Skip to main content
Log in

A simple model of optimal clearance of improvised explosive devices

  • Published:
Annals of Operations Research Aims and scope Submit manuscript

Abstract

Motivated by experiences of coalition military forces in Iraq and Afghanistan, we analyze the allocation of route clearance teams (RCTs) to search for and neutralize improvised explosive devices (IEDs) on roadways traveled by military convoys. We model the interaction of a single RCT and a single convoy operating over a given roadway. Our goal is to reduce IED risk by improving coordination between the RCT and the convoy. We treat the distribution of IEDs along the road prior to the passage of the RCT as a non-homogeneous Poisson process. The RCT finds and clears IEDs according to a Bernoulli process. Enemy forces may emplace (reseed) additional IEDs in the temporal gap between the RCT clearance sweep and the arrival of the convoy. IED risk is defined as the expected number of IEDs encountered by the convoy. We identify certain characteristics of optimal RCT schedules including: the shape of the IED intensity function and the speed of reseeding substantially dictate the RCT schedule that minimizes IED risk; the more rapid the IED reseeding, the more critical is conformance to the optimal RCT schedule; an RCT having inferior detection probability, by employing superior scheduling can sometimes reduce convoy risk more than a less well scheduled RCT with superior detection probability; a discretized highway version of the problem can be efficiently optimized. We also briefly discuss applications of this model to the more complex problem of allocating several RCTs to protect a number of convoys scheduled to travel on a network of highways.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Atkinson, R. (2004). Left of the boom. http://www.washingtonpost.com/wpsrv/world/specials/leftofboom/index.html. Accessed March, 2008.

  • Atkinson, R. (2007). The single most effective weapon against our deployed forces. In The Washington Post Sunday, September 30, p. A01.

  • Ball, M. O., Monma, C. L., & Magnanti, T. L. (Eds.) (1995). Network routing, Handbooks in operations research and management science (Vol. 8). Amsterdam: Elsevier.

    Google Scholar 

  • Brook, J. V. (2008). IED’s go beyond Iraq and Afghanistan. In USA today, May 13, 2008.

    Google Scholar 

  • Cordesman, A. H., & Kocharlakota, V. (2010). IED metrics for Iraq: June 2003–September 2010, center for strategic and international studies (monograph 23 pages), November 12, 2011. Accessed on April 6, 2010 at http://csis.org/files/publication/101110_ied_metrics_iraq.pdf.

  • Cordesman, A. H., & Lemieux, J. (2010). IED metrics for Afghanistan: January 2004–May 2010, center for strategic and international studies (monograph 24 pages), July 2010, November 11, 2011. Accessed on April 6, 2010 at http://csis.org/files/publication/101110_ied_metrics_afghanistan.pdf.

  • Caryl, C. (2009). America’s IED nightmare. In Foreign policy, December, 2009.

    Google Scholar 

  • Dantzig, G. B., & Ramser, J. H. (1959). The truck dispatching problem. Management Science, 6(1), 80–91.

    Article  Google Scholar 

  • DeGregory, K. W. (2007). Optimization-based allocation of force protection resources in an asymmetric environment. M.Sc. thesis. The Sloan School, MIT, Cambridge, MA, June 2007.

  • Golden, B., Raghavan, S., & Wasil, E. (2008). The vehicle routing problem—latest advances and new challenges (1st ed.). New York: Springer.

    Book  Google Scholar 

  • Icasualities.org (2011). http://icasualties.org/OEF/Fatalities.aspx.accessed12/28/11.

  • JIEDDO (2006). Joint Improvised Explosive Device Defeat Organization. Annual report FY 2006. Accessed at https://www.jieddo.dod.mil/.../JIEDDO_2006_Annual_Report_U.pdf. December 28, 2011.

  • JIEDDO (2010). Joint Improvised Explosive Device Defeat Organization, Annual report FY 2010. Accessed at https://www.jieddo.dod.mil/.../JIEDDO_2010_Annual_Report_U.pdf. December 28, 2011.

  • JIEDDO (2012a). Counter improvised explosive device strategic plan. Accessed at https://www.jieddo.dod.mil/content/docs/20120116_JIEDDO_C-IEDStrategicPlan_web-MED.pdf. March 20, 2012.

  • JIEDDO (2012b). Future R & D capability gaps. Accessed at https://www.jieddo.dod.mil/content/docs/20120127_JIEDDO_R-D_Gaps.pdf. March 20, 2012.

  • Kolesar, P. (2009). Poisson trending of IED event frequencies. Annual technical report, Vol. I (FOUO), George Mason University C4I Center/JIEDDO project, Fairfax, Virginia.

  • Kolesar, P., Woodaman, R., & Leister, K. (2008). A time series analysis of improvised explosive device incidence. In Red blue interaction modeling research for the joint improvised explosive device defeat organization—final report (FOUO). George Mason University C4I Center/JIEDDO Project, Fairfax, Virginia.

  • Kolesar, P., & Stimpson, D. (2009). Micro-model of the impact of route clearance teams on the risk of improvised explosive devices to combat logistic patrols. Annual technical report, Vol. I (FOUO). George Mason University C4I Center/JIEDDO project, Fairfax, Virginia.

  • Koopman, B. O. (1956). The theory of search. Part II. Target detection. Operations Research, 4(5), 503–531.

    Article  Google Scholar 

  • Koopman, B. O. (1957). The theory of search. Part III. The optimum distribution of search effort. Operations Research, 5(5), 613–626.

    Article  Google Scholar 

  • Koopman, B. O. (1980). Search and screening. New York: Pergamon.

    Google Scholar 

  • Kress, J., & Grogger, S. (2007). The domestic IED threat. In Joint armed forces quarterly, December 05, 2007.

  • Marks, C. E. (2009). Optimization-based routing and scheduling of IED-detection assets in contemporary military operations. MS thesis, The Sloan School, MIT, Cambridge, MA, June 2009.

  • Metz, F. (2009), Lieutenant general, director, joint improvised explosive device defeat organization, testimony before the house armed services committee, subcommittee on oversight and investigations, U.S. house of representatives. Countering the global challenge of IEDs today and in the future,’ second session, 111th congress 29 October, 2009.

  • Morse, P., & Kimball, G. (1950). Methods of operations research (pp. 86–92). Cambridge: MIT Press.

    Google Scholar 

  • National Research Council (2007). Countering the threat of improvised explosive devices: basic research opportunities (abbreviated version). National Academies Press. Retrieved 10/10/10 at www.nap.edu/open_book.php?record_id_11953.

  • Pollock, S. M. (1979). Surveillance and search theory. In Haley, K. B., Stone, L. D. (Eds.) Search theory and applications. New York: Plenum, pp. 113–126.

    Google Scholar 

  • Robb, J. (2007). Brave new war: the next stage of terrorism and the end of globalization. New York: Wiley.

    Google Scholar 

  • Robb, J. (2010). Journal: open source warfare and IED design innovation, 09 August 2010. Accessed on 4/5/12 at http://globalguerrillas.typepad.com/globalguerrillas/2010/08/journal-open.html.

  • Ross, S. (1997). Introduction to probability models. New York: Harcourt.

    Google Scholar 

  • Simchi-Levi, D., Kaminsky, P., & Simchi-Levi, E. (2007). Designing and managing the supply chain (3rd edn.). New York: McGraw Hill.

    Google Scholar 

  • Stone, L. D. (1975). The theory of optimal search. New York: Academic Press.

    Google Scholar 

  • Szechtman, R., Kress, M., Lin, K., & Cfir, D. (2007). Models of sensor operations for border surveillance. Naval Research Logistics, 55, 27–41.

    Article  Google Scholar 

  • Toth, P., & Vigo, G. (Eds.) (2002). The vechicle routing problem. SIAM series on discrete mathematics and applications. SIAM: Philadelphia.

    Google Scholar 

  • Washburn, A. (1996). Search and detection (3rd edn.). Linthicum: Institute for Operations Research and the Management Sciences.

    Google Scholar 

  • Washburn, A., & Ewing, L. P. (2009). Allocation of clearance assets in IED warfare. Naval Research Logistics (NRL), n/a. doi:10.1002/nav.20374Wilson,1934.

  • Washburn, A. R., & Sutter, F. P. (1999). Mine warfare (Chapter 10) In Wagner, D. H., Mylander, W. C., Sanders, T. J. (eds), Naval operations analysis (3rd edn.). Annapolis: Naval Institute Press.

    Google Scholar 

  • Wikipedia (2010). Improvised explosive device. Retrieved October 10, 2010 from http://en.wikipedia.org/wiki/Improvised_explosive_device.

  • Wilson, R. H. (1934). A scientific routine for/stock control. Harvard Business Review, 13, 116–128.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peter Kolesar.

Additional information

In memory of Cyrus Derman and Bernard O. Koopman

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kolesar, P., Leister, K., Stimpson, D. et al. A simple model of optimal clearance of improvised explosive devices. Ann Oper Res 208, 451–468 (2013). https://doi.org/10.1007/s10479-012-1126-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10479-012-1126-1

Keywords

Navigation