The eye and the fist: Optimizing search and interdiction
نویسندگان
چکیده
Interdiction operations involving search, identification, and interception of suspected objects are of great interest and high operational importance to military and naval forces as well as nation’s coast guards and border patrols. The interdiction scenario discussed in this paper includes an area of interest with multiple neutral and hostile objects moving through this area, and an interdiction force, consisting of an airborne sensor and an intercepting surface vessel or ground vehicle, whose objectives are to search, identify, track, and intercept hostile objects within a given time frame. The main contributions of this paper are addressing both airborne sensor and surface vessel simultaneously, developing a stochastic dynamic-programming model for optimizing their employment, and deriving operational insight. In addition, the search and identification process of the airborne sensor addresses both physical (appearance) and behavioral (movement pattern) signatures of a potentially hostile object. As the model is computationally intractable for real-world scenarios, we propose a simple heuristic policy, which is shown, using a bounding technique, to be quite effective. Based on a numerical case study of maritime interdiction operations, which includes several representative scenarios, we show that the expected number of intercepted hostile objects, following the heuristic decision policy, is at least 60% of the number of hostile objects intercepted following an optimal decision policy. Subject Classifications: Search and surveillance operations; Military tactics Area of Review: Military and Homeland Security
منابع مشابه
A Three-Level Mathematical Model for an r-interdiction Hierarchical Facilities Location Problem
In general, any system may be at risk in a case of losing the critical facilities by natural disasters or terrorist attacks. This paper focuses on identifying the critical facilities and planning to reduce the effect of this event. A three-level model is suggested in the form of a defender-attacker-defender. It is assumed that the facilities are hierarchical and capable of nesting. Also, the at...
متن کاملStudying factors influencing eye indicators of computer users: A systematic review
Introduction: Nowadays, working in any computer work stations, named visual display terminal (VDT), was widespread and has become popular in our lives. Due to the increasing trend of using computers in the administrative and social institutions, prevalence of eye-related signs of working with computers is still increasing and it is one of the most important health issues. Computer jobs are low-...
متن کاملA Note on the Integrality Gap in the Nodal Interdiction Problem
In the maximum flow network interdiction problem, an attacker attempts to minimize the maximum flow by interdicting flow on the arcs of network. In this paper, our focus is on the nodal interdiction for network instead of the arc interdiction. Two path inequalities for the node-only interdiction problem are represented. It has been proved that the integrality gap of relaxation of the maximum fl...
متن کاملOptimizing the Grade Classification Model of Mineralized Zones Using a Learning Method Based on Harmony Search Algorithm
The classification of mineralized areas into different groups based on mineral grade and prospectivity is a practical problem in the area of optimal risk, time, and cost management of exploration projects. The purpose of this paper was to present a new approach for optimizing the grade classification model of an orebody. That is to say, through hybridizing machine learning with a metaheuristic ...
متن کاملOptimizing the AGC system of a three-unequal-area hydrothermal system based on evolutionary algorithms
This paper focuses on expanding and evaluating an automatic generation control (AGC) system of a hydrothermal system by modelling the appropriate generation rate constraints to operate practically in an economic manner. The hydro area is considered with an electric governor and the thermal area is modelled with a reheat turbine. Furthermore, the integral controllers and electri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- European Journal of Operational Research
دوره 220 شماره
صفحات -
تاریخ انتشار 2012