نتایج جستجو برای: nodal interdiction

تعداد نتایج: 19620  

2008
Nedialko B. Dimitrov Marc A. Gonzalez Dennis P. Michalopoulos David P. Morton Michael V. Nehme Elmira Popova Erich A. Schneider Gregory G. Thoreson

We describe a stochastic interdiction model on a transportation network consisting of two adversaries: a nuclear-material smuggler and an interdictor. The interdictor first installs radiation detectors on the network. These installations are transparent to the smuggler, and are made under an uncertain threat scenario, which specifies the smuggler’s origin and destination, the nature of the mate...

2016
Qingyu Guo Bo An Yair Zick Chunyan Miao

Large scale smuggling of illegal goods is a longstanding problem, with $1.4b and thousands of agents assigned to protect the borders from such activity in the US-Mexico border alone. Illegal smuggling activities are usually blocked via inspection stations or ad-hoc checkpoints/roadblocks. Security resources are insufficient to man all stations at all times; furthermore, smugglers regularly cond...

2012
Dennis P. Michalopoulos David P. Morton

We develop a stochastic network interdiction model for prioritizing locations for installing radiation detectors along a nation’s border. In this one-country model, we characterize the smuggler population by a set of possible threat scenarios, where the identity of the smuggler is unknown at the time we install detectors. Detector performance depends on the threat scenario, as well as a number ...

2013
Trevor Dobbins Steve Myers Julie Stark

Maritime Interdiction (MI) operations are an increasing important element of the littoral environment. This is demonstrated by the International anti-piracy operations around the Horn of Africa and the establishment of the NATO Maritime Interdiction Operational Training Centre (Crete, Greece). The type of MI operation described is the insertion of a ship boarding team, via high speed craft, fro...

2005
J. Cole Smith Fransisca Sudargho

We examine the problem of building or fortifying a network to defend against enemy attack scenarios. In particular, we examine the case in which an enemy can destroy all or part of the arcs that we construct on the network, subject to some interdiction budget. This problem takes the form of a three-level, two-player game, in which we act first to construct our network and simultaneously transmi...

Journal: :International Journal of Computational Intelligence Systems 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید