Srl | Item |
1 |
ID:
080448
|
|
|
Publication |
2007.
|
Summary/Abstract |
Radiation portal monitors are starting to be deployed at overseas ports to prevent nuclear weapons from entering the U.S. in a shipping container. Current designs have containers on trucks passing through a portal monitor at approximately 10 mph, before being routed to one of several lanes at the port's front gate for a driver identification check. For a fixed cost of testing, which consists of the costs of radiation portal monitors plus offsite x-ray and possibly manual testing of containers generating a false radiation alarm that cannot be resolved by gamma-ray imaging, the neutron detection limits of the current design are compared with those of two other designs that do not affect truck congestion at the front gate. For a wide range of budgets, it is optimal to have six monitors in each lane that simultaneously test a truck while it is being processed at the front gate. This design is robust against the location (within the container) of the weapon and reduces the detection limit (relative to the current design) by approximately a factor of three (although the accuracy of this value is limited by the lack of publicly available data) for practical budgets, which is enough to offset some shielding for a plutonium weapon, but insufficient to detect an uranium weapon
|
|
|
|
|
|
|
|
|
|
2 |
ID:
097167
|
|
|
Publication |
2010.
|
Summary/Abstract |
Motivated by the links between terror and crime and the difficulty in directly detecting terror activity, this article formulates and solves a resource allocation problem on overlapping networks to determine if interdiction efforts may be able to take advantage of these connections. The government, knowing only the general structure and overlap of the networks, allocates its scarce resources to investigate each terror and criminal network. There are two stages to the investigation: an initial investigation of all nodes (i.e., terrorists or criminals) and a secondary investigation of criminals identified during the initial investigation to determine if they are terrorists. Applying the model to data derived from a population of terrorists in the United States between 1971-2003 suggests that the government may be able to exploit the terror connections of crimes that are relatively uncommon, somewhat easy to detect, and are attractive to terrorists.
|
|
|
|
|
|
|
|
|
|