IDEAS home Printed from https://ideas.repec.org/a/spr/annopr/v187y2011i1p185-20510.1007-s10479-009-0667-4.html
   My bibliography  Save this article

Interdicting nuclear material on cargo containers using knapsack problem models

Author

Listed:
  • Laura McLay
  • Jamie Lloyd
  • Emily Niman

Abstract

This paper introduces a framework for screening cargo containers for nuclear material at security stations throughout the United States using knapsack problem, reliability, and Bayesian probability models. The approach investigates how to define a system alarm given a set of screening devices, and hence, designs and analyzes next-generation security system architectures. Containers that yield a system alarm undergo secondary screening, where more effective and intrusive screening devices are used to further examine containers for nuclear and radiological material. It is assumed that there is a budget for performing secondary screening on containers that yield a system alarm. This paper explores the relationships and tradeoffs between prescreening, secondary screening costs, and the efficacy of radiation detectors. The key contribution of this analysis is that it provides a risk-based framework for determining how to define a system alarm for screening cargo containers given limited screening resources. The analysis suggests that highly accurate prescreening is the most important factor for effective screening, particularly when screening tests are highly dependent, and that moderately accurate prescreening may not be an improvement over treating all cargo containers the same. Moreover, it suggests that screening tests with high true alarm rates may mitigate some of the risk associated with low prescreening intelligence. Copyright Springer Science+Business Media, LLC 2011

Suggested Citation

  • Laura McLay & Jamie Lloyd & Emily Niman, 2011. "Interdicting nuclear material on cargo containers using knapsack problem models," Annals of Operations Research, Springer, vol. 187(1), pages 185-205, July.
  • Handle: RePEc:spr:annopr:v:187:y:2011:i:1:p:185-205:10.1007/s10479-009-0667-4
    DOI: 10.1007/s10479-009-0667-4
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s10479-009-0667-4
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s10479-009-0667-4?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Moffitt L. Joe & Stranlund John K. & Field Barry C., 2005. "Inspections to Avert Terrorism: Robustness Under Severe Uncertainty," Journal of Homeland Security and Emergency Management, De Gruyter, vol. 2(3), pages 1-19, September.
    2. Lawrence M. Wein & Alex H. Wilkins & Manas Baveja & Stephen E. Flynn, 2006. "Preventing the Importation of Illicit Nuclear Materials in Shipping Containers," Risk Analysis, John Wiley & Sons, vol. 26(5), pages 1377-1393, October.
    3. Ramirez-Marquez, Jose Emmanuel, 2008. "Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1698-1709.
    4. John E. Kobza & Sheldon H. Jacobson, 1996. "Addressing the Dependency Problem in Access Security System Architecture Design," Risk Analysis, John Wiley & Sons, vol. 16(6), pages 801-812, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    2. Chenhua Li & Gary M. Gaukler & Yu Ding, 2013. "Using container inspection history to improve interdiction logistics for illicit nuclear materials," Naval Research Logistics (NRL), John Wiley & Sons, vol. 60(6), pages 433-448, September.
    3. Wei, Ningji & Walteros, Jose L., 2022. "Integer programming methods for solving binary interdiction games," European Journal of Operational Research, Elsevier, vol. 302(2), pages 456-469.
    4. Dreiding, Rebecca A. & McLay, Laura A., 2013. "An integrated model for screening cargo containers," European Journal of Operational Research, Elsevier, vol. 230(1), pages 181-189.
    5. Smith, J. Cole & Song, Yongjia, 2020. "A survey of network interdiction models and algorithms," European Journal of Operational Research, Elsevier, vol. 283(3), pages 797-811.
    6. Keskin, Burcu B. & Griffin, Emily C. & Prell, Jonathan O. & Dilkina, Bistra & Ferber, Aaron & MacDonald, John & Hilend, Rowan & Griffis, Stanley & Gore, Meredith L., 2023. "Quantitative Investigation of Wildlife Trafficking Supply Chains: A Review," Omega, Elsevier, vol. 115(C).
    7. Utsav Sadana & Erick Delage, 2023. "The Value of Randomized Strategies in Distributionally Robust Risk-Averse Network Interdiction Problems," INFORMS Journal on Computing, INFORMS, vol. 35(1), pages 216-232, January.
    8. McLay, Laura A. & Dreiding, Rebecca, 2012. "Multilevel, threshold-based policies for cargo container security screening systems," European Journal of Operational Research, Elsevier, vol. 220(2), pages 522-529.
    9. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.
    10. Yan, Xihong & Nie, Xiaofeng, 2016. "Optimal placement of multiple types of detectors under a small vessel attack threat to port security," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 93(C), pages 71-94.
    11. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Gary Gaukler & Chenhua Li & Rory Cannaday & Sunil Chirayath & Yu Ding, 2011. "Detecting nuclear materials smuggling: using radiography to improve container inspection policies," Annals of Operations Research, Springer, vol. 187(1), pages 65-87, July.
    2. Gary M. Gaukler & Chenhua Li & Yu Ding & Sunil S. Chirayath, 2012. "Detecting Nuclear Materials Smuggling: Performance Evaluation of Container Inspection Policies," Risk Analysis, John Wiley & Sons, vol. 32(3), pages 531-554, March.
    3. Vicki Bier & Naraphorn Haphuriwat, 2011. "Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks," Annals of Operations Research, Springer, vol. 187(1), pages 137-158, July.
    4. Yada Zhu & Mingyu Li & Christina Young & Minge Xie & Elsayed Elsayed, 2011. "Impact of measurement error on container inspection policies at port-of-entry," Annals of Operations Research, Springer, vol. 187(1), pages 23-43, July.
    5. Stuart Van Weele & Jose Emmanuel Ramirez-Marquez, 2012. "Optimization of inspection for dual contraband using a genetic algorithm," Journal of Risk and Reliability, , vol. 226(5), pages 508-525, October.
    6. Ana Concho & José Ramirez-Marquez, 2012. "Optimal design of container inspection strategies considering multiple objectives via an evolutionary approach," Annals of Operations Research, Springer, vol. 196(1), pages 167-187, July.
    7. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    8. David Anderson, 2021. "Optimising multi-layered security screening," Journal of Transportation Security, Springer, vol. 14(3), pages 249-273, December.
    9. P. Daniel Wright & Matthew J. Liberatore & Robert L. Nydick, 2006. "A Survey of Operations Research Models and Applications in Homeland Security," Interfaces, INFORMS, vol. 36(6), pages 514-529, December.
    10. Stuart Weele & Jose Ramirez-Marquez, 2011. "Optimization of container inspection strategy via a genetic algorithm," Annals of Operations Research, Springer, vol. 187(1), pages 229-247, July.
    11. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
    12. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    13. Michael P. Atkinson & Lawrence M. Wein, 2008. "TECHNICAL NOTE---Spatial Queueing Analysis of an Interdiction System to Protect Cities from a Nuclear Terrorist Attack," Operations Research, INFORMS, vol. 56(1), pages 247-254, February.
    14. Ben-Haim, Yakov, 2021. "Feedback for energy conservation: An info-gap approach," Energy, Elsevier, vol. 223(C).
    15. Yakov Ben‐Haim, 2011. "Interpreting Null Results from Measurements with Uncertain Correlations: An Info‐Gap Approach," Risk Analysis, John Wiley & Sons, vol. 31(1), pages 78-85, January.
    16. Nedialko Dimitrov & Dennis Michalopoulos & David Morton & Michael Nehme & Feng Pan & Elmira Popova & Erich Schneider & Gregory Thoreson, 2011. "Network deployment of radiation detectors with physics-based detection probability calculations," Annals of Operations Research, Springer, vol. 187(1), pages 207-228, July.
    17. Stranlund, John K. & Ben-Haim, Yakov, 2006. "Price-Based vs. Quantity-Based Environmental Regulation under Knightian Uncertainty: An Info-Gap Robust Satisficing Perspective," Working Paper Series 14528, University of Massachusetts, Amherst, Department of Resource Economics.
    18. L. Joe Moffitt & John K. Stranlund & Craig D. Osteen, 2009. "Securing the Border from Invasives: Robust Inspections Under Severe Uncertainty," Working Papers 2009-6, University of Massachusetts Amherst, Department of Resource Economics.
    19. Nagurney, Anna & Shukla, Shivani & Nagurney, Ladimer S. & Saberi, Sara, 2018. "A game theory model for freight service provision security investments for high-value cargo," Economics of Transportation, Elsevier, vol. 16(C), pages 21-28.
    20. Alexander G. Nikolaev & Sheldon H. Jacobson & Laura A. McLay, 2007. "A Sequential Stochastic Security System Design Problem for Aviation Security," Transportation Science, INFORMS, vol. 41(2), pages 182-194, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:annopr:v:187:y:2011:i:1:p:185-205:10.1007/s10479-009-0667-4. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.