scholarly journals Election with Bribe-Effect Uncertainty: A Dichotomy Result

Author(s):  
Lin Chen ◽  
Lei Xu ◽  
Shouhuai Xu ◽  
Zhimin Gao ◽  
Weidong Shi

We consider the electoral bribery problem in computational social choice. In this context, extensive studies have been carried out to analyze the computational vulnerability of various voting (or election) rules. However, essentially all prior studies assume a deterministic model where each voter has an associated threshold value, which is used as follows. A voter will take a bribe and vote according to the attacker's (i.e., briber's) preference when the amount of the bribe is above the threshold, and a voter will not take a bribe when the amount of the bribe is not above the threshold (in this case, the voter will vote according to its own preference, rather than the attacker's). In this paper, we initiate the study of a more realistic model where each voter is associated with a  willingness function, rather than a fixed threshold value. The willingness function characterizes the  likelihood a bribed voter would vote according to the attacker's preference; we call this bribe-effect uncertainty. We characterize the computational complexity of the electoral bribery problem in this new model. In particular, we discover a dichotomy result: a certain mathematical property of the willingness function dictates whether or not the computational hardness can serve as a deterrence to bribery attackers.

Author(s):  
Benny Kimelfeld ◽  
Phokion G. Kolaitis ◽  
Julia Stoyanovich

We develop a novel framework that aims to create bridges between the computational social choice and the database management communities. This framework enriches the tasks currently supported in computational social choice with relational database context, thus making it possible to formulate sophisticated queries about voting rules, candidates, voters, issues, and positions. At the conceptual level, we give rigorous semantics to queries in this framework by introducing the notions of necessary answers and possible answers to queries. At the technical level, we embark on an investigation of the computational complexity of the necessary answers. In particular, we establish a number of results about the complexity of the necessary answers of conjunctive queries involving the plurality rule that contrast sharply with earlier results about the complexity of the necessary winners under the plurality rule.


2015 ◽  
Vol 781 ◽  
pp. 379-383
Author(s):  
Warut Suampun

A numerical study of the widely used fixed-threshold criterion for expressing transient stability constraints in optimal power flow (TSCOPF) is conducted. Based on a stability-region framework, a more accurate expression of transient stability constraint in TSCOPF is presented. A method for computing system exact threshold values is proposed and employed for the study of threshold values under different conditions. It is shown via numerical results on the WSCC9 and IEEE145 systems that the exact threshold value for each system and contingency is in fact not a constant, and can vary greatly depending on several factors such as types of contingency, loading conditions, and network topology.


Author(s):  
Michel Balinski ◽  
Rida Laraki

This chapter presents a new basic model, which consists of a common language of evaluation, a set of judges, and a set of competitors. It expresses the problem of what to do with judges’ scores and how to resolve them into a single score in a concise or systematic way. The model identifies the shortcomings of traditional models of social choice theory and provides a new model as an alternative. Six axioms of the basic model are satisfied in a method of grading called social grading function f, in which there is no ambiguity in grading, and the final grade assigned to every single alternative is independent of all other alternatives. The deep preferences or utilities of a judge or a voter play an important role in voting and judging as every decision-maker tries to maximize his utility.


2019 ◽  
Vol 2019 ◽  
pp. 1-17
Author(s):  
Chikodili Helen Ugwuishiwu ◽  
D. S. Sarki ◽  
G. C. E. Mbah

In this paper, a system of deterministic model is presented for the dynamical analysis of the interactional consequence of criminals and criminality on victimisation under two distinguishable forms of rehabilitation—the behavioural reformation of criminals and the emotional psychotherapy of victims. A threshold value, R0=maxRK,RV, responsible for the persistence of crime/criminality and victimisation, is obtained and, using it, stability analyses on the model performed. The impact of an effective implementation of the two forms of rehabilitation was found to be substantial on crime and criminality, while an ineffective implementation of same was observed to have a detrimental consequence. The prevention of repeat victimisation was seen to present a more viable option for containing crime than the noncriminalisation of victims. Further, the removal of criminals, either through quitting or death, among others, was also found to have a huge positive impact. Numerical simulations were performed for a variety of mixing criminal scenarios to verify the analytical results obtained.


Author(s):  
Zili Zhou ◽  
Shaowu Liu ◽  
Guandong Xu ◽  
Wu Zhang

Multi-relation embedding is a popular approach to knowledge base completion that learns embedding representations of entities and relations to compute the plausibility of missing triplet. The effectiveness of embedding approach depends on the sparsity of KB and falls for infrequent entities that only appeared a few times. This paper addresses this issue by proposing a new model exploiting the entity-independent transitive relation patterns, namely Transitive Relation Embedding (TRE). The TRE model alleviates the sparsity problem for predicting on infrequent entities while enjoys the generalisation power of embedding. Experiments on three public datasets against seven baselines showed the merits of TRE in terms of knowledge base completion accuracy as well as computational complexity.


2009 ◽  
Vol 20 (08) ◽  
pp. 1233-1245 ◽  
Author(s):  
AREZKY H. RODRÍGUEZ ◽  
M. del CASTILLO-MUSSOT ◽  
G. J. VÁZQUEZ

A new model is proposed, in the context of Axelrod's model for the study of cultural dissemination, to include an external vector field (VF) which describes the effects of mass media on social systems. The VF acts over the whole system and it is characterized by two parameters: a nonnull overlap with each agent in the society and a confidence value of its information. Beyond a threshold value of the confidence, there is induced monocultural globalization of the system lined up with the VF. Below this value, the multicultural states are unstable and certain homogenization of the system is obtained in opposite line up according to that we have called negative publicity effect. Three regimes of behavior for the spread process of the VF information as a function of time are reported.


With the ever increasing population and rapid urbanization, the challenge of efficient disposal is a bigger concern in a vast country like India. Numerous techniques and methods have been proposed by various authors but the implementation of the same has found very little patronage. The biggest challenge in waste management is the timely cleaning up of the community bins which are not happening leading to large scale pollution and degradation in the land structure. A novel smart garbage management system suitable for Indian conditions is proposed. The proposed scheme enables the civic body to schedule the clearing of all the bins in the locality by estimating a route map for the traversal. This drastically reduces the manpower, fuel and difficulty in navigation. The level of the waste is measured using the Ultrasonic Sensor. If the wastage level reaches a certain value., i.e. fixed threshold value, an SMS is send to the concerned authority and if the level of wastes is above 95% the call will be initiated to the municipal corporation. A path planner is developed which enables the traversal in the shortest possible route.


Sign in / Sign up

Export Citation Format

Share Document