Journal Title
Title of Journal: Ann Oper Res
|
Abbravation: Annals of Operations Research
|
|
|
|
|
Authors: Ana Lisbeth Concho José E RamirezMarquez
Publish Date: 2012/02/09
Volume: 196, Issue: 1, Pages: 167-187
Abstract
The size and complexity of containerized shipping across the globe has increased the vulnerability of seaports to the attack of terrorist networks and contraband smuggling As a result the creation of inspection strategies to check incoming containers at portsofentry has been necessary to enable the detection of containers carrying prohibited items However since costs and tardiness considerations related to the inspection process prevent all cargo to be manually checked including different nonintrusive screening technologies as part of the inspection strategies is essential to optimize inspection needs In this paper inspection strategies are represented as decisiontree structures where each node illustrates a screening device and links represent the two possible classifications a screened container can get ie suspicious or unsuspicious Based on such classification one of three actions is taken to continue screening release or physically check the container The contribution of this paper is a mathematical framework that provides an approximation to the Pareto optimal solutions ie inspection strategies that enable decisionmakers to 1 identify tradeoffs among vulnerability inspection cost and tardiness for different inspection strategies and based on this 2 find the strategy that best suits current inspection needs The mathematical framework includes 1 a multiobjective optimization model that concurrently minimizes vulnerability cost and tardiness while determining screening device allocation and threshold settings as well as 2 an evolutionary approach used to solve the optimization modelis the cumulative distribution function for sensor readings r j of sensor type j for both “suspicious and “unsuspicious” containers considering the corresponding threshold value t j and assuming such readings are normally distributed Nmu jzsigma jz Equation A1 indicates that the fraction of “unsuspicious” z=0 or “suspicious” z=1 containers at each node Q iz is a function of 1 the fraction of “unsuspicious” or “suspicious” containers respectively screened at the immediate preceding node Ωi 2 the reliability of the sensor located at such preceding node Phi L Omega izt L Omega i and 3 its corresponding threshold value t L Omega iEquation A2 ensures that same sensor types are not allocated at subsequent positions to avoid having containers inspected twice with the same type of device Equation A3 guarantees that once a container is released or physically inspected no further action is taken with respect to the inspection strategy
Keywords:
.
|
Other Papers In This Journal:
|