José E. Gallardo’s research while affiliated with University of Malaga and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (31)


New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics
  • Preprint

May 2024

·

1 Read

·

José E. Gallardo

We consider an operational model of suicide bombing attacks -- an increasingly prevalent form of terrorism -- against specific targets, and the use of protective countermeasures based on the deployment of detectors over the area under threat. These detectors have to be carefully located in order to minimize the expected number of casualties or the economic damage suffered, resulting in a hard optimization problem for which different metaheuristics have been proposed. Rather than assuming random decisions by the attacker, the problem is approached by considering different models of the latter, whereby he takes informed decisions on which objective must be targeted and through which path it has to be reached based on knowledge on the importance or value of the objectives or on the defensive strategy of the defender (a scenario that can be regarded as an adversarial game). We consider four different algorithms, namely a greedy heuristic, a hill climber, tabu search and an evolutionary algorithm, and study their performance on a broad collection of problem instances trying to resemble different realistic settings such as a coastal area, a modern urban area, and the historic core of an old town. It is shown that the adversarial scenario is harder for all techniques, and that the evolutionary algorithm seems to adapt better to the complexity of the resulting search landscape.


Evolutionary Algorithms for Optimizing Emergency Exit Placement in Indoor Environments

May 2024

·

3 Reads

The problem of finding the optimal placement of emergency exits in an indoor environment to facilitate the rapid and orderly evacuation of crowds is addressed in this work. A cellular-automaton model is used to simulate the behavior of pedestrians in such scenarios, taking into account factors such as the environment, the pedestrians themselves, and the interactions among them. A metric is proposed to determine how successful or satisfactory an evacuation was. Subsequently, two metaheuristic algorithms, namely an iterated greedy heuristic and an evolutionary algorithm (EA) are proposed to solve the optimization problem. A comparative analysis shows that the proposed EA is able to find effective solutions for different scenarios, and that an island-based version of it outperforms the other two algorithms in terms of solution quality.


Fig. 1: The bart chart shows the number of casualties (dead and injured) in suicide attacks in the period 2001-2015 (total year figures on top of each bar, scale on the left). The black curve indicates the number of suicide attacks in this time frame (scale on the right). Source: own elaboration based on data from (Chicago Project on Security and Terrorism (CPOST), 2016).
Fig. 7: Relative distances to best known solutions of results provided by HC and Greedy on 128 × 128 instances.
Fig. 8: Relative improvements of HC over Greedy for different percentages of blocked cells (ϖ) in the map. Settings are ordered (left to right) from more difficult to easier ones. Rankings are shown at the right side of labels. In order to interpret this figure and subsequent ones in this subsection, notice that the boxplots depict the distribution of the aggregated data and show the range of variation in each case, whereas the rankings are computed by aligning the results obtained by each algorithm on the instances generated by each parameter combination and are used by the statistical tests.
Fig. 9: Relative improvements of HC over Greedy for different side lengths (ζ ) of cells in the grid. Settings are ordered (left to right) from more difficult to easier ones. Rankings are shown at the right side of labels.
Fig. 10: Relative improvements of HC over Greedy for different values of the detection radius (τ). Settings are ordered (left to right) from more difficult to easier ones. Rankings are shown at the right side of labels.

+5

Metaheuristic approaches to the placement of suicide bomber detectors
  • Preprint
  • File available

May 2024

·

9 Reads

Suicide bombing is an infamous form of terrorism that is becoming increasingly prevalent in the current era of global terror warfare. We consider the case of targeted attacks of this kind, and the use of detectors distributed over the area under threat as a protective countermeasure. Such detectors are non-fully reliable, and must be strategically placed in order to maximize the chances of detecting the attack, hence minimizing the expected number of casualties. To this end, different metaheuristic approaches based on local search and on population-based search are considered and benchmarked against a powerful greedy heuristic from the literature. We conduct an extensive empirical evaluation on synthetic instances featuring very diverse properties. Most metaheuristics outperform the greedy algorithm, and a hill-climber is shown to be superior to remaining approaches. This hill-climber is subsequently subject to a sensitivity analysis to determine which problem features make it stand above the greedy approach, and is finally deployed on a number of problem instances built after realistic scenarios, corroborating the good performance of the heuristic.

Download

A GRASP-based memetic algorithm with path relinking for the far from most string problem

May 2024

·

21 Reads

The FAR FROM MOST STRING PROBLEM (FFMSP) is a string selection problem. The objective is to find a string whose distance to other strings in a certain input set is above a given threshold for as many of those strings as possible. This problem has links with some tasks in computational biology and its resolution has been shown to be very hard. We propose a memetic algorithm (MA) to tackle the FFMSP. This MA exploits a heuristic objective function for the problem and features initialization of the population via a Greedy Randomized Adaptive Search Procedure (GRASP) metaheuristic, intensive recombination via path relinking and local improvement via hill climbing. An extensive empirical evaluation using problem instances of both random and biological origin is done to assess parameter sensitivity and draw performance comparisons with other state-of-the-art techniques. The MA is shown to perform better than these latter techniques with statistical significance.


Evolutionary Algorithms for Optimizing Emergency Exit Placement in Indoor Environments

March 2024

·

24 Reads

·

2 Citations

Lecture Notes in Computer Science

The problem of finding the optimal placement of emergency exits in an indoor environment to facilitate the rapid and orderly evacuation of crowds is addressed in this work. A cellular-automaton model is used to simulate the behavior of pedestrians in such scenarios, taking into account factors such as the environment, the pedestrians themselves, and the interactions among them. A metric is proposed to determine how successful or satisfactory an evacuation was. Subsequently, two metaheuristic algorithms, namely an iterated greedy heuristic and an evolutionary algorithm (EA) are proposed to solve the optimization problem. A comparative analysis shows that the proposed EA is able to find effective solutions for different scenarios, and that an island-based version of it outperforms the other two algorithms in terms of solution quality.


New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics

June 2019

·

87 Reads

·

1 Citation

Natural Computing

We consider an operational model of suicide bombing attacks—an increasingly prevalent form of terrorism—against specific targets, and the use of protective countermeasures based on the deployment of detectors over the area under threat. These detectors have to be carefully located in order to minimize the expected number of casualties or the economic damage suffered, resulting in a hard optimization problem for which different metaheuristics have been proposed. Rather than assuming random decisions by the attacker, the problem is approached by considering different models of the latter, whereby he takes informed decisions on which objective must be targeted and through which path it has to be reached based on knowledge on the importance or value of the objectives or on the defensive strategy of the defender (a scenario that can be regarded as an adversarial game). We consider four different algorithms, namely a greedy heuristic, a hill climber, tabu search and an evolutionary algorithm, and study their performance on a broad collection of problem instances trying to resemble different realistic settings such as a coastal area, a modern urban area, and the historic core of an old town. It is shown that the adversarial scenario is harder for all techniques, and that the evolutionary algorithm seems to adapt better to the complexity of the resulting search landscape.



Metaheuristic approaches to the placement of suicide bomber detectors

June 2018

·

365 Reads

·

8 Citations

Journal of Heuristics

Suicide bombing is an infamous form of terrorism that is becoming increasingly prevalent in the current era of global terror warfare. We consider the case of targeted attacks of this kind, and the use of detectors distributed over the area under threat as a protective countermeasure. Such detectors are non-fully reliable, and must be strategically placed in order to maximize the chances of detecting the attack, hence minimizing the expected number of casualties. To this end, different metaheuristic approaches based on local search and on population-based search (such as a hill climber, different Greedy randomized adaptive search procedures, an evolutionary algorithm and several estimation of distribution algorithms) are considered and benchmarked against a powerful greedy heuristic from the literature. We conduct an extensive empirical evaluation on synthetic instances featuring very diverse properties. Most metaheuristics outperform the greedy algorithm, and a hill-climber is shown to be superior to remaining approaches. This hill-climber is subsequently subject to a sensitivity analysis to determine which problem features make it stand above the greedy approach, and is finally deployed on a number of problem instances built after realistic scenarios, corroborating the good performance of the heuristic.


Memetic Algorithms: A Contemporary Introduction

November 2016

·

308 Reads

·

8 Citations

Memetic algorithms (MAs) constitute a search and optimization paradigm based on the orchestrated interplay between global and local search components, and have the exploitation of specific problem knowledge as one of their central tenets. MAs can take different forms although a classical incarnation involves the integration of independent search processes within a population-based optimization approach. We discuss this basic structure as well as several of the issues arising in the design process. This paves the way for providing a glimpse of some algorithmic extensions of this basic scheme. After providing an overview of the numerous practical applications of MAs, we close this article with some current perspectives of these techniques.


Table 4 : Results for the Aligned Friedman Rank Test on RandomSet instances for MA GRASP+HC+PR and different state-of-the-art algorithms.
Figure 5: Local Search Algorithm for FFMSP.
Figure 6: Box plots for relative percentage distances (RPD) from best solutions of results obtained by each memetic algorithm for instances in RandomSet and distance threshold d = 0.80 · m. We have considered 6 datasets, each one comprising 5 different instances. Instances on each dataset are characterized by a number of strings (n) of the same length (m) and a distance threshold (d). For each combination of n/m parameters, box plots in left-to-right order correspond to algorithms in legend in top-to-bottom, left-to-right order. 
Table 7 : Results for the Aligned Friedman Rank Test on RealSet instances for MA GRASP+HC+PR and different state-of-the-art algorithms.
Figure 8: Box plots for relative percentage distances (RPD) from best solutions of results obtained by state-of-the-art algorithms for the FFMSP (GRASP FFR and GRASP Mou ) and MA GRASP+HC+PR for instances in RandomSet and distance threshold d = 0.80 · m. Instances on each dataset are characterized by a number of strings (n) of the same length (m) and a distance threshold (d). For each combination of n/m parameters, box plots in left-to-right order correspond to algorithms in legend in top-to-bottom order. 
A GRASP-based memetic algorithm with path relinking for the far from most string problem

May 2015

·

236 Reads

·

18 Citations

Engineering Applications of Artificial Intelligence

The Far From Most String Problem (FFMSP) is a string selection problem. The objective is to find a string whose distance to other strings in a certain input set is above a given threshold for as many of those strings as possible. This problem has links with some tasks in computational biology and its resolution has been shown to be very hard. We propose a memetic algorithm (MA) to tackle the FFMSP. This MA exploits a heuristic objective function for the problem and features initialization of the population via a Greedy Randomized Adaptive Search Procedure (GRASP) metaheuristic, intensive recombination via path relinking and local improvement via hill climbing. An extensive empirical evaluation using problem instances of both random and biological origin is done to assess parameter sensitivity and draw performance comparisons with other state-of-the-art techniques. The MA is shown to perform better than these latter techniques with statistical significance.


Citations (24)


... There are many tools that can be used for that purpose, including multi-agent systems and cellular automata (CA), just to cite two examples (see also [3]). We have recently proposed a simulation framework for crowd evacuation based on CA, and explored its use for simulation-based optimization [1,2]. We provide here an experimental examination of the performance of evolutionary algorithms (EAs) considering scenarios resembling supermarket environments, and conduct a comparison with a greedy heuristic and a numerical optimization method (Neldel-Mead algorithm). ...

Reference:

Navigating the Aisles: Evolutionary Algorithms for Supermarket Evacuation Planning
Evolutionary Algorithms for Optimizing Emergency Exit Placement in Indoor Environments
  • Citing Chapter
  • March 2024

Lecture Notes in Computer Science

... The primary novelty of this work, from the theoretical point of view, is the utilization of body posture data for the task at hand. There have been past works, like (Cotta and Gallardo, 2019), (Ahmad et al., 2019), and (Singer and Golan, 2019) that also address the task of identifying a suicide bomber, however, there contribution is either limited to the placement of sensors (Cotta and Gallardo, 2019), analysis of textual data for inclination towards the act of executing a suicidal attack (Ahmad et al., 2019) or performing post attack analysis using the available data (Singer and Golan, 2019). To the best of our knowledge, there is no work available that identifies a suicide bomber in a real-world environment during the window when the attack is being executed. ...

New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics

Natural Computing

... investigated variables that can be used to identify terrorists, particularly in a crowded area. This was accomplished by creating a model for identifying suicide bombers [7]. used a metaheuristic approach for the development of suicide bomber detection. ...

Metaheuristic approaches to the placement of suicide bomber detectors

Journal of Heuristics

... These two algorithms also cooperate in [25,50], the exact technique providing partial promising solutions, and the metaheuristic returning improved bound. A related approach involving beam search and full-fledged MAs can be found in [51,53,55]; see also [27] for a broader overview of this kind of combinations. ...

Memetic Algorithms and Complete Techniques

Studies in Computational Intelligence

... Although random initialization is often the default strategy in many EA-based endeavors, it is much more common for MAs to feature some kind of guided initialization by incorporating constructive heuristics tailored to the problem at hand. These can range from simple greedy heuristics to more complex metaheuristics such as GRASP (Gallardo and Cotta 2015) or beam search (Gallardo et al. 2007), just to cite a couple of examples. The bottom line here is to try to seed the initial population with good quality solutions not just to give the MA a head start for the optimization process but actually providing the algorithm with the building blocks to conduct an effective optimization process. ...

A GRASP-based memetic algorithm with path relinking for the far from most string problem

Engineering Applications of Artificial Intelligence

... In order to maximize the code reuse and to favor testing of Hybrid Metaheuristics (Blum and Roli, 2008), all heuristic methods should be implemented using the Heuristic class abstraction. With this abstraction we have already been able to implement the following methods: First Improvement, Best Improvement, Hill Climbing and other classical heuristic strategies (Hansen and Mladenovi´cMladenovi´c, 2006); Iterated Local Search, Simulated Annealing, Tabu Search, Variable Neighborhood Search and other basic versions of many famous trajectory based metaheuristics (Glover and Kochenberger, 2003); and, finally, the basic versions of population based metaheuristics Genetic Algorithm and Memetic Algorithm ( Glover and Kochenberger, 2003). ...

Hybrid Metaheuristics, 5th International Workshop, HM 2008, Málaga, Spain, October 8-9, 2008. Proceedings
  • Citing Article
  • January 2008

·

·

·

[...]

·

... Biology [88,89,185,186,196,200,237,236,238,239,267,268] Chemistry [77,79,78,76,107,193] Chemical Engineering [47,74,138,139,148,156,240,254,255,251,253,252] Data Compression [273,167,269,278,244,144] Drug Design [103,190,191,250,249,128,159, 108] Electronic Engineering [133,270,100,204,41,96,199,206,46,97,117,205,113,116,112,209,115,213,114] more exotic Memetic Algorithms that use heuristics of only one type, or multiple heuristics of each type exist. The adaptability of Memetic Algorithms to parallel implementation also encourages the use of multiple different types of heuristics simultaneously -the exploitation of all available knowledge is, after all, the central idea of the Memetic paradigm. ...

A Multilevel Probabilistic Beam Search Algorithm for the Shortest Common Supersequence Problem

... Another interesting point to delve into is the ability of Meta-RaPS to produce high-quality solutions for discrete optimization problems. Furthermore, Meta-RaPS is easy to understand and implement and can generate a feasible solution at every iteration [44,45]. In this study, the Meta-RaPS will repeat the steps of finding valid clubs, i.e., clubs with a diameter less than s, until each vertex of the input graph is assigned to at least one club. ...

Exact, Metaheuristic, and Hybrid Approaches to Multidimensional Knapsack Problems

... Finally, a greedy operator (CS) was designed to search a consensus tree among the parents. It applies the NNI operator on the T 1 parent until the offspring reaches a random determined distance r (Robinson-Foulds distance [53]) from both parents (in Figure 3, we show a scheme of the four crossover operators inspired on the work of [54]). Finally, a uniform crossover operator combines the parameters of the evolutionary model employed in the likelihood calculation for each parent. ...

Reconstructing phylogenies with memetic algorithms and branch-and-bound