Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach

Abstract Up to now, of all the containers received in USA ports, roughly between 2% and 5% are scrutinized to determine if they could cause some type of danger or contain suspicious goods. Recently, concerns have been raised regarding the type of attack that could happen via container cargo leading to devastating economic, psychological and sociological effects. Overall, this paper is concerned with developing an inspection strategy that minimizes the total cost of inspection while maintaining a user-specified detection rate for “suspicious” containers. In this respect, a general model for describing an inspection strategy is proposed. The strategy is regarded as an (n+1)-echelon decision tree where at each of these echelons, a decision has to be taken, regarding which sensor to be used, if at all. Second, based on the general decision-tree model, this paper presents a minimum cost container inspection strategy that conforms to a pre-specified user detection rate under the assumption that different sensors with different reliability and cost characteristics can be used. To generate an optimal inspection strategy, an evolutionary optimization approach known as probabilistic solution discovery algorithm has been used.

[1]  W. Godwin Article in Press , 2000 .

[2]  Claudio M. Rocco Sanseverino,et al.  All-terminal network reliability optimization via probabilistic solution discovery , 2008, Reliab. Eng. Syst. Saf..

[3]  Jose Emmanuel Ramirez-Marquez,et al.  Probabilistic knowledge discovery algorithm in network reliability optimization , 2007 .

[4]  Gregory Levitin,et al.  Asymmetric weighted voting systems , 2002, Reliab. Eng. Syst. Saf..

[5]  Thomas Bäck,et al.  Evolutionary computation: an overview , 1996, Proceedings of IEEE International Conference on Evolutionary Computation.

[6]  P. Gordon,et al.  The Economic Impacts of Terrorist Attacks , 2007 .

[7]  Hoang Pham,et al.  Weighted voting systems , 1999 .

[8]  Yada Zhu,et al.  Port-of-Entry Inspection: Sensor Deployment Policy Optimization , 2009, IEEE Transactions on Automation Science and Engineering.

[9]  Susan E. Martonosi,et al.  Evaluating the Viability of 100 Per Cent Container Inspection at America's Ports , 2005 .

[10]  E. Boros,et al.  Large Scale LP Model for Finding Optimal Container Inspection Strategies , 2006 .

[11]  David W. Coit,et al.  A generalized multistate-based path vector approach to multistate two-terminal reliability , 2006 .

[12]  Jose Emmanuel Ramirez-Marquez,et al.  Holistic reliability analysis of weighted voting systems from a multi-state perspective , 2007 .

[13]  Edward C. Gully Assessment of Our National Infrastructure Strategy , 2006 .

[14]  P.K. Varshney,et al.  Optimal Data Fusion in Multiple Sensor Detection Systems , 1986, IEEE Transactions on Aerospace and Electronic Systems.

[15]  Lawrence M Wein,et al.  Preventing the importation of illicit nuclear materials in shipping containers. , 2006, Risk analysis : an official publication of the Society for Risk Analysis.

[16]  A. Saltelli,et al.  Reliability Engineering and System Safety , 2008 .

[17]  Paul B. Kantor,et al.  A Large-Scale Linear Programming Model for Finding Optimal Container Inspection Strategies , 2009 .

[18]  L. Rivers A Post‐Katrina Call to Action for the Risk Analysis Community , 2006, Risk analysis : an official publication of the Society for Risk Analysis.