Abstract
Every year, more than 11 million maritime containers and 11 million commercial trucks arrive in the United States, carrying all types of imported goods. As it would be costly to inspect every container, only a fraction of them are inspected before being admitted into the United States. In this paper, a multi-objective optimization (MOO) model is developed for primary allocation of the scarce inspection resources at a POE, especially a land POE (L-POE). This model minimizes the different costs associated with the inspection process, including those associated with delaying the entry of legitimate imports. The resulting model is exploited in two different ways: One is to construct the efficient frontier of the MOO model or a partial efficient frontier with diversity of the solutions maximized; the other is to evaluate a given inspection plan and provide possible suggestions for improvement. The methodologies are described in detail and a simple case study is provided.
Similar content being viewed by others
Notes
For narrative simplicity, a shipment, a container or a truck is referred to as an entity in this paper.
The original paper indicates “go to Setp 1”, which may be a mistake, as Step 1 is the initialization step.
References
Boros E, Fedzhora L, Kantor P, Saeger K, and Stroud P (2006) Large Scale LP Model for Finding Optimal Container Inspection Strategies. Rutcor Research Report. Rutgers Center for Operations Research Rutgers University. http://rutcor.rutgers.edu/pub/rrr/reports2006/26_2006.pdf
Boros E, Goldberg N, Kantor PB, Word J (2010) Optimal Sequential Inspection Policies. Ann Oper Res 187(1):89–119. doi:10.1007/s10479-010-0799-6
BTS (2011) America’s Container Ports: Linking Markets at Home and Abroad. U.S. Department of Transportation Research and Innovative Technology Administration. http://www.bts.gov/publications/americas_container_ports/2011/
CBP (2012) “CBP Border Wait Times.” http://apps.cbp.gov/bwt/
Elsayed EA, Young CM, Xie M, Zhang H, Zhu Y (2009) Port-of-entry inspection: sensor deployment policy optimization. IEEE Trans Autom Sci Eng 6(2):265–276. doi:10.1109/TASE.2008.2003348
Garcia HC, Villalobos JR (2009) Automated refinement of automated visual inspection algorithms. IEEE Trans Autom Sci Eng 6(3):514–524. doi:10.1109/TASE.2009.2021354
Gaukler GM, Li C, Cannaday R, Chirayath SS, Ding Y (2010) Detecting nuclear materials smuggling: using radiography to improve container inspection policies. Ann Oper Res 187(March 2):65–87. doi:10.1007/s10479-010-0717-y
Landfried P and Teufel H. III (2006) Privacy Impact Assessment for the Automated Targeting System. Department of Homeland Security. http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_cbp_ats.pdf
Loy JM and Ross RG (2002) Global Trade: America’s Achilles Heel. Defense Horizons 7. Fort McNair, Washington, D.C.: Center for Technology and National Security Policy, National Defense University. http://www.homelandsecurity.org/journal/Articles/loyrossglobaltrade.htm
Masin M, Bukchin Y (2008) Diversity Maximization Approach for Multiobjective Optimization. Oper Res 56(2):411–424. doi:10.1287/opre.1070.0413
Miller T, Teufel H III (2008) Privacy Impact Assessment for the Automated Targeting System Final Update. Department of Homeland Security. http://foia.cbp.gov/streamingWord.asp?i=41
Ramirez-Marquez JE (2008) Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach. Reliab Eng Syst Saf 93(11):1698–1709. doi:10.1016/j.ress.2008.01.003
Verduzco A, René Villalobos J, Vega B (2001) Information-based inspection allocation for real-time inspection systems. J Manuf Syst 20(1):13–22. doi:10.1016/S0278-6125(01)80016-9
Villalobos JR (1991) Inspection Strategies for Flexible Inspection Systems. Ph.D. Dissertation, College Station, TX: Texas A&M University, pp 78–80
Villalobos JR, Muñoz L, and Vega B (1998) Development of a Pilot Simulation Model of the Bridge of the Americas. El Paso, Texas: Center for Electronics Manufacturing College of Engineering The University of Texas at El Paso. http://ilpil.asu.edu/research/past-projects/development-of-a-pilot-simulation-model-of-the-bridge-of-the-americas/
Wasem RE, Lake J, Seghetti L, Monke J, and Viña S (2004) Border Security: Inspections Practices, Policies, and Issues. Washington, District of Columbia: Congressional Research Service, The Library of Congress. http://www.fas.org/sgp/crs/RL32399.pdf
Wein LM, Wilkins AH, Baveja M, Flynn SE (2006) Preventing the importation of illicit nuclear materials in shipping containers. Risk Anal 26(5):1377–1393. doi:10.1111/j.1539-6924.2006.00817.x
Xue L, and Villalobos JR (2012) An Inspection Allocation Planning Framework for International Ports of Entry. Working Paper, International Logistics and Productivity Improvement Laboratory, Arizona State University
Young CM, Li M, Zhu Y, Xie M, Elsayed EA, Asamov T (2010) Multiobjective optimization of a port-of-entry inspection policy. IEEE Trans Autom Sci Eng 7(2):392–400. doi:10.1109/TASE.2009.2022172
Author information
Authors and Affiliations
Corresponding author
Appendices
Appendix A: Variance derivation
Let X be the random variable representing the service time of an entity in the system, then we have:
Define an indication variable Y:
then Pr{Y = j} = p j , thus
It is easy to derive that:
and thus
To calculate Var(X), the following formula is used:
Assume that the service times of each routine are independent from each other. E[Var(X|Y)] and Var(E[X|Y]) are computed separately.
Since \( Var\left( {X|Y = j} \right) = \sigma_j^2 \) and Pr{Y = j} = p j ,
Since
For clarity reason, the index in the inner summation is changed from j to i.
Thus,
The last step is valid because:
-
1.
\( \sum\limits_{{j = 0}}^M {{p_j}{{\left( {\sum\limits_{{i = 0}}^M {\left( {{p_i}/{\mu_i}} \right)} } \right)}^2} = } {\left( {\sum\limits_{{i = 0}}^M {\left( {{p_i}/{\mu_i}} \right)} } \right)^2} \), due to (A.1);
-
2.
\( \sum\limits_{{j = 0}}^M {\left( {\left( {{p_j}/{\mu_j}} \right)\sum\limits_{{i = 0}}^M {\left( {{p_i}/{\mu_i}} \right)} } \right)} = {\left( {\sum\limits_{{j = 0}}^M {\left( {{p_j}/{\mu_j}} \right)} } \right)^2} \)
Thus,
Note that for conformity, indices are converted from i back to j.
Since we assume that 1/μ 0 = 0 and \( \sigma_0^2 = 0 \), Var(X) can also be rewritten as follows:
Appendix B: Validation of function separation
Let f(x,y) be a function of x and y in the form of
where a and b are positive real constants, x,y are non-negative real numbers and y < 1/b.
It can be shown that
is equivalent to
The partial derivatives can be derived as following.
This is because y < 1/b, and thus 1 − by > 0.
since a,b and x are non-negative.
Thus, f(x,y) decreases monotonically as x or y decreases within the domain in which the function is defined. Thus, minimizing f(x,y) is equivalent to minimizing x and y simultaneously.
Rights and permissions
About this article
Cite this article
Xue, L., Villalobos, J.R. A multi-objective optimization primary planning model for a POE (Port-of-Entry) inspection. J Transp Secur 5, 217–237 (2012). https://doi.org/10.1007/s12198-012-0093-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12198-012-0093-8