Papers
Topics
Authors
Recent
Search
2000 character limit reached

Metaheuristic approaches to the placement of suicide bomber detectors

Published 28 May 2024 in cs.NE | (2405.18593v1)

Abstract: Suicide bombing is an infamous form of terrorism that is becoming increasingly prevalent in the current era of global terror warfare. We consider the case of targeted attacks of this kind, and the use of detectors distributed over the area under threat as a protective countermeasure. Such detectors are non-fully reliable, and must be strategically placed in order to maximize the chances of detecting the attack, hence minimizing the expected number of casualties. To this end, different metaheuristic approaches based on local search and on population-based search are considered and benchmarked against a powerful greedy heuristic from the literature. We conduct an extensive empirical evaluation on synthetic instances featuring very diverse properties. Most metaheuristics outperform the greedy algorithm, and a hill-climber is shown to be superior to remaining approaches. This hill-climber is subsequently subject to a sensitivity analysis to determine which problem features make it stand above the greedy approach, and is finally deployed on a number of problem instances built after realistic scenarios, corroborating the good performance of the heuristic.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (17)
  1. Aarts EHL, Lenstra JK (1997) Local Search in Combinatorial Optimization. John Wiley & Sons
  2. AFP (2016) Death toll from Baghdad blast rises to 292: minister. France 24. http://www.france24.com/en/20160707-death-toll-baghdad-blast-rises-292-minister, [Accessed 15 July 2016]
  3. Chicago Project on Security and Terrorism (CPOST) (2016) Suicide attack database (April 19, 2016 release). [Data File]. Retrieved from http://cpostdata.uchicago.edu/
  4. Eiben AE, Smith JE (2003) Introduction to Evolutionary Computing. SpringerVerlag
  5. Feo TA, Resende MG (1995) Greedy randomized adaptive search procedures. Journal of Global Optimization 6(2):109–133
  6. Friedman M (1937) The Use of Ranks to Avoid the Assumption of Normality Implicit in the Analysis of Variance. Journal of the American Statistical Association 32(200):675–701
  7. Friedman M (1940) A comparison of alternative tests of significance for the problem of m𝑚mitalic_m rankings. Ann Math Statist 11(1):86–92
  8. García S, Herrera F (2008) An extension on “statistical comparisons of classifiers over multiple data sets” for all pairwise comparisons. Journal of Machine Learning Research 9:2677–2694
  9. Hoffman B (2003) The logic of suicide terrorism. The Atlantic. http://www.theatlantic.com/magazine/archive/2003/06/the-logic-of-suicide-terrorism/302739/, [Accessed 2 July 2016]
  10. Hoos H, Stutzle T (2005) Stochastic Local Search. Foundations and Applications. Morgan Kaufmann
  11. Kaplan EH, Kress M (2005) Operational effectiveness of suicide-bomber-detector schemes: A best-case analysis. Proceedings of the National Academy of Sciences of the United States of America 102(29):10,399–10,404
  12. Kroenig M, Pavel B (2012) How to deter terrorism. The Washington Quarterly 35(2):21–36
  13. Kurukiz HS (2016) Istanbul airport terror attack death toll rises to 44. Anadolou Agency. http://aa.com.tr/en/todays-headlines/istanbul-airport-terror-attack-death-toll-rises-to-44/599383, [Accessed 2 July 2016]
  14. Rand Corporation (2009) RAND database of worldwide terrorism incidents. [Data File] http://smapp.rand.org/rwtid/search˙form.php
  15. Shaffer JP (1986) Modified sequentially rejective multiple test procedures. Journal of the American Statistical Association 81(395):826–831, URL http://www.jstor.org/stable/2289016
  16. Singh S (2007) Sensors—an effective approach for the detection of explosives. Journal of Hazardous Materials 144(1–2):15–28
  17. Yinon J (2007) Counterterrorist Detection Techniques of Explosives. Elsevier Science B.V., Amsterdam
Citations (6)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.