Skip to main content

Advertisement

Log in

Metaheuristic approaches to the placement of suicide bomber detectors

  • Published:
Journal of Heuristics Aims and scope Submit manuscript

Abstract

Suicide bombing is an infamous form of terrorism that is becoming increasingly prevalent in the current era of global terror warfare. We consider the case of targeted attacks of this kind, and the use of detectors distributed over the area under threat as a protective countermeasure. Such detectors are non-fully reliable, and must be strategically placed in order to maximize the chances of detecting the attack, hence minimizing the expected number of casualties. To this end, different metaheuristic approaches based on local search and on population-based search (such as a hill climber, different Greedy randomized adaptive search procedures, an evolutionary algorithm and several estimation of distribution algorithms) are considered and benchmarked against a powerful greedy heuristic from the literature. We conduct an extensive empirical evaluation on synthetic instances featuring very diverse properties. Most metaheuristics outperform the greedy algorithm, and a hill-climber is shown to be superior to remaining approaches. This hill-climber is subsequently subject to a sensitivity analysis to determine which problem features make it stand above the greedy approach, and is finally deployed on a number of problem instances built after realistic scenarios, corroborating the good performance of the heuristic.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Source own elaboration based on data from Chicago Project on Security and Terrorism (CPOST) (2016) (Color figure online)

Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Notes

  1. Note that the attacker following a non-shortest path would in principle imply a larger exposure to detection and hence this assumption provides a baseline for evaluation, and is used too in related contexts such as routing military ground operations (Kim et al. 2016). Also, according to the literature on modeling realistic human walking paths, there seems to be a governing principle which is minimizing the time-derivative of the curvature of the path (Arechavaleta et al. 2008). This mostly affects those cases in which a turn has to be made, resulting in clothoid-like trajectories. Notice however that this effect may be minor in light of factors such as the discretization of the map and the presence of obstacles (such as, e.g., street walls) constraining the trajectory.

  2. These instances are publicly available—see the “Appendix” for details.

References

  • Aarts, E.H.L., Lenstra, J.K.: Local Search in Combinatorial Optimization. Wiley, New York (1997)

    MATH  Google Scholar 

  • AFP: Death toll from Baghdad blast rises to 292: minister. France 24. http://www.france24.com/en/20160707-death-toll-baghdad-blast-rises-292-minister (2016) . Accessed 15 July 2016

  • Arechavaleta, G., Laumond, J.P., Hicheur, H., Berthoz, A.: An optimality principle governing human walking. IEEE Trans. Robot. 24(1), 5–14 (2008)

    Article  Google Scholar 

  • Carson, J.V.: Assessing the effectiveness of high-profile targeted killings in the “war on terror”. Criminol. Public Policy 16(1), 191–220 (2017)

    Article  MathSciNet  Google Scholar 

  • Caygill, J.S., Davis, F., Higson, S.P.: Current trends in explosive detection techniques. Talanta 88, 14–29 (2012)

    Article  Google Scholar 

  • Chicago Project on Security and Terrorism (CPOST): suicide attack database (April 19, 2016 release). http://cpostdata.uchicago.edu/ (2016)

  • Cotta, C., Fernández, A.J.: A hybrid GRASP - evolutionary algorithm approach to golomb ruler search. In: Yao, X., et al. (eds.) Parallel Problem Solving from Nature —PPSN VIII. Lecture Notes in Computer Science, vol. 3242, pp. 481–490. Springer (2004)

  • De Jong K.A., Potter, M.A., Spears, W.M.: Using problem generators to explore the effects of epistasis. In: Bäck, T. (ed.) Proceedings of the 7th International Conference on Genetic Algorithms. Morgan Kaufmann, pp. 338–345 (1997)

  • Edwards, D., McMenemy, L., Stapley, S., Patel, H., Clasper, J.: 40 years of terrorist bombings–a meta-analysis of the casualty and injury profile. Injury 47(3), 646–652 (2016)

    Article  Google Scholar 

  • Eiben, A.E., Smith, J.E.: Introduction to Evolutionary Computing. Springer, Berlin (2003)

    Book  MATH  Google Scholar 

  • Farahani, R.Z., Asgari, N., Heidari, N., Hosseininia, M., Goh, M.: Covering problems in facility location: a review. Comput. Ind. Eng. 62(1), 368–407 (2012)

    Article  Google Scholar 

  • Feo, T.A., Resende, M.G.C.: Greedy randomized adaptive search procedures. J. Glob. Optim. 6(2), 109–133 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  • Festa, P., Resende, M.G.C.: An annotated bibliography of GRASP—Part I: algorithms. Int. Trans. Oper. Res. 16(1), 1–24 (2009a)

    Article  MathSciNet  MATH  Google Scholar 

  • Festa, P., Resende, M.G.C.: An annotated bibliography of GRASP—Part II: applications. Int. Trans. Oper. Res. 16(2), 131–172 (2009b)

    Article  MathSciNet  MATH  Google Scholar 

  • Friedman, M.: The use of ranks to avoid the assumption of normality implicit in the analysis of variance. J. Am. Stat. Assoc. 32(200), 675–701 (1937)

    Article  MATH  Google Scholar 

  • Friedman, M.: A comparison of alternative tests of significance for the problem of \(m\) rankings. Ann. Math. Stat. 11(1), 86–92 (1940)

    Article  MathSciNet  MATH  Google Scholar 

  • García, S., Herrera, F.: An extension on “statistical comparisons of classifiers over multiple data sets” for all pairwise comparisons. J. Mach. Learn. Res. 9, 2677–2694 (2008)

    MATH  Google Scholar 

  • Gares, K.L., Hufziger, K.T., Bykov, S.V., Asher, S.A.: Review of explosive detection methodologies and the emergence of standoff deep UV resonance raman. J. Raman Spectrosc. 47(1), 124–141 (2016)

    Article  Google Scholar 

  • Hoffman, B.: The logic of suicide terrorism. The Atlantic. http://www.theatlantic.com/magazine/archive/2003/06/the-logic-of-suicide-terrorism/302739/ (2003). Accessed 2 July 2016

  • Hoos, H., Stützle, T.: Stochastic Local Search. Foundations and Applications. Morgan Kaufmann, Burlington (2005)

    MATH  Google Scholar 

  • Kaplan, E.H., Kress, M.: Operational effectiveness of suicide-bomber-detector schemes: a best-case analysis. Proc. Natl. Acad. Sci. USA 102(29), 10,399–10,404 (2005)

    Article  Google Scholar 

  • Kim, M., Batta, R., He, Q.: Optimal routing of infiltration operations. J. Transp. Secur. 9(1), 87–104 (2016)

    Article  Google Scholar 

  • Kroenig, M., Pavel, B.: How to deter terrorism. Wash. Q. 35(2), 21–36 (2012)

    Article  Google Scholar 

  • Kurukız, H.Ş.: Istanbul airport terror attack death toll rises to 44. Anadolou Agency. http://aa.com.tr/en/todays-headlines/istanbul-airport-terror-attack-death-toll-rises-to-44/599383 (2016) . Accessed 2 July 2016

  • Larrañaga, P., Lozano, J.A.: Estimation of Distribution Algorithms: A New Tool for Evolutionary Computation, vol. 2. Springer, New York (2002)

    MATH  Google Scholar 

  • Mühlenbein, H., Paaß, G.: From recombination of genes to the estimation of distributions I. Binary parameters. In: Voigt, H., Ebeling, W., Rechenberg, I., Schwefel, H. (eds.) Parallel Problem Solving from Nature—PPSN IV. Lecture Notes in Computer Science, vol. 1141, pp. 178–187. Springer, Berlin Heidelberg (1996)

  • Neri, F., Cotta, C., Moscato, P. (eds.): Handbook of Memetic Algorithms, Studies in Computational Intelligence, vol. 379. Springer, Berlin Heidelberg (2012)

    Google Scholar 

  • Nie, X., Batta, R., Drury, C.G., Lin, L.: Optimal placement of suicide bomber detectors. Mil. Oper. Res. 12(2), 65–78 (2007)

    Article  Google Scholar 

  • NRC: Existing and potential standoff explosives detection techniques. National Research Council of the National Academies, Natl. Acad. Press, Washington (2004)

  • Rand Corporation: RAND database of worldwide terrorism incidents. http://smapp.rand.org/rwtid/search_form.php (2009)

  • Shaffer, J.P.: Modified sequentially rejective multiple test procedures. J. Am. Stat. Assoc. 81(395), 826–831 (1986)

    Article  MATH  Google Scholar 

  • Singh, S.: Sensors—an effective approach for the detection of explosives. J. Hazard. Mater. 144(1–2), 15–28 (2007)

    Article  Google Scholar 

  • Yan, X., Nie, X.: Optimal placement of multiple types of detectors under a small vessel attack threat to port security. Transp. Res. Part E Logist. Transp. Rev. 93, 71–94 (2016)

    Article  Google Scholar 

  • Yinon, J.: Counterterrorist Detection Techniques of Explosives. Elsevier, Amsterdam (2007)

    Google Scholar 

Download references

Acknowledgements

We would like to thank Mr. Antonio Hernández Bimbela for his help during the initial stage of this project, and to the anonymous reviewers for useful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carlos Cotta.

Additional information

Authors acknowledge support from Spanish Ministry of Economy and Competitiveness and European Regional Development Fund (FEDER) under project EphemeCH (TIN2014-56494-C4-1-P).

Appendix: A data instances

Appendix: A data instances

The data instances used in the experimentation can be downloaded from:

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cotta, C., Gallardo, J.E. Metaheuristic approaches to the placement of suicide bomber detectors. J Heuristics 24, 483–513 (2018). https://doi.org/10.1007/s10732-017-9335-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10732-017-9335-z

Keywords

Navigation