ImageVerifierCode 换一换
格式:DOC , 页数:11 ,大小:67.50KB ,
资源ID:4724369      下载积分:5 金币
快捷注册下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

开通VIP
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.zixin.com.cn/docdown/4724369.html】到电脑端继续下载(重复下载【60天内】不扣币)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

开通VIP折扣优惠下载文档

            查看会员权益                  [ 下载后找不到文档?]

填表反馈(24小时):  下载求助     关注领币    退款申请

开具发票请登录PC端进行申请

   平台协调中心        【在线客服】        免费申请共赢上传

权利声明

1、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
2、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,个别因单元格分列造成显示页码不一将协商解决,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
3、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
4、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前可先查看【教您几个在下载文档中可以更好的避免被坑】。
5、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
6、文档遇到问题,请及时联系平台进行协调解决,联系【微信客服】、【QQ客服】,若有其他问题请点击或扫码反馈【服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【版权申诉】”,意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:0574-28810668;投诉电话:18658249818。

注意事项

本文(2024年美国国际大学生数学建模竞赛(MCM+ICM)题目+翻译.doc)为本站上传会员【二***】主动上传,咨信网仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知咨信网(发送邮件至1219186828@qq.com、拔打电话4009-655-100或【 微信客服】、【 QQ客服】),核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载【60天内】不扣币。 服务填表

2024年美国国际大学生数学建模竞赛(MCM+ICM)题目+翻译.doc

1、IMPORTANT CHANGE TO CONTEST RULES FOR MCM/ICM 2024: Teams (Student or Advisor) are now required to submit an electronic copy (summary sheet and solution) of their solution paper by email to . Your email MUST be received at COMAP by the submission deadline of 8:00 PM EST, February 13, 2024. Teams

2、 are free to choose between MCM Problem A, MCM Problem B or ICM Problem C. COMAP Mirror Site: For more in: MCM: The Mathematical Contest in Modeling ICM: The Interdisciplinary Contest in Modeling 2024 Contest Problems MCM PROBLEMS PROBLEM A: The Leaves of a Tree "How much do the le

3、aves on a tree weigh?" How might one estimate the actual weight of the leaves (or for that matter any other parts of the tree)? How might one classify leaves? Build a mathematical model to describe and classify leaves. Consider and answer the following: • Why do leaves have the various shapes that

4、they have? • Do the shapes “minimize” overlapping individual shadows that are cast, so as to maximize exposure? Does the distribution of leaves within the “volume” of the tree and its branches effect the shape? • Speaking of profiles, is leaf shape (general characteristics) related to tree pro s

5、tructure? • How would you estimate the leaf mass of a tree? Is there a correlation between the leaf mass and the size characteristics of the tree (height, mass, volume defined by the profile)? In addition to your one page summary sheet prepare a one page letter to an editor of a scientific journal

6、 outlining your key findings.  2024美赛A题:一棵树的叶子 (数学中国翻译)        “一棵树的叶子有多重?”怎么能估计树的叶子(或者树的任何其它部分)的实际重量?怎样对叶子进行分类?建立一个数学模型来对叶子进行描述和分类。模型要考虑和回答下面的问题:  • 为什么叶子具有各种形状?  • 叶子之间是要将相互重叠的部分最小化,以便可以最大限度的接触到阳光吗?树叶的分布以及树干和枝杈的体积影响叶子的形状吗? 就轮廓来讲,叶形(一般特征)是和树的轮廓以及分枝结构有关吗?  • 你将如何估计一棵树的叶子质量?叶子的质量和树的尺寸特征(包

7、括和外形轮廓有关的高度、质量、体积)有联系吗? 除了你的一页摘要以外,给科学杂志的编辑写一封信,阐述你的主要发现。 PROBLEM B: Camping along the Big Long River Visitors to the Big Long River (225 miles) can enjoy scenic views and exciting white water rapids. The river is inaccessible to hikers, so the only way to enjoy it is to take a river tri

8、p that requires several days of camping. River trips all start at First Launch and exit the river at Final Exit, 225 miles downstream. Passengers take either oar- powered rubber rafts, which travel on average 4 mph or motorized boats, which travel on average 8 mph. The trips range from 6 to 18 night

9、s of camping on the river, start to finish.. The government agency responsible for managing this river wants every trip to enjoy a wilderness experience, with minimal contact with other groups of boats on the river. Currently, X trips travel down the Big Long River each year during a six month perio

10、d (the rest of the year it is too cold for river trips). There are Y camp sites on the Big Long River, distributed fairly uniformly throughout the river corridor. Given the rise in popularity of river rafting, the park managers have been asked to allow more trips to travel down the river. They want

11、to determine how they might schedule an optimal mix of trips, of varying duration (measured in nights on the river) and propulsion (motor or oar) that will utilize the campsites in the best way possible. In other words, how many more boat trips could be added to the Big Long River’s rafting season?

12、The river managers have hired you to advise them on ways in which to develop the best schedule and on ways in which to determine the carrying capacity of the river, remembering that no two sets of campers can occupy the same site at the same time. In addition to your one page summary sheet, prepare

13、a one page memo to the managers of the river describing your key findings.  问题B:沿长江大露营 到Big Long River(225英里)游玩的游客可以享受那里的风景和振奋人心的急流。远足者没法到达这条河,唯一去的办法是漂流过去。这需要几天的露营。河流旅行始于First Launch,在 Final Exit结束,共225英里的顺流。旅客可以选择依靠船桨来前进的橡皮筏,它的速度是4英里每小时,或者选择8英里每小时的摩托船。旅行从开始到结束包括大约6到18个晚上的河中的露营。负责管理这条河的政府部门希望让每次旅行

14、都能尽情享受野外经历,同时能尽量少的与河中其他的船只相遇。当前,每年经过Big Long河的游客有X组,这些漂流都在一个以6个月长短的时期内进行,一年中的其他月份非常冷,不会有漂流。在Big Long上有Y处露营地点,平均分布于河廊。随着漂流人数的增加,管理者被要求应该允许让更多的船只漂流。他们要决定如何来安排最优的方案:包括旅行时间(以在河上的夜晚数计算)、选择哪种船(摩托还是桨船),从而能够最好地利用河中的露营地。换句话说,Big Long River在漂流季节还能增加多少漂流旅行数?管理者希望你能给他们最好的建议,告诉他们如何决定河流的容纳量,记住任两组旅行队都不能同时占据河中的露营地。

15、此外,在你的摘要表一页,准备一页给管理者的备忘录,用来描述你的关键发现。   ICM PROBLEM PROBLEM C: Modeling for Crime Busting Click the title below to download a ZIP the 2024 ICM Problem. Your ICM submission should consist of a 1 page Summary Sheet and your solution cannot exceed 20 pages for a maximum of 21 pages. 2024 ICM

16、 Problem Modeling for Crime Busting Your organization, the Intergalactic Crime Modelers (ICM), is investigating a conspiracy to commit a criminal act. The investigators are highly confident they know several members of the conspiracy, but hope to identify the other members and the leaders before

17、 they make arrests. The conspirators and the possible suspected conspirators all work for the same company in a large office complex. The company has been growing fast and making a name for itself in developing and marketing computer software for banks and credit card companies. ICM has recently

18、found a small set of messages from a group of 82 workers in the company that they believe will help them find the most likely candidates for the unidentified co‐conspirators and unknown leaders. Since the message traffic is for all the office workers in the company, it is very likely that some (m

19、aybe many) of the identified communicators in the message traffic are not involved in the conspiracy. In fact, they are certain that they know some people who are not in the conspiracy. The goal of the modeling effort will be to identify people in the office complex who are the most likely conspi

20、rators. A priority list would be ideal so ICM could investigate, place under surveillance, and/or interrogate the most likely candidates. A discriminate line separating conspirators from non‐conspirators would also be helpful to distinctly categorize the people in each group. It would also be hel

21、pful to the DA’s office if the model nominated the conspiracy leaders. Before the data of the current case are given to your crime modeling team, your supervisor gives you the following scenario (called Investigation EZ) that she worked on a few years ago in another city. Even though she is very

22、proud of her work on the EZ case, she says it is just a very small, simple example, but it may help you understand your task. Her data follow: The ten people she was considering as conspirators were: Anne#, Bob, Carol, Dave*, Ellen, Fred, George*, Harry, Inez, and Jaye#. (* indicates prior known

23、conspirators, # indicate prior known nonconspirators) Chronology of the 28 messages that she had for her case with a code number for the topic of each message that she assigned based on her analysis of the message: Anne to Bob: Why were you late today? (1) Bob to Carol: That darn Anne always wat

24、ches me. I wasn't late. (1) Carol to Dave: Anne and Bob are fighting again over Bob's tardiness. (1) Dave to Ellen: I need to see you this morning. When can you come by? Bring the budget files. (2) Dave to Fred: I can come by and see you anytime today. Let me know when it is a good time. Should I

25、 bring the budget files? (2) Dave to George: I will see you later ‐‐‐ lots to talk about. I hope the others are ready. It is important to get this right. (3) Harry to George: You seem stressed. What is going on? Our budget will be fine. (2) (4) Inez to George: I am real tired today. How are you

26、 doing? ( 5) Jaye to Inez: Not much going on today. Wanna go to lunch today? (5) Inez to Jaye: Good thing it is quiet. I am exhausted. Can't do lunch today ‐‐‐ sorry! (5) George to Dave: Time to talk ‐‐‐ now! (3) Jaye to Anne: Can you go to lunch today? (5) Dave to George: I can't. On my way to

27、 see Fred. (3) George to Dave: Get here after that. (3) Anne to Carol: Who is supposed to watch Bob? He is goofing off all the time. (1) Carol to Anne: Leave him alone. He is working well with George and Dave. (1) George to Dave: This is important. Darn Fred. How about Ellen? (3) Ellen to Georg

28、e: Have you talked with Dave? (3) George to Ellen: Not yet. Did you? (3) Bob to Anne: I wasn't late. And just so you know ‐‐‐ I am working through lunch. (1) Bob to Dave: Tell them I wasn't late. You know me. (1) Ellen to Carol: Get with Anne and figure out the budget meeting schedule for next w

29、eek and help me calm George. (2) Harry to Dave: Did you notice that George is stressed out again today? (4) Dave to George: Darn Harry thinks you are stressed. Don't get him worried or he will be nosing around. (4) George to Harry: Just working late and having problems at home. I will be fine.

30、4) Ellen to Harry: Would it be OK, if I miss the meeting today? Fred will be there and he knows the budget better than I do. (2) Harry to Fred: I think next year's budget is stressing out a few people. Maybe we should take time to reassure people today. (2) (4) Fred to Harry: I think our budge

31、t is pretty healthy. I don't see anything to stress over. (2) END of MESSAGE TRAFFIC Your supervisor points outs that she assigned and coded only 5 different topics of messages: 1) Bob's tardiness, 2) the budget, 3) important unknown issue but assumed to be part of conspiracy, 4) George's stress

32、 and 5) lunch and other social issues. As seen in the message coding, some messages had two topics assigned because of the content of the messages. The way your supervisor analyzed her situation was with a network that showed the communication links and the types of messages. The following figur

33、e is a model of the message network that resulted with the code for the types of messages annotated on the network graph. Figure 1: Network of messages from EZ Case Your supervisor points out that in addition to known conspirators George and Dave, Ellen and Carol were indicted for the conspiracy

34、 based on your supervisor's analysis and later Bob self‐admitted his involvement in a plea bargain for a reduced sentence, but the charges against Carol were later dropped. Your supervisor is still pretty sure Inez was involved, but the case against her was never established. Your supervisor's ad

35、vice to your team is identify the guilty parties so that people like Inez don't get off, people like Carol are not falsely accused, and ICM gets the credit so people like Bob do not have the opportunity to get reduced sentences. The current case: Your supervisor has put together a network‐like d

36、atabase for the current case, which has the same structure, but is a bit larger in scope. The investigators have some indications that a conspiracy is taking place to embezzle funds from the company and use internet fraud to steal funds from credit cards of people who do business with the company

37、 The small example she showed you for case EZ had only 10 people (nodes), 27 links (messages), 5 topics, 1 suspicious/conspiracy topic, 2 known conspirators, and 2 known non‐conspirators. So far, the new case has 83 nodes, 400 links (some involving more than 1 topic), over 21,000 words of messag

38、e traffic, 15 topics (3 have been deemed to be suspicious), 7 known conspirators, and 8 known non‐conspirators. These data are given in the attached spreadsheet files: Names.xls, Topics.xls, and Messages.xls. Names.xls contains the key of node number to the office workers' names. Topics.xls conta

39、ins the code for the 15 topic numbers to a short description of the topics. Because of security and privacy issues, your team will not have direct transcripts of all the message traffic. Messages.xls provides the links of the nodes that transmitted messages and the topic code numbers that the mes

40、sages contained. Several messages contained up to three topics. To help visualize the message traffic, a network model of the people and message links is provided in Figure 2. In this case, the topics of the messages are not shown in the figure as they were in Figure 1. These topic numbers are gi

41、ven in the and described in Topics.xls. Figure 2: Visual of the network model of the 83 people (nodes) and 400 messages between these people (links). Requirements: Requirement 1: So far, it is known that Jean, Alex, Elsie, Paul, Ulf, Yao, and Harvey are conspirators. Also, it is known that Dar

42、lene, Tran, Jia, Ellin, Gard, Chris, Paige, and Este are not conspirators. The three known suspicious message topics are 7, 11, and 13. There is more detail about the topics in file Topics.xls. Build a model and algorithm to prioritize the 83 nodes by likelihood of being part of the conspiracy an

43、d explain your model and metrics. Jerome, Delores, and Gretchen are the senior managers of the company. It would be very helpful to know if any of them are involved in the conspiracy. Requirement 2: How would the priority list change if new information comes to light that Topic 1 is also connect

44、ed to the conspiracy and that Chris is one of the conspirators? Requirement 3: A powerful technique to obtain and understand text information similar to this message traffic is called semantic network analysis; as a methodology in artificial intelligence and computational linguistics, it provides

45、 a structure and process for reasoning about knowledge or language. Another computational linguistics capability in natural language processing is text analysis. For our crime busting scenario, explain how semantic and text analyses of the content and context of the message traffic (if you could

46、obtain the original messages) could empower your team to develop even better models and categorizations of the office personnel. Did you use any of these capabilities on the topic descriptions in to enhance your model? Requirement 4: Your complete report will eventually go to the DA so it must b

47、e detailed and clearly state your assumptions and methodology, but cannot exceed 20 pages of write up. You may include your programs as appendices in separate files that do not count in your page restriction, but including these programs is not necessary. Your supervisor wants ICM to be the world

48、's best in solving whitecollar, high‐tech conspiracy crimes and hopes your methodology will contribute to solving important cases around the world, especially those with very large databases of message traffic (thousands of people with tens of thousands of messages and possibly millions of words)

49、 She specifically asked you to include a discussion on how more thorough network, semantic, and text analyses of the message contents could help with your model and recommendations. As part of your report to her, explain the network modeling techniques you have used and why and how they can be u

50、sed to identify, prioritize, and categorize similar nodes in a network database of any type, not just crime conspiracies and message data. For instance, could your method find the infected or diseased cells in a biological network where you had various kinds of image or chemical data for the node

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2025 宁波自信网络信息技术有限公司  版权所有

客服电话:0574-28810668  投诉电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服