Investigating the dependency of detectors in threat areas

Suicide bombers are people who use explosives against their targets, knowing that their actions will cause a massive number of casualties. Suicide bombing involves in planning and executing the detonation on their en route to their targets [1]. From the kamikaze pilots during World War II, to the su...

Full description

Bibliographic Details
Main Author: Loh, Swee Chye
Other Authors: School of Mechanical and Aerospace Engineering
Format: Final Year Project (FYP)
Language:English
Published: 2014
Subjects:
Online Access:http://hdl.handle.net/10356/60273
_version_ 1811689097442361344
author Loh, Swee Chye
author2 School of Mechanical and Aerospace Engineering
author_facet School of Mechanical and Aerospace Engineering
Loh, Swee Chye
author_sort Loh, Swee Chye
collection NTU
description Suicide bombers are people who use explosives against their targets, knowing that their actions will cause a massive number of casualties. Suicide bombing involves in planning and executing the detonation on their en route to their targets [1]. From the kamikaze pilots during World War II, to the suicide bombers during the post Iraq war, suicide bombers had played a critical role in achieving their goals and ideology. From 20 March 2003 to 31 December 2010, a total of 18,5513 casualties and 40,276 deaths of Iraqi civilian due to suicide bombings were documented [2]. The advancement of technology has helped to detect and prevent suicide bombers from detonating their explosives but technology is a double-edged sword. Suicide bombers are able to make use of technology to escalate their scale of operations and come up with methods to mask and disguise the bombs. In addition, suicide bombers tend to move in small numbers, thus making the detection process even more tedious. In order to detect a bomb threat effectively, a network of detectors are deployed. When dealing with a network of detectors, research papers like Luo et al (1989) [3] and Kaplan et al. assume that the detectors work independently. In actual fact, detectors in a network are not completely independent, especially when their detection areas intersect with each other due to the disturbances in the same working environment. Thus, there is a need to investigate the dependency of detectors in threat areas so that “false” information cues gathered from detectors can be eliminated.
first_indexed 2024-10-01T05:42:41Z
format Final Year Project (FYP)
id ntu-10356/60273
institution Nanyang Technological University
language English
last_indexed 2024-10-01T05:42:41Z
publishDate 2014
record_format dspace
spelling ntu-10356/602732023-03-04T18:50:08Z Investigating the dependency of detectors in threat areas Loh, Swee Chye School of Mechanical and Aerospace Engineering Nie Xiaofeng DRNTU::Engineering::Mechanical engineering Suicide bombers are people who use explosives against their targets, knowing that their actions will cause a massive number of casualties. Suicide bombing involves in planning and executing the detonation on their en route to their targets [1]. From the kamikaze pilots during World War II, to the suicide bombers during the post Iraq war, suicide bombers had played a critical role in achieving their goals and ideology. From 20 March 2003 to 31 December 2010, a total of 18,5513 casualties and 40,276 deaths of Iraqi civilian due to suicide bombings were documented [2]. The advancement of technology has helped to detect and prevent suicide bombers from detonating their explosives but technology is a double-edged sword. Suicide bombers are able to make use of technology to escalate their scale of operations and come up with methods to mask and disguise the bombs. In addition, suicide bombers tend to move in small numbers, thus making the detection process even more tedious. In order to detect a bomb threat effectively, a network of detectors are deployed. When dealing with a network of detectors, research papers like Luo et al (1989) [3] and Kaplan et al. assume that the detectors work independently. In actual fact, detectors in a network are not completely independent, especially when their detection areas intersect with each other due to the disturbances in the same working environment. Thus, there is a need to investigate the dependency of detectors in threat areas so that “false” information cues gathered from detectors can be eliminated. Bachelor of Engineering (Mechanical Engineering) 2014-05-26T05:42:40Z 2014-05-26T05:42:40Z 2014 2014 Final Year Project (FYP) http://hdl.handle.net/10356/60273 en Nanyang Technological University 55 p. application/pdf
spellingShingle DRNTU::Engineering::Mechanical engineering
Loh, Swee Chye
Investigating the dependency of detectors in threat areas
title Investigating the dependency of detectors in threat areas
title_full Investigating the dependency of detectors in threat areas
title_fullStr Investigating the dependency of detectors in threat areas
title_full_unstemmed Investigating the dependency of detectors in threat areas
title_short Investigating the dependency of detectors in threat areas
title_sort investigating the dependency of detectors in threat areas
topic DRNTU::Engineering::Mechanical engineering
url http://hdl.handle.net/10356/60273
work_keys_str_mv AT lohsweechye investigatingthedependencyofdetectorsinthreatareas