Optimal deployment of static detectors in a threat area

To quote Mohammed M. Hafez, author of the book “Manufacturing Human Bombs: The Making of Palestinian Suicide Bombers” [1] - Asymmetry in power compels the weak to innovate in order to surprise opponents and circumvent their stronger capabilities. This idea of attack through self sacrifice is centuri...

Full description

Saved in:
Bibliographic Details
Main Author: Pang, Jing Chyi
Other Authors: Nie Xiaofeng
Format: Final Year Project
Language:English
Published: 2012
Subjects:
Online Access:http://hdl.handle.net/10356/50249
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-50249
record_format dspace
spelling sg-ntu-dr.10356-502492023-03-04T18:25:26Z Optimal deployment of static detectors in a threat area Pang, Jing Chyi Nie Xiaofeng School of Mechanical and Aerospace Engineering DRNTU::Engineering::Mechanical engineering To quote Mohammed M. Hafez, author of the book “Manufacturing Human Bombs: The Making of Palestinian Suicide Bombers” [1] - Asymmetry in power compels the weak to innovate in order to surprise opponents and circumvent their stronger capabilities. This idea of attack through self sacrifice is centuries old as historical records show, but the technology to achieve such means has slowly evolved down the years and eventually manifested in the recent form of what is known today as the modern suicide bomber. Mostly used by terrorist groups with lack of resources for proper training, the suicide bomber has become the weapon of choice, often becoming the daily fare of major news in the past decade. According to statistics released by the U.S. Department of Defense [2], out of the 144 recorded suicide bombings since 1968, two thirds occurred between 2001 and 2003; and despite the overall decline of terrorist attacks around the world, the percentage of suicide terrorist attacks have actually increased. Today’s conventional technology has somewhat reached a peak threshold of progression, with the usual arrays of chemical and X-ray detectors, just to name a few. The problem lies in the fact that such suicide bombers often operate on a small scale, making it almost difficult to predict and prevent their attempts, barring a large scale, comprehensive and high maintenance detection system which might put them on full alert as well. Thus, there exists a need to successfully optimize the use of a minimal number of strategically placed and inconspicuous detectors to attempt to neutralize the suicide bomber before detonation, or in the case of failure, trying to minimize the number of casualties inflicted. Developing upon the work by Nie et al (2007) [3], the author works with the same mathematical model targeted at minimization of expected casualties, but this time subjecting it to different constraints. The author also makes use of a different medium of modeling the aforementioned problem using a high level programming system called GAMS (General Arithmetic Modeling System), which is solved using an online server called NEOS Solver. Lastly, the author also examines the different effects observed when key parameters are changed. Bachelor of Engineering (Mechanical Engineering) 2012-05-31T03:56:45Z 2012-05-31T03:56:45Z 2012 2012 Final Year Project (FYP) http://hdl.handle.net/10356/50249 en Nanyang Technological University 69 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Mechanical engineering
spellingShingle DRNTU::Engineering::Mechanical engineering
Pang, Jing Chyi
Optimal deployment of static detectors in a threat area
description To quote Mohammed M. Hafez, author of the book “Manufacturing Human Bombs: The Making of Palestinian Suicide Bombers” [1] - Asymmetry in power compels the weak to innovate in order to surprise opponents and circumvent their stronger capabilities. This idea of attack through self sacrifice is centuries old as historical records show, but the technology to achieve such means has slowly evolved down the years and eventually manifested in the recent form of what is known today as the modern suicide bomber. Mostly used by terrorist groups with lack of resources for proper training, the suicide bomber has become the weapon of choice, often becoming the daily fare of major news in the past decade. According to statistics released by the U.S. Department of Defense [2], out of the 144 recorded suicide bombings since 1968, two thirds occurred between 2001 and 2003; and despite the overall decline of terrorist attacks around the world, the percentage of suicide terrorist attacks have actually increased. Today’s conventional technology has somewhat reached a peak threshold of progression, with the usual arrays of chemical and X-ray detectors, just to name a few. The problem lies in the fact that such suicide bombers often operate on a small scale, making it almost difficult to predict and prevent their attempts, barring a large scale, comprehensive and high maintenance detection system which might put them on full alert as well. Thus, there exists a need to successfully optimize the use of a minimal number of strategically placed and inconspicuous detectors to attempt to neutralize the suicide bomber before detonation, or in the case of failure, trying to minimize the number of casualties inflicted. Developing upon the work by Nie et al (2007) [3], the author works with the same mathematical model targeted at minimization of expected casualties, but this time subjecting it to different constraints. The author also makes use of a different medium of modeling the aforementioned problem using a high level programming system called GAMS (General Arithmetic Modeling System), which is solved using an online server called NEOS Solver. Lastly, the author also examines the different effects observed when key parameters are changed.
author2 Nie Xiaofeng
author_facet Nie Xiaofeng
Pang, Jing Chyi
format Final Year Project
author Pang, Jing Chyi
author_sort Pang, Jing Chyi
title Optimal deployment of static detectors in a threat area
title_short Optimal deployment of static detectors in a threat area
title_full Optimal deployment of static detectors in a threat area
title_fullStr Optimal deployment of static detectors in a threat area
title_full_unstemmed Optimal deployment of static detectors in a threat area
title_sort optimal deployment of static detectors in a threat area
publishDate 2012
url http://hdl.handle.net/10356/50249
_version_ 1759854316738314240