New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work is supported by the Spanish Ministerio de Economía and European FEDER under Projects EphemeCH (TIN2014-56494-C4-1-P) and DeepBIO (TIN2017-85 (2024)

11institutetext: C. Cotta 22institutetext: J.E. Gallardo 33institutetext: ETSI Informática, Universidad de Málaga, Campus de Teatinos, 29071 Málaga (Spain)
Tel.: +34 952137158 / +34 952132795
Fax: +34 952131397
33email: {ccottap,pepeg}@lcc.uma.es

Carlos Cotta  José E. Gallardo

(Received: date / Accepted: date)

Abstract

We consider an operational model of suicide bombing attacks –an increasingly prevalent formof terrorism– against specific targets, and the use of protective countermeasures based on the deploymentof detectors over the area under threat. These detectors have to be carefully located in order tominimize the expected number of casualties or the economic damage suffered, resulting in ahard optimization problem for which different metaheuristics have been proposed. Rather than assumingrandom decisions by the attacker, the problemis approached by considering different models of the latter, whereby he takes informeddecisions on which objective must be targeted and through which path it has to be reached basedon knowledge on the importance or value of the objectives or on the defensive strategy of the defender(a scenario that can be regarded as an adversarial game). We consider four different algorithms,namelya greedy heuristic, a hill climber, tabu search and an evolutionary algorithm, and study theirperformance on a broad collection of problem instances trying to resemble different realistic settingssuch as a coastal area, a modern urban area, and the historic core of an old town. It is shown thatthe adversarial scenario is harder for all techniques, and that the evolutionary algorithm seems toadapt better to the complexity of the resulting search landscape.

Keywords:

Suicide Bombing Optimal Detector Placement Greedy Heuristics Metaheuristics Decision Making

journal: Natural Computing

1 Introduction

The threat of international terrorism has been present for many decades now, but ever sincethe collapse of the Eastern bloc in the late 1980s and the subsequent end of the Cold War it has emergedas the major factor of instability and social disruption at a global scale, be it directly asa consequence of terrorist actions or indirectly as a result of the countermeasures requiredto prevent the former and the impact of these in our daily lives (not to mention themilitary operations targeting terrorist groups and regimes supporting them, which inthemselves contribute both to local turmoil and social unrest). Indeed, the newinternational environment arising from the end of the Atlantic/Easternbloc dialectic (e.g., easier and increased communications and travel, larger citizen mobility,etc.) and the technical advances that took place in the end of the 20th century were readilyexploited by terror groups to bring their criminal actions to a new level. As a response,democratic nations have typically engaged in a counterterrorist policy which can be describedwithin the framework of the 4Dstrategy (Central Intelligence Agency, 2003): Defeat (proactively attack the structure of terrorist organizations), Deny(precludethe access to any kind of support –political, financial, etc.– and resources for undergoingterrorist attacks), Diminish (minimize the underlying conditions that serve as a breedingground for the emergence of terrorists groups) and Defend (protect the society,the citizens and their interests).

We are particularly concerned here with the last of the four Ds, namelythe defensive component. This constitutes a challenge in light of thenon-conventional means used by terrorists to conduct their infamousactions. Most conspicuously, suicide bombings have established themselvesas a particularly important menace (Chicago Project on Security and Terrorism(2016), CPOST), given their lethality (they causeabout four time more casualties than other kinds of terrorist attacks(Rand Corporation, 2009; Edwards etal, 2016)), simplicity (their nature makes escaping logisticsand equipment for remote operation unneeded), and effectiveness ininstilling fear and cause social disruption (Hoffman, 2003).Defense from this kind of attacks (and from any other of terroristattack for that matter) is a highly cross-disciplinary endeavor that can beapproached from many points of views. One of them is undoubtedlythe understanding of these actions, not just of the means but also ofthe motivations. While the later can be contentious in nature, it canbe nevertheless approached at a meta-level, focusing not just on theprecise motivations but on the framework in which these motivationssubstantiate into actions. In this sense, there are two main schoolsof thought: the psychological-sociological and the political-rational approach(Ganor, 2011). While the former focus on social group dynamics and the psychologicalprofile of individuals, the latter views terrorism as a rational methodof operation for pursuing concrete political goals. Without denying theinterest of the former (which can be useful for, e.g., detecting radicalizationof particular individuals or understanding their activity patterns –see (Lara-Cabrera etal, 2017; Leistedt, 2016; Tutun etal, 2017)),the latter can be particularly interesting from a tactical point of view, that is,when it comes to implementing measures to make attacks unsuccessful. Indeed,many details of a terrorist attack can be dictated by rational calculationsand cost-benefit analysis, much like it would be done by a military staffor a corporate board (Blomberg etal, 2004).

In line with the previous line of reasoning, both the actions of the terroristsand the countermeasures taken to neutralize the former can be regarded asaimed to optimize (in different senses, obviously) some utility function, such asthe number of civilian casualties or the economic damage caused in theinfrastructures. Thisapproach has been precisely considered in some works in the literature. Thus,Nie etal (2007) considered –followingthe seminal work by Kaplan and Kress (2005)– the case of an area under threat of a suicidebombing attack and the deployment of some kind of sensors (tailored to detect traces ofexplosives in their proximity (Gares etal, 2016)) in order to protect specific known targets. To thisend, they proposed a branch-and-bound (BnB) algorithm and a greedy constructiveheuristic to determine the location of these sensors so as tominimize the casualties. This same approach was also appliedby Yan and Nie (2016) to a scenario involving maritime targets underthreat of small vessels. Following these results, Cotta and Gallardo (2017)approached the problem from the point of view of metaheuristics, showing thatthese could outperform the greedy heuristic and tackle problem scenariosuntenable for BnB.

One of the central tenets of these works was a simplistic assumptionon the strategy of the terrorist (whom we should refer to in the following asattacker) whereby the target would be randomly selected. In somesense, this could capture a total-ignorance scenario in which the defensiveforces (the defender in the following) are oblivious to the attacker’sstrategy and so is the attacker with respect to the importance of each targetor the defender’s strategy. We here challenge this assumption and considerother scenarios in this regard, and how these impact the resultingoptimization task for the greedy heuristic and several metaheuristics.Before presenting these algorithms and the experimental setup,let us firstly describe in detail the underlying problem, and how the strategyfor decision-taking is established. This is done in nextsection.

2 Definition of the Problem

As anticipated in the previous section, the main point under scrutiny in this work is thestrategy followed by the attacker in order to select a target. Before describing how wehave modelled the latter, let us firstly describe the basic setting of the model considered.

2.1 Basic Setting

Our goal is to protect a given area under threat, strategically placing detectors insome points in order to detect and neutralize attackers. To this end, we assume thisarea is discretized into a rectangular grid A={Aij}m×n𝐴subscriptsubscript𝐴𝑖𝑗𝑚𝑛{A}=\{A_{ij}\}_{m\times n}italic_A = { italic_A start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m × italic_n end_POSTSUBSCRIPT. This discretizationallows to determine which portions of the area (to which we shall refer to in the followingas map) are walkable (or from a more general point of view, accessible)and which ones are inaccessible. The former representopen spaces through which the attacker can pass and in which we could also place adetector. As to the latter, they represent any physical obstruction (walls, buildings, streetfurniture, etc.) that cannot be traversed by the attacker. Some positions in the map willalso represent objectives or targets, that is, sensitive points in which a certain numberof individuals are present and that may be subject to attack. Access to the map is done throughspecific positions or entrances, which are typically placed in the boundaries of the grid(but that could in principle be placed anywhere on the grid – think for example in anunderground passage or metro entrance). Given a certain entrance and a certainobjective, the attacker is assumed to follow a shortest path between these twopoints (Nie etal, 2007; Kim etal, 2016), using the center of grid cells aspotential waypoints, and avoiding any path intersecting with a blocked (i.e., inaccessible)cell of the grid – see (Cotta and Gallardo, 2017) for a brief discussion on these assumptions.In this context, it is easy to construct a weighted graph from a given map, in which verticesrepresent grid positions, edges indicate direct accessibility (i.e., the attacker could walkbetween these two points in a straight line without intersecting an obstacle), and edgeweights correspond to distances. This graph can in turn be used to compute shortest pathsfrom entrances to objectives, e.g., using Dijkstra’s algorithm or any other suitable method.

ε𝜀\varepsilonitalic_εnumber of entranceseisubscript𝑒𝑖e_{i}italic_e start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPTthe i𝑖iitalic_i-th entrance
ϕitalic-ϕ\phiitalic_ϕnumber of objectivesojsubscript𝑜𝑗o_{j}italic_o start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPTthe j𝑗jitalic_j-th objective
δ𝛿\deltaitalic_δnumber of detectorsdksubscript𝑑𝑘d_{k}italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPTthe k𝑘kitalic_k-th detector
v𝑣vitalic_vspeed of the attackertnsubscript𝑡𝑛t_{n}italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPTtime required to neutralize
η𝜂\etaitalic_ηdetector’s instantaneous detection rateθ𝜃\thetaitalic_θprobability of neutralization
Pijsubscript𝑃𝑖𝑗P_{ij}italic_P start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPTthe path between entrance eisubscript𝑒𝑖e_{i}italic_e start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and objective ojsubscript𝑜𝑗o_{j}italic_o start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPTP¯ijsubscript¯𝑃𝑖𝑗\bar{P}_{ij}over¯ start_ARG italic_P end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPTportion of Pijsubscript𝑃𝑖𝑗P_{ij}italic_P start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT in which neutralization is still possible.
lijksubscript𝑙𝑖𝑗𝑘l_{ijk}italic_l start_POSTSUBSCRIPT italic_i italic_j italic_k end_POSTSUBSCRIPTportion of P¯ijsubscript¯𝑃𝑖𝑗\bar{P}_{ij}over¯ start_ARG italic_P end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT inside the detection radius of detector dksubscript𝑑𝑘d_{k}italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPTpijksubscript𝑝𝑖𝑗𝑘p_{ijk}italic_p start_POSTSUBSCRIPT italic_i italic_j italic_k end_POSTSUBSCRIPTprobability of dksubscript𝑑𝑘d_{k}italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT detecting the attacker through P¯ijsubscript¯𝑃𝑖𝑗\bar{P}_{ij}over¯ start_ARG italic_P end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT
D~ijsubscript~𝐷𝑖𝑗\tilde{D}_{ij}over~ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPTprobability of non-detection along Pijsubscript𝑃𝑖𝑗P_{ij}italic_P start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPTCjsubscript𝐶𝑗C_{j}italic_C start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPTpopulation at objective ojsubscript𝑜𝑗o_{j}italic_o start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT
Wijsubscript𝑊𝑖𝑗W_{ij}italic_W start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPTexpected number of casualties for Pijsubscript𝑃𝑖𝑗P_{ij}italic_P start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPTγijsubscript𝛾𝑖𝑗\gamma_{ij}italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPTprobability that the attacker picks Pijsubscript𝑃𝑖𝑗P_{ij}italic_P start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT
New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work issupported by the Spanish Ministerio de Economía and European FEDER underProjects EphemeCH (TIN2014-56494-C4-1-P) andDeepBIO (TIN2017-85727-C4-1-P).††thanks: This document is a preprint of Cotta, C., Gallardo, J.E. New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics. Nat Comput 18, 249–263 (2019). https://doi.org/10.1007/s11047-018-9710-1 (1)

As mentioned before, the defense strategy is to place some detectors d1,,dδsubscript𝑑1subscript𝑑𝛿d_{1},\dots,d_{\delta}italic_d start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_d start_POSTSUBSCRIPT italic_δ end_POSTSUBSCRIPTon the map. Each of these detectors is characterized by a detection radius τ𝜏\tauitalic_τ, meaning thatany attacker path intersecting the circle of radius τ𝜏\tauitalic_τcentered at the detector is prone to fire an alarmthat would elicit a neutralization response. Both events, alarm firing and neutralization are notdeterministic in order to capture detector reliability and neutralization effectiveness respectively.More precisely, the alarm is fired with a probability that will be larger the longer the section of the pathincluded in this detection circle, and the subsequent neutralization attempt will be successfulwith some probability θ𝜃\thetaitalic_θ. This can be formalized as follows (see Table1 foran overview of the notation used): let Pijsubscript𝑃𝑖𝑗P_{ij}italic_P start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT be the shortest pathbetween the i𝑖iitalic_i-th (out of ε𝜀\varepsilonitalic_ε) entrance eisubscript𝑒𝑖e_{i}italic_e start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and the j𝑗jitalic_j-th (out of ϕitalic-ϕ\phiitalic_ϕ) objective ojsubscript𝑜𝑗o_{j}italic_o start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT;if the attacker was too close to the objective within this path, no neutralization would be possible(he would reach the target before the enforcing agents could get to him), so let P¯ijsubscript¯𝑃𝑖𝑗\bar{P}_{ij}over¯ start_ARG italic_P end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT bethe portion of the path Pijsubscript𝑃𝑖𝑗P_{ij}italic_P start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT in which neutralization is still possible (assuming the attacker moves atspeed v𝑣vitalic_v and that tnsubscript𝑡𝑛t_{n}italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT seconds are required to neutralize him (Kaplan and Kress, 2005), this amountsto detracting a segment of lengthvtn𝑣subscript𝑡𝑛vt_{n}italic_v italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT from the end of Pijsubscript𝑃𝑖𝑗P_{ij}italic_P start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT). For each detector dksubscript𝑑𝑘d_{k}italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, let lijksubscript𝑙𝑖𝑗𝑘l_{ijk}italic_l start_POSTSUBSCRIPT italic_i italic_j italic_k end_POSTSUBSCRIPT be the portion of P¯ijsubscript¯𝑃𝑖𝑗\bar{P}_{ij}over¯ start_ARG italic_P end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPTsubject to detection by dksubscript𝑑𝑘d_{k}italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT (see Figure1 for an illustration), an event that will take place with probability

pijk=1exp(ηlijk)subscript𝑝𝑖𝑗𝑘1𝜂subscript𝑙𝑖𝑗𝑘p_{ijk}=1-\exp(-\eta l_{ijk})italic_p start_POSTSUBSCRIPT italic_i italic_j italic_k end_POSTSUBSCRIPT = 1 - roman_exp ( - italic_η italic_l start_POSTSUBSCRIPT italic_i italic_j italic_k end_POSTSUBSCRIPT )(1)

where η>0𝜂0\eta>0italic_η > 0 is the detector’s instantaneous detection rate. Following (Nie etal, 2007), detectorswork independently of one another, and therefore the totalprobability of non-detection D~ijsubscript~𝐷𝑖𝑗\tilde{D}_{ij}over~ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT for path Pijsubscript𝑃𝑖𝑗P_{ij}italic_P start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT is

D~ij=k=1δ(1pijk)=k=1δexp(ηlijk)=exp(ηk=1δlijk)subscript~𝐷𝑖𝑗superscriptsubscriptproduct𝑘1𝛿1subscript𝑝𝑖𝑗𝑘superscriptsubscriptproduct𝑘1𝛿𝜂subscript𝑙𝑖𝑗𝑘𝜂superscriptsubscript𝑘1𝛿subscript𝑙𝑖𝑗𝑘\tilde{D}_{ij}=\prod_{k=1}^{\delta}(1-p_{ijk})=\prod_{k=1}^{\delta}\exp(-\eta l%_{ijk})=\exp(-\eta\sum_{k=1}^{\delta}l_{ijk})over~ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = ∏ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_δ end_POSTSUPERSCRIPT ( 1 - italic_p start_POSTSUBSCRIPT italic_i italic_j italic_k end_POSTSUBSCRIPT ) = ∏ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_δ end_POSTSUPERSCRIPT roman_exp ( - italic_η italic_l start_POSTSUBSCRIPT italic_i italic_j italic_k end_POSTSUBSCRIPT ) = roman_exp ( - italic_η ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_δ end_POSTSUPERSCRIPT italic_l start_POSTSUBSCRIPT italic_i italic_j italic_k end_POSTSUBSCRIPT )(2)

In this case (non-detection) or in case the attacker is detected but not effectivelyneutralized (something that willhappen with probability 1θ1𝜃1-\theta1 - italic_θ), the attacker will reachthe objective ojsubscript𝑜𝑗o_{j}italic_o start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT causing a number of casualties Cjsubscript𝐶𝑗C_{j}italic_C start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT. Thus,the expected number ofcasualties Wijsubscript𝑊𝑖𝑗W_{ij}italic_W start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT for this particular path will be

Wij=D~ijCj+(1D~ij)(1θ)Cj=Cj[D~ijθ+(1θ)]subscript𝑊𝑖𝑗subscript~𝐷𝑖𝑗subscript𝐶𝑗1subscript~𝐷𝑖𝑗1𝜃subscript𝐶𝑗subscript𝐶𝑗delimited-[]subscript~𝐷𝑖𝑗𝜃1𝜃W_{ij}=\tilde{D}_{ij}C_{j}+(1-\tilde{D}_{ij})(1-\theta)C_{j}=C_{j}\left[\tilde%{D}_{ij}\theta+(1-\theta)\right]italic_W start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = over~ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT italic_C start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT + ( 1 - over~ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT ) ( 1 - italic_θ ) italic_C start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = italic_C start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT [ over~ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT italic_θ + ( 1 - italic_θ ) ](3)

The total expected number of casualties will take into account allpossible paths Pijsubscript𝑃𝑖𝑗P_{ij}italic_P start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT the attacker can take, that is, betweenany entrance eisubscript𝑒𝑖e_{i}italic_e start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and objective ojsubscript𝑜𝑗o_{j}italic_o start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT. To estimate this, let γijsubscript𝛾𝑖𝑗\gamma_{ij}italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPTbe the probability the attacker chose a particular path Pijsubscript𝑃𝑖𝑗P_{ij}italic_P start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT. Then,

W=i=1εj=1ϕγijWij𝑊superscriptsubscript𝑖1𝜀superscriptsubscript𝑗1italic-ϕsubscript𝛾𝑖𝑗subscript𝑊𝑖𝑗W=\sum_{i=1}^{\varepsilon}\sum_{j=1}^{\phi}\gamma_{ij}W_{ij}italic_W = ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_ε end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_ϕ end_POSTSUPERSCRIPT italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT italic_W start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT(4)

Next section will consider different scenarios depending on the particular modelizationof values γijsubscript𝛾𝑖𝑗\gamma_{ij}italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT, which capture the strategy used by the attacker to selecta particular course of action.

2.2 Tackling Decision Making

The choice of values γijsubscript𝛾𝑖𝑗\gamma_{ij}italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT can be used to prioritize some targets and paths above others, and hence embodiesthe decision-making process done by the attacker. In previous works, i.e., (Nie etal, 2007; Yan and Nie, 2016; Cotta and Gallardo, 2017),a very simple approach was considered, namely that the attacker would pick with constant uniform probability any of these paths, thatis,

γij=1εϕ.subscript𝛾𝑖𝑗1𝜀italic-ϕ\gamma_{ij}=\frac{1}{\varepsilon\phi}.italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = divide start_ARG 1 end_ARG start_ARG italic_ε italic_ϕ end_ARG .(5)

This can be regarded as a completely blind strategy in which the attacker isfully oblivious to both the damage that can be inflicted by targeting a particular objective or by the potential countermeasurestaken by the defenders, and hence can be arguably considered as unrealistic. To tackle this issue, let us consider moreinformed strategies that take the previous points into account.

Let us firstly focus on the importance of each of the objectives. From the point of view of the attacker this is capturedby values Cjsubscript𝐶𝑗C_{j}italic_C start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT that indicate the population at objective ojsubscript𝑜𝑗o_{j}italic_o start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT (but that in a more general context could be also used to modelany other feature of objectives whereby their targeting would be valuable for the attacker). An objective-aware strategy wouldthus preferably pick objectives of higher value over those with lower value. This can be done in a variety of ways, bothfrom a qualitative point of view (considering the actual values Cjsubscript𝐶𝑗C_{j}italic_C start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT or only their relative importance as in, e.g., their positionin a ranked list) and from a quantitative point of view (given a certain prioritization index, how these are mapped to actualprobabilities, thus determining how much preference is given to any objective). As a first step, in this work we have considereda strategy based on using the actual values Cjsubscript𝐶𝑗C_{j}italic_C start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT and defining a proportional selection scheme based on these, i.e.,

γij=Cjεk=1ϕCksubscript𝛾𝑖𝑗subscript𝐶𝑗𝜀superscriptsubscript𝑘1italic-ϕsubscript𝐶𝑘\gamma_{ij}=\frac{C_{j}}{\varepsilon\sum_{k=1}^{\phi}C_{k}}italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = divide start_ARG italic_C start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG italic_ε ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_ϕ end_POSTSUPERSCRIPT italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG(6)

Thus, any objective ojsubscript𝑜𝑗o_{j}italic_o start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT will be targeted with a probability pj=i=1εγij=Cj/Csubscript𝑝𝑗superscriptsubscript𝑖1𝜀subscript𝛾𝑖𝑗subscript𝐶𝑗𝐶p_{j}=\sum_{i=1}^{\varepsilon}\gamma_{ij}=C_{j}/Citalic_p start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_ε end_POSTSUPERSCRIPT italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = italic_C start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT / italic_C, whereC=k=1ϕCk𝐶superscriptsubscript𝑘1italic-ϕsubscript𝐶𝑘C=\sum_{k=1}^{\phi}C_{k}italic_C = ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_ϕ end_POSTSUPERSCRIPT italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is the combined value of all objectives, i.e., pjCjproportional-tosubscript𝑝𝑗subscript𝐶𝑗p_{j}\propto C_{j}italic_p start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∝ italic_C start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT, being all paths to thisobjective equiprobable (again, more sophisticated strategies could be thought of here, but we initially assume this forsimplicity).

Going one step beyond, let us consider awareness by the attacker of the presence of detectors. A game-theory perspectivewould be possible here, by considering that the attacker would select values γijsubscript𝛾𝑖𝑗\gamma_{ij}italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT to maximize his benefit (theinflicted damage) given whatever knowledge he has about the position of the detectors (or more generally about the strategyused by the defender to place these), and the defender would in turn place the detectors to minimize his loss given the knowledgehe has about the attacker strategy. If we define W[Γ,Δ]𝑊ΓΔW[\Gamma,\Delta]italic_W [ roman_Γ , roman_Δ ] to be the total number of casualties implied by a particular collectionΓΓ\Gammaroman_Γ of values γijsubscript𝛾𝑖𝑗\gamma_{ij}italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT and a particular placement ΔΔ\Deltaroman_Δ of the detectors (i.e., a version of Equation4 parameterized by ΓΓ\Gammaroman_Γand ΔΔ\Deltaroman_Δ), we can see that the solution (Γ,Δ)superscriptΓsuperscriptΔ(\Gamma^{*},\Delta^{*})( roman_Γ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT , roman_Δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT )given by

ΓsuperscriptΓ\displaystyle\Gamma^{*}roman_Γ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT=\displaystyle==argmaxΓ(W[Γ,Δ])Γargmax𝑊ΓsuperscriptΔ\displaystyle\underset{\Gamma}{\operatorname*{arg\,max}}{\left(W[\Gamma,\Delta%^{*}]\right)}underroman_Γ start_ARG roman_arg roman_max end_ARG ( italic_W [ roman_Γ , roman_Δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ] )(7)
ΔsuperscriptΔ\displaystyle\Delta^{*}roman_Δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT=\displaystyle==argminΔ(W[Γ,Δ])Δargmin𝑊superscriptΓΔ\displaystyle\underset{\Delta}{\operatorname*{arg\,min}}{\left(W[\Gamma^{*},%\Delta]\right)}underroman_Δ start_ARG roman_arg roman_min end_ARG ( italic_W [ roman_Γ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT , roman_Δ ] )(8)

defines a Nash equilibrium state: given a certain location ΔsuperscriptΔ\Delta^{*}roman_Δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT of the detectors, any different choice of values γijsubscript𝛾𝑖𝑗\gamma_{ij}italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPTwould result is less damage (i.e., a loss for the attacker), and conversely given the attacker’s strategy any other placement of thedetectors would result in larger damage (i.e., a loss for the defender). Notice however that we are adopting here the position of thedefender, and in principle it is not realistic to assume perfect knowledge of the attacker (although we can assume as a worst case scenario that the attackerhas indeed this knowledge about the defender). Thus, if we place detectors at positions given by ΔΔ\Deltaroman_Δ, we can assume that the attacker wouldpick ΓΓ\Gammaroman_Γ to inflict the highest damage as indicated by Equation7. It then follows that we should pick

Δ=argminΔ(maxΓ(W[Γ,Δ]))superscriptΔΔargminΓ𝑊ΓΔ\Delta^{\circ}=\underset{\Delta}{\operatorname*{arg\,min}}{\left(\underset{%\Gamma}{\max}(W[\Gamma,\Delta])\right)}roman_Δ start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT = underroman_Δ start_ARG roman_arg roman_min end_ARG ( underroman_Γ start_ARG roman_max end_ARG ( italic_W [ roman_Γ , roman_Δ ] ) )(9)

In order to compute the term inside the outer parentheses in the previous equation we could exploit the fact that W[Γ,Δ]𝑊ΓΔW[\Gamma,\Delta]italic_W [ roman_Γ , roman_Δ ] is linearin values γijsubscript𝛾𝑖𝑗\gamma_{ij}italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT and solve a linear program given by

maxW[Γ,Δ]=maxi=1εj=1ϕγijW[Δ]ij𝑊ΓΔsuperscriptsubscript𝑖1𝜀superscriptsubscript𝑗1italic-ϕsubscript𝛾𝑖𝑗𝑊subscriptdelimited-[]Δ𝑖𝑗\max W[\Gamma,\Delta]=\max\sum_{i=1}^{\varepsilon}\sum_{j=1}^{\phi}\gamma_{ij}%W[\Delta]_{ij}roman_max italic_W [ roman_Γ , roman_Δ ] = roman_max ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_ε end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_ϕ end_POSTSUPERSCRIPT italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT italic_W [ roman_Δ ] start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT(10)

subject to

i=1εj=1ϕγijsuperscriptsubscript𝑖1𝜀superscriptsubscript𝑗1italic-ϕsubscript𝛾𝑖𝑗\displaystyle\sum_{i=1}^{\varepsilon}\sum_{j=1}^{\phi}\gamma_{ij}∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_ε end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_ϕ end_POSTSUPERSCRIPT italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT=\displaystyle==11\displaystyle 11(11)
0γij0subscript𝛾𝑖𝑗\displaystyle 0\leqslant\gamma_{ij}0 ⩽ italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT\displaystyle\leqslant1i{1,,ε},j{1,,ϕ}formulae-sequence1for-all𝑖1𝜀𝑗1italic-ϕ\displaystyle 1\qquad\forall i\in\{1,\dots,\varepsilon\},j\in\{1,\dots,\phi\}1 ∀ italic_i ∈ { 1 , … , italic_ε } , italic_j ∈ { 1 , … , italic_ϕ }(12)

where W[Δ]ij𝑊subscriptdelimited-[]Δ𝑖𝑗W[\Delta]_{ij}italic_W [ roman_Δ ] start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT is the value given by Equation3 parameterized by ΔΔ\Deltaroman_Δ. We do not need to use a linear programmingsolver though, since the solution to Equation10 can be shown to be

γij={1W[Δ]ij=maxij(W[Δ]ij)0otherwisesubscript𝛾𝑖𝑗cases1𝑊subscriptdelimited-[]Δ𝑖𝑗superscript𝑖superscript𝑗𝑊subscriptdelimited-[]Δsuperscript𝑖superscript𝑗0otherwise\gamma_{ij}=\begin{cases}1&W[\Delta]_{ij}=\underset{i^{\prime}j^{\prime}}{\max%}{(W[\Delta]_{i^{\prime}j^{\prime}})}\\0&{\rm otherwise}\end{cases}italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = { start_ROW start_CELL 1 end_CELL start_CELL italic_W [ roman_Δ ] start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = start_UNDERACCENT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT italic_j start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_UNDERACCENT start_ARG roman_max end_ARG ( italic_W [ roman_Δ ] start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT italic_j start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ) end_CELL end_ROW start_ROW start_CELL 0 end_CELL start_CELL roman_otherwise end_CELL end_ROW(13)

i.e., the probability would be concentrated on the path that leads to the largest expected number of casualties (which we shall termthe critical path) given thecurrent distribution ΔΔ\Deltaroman_Δ of detectors.This follows easily from the fact that W[Γ,Δ]𝑊ΓΔW[\Gamma,\Delta]italic_W [ roman_Γ , roman_Δ ] is a convex combination of values W[Δ]ij𝑊subscriptdelimited-[]Δ𝑖𝑗W[\Delta]_{ij}italic_W [ roman_Δ ] start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT. Let i,jsuperscript𝑖superscript𝑗i^{\circ},j^{\circ}italic_i start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT , italic_j start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT be the indicescorresponding to the critical path (i.e, γij=1,γij=0formulae-sequencesubscript𝛾superscript𝑖superscript𝑗1subscript𝛾𝑖𝑗0\gamma_{i^{\circ}j^{\circ}}=1,\gamma_{ij}=0italic_γ start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT italic_j start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT = 1 , italic_γ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = 0 otherwise).The resulting value of Equation10 for this solution would be W[Δ]ij𝑊subscriptdelimited-[]Δsuperscript𝑖superscript𝑗W[\Delta]_{i^{\circ}j^{\circ}}italic_W [ roman_Δ ] start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT italic_j start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT, which by virtue of Equation13 is no smallerthan any other W[Δ]ij𝑊subscriptdelimited-[]Δ𝑖𝑗W[\Delta]_{ij}italic_W [ roman_Δ ] start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT, i,ji,jformulae-sequence𝑖𝑗superscript𝑖superscript𝑗i,j\neq i^{\circ},j^{\circ}italic_i , italic_j ≠ italic_i start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT , italic_j start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT. Thus, for any other alternative solution with γij=1αsubscript𝛾superscript𝑖superscript𝑗1𝛼\gamma_{i^{\circ}j^{\circ}}=1-\alphaitalic_γ start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT italic_j start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT = 1 - italic_α, 0<α10𝛼10<\alpha\leqslant 10 < italic_α ⩽ 1,we would have the objective function decreased by αW[Δ]ij𝛼𝑊subscriptdelimited-[]Δsuperscript𝑖superscript𝑗\alpha W[\Delta]_{i^{\circ}j^{\circ}}italic_α italic_W [ roman_Δ ] start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT italic_j start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT and increased at most byαW[Δ]ij𝛼𝑊subscriptdelimited-[]Δsuperscript𝑖superscript𝑗\alpha W[\Delta]_{i^{\prime}j^{\prime}}italic_α italic_W [ roman_Δ ] start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT italic_j start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT where W[Δ]ij𝑊subscriptdelimited-[]Δsuperscript𝑖superscript𝑗W[\Delta]_{i^{\prime}j^{\prime}}italic_W [ roman_Δ ] start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT italic_j start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT is the second largest expected number of casualties, and hence the resulting value of the objectivefunction would be reduced.

Computing the global minimum as per Equation9 is not trivial, and will be dealt with in next section via heuristic approaches.Let us anyway assume that we have found this ΔsuperscriptΔ\Delta^{\circ}roman_Δ start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT, and let Γ[Δ]Γdelimited-[]superscriptΔ\Gamma[\Delta^{\circ}]roman_Γ [ roman_Δ start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT ] be the corresponding path probabilities followingEquation13. We can see that in purity the state given by (Γ[Δ],Δ)Γdelimited-[]superscriptΔsuperscriptΔ(\Gamma[\Delta^{\circ}],\Delta^{\circ})( roman_Γ [ roman_Δ start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT ] , roman_Δ start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT ) is not a Nash equilibrium point: if ΔsuperscriptΔ\Delta^{\circ}roman_Δ start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT isfixed it is certainly the case that the attacker would not benefit from picking different path probabilities as shown before; however,taking these path probabilities as fixed, the defender could in general reduce the damage by relocating the detectors so as to have bettercoverage of the critical path. This may result in this path no longer being the critical path, hence implying the attacker would pick adifferent ΓΓ\Gammaroman_Γ; therefore, in general there may not be a Nash equilibrium. At any rate, this point (Γ[Δ],Δ)Γdelimited-[]superscriptΔsuperscriptΔ(\Gamma[\Delta^{\circ}],\Delta^{\circ})( roman_Γ [ roman_Δ start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT ] , roman_Δ start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT ) does indeed capture some kind of equilibrium, were we toassume that the attacker knows the defender’s strategy, namely that the worst-case casualties are to be minimized without taking any risksand vice versa, i.e., thedefender knows the attacker will act accordingly to maximize his goals, each one being also aware of their own strategy being known bythe opponent.

3 Materials and Methods

In light of the problem setting defined in the previous section, we need to solvethe problem from the perspective of the defender by defining the locationof each of the detectors. This will be done by using different (meta)heuristic approachesas shown below. In all cases, the objective will be minimizing Equation4, namelythe expected number of casualties W[Γ,Δ]𝑊ΓΔW[\Gamma,\Delta]italic_W [ roman_Γ , roman_Δ ]. As shown before, this quantity depends on thelocation of the detectors ΔΔ\Deltaroman_Δ (which is the actual degree of freedom of the formula, that is,the part of the equation that will be decided by the optimization algorithm) and thepath probabilities ΓΓ\Gammaroman_Γ (which will be given by any of the two scenarios depicted before,that is, fixed and known in advance to be proportional to the importance of each objective,or variable and known to correspond to the critical path implied by the current locationof detectors). Next we will provide more details about the algorithms considered forthis optimization endeavor, as well as about the benchmark we have used to test these.

3.1 Algorithmic Approaches

In this section we describe different algorithmic approaches that we have considered in order to tackle the problem, namely a Greedy Algorithm, a Local Search Procedure, a Tabu Search Metaheuristic and an Evolutionary Algorithm.

In all cases, the computational cost needed to evaluate a solution can be significantly reduced if some preprocessing is done over the problem instance being considered before starting the optimization process itself. This preprocessing is the same for all the algorithms and thus affects in the same way their performances.More precisely, a cache memory has been precomputed corresponding to the length of the segment of a path that would be detected in case a detector were placed at a specific cell in the map. These intersecting lengths are independently stored for each possible path going from one of the entrances in the map to one of the objectives. Besides, a dominance memory Δ={Δij}m×nΔsubscriptsubscriptΔ𝑖𝑗𝑚𝑛{\Delta}=\{\Delta_{ij}\}_{m\times n}roman_Δ = { roman_Δ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m × italic_n end_POSTSUBSCRIPT is also used to prune to some extent the search space that should be explored in order to optimize an specific instance. The implementations of both of these memories are more precisely described in (Cotta and Gallardo, 2017) and we refer the reader to that work for full details.

3.2 Greedy Algorithm

The algorithm described in this section (denoted as Greedy) corresponds to the one originally proposed by Nie etal (2007). This algorithm is a constructive method hence it places on the map the δ𝛿\deltaitalic_δdetectors one after the other. The extension of the current partial solution is done by adding on each step the detector which leads to a better local extension.

Input: δ𝛿\deltaitalic_δ(number of detectors to be placed)

1 𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠:={(r,c)| 1rm,1cn,Arc\mathit{candidates}:=\{(r,c)\ |\ 1\leqslant r\leqslant m,1\leqslant c\leqslantn%,A_{rc}italic_candidates := { ( italic_r , italic_c ) | 1 ⩽ italic_r ⩽ italic_m , 1 ⩽ italic_c ⩽ italic_n , italic_A start_POSTSUBSCRIPT italic_r italic_c end_POSTSUBSCRIPT is unblocked ,Δr,c<δ},\Delta_{r,c}<\delta\}, roman_Δ start_POSTSUBSCRIPT italic_r , italic_c end_POSTSUBSCRIPT < italic_δ };

2 𝑠𝑜𝑙:=assign𝑠𝑜𝑙\mathit{sol}:=\varnothingitalic_sol := ∅;

3while𝑙𝑒𝑛𝑔𝑡ℎ(𝑠𝑜𝑙)<δ𝑙𝑒𝑛𝑔𝑡ℎ𝑠𝑜𝑙𝛿\mathit{length}(\mathit{sol})<\deltaitalic_length ( italic_sol ) < italic_δdo

4 𝑓𝑖𝑡𝑛𝑒𝑠𝑠:=assignsuperscript𝑓𝑖𝑡𝑛𝑒𝑠𝑠\mathit{fitness}^{*}:=\inftyitalic_fitness start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT := ∞;

5𝑑𝑒𝑡𝑒𝑐𝑡𝑜𝑟:=nullassignsuperscript𝑑𝑒𝑡𝑒𝑐𝑡𝑜𝑟null\mathit{detector}^{*}:=\mathrm{null}italic_detector start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT := roman_null;

6ford𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠𝑑𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠d\in\mathit{candidates}italic_d ∈ italic_candidatesdo

7𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒:=𝑠𝑜𝑙+{d}assign𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒𝑠𝑜𝑙𝑑\mathit{tentative}:=\mathit{sol}+\{d\}italic_tentative := italic_sol + { italic_d };

8if𝑣𝑎𝑙𝑢𝑒(𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒)<𝑓𝑖𝑡𝑛𝑒𝑠𝑠𝑣𝑎𝑙𝑢𝑒𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒superscript𝑓𝑖𝑡𝑛𝑒𝑠𝑠\mathit{value}(\mathit{tentative})<\mathit{fitness}^{*}italic_value ( italic_tentative ) < italic_fitness start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPTthen

9𝑑𝑒𝑡𝑒𝑐𝑡𝑜𝑟:=dassignsuperscript𝑑𝑒𝑡𝑒𝑐𝑡𝑜𝑟𝑑\mathit{detector}^{*}:=ditalic_detector start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT := italic_d;

10𝑓𝑖𝑡𝑛𝑒𝑠𝑠:=𝑣𝑎𝑙𝑢𝑒(𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒)assignsuperscript𝑓𝑖𝑡𝑛𝑒𝑠𝑠𝑣𝑎𝑙𝑢𝑒𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒\mathit{fitness}^{*}:=\mathit{value}(\mathit{tentative})italic_fitness start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT := italic_value ( italic_tentative );

11

12 end if

13

14 end for

15𝑠𝑜𝑙:=𝑠𝑜𝑙+{𝑑𝑒𝑡𝑒𝑐𝑡𝑜𝑟}assign𝑠𝑜𝑙𝑠𝑜𝑙superscript𝑑𝑒𝑡𝑒𝑐𝑡𝑜𝑟\mathit{sol}:=\mathit{sol}+\{\mathit{detector}^{*}\}italic_sol := italic_sol + { italic_detector start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT };

16𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠:=𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠{𝑑𝑒𝑡𝑒𝑐𝑡𝑜𝑟}assign𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠superscript𝑑𝑒𝑡𝑒𝑐𝑡𝑜𝑟\mathit{candidates}:=\mathit{candidates}\setminus\{\mathit{detector}^{*}\}italic_candidates := italic_candidates ∖ { italic_detector start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT };

17

18 end while

19return 𝑠𝑜𝑙𝑠𝑜𝑙\mathit{sol}italic_sol;

The corresponding pseudo-code is shown in Algorithm1.Firstly, all non-blocked cells in themap minus those that are dominated by at least δ𝛿\deltaitalic_δcells are taken as potential detector placements (line 1).Then, starting from an empty solution (line 2), the δ𝛿\deltaitalic_δdetectorsare added to the current partial solution (𝑠𝑜𝑙𝑠𝑜𝑙\mathit{sol}italic_sol) one at a time (lines 3-15).On each iteration, the candidate detector whoseincorporation leads to the best extended solution –i.e., the one locally minimizing the total number of casualties given the current location of detectors and the attacker model considered– is selected (lines 6-12), added to the solution (line 13) and removed from the set of candidate detectors (line 14).

As a greedy algorithm, this procedure makes different locally optimal decisions andhence the resulting final solution cannot be guaranteed to result optimal.

3.3 Hill Climbing

We also consider a Hill Climbing (HC) Local Search algorithm. In contrast to constructive methods –such as the Greedy method described above– which work with a partial solution, these algorithms work with a complete solution during the optimization process (Aarts and Lenstra, 1997; Hoos and Stützle, 2005). A crucial concept here is that of neighborhood which refers to the set of solutions which can be obtained from current one by modifying one part of the solution. The algorithm starts from a complete solution that should be constructed somehow. Subsequently, solutions in the neighborhood of the current one are examined and evaluated and a move towards one of these is performed in case the quality of such solution improves the current one. This process will be repeated until no solution in the neighborhood of the current one provides any improvement. At this point, a local optimum to the problem has been found and is returned. The whole process can be iterated starting from different initial solutions until the allowed execution time is exhausted, returning the best found solution at the end.

The pseudo-code for this procedure is shown in Algorithm2. sol𝑠𝑜𝑙solitalic_s italic_o italic_l stands for a complete solution, implemented as avector of different locations for placing the detectors. The algorithm explores the neighborhood of the current solution by substituting one detector locationin the current solution by each of the unused candidate locations for the problem instance(Replace(𝑠𝑜𝑙,i,d)Replace𝑠𝑜𝑙𝑖𝑑\textsc{Replace}(\mathit{sol},i,d)Replace ( italic_sol , italic_i , italic_d ) denotes the solution that is obtained by replacing the i𝑖iitalic_i-thdetector in solution 𝑠𝑜𝑙𝑠𝑜𝑙\mathit{sol}italic_sol by the alternative detector d𝑑ditalic_d – see line 7). Then the best modified solution is selected (lines 8-11). If this selected solution is better than the current one, a move is done towards the new solution (line 9) and an improvement has been achieved (line 10). Starting from this improved solution, the same procedure is done for the remaining detectors, and this process is repeated until a local optimum is reached, i.e., when no further improvement is possible.

Input: 𝑠𝑜𝑙𝑠𝑜𝑙\mathit{sol}italic_sol (a collection with the coordinates of δ𝛿\deltaitalic_δdetectors)

1 𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠:={(r,c)| 1rm,1cn,Arc\mathit{candidates}:=\{(r,c)\ |\ 1\leqslant r\leqslant m,1\leqslant c\leqslantn%,A_{rc}italic_candidates := { ( italic_r , italic_c ) | 1 ⩽ italic_r ⩽ italic_m , 1 ⩽ italic_c ⩽ italic_n , italic_A start_POSTSUBSCRIPT italic_r italic_c end_POSTSUBSCRIPT is unblocked,Δrc<δ},\Delta_{rc}<\delta\}, roman_Δ start_POSTSUBSCRIPT italic_r italic_c end_POSTSUBSCRIPT < italic_δ };

2𝑖𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡:=trueassign𝑖𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡true\mathit{improvement}:=\mathrm{true}italic_improvement := roman_true;

3whileimprovementimprovement\mathrm{improvement}roman_improvementdo

4𝑖𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡:=falseassign𝑖𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡false\mathit{improvement}:=\mathrm{false}italic_improvement := roman_false;

5fori:=1assign𝑖1i:=1italic_i := 1 to 𝑙𝑒𝑛𝑔𝑡ℎ(𝑠𝑜𝑙)𝑙𝑒𝑛𝑔𝑡ℎ𝑠𝑜𝑙\mathit{length}(\mathit{sol})italic_length ( italic_sol )do

6ford(𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠{d|d𝑠𝑜𝑙})𝑑𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠conditional-set𝑑𝑑𝑠𝑜𝑙d\in(\mathit{candidates}\setminus\{d\,|\,d\in\mathit{sol}\})italic_d ∈ ( italic_candidates ∖ { italic_d | italic_d ∈ italic_sol } )do

7 𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒:=Replace(𝑠𝑜𝑙,i,d)assign𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒Replace𝑠𝑜𝑙𝑖𝑑\mathit{tentative}:=\textsc{Replace}(\mathit{sol},i,d)italic_tentative := Replace ( italic_sol , italic_i , italic_d );

8if𝑣𝑎𝑙𝑢𝑒(𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒)<𝑣𝑎𝑙𝑢𝑒(𝑠𝑜𝑙)𝑣𝑎𝑙𝑢𝑒𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒𝑣𝑎𝑙𝑢𝑒𝑠𝑜𝑙\mathit{value}(\mathit{tentative})<\mathit{value}(\mathit{sol})italic_value ( italic_tentative ) < italic_value ( italic_sol )then

9 𝑠𝑜𝑙:=𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒assign𝑠𝑜𝑙𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒\mathit{sol}:=\mathit{tentative}italic_sol := italic_tentative;

10𝑖𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡:=trueassign𝑖𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡true\mathit{improvement}:=\mathrm{true}italic_improvement := roman_true;

11

12 end if

13

14 end for

15

16 end for

17

18 end while

19return 𝑠𝑜𝑙𝑠𝑜𝑙\mathit{sol}italic_sol;

3.4 Tabu Search

Tabu Search (TS) is a metaheuristicoriginally proposed by Glover (1989, 1990) that has beensuccessfully used for the resolution of different combinatorial optimization problems. The key idea in TS is to use a memory data structure in order to keep track of the previous history of the search. This memory is referred to asthe Tabu List, as moves towards solutions included in this list areforbidden. This memory serves the purpose of avoidingrevisiting recently explored solutions, thus allowing the algorithm to avoid to a certain extent the possibility of getting trapped in cycles during the search process. At each iteration, the search moves towards the best solution in the neighborhood of allowed moves. Since all improving solutions may be forbidden, moves towards solutions worse than the current one may be performed and this is the mechanism allowing the algorithm to escapefrom local optima. As keeping all visited solutions in a list is not memory efficient, an usual alternative consists of using a datastructure keeping track of attributes of recently visited solutions, and forbidding moves towards solutions with those sameattributes for some iterations (the so called tabu tenure).

Our implementation of a TS algorithm is shown in Algorithm3. A solution corresponds to a vector with δ𝛿\deltaitalic_δlocations. The neighborhood of a solution consists of all solutions that can be obtained from that one by moving one of its detectors to another location not included in the solution. As tabu structure, we use a matrix T={Tij}m×n𝑇subscriptsubscript𝑇𝑖𝑗𝑚𝑛{T}=\{T_{ij}\}_{m\times n}italic_T = { italic_T start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m × italic_n end_POSTSUBSCRIPT so that Tijsubscript𝑇𝑖𝑗T_{ij}italic_T start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT records tabu information for doing a move consisting in placing a detector at cell i×j𝑖𝑗i\times jitalic_i × italic_j in the map. 𝑠𝑜𝑙𝑠𝑜𝑙\mathit{sol}italic_sol is the solution currently being explored and 𝑏𝑒𝑠𝑡𝑏𝑒𝑠𝑡\mathit{best}italic_best is the best solution found so far. The algorithm repeats the following process, with a limit on the number of iterations to perform in case no improved solution is attained:

  • All moves leading to solutions in the neighborhood of the current one which are not currently tabu are considered and those producing solutions with the best value are collected into 𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠\mathit{bestMoves}italic_bestMoves set (lines 5-18). Additionally, if one solution in the neighborhood is better than the best one found so far (the so named aspiration criteria), this solution is also considered even if the corresponding move were forbidden by the tabu memory.

  • Then, one specific move among the best ones is randomly chosen (line 19) and performed (line 20). Recall that a move displaces one detector to a new position. Trying to move one detector to this same position is set as tabu for a number of iterations (line 21).

  • Finally, if the new solution is the best one found so far, it is recorded and an improvement is acknowledged (lines 23-24). Otherwise, we record that this iteration was unable to achieve any improvement (line 26).

Just like in the case of Hill Climbing algorithm, the whole process is repeated several times until the allowed execution time is exhausted, and the best solution found is returned at the end.

Input: 𝑠𝑜𝑙𝑠𝑜𝑙\mathit{sol}italic_sol (a collection with the coordinates of δ𝛿\deltaitalic_δdetectors)

1 𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠:={(r,c)| 1rm,1cn,Arc\mathit{candidates}:=\{(r,c)\ |\ 1\leqslant r\leqslant m,1\leqslant c\leqslantn%,A_{rc}italic_candidates := { ( italic_r , italic_c ) | 1 ⩽ italic_r ⩽ italic_m , 1 ⩽ italic_c ⩽ italic_n , italic_A start_POSTSUBSCRIPT italic_r italic_c end_POSTSUBSCRIPT is unblocked,Δrc<δ},\Delta_{rc}<\delta\}, roman_Δ start_POSTSUBSCRIPT italic_r italic_c end_POSTSUBSCRIPT < italic_δ };

2𝑏𝑒𝑠𝑡:=𝑠𝑜𝑙assign𝑏𝑒𝑠𝑡𝑠𝑜𝑙\mathit{best}:=\mathit{sol}italic_best := italic_sol;

3𝑛𝑜𝐼𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡:=0assign𝑛𝑜𝐼𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡0\mathit{noImprovement}:=0italic_noImprovement := 0;

4while𝑛𝑜𝐼𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡<𝑚𝑎𝑥𝐼𝑡𝑒𝑟𝑠𝑛𝑜𝐼𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡𝑚𝑎𝑥𝐼𝑡𝑒𝑟𝑠\mathit{noImprovement}<\mathit{maxIters}italic_noImprovement < italic_maxItersdo

5 𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠:=assign𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠\mathit{bestMoves}:=\varnothingitalic_bestMoves := ∅;

6𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠𝑉𝑎𝑙𝑢𝑒:=assign𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠𝑉𝑎𝑙𝑢𝑒\mathit{bestMovesValue}:=\inftyitalic_bestMovesValue := ∞;

7fori:=1assign𝑖1i:=1italic_i := 1 to 𝑙𝑒𝑛𝑔𝑡ℎ(𝑠𝑜𝑙)𝑙𝑒𝑛𝑔𝑡ℎ𝑠𝑜𝑙\mathit{length}(\mathit{sol})italic_length ( italic_sol )do

8for(r,c)(𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠{d|d𝑠𝑜𝑙})𝑟𝑐𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠conditional-set𝑑𝑑𝑠𝑜𝑙(r,c)\in(\mathit{candidates}\setminus\{d\,|\,d\in\mathit{sol}\})( italic_r , italic_c ) ∈ ( italic_candidates ∖ { italic_d | italic_d ∈ italic_sol } )do

9 𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒:=Replace(𝑠𝑜𝑙,i,(r,c))assign𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒Replace𝑠𝑜𝑙𝑖𝑟𝑐\mathit{tentative}:=\textsc{Replace}(\mathit{sol},i,(r,c))italic_tentative := Replace ( italic_sol , italic_i , ( italic_r , italic_c ) );

10ifnotTabu(T,r,c)or𝑣𝑎𝑙𝑢𝑒(𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒)<𝑣𝑎𝑙𝑢𝑒(𝑏𝑒𝑠𝑡)notTabuTrcor𝑣𝑎𝑙𝑢𝑒𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒𝑣𝑎𝑙𝑢𝑒𝑏𝑒𝑠𝑡\textbf{not}\ \textsc{Tabu}(T,r,c)\ \textbf{or}\ \mathit{value}(\mathit{%tentative})<\mathit{value}(\mathit{best})not Tabu ( roman_T , roman_r , roman_c ) or italic_value ( italic_tentative ) < italic_value ( italic_best )then

11if𝑣𝑎𝑙𝑢𝑒(𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒)=𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠𝑉𝑎𝑙𝑢𝑒𝑣𝑎𝑙𝑢𝑒𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠𝑉𝑎𝑙𝑢𝑒\mathit{value}(\mathit{tentative})=\mathit{bestMovesValue}italic_value ( italic_tentative ) = italic_bestMovesValuethen

12 𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠:=𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠+{(i,r,c)}assign𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠𝑖𝑟𝑐\mathit{bestMoves}:=\mathit{bestMoves}+\{\mathit{(i,r,c)}\}italic_bestMoves := italic_bestMoves + { ( italic_i , italic_r , italic_c ) };

13

14else if𝑣𝑎𝑙𝑢𝑒(𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒)<𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠𝑉𝑎𝑙𝑢𝑒𝑣𝑎𝑙𝑢𝑒𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠𝑉𝑎𝑙𝑢𝑒\mathit{value}(\mathit{tentative})<\mathit{bestMovesValue}italic_value ( italic_tentative ) < italic_bestMovesValuethen

15𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠:={(i,r,c)}assign𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠𝑖𝑟𝑐\mathit{bestMoves}:=\{\mathit{(i,r,c)}\}italic_bestMoves := { ( italic_i , italic_r , italic_c ) };

16𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠𝑉𝑎𝑙𝑢𝑒:=𝑣𝑎𝑙𝑢𝑒(𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒)assign𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠𝑉𝑎𝑙𝑢𝑒𝑣𝑎𝑙𝑢𝑒𝑡𝑒𝑛𝑡𝑎𝑡𝑖𝑣𝑒\mathit{bestMovesValue}:=\mathit{value}(\mathit{tentative})italic_bestMovesValue := italic_value ( italic_tentative );

17

18

19 end if

20

21 end for

22

23 end for

24(i,r,c):=chooseFrom(𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠)assign𝑖𝑟𝑐chooseFrom𝑏𝑒𝑠𝑡𝑀𝑜𝑣𝑒𝑠\mathit{(i,r,c)}:=\textsc{chooseFrom}(\mathit{bestMoves})( italic_i , italic_r , italic_c ) := chooseFrom ( italic_bestMoves );

25𝑠𝑜𝑙:=Replace(𝑠𝑜𝑙,i,(r,c))assign𝑠𝑜𝑙Replace𝑠𝑜𝑙𝑖𝑟𝑐\mathit{sol}:=\textsc{Replace}(\mathit{sol},i,(r,c))italic_sol := Replace ( italic_sol , italic_i , ( italic_r , italic_c ) );

26setTabu(T,r,c)setTabu𝑇𝑟𝑐\textsc{setTabu}(T,r,c)setTabu ( italic_T , italic_r , italic_c );

27 if𝑣𝑎𝑙𝑢𝑒(𝑠𝑜𝑙)<𝑣𝑎𝑙𝑢𝑒(𝑏𝑒𝑠𝑡)𝑣𝑎𝑙𝑢𝑒𝑠𝑜𝑙𝑣𝑎𝑙𝑢𝑒𝑏𝑒𝑠𝑡\mathit{value}(\mathit{sol})<\mathit{value}(\mathit{best})italic_value ( italic_sol ) < italic_value ( italic_best )then

28𝑏𝑒𝑠𝑡:=𝑠𝑜𝑙assign𝑏𝑒𝑠𝑡𝑠𝑜𝑙\mathit{best}:=\mathit{sol}italic_best := italic_sol;

29𝑛𝑜𝐼𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡:=0assign𝑛𝑜𝐼𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡0\mathit{noImprovement}:=0italic_noImprovement := 0

30else

31𝑛𝑜𝐼𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡:=𝑛𝑜𝐼𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡+1assign𝑛𝑜𝐼𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡𝑛𝑜𝐼𝑚𝑝𝑟𝑜𝑣𝑒𝑚𝑒𝑛𝑡1\mathit{noImprovement}:=\mathit{noImprovement}+1italic_noImprovement := italic_noImprovement + 1

32 end if

33

34 end while

35return 𝑏𝑒𝑠𝑡𝑏𝑒𝑠𝑡\mathit{best}italic_best;

3.5 Evolutionary Algorithm

An Evolutionary Algorithm (EA) (Eiben and Smith, 2003) is a optimizationprocedure inspired by the biological evolution of species. These algorithms are population based ones which means that a pool of solutions is maintained during the optimization process. This population of solutions is initialized somehow before entering the evolutionary loop in which solutions go through different processes such as reproduction, recombination, mutation and replacement. At the end of the evolutionary loop, the best solution found during the execution of the algorithm is returned.

Algorithm4 shows the specific incarnation of the EA that we have used.𝑝𝑜𝑝𝑝𝑜𝑝\mathit{pop}italic_pop is the population of non-repeated 𝑝𝑜𝑝𝑆𝑖𝑧𝑒𝑝𝑜𝑝𝑆𝑖𝑧𝑒\mathit{popSize}italic_popSizeindividuals, each one being a full solution to the problem. Like in previous heuristics, the search space explored by the EAis restricted to non-blocked cells in themap minus those that are dominated by at least δ𝛿\deltaitalic_δcells.Each individual in the population of solutions is initialized randomly as a vector of δ𝛿\deltaitalic_δdifferent locations for placing each detector. These locations are randomly chosen in an uniform way among all possible ones (lines 1-4). Then, the following process corresponding to the evolutionary loop is repeated, until the maximum allowed execution time for the algorithm is exhausted:

  • With probability of selection pXsubscript𝑝𝑋p_{X}italic_p start_POSTSUBSCRIPT italic_X end_POSTSUBSCRIPT, two individuals acting as parents are selected from the population (lines 7-9). The specific algorithm used for each selection is binary tournament selection in which, after picking two individuals at random, the best one is selected. Now, these individuals go through recombination in order to produce a new one. For this purpose, letus consider the set comprising the union of detector placementsincluded in to be recombined individuals. A new individual, constituting the offspring for thisgeneration, is then defined by sampling in a uniform way δ𝛿\deltaitalic_δelements (i.e., detector placements) from this previous set.

  • Otherwise (i.e. with probability 1pX1subscript𝑝𝑋1-p_{X}1 - italic_p start_POSTSUBSCRIPT italic_X end_POSTSUBSCRIPT) recombination is not performed and a random individual of currentpopulation is selected as the offspring (line 11).

  • Each detector location in the the offspring is mutated with probability pmsubscript𝑝𝑚p_{m}italic_p start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT. More precisely, with such probability the corresponding detector is replaced with another one notincluded in the solution (line 13). The resulting individual is evaluated (line 14).

  • As to replacement, the worst individual currently included in the population is replaced by the offspring (line 15).

Finally, when the execution time limit is reached, the best individual found along this whole process is returned as a solution.

Input :𝑝𝑜𝑝𝑆𝑖𝑧𝑒𝑝𝑜𝑝𝑆𝑖𝑧𝑒\mathit{popSize}italic_popSize (population size)

pXsubscript𝑝𝑋p_{X}italic_p start_POSTSUBSCRIPT italic_X end_POSTSUBSCRIPT (recombination probability)

pmsubscript𝑝𝑚p_{m}italic_p start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT (mutation probability)

1 fori:=1assign𝑖1i:=1italic_i := 1 to 𝑝𝑜𝑝𝑆𝑖𝑧𝑒𝑝𝑜𝑝𝑆𝑖𝑧𝑒\mathit{popSize}italic_popSizedo

2𝑝𝑜𝑝i:=assignsubscript𝑝𝑜𝑝𝑖absent\mathit{pop}_{i}:=italic_pop start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT := RandomIndividual()()( );

3Evaluate(𝑝𝑜𝑝isubscript𝑝𝑜𝑝𝑖\mathit{pop}_{i}italic_pop start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT);

4

5 end for

6whileallowed runtime not exceededdo

7ifrecombination is performed(pXsubscript𝑝𝑋p_{X}italic_p start_POSTSUBSCRIPT italic_X end_POSTSUBSCRIPT)then

8parent1:=assign𝑝𝑎𝑟𝑒𝑛subscript𝑡1absentparent_{1}:=italic_p italic_a italic_r italic_e italic_n italic_t start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT := Select(𝑝𝑜𝑝𝑝𝑜𝑝\mathit{pop}italic_pop);

9parent2:=assign𝑝𝑎𝑟𝑒𝑛subscript𝑡2absentparent_{2}:=italic_p italic_a italic_r italic_e italic_n italic_t start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT := Select(𝑝𝑜𝑝𝑝𝑜𝑝\mathit{pop}italic_pop);

10𝑜𝑓𝑓𝑠𝑝𝑟𝑖𝑛𝑔:=assign𝑜𝑓𝑓𝑠𝑝𝑟𝑖𝑛𝑔absent\mathit{offspring}:=italic_offspring := Recombine(parent1𝑝𝑎𝑟𝑒𝑛subscript𝑡1parent_{1}italic_p italic_a italic_r italic_e italic_n italic_t start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT, parent2𝑝𝑎𝑟𝑒𝑛subscript𝑡2parent_{2}italic_p italic_a italic_r italic_e italic_n italic_t start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT);

11

12else

13𝑜𝑓𝑓𝑠𝑝𝑟𝑖𝑛𝑔:=assign𝑜𝑓𝑓𝑠𝑝𝑟𝑖𝑛𝑔absent\mathit{offspring}:=italic_offspring := Select(𝑝𝑜𝑝𝑝𝑜𝑝\mathit{pop}italic_pop);

14

15 end if

16𝑜𝑓𝑓𝑠𝑝𝑟𝑖𝑛𝑔:=assign𝑜𝑓𝑓𝑠𝑝𝑟𝑖𝑛𝑔absent\mathit{offspring}:=italic_offspring := Mutate(pm,𝑜𝑓𝑓𝑠𝑝𝑟𝑖𝑛𝑔subscript𝑝𝑚𝑜𝑓𝑓𝑠𝑝𝑟𝑖𝑛𝑔p_{m},\mathit{offspring}italic_p start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT , italic_offspring);

17Evaluate(𝑜𝑓𝑓𝑠𝑝𝑟𝑖𝑛𝑔𝑜𝑓𝑓𝑠𝑝𝑟𝑖𝑛𝑔\mathit{offspring}italic_offspring);

18𝑝𝑜𝑝:=assign𝑝𝑜𝑝absent\mathit{pop}:=italic_pop := Replace(𝑝𝑜𝑝𝑝𝑜𝑝\mathit{pop}italic_pop, 𝑜𝑓𝑓𝑠𝑝𝑟𝑖𝑛𝑔𝑜𝑓𝑓𝑠𝑝𝑟𝑖𝑛𝑔\mathit{offspring}italic_offspring);

19

20 end while

21return best solution found;

3.6 Problem Instances

In order to test the algorithms described in the previous section in a broad set of conditions,we have generated problem instances that try to resemble different real-world scenarios. To be precise,we have considered the following three classes of maps:

  • harbour: these problem instances represent a coastal area that may be subject to amaritime attack by a small vessel, cf. (Yan and Nie, 2016). These maps featurea large inner open area (representing a water mass such as a lake or asheltered body of sea) typically comprising several scattered islands,surrounded by a complex coastline with some straits from which the attackercan enter the threat area. See Figure2a.

  • newtown: these problem instances represent a modern urban area in which streets runin straight lines creating a grid (Manhattan or Barcelona’s Expansion District beingprominent examples). These maps feature streets of different width running atright angles, as well as a number of plazas of different sizes scattered acrossthe map. See Figure2b.

  • oldtown: these problem instances represent the historic core of an old town. As such,the street plan features a much more decentralized and flexible structure. Streetstypically originate at plazas and run in different directions and angles withrespect to each other, bifurcating as they get farther from the plazas. See Figure2c.

New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work issupported by the Spanish Ministerio de Economía and European FEDER underProjects EphemeCH (TIN2014-56494-C4-1-P) andDeepBIO (TIN2017-85727-C4-1-P).††thanks: This document is a preprint of Cotta, C., Gallardo, J.E. New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics. Nat Comput 18, 249–263 (2019). https://doi.org/10.1007/s11047-018-9710-1 (2)
New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work issupported by the Spanish Ministerio de Economía and European FEDER underProjects EphemeCH (TIN2014-56494-C4-1-P) andDeepBIO (TIN2017-85727-C4-1-P).††thanks: This document is a preprint of Cotta, C., Gallardo, J.E. New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics. Nat Comput 18, 249–263 (2019). https://doi.org/10.1007/s11047-018-9710-1 (3)
New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work issupported by the Spanish Ministerio de Economía and European FEDER underProjects EphemeCH (TIN2014-56494-C4-1-P) andDeepBIO (TIN2017-85727-C4-1-P).††thanks: This document is a preprint of Cotta, C., Gallardo, J.E. New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics. Nat Comput 18, 249–263 (2019). https://doi.org/10.1007/s11047-018-9710-1 (4)

For each of these three problem classes, we have defineda map generator in order to create a number of instances of the desired characteristics, hence contributing to thediversity of the benchmark. Next we will describe in more detail the generation procedure for each map class.

3.6.1 Coastal Area

These maps are created in two phases. In the first phase a exponentially decaying diffusion mechanism is used to grow theinner water mass: we start at the center of the lattice with a value p=1𝑝1p=1italic_p = 1; with this probability we set the current position tounblocked and move to each of the four neighbors in a von Neumann topology (i.e., North, East, South, West), having thisprobability decay by a different factor {βi}1i4subscriptsubscript𝛽𝑖1𝑖4\{\beta_{i}\}_{1\leqslant i\leqslant 4}{ italic_β start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT } start_POSTSUBSCRIPT 1 ⩽ italic_i ⩽ 4 end_POSTSUBSCRIPT, that depends on the direction, and repeating theprocess from each of them. When the diffusion stops, we proceed with the second phase in which the map is smoothed outby using a cellular automaton which has each lattice cell change to the most repeated state among itself and its neighbors.This process is run until convergence or after a maximum number of iterations has been performed.

Once the above is done, objectives are placed on positions along the coastline. To do so, a random unblocked position isselected, and a random walk (using the von Neumann connectivity mentioned before) is performed until a blocked positionis found. This position is then unblocked and defined as an objective. The process is repeated as many times as objectivesneed to be placed. The entrances are randomly selected among the unblocked positions on the borders of the map.

3.6.2 Modern Urban Area

These maps are also created in two phases: in the first one the street grid is created, and in the second one a numberof plazas are added to the map. In order to tackle the first part, we consider values {pi}0isubscriptsubscript𝑝𝑖0𝑖\{p_{i}\}_{0\leqslant i}{ italic_p start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT } start_POSTSUBSCRIPT 0 ⩽ italic_i end_POSTSUBSCRIPT, representingthe probability of having a street of width i𝑖iitalic_i (the value p0subscript𝑝0p_{0}italic_p start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT corresponding to the situation of not having a street atall). Using these, we traverse the columns of the maps deciding whether we include a North-South street and if so of whichwidth. In case a street of width w𝑤witalic_w is placed, we jump w+1𝑤1w+1italic_w + 1 columns to the right and repeat the procedure until allcolumns have been processed. The whole process is then repeated by traversing rows of the maps in order to placeWest-East streets.

The second phase involves placing some plazas on the map. This is controlled by parameter npsubscript𝑛𝑝n_{p}italic_n start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT indicating thenumber of plazas and values {qi}minpisubscriptsubscript𝑞𝑖subscript𝑝𝑖\{q_{i}\}_{\min_{p}\leqslant i}{ italic_q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT } start_POSTSUBSCRIPT roman_min start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT ⩽ italic_i end_POSTSUBSCRIPT representing the probability of having a square plaza of a certainside length, where minpsubscript𝑝\min_{p}roman_min start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT indicates the minimum side length admissible. The generator would iterate npsubscript𝑛𝑝n_{p}italic_n start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT timesa process of determining the size of a plaza using probabilities {qi}subscript𝑞𝑖\{q_{i}\}{ italic_q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT } and then deciding a suitable location given this size.As in the previous scenario, the entrances are randomly selected among the unblocked positions on the borders of the map.As to the objectives, these are placed in random unblocked positions of the map.

3.6.3 Old Historic Town

These maps are created by iterating npsubscript𝑛𝑝n_{p}italic_n start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT (a parameter that just like in the previous scenario indicates a numberof plazas to be located on the map) times a basic procedure. This procedure consists of determining the size of a plaza(using a collection of values {qi}minpisubscriptsubscript𝑞𝑖subscript𝑝𝑖\{q_{i}\}_{\min_{p}\leqslant i}{ italic_q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT } start_POSTSUBSCRIPT roman_min start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT ⩽ italic_i end_POSTSUBSCRIPT as in the newtownscenario), placing it in on the map, and thenhaving four streets depart from each of the sides of the plaza. These streets do not run at right angles though: theyare laid out having a certain slope between ±1plus-or-minus1\pm 1± 1 (a diagonal street) and ±maxsplus-or-minussubscript𝑠\pm\max_{s}± roman_max start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT (closer to horizontal or vertical).The width of the street is set to w𝑤witalic_w and as the street runs out from the plaza it can branch along the way into a smaller (width w1𝑤1w-1italic_w - 1)street with probability pbsubscript𝑝𝑏p_{b}italic_p start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT. These branched-out streets can in turn branch into smaller lanes in a recursive way, thustrying to resemble the complex and more convoluted network of small streets and lanes in the historic core of old towns.

Much like it was done in harbourand newtown, the entrances are randomly selected among the unblocked positionson the borders of the map. As to the objectives, these are placed in random unblocked positions of the map as in newtown.

4 Experimental Results

In order to evaluate the performance of the algorithms we have followeda problem generator approach (DeJong etal, 1997), wherebyrather than running each algorithm multiple times on the same problem instance, theyare run once on a different problem instance each time, thus allowing to obtain a morerepresentative measure of performance across the whole set of possible instances,and avoiding (or at the very least diminishing the impact of) any spurious matchbetween a specific instance and a specific algorithm. More precisely, all algorithmshave been run twenty five times on each of the three problem classes,namely harbour,newtownand oldtown, for the twoattacker scenarios (i.e., proportional selection of objectives and worst-case equilibrium)using the same seventy five problem instances in all cases.

The maps considered have been generated on a grid of size 64×64646464\times 6464 × 64. In allcases, the number of entrances ε𝜀\varepsilonitalic_εand the number of objectives ϕitalic-ϕ\phiitalic_ϕare independently chosen uniformly at random between 10 and 15. A 10% region aroundthe borders of the maps is kept free of objectives to avoid any of these being locatedextremely close to an entrance, something which could be regarded as a pathological case.As to scenariodependent parameters, in the case of harbour, the decay parameters {βi}subscript𝛽𝑖\{\beta_{i}\}{ italic_β start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT }were randomly picked between 0.98 and 0.99 and checked to empirically ensure thatthe diffusion barely reached the borders of the map.The dimension of each cell in the map was of 200m ×\times× 200m and the detection radius for the detectors was set to τ=500m𝜏500𝑚\tau=500mitalic_τ = 500 italic_m. Regarding newtown, each map has arandom number of plazas npsubscript𝑛𝑝n_{p}italic_n start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT between 3 and 6, whose side length can range between 4 and13 ({qi}413=1/10subscriptsubscript𝑞𝑖413110\{q_{i}\}_{4\dots 13}=1/10{ italic_q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT } start_POSTSUBSCRIPT 4 … 13 end_POSTSUBSCRIPT = 1 / 10). Street widths are selected using values {pi}03={0.5,0.25,0.15,0.1}subscriptsubscript𝑝𝑖030.50.250.150.1\{p_{i}\}_{0\dots 3}=\{0.5,0.25,0.15,0.1\}{ italic_p start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT } start_POSTSUBSCRIPT 0 … 3 end_POSTSUBSCRIPT = { 0.5 , 0.25 , 0.15 , 0.1 }. Finally,oldtownmaps also comprise a random number of plazas npsubscript𝑛𝑝n_{p}italic_n start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT between 3 and 6, whosesizes range from 6 up to 15 ({qi}615=1/10subscriptsubscript𝑞𝑖615110\{q_{i}\}_{6\dots 15}=1/10{ italic_q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT } start_POSTSUBSCRIPT 6 … 15 end_POSTSUBSCRIPT = 1 / 10). The maximum slope of streets is 1/5 of the map side length,they have initial width w=3𝑤3w=3italic_w = 3, and can branch with probability pb=0.02subscript𝑝𝑏0.02p_{b}=0.02italic_p start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT = 0.02. For these instances representing different town configurations, the dimension of each cell in the map was of 5m ×\times× 5m and the detection radius for the detectors was set to τ=20m𝜏20𝑚\tau=20mitalic_τ = 20 italic_m.

We have considered that minimum time required to neutralize an attacker is tn=10subscript𝑡𝑛10t_{n}=10italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT = 10s. In the case of newtownand oldtowninstances, this means that effective neutralization is not possible if the distance of the attacker to the objective is less than 10m, which corresponds to assuming that the attacker moves at a speed v=1𝑣1v=1italic_v = 1m/s. In the case of harbourinstances, we have assumed a moving speed for the vessels v=20𝑣20v=20italic_v = 20m/s and thus the maximum distance to the objective for being able to abort the attack is 200m.As to the detector’s instantaneous detection rates, we have used a value of η=0.06𝜂0.06\eta=0.06italic_η = 0.06 for the newtownand oldtowninstances and η=0.006𝜂0.006\eta=0.006italic_η = 0.006 forthe harbourinstances, thus assuming that detectors are less reliable in the later case.For the probability of effectively neutralizing a detected attacker, we used θ=0.6𝜃0.6\theta=0.6italic_θ = 0.6 in all cases. Additionally, in order to estimate the expected number of casualties for an objective cell {Cj}1ϕsubscriptsubscript𝐶𝑗1italic-ϕ\{C_{j}\}_{1\dots\phi}{ italic_C start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT } start_POSTSUBSCRIPT 1 … italic_ϕ end_POSTSUBSCRIPT, we used the same procedure defined by Cotta and Gallardo (2017) which is in turn based onEquation 2 in (Kaplan and Kress, 2005). This equation presumes that the number of fragments produced after the explosion tends to \infty and that these fragments and individuals around the target area are spatially distributed according to a Poisson process. We have used the same parameters for this equation as those proposed by Nie etal (2007), except for the population densities near each objective cell, which were set as a constant therein but which we have modelled as a random variable instead, with the aim of considering more diverse instances. For newtown and oldtowninstances thisis chosen from a normal distribution 𝒩(0.4,0.1)𝒩0.40.1{\mathcal{N}(0.4,0.1)}caligraphic_N ( 0.4 , 0.1 ) persons / m2superscriptm2{\mathrm{m}}^{2}roman_m start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT, whereas in the case of harbourinstances, we take 𝒩(9107,1.8106)𝒩9superscript1071.8superscript106{\mathcal{N}(9\cdot 10^{7},1.8\cdot 10^{6})}caligraphic_N ( 9 ⋅ 10 start_POSTSUPERSCRIPT 7 end_POSTSUPERSCRIPT , 1.8 ⋅ 10 start_POSTSUPERSCRIPT 6 end_POSTSUPERSCRIPT ) (these latter values do not really stand for an expected number of civilian casualties but instead represent the economical cost resulting from damaging the corresponding objective).Overall, all parameters have been picked to have generated instances resemblerealistic scenarios, as described in the literature (Kaplan and Kress, 2005; Nie etal, 2007; Yan and Nie, 2016), while providing diversity thanks to their range of variability.

Regarding the parameters used for the different algorithms, the following settings were used for the EA: population size 𝑝𝑜𝑝𝑆𝑖𝑧𝑒=100𝑝𝑜𝑝𝑆𝑖𝑧𝑒100\mathit{popSize}=100italic_popSize = 100 individuals, probability of crossover pX=0.9subscript𝑝𝑋0.9p_{X}=0.9italic_p start_POSTSUBSCRIPT italic_X end_POSTSUBSCRIPT = 0.9 and probability of mutation pm=1/δsubscript𝑝𝑚1𝛿p_{m}=1/\deltaitalic_p start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT = 1 / italic_δ.The tenure value for the TS algorithm was a random number of iterations in [δ2δ]delimited-[]𝛿2𝛿[\delta\dots 2\delta][ italic_δ … 2 italic_δ ]. All algorithmswere run for 30 seconds on each instance (the hardware platform used was a cluster of Intel Xeon E7-4870 2.4 GHz processors with 2GB of RAM running under SUSE Linux Enterprise Server 11 operating system).

New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work issupported by the Spanish Ministerio de Economía and European FEDER underProjects EphemeCH (TIN2014-56494-C4-1-P) andDeepBIO (TIN2017-85727-C4-1-P).††thanks: This document is a preprint of Cotta, C., Gallardo, J.E. New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics. Nat Comput 18, 249–263 (2019). https://doi.org/10.1007/s11047-018-9710-1 (5)

New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work issupported by the Spanish Ministerio de Economía and European FEDER underProjects EphemeCH (TIN2014-56494-C4-1-P) andDeepBIO (TIN2017-85727-C4-1-P).††thanks: This document is a preprint of Cotta, C., Gallardo, J.E. New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics. Nat Comput 18, 249–263 (2019). https://doi.org/10.1007/s11047-018-9710-1 (6)

The results are depicted in Figures34. In the two scenarios,the three iterative approaches largely outperform the greedy algorithm. In most cases, the latterseems to experience a peak of difficulty when the number of detectors is about the same magnitudeas the number of objectives. This can be explained by the fact that for a low number of detectorsthe number of options are limited and the greedy selection is often reasonably close to more finelyadjusted solutions, whereas for a large number of detectors these can be spread to cover most pathswithout not so much difficulty (thus leaving the middle regime between these two extremesas the most complex one).

This said, it is much more interesting to note the difference between the two scenarios. Notice firstlyhow the range of deviations for all algorithms is larger in the worst-case equilibrium scenario. It isnot difficult to see that this latter scenario is indeed harder from an optimization point of view, due tothe complex structure of the search landscape in this case: the quality of a solution is dictated by thecritical path given the current location of detectors; hence, the optimization algorithm will attemptto gradually increase the coverage of this critical path but in doing so (i) it will have to take care ofnot leaving uncovered other paths to objectives of higher sensitivity, and (ii) eventually the criticalpath may turn to be a different one (recall the discussion in Section2.2) causing anabrupt discontinuity in the direction of the optimization process. This differs from the proportionalselection scenario, in which the objective function is a weighted combination whose coefficientsare fixed, and hence can be optimized in a more smoothly way. Furthermore, notice how the searchlandscape is prone to have mesas in the worst-case equilibrium scenario, given the fact that as longas the coverage of the critical path does not change and the coverage of other paths does not changeenough for the critical path to be a different one, the value of the objective function will be the same.This may affect all algorithms, and in particular the greedy algorithm (see the insets in Figure5),which will face the need to pick a choice among a large number of seemingly equivalent options.

New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work issupported by the Spanish Ministerio de Economía and European FEDER underProjects EphemeCH (TIN2014-56494-C4-1-P) andDeepBIO (TIN2017-85727-C4-1-P).††thanks: This document is a preprint of Cotta, C., Gallardo, J.E. New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics. Nat Comput 18, 249–263 (2019). https://doi.org/10.1007/s11047-018-9710-1 (7)
New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work issupported by the Spanish Ministerio de Economía and European FEDER underProjects EphemeCH (TIN2014-56494-C4-1-P) andDeepBIO (TIN2017-85727-C4-1-P).††thanks: This document is a preprint of Cotta, C., Gallardo, J.E. New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics. Nat Comput 18, 249–263 (2019). https://doi.org/10.1007/s11047-018-9710-1 (8)
i𝑖iitalic_ialgorithmz𝑧zitalic_z-statisticp𝑝pitalic_p-value adjusted p𝑝pitalic_p-value
1EA3.38e+++003.66e--043.66e--04
2TS4.56e+++002.51e--065.01e--06
3Greedy9.22e+++001.49e--204.46e--20
i𝑖iitalic_ialgorithmz𝑧zitalic_z-statisticp𝑝pitalic_p-value adjusted p𝑝pitalic_p-value
1HC1.64e+++005.02e--025.02e--02
2TS3.29e+++005.08e--041.02e--03
3Greedy8.22e+++001.05e--163.16e--16
New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work issupported by the Spanish Ministerio de Economía and European FEDER underProjects EphemeCH (TIN2014-56494-C4-1-P) andDeepBIO (TIN2017-85727-C4-1-P).††thanks: This document is a preprint of Cotta, C., Gallardo, J.E. New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics. Nat Comput 18, 249–263 (2019). https://doi.org/10.1007/s11047-018-9710-1 (9)
New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work issupported by the Spanish Ministerio de Economía and European FEDER underProjects EphemeCH (TIN2014-56494-C4-1-P) andDeepBIO (TIN2017-85727-C4-1-P).††thanks: This document is a preprint of Cotta, C., Gallardo, J.E. New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics. Nat Comput 18, 249–263 (2019). https://doi.org/10.1007/s11047-018-9710-1 (10)
New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work issupported by the Spanish Ministerio de Economía and European FEDER underProjects EphemeCH (TIN2014-56494-C4-1-P) andDeepBIO (TIN2017-85727-C4-1-P).††thanks: This document is a preprint of Cotta, C., Gallardo, J.E. New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics. Nat Comput 18, 249–263 (2019). https://doi.org/10.1007/s11047-018-9710-1 (11)
New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work issupported by the Spanish Ministerio de Economía and European FEDER underProjects EphemeCH (TIN2014-56494-C4-1-P) andDeepBIO (TIN2017-85727-C4-1-P).††thanks: This document is a preprint of Cotta, C., Gallardo, J.E. New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics. Nat Comput 18, 249–263 (2019). https://doi.org/10.1007/s11047-018-9710-1 (12)

As a result of the previous considerations, there is a difference between the relative behavior ofthe different iterative algorithms in each of the two scenarios. In the first one (proportional selection),HC is significantly better than the other algorithms (Quade test p𝑝pitalic_p-value 0absent0\approx 0≈ 0, Holm test resultsshown in Table2). However, in the worst-case equilibrium scenario the EA providesbetter results (Quade test p𝑝pitalic_p-value 0absent0\approx 0≈ 0, Holm test resultsshown in Table3). Indeed, if we perform a head-to-head comparison betweenHC and EA in this latter scenario by means of a signrank test, we observe that the EA is significantly better with p𝑝pitalic_p-value = 0.0057.Quite interestingly, if we break down the analysis by map class, we find that HC is negligibly andnon-significantly better than EA in the harbourclass (p𝑝pitalic_p-value = 0.7422), and that the EA issignificantly better than HC in newtownand oldtown(p𝑝pitalic_p-values of 0.0098 and 0.0020 respectively).As a matter of fact, the quantitative difference between the algorithms is clear if we observe the distributionof deviations from the best known solutions (Figure5): the difference in favorof HC is much smaller in the proportional selection scenario when compared to the difference infavor of EA in the worst-case equilibrium scenario. Clearly, the more complex nature of the searchlandscape is better dealt with via the diversification of a population-based approach than the strongintensification of the HC algorithm considered.

Figure6shows an example of the solutions provided by either algorithm ona newtownmap for the worst-case equilibrium scenario. The solutions provided by each algorithmare structurally different. The greedy approach tends to place the detectors in the vicinity of the objectives.The local search approaches seem to have found solutions in which detectors are usually placed close toentrances, but with some detectors being placed next to objectives as well. Finally the EA has also favoredlocations close to entrances in order to cover a large number of paths; however, it has also identified a fewcrossroads that seem to be important in order to maximize coverage of many paths. Notice how foreach of these solutions, the resulting critical path is different in each case.

5 Conclusions and Future Work

Counterterrorism is a multidimensional endeavor that spreads along many entangled fronts. One of them isundoubtedly the tactical defense against targeted attacks, from which suicide bombings constitute a heinousdistinguished example. While low-rank individuals engaged in international terrorism groups may be often fanaticized andhence can have motivations that challenge rational analysis (or motivations that, while rational, can be directedtowards other personal or social goals than those of the terror group as a whole (Abrahms, 2008)),their actions are often dictated by or inspired by theguidelines emanating from the upper levels of a command hierarchy, more prone to engage in analyticalconsiderations of cost-effectiveness in pursue of their criminal goals. As a matter of fact, the assessment ofthe situation would not qualitatively change if rather than considering a suicide attacker embarked on ano-return mission we consider the case of an unmanned attack using a drone or any other suitablevehicle (Patterson and Patterson, 2010), a scenario slanted towards purely tactical considerations. In any case,assuming this operational context provides at the very least a worst-case scenario upon which a better informed,more down-to-earth strategy could be built with the help ofadequate intelligence. The availability of cogent tools to aid in the analysis of these scenarios can thus bemost helpful. In this sense, we have considered in this work the use of different heuristic approaches todetermine the most appropriate deployment of sensors so as to detect perpetrators of bombing attacks ina given threat area, aiming to minimize the number of casualties or economic damages. Modeling thissituation as an adversarial game in which the attacker is cognizant of the location of these detectors andtries to target the most cost-effective objective turns out to pose a challenging optimization task. Among thealgorithms considered and tested on a variety of problem scenarios, an evolutionary algorithm turns outto be quite effective. It is however remarkable that a simple hill climber performs reasonably well on someinstances, suggesting that an eventual hybridization of both methods into a memetic approach (Neri etal, 2012)might be very promising.

Future work will be actually directed in the direction of hybridizing methods, aiming to exploit their synergy.Pushing the limits of the resulting techniques (in terms of, e.g., the size of the maps, the number of objectives,etc.) would be of paramount interest. Also, it is conceivable to consider in the context described in this workextensions of the underlying model including different types of detectors, cf. (Yan and Nie, 2016), or evenintroducing a dynamic component in the configuration of the ground map.

References

  • Aarts and Lenstra (1997)Aarts EHL, Lenstra JK (1997) Local Search in Combinatorial Optimization. JohnWiley & Sons
  • Abrahms (2008)Abrahms M (2008) What terrorists really want: Terrorist motives andcounterterrorism strategy. International Security 32(4):78–105
  • Blomberg etal (2004)Blomberg SB, Hess GD, Weerapana A (2004) An economic model of terrorism.Conflict Management and Peace Science 21(1):17–28
  • Central Intelligence Agency (2003)Central Intelligence Agency (2003) National strategy for combating terrorism.https://www.cia.gov/news-information/cia-the-war-on-terrorism/Counter˙Terrorism˙Strategy.pdf,[Accessed 31 January 2018]
  • Chicago Project on Security and Terrorism(2016) (CPOST)Chicago Project on Security and Terrorism (CPOST) (2016) Suicide attackdatabase (April 19, 2016 release). [Data File]. Retrieved fromhttp://cpostdata.uchicago.edu/
  • Cotta and Gallardo (2017)Cotta C, Gallardo JE (2017) Metaheuristic approaches to the placement ofsuicide bomber detectors. Journal of HeuristicsDOI10.1007/s10732-017-9335-z
  • DeJong etal (1997)DeJong KA, Potter MA, Spears WM (1997) Using problem generators to explore theeffects of epistasis. In: Bäck T (ed) Proceedings of the 7thInternational Conference on Genetic Algorithms, Morgan Kaufmann, pp 338–345
  • Edwards etal (2016)Edwards D, McMenemy L, Stapley S, Patel H, Clasper J (2016) 40 years ofterrorist bombings – a meta-analysis of the casualty and injury profile.Injury 47(3):646–652
  • Eiben and Smith (2003)Eiben AE, Smith JE (2003) Introduction to Evolutionary Computing.SpringerVerlag
  • Ganor (2011)Ganor B (2011) Trends in modern international terrorism. In: Weisburd D, FeuchtT, Hakimi I, Mock L, Perry S (eds) To Protect and To Serve. Policing in anAge of Terrorism, Springer, New York, pp 11–42
  • Gares etal (2016)Gares KL, Hufziger KT, Bykov SV, Asher SA (2016) Review of explosive detectionmethodologies and the emergence of standoff deep UV resonance raman.Journal of Raman Spectroscopy 47(1):124–141
  • Glover (1989)Glover F (1989) Tabu search-part I. ORSA Journal of Computing 1:190–206
  • Glover (1990)Glover F (1990) Tabu search-part II. ORSA Journal of Computing 2:4–32
  • Hoffman (2003)Hoffman B (2003) The logic of suicide terrorism. The Atlantic.http://www.theatlantic.com/magazine/archive/2003/06/the-logic-of-suicide-terrorism/302739/,[Accessed 2 July 2016]
  • Hoos and Stützle (2005)Hoos H, Stützle T (2005) Stochastic Local Search. Foundations andApplications. Morgan Kaufmann
  • Kaplan and Kress (2005)Kaplan EH, Kress M (2005) Operational effectiveness of suicide-bomber-detectorschemes: A best-case analysis. Proceedings of the National Academy ofSciences of the United States of America 102(29):10399–10404
  • Kim etal (2016)Kim M, Batta R, He Q (2016) Optimal routing of infiltration operations. Journalof Transportation Security 9(1):87–104
  • Lara-Cabrera etal (2017)Lara-Cabrera R, González-Pardo A, Benouaret K, Faci N, Benslimane D,Camacho D (2017) Measuring the radicalisation risk in social networks. IEEEAccess 5:10892–10900
  • Leistedt (2016)Leistedt SJ (2016) On the radicalization process. Journal of Forensic Sciences61(6):1588–1591
  • Neri etal (2012)Neri F, Cotta C, Moscato P (eds) (2012) Handbook of Memetic Algorithms,Studies in Computational Intelligence, vol 379. Springer-Verlag, BerlinHeidelberg
  • Nie etal (2007)Nie X, Batta R, Drury CG, Lin L (2007) Optimal placement of suicide bomberdetectors. Military Operations Research 12(2):65–78
  • Patterson and Patterson (2010)Patterson MR, Patterson SJ (2010) Unmanned systems: An emerging threat towaterside security: Bad robots are coming. In: 2010 International WaterSideSecurity Conference, IEEE Press, pp 1–7
  • Rand Corporation (2009)Rand Corporation (2009) RAND database of worldwide terrorism incidents.[Data File] http://smapp.rand.org/rwtid/search˙form.php
  • Tutun etal (2017)Tutun S, Khasawneh MT, Zhuang J (2017) New framework that uses patterns andrelations to understand terrorist behaviors. Expert Systems with Applications78:358–375
  • Yan and Nie (2016)Yan X, Nie X (2016) Optimal placement of multiple types of detectors under asmall vessel attack threat to port security. Transportation Research Part E:Logistics and Transportation Review 93:71–94
New Perspectives on the Optimal Placement of Detectors for Suicide Bombers using Metaheuristics††thanks: This work is
supported by the Spanish Ministerio de Economía and European FEDER under
Projects EphemeCH (TIN2014-56494-C4-1-P) and
DeepBIO (TIN2017-85 (2024)

References

Top Articles
Latest Posts
Article information

Author: Tyson Zemlak

Last Updated:

Views: 6348

Rating: 4.2 / 5 (63 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Tyson Zemlak

Birthday: 1992-03-17

Address: Apt. 662 96191 Quigley Dam, Kubview, MA 42013

Phone: +441678032891

Job: Community-Services Orchestrator

Hobby: Coffee roasting, Calligraphy, Metalworking, Fashion, Vehicle restoration, Shopping, Photography

Introduction: My name is Tyson Zemlak, I am a excited, light, sparkling, super, open, fair, magnificent person who loves writing and wants to share my knowledge and understanding with you.