Skip navigation
Please use this identifier to cite or link to this item: http://arks.princeton.edu/ark:/88435/dsp010z709029c
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorAhmadi, Amir Ali-
dc.contributor.authorYomjinda, Woramanot-
dc.date.accessioned2019-08-16T15:44:29Z-
dc.date.available2019-08-16T15:44:29Z-
dc.date.created2019-04-02-
dc.date.issued2019-08-16-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/dsp010z709029c-
dc.description.abstractIn this paper, our goal is to optimize the total amount of monetary value we can launder within given constraints. We cast the problem into an undirected graph, with various financial institutions represented as nodes. To this end, we assume that the problem is a complete graph and the more we move or “layer” the money, the harder it is for law enforcement to trace back to its illegal origin, reducing risk of detection. As we progress, we also include other prominent components of the money laundering process, such as shell companies. Because each transfer provides different level of layering, for instance, international is harder to trace than national, the expected payoff of each route is a function of total layers minus total cost of moving money. The paper focuses on exploring the rich algorithms and constraints of the money laundering process against detection algorithms. To this end, we review extensively state-of-the-art techniques used by money launderers and state-of-the-art detection algorithms used by financial institutions. We progressively generate more complicated models while retaining as much realism as possible. We first solve the optimization problem for the single best route, assuming that each node can only be travelled through once. We then compare the practicality and calculation time of each method against the CVX calculated upper bound and find that the greedy algorithm family performs exceptionally well. After which, we expand the question to include multiple routes without using each node more than once or less than a given cap when shell companies are incorporated. Naive beam search algorithms prove to be the best performing across all data. Adding a time constraint, we conclude that naive beam search performs over 98.7% of the upper bound and is ideal for path selection due to its low computational complexity.en_US
dc.format.mimetypeapplication/pdf-
dc.language.isoenen_US
dc.titleThe Optimizer’s Guide to Money Laundering: Navigating Detection Algorithms with Naïve Beam Searchen_US
dc.typePrinceton University Senior Theses-
pu.date.classyear2019en_US
pu.departmentOperations Research and Financial Engineering*
pu.pdf.coverpageSeniorThesisCoverPage-
pu.contributor.authorid961039913-
Appears in Collections:Operations Research and Financial Engineering, 2000-2019

Files in This Item:
File Description SizeFormat 
YOMJINDA-WORAMANOT-THESIS.pdf1.29 MBAdobe PDF    Request a copy


Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.