the file Messages.xls and described in Topics.xls.FigureFigure 2: Visual of the network model of the 83 people (nodes) and 400 messages between thesepeople (links).Requirements:Requirement 1: So far, it is known that Jean, Alex, Elsie, Paul, Ulf, Yao, and Harvey are conspirators.Also, it is known that Darlene, Tran, Jia, Ellin, Gard, Chris, Paige, and Este are not conspirators. Thethree known suspicious message topics are 7, 11, and 13. There is more detail about the topics in fileTopics.xls. Build a model and algorithm to prioritize the 83 nodes by likelihood of being part of theconspiracy and explain your model and metrics. Jerome, Delores, and Gretchen are the seniormanagers of the company. It would be very helpful to know if any of them are involved in theconspiracy.Requirement 2: How would the priority list change if new information comes to light that Topic 1 isalso connected to the conspiracy and that Chris is one of the conspirators?Requirement 3: A powerful technique to obtain and understand text information similar to thismessage traffic is called semantic network analysis; as a methodology in artificial intelligence andcomputational linguistics, it provides a structure and process for reasoning about knowledge orlanguage. Another computational linguistics capability in natural language processing is text analysis.For our crime busting scenario, explain how semantic and text analyses of the content and context ofthe message traffic (if you could obtain the original messages) could empower your team to developeven better models and categorizations of the office personnel. Did you use any of these capabilities onthe topic descriptions in file Topics.xls to enhance your model?Requirement 4: Your complete report will eventually go to the DA so it must be detailed and clearlystate your assumptions and methodology, but cannot exceed 20 pages of write up. You may includeyour programs as appendices in separate files that do not count in your page restriction, but includingthese programs is not nec

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论