TY - JOUR
T1 - Bi-objective evolutionary approach to the design of patrolling schemes for improved border security
AU - Muaafa, Mohammed
AU - Ramirez-Marquez, Jose Emmanuel
N1 - Publisher Copyright:
© 2017 Elsevier Ltd
PY - 2017/5/1
Y1 - 2017/5/1
N2 - Patrolling is vital to law enforcement missions and public safety, as patrollers are the most visible entities to perpetrators and first responders whenever there is a breach in security. Factors such as the size and geographical diversity of patrolling zones increase the complexity of protecting national borders, creating a need for advanced techniques to design adequate patrolling schemes that help patrol units prevent and deter potential suspicious activities. This study focuses on optimizing the deployment of personnel to patrol designated areas known for illicit cross-border activities. A multi-objective heuristic approach is proposed to design patrolling schemes with the intention to minimize vulnerability and cost. An evolutionary algorithm is used to find solutions, and the second-order stochastic dominance (SSD) approach is used to rank those solutions in order to obtain the approximate Pareto set of “pseudo-optimal” solutions, which are characterized by the routes followed by patrol units. Illustrative examples are provided to discuss how the model is applied.
AB - Patrolling is vital to law enforcement missions and public safety, as patrollers are the most visible entities to perpetrators and first responders whenever there is a breach in security. Factors such as the size and geographical diversity of patrolling zones increase the complexity of protecting national borders, creating a need for advanced techniques to design adequate patrolling schemes that help patrol units prevent and deter potential suspicious activities. This study focuses on optimizing the deployment of personnel to patrol designated areas known for illicit cross-border activities. A multi-objective heuristic approach is proposed to design patrolling schemes with the intention to minimize vulnerability and cost. An evolutionary algorithm is used to find solutions, and the second-order stochastic dominance (SSD) approach is used to rank those solutions in order to obtain the approximate Pareto set of “pseudo-optimal” solutions, which are characterized by the routes followed by patrol units. Illustrative examples are provided to discuss how the model is applied.
KW - Border protection
KW - Border security
KW - Evolutionary algorithm
KW - Multi-objective heuristic approach
KW - Patrolling scheme
KW - Second-order stochastic dominance
UR - http://www.scopus.com/inward/record.url?scp=85015025308&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85015025308&partnerID=8YFLogxK
U2 - 10.1016/j.cie.2017.03.010
DO - 10.1016/j.cie.2017.03.010
M3 - Article
AN - SCOPUS:85015025308
SN - 0360-8352
VL - 107
SP - 74
EP - 84
JO - Computers and Industrial Engineering
JF - Computers and Industrial Engineering
ER -