IDEAS home Printed from https://ideas.repec.org/a/wly/navres/v58y2011i7p637-654.html
   My bibliography  Save this article

Efficient sequential decision‐making algorithms for container inspection operations

Author

Listed:
  • David Madigan
  • Sushil Mittal
  • Fred Roberts

Abstract

Following work of Stroud and Saeger (Proceedings of ISI, Springer Verlag, New York, 2006) and Anand et al. (Proceedings of Computer, Communication and Control Technologies, 2003), we formulate a port of entry inspection sequencing task as a problem of finding an optimal binary decision tree for an appropriate Boolean decision function. We report on new algorithms for finding such optimal trees that are more efficient computationally than those presented by Stroud and Saeger and Anand et al. We achieve these efficiencies through a combination of specific numerical methods for finding optimal thresholds for sensor functions and two novel binary decision tree search algorithms that operate on a space of potentially acceptable binary decision trees. The improvements enable us to analyze substantially larger applications than was previously possible. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011

Suggested Citation

  • David Madigan & Sushil Mittal & Fred Roberts, 2011. "Efficient sequential decision‐making algorithms for container inspection operations," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(7), pages 637-654, October.
  • Handle: RePEc:wly:navres:v:58:y:2011:i:7:p:637-654
    DOI: 10.1002/nav.20472
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/nav.20472
    Download Restriction: no

    File URL: https://libkey.io/10.1002/nav.20472?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Miglio, Rossella & Soffritti, Gabriele, 2004. "The comparison between classification trees through proximity measures," Computational Statistics & Data Analysis, Elsevier, vol. 45(3), pages 577-593, April.
    2. Lawrence M. Wein & Alex H. Wilkins & Manas Baveja & Stephen E. Flynn, 2006. "Preventing the Importation of Illicit Nuclear Materials in Shipping Containers," Risk Analysis, John Wiley & Sons, vol. 26(5), pages 1377-1393, October.
    3. Sheldon H. Jacobson & Tamana Karnani & John E. Kobza & Lynsey Ritchie, 2006. "A Cost‐Benefit Analysis of Alternative Device Configurations for Aviation‐Checked Baggage Security Screening," Risk Analysis, John Wiley & Sons, vol. 26(2), pages 297-310, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Rostami, Salim & Creemers, Stefan & Wei, Wenchao & Leus, Roel, 2019. "Sequential testing of n-out-of-n systems: Precedence theorems and exact methods," European Journal of Operational Research, Elsevier, vol. 274(3), pages 876-885.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
    2. Vicki Bier & Naraphorn Haphuriwat, 2011. "Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks," Annals of Operations Research, Springer, vol. 187(1), pages 137-158, July.
    3. Gary M. Gaukler & Chenhua Li & Yu Ding & Sunil S. Chirayath, 2012. "Detecting Nuclear Materials Smuggling: Performance Evaluation of Container Inspection Policies," Risk Analysis, John Wiley & Sons, vol. 32(3), pages 531-554, March.
    4. Qianmei Feng, 2007. "On Determining Specifications and Selections of Alternative Technologies for Airport Checked‐Baggage Security Screening," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1299-1310, October.
    5. Henry H. Willis & Tom LaTourrette, 2008. "Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit‐Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 325-339, April.
    6. Niyazi Bakır, 2011. "A Stackelberg game model for resource allocation in cargo container security," Annals of Operations Research, Springer, vol. 187(1), pages 5-22, July.
    7. Michael P. Atkinson & Lawrence M. Wein, 2008. "TECHNICAL NOTE---Spatial Queueing Analysis of an Interdiction System to Protect Cities from a Nuclear Terrorist Attack," Operations Research, INFORMS, vol. 56(1), pages 247-254, February.
    8. Nedialko Dimitrov & Dennis Michalopoulos & David Morton & Michael Nehme & Feng Pan & Elmira Popova & Erich Schneider & Gregory Thoreson, 2011. "Network deployment of radiation detectors with physics-based detection probability calculations," Annals of Operations Research, Springer, vol. 187(1), pages 207-228, July.
    9. Yada Zhu & Mingyu Li & Christina Young & Minge Xie & Elsayed Elsayed, 2011. "Impact of measurement error on container inspection policies at port-of-entry," Annals of Operations Research, Springer, vol. 187(1), pages 23-43, July.
    10. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    11. Nagurney, Anna & Shukla, Shivani & Nagurney, Ladimer S. & Saberi, Sara, 2018. "A game theory model for freight service provision security investments for high-value cargo," Economics of Transportation, Elsevier, vol. 16(C), pages 21-28.
    12. Michael P. Atkinson & Zheng Cao & Lawrence M. Wein, 2008. "Optimal Stopping Analysis of a Radiation Detection System to Protect Cities from a Nuclear Terrorist Attack," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 353-371, April.
    13. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    14. Chenhua Li & Gary M. Gaukler & Yu Ding, 2013. "Using container inspection history to improve interdiction logistics for illicit nuclear materials," Naval Research Logistics (NRL), John Wiley & Sons, vol. 60(6), pages 433-448, September.
    15. Naraphorn Haphuriwat & Vicki M. Bier & Henry H. Willis, 2011. "Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation," Decision Analysis, INFORMS, vol. 8(2), pages 88-102, June.
    16. Hongliang Liu & Jinpeng Tan & Kyongson Jon & Wensheng Zhu, 2022. "A New Case-Mix Classification Method for Medical Insurance Payment," Mathematics, MDPI, vol. 10(10), pages 1-15, May.
    17. Laura McLay & Jamie Lloyd & Emily Niman, 2011. "Interdicting nuclear material on cargo containers using knapsack problem models," Annals of Operations Research, Springer, vol. 187(1), pages 185-205, July.
    18. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    19. Mark G. Stewart & John Mueller, 2018. "Risk and economic assessment of U.S. aviation security for passenger-borne bomb attacks," Journal of Transportation Security, Springer, vol. 11(3), pages 117-136, December.
    20. Stuart Van Weele & Jose Emmanuel Ramirez-Marquez, 2012. "Optimization of inspection for dual contraband using a genetic algorithm," Journal of Risk and Reliability, , vol. 226(5), pages 508-525, October.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:navres:v:58:y:2011:i:7:p:637-654. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1002/(ISSN)1520-6750 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.