{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T20:08:47Z","timestamp":1720296527152},"reference-count":52,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Industrial Engineering"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1016\/j.cie.2017.03.010","type":"journal-article","created":{"date-parts":[[2017,3,6]],"date-time":"2017-03-06T21:04:20Z","timestamp":1488834260000},"page":"74-84","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["Bi-objective evolutionary approach to the design of patrolling schemes for improved border security"],"prefix":"10.1016","volume":"107","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-9664-5951","authenticated-orcid":false,"given":"Mohammed","family":"Muaafa","sequence":"first","affiliation":[]},{"given":"Jose Emmanuel","family":"Ramirez-Marquez","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.cie.2017.03.010_b0005","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1978721.1978729","article-title":"Guards and protect: Next generation applications of security games","volume":"10","author":"An","year":"2011","journal-title":"ACM SIGecom Exchanges"},{"key":"10.1016\/j.cie.2017.03.010_b0010","series-title":"A tale of two borders: The US-Mexico and US-Canada lines after 9\/11","author":"Andreas","year":"2003"},{"key":"10.1016\/j.cie.2017.03.010_b0015","series-title":"Border games: Policing the US-mexico divide","author":"Andreas","year":"2012"},{"key":"10.1016\/j.cie.2017.03.010_b0020","unstructured":"Basham, B. (2011). Why a border fence wouldn\u2019t work. US News Debate Club. Available: . Accessed June 2013."},{"key":"10.1016\/j.cie.2017.03.010_b0025","series-title":"Asynchronous multi-robot patrolling against intrusions in arbitrary topologies","first-page":"1224","author":"Basilico","year":"2010"},{"issue":"1","key":"10.1016\/j.cie.2017.03.010_b0030","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10458-012-9209-6","article-title":"An extended study on multi-objective security games","volume":"28","author":"Brown","year":"2014","journal-title":"Autonomous Agents and Multi-agent Systems"},{"issue":"6","key":"10.1016\/j.cie.2017.03.010_b0035","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1287\/inte.1060.0252","article-title":"Defending critical infrastructure","volume":"36","author":"Brown","year":"2006","journal-title":"Interfaces"},{"key":"10.1016\/j.cie.2017.03.010_b0040","unstructured":"Bureau of Justice Statistics. (2013). Local Police. Available: . Accessed 15 Sepember 2013."},{"issue":"12","key":"10.1016\/j.cie.2017.03.010_b0045","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1287\/mnsc.24.12.1291","article-title":"A patrol car allocation model: Capabilities and algorithms","volume":"24","author":"Chaiken","year":"1978","journal-title":"Management Science"},{"issue":"2","key":"10.1016\/j.cie.2017.03.010_b0050","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1287\/mnsc.27.2.213","article-title":"Deployment of one vs. two officer patrol units: A comparison of travel times","volume":"27","author":"Chelst","year":"1981","journal-title":"Management Science"},{"issue":"4","key":"10.1016\/j.cie.2017.03.010_b0055","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/TSMCA.2012.2183361","article-title":"Fast patrol route planning in dynamic environments","volume":"42","author":"Chen","year":"2012","journal-title":"Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans"},{"issue":"1","key":"10.1016\/j.cie.2017.03.010_b0060","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/BF01942293","article-title":"The maximal covering location problem","volume":"32","author":"Church","year":"1974","journal-title":"Papers of the Regional Science Association"},{"issue":"1","key":"10.1016\/j.cie.2017.03.010_b0065","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11067-007-9035-6","article-title":"Determining optimal police patrol areas with maximal covering and backup covering location models","volume":"10","author":"Curtin","year":"2010","journal-title":"Networks and Spatial Economics"},{"key":"10.1016\/j.cie.2017.03.010_b0070","series-title":"Integrating GIS and maximal covering models to determine optimal police patrol areas","first-page":"214","author":"Curtin","year":"2005"},{"issue":"3\u20134","key":"10.1016\/j.cie.2017.03.010_b0075","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10472-010-9193-y","article-title":"Multi-robot area patrol under frequency constraints","volume":"57","author":"Elmaliach","year":"2009","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"key":"10.1016\/j.cie.2017.03.010_b0080","doi-asserted-by":"publisher","first-page":"251","DOI":"10.4236\/ijcns.2013.65028","article-title":"Advanced border intrusion detection and surveillance using wireless sensor network technology","volume":"6","author":"Felemban","year":"2013","journal-title":"Int'l J. of Communications, Network and System Sciences"},{"issue":"3","key":"10.1016\/j.cie.2017.03.010_b0085","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1162\/DAED_a_00216","article-title":"Immigration past and present","volume":"142","author":"Foner","year":"2013","journal-title":"Daedalus"},{"key":"10.1016\/j.cie.2017.03.010_b0090","series-title":"43rd IEEE conference on decision and control","article-title":"Border patrol and surveillance missions using multiple unmanned air vehicles","author":"Girard","year":"2004"},{"issue":"1","key":"10.1016\/j.cie.2017.03.010_b0095","first-page":"25","article-title":"Rules for ordering uncertain prospects","volume":"59","author":"Hadar","year":"1969","journal-title":"The American Economic Review"},{"key":"10.1016\/j.cie.2017.03.010_b0100","unstructured":"Haddal, C. C. & Gertler, J. (2008). Homeland security: Unmanned aerial vehicles. CRS Report for Congress."},{"key":"10.1016\/j.cie.2017.03.010_b0105","series-title":"Handbook of the Poisson distribution","author":"Haight","year":"1967"},{"issue":"1","key":"10.1016\/j.cie.2017.03.010_b0110","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSMCA.2010.2055152","article-title":"Learning from humans: Agent modeling with individual human behaviors","volume":"41","author":"Hattori","year":"2011","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans"},{"issue":"1","key":"10.1016\/j.cie.2017.03.010_b0115","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/TSMCA.2010.2064299","article-title":"People counting and human detection in a challenging situation","volume":"41","author":"Hou","year":"2011","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans"},{"key":"10.1016\/j.cie.2017.03.010_b0120","series-title":"The 2013 international conference on autonomous agents and multi-agent systems, Saint Paul, Minnesota","article-title":"Game-theoretic randomization for security patrolling with dynamic execution uncertainty","author":"Jiang","year":"2013"},{"key":"10.1016\/j.cie.2017.03.010_b0125","unstructured":"Koch, K. (2006). Bush OKs 700-mile (1,100km) border fence. Available: . Accessed July 2013."},{"issue":"1","key":"10.1016\/j.cie.2017.03.010_b0130","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/0305-0548(94)00094-O","article-title":"On the complexity of manpower shift scheduling","volume":"23","author":"Lau","year":"1996","journal-title":"Computers & Operations Research"},{"issue":"12","key":"10.1016\/j.cie.2017.03.010_b0135","doi-asserted-by":"publisher","first-page":"8148","DOI":"10.1016\/j.eswa.2010.05.073","article-title":"Optimizing patrol force deployment using a genetic algorithm","volume":"37","author":"Lau","year":"2010","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.cie.2017.03.010_b0140","series-title":"Proceedings of 22nd annual INCOSE int. symposium (IS 2012), Rome, Italy","article-title":"Development of patrolling schemes for improved border security performance through an evolutionary approach","author":"Muaafa","year":"2012"},{"issue":"1","key":"10.1016\/j.cie.2017.03.010_b9000","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/TEM.2016.2634119","article-title":"Engineering management models for urban security","volume":"64","author":"Muaafa","year":"2017","journal-title":"IEEE Transactions on Engineering Management"},{"key":"10.1016\/j.cie.2017.03.010_b0145","series-title":"Border security: Barriers along the US international border","author":"Nunez-Neto","year":"2006"},{"issue":"1","key":"10.1016\/j.cie.2017.03.010_b0150","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.cie.2012.02.007","article-title":"Heuristics for determining a patrol path of an unmanned combat vehicle","volume":"36","author":"Park","year":"2012","journal-title":"Computers and Industrial Engineering"},{"key":"10.1016\/j.cie.2017.03.010_b0155","series-title":"The 7th international joint conference on autonomous agents and multiagent systems","article-title":"Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games","author":"Paruchuri","year":"2008"},{"issue":"2","key":"10.1016\/j.cie.2017.03.010_b0160","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1287\/mnsc.37.2.233","article-title":"The maximal covering location problem with capacities on total workload","volume":"37","author":"Pirkul","year":"1991","journal-title":"Management Science"},{"issue":"1","key":"10.1016\/j.cie.2017.03.010_b0165","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1609\/aimag.v30i1.2173","article-title":"Using game theory for Los Angeles airport security","volume":"30","author":"Pita","year":"2009","journal-title":"AI Magazine"},{"key":"10.1016\/j.cie.2017.03.010_b0170","series-title":"Using pattern analysis and systematic randomness to allocate US border security resources","author":"Predd","year":"2012"},{"issue":"11","key":"10.1016\/j.cie.2017.03.010_b0175","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1016\/j.ress.2008.01.001","article-title":"All-terminal network reliability optimization via probabilistic solution discovery","volume":"93","author":"Ramirez-Marquez","year":"2008","journal-title":"Reliability Engineering & System Safety"},{"issue":"11","key":"10.1016\/j.cie.2017.03.010_b0180","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1016\/j.ress.2008.01.001","article-title":"All-terminal network reliability optimization via probabilistic solution discovery","volume":"93","author":"Ramirez-Marquez","year":"2008","journal-title":"Reliability Engineering & System Safety"},{"key":"10.1016\/j.cie.2017.03.010_b0185","unstructured":"Salisbury, T. (2007). Assigned vehicle costs. Available: . Accessed 16 September 2013."},{"key":"10.1016\/j.cie.2017.03.010_b0190","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1057\/jos.2012.20","article-title":"Verification and validation of simulation models","volume":"7","author":"Sargent","year":"2013","journal-title":"Journal of Simulation"},{"key":"10.1016\/j.cie.2017.03.010_b0195","first-page":"13","article-title":"PROTECT: A deployed game theoretic system to protect the ports of the United States","volume":"Vol. 1","author":"Shieh","year":"2012"},{"issue":"1","key":"10.1016\/j.cie.2017.03.010_b0200","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/TEVC.2002.806788","article-title":"Evolutionary programming techniques for economic load dispatch","volume":"7","author":"Sinha","year":"2003","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"10.1016\/j.cie.2017.03.010_b0205","series-title":"Proceedings of the 2014 international conference on autonomous agents and multi-agent systems","first-page":"1093","article-title":"Multi-robot adversarial patrolling: Facing coordinated attacks","author":"Sless","year":"2014"},{"issue":"3","key":"10.1016\/j.cie.2017.03.010_b0210","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1016\/j.adhoc.2010.09.008","article-title":"BorderSense: Border patrol through advanced wireless sensor networks","volume":"9","author":"Sun","year":"2011","journal-title":"Ad Hoc Networks"},{"key":"10.1016\/j.cie.2017.03.010_b0215","series-title":"Proceedings of 8th int. conf. on autonomous agents and multiagent systems (AAMAS 2009), Budapest, Hungary, May 2009","article-title":"IR IS-a tool for strategic security allocation in transportation networks","author":"Tsai","year":"2009"},{"key":"10.1016\/j.cie.2017.03.010_b0220","unstructured":"US Customs and Border Protection. (2012). Border patrol agent staffing by fiscal year. Available: . Accessed 20 Oct 2013."},{"key":"10.1016\/j.cie.2017.03.010_b0225","unstructured":"US Customs and Border Protection. (2012). 2012\u20132016 national border patrol strategy. Available: . Accessed May 2013."},{"key":"10.1016\/j.cie.2017.03.010_b0230","series-title":"Proceedings of the 14th annual conference on genetic and evolutionary computation","first-page":"505","article-title":"A new multi-objective evolutionary algorithm based on a performance assessment indicator","author":"Villalobos","year":"2012"},{"issue":"6","key":"10.1016\/j.cie.2017.03.010_b0235","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1109\/3468.798077","article-title":"Stochastic ordering of extreme value distributions","volume":"29","author":"Wang","year":"1999","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans"},{"issue":"5","key":"10.1016\/j.cie.2017.03.010_b0240","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1111\/j.1539-6924.2008.01180.x","article-title":"Analyzing the homeland security of the US-Mexico border","volume":"29","author":"Wein","year":"2009","journal-title":"Risk Analysis"},{"key":"10.1016\/j.cie.2017.03.010_b0245","first-page":"453","article-title":"Adaptive resource allocation for wildlife protection against illegal poachers","volume":"Vol. 1","author":"Yang","year":"2014"},{"issue":"4","key":"10.1016\/j.cie.2017.03.010_b0250","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1609\/aimag.v33i4.2432","article-title":"TRUSTS: Scheduling randomized patrols for fare inspection in transit systems using game theory","volume":"33","author":"Yin","year":"2012","journal-title":"AI Magazine"},{"issue":"2","key":"10.1016\/j.cie.2017.03.010_b0255","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1162\/106365600568202","article-title":"Comparison of multiobjective evolutionary algorithms: Empirical results","volume":"8","author":"Zitzler","year":"2000","journal-title":"Evolutionary Computation"}],"container-title":["Computers & Industrial Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0360835217300931?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0360835217300931?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T06:47:42Z","timestamp":1568875662000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0360835217300931"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":52,"alternative-id":["S0360835217300931"],"URL":"https:\/\/doi.org\/10.1016\/j.cie.2017.03.010","relation":{},"ISSN":["0360-8352"],"issn-type":[{"value":"0360-8352","type":"print"}],"subject":[],"published":{"date-parts":[[2017,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Bi-objective evolutionary approach to the design of patrolling schemes for improved border security","name":"articletitle","label":"Article Title"},{"value":"Computers & Industrial Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cie.2017.03.010","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}