{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T02:10:02Z","timestamp":1745979002524,"version":"3.40.4"},"reference-count":30,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1,1]]},"abstract":"<p>Various mathematical methods and metaheuristic approaches have been developed in the past to address optimization problems related to aviation security. One such problem deals with a key component of an aviation security system, baggage and passenger screening devices. The decision process to determine which devices to procure by aviation and security officials, and how and where to deploy them can be quite challenging. In this study, two evolutionary algorithms are developed to obtain optimal baggage screening strategies, which minimize the expected annual total cost. Here, the expected annual cost function is composed of the purchasing and operating costs, as well as the costs associated to false alarms and false clears. A baggage screening strategy consists of various hierarchical levels of security screening devices through which a checked bag may pass through. A solution to the aviation baggage screening problem entails the number and type of devices to be installed at each hierarchical level. Solutions obtained from a comparison of a Genetic and a Memetic algorithm are presented. In addition, to illustrate the performance of both algorithms, different computational experiments utilizing the developed algorithms are also presented.<\/p>","DOI":"10.4018\/jaec.2013010101","type":"journal-article","created":{"date-parts":[[2013,3,22]],"date-time":"2013-03-22T16:19:09Z","timestamp":1363969149000},"page":"1-16","source":"Crossref","is-referenced-by-count":0,"title":["Designing Optimal Aviation Baggage Screening Strategies Using Evolutionary Algorithms"],"prefix":"10.4018","volume":"4","author":[{"given":"Anuar","family":"Aguirre","sequence":"first","affiliation":[{"name":"Industrial, Manufacturing & Systems Engineering Department, University of Texas at El Paso, El Paso, TX, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jose F.","family":"Espiritu","sequence":"additional","affiliation":[{"name":"Industrial, Manufacturing & Systems Engineering Department, University of Texas at El Paso, El Paso, TX, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Salvador","family":"Hern\u00e1ndez","sequence":"additional","affiliation":[{"name":"Civil Engineering Department, University of Texas at El Paso, El Paso, TX, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"2432","reference":[{"doi-asserted-by":"publisher","key":"jaec.2013010101-0","DOI":"10.1111\/j.0272-4332.2004.00489.x"},{"year":"2002","author":"V.Butler","journal-title":"Rethinking checked-baggage screening","key":"jaec.2013010101-1"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-2","DOI":"10.1016\/S0305-0548(03)00118-7"},{"year":"2002","author":"S.Chakrabarti","journal-title":"Carnival booth: An algorithm for defeating the computer-assisted passenger screening system","key":"jaec.2013010101-3"},{"year":"2002","author":"C. C.Coughlin","journal-title":"Aviation security and terrorism: A review of the economic issues","key":"jaec.2013010101-4"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-5","DOI":"10.1111\/j.1539-6924.2007.00966.x"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-6","DOI":"10.1016\/j.ress.2008.06.015"},{"issue":"1","key":"jaec.2013010101-7","first-page":"33","article-title":"Airport security, high reliability, and the problem of rationality.","volume":"62","author":"H. G.Frederickson","year":"2002","journal-title":"American Society for Public Administration"},{"issue":"1","key":"jaec.2013010101-8","first-page":"34","article-title":"A comparison between memetic algorithm and genetic algorithm for the cryptanalysis of simplified data encryption standard algorithm.","volume":"1","author":"P.Garg","year":"2009","journal-title":"International Journal of Network Security & Its Applications"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-9","DOI":"10.1007\/978-1-4615-6089-0"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-10","DOI":"10.1504\/IJRAM.2005.006608"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-11","DOI":"10.1080\/07408170304372"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-12","DOI":"10.1109\/45.954645"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-13","DOI":"10.1109\/TEVC.2005.850260"},{"issue":"3","key":"jaec.2013010101-14","first-page":"135","article-title":"Analytic hierarchy process approach for identifying relative importance of factors to improve passenger security checks at airports.","volume":"12","author":"E. Y.Kwang","year":"2005","journal-title":"Journal of Air Transport Management"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-15","DOI":"10.1080\/0740817X.2010.550909"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-16","DOI":"10.1287\/inte.1060.0231"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-17","DOI":"10.1002\/nav.20131"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-18","DOI":"10.1016\/j.cor.2009.06.015"},{"year":"1989","author":"P.Moscato","journal-title":"On evolution, search, optimization, genetic algorithms and martial arts: Towards memetic algorithms","key":"jaec.2013010101-19"},{"year":"2004","author":"P.Moscato","journal-title":"New optimization techniques in engineering, studies in fuzziness and soft computing","key":"jaec.2013010101-20"},{"unstructured":"O\u2019Harrow, R., Jr. (2002). Intricate screening of fliers in works database raises privacy concerns. Washington Post, p. A01.","key":"jaec.2013010101-21"},{"year":"2003","author":"R. W.Poole","journal-title":"A risk-based airport security policy (Tech. Rep. Public Policy No. 308)","key":"jaec.2013010101-22"},{"doi-asserted-by":"crossref","unstructured":"Rao, E., & Dickey, R. (1999). Evaluation of the FAA's security equipment integration program. In Proceedings of the International Carnahan Conference on Security Technology (pp. 158-167).","key":"jaec.2013010101-23","DOI":"10.1109\/CCST.1999.797907"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-24","DOI":"10.1016\/j.cie.2008.11.005"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-25","DOI":"10.1016\/S0165-1684(02)00391-2"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-26","DOI":"10.1111\/1539-6924.00367"},{"issue":"3","key":"jaec.2013010101-27","doi-asserted-by":"crossref","first-page":"245","DOI":"10.69554\/OQFZ7209","article-title":"Development and use of the dynamic security model for airports.","volume":"5","author":"W. E.Weiss","year":"2011","journal-title":"Journal of Airport Management"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-28","DOI":"10.1287\/inte.1060.0253"},{"doi-asserted-by":"publisher","key":"jaec.2013010101-29","DOI":"10.1111\/j.1539-6924.2008.01147.x"}],"container-title":["International Journal of Applied Evolutionary Computation"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=75822","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T01:36:31Z","timestamp":1745976991000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jaec.2013010101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,1,1]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"URL":"https:\/\/doi.org\/10.4018\/jaec.2013010101","relation":{},"ISSN":["1942-3594","1942-3608"],"issn-type":[{"type":"print","value":"1942-3594"},{"type":"electronic","value":"1942-3608"}],"subject":[],"published":{"date-parts":[[2013,1,1]]}}}