Metaheuristic approaches to the placement of suicide bomber detectors
- 189 Downloads
Suicide bombing is an infamous form of terrorism that is becoming increasingly prevalent in the current era of global terror warfare. We consider the case of targeted attacks of this kind, and the use of detectors distributed over the area under threat as a protective countermeasure. Such detectors are non-fully reliable, and must be strategically placed in order to maximize the chances of detecting the attack, hence minimizing the expected number of casualties. To this end, different metaheuristic approaches based on local search and on population-based search (such as a hill climber, different Greedy randomized adaptive search procedures, an evolutionary algorithm and several estimation of distribution algorithms) are considered and benchmarked against a powerful greedy heuristic from the literature. We conduct an extensive empirical evaluation on synthetic instances featuring very diverse properties. Most metaheuristics outperform the greedy algorithm, and a hill-climber is shown to be superior to remaining approaches. This hill-climber is subsequently subject to a sensitivity analysis to determine which problem features make it stand above the greedy approach, and is finally deployed on a number of problem instances built after realistic scenarios, corroborating the good performance of the heuristic.
KeywordsCounter-terrorism Suicide bombing Optimal detector placement Greedy heuristics Metaheuristics
We would like to thank Mr. Antonio Hernández Bimbela for his help during the initial stage of this project, and to the anonymous reviewers for useful comments.
- AFP: Death toll from Baghdad blast rises to 292: minister. France 24. http://www.france24.com/en/20160707-death-toll-baghdad-blast-rises-292-minister (2016) . Accessed 15 July 2016
- Chicago Project on Security and Terrorism (CPOST): suicide attack database (April 19, 2016 release). http://cpostdata.uchicago.edu/ (2016)
- Cotta, C., Fernández, A.J.: A hybrid GRASP - evolutionary algorithm approach to golomb ruler search. In: Yao, X., et al. (eds.) Parallel Problem Solving from Nature —PPSN VIII. Lecture Notes in Computer Science, vol. 3242, pp. 481–490. Springer (2004)Google Scholar
- De Jong K.A., Potter, M.A., Spears, W.M.: Using problem generators to explore the effects of epistasis. In: Bäck, T. (ed.) Proceedings of the 7th International Conference on Genetic Algorithms. Morgan Kaufmann, pp. 338–345 (1997)Google Scholar
- Hoffman, B.: The logic of suicide terrorism. The Atlantic. http://www.theatlantic.com/magazine/archive/2003/06/the-logic-of-suicide-terrorism/302739/ (2003). Accessed 2 July 2016
- Kurukız, H.Ş.: Istanbul airport terror attack death toll rises to 44. Anadolou Agency. http://aa.com.tr/en/todays-headlines/istanbul-airport-terror-attack-death-toll-rises-to-44/599383 (2016) . Accessed 2 July 2016
- Mühlenbein, H., Paaß, G.: From recombination of genes to the estimation of distributions I. Binary parameters. In: Voigt, H., Ebeling, W., Rechenberg, I., Schwefel, H. (eds.) Parallel Problem Solving from Nature—PPSN IV. Lecture Notes in Computer Science, vol. 1141, pp. 178–187. Springer, Berlin Heidelberg (1996)Google Scholar
- Neri, F., Cotta, C., Moscato, P. (eds.): Handbook of Memetic Algorithms, Studies in Computational Intelligence, vol. 379. Springer, Berlin Heidelberg (2012)Google Scholar
- NRC: Existing and potential standoff explosives detection techniques. National Research Council of the National Academies, Natl. Acad. Press, Washington (2004)Google Scholar
- Rand Corporation: RAND database of worldwide terrorism incidents. http://smapp.rand.org/rwtid/search_form.php (2009)
- Yinon, J.: Counterterrorist Detection Techniques of Explosives. Elsevier, Amsterdam (2007)Google Scholar