Investigating the dependency of detectors in threat areas
Suicide bombers are people who use explosives against their targets, knowing that their actions will cause a massive number of casualties. Suicide bombing involves in planning and executing the detonation on their en route to their targets [1]. From the kamikaze pilots during World War II, to the su...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/60273 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-60273 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-602732023-03-04T18:50:08Z Investigating the dependency of detectors in threat areas Loh, Swee Chye School of Mechanical and Aerospace Engineering Nie Xiaofeng DRNTU::Engineering::Mechanical engineering Suicide bombers are people who use explosives against their targets, knowing that their actions will cause a massive number of casualties. Suicide bombing involves in planning and executing the detonation on their en route to their targets [1]. From the kamikaze pilots during World War II, to the suicide bombers during the post Iraq war, suicide bombers had played a critical role in achieving their goals and ideology. From 20 March 2003 to 31 December 2010, a total of 18,5513 casualties and 40,276 deaths of Iraqi civilian due to suicide bombings were documented [2]. The advancement of technology has helped to detect and prevent suicide bombers from detonating their explosives but technology is a double-edged sword. Suicide bombers are able to make use of technology to escalate their scale of operations and come up with methods to mask and disguise the bombs. In addition, suicide bombers tend to move in small numbers, thus making the detection process even more tedious. In order to detect a bomb threat effectively, a network of detectors are deployed. When dealing with a network of detectors, research papers like Luo et al (1989) [3] and Kaplan et al. assume that the detectors work independently. In actual fact, detectors in a network are not completely independent, especially when their detection areas intersect with each other due to the disturbances in the same working environment. Thus, there is a need to investigate the dependency of detectors in threat areas so that “false” information cues gathered from detectors can be eliminated. Bachelor of Engineering (Mechanical Engineering) 2014-05-26T05:42:40Z 2014-05-26T05:42:40Z 2014 2014 Final Year Project (FYP) http://hdl.handle.net/10356/60273 en Nanyang Technological University 55 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Mechanical engineering |
spellingShingle |
DRNTU::Engineering::Mechanical engineering Loh, Swee Chye Investigating the dependency of detectors in threat areas |
description |
Suicide bombers are people who use explosives against their targets, knowing that their actions will cause a massive number of casualties. Suicide bombing involves in planning and executing the detonation on their en route to their targets [1]. From the kamikaze pilots during World War II, to the suicide bombers during the post Iraq war, suicide bombers had played a critical role in achieving their goals and ideology. From 20 March 2003 to 31 December 2010, a total of 18,5513 casualties and 40,276 deaths of Iraqi civilian due to suicide bombings were documented [2].
The advancement of technology has helped to detect and prevent suicide bombers from detonating their explosives but technology is a double-edged sword. Suicide bombers are able to make use of technology to escalate their scale of operations and come up with methods to mask and disguise the bombs. In addition, suicide bombers tend to move in small numbers, thus making the detection process even more tedious. In order to detect a bomb threat effectively, a network of detectors are deployed.
When dealing with a network of detectors, research papers like Luo et al (1989) [3] and Kaplan et al. assume that the detectors work independently. In actual fact, detectors in a network are not completely independent, especially when their detection areas intersect with each other due to the disturbances in the same working environment. Thus, there is a need to investigate the dependency of detectors in threat areas so that “false” information cues gathered from detectors can be eliminated. |
author2 |
School of Mechanical and Aerospace Engineering |
author_facet |
School of Mechanical and Aerospace Engineering Loh, Swee Chye |
format |
Final Year Project |
author |
Loh, Swee Chye |
author_sort |
Loh, Swee Chye |
title |
Investigating the dependency of detectors in threat areas |
title_short |
Investigating the dependency of detectors in threat areas |
title_full |
Investigating the dependency of detectors in threat areas |
title_fullStr |
Investigating the dependency of detectors in threat areas |
title_full_unstemmed |
Investigating the dependency of detectors in threat areas |
title_sort |
investigating the dependency of detectors in threat areas |
publishDate |
2014 |
url |
http://hdl.handle.net/10356/60273 |
_version_ |
1759855808023101440 |