Query Result Set
Skip Navigation Links
   ActiveUsers:363Hits:20363155Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
WEIN, LAWRENCE M (2) answer(s).
 
SrlItem
1
ID:   080448


Optimal spatiotemporal deployment of radiation portal monitors / Wein, Lawrence M; Liu, Yifan; Cao, Zheng; Flynn, Stephen E   Journal Article
Flynn, Stephen E Journal Article
0 Rating(s) & 0 Review(s)
Publication 2007.
Summary/Abstract Radiation portal monitors are starting to be deployed at overseas ports to prevent nuclear weapons from entering the U.S. in a shipping container. Current designs have containers on trucks passing through a portal monitor at approximately 10 mph, before being routed to one of several lanes at the port's front gate for a driver identification check. For a fixed cost of testing, which consists of the costs of radiation portal monitors plus offsite x-ray and possibly manual testing of containers generating a false radiation alarm that cannot be resolved by gamma-ray imaging, the neutron detection limits of the current design are compared with those of two other designs that do not affect truck congestion at the front gate. For a wide range of budgets, it is optimal to have six monitors in each lane that simultaneously test a truck while it is being processed at the front gate. This design is robust against the location (within the container) of the weapon and reduces the detection limit (relative to the current design) by approximately a factor of three (although the accuracy of this value is limited by the lack of publicly available data) for practical budgets, which is enough to offset some shielding for a plutonium weapon, but insufficient to detect an uranium weapon
        Export Export
2
ID:   097167


Overlapping networks approach to resource allocation for domest / Atkinson, Michael P; Wein, Lawrence M   Journal Article
Wein, Lawrence M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Summary/Abstract Motivated by the links between terror and crime and the difficulty in directly detecting terror activity, this article formulates and solves a resource allocation problem on overlapping networks to determine if interdiction efforts may be able to take advantage of these connections. The government, knowing only the general structure and overlap of the networks, allocates its scarce resources to investigate each terror and criminal network. There are two stages to the investigation: an initial investigation of all nodes (i.e., terrorists or criminals) and a secondary investigation of criminals identified during the initial investigation to determine if they are terrorists. Applying the model to data derived from a population of terrorists in the United States between 1971-2003 suggests that the government may be able to exploit the terror connections of crimes that are relatively uncommon, somewhat easy to detect, and are attractive to terrorists.
        Export Export