Decision support for wide area search in a radiological threat scenario: for intelligent reachback using complex DSS architectures

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the stressful scenario of a terrorist threat that involves a radiological dispersion device, an effective search strategy must be prepared. This problem is highly complex, especially when multiple platforms are deployed. Besides the automated suggestions for an effective search strategy, a remote advice and assist cell can benefit from visual aid in the form of a heat map overlay on a geographical map, which evolves according to both the expected target movements and the observations made by the sensors. Such decision support software can be equipped with optimization algorithms that provide search strategies. However, the algorithms are only as good as the accuracy of the parameter configuration, such as the estimation of the target motion and the search effectiveness of the sensor. In this paper, we focus on the estimation of the latter parameter for two sensors and two types of targets. The first step in this process consists of field experiments to approximate the target dependent sensor ranges. We then describe a fictive but realistic scenario in which a suspect carrying radiological material must be detected to prevent a terrorist attack in the center of a big city. We show how to estimate the parameters for the search effectiveness in this scenario. Finally, in a proof of concept, we compare two algorithms for optimization of a search strategy for multiple searchers. Here, the algorithms are configured using the mentioned parameter estimations. Computational experiments show that the search effectiveness significantly influences the probability of detection throughout the search.

Cite

CITATION STYLE

APA

Raap, M., Pickl, S., Moll, M., & Bordetsky, A. (2018). Decision support for wide area search in a radiological threat scenario: for intelligent reachback using complex DSS architectures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10756 LNCS, pp. 303–313). Springer Verlag. https://doi.org/10.1007/978-3-319-76072-8_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free