Skip to main content
Log in

Optimal design of container inspection strategies considering multiple objectives via an evolutionary approach

  • Published:
Annals of Operations Research Aims and scope Submit manuscript

Abstract

The size and complexity of containerized shipping across the globe has increased the vulnerability of seaports to the attack of terrorist networks and contraband smuggling. As a result, the creation of inspection strategies to check incoming containers at ports-of-entry has been necessary to enable the detection of containers carrying prohibited items. However, since costs and tardiness considerations related to the inspection process prevent all cargo to be manually checked, including different non-intrusive screening technologies as part of the inspection strategies is essential to optimize inspection needs. In this paper, inspection strategies are represented as decision-tree structures where each node illustrates a screening device, and links represent the two possible classifications a screened container can get (i.e. suspicious or unsuspicious). Based on such classification, one of three actions is taken: to continue screening, release or physically check the container. The contribution of this paper is a mathematical framework that provides an approximation to the Pareto optimal solutions (i.e. inspection strategies) that enable decision-makers to: (1) identify tradeoffs among vulnerability, inspection cost, and tardiness for different inspection strategies, and based on this (2) find the strategy that best suits current inspection needs. The mathematical framework includes: (1) a multi-objective optimization model that concurrently minimizes vulnerability, cost, and tardiness while determining screening device allocation and threshold settings, as well as, (2) an evolutionary approach used to solve the optimization model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  • Anand, S., Madigan, D., Mammone, R., & Pathak, S. (2006). Experimental analysis of sequential decision making algorithms for port of entry inspection procedures. In Proceedings of the IEEE international conference on intelligence and security informatics (ISI 2006) (pp. 319–330). Berlin: Springer.

    Google Scholar 

  • Boros, E., Elsayed, E., Kantor, P., Roberts, F., & Xie, M. (2008). Optimization problems for port-of-entry detection systems. In Intelligence and security informatics: techniques and applications (pp. 319–335). Berlin: Springer.

    Chapter  Google Scholar 

  • Boros, E., Fedzhora, L., Kantor, P., Saeger, K., & Stroud, P. (2009). Large scale LP model for finding optimal container inspection strategies. Naval Research Logistics, 56(5), 404–420.

    Article  Google Scholar 

  • Concho, A., & Ramirez-Marquez, J. (2010). An evolutionary algorithm for port-of-entry security optimization considering sensor thresholds. Reliability Engineering & Systems Safety, 95(3), 255–266.

    Article  Google Scholar 

  • Elsayed, A., Schroepfer, C., Xie, M., Zhang, H., & Zhu, Y. (2007). Port-of-entry inspection: sensor deployment policy optimization. DIMACS—port of entry inspection algorithms (Working paper). Rutgers University.

  • Firsov, V., Markowsky, G., Kutovoy, S., Pozdnyakow, D., Litvinova, O., & Lyzikova, N. (2005). Detection of unauthorized intrusion into cargo containers that are under custom seals. In IEEE workshop on intelligent data acquisition and advanced computing systems: technology and applications, 5–7 September 2005, Sofia, Bulgaria.

    Google Scholar 

  • Goldberg, N., Word, J., Boros, E., & Kantor, P. (2008). Optimal sequential inspection policies (DIMACS Technical Report 2008-07). Rutgers University.

  • Hecker, J. (2002). Container security—current effort to detect nuclear materials, new initiatives and challenges. United States General Accounting Office, New York. GAO-03-297T.

  • Koch, D. (2007). PortSim—a port security simulation and visualization tool. In Proceedings 41st annual IEEE international carnahan conference on security technology (pp. 109–116).

    Chapter  Google Scholar 

  • Levinson, M. (2006). The box: how the shipping container made the world smaller and the world economy bigger. Princeton: Princeton University Press.

    Google Scholar 

  • Madigan, D., Mittal, S., & Roberts, F. (2007). Sequential decision making algorithms for port of entry inspection: overcoming computational challenges. In Proceedings of the IEEE international conference on intelligence and security informatics (ISI 2007) (pp. 1–7).

    Google Scholar 

  • Ramirez-Marquez, J. E. (2008). Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach. Reliability Engineering & Systems Safety, 93(11), 1698–1709.

    Article  Google Scholar 

  • Ramirez-Marquez, J. E., & Rocco, C. (2008). All-terminal network reliability optimization via probabilistic solution discovery. Reliability Engineering & Systems Safety, 93(11), 1689–1697.

    Article  Google Scholar 

  • Ramirez-Marquez, J. E., & Rocco, C. (2009). Stochastic network interdiction optimization via capacitated network reliability modeling & probabilistic solution discovery. Reliability Engineering & Systems Safety, 94(5), 913–921.

    Article  Google Scholar 

  • Sekine, J., Campos-Náñez, E., Harrald, J., & Abeledo, H. (2006). A simulation-based approach to trade-off analysis of port security. In Proceedings of the 2006 winter simulation conference (pp. 521–528).

    Chapter  Google Scholar 

  • Stroud, P., & Saeger, K. (2003). Enumeration of increasing boolean expressions and alternative digraph implementations for diagnostic applications. In J. Chu, J. Ferrer, T. Nguyen, & Y. Yu (Eds.), Proceedings of the conference on computer, communication and control technologies (Vol. 4, pp. 328–333).

    Google Scholar 

  • Van Weele, S., & Ramirez-Marquez, J. (2010). Optimization of container inspection strategy via a genetic algorithm. Special Volume on Port Security/Safety, Risk Analysis and Modeling—Annals of Operations Research.

  • Wein, L., Wilkins, A., Baveja, M., & Flynn, S. (2006). Preventing the importation of illicit nuclear materials in shipping containers. Risk Analysis, 26(5), 1377–1393.

    Article  Google Scholar 

  • Young, C., Li, M., Zhu, Y., Xie, M., Elsayed, E., & Asamov, T. (2010). Multiobjective optimization of a port-of-entry inspection policy. IEEE Transactions on Automation Science and Engineering, 7(2), 392–400.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to José E. Ramirez-Marquez.

Appendix

Appendix

According to the binary decision-tree structure presented in this paper, the sensor assigned to the first node (i=1), is always used to screen all containers. At subsequent nodes (i>1), the fraction of “suspicious” and “unsuspicious” containers—\(Q_{i}^{1}\) and \(Q_{i}^{0}\) respectively—screened, released or physically inspected, changes based on the results obtained at the preceding nodes. These fractions are calculated using (A.1), (A.2) and (A.3). At the first node, both, \(Q_{i}^{1}\) and \(Q_{i}^{0}\) have a value of 1 since 100% of containers are inspected at such node.

$$Q_{i}^{z} = Q_{\Omega (i)}^{z} \bigl[I_{i}^{0}\Phi_{L_{\Omega (i)}}^{z}(t_{L_{\Omega (i)}}) +\bigl( 1 - I_{i}^{0} \bigr) \bigl( 1 - \Phi_{L_{\Omega (i)}}^{z}(t_{L_{\Omega (i)}})\bigr) \bigr] $$
(A.1)

where:

$$I_{i}^{0} =\begin{cases}0& \text{if the link between }L_{i}\text{ and }L_{\Omega (i)}\text{ is of type ``unsuspicious''} \\1&\text{otherwise}\end{cases}$$
Ω(i):

represents the node immediately preceding node i

\(\Phi_{j}^{z}(t_{j})\) :

is the cumulative distribution function for sensor readings r j of sensor type j for both, “suspicious and “unsuspicious” containers considering the corresponding threshold value t j and assuming such readings are normally distributed \(N(\mu_{j}^{z},\sigma_{j}^{z} )\)

\(t_{L_{\Omega (i)}}\) :

is the threshold value of the sensor type located at node Ω(i)

Equation (A.1) indicates that the fraction of “unsuspicious” (z=0) or “suspicious” (z=1) containers at each node, \(Q_{i}^{z}\), is a function of: (1) the fraction of “unsuspicious” or “suspicious” containers, respectively, screened at the immediate preceding node Ω(i), (2) the reliability of the sensor located at such preceding node \(\Phi_{L_{\Omega (i)}}^{z}(t_{L_{\Omega (i)}})\) and (3) its corresponding threshold value \(t_{L_{\Omega (i)}}\).

However, when at a given node containers are either released or physically inspected, the fraction of “suspicious” and “unsuspicious” containers at that particular node is obtained differently and it depends on the decision taken at the preceding node. Equations (A.2) and (A.3) are used to obtain \(Q_{i}^{z}\) in such cases.

(A.2)
(A.3)

where \(\alpha_{i}^{h} = \frac{i}{2^{h - 1}}\) and h represents the echelon number (Ramirez-Marquez 2008).

Equation (A.2) ensures that same sensor types are not allocated at subsequent positions to avoid having containers inspected twice with the same type of device. Equation (A.3) guarantees that once a container is released or physically inspected, no further action is taken with respect to the inspection strategy.

The utilization of each sensor type is calculated following equation (A.4). It represents the fraction of “unsuspicious” containers unnecessarily screened by sensor type j. The false-suspicious rate is obtained using (A.5) and it accounts for the expected fraction of “unsuspicious” containers that unnecessarily go through a physical inspection when using strategy L.

(A.4)
(A.5)

where:

$$\mathbf{L} = ( L_{1},\ldots,L_{i},L_{i + 1},\ldots,L{}_{2^{n + 1} - 1} )$$

L i represents a sensor type j, a release (“OK”) or a physical inspection (“CHK”) allocated at node i. For further details on the development of these equations refer to (Ramirez-Marquez 2008).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Concho, A.L., Ramirez-Marquez, J.E. Optimal design of container inspection strategies considering multiple objectives via an evolutionary approach. Ann Oper Res 196, 167–187 (2012). https://doi.org/10.1007/s10479-012-1069-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10479-012-1069-6

Keywords

Navigation