Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
91 tokens/sec
Gemini 2.5 Pro Premium
40 tokens/sec
GPT-5 Medium
33 tokens/sec
GPT-5 High Premium
28 tokens/sec
GPT-4o
105 tokens/sec
DeepSeek R1 via Azure Premium
93 tokens/sec
GPT OSS 120B via Groq Premium
479 tokens/sec
Kimi K2 via Groq Premium
160 tokens/sec
2000 character limit reached

Metaheuristic approaches to the placement of suicide bomber detectors (2405.18593v1)

Published 28 May 2024 in cs.NE

Abstract: Suicide bombing is an infamous form of terrorism that is becoming increasingly prevalent in the current era of global terror warfare. We consider the case of targeted attacks of this kind, and the use of detectors distributed over the area under threat as a protective countermeasure. Such detectors are non-fully reliable, and must be strategically placed in order to maximize the chances of detecting the attack, hence minimizing the expected number of casualties. To this end, different metaheuristic approaches based on local search and on population-based search are considered and benchmarked against a powerful greedy heuristic from the literature. We conduct an extensive empirical evaluation on synthetic instances featuring very diverse properties. Most metaheuristics outperform the greedy algorithm, and a hill-climber is shown to be superior to remaining approaches. This hill-climber is subsequently subject to a sensitivity analysis to determine which problem features make it stand above the greedy approach, and is finally deployed on a number of problem instances built after realistic scenarios, corroborating the good performance of the heuristic.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (17)
  1. Aarts EHL, Lenstra JK (1997) Local Search in Combinatorial Optimization. John Wiley & Sons
  2. AFP (2016) Death toll from Baghdad blast rises to 292: minister. France 24. http://www.france24.com/en/20160707-death-toll-baghdad-blast-rises-292-minister, [Accessed 15 July 2016]
  3. Chicago Project on Security and Terrorism (CPOST) (2016) Suicide attack database (April 19, 2016 release). [Data File]. Retrieved from http://cpostdata.uchicago.edu/
  4. Eiben AE, Smith JE (2003) Introduction to Evolutionary Computing. SpringerVerlag
  5. Feo TA, Resende MG (1995) Greedy randomized adaptive search procedures. Journal of Global Optimization 6(2):109–133
  6. Friedman M (1937) The Use of Ranks to Avoid the Assumption of Normality Implicit in the Analysis of Variance. Journal of the American Statistical Association 32(200):675–701
  7. Friedman M (1940) A comparison of alternative tests of significance for the problem of m𝑚mitalic_m rankings. Ann Math Statist 11(1):86–92
  8. García S, Herrera F (2008) An extension on “statistical comparisons of classifiers over multiple data sets” for all pairwise comparisons. Journal of Machine Learning Research 9:2677–2694
  9. Hoffman B (2003) The logic of suicide terrorism. The Atlantic. http://www.theatlantic.com/magazine/archive/2003/06/the-logic-of-suicide-terrorism/302739/, [Accessed 2 July 2016]
  10. Hoos H, Stutzle T (2005) Stochastic Local Search. Foundations and Applications. Morgan Kaufmann
  11. Kaplan EH, Kress M (2005) Operational effectiveness of suicide-bomber-detector schemes: A best-case analysis. Proceedings of the National Academy of Sciences of the United States of America 102(29):10,399–10,404
  12. Kroenig M, Pavel B (2012) How to deter terrorism. The Washington Quarterly 35(2):21–36
  13. Kurukiz HS (2016) Istanbul airport terror attack death toll rises to 44. Anadolou Agency. http://aa.com.tr/en/todays-headlines/istanbul-airport-terror-attack-death-toll-rises-to-44/599383, [Accessed 2 July 2016]
  14. Rand Corporation (2009) RAND database of worldwide terrorism incidents. [Data File] http://smapp.rand.org/rwtid/search˙form.php
  15. Shaffer JP (1986) Modified sequentially rejective multiple test procedures. Journal of the American Statistical Association 81(395):826–831, URL http://www.jstor.org/stable/2289016
  16. Singh S (2007) Sensors—an effective approach for the detection of explosives. Journal of Hazardous Materials 144(1–2):15–28
  17. Yinon J (2007) Counterterrorist Detection Techniques of Explosives. Elsevier Science B.V., Amsterdam
Citations (6)

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-up Questions

We haven't generated follow-up questions for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Tweets

Don't miss out on important new AI/ML research

See which papers are being discussed right now on X, Reddit, and more:

“Emergent Mind helps me see which AI papers have caught fire online.”

Philip

Philip

Creator, AI Explained on YouTube