SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Cotta C, Gallardo JE. Natural Computing 2019; 18(2): 249-263.

Copyright

(Copyright © 2019)

DOI

10.1007/s11047-018-9710-1

PMID

unavailable

Abstract

We consider an operational model of suicide bombing attacks--an increasingly prevalent form of terrorism--against specific targets, and the use of protective countermeasures based on the deployment of detectors over the area under threat. These detectors have to be carefully located in order to minimize the expected number of casualties or the economic damage suffered, resulting in a hard optimization problem for which different metaheuristics have been proposed. Rather than assuming random decisions by the attacker, the problem is approached by considering different models of the latter, whereby he takes informed decisions on which objective must be targeted and through which path it has to be reached based on knowledge on the importance or value of the objectives or on the defensive strategy of the defender (a scenario that can be regarded as an adversarial game). We consider four different algorithms, namely a greedy heuristic, a hill climber, tabu search and an evolutionary algorithm, and study their performance on a broad collection of problem instances trying to resemble different realistic settings such as a coastal area, a modern urban area, and the historic core of an old town. It is shown that the adversarial scenario is harder for all techniques, and that the evolutionary algorithm seems to adapt better to the complexity of the resulting search landscape. © 2018, Springer Nature B.V.


Language: en

Keywords

suicide; Decision making; decision making; disaster planning; terrorism; algorithm; Suicide bombing; Bombing; suicide bombing; Article; bomb; mass disaster; process optimization; knowledge management; danger, risk, safety and related phenomena; Evolutionary algorithms; Greedy heuristics; Heuristic algorithms; Meta heuristics; Metaheuristics; Optimal detector placement; Optimal detectors; bomb detector placement; Defensive strategies; heuristics; Operational model; Optimal placements; Optimization problems; Tabu search

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print