Optimal allocation of security sensors/guards-graph theoretic approach

K. Inoue, T. Kohda, M. Shirahama
{"title":"Optimal allocation of security sensors/guards-graph theoretic approach","authors":"K. Inoue, T. Kohda, M. Shirahama","doi":"10.1109/CCST.1993.386812","DOIUrl":null,"url":null,"abstract":"The problem of optimal allocation of security sensors and/or guards is formulated as a graph/network problem, where the importance of the concept of degree of security or multiple minimal cut set is stressed. An algorithm for solving the formulated graph/network problem is developed and it is shown that the algorithm is very effective from the viewpoint of computational complexity. Examples are given to illustrate the concept of degree of security, optimal allocation of security sensors/guards, multiple minimal cut set, and computational efficiency. A typical example among them is: assume a terrorist or a thief is going to attack a target in a town. The problem is to find the minimum number of sensors/guards and where and how to allocate them in the town, detecting him at least twice (or more generally k times) on his way to the target, even if he may take any route among numerous possible routes.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"188 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1993.386812","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The problem of optimal allocation of security sensors and/or guards is formulated as a graph/network problem, where the importance of the concept of degree of security or multiple minimal cut set is stressed. An algorithm for solving the formulated graph/network problem is developed and it is shown that the algorithm is very effective from the viewpoint of computational complexity. Examples are given to illustrate the concept of degree of security, optimal allocation of security sensors/guards, multiple minimal cut set, and computational efficiency. A typical example among them is: assume a terrorist or a thief is going to attack a target in a town. The problem is to find the minimum number of sensors/guards and where and how to allocate them in the town, detecting him at least twice (or more generally k times) on his way to the target, even if he may take any route among numerous possible routes.<>
安全传感器/警卫的优化配置——图论方法
将安全传感器和/或防护装置的最优配置问题表述为一个图/网络问题,强调了安全度或多个最小割集概念的重要性。提出了一种求解公式化图/网络问题的算法,并从计算复杂度的角度证明了该算法的有效性。举例说明了安全程度、安全传感器/防护的最优分配、多重最小割集和计算效率的概念。其中一个典型的例子是:假设一个恐怖分子或小偷要袭击一个城镇的目标。问题是找到最小数量的传感器/警卫,以及如何在城镇中分配它们,在他前往目标的途中至少探测到他两次(或更一般地说k次),即使他可能选择众多可能路线中的任何一条。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信