Document 11152239

advertisement
Systems-Based Analysis of a Ship Borne Approach for the Detection of
Fissile Material Concealed in Cargo Containers
by
Brett P. Broderick
B.S. Electrical Engineering (2001)
Texas A&M University
Submitted to the Department of Nuclear Engineering
in Partial Fulfillment of the Requirements for the Degree of
Master of Science in Nuclear Engineering
at the
Massachusetts Institute of Technology
September 2004
@ 2004 Massachusetts Institute of Technology
All rights reserved
I
Cerified
Signatureof Author .............
.............
Department of Nuclear Engineering
August 31, 2004
Certifiedb
..........
. .K.i
--
Richard C. Lanza
Senior Research Scientist in Nuclear Engineering
n
Thesis Supervisor
Readby.........
.:.
V'
Michael J. Driscoll
Professor Emeritus of Nuclear Engineering
zAd .
,
Thesis Reader
Accepted
by................................................... ...
Jeffery A. Coderre
Chairman, Department Committee on Graduate Students
MASSACHUSETTS S~iirTL
OF TECHNOLOGY
OCT 1 12005
.IBRARIES
ARCHie .
Systems-Based Analysis of a Ship Borne Approach for the Detection of Fissile
Material Concealed in Cargo Containers
By
Brett P. Broderick
Submitted to the Department of Nuclear Engineering On August 31, 2004 in Partial Fulfillment
of the Requirements for the Degree of Master of Science in Nuclear Engineering
Abstract
The international maritime container trade, which imports an average of 19,000
largely uninspected cargo containers to United States ports each day, has been identified
as a potential avenue of attack for nuclear terrorism. Currently envisioned and deployed
defensive measures that seek to detect and interdict concealed fissile material once
containers have already reached a U.S. port do not adequately protect against nuclear
threats due to the unique power and range of nuclear weapon effects. This thesis
describes and examines a novel "ship-based" approach to container-borne fissile material
detection where suites of radiation detectors with imaging capabilities are enclosed in
standard, non-descript cargo containers and shipped in limited numbers aboard
commercial containerships. Outfitted with communication hardware, these dedicated
containerized units could provide crucial advance detection and notification of an
inbound nuclear threat while the danger is still safely removed from U.S. shores.
Attributes of the container shipping trade that would impact the performance and
viability of the proposed ship-based approach were identified and investigated. Average
available count times, based on the duration of shipping voyages, for container imports to
representative ports on the east and west coasts of the U.S. where found to be 19.2 days
and 13.3. days, respectively. These long count times will enhance the ability of the shipbased approach to confidently detect heavily shielded and well-concealed fissile material.
A distribution for the average distributed density of commercial cargo, which affects
radiation attenuation between the source and detectors, was also derived and found to
have a favorably low mean value of 0.198 g/cm3 .
The coverage efficiency (i.e. the number of containerized units required to
provide detection coverage over a given percentage of a reference vessel) variations
associated with prospective modes of deployment were also investigated using Matlabbased computer simulations. Evaluated deployment strategies ranged from fully random
placement of detection units to completely constrained optimal placement. Despite
holding important advantages in terms of stealth, random deployment was found to
require an average of between 2.2 to 3.3 times more detectors than optimal deployment,
depending on the desired level of detection coverage. This result suggests that some
combination of random and constrained deployment might yield an optimized balance
between stealth and coverage efficiency. This analysis also identified significant
efficiency and deployment flexibility benefits associated with units that could detect
sources at ranges equal to, or greater than, 70 ft (21.3 m).
Overall, no results were obtained that seriously challenged the potential efficacy
and viability of the proposed ship-based approach.
Thesis Supervisor: Richard C. Lanza
Title: Senior Research Scientist in Nuclear Engineering
2
Acknowledgments
I would first like to thank my research advisor, Dr. Richard Lanza. His patient guidance
and continuous stream of ideas were extremely helpful throughout this effort. I would
also like to thank Professor Emeritus Michael Driscoll for agreeing to serve as my thesis
reader. His insightful comments were invaluable to this thesis.
I owe an enormous debt of gratitude to Shawn Gallagher who first conceived of the topic
about which I wrote. Without his selfless collaboration and intellectual ingenuity this
thesis literally would not have been possible.
I would also like to thank Dr. Richard Wagner for his valuable feedback and continued
support.
The Federal government and the fine people at the U.S. Defense Nuclear Facilities Safety
Board provided financial support for this academic enterprise.
Rachel Batista was very helpful in making this thesis sound more like English, in
addition to generally making life more pleasant around the office.
Antonio Damato was gracious enough to share his cultural sophistication and his Matlab
expertise with an ugly American.
Finally, I'd like to thank Michael Pope for his many contributions and for sharing his
proficiency in a number of areas, not the least of which was his extensive knowledge and
appreciation of scientific jargon.
3
Table of Contents
Abstract ..........
.................................................................
Acknowledgments .
...
.......................
Table of Contents......................................
.......
Table of Figures..........................................................
List of Tables............................................
1 Nuclear Terrorism Threat .....................
1.1 Objectives and Organization of Thesis .......
1.2 Introduction
.........
2
................................. 4
.............................
.......................................
................ .....
....
................
....................
.........
1.3 Threat Dynamics..............................................................
1.4 Container Scenario Development...
.....................
..........
Fissile Material Detection.................
.............................................
2.1 Fissile Material Characteristics........................................................
2.1.1 HEU Radiation Signature ..................
....................
2.1.2 Pu Radiation Signature .
.........................................................
2.1.3
23 3 U Radiation
2
Signature ............................
8
11
11
11..
12
15
20
20
24
30
33
2.2
3
Detection Techniques ......................................
............................. 34
2.2.1 Active Detection .............................................................
34
2.2.1.1 Induced Fission .........
.........
.........
.................................
34
2.2.1.2 Radiography
...........................................
35
2.2.2 Passive Detection ................................................................
37
Detection Schemes ...................
4...................0.............
3.1 Current Approaches ..................................................................
40
3.1.1
3.2
4
Customs-Based..................
.............................
3.1.2 Smart Containers ................................................................
Ship-Based Approach ........
...................
3.2.1 Attributes ...................
3.2.1.1 Sensitivity ...................
.......................................
3.2.1.2 Stealth .................................
3.2.1.3 Standoff ....................................................................
3.2.2 External Uncertainties ............................................................
Shipping and Cargo Analysis ..
....
40
41
42
4...................2.............
43
44
44
45
........................................................... 47
4.1
4.2
Container Shipping Overview ........
.....
............................................
47
Count Time ...................
4...................9............
4.2.1 Distance Between Ports ...................
....................
50
4.2.2 Vessel Speeds
.
.......
................ 65
4.2.3 Voyage Times ......
........
........
...............................................
68
4.3 Vessel Container Capacities .......................
....................................75
4.4 Cargo Density ..
...........
...................... 77
5 Deployment Simulator
.................
81
5.1 Introduction ..............................................................................
81
5.2 Model Development .....................................................................
83
5.2.1 Assumptions........
...
5.2.2 Input/Output
.....
..
......
.........
5.2.3Algorithm
..... .. ......
4
.........
...
.........
.....
83
......................85
..........
85........
5.2.4 Validation and Verification......................................................
89
Random Deployment ........................
. .......................................... 91
Constrained Deployment..............................................................
114
5.3
5.4
5.5
Centerline Deployment .
......................
........................................
5.6 Deployment Comparison. ......................
......................................
5.7 Total Detector Estimates ...................
......................................
6 Summary, Conclusion, Recommendations . ......
.........................................
6.1 Summary...
...............................................................................
6.2 Conclusions ...............................................................................
6.3 Recommendations for Future Work...................................................
References..........................................................................................
Appendix A .........................................................................................
Appendix B
. ...................
5
126
139
141
143
144
147
149
152
156
174
Table of Figures
Figure 2-1. High resolution HEU spectrum ..........
..........
.............................
25
Figure 2-2. Dominant regions for different photon interactions .............................
26
Figure 2-3. Thorium series ................................................................
28
Figure 2-4. Photon interaction cross-sections for aluminum and lead......................
36
Figure 2-5. Schematic representation of source detection through
intervening material ................................................................
38
Figure 4-1. Map of upper North America showing selected ports ...........................
52
Figure 4-2. Map of the United States, Central America, and the Caribbean
showing selected ports .
....................................................
53
Figure 4-3. Map of Africa showing selected ports ............................................
54
Figure 4-4. Map of Europe showing selected ports ...........................................
55
Figure 4-5. Map of the Middle East and India showing selected ports .....................
56
Figure 4-6. Map of the Far East showing selected ports ......................................
57
Figure 4-7. Map of Australia showing selected ports.........................................
58
Figure 4-8. Vessel speed CDF ..................
67
.................................
Figure 4-9. Vessel capacity CDF ...............................................................
76
Figure 4-10. Cargo distributed density, Pdist, CDF .............................................
80
Figure 5-1. Container orientation for simulation..............................................
86
Figure 5-2. Cube bounding the detection sphere ..............................................
87
Figure 5-3. Coverage vs. Detectors plot for the 1440 TEU array [Random] .............
102
Figure 5-4. Coverage vs. Detectors plot for the 2496 TEU array [Random]...........
103
Figure 5-5. Coverage vs. Detectors plot for the 3600 TEU array [Random]...........
103
Figure 5-6. Coverage vs. Detectors plot for the 4800 TEU array [Random]...........
104
6
Figure 5-7. Coverage vs. Detectors plot for the 6460 TEU array [Random] .............
104
Figure 5-8. Graphical determination of detectors required for various
coverage levels...........................................
..........................105
Figure 5-9. Required Detectors vs. Range for the 1440 TEU array [Random] ..........
109
Figure 5-10. Required Detectors vs. Range for the 2496 TEU array [Random] ..........
109
Figure 5-11. Required Detectors vs. Range for the 3600 TEU array [Random] .......... 110
Figure 5-12. Required Detectors vs. Range for the 4800 TEU array [Random] ..........
110
Figure 5-13. Required Detectors vs. Range for the 6460 TEU array [Random] ..........
111
Figure 5-14. Required Detectors (with 45 ft. range) vs. Array Capacity [Random]...... 112
Figure 5-15. Required Detectors (with 55 ft. range) vs. Array Capacity [Random]...... 1 12
Figure 5-16. Required Detectors (with 65 ft. range) vs. Array Capacity [Random]......
1 13
Figure 5-17. Required Det ectors (with 75 ft. range) vs. Array Capacity [Random]......
1 13
Figure 5-18. Required Det ectors (with 85 ft. range) vs. Array Capacity [Random]......1 14
Figure 5-19. Coverage vs. Detectors plot for the 1440 TEU array [Constrained]........ 122
Figure 5-20. Coverage vs. Detectors plot for the 2496 TEU;array [Constrained] ......... 123
Figure 5-21. Coverage vs. Detectors plot for the 3600 TEU;array [Constrained] ......... 123
Figure 5-22. Coverage vs. Detectors plot for the 4800 TEU; array [Constrained]......... 124
Figure 5-23. Coverage vs. Detectors plot for the 6460 TEU; array [Constrained] ........ 124
Figure 5-24. Coverage vs. Detectors plot for the 1440 TEU array [Centerline] .......... 135
Figure 5-25. Coverage vs. Detectors plot for the 2496 TEU array [Centerline] .......... 136
Figure 5-26. Coverage vs. Detectors plot for the 3600 TEU array [Centerline] .......... 136
Figure 5-27. Coverage vs. Detectors plot for the 4800 TEU array [Centerline] .......... 137
Figure 5-28. Coverage vs. Detectors plot for the 6460 TEU array [Centerline] .......... 137
7
List of Tables
Table 2-1. Densities of common weapons-grade fissile materials .........
.............. 23
Table 2-2. Ratios of MFPs in selected materials to HEU ...................................
Table 2-3.
208 T1 gamma
lines and branching ratios ...................
23
.........................
28
Table 2-4. Decay rates for selected gamma emissions from plutonium
anditsdaughters
......... ......... ........
........................ 31
Table 4-1. Containerized cargo volume by U.S. port (CY 2003) ...........................
48
Table 4-2. Foreign container import data (CY 2003) ........................................
49
Table 4-3. Nautical distances from selected ports to New York
and Los Angeles .................................................................
61
Table 4-4. Vessel database capacity benchmark results ......................................
66
Table 4-5. Vessel speed statistics ...............................................................
68
Table 4-6. Voyage times from selected ports to New York and Los Angeles ............. 69
Table 4-7. Mean voyage times to New York and Los Angeles .............................
74
Table 4-8. Vessel capacity statistics ..........
76
........................................
Table 4-9. Average distributed density, Pdist, values for imported cargo ...................
79
Table 5-1. Properties of the OR operator ......................................................
88
Table 5-2. Spherical volume error ..............................................................
91
Table 5-3. Reference array dimensions ......................................................
92
Table 5-4. Mean fractional coverage results for variable run sizes .........................
93
Table 5-5. Random deployment simulation results .........................................
94
Table 5-6. Estimated number of detectors needed for various scenarios [Random]....106
Table 5-7. Double assignment probabilities for 20' and 40' containers [Random].....108
Table 5-8. Constrained deployment simulation results ......................................
8
116
Table 5-9. Estimated number of detectors needed for various scenarios
125
[Constrained] ....................................................................
Table 5-10. Centerline deployment simulation results .........
..
.........
.. 127
Table 5-11. Estimated number of detectors needed for various scenarios
..........
[Centerline]
............................................................ 138
Table 5-12. Random vs. Centerline deployment comparison ................................
140
Table 5-13. Average R/C values.................................................................
141
Table 5-14. U.S. port calls by vessel capacity.................................................
141
Table 5-15. Total detector estimates ...........................................................
143
Table 6-1. Results summary for deployment environment analyses......................
145
Table 6-2. Random deployment results summary ............................................
146
Table 6-3. Centerline deployment results summary.........................................
146
9
[This page left blank intentionally.]
10
Chapter 1: Nuclear Terrorism Threat
1.1 Objectives and Organization of Thesis
The objective of this thesis is to describe and analyze a novel "ship-based" approach,
proposed by Gallagher at the Massachusetts Institute of Technology (MIT), for the
detection of fissile material concealed in waterborne cargo containers.
The need for new
thinking will be established by investigating the nature of the threat posed by
unconventional nuclear attack and nuclear terrorism and then highlighting the critical
shortcomings of currently deployed approaches that seek to address this threat. The
attributes and advantages of the ship-based approach will then be examined in the context
of the threat and compared to existing detection and interdiction methodologies. Once a
case for the promise and utility of the proposed approach has been presented, analysis
will be performed to remove or constrain important remaining uncertainties related the to
potential efficacy and viability of a ship-based fissile material detection regime.
1.2 Introduction
The specter of nuclear weapons has loomed large over the Earth since their
dramatic introduction to the world in 1945. The nature of the threat that these weapons
pose to the United States, however, has evolved over time. The end of the Cold War
brought with it a relaxation of the conventional nuclear threat stemming from blast
hardened silos dotting the land, strategic bombers roaming the skies, and ballistic missile
submarines prowling the seas. Yet, the dissolution of the Soviet Union and the
ascendance of transnational terrorism has brought with it a new challenge for the nuclear
age, that of devising and implementing effective strategies to prevent the acquisition and
deployment of nuclear weapons by individuals and organizations who are not restrained
by the same means that had deterred nuclear catastrophes for more than half a century.
Although the dynamics of the threat have changed, what remains constant is the
understanding that the detonation of a single nuclear device on American soil would have
11
profound and lasting impacts on this country and the world, the scale and breadth of
which are difficult to comprehend.
1.3 Threat Dynamics
The September
11
th attacks clearly demonstrated that transnational terrorist
organizations have supplanted state-based actors as the primary (or at least most
immediate) threat to the security of the United States. To strengthen our homeland
security posture and develop more effective strategies to defend against attack, including
those involving unconventional weapons, we must seek to understand how the emergence
of this new adversary alters the nature of threats faced by the United States. The
transnational terrorist organizations we must combat today are not only fundamentally
different than the state-based adversary faced during the Cold War, they are also
markedly different from terrorist organizations that have been encountered in decades
past. Some critical differences, at least as they pertain to the threat of nuclear attack, can
be generally described in terms of deterability, material access, and motivation.
Nuclear aggression during the Cold War was deterred through the doctrine of
mutually assured destruction. This conventional means of deterrence was effective
because the primary belligerents were state-based actors having well-defined borders
with citizens and national assets to protect. Both the United States and the Soviet Union
developed nuclear arsenals massive enough, and deployment platforms and delivery
systems diverse enough, that any offensive nuclear strike was sure to be met with a
devastating retaliatory counterattack [Knorr, 1985]. Therefore, the motivation to unleash
nuclear weapons to destroy the enemy was checked by the understanding that a decisive
blow could not be struck without the assurance of a crippling reprisal. However, unlike
states, transnational terrorist organizations, in general, are highly mobile, have no
delineated territorial borders, and no populace to defend. Without fixed targets to be held
in jeopardy of counter-attack, a terrorist organization can hope to deliver a devastating
blow without the prospect (or at least the assurance) of immediate annihilation.
12
Therefore, a transnational terrorist adversary contemplating a nuclear attack remains
undeterred by conventional means.
Unlike a large state-based actor, a terrorist organization is unlikely to have open
access to a military-industrial infrastructure dedicated to the production of fissile material
and the design and assembly of nuclear weapons. Numerous barriers, both physical and
political, have been erected by international institutions to inhibit the flow of fissile
material from established nuclear states, which are susceptible to conventional means of
deterrence, to undeterred terrorist organizations [Bunn et. al, 2003]. As such, even highly
motivated, well financed terrorist groups will likely find gaining access to fissile material
the most difficult and daunting aspect of initiating a nuclear attack. The difficulty
associated with the procurement or acquisition of fissile material, and the resulting
scarcity of the commodity, has important implications for how an attack might be
planned and executed.
In the past, terrorist organizations used attacks primarily in an attempt to achieve
political objectives [NCT, 2000]. With this political motivation, it was thought that
terrorist organizations would eschew attacks that claimed large numbers of civilian lives,
because such an act would promote public outcry, inspire widespread condemnation of
the perpetrators and ultimately weaken support for their cause [Hoffman, 1995]. The
transnational terrorist organizations threatening the United States today, however, are
increasingly found to have at their core fanatical religious and ideological, rather than
purely political, motivations [Laqueur, 1998]. With radical religious ideology serving as
the basis, attacks are no longer carried out with the express purpose of meeting political
ends. Instead, they are executed to destroy infidels and punish the enemies of God/Allah.
As such, religiously inspired terrorist organizations now tend to view attacks that cause
mass casualties as desirable rather than taboo [Morgan, 2004]. This motivational shift
was summed up succinctly by former CIA director James Woolsey who said, "Today's
terrorists don't want a seat at the table, they want to destroy the table and everyone sitting
at it." [NCT, 2000]
13
Another key to understanding the threat posed by unconventional nuclear attack is
to appreciate the unique destructive capabilities of nuclear weapons. Although they are
often grouped alongside chemical and biological weapons under the generic banner of
weapons of mass destruction (WMD), nuclear weapons stand markedly apart even from
their other WMD brethren. The totality of destruction that can be wrought, together with
the massive spatial and instantaneous temporal scales over which their effects are
unleashed, combine to make the gravity of threats posed by nuclear weapons wholly
unique. Unlike chemical and biological agents that inflict harm by specifically targeting
and damaging human biological functions, nuclear weapons destroy in a much more
indiscriminate manner. With their combined thermal, blast, and radiation effects, nuclear
weapons inflict their damage on all forms of matter in their vicinity, including people,
buildings, and economically vital infrastructure. These effects can be devastating even at
distances far removed from the location of the actual detonation. Finally, the primary
effects of a nuclear detonation are all experienced more or less instantaneously and
simultaneously, and without warning. As such, there is no time for affected populations
to evacuate or seek refuge once a nuclear weapon has been actuated.
Given the destructive potential of nuclear weapons, the motivation and stated
desire of transnational terrorist organizations to obtain and use these weapons, and the
ineffectiveness of conventional means to deter terrorist-mounted nuclear attacks, it is
unacceptable to rely solely on existing barriers meant to prevent unauthorized parties
from gaining access to fissile material or assembled weapons. Realizing that no
individual barrier or safeguard is going to provide perfectly reliable protection, we must
develop multiple, redundant and diverse layers of protection that can impede or disrupt
all phases of attack from fissile material procurement to final operational deployment.
One important step in effectively implementing this type of defense-in-depth protection
philosophy is to identify and assess potential avenues of attack that could be used by a
terrorist adversary that had somehow managed to obtain fissile material. The
vulnerabilities of each potential avenue of attack should then be evaluated so that
deficiencies can be identified and remediated.
14
1.4 Container Scenario Development
One potentially vulnerable avenue of attack flows through US seaports where an
average ofjust over 19,000 cargo containers arrive by ship each day [MARAD(1), 2004],
any one of which could be used by an adversary to conceal fissile material or an
assembled nuclear device. Only about 4% of these incoming cargo containers currently
undergo any type of physical inspection [Lok, 2004]. The vulnerability associated with
thousands of opaque, largely uninspected, and loosely controlled cargo containers
arriving on U.S. shores everyday is compounded by the proximity of major seaports to
large metropolitan population centers. As a result of this collocation, a weapon arriving
in a major U.S. port is often already in range to cause massive casualties, regardless of
the intended ultimate target of the device. Despite security concerns, seaports and the
international container shipping trade are critical to sustaining modern global commerce
and to maintaining a healthy U.S. economy. The transaction of international commerce
requires an open architecture, where containerized goods can move freely and efficiently
between countries and across borders. Therefore a critical and urgent challenge remains
to develop and implement protective measures that can enhance the U.S. security posture
with respect to seaports and incoming containers of foreign origin, without unduly
burdening the free flow of commerce.
As a first step in meeting the challenge of successfully addressing port and cargo
container related vulnerabilities, a conservative threat scenario will be developed based
on carefully chosen and logically defended assumptions. Scenario development will
frame the problem, allowing helpful insights to be drawn. The resulting product will then
provide a means to evaluate the efficacy and highlight weaknesses of potential solutions.
The overarching assumption used in scenario development is that a rational,
determined adversary would always seek to maximize the probability of a successful
attack. (Despite fanatical religious ideologies, transnational terrorist organizations have
repeatedly proven themselves rational in the context of operational planning,
coordination and execution.) As discussed later, in detail, the following propositions are
15
some logical implications of the "rational enemy assumption" as applied to a
transnational terrorist adversary: 1) if an enemy somehow procures fissile material, they
will seek to weaponize it (if not already in the form of a functional nuclear weapon) and
use it; 2) an enemy will seek to weaponize unassembled fissile material prior to container
shipment to the U.S.; and 3) an enemy may provide some means (e.g. booby-trapping or
remote detonation capability) to thwart the successful interdiction and neutralization of a
deployed (i.e. shipped) weapon.
The assertion that a transnational terrorist organization, having obtained fissile
material, will weaponize it and attempt to use it is perhaps the most easily justified of the
preceding discussion. A number of leading figures in transnational terrorist organizations
(including al Qaeda) have openly professed their desire to obtain nuclear weapons and
there have been several well-documented attempts to purchase fissile material [Lee,
2003]. Additionally, these groups have demonstrated the motivation and ability to carry
out well planned, large-scale attacks that result in mass civilian casualties. Finally, as
noted previously, highly mobile, borderless terrorist organizations are not stymied by
conventional means of deterrence based on the threat of massive retaliation. Given the
vigor with which fissile material procurement has been pursued, the repeatedly
demonstrated willingness to employ ever more lethal tactics to carry out high-casualty
attacks, and the undeterred nature of the adversary, it is reasonable, and certainly
conservative, to posit that if a sufficient quantity of fissile material is obtained, a terrorist
organization would seek to assemble it into a weapon and use it for an attack.
The belief that an enemy would seek to ship a functional weapon to the U.S., as
opposed to unassembled fissile material, follows from the rational enemy assumption for
the following two reasons. First, to maximize the probability of a successful attack, an
adversary that had obtained unassembled fissile material would clearly want to avoid
disruption or detection during the device assembly process. Unfettered weapon assembly
and preparation would presumably be far easier to achieve abroad, in a location of the
terrorists' choosing, where they could enjoy a substantially stronger and more secure
support network, in addition to a less menacing intelligence gathering and law
16
enforcement presence than would be encountered in the United States. Second, a rational
adversary would seek to ship a functioning weapon rather than attempt to smuggle
unassembled fissile material into the U.S. to create the possibility that some degree of
operational success (i.e. a nuclear detonation causing significant casualties and physical
damage) could still be achieved even in the event that the device was somehow detected
or discovered prior to reaching its intended target. There is no such possibility of limited
success if the fissile material has not been weaponized prior to shipment.
The assertion that an adversary would seek to implement countermeasures such as
"booby traps" or remote detonation provisions to guard against interdiction and
disarmament prior to detonation can also be defended using the rational enemy
assumption. "Booby-traps" are defined here as a feature or features intended to trigger
detonation of the device if certain perturbations, such as mechanical or radiation probing,
are experienced. A remote detonation capability would give an adversary the opportunity
to detonate a detected weapon before it could be isolated and rendered safe. Despite the
technological difficulty of implementing such features, the presence of countermeasures
to guard against interdiction cannot be ruled out since the rational-enemy assumption
dictates that an adversary would aggressively seek to ensure detonation once the weapon
was deployed. The desire to ensure detonation, using any available means, would only
be amplified by the extremely limited availability of fissile material and the extraordinary
efforts that were likely required to obtain it. Even if the device did not reach its intended
target, a nuclear explosion impacting any Western port or territory would presumably be
a marginally successful outcome for a terrorist organization.
Finally, to accept the rational enemy assumption but to reject the possibility of
countermeasures being present requires the assumption that an enemy is not capable, for
whatever reason, of implementing them. However, the fact that we concern ourselves
with screening cargo containers for fissile material in the first place implies that we are
willing to accept that an enemy possesses a level of sophistication high enough to
procure, transport, (possibly) assemble and deploy a nuclear weapon, all without being
detected or exposed by any military, law enforcement or intelligence gathering
17
organization. It seems, therefore, wholly irrational to then assume that the same enemy is
not sophisticated enough to devise and implement effective countermeasures.
Consistent with the assumptions discussed in the previous paragraphs, we now
postulate a scenario in which a functional nuclear weapon is concealed in a standard, full
sized (40' long, 8' wide and 8.5' high) cargo container and deployed from a foreign
location aboard a transoceanic container vessel that is due to call on a major United
States seaport that is in or adjacent to a large urban population center (e.g. New York
City or Los Angeles). We conservatively assume that the weapon is surrounded with
some level of shielding appropriate for the fissile material used in the weapon (i.e. high
atomic number material for uranium or both low and high atomic number material for
plutonium). We further assume that the device has been outfitted with counterinterdiction features, including a remote detonation capability and booby-traps that
trigger the weapon in the event that certain mechanical or radiation insults are
experienced.
We consider the above scenario (referred to hereafter as "the container scenario")
to be conservative and bounding. As such, it is assumed that an approach that can defeat
this extremely challenging scenario can similarly defeat any number of less conservative,
less challenging scenarios. We further believe that the highly conservative nature of the
container scenario is appropriate considering the extraordinarily dire consequences of a
successful nuclear attack on U.S. soil and the fact that none of the (admittedly)
improbable elements of the scenario can be confidently excluded as incredible.
Using the postulated container scenario we can now make a number of useful
observations regarding the capabilities that will be required to successfully address the
specific vulnerabilities associated with the commercial maritime container trade as an
avenue for nuclear attack. First, it is clear that the only way to ensure adequate protection
from this threat is to keep the weapon (or the container concealing the weapon) from ever
reaching U.S. shores. To do this, not only must the weapon be detected prior to the
threat-bearing vessel reaching a U.S. port of call, but the presence of this threat must also
18
be communicated to appropriate parties in time for an effective response to be mobilized
prior to port entry. Additionally, the initial threat detection must be made in a manner
that accounts for the possibility that countermeasures may be present, which could
function the weapon if intrusive perturbations are experienced.
The ultimate success criterion for any defensive measure (or measures) in
defeating the container scenario or any other postulated nuclear attack is not the detection
of the device; it is the ability to prevent a nuclear detonation that physically impacts the
United States. Detecting the weapon is a necessary but not sufficient step toward
defeating this threat. Stated differently, the deployment of a defensive measure that
detects incoming fissile material with perfect effectiveness and reliability (even if this
were possible) fails to adequately protect against the threat of nuclear attack if the
weapon isn't detected until it is already in range to impact the United States (e.g. in a
U.S. port).
19
Chapter 2: Fissile Material Detection
2.1 Fissile Material Characteristics
It is clear both intuitively and from the earlier discussion of the container scenario
that no nuclear attack will be thwarted if the concealed weapon is never detected. As
such, it is useful to investigate the common properties of fissile material and the various
ways in which these properties can be exploited to remotely detect the presence of this
material without the luxury of having physical access to the inside of each cargo
container.
In the current context, a nuclide is defined as fissile if it can undergo neutroninduced fission with the absorption of a neutron of any energy. The ability to fission
readily when interacting with neutrons of any energy regime makes fissile isotopes
critically important in producing and sustaining the fission chain reactions that give
nuclear weapons their explosive power. For the purposes of this analysis, fissile
materials will be generally defined as materials containing fissile isotopes in sufficient
quantities to make them suitable for use in nuclear weapons. Although nuclear weapons
can theoretically be constructed using more exotic materials, such as neptunium or
americium [Albright et. al, 1999], the following discussion will focus on materials that
contain the fissile isotopes 239pu, 235U, and 233 U.
Natural uranium has an isotopic composition of 99.28% (by weight) 238 U, 0.72%
235 U, and 0.0055%
235 U
234U.Uranium is considered enriched if the abundance of the fissile
constituent is artificially increased above its naturally occurring level. Uranium that
is greater than 20%
235 U
is classified as highly enriched. The 20% cutoff corresponds to
the minimum enrichment, as identified by the International Atomic Energy Agency
(IAEA), required for materials that can be used in nuclear weapons [IAEA, 2001].
Unlike the fissile 235U isotope, 238U can only be made to fission with neutrons exceeding
a threshold energy of approximately 1 MeV [Krane, 1988]. This threshold makes
20
uranium with a high 238U content unsuitable for creating and sustaining chain reactions
because not all neutrons produced during a given generation of fissions will exceed the
238U energy threshold
and be available to create subsequent fission events. The
population of neutrons energetic enough to fission 238U would be further decreased as
neutrons undergo inelastic scattering events that transfer some of their energy to the
nuclei with which they interact. As a result, the highly enriched uranium (HEU) used in
nuclear weapons typically has an enrichment of greater than 90% 235U [Bunn et. al,
1997].
Plutonium, unlike uranium, is not a naturally occurring element and must be
produced artificially. Fissile
239 Pu is
typically bred in a nuclear reactor through the
following transmutation chain and then chemically separated.
238 U
(n,y)>239 U
>239
2d
23.5m
Weapons grade plutonium is rich in the fissile
defined as containing less than 7% of the
Np
P
65 >239
23 9 Pu isotope
24 0 Pu isotope
P
56.5h
(again above 90%) and is
[DOE, 1994], which is considered
a contaminant by weapons designers. Reactor grade plutonium also contains 239Pu,but is
defined as containing greater than 7% 240pul . Each type of plutonium also contains
varying amounts of other plutonium isotopes including 238 Pu,24 1pu, and
242pu.
Although
weapons grade plutonium (as the name implies) is vastly preferable for use in fabricating
a nuclear weapon, reactor grade plutonium can also be used to produce an explosive that
delivers a nuclear yield2 [Mark et. al, 1987]. For this reason, and because a terrorist
organization is unlikely to be picky if an opportunity to obtain this material avails itself,
reactor grade plutonium has been included in the discussion, despite the added weapon
design and assembly difficulties associated with its use.
' Plutonium containing between 7 and 18% 2 4 0 Pu is sometimes referred to as fuel grade.
2 In 1977 the United States declassified
the existence of an underground test conducted in 1962 where a
nuclear device fabricated with reactor grade plutonium was successfully detonated.
21
233U is not
a constituent of naturally occurring uranium and, like plutonium, must
be produced artificially. This fissile nuclide is bred from thorium in nuclear reactors
through the following transmutation chain.
232
Th
(n,)
233
Th 22.3-
233
Pa
6
27.0d
>233
U
Uranium bred and chemically separated from thorium blankets is contaminated with
varying amounts of 232U. 233U is not nearly as popular as
2 35 U
and
239 Pu for
use in
nuclear weapons (no country is publicly known to have produced weapons using 233U
[NTI, 2003]) because of radiation dose concerns arising from the 232U contaminant.
However, this material is very capable of producing a nuclear explosion, evidenced by a
bare sphere critical mass3 smaller than that of 235 U [NERAC, 2000]. Currently, the
worldwide availability of 233 U is rather small compared to other fissile materials that are
likely being coveted by terrorist organizations. However, a number of countries, most
notably India (already a nuclear weapon state), are considering the use of a 233Uproducing thorium fuel cycle for nuclear power generation [Gopalakrishnan, 2002].
Despite their many physical, chemical, and metallurgical differences, fissile
materials have a number of common traits that can be used as a basis for detection. One
characteristic that is obviously shared by all fissile materials is that they can be made to
fission. When fissile materials are bombarded with neutrons of any energy or gamma
rays above a threshold energy4 , fission (or so-called photo-fission in the case of gamma
bombardment) will occur and neutrons and prompt gamma rays will be released
immediately as a result of the fission event, followed by delayed gamma rays (and
occasionally delayed neutrons) emitted by subsequent decay and de-excitation of the
fission products. Unlike the heavy ionized fragments created during fission and the beta
particles that are typically emitted as these fission products decay toward stability,
neutrons and gammas are uncharged. Due to their lack of electronic charge, these
particles do not undergo Coulomb interactions with the atomic electrons of the matter
3 The bare sphere critical masses of 233U and 235U are 16.4 kg and 47.9 kg, respectively.
4For 235U and 239 Pu, the photo-fission threshold energy is about 5.3 MeV [Fetter(l), 1990]
22
through which they pass so they can travel a relatively long distance before and between
interactions. The long-range nature (relative to other forms of nuclear radiation) of
neutrons and gammas makes them particularly well suited to the task of detecting fissile
material at a distance using conventional equipment and well-understood methods.
Another useful characteristic shared by all fissile materials is that they have high
densities, and are able to readily absorb gamma rays and neutrons. Densities of some
common weapons-grade fissile materials are shown in Table 2-1 [Mark et. al, 1987].
Table 2-1: Densities of common weapons-grade fissile materials
HEU
(94% U-235)
Weapons Grade Pu
delta phase
alpha phase
18.7 g/cmA3
19.86 g/cmA3
15.6 g/cm^3
One way to quantify how effectively a material can absorb a particular type of radiation
is to define the mean free path of that radiation in the material. The mean free path is the
average distance traveled between interactions. Since each interaction creates the
opportunity for scattering or absorption, a short mean free path, or equivalently, more
average interactions per unit length, indicates that the material is effective in absorbing or
shielding that particular radiation. Table 2-1 below shows the mean free path ratios
between HEU and a number of other materials for neutrons and gamma rays of several
different energy regimes [Fetter(l), 1990].
Table 2-2: Ratios of MFPs in selected materials to HEU
Gamma Rays
Neutrons
Ratio of MFP in element to that in HEU
Al
Fe
W
Pb
Energy
MeV
C
0.4
10
100
22
23
56
19
16
27
thermal
50
240
24
40
70
0.001
10
3.0
2.2
16
2.4
2.2
1.5
1.6
0.94
4.1
1.5
6.7
4.3
5.5
1.4
1.1
1.1
2.0
1.8
1.7
Ratios in Table 2-1 greater than unity indicate a larger mean free path in the reference
material than in HEU. Plutonium with its similar density, atomic number, and ability to
23
fission (even with thermal neutrons) would produce comparably small mean free paths
for gamma rays and neutrons at energies tabulated above.
Fissile materials are also radioactive. However, since each type of fissile material
has a distinct isotopic composition, which in turn gives rise to distinct populations of
decay progeny, each of the materials produce intrinsic radiation signatures that can differ
in terms of character and intensity. The characteristic emission signatures for each type
of fissile material will now be identified and discussed separately in the context of how
they can be used to facilitate remote detection.
2.1.1HEURadiationSignature
The isotopic composition of a radioactive material determines both the nature and
energy of the radiation emitted. Therefore to begin discussing the radiation signature of
HEU, the general composition of this material must first be revisited in greater detail.
The primary constituents of HEU are the naturally occurring
2 3 8 U, 235U,
and
2 34 U
isotopes. To produce weapons-usable material, some means of enrichment (e.g. gaseous
diffusion or centrifuge enrichment) must be employed to artificially raise the relative
abundance of the fissile 235U isotope to well above its natural level of 0.72%. Because
most means of enrichment exploit the fractional mass differences between isotopes, the
trace amount of 2 34 U found in natural uranium is also preferentially enriched along with
235U
due to its comparatively low atomic mass. If none of the material used as input, or
feedstock, to the enrichment process had ever been irradiated in a nuclear reactor, than
the naturally occurring nuclides listed above would be the only uranium isotopes present
in the resulting HEU. However, if even a minute fraction of the enrichment feedstock
had been irradiated (and subsequently reprocessed), the HEU output would likely be
contaminated with small amounts of the non-naturally occurring 232U,
236U,
and 237U
isotopes [Peurrung, 1998].
As the
23 5U, 23 8U,
and 234U isotopes (as well as the
23 2 U, 23 6U,
and
2 37 U
contaminants that may be present) begin down their long decay chains toward stable
24
nuclides, alpha and beta particles are emitted as individual nuclei decay. While these
short-range, charged particles are generally unhelpful for remote detection, the longrange characteristic photons that often accompany these decays can be usefully exploited.
The gamma rays emitted as the excited daughter nuclei created during alpha or beta
decay transition to lower excited states or their ground states, give rise to a rich and
complex spectrum of photons that can penetrate surrounding material and be detected at a
physically removed location. Since gamma ray energies are determined by the
characteristics of the emitting nucleus, peaks in the measured spectrum can be used to
unambiguously identify the presence of specific isotopes. The HEU spectrum, as
measured using a high resolution, high purity germanium (HPGe) detector, is shown in
I
Figure 2-1 [Gosnell,
2000].
I ____...
.-
i
. I
tx10 6
lx10
5
lx10 4
1x10
3
O0
O
U)
Z0
U
z
lx10 2
1x10
1
x10O o
lx10
-1
0
500
1000
1500
2000
2500
3000
Energy (keV)
Figure 2-1: High resolution HEU spectrum
As indicated by the magnified region of Figure 2-1, the characteristic gamma
lines emitted by 235 U are concentrated at the low energy end of the spectrum. The most
intense of the 59 discrete lines emitted by 23 5 U is at 186 keV and the most energetic line
emitted with a reasonably high intensity is at 205 keV. Unfortunately, these photons are
25
not highly penetrating because most types of matter have large linear attenuation
coefficients in this energy regime, with a particularly large contribution from the photonabsorbing photoelectric process. Figure 2-2 shows the dominant regions for various
types of photon interactions as functions of the atomic number of the transmission
medium [Evans, 1955].
§
0
N
0.01
0.05
0.1
0.5
1
E. (MeV)
5
10
50
100
Figure 2-2: Dominant regions for different photon interactions
As a result of the high probability of photoelectric interaction, which results in the loss of
the photon in the process, dense matter shields low energy gamma lines emitted by
235 U
very efficiently. In uranium the mean free path of 200 keV gamma rays is 0.5 mm, so a
significant fraction of these low energy photons are subject to self-absorption within the
HEU from with they originate [Fetter(2), 1990].
The most notable contribution to the HEU spectrum stemming from residual 238U
is the 1001 keV line arising from the isomeric transition of
234 mPathat
is created through
the following series of decays.
a
4.5 Gy
>234
Th
d
24.3d
>234m
Pa
Although this line is highly penetrating and emitted with reasonably high intensity, the
use of gamma rays that arise from 238U (or its daughters) for fissile material detection
26
purposes is inherently problematic. This is due in part to the fact that the presence of
238
U doesn't necessarily indicate the presence of HEU. Additionally, the ubiquitous
nature of the 238U isotope, particularly in terrestrial settings, produces a significant
amount of nuisance background that can confound detection efforts.
Because gamma lines emitted by 235U are intense but not highly penetrating and
lines emitted by
23 8U
(and its daughters) are less than ideal for fissile material detection,
gamma emissions stemming from the decay of 232 U and its daughter products can prove
extremely useful for remote detection applications.
232U is produced
primarily through
the following reactions in a nuclear reactor [Peurrung, 1998].
(1)
(2)
(3)
235U
U
'234
a
704My
a
246ky
235 U
>230
Th
Np a-
238U (n,2n) >237 U
231
Th 25.5h
V
(n,y) >237
>236 PU a
>237
(n)
231
25.5h
Th (r)
(n,y)>236 U
236m
(4)
231
>232
Np
U
232
Pa (ny)
>231
> 237
>
6.8
Pa
Np
31.4h
>232
>232
U
Pa 31 .4h
>232
U
n,2n) >
2
U
,2 ) >236m
6.8d
Np
'1
-
22.5h
>236 PU a >232 U
2.9y
The reactions shown above (particularly the first two listed) are the most significant
pathways by which 232U is produced in a reactor, provided that actinide impurities arising
from previous irradiations have been removed from the initial fuel prior to loading
[Perrung, 1998]. If present in HEU, 232U will decay through a long chain of successive
alpha and beta decays through the so-called thorium series depicted below in Figure 2-3
[Krane, 1988].
27
Figure 2-3: Thorium series
The thorium series is shown in detail because several of the distant daughter products of
23 2
U emit high energy, highly penetrating gamma lines that can significantly enhance the
distance at which HEU can be remotely detected. Of the daughter products found in the
thorium series, the one with the most utility for detection is 208 T1. The beta decay of
208T1
to stable 208 Pb is accompanied by one or more high-energy photons emitted as the
daughter nucleus de-excites. Table 2-2 shows the energies of the most intense gamma
ray lines produced by
208T1 decay,
as well as the branching ratios of these lines [Fetter(3),
1990].
Table 2-3: 208TI gamma lines and branching ratios
Gamma Energy
Branching Ratio
(keV)
(% per decay)
583.0
860.3
86.0
12.0
1620.7
1.51
2614.4
99.79
28
Because of their significant branching ratios and highly penetrating nature, the 583 and
2615 keV
208 T1 gamma
lines can be particularly useful in detecting HEU that is
contaminated with the 232U parent nuclide, even if 232 U is found in concentrations less
than 1 ppb [Fetter(1), 1990]. The prominence of these two peaks in the HEU spectrum
can be seen in Figure 2-1. The 2615 keV photon is especially noteworthy because photon
interaction cross-sections at this energy are generally quite low, which allows this gamma
line to be powerfully penetrating and quite long range. Also, as shown in Figure 2-2 the
Compton scattering process dominates the overall interaction cross-section at 2615 keV,
so even when an interaction does take place, the photon will most likely be scattered
(albeit losing some energy in the process) instead of absorbed. Additionally, in general,
the background rate in this high-energy region of the spectrum is fairly low, so a source
that emits gammas in this regime can usually be detected more easily than a low energy
gamma emitter. Unfortunately, as the thorium series in Figure 2-3 demonstrates,
not the only potential source of 20 8T1 and its 2615 keV decay photon.
2 32 Th,
232U
is
an isotope
that represents greater than 99% of naturally occurring thorium and is 3 times more
abundant in the earth's crust than natural uranium [WNA, 2003], also decays down to
208Tl and can
produce a very strong background signal, which inhibits confident detection
of HEU.
Like many other extremely heavy isotopes,
238 U
and
23 4 U can
undergo
spontaneous fission. In general, spontaneous fission is more likely in nuclides with even
numbers of protons and neutrons and becomes increasingly important as atomic number
increases. However, it does not seriously compete with alpha emission as the dominant
decay process until atomic mass increases above about 250 [Krane, 1988]. As a result,
238U and 234U both
have partial half-lives for spontaneous fission that are significantly
longer than their total half-lives. (Partial half-lives are defined as the time necessary for
half of the nuclei in a given sample to decay if only a single specified decay process were
allowed to occur.) 2 38 U has a partial half life for spontaneous fission of 8.20x1015 yr
versus a total half life of 4.468x 109yr and 2 34 U has a spontaneous fission half life of
2.04x1016 yr versus a total half life of 2.455x10 5 yr [Fetter(4), 1990].
29
Several other processes contribute to neutron generation in HEU. One is the
production of neutrons through (a,n) reactions that can occur when light element
impurities (e.g. carbon and oxygen) in the material interact with alpha particles emitted
by the uranium nuclides and their daughter products [Fetter(2), 1990]. The other process
influencing the neutron population in HEU is the multiplication that occurs when an
existing neutron induces fission in the fissile material thereby releasing additional
neutrons. The degree of multiplication is strongly dependant on the geometry of the
material.
Despite the effects of multiplication and the neutron production that could occur
due to (a,n) reactions in light element contaminated material, spontaneous fission events
in 238Uand 234 U occur infrequently enough that the intrinsic neutron signature of HEU is
very small and essentially undetectable for the remote detection application of interest.
2.1.2 Plutonium Radiation Signature
Both weapons grade and reactor grade plutonium contain essentially the same
plutonium
isotopes ( 238pu,
2 39
Pu,
1
240pU, 24 pu
and
24 2
Pu) but in different concentrations.
Weapons grade plutonium is typically composed of greater than 93% 239Pu,around 6%
24 0
Pu, and small quantities (less than 1%) of
238
Pu, 241pu,
and 2 42pu [Fetter(1), 1990].
Reactor grade plutonium, a material that does not have uniquely specified isotopics, has
been produced and separated from higher burnup fuel than weapons grade plutonium,
giving it a lower concentration of 239 Pu and higher relative concentrations of the 238 Pu,
240pu, 241pu, and 242 Pu isotopes [Mark, 1990].
All of the plutonium isotopes identified above are radioactive, and just as in the
case with HEU, the alpha and beta decays undergone by these isotopes and their daughter
products are accompanied by the emission of one or more characteristic photons. The
most prominent gamma lines in the plutonium spectrum arise from the decay of 239pu,
and the decay of the 24 1pu isotope's daughter product.
239 Pu is
an alpha emitter with a
half-life of 2.41 lx105 yr. The two most intense gamma lines arising from the 239 Pu alpha
30
decay are at 375 and 414 keV with branching ratios (% per decay) of 0.00158 and
0.00151 respectively [Fetter(3), 1990]. The most energetic line emitted by 2 39 Pu with a
24 1 Pu has
useful intensity is at 769 keV, and has a branching ratio of 0.000011.
of 14.35 yr and beta decays to
24 1
Am
a half-life
99.9976% of the time [Oetting, 1968]. The
24 1 Am
daughter then alpha decays with a 432.2 yr half-life emitting gammas at 662, 721.96 and
722.70 keV with respective branching ratios of 0.00036, 0.00006 and 0.00013 [Fetter(3),
1990]. The peak energies of the later two photons are exceedingly difficult to resolve,
using even high-quality semiconductor detectors, because the peak energies are so close
together. As such, the counts from these two photons can be aggregated into one peak
centered at approximately 722.5 keV, with a combined branching ratio of 0.00019. Table
2-4 shows the decay rates of the gamma emissions discussed above5 [Fetter(3), 1990].
Table 2-4: Decay rates for selected gamma emissions from plutonium and its daughters
Parent Isotope
Gamma Energy
(keV)
Decay Rate
(g x s)^-1
Pu-239
Pu-239
Pu-239
Pu-241
Pu-241
375
414
769
662
722.5
36300
34600
252
174000
92000
In the case of weapons grade plutonium, the
239 Pu and 241 Am
gamma lines
identified above can be fairly helpful for remote detection due to their reasonable
intensity and good penetrating power in most materials. Since reactor grade plutonium
has a significantly higher concentration of both 241pu and
241Am, the highly
penetrating
662 and (averaged) 722.5 keV can become quite intense. Consequently these gamma
lines can be extremely helpful in remotely detecting reactor grade material.
It should also be noted that because
2 39 Pu and 2 4 1 Am are
not naturally occurring
isotopes, the detection of plutonium using the gamma lines discussed above does not
suffer from the same problems associated with natural background that can complicate
HEU detection. However, 241Am is used in commercial products such as smoke detectors
5 Decay rates in Table 2-4 assume 10-year-old plutonium (i.e. 10 years of decay time starting with I g of
the pure parent nuclides).
31
and the popular radiation source 13 7Cs, emits a gamma ray at 661 keV, which is
essentially indistinguishable from the 662 keV line emitted by
spectral peak overlap with
137 Cs could
2 41 Am.
Although the
frustrate unambiguous identification of 241Am, the
unexpected detection of this line emanating from a cargo container would still
presumably be of intense interest due to the potential use of 137Cs (particularly in its
powdery chloride form [Stone, 2002]) in a radiological dispersion device.
A potentially more important aspect of plutonium's intrinsic radiation signature,
in terms of remote detection, is neutron emission. Plutonium has a high rate of internal
neutron generation due largely to the spontaneous fissioning of its nuclei. All of the
plutonium nuclides present in weapons grade and reactor grade materials undergo
spontaneous fission more readily (i.e. they have shorter spontaneous fission partial half
lives) than
2 38 U
[Fetter(4), 1990]. The 238pu, 240pu, and
2 42 Pu nuclides,
with their even
number of protons and neutrons, are particularly active contributors to the neutron
population with relatively short spontaneous fission partial half lives of 4.77x101°,
1.31 x10,
and 6.84x10 10 years respectively [Fetter(4), 1990].
As is the case with HEU, alpha particles interacting with light element impurities
can cause (a,n) reactions, giving rise to another potentially important neutron production
mechanism. However, reactions of the (a,n) variety are more significant in plutonium
than HEU because the dramatically higher alpha activity in plutonium creates more
opportunity for these reactions to occur. Likewise, neutron multiplication can also play a
more significant role in plutonium because more spontaneous fission and (a,n) neutrons
are present to begin the multiplication process by inducing fission.
There is also some evidence to suggest that a significantly enhanced high-energy
(above 1.6 MeV) gamma flux can be observed in the vicinity of plutonium-based nuclear
weapons [Baryshevsky et. al, 1994]. These energetic photons would most likely be the
result of radiative capture reactions occurring as materials in the surrounding chemical
high explosive absorb neutrons emitted by the plutonium. Due to the low natural
32
background flux in this energy regime, these highly penetrating gamma rays could prove
quite useful for remote detection.
2.1.3
23 3 U Radiation
Signature
The isotopic composition of uranium that is chemically separated from thorium
targets irradiated in a reactor varies depending on the reactor type and burnup. Although
the relative concentrations may vary, all uranium produced from thorium irradiation will
be contaminated with 232 U produced primarily through the following reaction chains.
232Th (n,2n) >231
232Th
(n,y) >233
Th
fl >231 Pa (ny) >232 Pa A3- >232 U
Th A-
>233
Pa
-
>233 U (n,2n)>232 U
The limiting reactions for both 232 U production mechanisms are the (n,2n) reactions that
have threshold neutron energies of around 6 MeV. As a result, uranium bred in reactors
with relatively large neutron populations in the high-energy (i.e. > 6 MeV) portion of the
spectrum will typically be contaminated with higher levels of 232U.
232U contamination
also increases with burnup [Kang, 2001].
As noted above for HEU,
2 32 U, with
its 69.8 yr half-life and its
2 08T1 progeny
can be
very helpful for remote detection even at 232U contamination levels on the order of 100
ppt. In contrast to the minute concentrations of 232U that can be found in contaminated
HEU, 233U is considered to be "clean" if it has levels of
ppm. [Kang, 2001].
2 32 U contamination
The intense radiation field given off by the
23 2U
less than 1
decay chain is the
root of radiation protection concerns that have kept 233U from being pursued by states as
the basis for nuclear weapons production. This intense, high-energy radiation will also
help to facilitate fairly straightforward remote detection of concealed 233 U.
33
2.2 Detection Techniques
Detection techniques that seek to exploit the common properties of fissile material
discussed in the previous section can be generally categorized as either active or passive.
Active methods involve the application of external radiation sources to induce fission
events in fissile material that may be present or to take photon transmission
measurements that can indicate the presence and location of dense materials. Passive
techniques do not probe with radiation, but instead measure the intrinsic radiation emitted
by the fissile material to achieve detection. Methods using both active and passive
techniques will now be discussed in additional detail and their applicability to the
postulated container scenario will be assessed.
2.2.1 Active Detection
There are a number of disparate detection methods that fall under the category of
active techniques. The commonality between these methods is that they all employ some
dedicated photon or neutron source to bombard an object or material with intense
radiation to measure its response. In some cases the response of interest is the induced
radiation emitted by the object or material being interrogated and in other cases the
measured response is the amount of radiation that is effectively transmitted through (or
absorbed in) the test object. Methods concerned with stimulating radiation in fissile
material using external radiation sources will be referred to here as induced fission
techniques and methods that measure radiation transmission will be referred to as
radiography.
2.2.1.1InducedFission
As discussed earlier, fissile materials can be made to fission with neutrons of any
energy and by gamma rays above certain nuclide-specific threshold energies. Fission
events are accompanied by the emission of about 7 prompt gamma rays and anywhere
between 2 to 5 prompt neutrons depending on the isotope undergoing fission and the type
34
and energy of the particle that induced the event [Fetter(4), 1990]. Induced fission
techniques interrogate an object with intense beams of radiation and detect evidence of
induced fission in the form of prompt neutrons and/or gammas.
Induced fission techniques have a number of attractive attributes. The intense
probing radiation can penetrate significant amounts of intervening material such that even
well-shielded fissile material can normally be detected. Additionally, by artificially
inducing a strong signal that is unique to the class of materials that are being screened
for, induced fission techniques require a much smaller detection time than other methods,
particularly those that are passive in nature. Disadvantages associated with this method
include radiation protection concerns for workers and bystanders stemming from the use
of intense and energetic radiation sources. An additional concern for methods that would
employ neutrons as probing radiation arises from the possible activation of benign
materials in the test object.
In terms of suitability to the container scenario, induced fission techniques are not
a particularly desirable option. Although the ability to detect fissile material despite
shielding is an important virtue of this method, the insult to the device arising from the
bombardment of probing radiation is a critical drawback. A booby-trap provision, such
as the one postulated by the container scenario, could be triggered by intense radiation
resulting in detonation of the weapon.
2.2.1.2 Radiography
As photons pass through material they can interact with surrounding matter
through a number of different processes. The most notable of these photon interactions
are photoelectric absorption, Compton scattering, and (if the photon has an energy greater
than 1.022 MeV) pair production. Examples of photon interaction cross-sections for
aluminum and lead, illustrating the energy dependence of the three primary interaction
processes, are shown in Figure 2-4 [Krane, 1988].
35
I
I
E
I
0.01
0.1
1
10
0.01
MeV
0.1
1
10
MeV
Figure 2-4: Photon interaction cross-sections for aluminum and lead
The denser the material being traversed by a photon, the more matter is available
to cause these interactions per unit length traveled. As such, a test object with unknown
contents can be exposed to a beam of photons with a known intensity and transmission
measurements can be carried out to detect the presence of particularly dense material,
which could indicate the presence of either fissile material or shielding. Sophisticated
radiographic techniques can image the contents of an unknown test object using the
contrast provided by the varying linear attenuation coefficients of different materials.
These contrast images can be used to indicate both the presence and geometry of
suspicious dense material.
An advantage of radiography is that it can provide visual insights into the contents
of sealed, opaque containers without requiring them to be physically opened. The
sensitivity to very dense materials could also easily detect the presence of engineered
shielding. However, high densities are not unique to fissile materials or shielding that is
being used to conceal a nuclear weapon. As such, this method (and other more exotic
36
radiographic methods including those using muons) could be prone to high false alarm
rates that could create a potentially costly commercial choke point. Additionally, the
bombardment of high-energy photons can damage some radiation-sensitive types of
commercial cargo, such as photographic film.
Evaluated in terms of the container scenario, radiography warrants an assessment
similar to that of induced fission techniques. The ability to readily detect the presence of
material that could be used as shielding is desirable (although unlike induced fission
methods, radiography cannot unambiguously detect the presence of fissile material
behind potential shielding). However, the overall desirability of this technique, at least
with respect to the postulated container scenario, is severely limited by the fact that the
bombardment of a booby-trapped nuclear device with intense external radiation could
trigger the weapon.
2.2.2PassiveDetection
Whereas active techniques use externally applied radiation to exploit common
properties of fissile material related to fissionability and density, passive techniques focus
on the intrinsic radiation that is emitted in varying forms by all fissile material as a means
of detection. Using large static arrays of gamma and neutron detectors to obtain gross
count measurements can identify the presence of a radiation source. This technique
cannot, however, discriminate between fissile material and any other type of radiation
emitting material. More advanced techniques using gamma spectroscopy can be used to
detect and identify individual types of fissile material.
By relying on intrinsic radiation emitted by fissile material instead of radiation
induced by powerful external sources, passive techniques are non-invasive and do not
present radiation protection concerns. However, the intrinsic signal emitted by fissile
material is significantly less intense than the signal that can be artificially induced using
active methods. In general, the number of counts detected from an isotropic point source
can be expressed as follows,
37
SAet -'ii
(1)
where
is
the
intensity
A
of
apoint
source,
is2thedetector
areanormal
totheincident
where S is the intensity of a point source, A is the detector area normal to the incident
radiation, e is the detector efficiency, t is count time, r is the linear distance between the
source and the detector, /u is the linear attenuation coefficient of a given intervening
material, and ris the thickness of a given intervening material. The situation described
by Eq. (1) is shown schematically in Figure 2-5.
Apt
Ad
|t----
T2
r
Figure 2-5: Schematic representation of source detection through intervening material
Assuming that the detector or detectors will be placed as close to the source as the
situation permits and that detectors with efficiencies as high as feasible were employed,
Eq. (1) shows that the only remaining options for increasing the magnitude of the
detected signal are to increase the effective detector area or increase the count time. As a
result, either large detectors, arrays of detectors, long count times or some combination
thereof are likely to be required to make a confident detection of fissile material using
passive techniques. An additional difficulty encountered using passive detection methods
arises from the relative ease with which the low energy characteristic gamma emissions
from some types of fissile material (most notably HEU with very limited or no 232U
contamination) can be shielded by dense materials. Shielding can cause already weak
intrinsic signals to become even weaker and can be a serious obstacle to confident
detection.
38
Assessed against the container scenario, passive techniques have the critical
advantage of not perturbing radiation-sensitive booby-traps in the course of detection.
The trade-off for this desirable attribute is the potential for significantly longer count
times if the weakly penetrating intrinsic radiation from fissile material is to be detected
despite the presence of intentional shielding. Increased count times may or may not be
tolerable.
39
Chapter 3: Detection Schemes
3.1 Current Approaches
The preceding section discussed general methods for detecting concealed fissile
material without consideration for how and where within the international container
shipping architecture these techniques could be implemented. Identifying suitable
deployment strategies for selected detection techniques is often complicated by the
potentially competing interests of enhancing security and preserving the free flow of
commerce. A number of deployment approaches seeking to strike a balance between
security and commerce have been envisioned or even implemented. Some of the more
prominent approaches that have been proposed or realized to date will now be discussed
in terms of their abilities to address the conservative postulated threat.
3.1.1 Customs-Based Approach
The vast majority of detection schemes that are currently deployed or slated for
deployment, can be generally characterized as customs-based approaches. These
approaches strive to integrate detection systems using either active or passive techniques
into existing infrastructure elements at U.S. ports. Examples include outfitting cranes
that transfer containers from cargo vessels onto shore with passive large-area detectors,
processing incoming containers through inspection facilities where they are subjected to
active interrogation, or using mobile detection units to scan containers with photons for
signs of fissile material. The development of in-port detection regimes, such as the
examples cited above, represents a natural extension of conventional strategies based on
the customs model for finding and seizing contraband as the material is coming into the
country. Nuclear weapons, however, are utterly unlike conventional forms of contraband
due to the power and range of their effects. As such, when an attack is mounted by a
rational and determined adversary, the discovery of a nuclear weapon in a major U.S.
port simply cannot ensure protection from the device's destructive power and reach.
40
3.1.2 "Smart" Containers
Another approach that has been vigorously discussed recently is the deployment
of so-called "smart" containers. This approach would retrofit containers used for
maritime commerce with small radiation detectors to sense the presence of concealed
fissile material. Aside from the extremely daunting logistical challenges that would be
presented by installing, maintaining, and mentoring detection equipment in the
approximately 11 million [WSC, 2003] cargo containers in circulation worldwide, there
are a number of critical limitations associated with this approach. First, the detectors
employed in "smart" containers would be very susceptible to tampering. It is the sender
who loads and seals the cargo container prior to shipment, so if a "smart container"
approach was adopted and it was well known that each container was outfitted with a
small detector or detectors, the enemy would have ample opportunity to disable or defeat
the detection devices given their unlimited access to the container prior to shipment.
Even if an enemy did not successfully defeat the detector or if sensors in neighboring
containers detected radiation, the presence of a threat would still not be known until the
container entered port unless the alarm could be communicated in a quasi-real time
fashion. Equipping all containers with detectors that can transmit alarm information
would most likely render the "smart" container approach cost prohibitive. Therefore, like
customs-based approaches, "smart" containers would not identify the presence of a
nuclear weapon until it has already reached a U.S. port, which is not adequately
protective when faced with a sophisticated and determined adversary.
These and other current approaches that subscribe to the conventional notion that
threats can be successfully detected and interdicted as they enter the country (in this case
when the threat has come ashore in port) are critically flawed because they do not take
into account the unique destructive dimensions of the nuclear threat they seek to address.
Even if they make detections with perfectly reliability, these approaches and any others
that propose to look for fissile material in containers that have already entered port cannot
ensure that a nuclear detonation that physically impacts the United States can be
41
prevented. Therefore, with respect to the challenges posed by the threat of containerborne nuclear attack, these approaches do not meet the ultimate success criterion.
3.2 Ship-Based Approach
3.2.1 Attributes
The primary drawbacks of the approaches discussed above relate to the critical
issue of how and where defensive measures are to be deployed. For conventional
contraband, shipping ports are logical locations to field inspection and detection
capabilities because they represent choke points where many elements (i.e. containers) of
a generally diffuse threat (i.e. container borne contraband) come together. Domestic
ports are also convenient deployment nodes because, unlike foreign ports and
commercially owned property, the U.S. government has wide access to the facilities and
infrastructure. To ensure protection from the effects of nuclear weapons, however, the
threat must be interdicted prior to reaching, or even coming into range of, U.S. shores.
Large ocean-going container vessels represent another choke point where many
cargo containers, each representing a potential threat, come together en route to the
United States. If the presence of a concealed nuclear weapon could be detected and
communicated while the ship carrying it was still at sea, a defensive response could be
mounted while the threat was still safely removed from U.S. shores. The U.S.
government cannot unilaterally deploy and maintain control over detection equipment
deployed on the actual vessels themselves since they are the property and dominion of
private concerns. However, akin to the terrorists who may seek to exploit it as an avenue
of attack, the U.S. government does have access to the open architecture of international
maritime commerce that allows any party to ship containers to and from just about any
destination aboard these ships.
Therefore, Gallagher at MIT has proposed an approach whereby suites of
commercial off the shelf (COTS) gamma and neutron detectors are mounted inside
42
standard, non-descript cargo containers. These dedicated units could then be shipped
clandestinely using existing commercial channels where they would be deployed
alongside potentially threat-bearing containers aboard vessels sailing for U.S. ports. On
board the container ship, the detection units will be able to utilize passive neutron
counting and imaging-enhanced gamma spectroscopy techniques to detect and potentially
identify any threat-related nuclear signature being emitted from nearby containers with a
count time constrained only by the duration of the voyage. The containerized detection
units would also be outfitted with a transmission capability such that the presence of
potential threats could be communicated as they were detected and prior to entering U.S.
ports. The primary advantages of this "ship-based approach" can be summarized as
sensitivity, stealth, and most importantly, standoff.
3.2.1.1 Sensitivity
Characteristics of the ship-based deployment environment and the containerized
detection units themselves combine to promote good detection sensitivity. Standard fullsized cargo containers, which would be used to house detectors, have dimensions
measuring 40' in length, 8' in width and 8.5' in height. The 2720 ft3 interior volume of
these containers provides ample space to mount neutron detection equipment and arrays
of gamma detectors that can be configured to present a large effective area when viewed
from any incident direction. Additionally, the long transoceanic voyages required to ship
containers from many foreign ports of call to U.S. shores provide extremely long count
times. From most foreign ports, count times of a week or more would be available.
Referring back to Eq. (1), it is clear that a large detector area and very long count
times will enhance signal strength and help to offset the unknown and variable distance to
the fissile source. However, the signal strength defined in Eq. (1) is not the only relevant
factor in confidently detecting the presence of fissile material. Background radiation
being emitted by benign sources can mimic or obscure the emissions from a genuine
threat. Two particularly problematic contributors of background radiation are cosmic ray
induced neutrons and naturally occurring radionuclides. Cosmic rays, composed
43
primarily of energetic protons and alpha particles, produce neutrons predominantly
through spallation interactions with matter [Frank et. al, 2000]. The distributed neutron
background flux at an interface between air and iron (e.g. on the deck of a containership)
has been found to be approximately 12 times greater than the background flux at an
interface between air and ground [O'Brien, et. al, 1978]. This distributed neutron
background enhancement, sometimes referred to as the "Ship Effect", is the result of a
massive object composed of dense material (e.g. iron) serving as an effective medium for
the production of cosmic ray-induced neutrons. Naturally occurring uranium and thorium
can also frustrate detection efforts because these radioactive materials and their daughter
products produce characteristic gamma emissions that are identical in energy to those
emitted by some fissile materials of interest. Unlike many terrestrial settings, the
uranium and thorium concentrations of seawater are small at 3.3 p.g/L [Turekian, 1976]
and 9.2 ng/L [Emsley, 1998] respectively, and these concentrations are not expected to
fluctuate substantially. Therefore the background sources likely to interfere with shipbased fissile material detection are diffuse uranium and thorium impurities in the ship's
structural steel and distributed benign sources in commercial containers. Imaging
techniques provide a means for identifying localization of incident radiation. As a result,
threatening point-like sources can be distinguished from the benign distributed
background sources described above.
3.2.1.2 Stealth
The nondescript nature of the containerized ship-based detection systems allows
these units to operate surreptitiously. The stealth afforded by these sealed, containerized
units will frustrate attempts by adversaries to disable or defeat the embedded detection
equipment. Additionally, while the exact number and location of the detection units
would not be obvious to an enemy, the knowledge that they are operationally deployed
may produce sufficient uncertainty regarding mission success to dissuade the enemy from
using this means of delivery. This could achieve an important degree of deterrence.
3.2.1.3 Standoff
44
The most important advantage of the ship-based approach is the physical location
of the material when a positive detection is made and communicated. Instead of
identifying the presence of concealed fissile material once it has already entered the
country, a ship-based approach could detect the presence of a threat while the container
was still safely removed from American shores. The warning time provided by a
transmitter equipped, ship-based detection system would allow protective measures to be
taken to ensure that a minimum level of standoff distance between the container vessel
and the United States coastline could be established and maintained. Not only would
early warning prevent a concealed weapon from ever becoming a threat to the American
homeland, it would also ensure that responders had the greatest possible degree of
flexibility in how to safely contain and neutralize the threat.
3.2.2External Uncertainties
It is difficult to overstate the critical advantages of a system that uses COTS
equipment and well understood techniques to provide advance detection and notification
of an incoming container borne nuclear threat. However, before the effectiveness,
reliability, and practicality of this conceptual approach can be persuasively demonstrated,
a number of important remaining uncertainties must be investigated and resolved. Some
of these uncertainties involve aspects of design and performance verification concerned
with elements internal to the containerized detection units. Other uncertainties are
external to the detection units and relate to facets of the international shipping trade and
characteristics of the deployment environment. A concerted effort is underway to
remove or constrain these uncertainties and to produce defensible assessments of the
efficacy and viability of the ship-based approach. Research and development activities
supporting this effort have been roughly divided along the lines of whether they address
uncertainties that are internal or external to the detection units. The remainder of this
thesis will address some of the more pressing external uncertainties. These uncertainties
include the count times available on container voyages originating from different regions
of the world, the number of detection units needed to adequately cover a vessel of a given
45
size, and the number of detection units needed for a fully deployed system. Internal
uncertainties are being investigated by Gallagher at MIT and are outside the scope of this
thesis. Some important internal issues that are explicitly excluded are detection suite
design and quantification of internal performance parameters such as the expected
maximum distance (or range) at which a detection unit will be able to confidently and
reliably detect fissile sources under realistic conditions. Although concerns internal to
the detection unit will not be addressed here, there is an extremely high degree of
coordination and collaboration between the two functional areas and as work is produced
on one track it is immediately fed into ongoing activities on the parallel track.
46
Chapter 4: Container Shipping and Cargo Analysis
Some important uncertainties associated with a ship-based detection regime
cannot be meaningfully addressed and resolved outside the context of the international
container trade and its attendant infrastructure, equipment, and cargo diversity. The
following analysis seeks to gain insights into relevant external uncertainties by examining
the imported container traffic at U.S. ports and deconstructing it terms of where the
containers came from, how far containers traveled to get here, what kinds of vessels (with
respect to container capacity and speed) were used to transport them, and what are the
relevant material properties of the cargo found within them.
4.1 Container Shipping Overview
In 2003, commercial vessels of all types, including tankers, bulk material carriers,
vehicle transports, and containerships, made 56,759 calls at U.S. ports [MARAD(1),
2004]. Containerships accounted for 17,271 (31.7%) of these calls with 1,025 separate
vessels importing over 13,900,000 containers, measured in twenty-foot equivalent units6
(TEUs). In the same year, containerships averaged about 17 calls per vessel and had an
average nominal capacity of 3,144 TEU. Table 4-1 shows the volume of imported and
exported containers that are processed through the top 30 U.S. ports in 2003
[MARAD(2), 2004].
6 Cargo containers come in lengths of 20', 40', and 45'. For the sake of normalization, TEU is the standard
measure for container statistics even though 40' containers are the most commonly used. A TEU is
nominally defined as a 20' x 8' x 8' container. A standard 40' container therefore counts as 2 TEU.
47
Table 4-1: Containerized cargo volume by U.S. port (CY 2003)
Rank
Port
Export
Total
(TEU x 1000) (TEU x 1000)
1022
4664
Import
I
-
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Los Angeles
Long Beach
New York
Charleston SC
Savannah
Norfolk
Oakland
Houston
Tacoma
Seattle
Miami
Port Everglades
Baltimore
New Orleans
Portland OR
Wilmington
DE
San Juan
Gulfport MS
West Palm Beach
Jacksonville
Philadelphia
Boston
Newport News
Chester PA
Wilmington NC
3091
723
2803
1250
1124
1093
1064
933
838
529
529
460
815
764
423
307
237
210
595
633
517
450
594
486
428
187
192
115
139
147
98
63
29
39
166
71
108
106
34
113
72
103
9
34
42
95
58
48
195
185
179
140
93
80
San Diego
53
9
50
41
37
23
20
25
21148
147
32
28
28
72
72
44
44
44
28
21
19
18
I
23
7312
141
77
21289
7389
-
721
483
337
329
336
236
931
(TEU x 1000)
3642
2368
1965
548
Freeport TX
Richmond VA
Honolulu
Port Bienville MS
Total (Top 30)
All Other Ports
Grand Total
I
-
2
13837
62
13899
-
Table 4-2 shows the origin and volume of containers imported in 2003 from the top 25
U.S. containerized cargo trading partners [MARAD(3), 2004].
48
Table 4-2: Foreign container import data (CY 2003)
Country
of Origin
China
Total Trade
Imports
(TEU x 1000) (TEU x 1000)
4447
5656
Hong Kong
Japan
Taiwan
Korea
1292
722
651
469
Germany
467
650
Italy
Brazil
Thailand
United Kingdom
Belgium
Indonesia
Netherlands
India
473
388
378
206
156
261
225
253
602
533
496
429
392
391
390
389
Malaysia
239
299
France
Honduras
Guatemala
Spain
Costa Rica
Philippines
Dominican Republic
Australia
Turkey
Chile
Total
All Others
Grand Total
195
152
156
158
166
141
98
78
114
135
12019
1880
13899
280
275
268
246
245
221
216
210
196
190
17637
3650
21287
1619
1603
946
898
4.2 Count Time
The amount of available count time is a critical factor in determining the efficacy
of the proposed ship-based approach. Count times for ship-based detection are
constrained only by the duration of the containership voyage. The voyage time between
any two ports is determined primarily by the total nautical distance between the ports of
interest and the average speed of the vessel. The following focuses on nautical distances
between ports and vessel speeds separately and then combines the results of these
analyses to derive defensible count time estimates for container shipments originating
anywhere in the world.
49
4.2.1 DistanceBetween Ports
The nautical distance a vessel travels between a foreign port and a given U.S. port
is dominated by the location of the originating port and world geography (i.e. intervening
land masses). This distance, however, can also be heavily influenced by the number of
intermediate calls made between the ports of interest and by the size of the containership.
Many international shipping lines offer regularly scheduled service routes that call on
multiple ports en route to the United States. These additional port calls add distance to
the overall voyage and each call results in some idle time while the ship is berthed during
the container discharge and loading process. The size of containerships is relevant to the
travel distance because some important navigational short cuts have physical dimensions
that limit the size of vessels that can safely access them. The most important of these
size-limited navigational conveniences for containerships is the Panama Canal, which has
a 32.2 m maximum width restriction [Ircha, 2002]. Vessels with a beam width exceeding
this dimension (i.e. vessels that can fit more than 13 containers across the weather deck)
cannot transit the canal and must instead sail around the tip of South America. Despite
the additional voyage distances, economies of scale associated with larger, higher
capacity vessels drove many international shipping companies to build containerships
with deck widths that exceed 32.2 m [Wijnolst, 1999]. These so-called "Post-Panamax"
vessels, with capacities greater than 4,000 TEU, now account for 30% of the worldwide
containership fleet, by capacity [Tozer, 2003].
Several important assumptions were made prior to carrying out distance to port
calculations that would ultimately serve as input to count time estimates. First, New
York was selected as a representative destination for the east coast of the United States
and Los Angeles was chosen as a representative west coast destination port. In addition
to being the largest U.S. ports on their respective coasts, these ports were chosen because
their proximity to large urban population centers with vast cultural and economic
significance presumably makes them especially attractive targets for attack. Another
assumption was that all voyages made from foreign ports to the reference ports (i.e. New
50
York and Los Angeles) were direct, with no intermediate calls. This assumption was
made to ensure conservatism, since intervening port calls add time and distance to the
voyage. Finally, it was assumed that the originating port used in a nuclear attack (i.e. the
port from which a fully functional device is operationally deployed to the United States)
could be anywhere in the world.
A total of 133 foreign ports were included in the distance analysis. An effort was
made to select a set of foreign ports that provided reasonably comprehensive coverage of
the world's navigable coastlines when taken as a whole. Therefore, some ports were
selected for inclusion because of their prominence in the international container trade
(e.g. Singapore and Hong Kong), and others were chosen to fill in geographical gaps. By
providing quasi-continuous coastal coverage, the distance from any port not included in
this analysis can be reasonably approximated by interpolation. Figures 4-1 through 4-8
show the geographic locations [Hammond, 1999] of the selected ports by region.
51
.,
NW~~
)Mr
-
~~
;~
, {'r.'tl
iX ms
i
'~~~~~~..
ix.
.Ep">
.
,
~
·..- ..
,,.Lu
- t
.,erUBM
.·
vrL
,N
i'
:
..
3Q;:
::Xv
, 1~e
>
r uvr
ir
-..
-
a.Ue
__
. "Mm,'
'"
UNbtE
,bm
,'4t2
-g,,"
t
.'.,
,
.
i.*
°
STAESP.
U N'rFsi
l.E
Uw
I1-s
B-wV.
S TA
D
Of4
Wv
CkOVbma'
'
m
EO.
' ',b T i cd~,o
b1
iD
--
!SCleu
'
,ilv? .'..
North America
Map Number
1
2
Port
Halifax
Prince Rupert
Country
Canada
Canada
Figure 4-1: Map of upper North America showing selected ports
52
"
Ihih"8lhi
.$:
rU*e--Sr,FDBiXdT:.;t
·)
OE'·
i "Zru;i
·
'·
."·.
·:··-J·
: ,·t:r,l"P`"
·.·+ . -,
P·
i 1. irl
k;·'
"`
i
,*r
*
······""jl
`;i: 5-;."
·
r··
,·
X:·
:4'jr::rr":t·
J ;:`'*
·
.i
·-
';;.·::·"
::
.e
911P
fi
·xp"
t''
y·i.
-.
?'
`81
.". '.;::s20
a.
s
.aJq
,,
I.krau8s
:hi.
P
ed·
1P:.·
i :·· ·tr
""
"..::-:
r
`F
i"
1`
i·
r-·
·
i
:B *
2;,
.!·
·.··;:·
·,
::"";::·5· ;:1·,
X·; :
.4·
s·
I.·:I·*
I:
·· ··
C" j,
c
I.::·:
:
'e··
·i" · ·· ·
4
.- · · · · - \.`·:'r'·'·'.:iis.:·
*
,·.
··· ·-::._
-ii
t;· rkn
i,
;'r
:· %
i.
·
I·
i,:
J·:·
1.k.f :··
· · ··.
'.
:
·e i:
Central America/ Caribbean
Map Number
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Port
Havana
Kingston
Port au Prince
Santo Domingo
Fort de France
Tampico
Belize City
Puerto Barrios
Puerto Cortes
Limon
Panama
Puntarenas
Corinto
Acajutla
Champerico
Acapulco
Mazatlan
Cartagena
Maracaibo
Country
Cuba
Jamaica
Haiti
Dom. Rep.
Martinique
Mexico
Belize
Guatemala
Honduras
Costa Rica
Panama
Costa Rica
Nicaragua
El Salvador
Guatemala
Mexico
Mexico
Colombia
Venezuela
Map Number
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
Port
Georgetown
Paramaribo
Natal
Salvador
Rio de Janeiro
Porto Alegre
Monte Video
Buenos Aires
Bahia Blanca
Comodoro Rivadavia
Puenta Arenas
Puerto Montt
Valparaiso
Antofagasta
Mollendo
Callao
Guayaquil
Esmeraldes
Buenaventura
Country
French Guyana
Suriname
Brazil
Brazil
Brazil
Brazil
Uruguay
Argentina
Argentina
Argentina
Chile
Chile
Chile
Chile
Peru
Peru
Ecuador
Ecuador
Colombia
Figure 4-2: Map of the United States, Central America and the Caribbean
showing selected ports
53
Africa
Map Number
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
Port
Port Said
Tunis
Banghazi
Algiers
Casablanca
Las Palmas
Dakar
Freetown
Lagos
Boma
Luanda
Cape Town
Durban
Beira
Dar Es Salaam
Mombasa
Mogadishu
Djibouti
Tamatave
Figure 4-3: Map of Africa showing selected ports
54
Country
Eygpt
Tunisia
Libya
Algeria
Morocco
Canary Islands
Senegal
Sierra Leone
Nigeria
Congo
Angola
South Africa
South Africa
Mozambique
Tanzania
Kenya
Somalia
Djibouti
Madagiascar
Europe
Map Number
60
Port
Batumi
Country
Georgia
Map Number
77
61
62
63
64
65
66
67
68
69
70
71
72
Odessa
Constanza
Varna
Istanbul
Piraeus
Durres
Split
Koper
La Spezia
Barcelona
Lisbon
Coruna
Ukraine
Romania
Bulgaria
Turkey
Greece
Albania
Croatia
Slovenia
Italy
Spain
Portugal
Spain
73
Bordeaux
74
75
76
Le Havre
Southampton
Dublin
Port
Zeebrugge
Country
Belgium
78
79
80
81
82
83
84
85
86
87
88
89
Antwerp
Rotterdam
Hamburg
Copenhagen
Gdynia
Klaipeda
Oslo
Stockholm
Helsinki
St. Petersburg
Riga
Tallinn
Belgium
Netherlands
Germany
Denmark
Poland
Lithuania
Norway
Sweden
Finland
Russia
Latvia
Estonia
France
90
Murmansk
Russia
France
England
Ireland
91
92
Arkhangelsk
Reykjavik
Russia
Iceland
Figure 4-4: Map of Europe showing selected ports
55
Middle East / Indi
I
Map Number
93
94
95
96
97
98
99
100
101
102
I
Port
Calcutta
Madras
Colombo
Bombay
Karachi
Bandar Abbas
Bushehr
Abu Dhabi
Umm Said
Mina Raysut
Manama
103
104
Ad Damman
105
Mina al Ahmadi
106
107
Aden
Rabigh
108
109
Eilat
Haifa
Beirut
Al Latakia
Al Basrah
110
111
112
Country
India
India
Sri Lanka
India
Pakistan
Iran
Iran
U.A.E.
Qatar
Oman
Bahrain
Saudi Arabia
Kuwait
Yemen
Saudi Arabia
Israel
Israel
Lebanon
Syria
IraqI
Figure 4-5: Map of the Middle East and India showing selected ports
56
~~~~~~~~~~~~~~~~~~~~~~~~~~~
.
9-~
~'
~sv~lrrarar
Wnrt~
i
-9,
i
A -
FarEast
Map Number
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
i;·
I'BE r·i:*tSi
`!·
·i':?$ P"·`S-;:
i..kii:2
I:·lr.
t
:·".!
5,rP
r··:·:···
-·
t;
·
";
i:
r2,·
';;1
`·j
·
.·'·
..
ii..
I*
Port
Vladivostok
Yokohama
Weonsan
Busan
Nampo
Tianjin
Shanghai
Kaohsiung
Hong Kong
Manilla
Ho Chi Minh
Selat Lombok
Jakarta
Singapore
Port Kelang
Bangkok
Chittagong
Figure 4-6: Map of the Far East showing selected ports
57
Country
Russia
Japan
North Korea
South Korea
North Korea
China
China
Tiawan
China
Philippines
Vietnam
Indonesia
Indonesia
Singapore
Malaysia
Thailand
Bangladesh
"'
,.B
~Lombo
al
NAURU
se /
Si
,
CaN
ak
ag
-
.
JvI
,
Chritmas
.
t.
Sumb.
..
\
....
-
.· _,
.
.:
..
.
,·
·
..
....
......
Xt...
i
-LoN V
e St.Isabledonl
. 0a
:./,/s
_ ta Cwztces
.no,
.~..
,,
.;
...
:;
....
··
·.,
Sl~
~ ~~
I"my
r
s
,
Thri
Kings
,nae
¶j '
.r
e.
T~dac.-
,-vd
ia * djl
K
Australia
Map Number
bISouth
A
Port
ttttttUttttttSttttt
130
Brisbane
131
Port Moresby
132
133
Port Darwin
Freemantle
-
ttttttttttttttttttt
Country
Australia
Papua New Guinea
Australia
Australia
Figure 4-7: Map of Australia showing selected ports
58
ZEALA/N
G wo'3
Tomltnia
.
I
.
E y
I
The nautical distances between the two U.S. reference ports and the 133 selected
foreign ports shown above were calculated using information tabulated in "Publication
151 - Distance Between Ports" (referred to hereafter as DBP) prepared by the National
Imagery and Mapping Agency [NIMA, 2001]. Information on over 1400 worldwide
ports is compiled in this document and all published distances are based on accepted
maritime routes and charted nautical sailing lanes. Because of the impracticality of
listing distances between every possible combination of these ports, distance calculations
using this document typically have to be carried out in several intermediate steps using
specified "junction points". The DBP identifies 25 junction points where international
shipping routes converge and through which ships pass when sailing from one major
maritime area to another (e.g. the Strait of Gibraltar or the Cape of Good Hope).
Distances between any two tabulated world ports can then be calculated by summing the
distances to, and between, these junction points. Some voyage distances vary
considerably depending on whether the Panama Canal can be transited. Because a
significant fraction of the international containership fleet is Post-Panamax, distances
between a given foreign port and the two U.S. reference ports were calculated with and
without access to the Panama Canal. When the two distances differed depending on
canal access, the following expression was used to calculate a weighted average,
Dvg = 0.3 Dos_,,anamax+ 0. 7Dpanaax
(2)
where Dpost Panamax is the voyage distance without access to the Panama Canal and
Dpanaa,,is the distance with access. The weighting factors were chosen because 30% of
the current fleet (by capacity) is Post-Panamax and the balance is not. Therefore, a
container heading to the U.S. should have a 0.3 probability of being on a ship that can't
gain access to the Panama Canal and a 0.7 probability of being on a ship that can.
Distances from the 133 foreign ports to New York and Los Angeles in nautical
miles 7 are shown in Table 4-3. The Panamax, Post-Panamax and weighted average
7 1 nautical mile = 1.15 statute miles = 1.85 km
59
distances are captured for each foreign port to the 2 U.S. reference ports. Highlighted
cells illustrate the shorter of the voyage distances between the two reference ports.
60
Nr)
rI~
-.
0) LO N 0 - mC () D LO )CT C- OD T00)
n CO 0O
C
CD N- CD O LOD)
C1s6 LO
.'I
I (D D
Co
CD
r
C
C
C! ) I
D
0.
Lr- CD
)
,.q
0t,CCON-L
'-"-0)N-O-
'I
CQ
U
a)CM
U3~~~-
mr
O
O CD LO CD
j. LO ) CD )O - (D N
0 o O N-N-Ntr CO
r '03)'0
0)Q' OCD
N- CD cD
CD N N; C wil
'
M
- -0 'IMC - Nl-m
0 n-')r-w
I 0 lpc
l)
NMCo "T MI
(V
--,r
w N0
"T NN Vm Mm0M MM
0M
C N
I"NNN,
I,-m- -YNN-0)N
--0l-NC-_-CN-CD
NN
D
D
)
I)
3
11
I
00
ir.
)
1V0Mn 0T0t
M 0) -)C- )N-00 Nt-CO
a -C
I- 0
o f
Q
M
0
)
S)
t5I. MOM
Lo'r N (D
v% DClD
ft
t
M)
N
M)
M
N
-
N
C
W:
-
t
-
0 W
M
ON0 L
-0
0 - "t - t qTC
0
U)
ND -C 'O
D CD
W) DL) N
) n-l
N
T
N
T
D
0
W
D
-
-
-
CD
T-
O
0N
O
O
I-
W
I
10
02
cn
0
I,,Y
0;
:0
.-
U'.
0)
ao
B
R:
i'
1O 0) I- cO
N CO Co cD
~C4V1
0 "L0 n
~i.
;'%'5:
J·:
j -0 C
3wc
;··
0
0 lD
C
.,
LO
** '
*j-0 0
,o
0
~4D¢~
C':
CJL
;"";
;
·.r · :1;
L.
' Sl
,.1';
nO
0
.-. ,i.,
-
x
CU
E
o
D
*oCu
0
00
0 CL
I-
cu
5
la
uCu
4).
C)
'A
) DO
:0
0 N- 0) a) T t N- w
n 'T- N
T)
r- N ) 0 CD
r
C'
Mt
N O CD 00 - O O
0
T·
,
C
N'r
rr
-
CV
C
o0
t
-
°
"N
0t00)
"O I I
'-
NO
T-
t-t
v
IC
-N0N -C--
Ir,I- Il
0O)t
CD
C)N
1-N C-L1 <0dC
0
·- rLOL
w
C) CD
m
m w
O
w O
0
) C"O
V
0
It
W
w
-
0
0a.
x
Cu
0
I
CNCD
0)
"TO0)
0)
r0 0 N
g tC 0) - C
t N 0) CD
0) 0 C
N0
'- 0)
T ,-- Mr
N "N
N-C- MNN
N M)0 O - N r- M
C) V N 0D
O 0
00 t N- 0) - 0O0
-
Nt
E
C
-q
cCr, M
c
D
c
CU
se)0
r
·
'
'-
r -
t- -
N.-
sT
N N N N NC' 'I N N N NC0 -t
-
0)tC')
L0
0)
0) )
CDCDCDL)
-
U) 10
(L
co
L.
en
..
-C%
I-
cu a
C'
co rC
cu a
L) C
c
00
m.0
d.cu
mC
c
c
4) *c0
:3m
W.
o ip
E = w- E
Cc
. Cu c
f E E x
L u I Cu0 C Cm3 I O C0
0
a
0L
0
CU
M VO m
Cu
0) Co
ttO
tc
E
Cu C
aL
c
o-
i5mo
m_O.
o
-
=
CD Cu
o
a a..
Z
a)
.~er
0 o0
0< 0
0
C
E.
C'
m0 114
wI- wm -
NNNN
N N N
, D' '0 ;
m
m
mI
LL . a:
I.
5
202
T-- V-·,-
61
- " "
C.D~a.
)0
C
mm
CD:2
m0
15 CU
L.
U &
. a.0
0)
%. (
0 nUn
J Co f 0: m
Cu Cu 5~Cp
I
QI
3CD
co c
_au
CC'r
0.I a.
:
C
co
E C
C
= ( 0)00
0 2 ( > ILoC-
cn
c
:3
CD
O
* E
o_
co
x
uc
co
0
C
0
Cu
U)Ca
C2OO~
0*'a
0
Cuw
m cu
VC N N " V " M M M
MO-O0 , O
- b
C O
'TOr
(J N
LO C)- C-)
N CI C )
N C0
C O 0 0a
-
CO
0MO00NCO
O O
O - -O
° 0O CO 8W't
0 IN
O COC0
CO O0
CCCO
w
w
w
,
00'
0
.
.
O
000
--
0O
C
)
CD
o O
CC
U) MCD
O CO
LO vCLW, O
C0
- Lc
C
O
0d
O
0 C
O
O CD 0 -L 0 v-O
)D CVOM C00
-CO
0
n m q m m N C c t
)
) CDI- 0 m) O aO
oo
- -C)C
LO
v
O
CD
)
CD
b-
NL
CCt
C
c
IRTco O C CN 0 (C)CD
O 0CO
CfL) n-N-)
C)oC,-Cc
CD C3C)
OC
1 sU)
X) CD t LOmtON - . U00 0C- 0
CY)
Un )Co T 0 CO
CO W,CO
CO0CD
D)O)
)
N0 LOCO
CD TC-N C)
-,-D-- C))C,N COCdCd
a
t
00rMM
C
) D 0N N CN CDt 0 CLO )0
T ct cC)0\N
0 m t 0 C Nm
0 n
Ut 0 fl
0 0w
0 mO 00
:N.V
U)
oU)
L
00
C
-I
.
o c m 0
8 2
L =J . 0)
0 U)
iWW00W
(DL
ou
:3
0
w-
LL
c co
-)
.U
0
zoO
M)Z
co a
,m0
cN0
< co
a
in
O
'T Uo
O N0 0)
C c, C) CV)
m) C)
*
0 m 1a. o T E
EE
) 0
2
m
O D
co
(D C CD
Q
I0<C0 C>,z C
Mo
:3-14 0M po
O
(D";oz0w
=
cu
co
'a
nU)
E a C/)
CU>c0r
cowc
0
C3 LL 2
Y4
>
). C o
E
=
O
0
C: cL
C
E2
Cu
L.
.o 0)"O
co
CL
c
*'CD.
eo
M
fN
14 T It
T tD
t0
"r
a
-a co=CDa
cn >a
~~?
c L
EJ
:30 a..-co
(,D
t
0 U- i c
m~Jm~LC
co
.
Co
0 m
N
= C
VX
c
m
O
C
L-
-E a Io
0a
UE
co00
inaU) 0~~Co lim 'a
O) O
C
o
LZ
-st; C0
(i)
62
Cl
- a) 0
- C .-aC =
CLY0 ccoCo
ON C J M'.
CO 0u)0 0 ur0tur
0 a CD O CD CD o
T 11 m0
-T LrO- U7 0
.
_
C
CO1CDCD 0CO C) O
N
f.O
0 C0, v-r" w04
C',',-,0'
(M ,O
o4
v- wN
OO OO
M 04
N CO
.4
-o' G
CmOO wmmO
It
0O m.00
CO "
!'tOcO 'g
!- -
O
O O f'N
- CMC CDO) CCD
O 0- O ,O-NO ,TN3
OO
0
CO'N- ' M M CD
DOD03QO CT Q cn O a
c ° O °)
JO I
O o
O(Di -
NN N
-
-
!o
oC
) ) MMM
Il,
-
-
',v-
v-
I-
OON
CM00 (D C r4 f
X)
M
-- 1'') W _OI
Ott 0 O)N,
Q -- O
O O - c, M
)o
I-
,
) CM
MC4-dt'ITt qO
v-
-
I
V'
v
C )
,
O v-
) CO I
-LO
L
N
)O cw-
-
0
Ocs
OO
00
OD 0 oCO
....S,
......
"'1
2
wwCO)
·
*:l:
.~:·:'"~~
:!:·iII~ll· '·' ·':~:
S
~·:~:
<
-IO
OD
00
CO
,
,'>
'
~
j":
:!i:;~·~:
, ··I
:id:·q5·.·i:.·.i:jiL
i,
'
:::
v
o)
O LO
O
Co
r 0
rt
CM
CI'O OCC' rO M OM
t
v
v
00 rl
0
- N
-O
) stdt s UUO ° Ot
I'll'
0)
o
LO O
- - -
v-
v N
C
,
m lqr "It I- 0
LOItco m
0 0T '-T
M M "I-
v-
-
O
nC
e
v
C0
O 00 CO
- (D 00C COCO O
0 N
.o O O O O
0-.
O LO
0 L - O O) D
O NO O Oq 00 0
- ,tD '- 0 - In
Cl 00N
c
t
O
c
IC-
-
-
v-
'm
.-
0
-
-
-
r
I
m M, N I- tl
" 0 0
Lo
-
CD
0 0
T
VI'
0
·-
t
I
O . w
o
O -
0 .
-
,COO OM- T'
.
0 .-'
OO f.O Oi
N
OD O) U.O1o0 COCo t9 o ' ' f
C'O
O) OMN .ON O O.
O O O CO
0 O - N N O
I''
N N, CN
mO
C) m Cm CO 'Cf)O , ,
et
It
i") ,Td C) t C
N
o)
O ) ), C) 0 C M
3
T U v
0 ) Ln
'IO
7
N 0 N N -t w Fv- ·- LO
(-C
DI'll, 00CO
O 0 - C~OCOLO)(DV
L - 0(O
D
O.
-
00 -N
) NC
1
N,N
o- O O COO . -
O cO ~-CD
w~tI O) CD I)- rK w!
O C Or
TD -0
' 0 t-CD T C')
O4 0 CO O
V..
T
CN0 IO O WT- N N4
O Co)
, oO 00 W0
O
C m
O 00
m m C
CO m) ,t'O "i)
t m
'IT 'T 'l w' m -T
O
00 LO CD,
w r
M
0 00 00 v- V- 14 OO
0
M0LO
OO 0 0 4 ,C
°)' TO
-
v
- 0
0t
vu a
CUco
.C
.o oo
U)
c
OQ.,t
Q
-
cC 0
=E
E
C
E
C-u
C CU CO 10 ".r-
'c
:
.o
'o
1 C !=MDazo
o o
CumC
a.LL-UW.
caQ z0U.u)
,
.
o
,
.
° (L,
S E- , C ,
o
C
C;
:
00 ir o
C 0 Q a,C. CO IC OOC
la C O0 (n
) o m aC
O I v,
°
- NcN C)
MT)
s I- -_
I-
-J~
w w
IL.w
o Cux u)It
*.LI cY
t 0waw
s Co
Is0 r_ 0- 0 0O
co 'N
0w
wm0 03C0 00
63
5
CU
<Cu
aE gC<
C<
co
co
a_
,
*
co
c co
c :
2E <Yw
u
Cu C 5uC
Eltu.1
E~Cu
.0
c
co
C.,
0o
w
10
V)
E E m
- , - ar C)
O O
E m co. C
E EmY
U)
M
CS ale,
m CO
0 mr
m mm E .c C v
0) 0)
" Cn
I U)
o r0) 0)
co0) - ° ,°- ,-°
) 0)
C
0) (7)
mo
z
W .D
C)
:
co
e:
)V- - V
cv
ON
N ,i O co
c"C0 .~- !..
::oo
oC
,) . .t O
0 i,
CoO ~ 1
COcO 0O 0 4 eO
,_O,--O . oO
O
P
, Oi C,
_CO 0 0Q
i- ~ ~
.- COC303
, O
OD
0 O
0
U) ))N C -
03cO3O
,r
-
DC L)
00
,u3
' lO
1
cO u,
- 0)
,, O
O
(D
w
(M[I-
e
O °N
1
s
C) 0M
I- OOt0 Lc
D(D
.D0) , 4,
co W0
N IS)
QD
)
w-
o
,-
CM,l
MM
.".0
00
a
C- w
'
)
0
CO
O,,,,,N(NCDC-
° N
M N
N
r.O oc
LOCD'
DC)) O
I-LC)
t__
O rl- 0
1^
W) U)
M M
W N ,-
M I-0
N M M N
O·r
, CO C0 M-- 00
C L C-L
N N 0 V)
V LV L '-T 'IT CVCM
'oNn
L
L
-T
-T
-T
,
-Il
-T
l
O
0CD LC a) )
N
N0
C 0
l
1V
C
CO LO
CN N 0( 0 ()
N
C
(N C0
1
or I.{3
co0 0. CDV)
0 O
cnd00 LO
uz) Co a) CV
o O a)
0O O.0
r.DO
D ''CVo0 rO
O
O
C
O
o
O
"O
O
U
O
'
e
1
"
1
(
v1 CNC
U)
0 0 C
0 CN
I rM rM 0- 0
C- 0r-Ir 0 T 0- - m- I- NN
r- - N
r-If
S
0
_
_
r-.
L.
cn n
cuc
(fLu
aD,)
c-
.. o
:
U
U)>
J
cu
L
.
0
v,
:
0
c$
co
_co
a 3E
w <xNa
*0
co
5
M 0O
Co
-N IM
N-
I,-
-
Ir-
Irl
cu
ococo
00
a
=
w
UV)
0
.c - E.an
E ) (10.C)
.0 tn
F~:C
co
m
Ca
C uc> c
uCuu
E
'F a) VOV
0 0 p C > E vC 2Co
D II
M0
-
O
-
cV
0O Co
UcQ U)cum
co
C
or = m m m
r O
C-O
'-
m °oco
w zEp cnY Ir-)I
-
D
C
Co Co C
C 0) 0
L
V)
CuC
=
c
*_
N- I-
O°
CN
C
U)
a)
co-e
w ..
co S
2.
-C
°
)C
0"wY
4-
.~0
)n
Cm
._
cn a.
U.)co
O -
N
m
Cr
-
V-
CV CV V
It
II
64
C-r 0
0
CO
rCO o
0_)
0¢4 ('I M CY C) C
4.2.2 Vessel Speed
The diverse fleet of international containerships has a broad spectrum of nominal
cruising speeds. Although point estimates, such as mean values, can be used to convey
information about large and diverse data sets, the character of a wide spectrum of values
is better and more completely captured by a statistical distribution. To develop an
appropriate and representative distribution, a containership database was created using
publicly available Lloyd's Register information provided online by large commercial
shipping lines and U.S. ports. This database was populated with nominal speed (in
knots8) and/or container capacity (in TEU) data for 1,734 commercial container vessels.
Information on both capacity and speed could not be found for every vessel included in
the database so there are 1,184 vessel speed entries and 1,706 vessel capacity entries.
The full database can be found in Appendix A. No size threshold was initially imposed
to exclude any vessel from the database, however, since the subject of interest is
international shipping, some screening criterion had to be devised to bar small domestic
feeder ships from further consideration. In its annual breakdown of commercial shipping
statistics the Maritime Administration (MARAD) of the Department of Transportation
imposes a vessel size threshold of 10,000 deadweight tons9 [MARAD(1), 2004]. This
threshold was adopted as a screening criterion for the containership database to facilitate
fair comparison with the MARAD statistical abstract and was found heuristically to
correspond to vessels with a capacity of roughly 715 TEU. The screened database
contained speed information for 910 vessels and capacity data for 1,313 vessels. For
comparison, MARAD reported that 1,025 containerships called on U.S. ports in 2003.
The speed and capacity information contained in the database were assumed to be
reasonably representative of vessels importing containers to U.S. ports for the following
reasons. All information used to populate the database was available through U.S. ports
or major container shipping lines that service the U.S. Additionally, the size of the data
sets for speed and capacity are comparable to, or exceed, the total number of
8
1 knot = 1 nautical mile/hour = 1.85 km/hour
9 Deadweight tonnage is the amount of cargo, fuels, water, stores, and crew that a vessel can carry when
fully loaded. It is measured in long tons (1 long ton = 2,240 lbs.).
65
containerships that called on U.S. ports in all of 2003. However, to obtain some
benchmark of how well the vessel information in the database comported with the
containership fleet that actually serviced U.S. ports in 2003, the mean capacity of
(screened) database vessels was compared to the actual mean capacity reported by
MARAD. The results are shown in Table 4-4 below.
Table 4-4: Vessel database capacity benchmark results
Mean Capacity (TEU)
MARAD
Database
3144
3047
Error (%)
3.085
Although this benchmark used only a single parameter (because it was the only value that
invited straightforward comparison), the excellent agreement between the database and
the MARAD data suggests that conclusions drawn using the vessel database will be
reasonably representative of the actual containership fleet servicing the U.S.
To extract meaningful statistical information from the 910 nominal vessel speeds
tabulated in the containership database, a cumulative distribution function (CDF) was
constructed. A CDF is a statistical distribution that relates the value of a parameter to the
probability that the given parameter value, or a lesser value, will be observed. In this
case, the CDF gives the probability that a containership calling on a U.S. port will have a
nominal speed equal to or less than any given value.
To construct a CDF, the raw vessel speed data from the screened containership
database was first sorted into ascending order. Then the frequency of each distinct
nominal speed was computed by simply counting how many times a given speed was
.
(3)
observed in the database. The probability, or relative frequency, of each nominal speed
was then calculated using the following general expression,
P
=
nn,
Zn,
66
where Pi is the probability of the ith value, and ni is the frequency of the ith value. The
CDF was then found using the following general formula,
(4)
F
o
where F[xi] is the discrete CDF value for the ithelement. In this case, xi represents each
distinct nominal vessel speed. Figure 4-9 is a plot of the vessel speed CDF with the 25 th ,
5 0 th, 7 5 th, 9 5 t
h
,
and 9 9th percentilevalues identifiedgraphically.
Vessel Speed - Cumulative Distribution Function
(N = 910 Vessels)
1.00
0.90
0.80
0.70
0.60
u.
0.50
0.40
0.30
0.20
0.10
0.00
10.0
15.0
20.0
25.0
30.0
Nominal
Speed(knots)
Figure 4-8: Vessel speed CDF
The mean, median, and mode values of the nominal speed from the screened
containership database are shown in Table 4-5 along with interpolated numerical values
of the 2 5 th,
7 5 th 9 5 th,
and 99th percentiles.
67
Table 4-5: Vessel speed statistics
MEDIAN
MEAN
MODE
Speed (knots)
21.43
21.29
21.00
25TH
75TH
95TH
99TH
18.88
23.86
25.77
26.33
4.2.3 Voyage Times
The distance and speed analyses performed in the previous sections can now be
used to generate estimated non-stop voyage times for the 133 foreign ports. Weighted
average distances between foreign ports and the U.S. reference ports were used to
calculate voyage times to account for the additional expanse that must be traveled by
Post-Panamax vessels on some routes. Also, acknowledging the inherent variability of
vessel speeds, voyage times were calculated using both the expected, or mean, value of
21.29 knots and the conservative 9 5 th percentile value of 25.77 knots. Voyage times, in
days, were found using the following expression,
T
voyage
D
=D
g
(5)
(5)
24 * V
where Tvoyageis the voyage time (in days), Davgis the weighted average distance between
the ports of interest (in n.m.) and vx is the mean or 9 5 th percentile vessel speed (in knots).
Table 4-6 shows calculated voyage times, by region.
68
0
In
I I-
LO
0
0
o- C0
(c U)
od
CDC,
00
'a
o
CO u
O
6
,
COVN CD
4 T, c0
t
.
0
E
F
co
0
CV) ,
0 to
Il)
-I IE lar
ai, 2
V
E
oi
Nf
a)I,'m "T
%Tlq co
T- llq
- vrv
xTnu
tod
m
.
.
i
lE
L
O0M - CN
'O
I
C
s0
- M M - CM
C OV- t
O
IO)
- v
CMC l T ,-)T M
:CVq
cN
)
I U)' CM
eM
0
DO O ) C .* . .0 .CV)
.
' iin
-
c ) OO
- M , N M
CMl
M CM CNl
_
q
CD WCOLO
0 c WT
'
-cor--UMr O
OCN
to)N f O Us
00)
0q C0) 0lCw) O
(0C O C 0D
0
- Cl CN
N T
CO CW1<- 1.- W0 W
O
,1
0r0
In 0
0
S0 a)
0- N N U)
C)
'
C) C
0 C 0D )
)
A,,
0E
i
0
.a
x FSm0
a,
2
m
C:0
V)
CV
) c
O CD
MC,
O~~t o)OO
0
Cw
!
z 0
a.
£e c
a,
I
C
co c
co _-') -
I1
C
ar
Al
4)
u)
N NI
0-v (N
-I-
) O
--
- 00
0
)
0) V
CO0W-' 0
0
CO
1n
10 U UU) (CN
( N
0
Cl (ON -
C)
. T) "T
U.
D
0
COCO
0
4)
o
I I'
a)
a
T)
0
0(
0
r-
0
.0
O(
C 0
C
's
Eu
.I
C
C
t
C
QQ
E0
a:3
w C
0 ca
I
0
c
o_
0)
r
cmt:
aIo rC
m
z
-
0
C
5) Cl
u 30
0E
O co
> C
03
0: o
0ot I
CD
C Ca :C O
a U) LL m
(N
o>
,O >
E C
o -
a)
co
)0 0e
(
21E0
0
t
o
)D
(oE
Co
o 0
Co Co
Cu<0
0
-
O
0 E
E
CM , Ln O - CO 0)O - CN
CV CVl)CO
) )
NN1CN NC N
co
o
._
m
I
!z
Q0
*L
L.
*
. D00
.0Q
L
Q .0.
Q D
L *
L
. Q.
n . Q . 00
L
L
EEE EEEEE E EEEE
D O
.9Z-
d
d
d
d
d
d
d
d
d
69
d
d
'i .
EEEEEEE
d
d i
d
d
.
L..
Wv m m w
V
0U00?0
9
L
d
.
0000000
o
aO
.00
0
ZCDco0a:
-M - 0 04
c
Co
oo
nOp
.
- C
D
C co
Oo8
S
_,
C .C
C) CoC
0Cc' C
- vV"-
I
0.
0
0
N0
v---w--
00
0
.
E
0
00
0
C~
m0.-
0 0
.0
E 0
L.
,m E
=
_-
- Gca0
O
O~
E
,O, m
N_ C)
I
8 rC
a0 C)CVS
C
0 aCL
I
_
-0
U)
o1o
V
C -=
II
0
co
4aa 0 0
C
C
- .r
0
0
-
Co-
QOL
d
*C .C . .
8
C
.
E E E E E EE
d
d
c i
d
d~~~~
cn;u-o a)
LC)
L
0
Qc)O
C
cv
)C
4t c1- c- c- - cc- 0o- T c .' 0I (0- ( r-
I
oo
c6
DS
CD
'
c 6
o6
C\
'
'LO 'T
u Ci oc
CD
- T_ I-
0) LONO
C w
,- I,
c t
Vc
0 c,
o
CN 0n cN a 0 0 O.
O , r o: .- -(
N
N
N
N
N
NC
V_ 'rl IV-, , - - ' I
Cl
CNVC
N
C~
-
O O LO
v-N- 0 CN
O- 0O 0 t r O w-(..
O00.
0,On 10)
0
V- -
Ns-
a) C. c
(N ra -
C
-
6V
)
O
CC)O
CO
CD
0O0
0 r sOO
r - CD0 co0_
, -0O O
-
C
Noo uo Ln
OMT CD
L
O
c
O N
ON
(-w---0 L
0) 0CCc cc O0 0o
oO Cw
t ac-O)OC
°
-
011tvvMMMM
N- C) o0 C 0)
O
D cI- °°
'-
.-
0 co 6
a
c r 0) U)
C)°
-
wl
'
o-
'
O .O O
1 O
-
t) CO
M0
0a
"0 I-
nL O
)
O -
-
°
o;
eo
c
o0
m.06 CU
00uCu
a °°o
> < 2"=~0 9 $ 3 w
o 0 C_
n~
-.
O
V
o~~o~~~cn .
n
I-
~W~--Q
0 =
CO) 0 CO0N
~3COc0
0
w
MMMMMM
3
o o
c CD
.C .
, *C *, *,
EE
EEEE
cr~
o
N
Ctt-
CD
CU Cuo0. -us
. co
._C
C
0 CD
a.
-
'
-
'
n
o 60
o
CuVu
0
< M
c )COu
En
z
mgCo
C Cu0*
.-
CD<
C F
C U
m
o a
CU`0 u
co
0)
Cu
Cu
C
0
L.
M0 M
~
M.
m C.)m C)Q
m C)
m m
m m 8
C) ._QoQO
._
._
._
._
._
._
.
0__
a Z;*;
ata
m m
.)
co
CuW
c C
t
N 'IT
0"I
CO
t CN
t 0t
t0 0 0- 0C"N)
._
a C'
0
Cu.-
w0 E
ma
L.
Cu
co
Cu'I
Cu
C
aI
Co
U)
y /) 0
Cu.YQ
Ca.E
0
0
__
2 o if
")t (O0 L
-u
.
<
<
<
<
<"
Cu
V O-
N
CuC
'n
E
Cu
(0)
:z
co
Cu
im O0o
:
ddddddcdd
70
.W >.
Cu
Cu
.0
> uQ
C QOC
~u=M 0 C)Cu
*-
'
CC cm
,
>,m n 131
> IDa.
I-
-. Y=CL
:3
0L 0
=
(a
(f
Cu
)
C C
Ca a l a a a
= ¢z
=
llJ W w w
E E
a,
m, F
ICu 0
O
-N CO 0CD
V
o(D C( C9
CO C0 CD (0
¢a
0c0 0 0 00 .00
._
t ) N - N- Lo C 0w -
t) nr) (r 0)
O(
) (0NL CL
(0100OO
co
co
0 _C0
T
C
N0t CO C rO O O 0C
O
100
O0 ) ' 00
()N
C C MO
O
0 I.
o cTO 0 1 ,- 0C-tnOOCO
c~ C 1 c'O
00 w') . I.O rDI. 0 O) O~ O~ CO CO
in o~ cQo00 0o
:3
1D
lJ
IIJ
¢D¢D
JU LIJUJ
O
LOv·
Cs
-
cs-C-s
M ·T
N
c
M
c
LO
L O Cn
cM
Cs Cs (
c
O n oo
i m C6 4
0 c coo~q
1- 'I- -t -olq-0
cs
T"
0-O - -0
Oco TD - TD
(D
-r
0
0
0
C o ccN 'T
ci CY (y
0
FI
N sO
0
a
OD
Nc- o
'tM LOO
aw - t s Irv-
0
CD
o s
I.-
'
w
CN N N-
N
0
N-
4 0 N NN (N
0
N N
(9
N
O o OM 0
0 I0
CO NO- vO
M - UN
MCD
0I O N
ONo00
04 UDCO
o-)
(D O--O OO O -00
C
(CCO C
O - 00o
- C--r-L dIto£t t Om
r
r
I
re rs
s
r-
s
0- 0r 0w aO
wc oo oo
ww
o o
0
o)
'
0 tO 'Ito f' , U
t
c
q
P- C CD m
°~ozo
)a
-
-
-
0 N
)
-
U) CD D
L
O
£
~~
-
N-O (- U,,C
c,
ci c,
O
- - O M M O co - "T 0 M " qT I- M M M f- , , " LO LO m
1T
0
N M M M V
LO CV
N
CO
0
V00dc
CD'cr
W
M M0
','.
*
I- M M V
N O C
M M M W o
v N dT N N
I
m C N m m m m m m m m m V- "I
d( m 'IT "gr I-T lqt 'IT m "T N
·,- -
UC
U.
.3
'CCU
c
*m
F
C^
E
C . C
C
M
0
.Z
.a=
0
oo co
*)
C
C Q C/3)
C-T)(
X
m)
0
oM
-j0
,
C
aCUI0
c
m-6 0EC
'023VE3
C~
0
Om >
-
o)
w
CU
.iX
CU
CU w
-
v
C
CCU
w 0
C
_
-
o
. 0
75jC CD
Cl).a
0
CU'F
*
'
U -crw
a
**
C
a0a000
0
o, ->
Co C
ECC
w .w
*9)*2 :
41 0 CD= co w P m <:C
L0
L
L
J LU00
WWWWWWWWWWWU
J
000
LU
UWWW
U
0 0
IW
UJ
Lw
0 Q Q 2
0 .0 . . 0..
WI I
71
W WJ
W
CO
M
MO)
(.O,,
CD
. r N .O O ',
O
,
O
,- -
v
-
O - 00
I'
0
co
C _
-Co
co
C
C
-a
CCo
C
-
uij
c
o
LIJ W
-
0
C .0
c E
0 2 o
*3-C=
C
'a
roZ*q
C
_
O
M
t- -) 0O c-N-N
ON
cuq
0 w 0w 0a)
o -Na
N-- N
N-N
-N
- 0o w
00w
wcw w w
wm
0 0 00 0 0
o
oj
0Y Ci -ACD
r- -Q
az
E
.Q0
0 F
NCU
.. Ci
,
Co
c
E
co
0
'Om
m 'IT 0 co r-
3u, E M:~
C
co
.
0
o) ) 0) Ml ) ) ) 0
C cu C C c c
a,
CcUnOC
EU
CU.C
7O
c
c
Ir
-
N 3n
-
v
0
--
Cu cu c
T
I-
c
.
m
D W
0
'-
c
T
c
._
._._V
._
._
V.__._.
CU
CU
Cn CU
CUW
uza CUCU
fio_
.ln
ux 'CZ:)
uxr .Io
u zOl
. CU
n axC)
'O 'P
'Z:2 .'C3
~ ~
____U_______U
CU
CUCU
a
uo 'C3
enoZ.cn .a
'C3:
a .E!-o 0
0 0
0 0
V D V V V (D
V V VC
V
__
V
aI oo c
LOuzj ur u ci
C LO 0C
o1
c
T-
cc
Ce-
Co
a) OD 0
col cOT_c
C C
0 a a.
, U:0
CO
T
t
M0
0
O
- - ' r -r
N,TN 0
( ·r ·-
C- C clV (
li
C
C
Ii cli 6
'w~-NWM
N C C
co
c
Cu
C ^rCu
C
.) co
, a. ._m
IC
n w
co cU
-
u
m
ct:
C) 0
0
O
.
- N
V-
r·
.co
co
-C
a
co
N CN
0
E V)
3:~
Z~
::
fu a f
CD
C
Co
-:
Cr) s
C-
a.
C
c
<coz
r-
O
.
-J
cm~
c Cu a0)
C
o
0CMu
f,
'o
,)
C:
Cu
0 CD
C
CAn
_; i 0
C OEo
a. .e- 0
0
u
0
C')
C2
I
co
Cu.a-0co.
- N
CY) C)
Cr)
(D(
L
Y
co
LLwwwwww
L LLIW
LUll
:.-
C
a0
N
>
0 Cu 0
O
I
T-
Cu
,.
C
CCCCCC
Cu
C
m
coz
- mC
)O~
M
)NNNNNNNNNN
0- - -NN CMo
TT- T-C- cTIr
- L"n
tN
I- CT
l CD
fN
I-00T) I
-
-c
.U)
CL
:_ C
i5
C -5 :CU i5 i5
C_
_ :
uc
CUCUCUCUCUVu cn
Z:3
-
a) C 0 CD
O Ci
Ncoi
cn
Cu
C
C
t- 00
r- c6 acd
co
cu C e 0e
rn
L.
Co 0
Cro
a
cCo
o ma - oa Y
0 Cu
'3
no
o
C
-Y
0c
CD
r
c
o Co
0 M~
Ž
CaK
O).C C E
0
, --)0-
-
C
N oo o
O O )D CO
CM CD
10NN MNNN"MN
CrM
CVC CD
MLC-N
CN)
._m
5- Cu -
-_u
c Z
°a)
N
-
- C·
C-
LO
00
N
i
- V-- - -
C.
co
T -- oL t - 0
0O
,r-V,V-
LO O U,) LO U) C
.n
CO
o u: C
C
c-co
T-O CY)NN)s C-C0 0 aNa- 00 CO
qr a0 t )O
COO
r- LO
o
·co
t LOm C C O <0 ( C s )c 0 s 0D s f
N'
a) Co
t -00
o
co
LO
Z3
a
m
-v 0v vv vv - 0 uvw
m
LLL
. U.
un wCn
W LWI UJ
.
I.
u0 QU u W U w
LL. IL L
I. U U. L
U L.
IL
LL
L
L U iL U. U.
72
Cufuuufu
L-
L.
_
M
fM
.
LEL
M
._
Highlighted cells in Table 4-6 illustrate whether the voyage is shorter between the
given foreign port and New York or Los Angeles. The highlighted 9 5 th percentile voyage
time represents a conservative lower bound for the amount of count time that will be
available if an attack is mounted from this port. Count times for non-stop voyages from
almost any port in the world to New York or Los Angeles can now be approximated by
interpolating between the tabulated values shown in Table 4-6.
The information above is useful for determining the minimum count time
available for a container shipment being deployed from a particular port or region of the
world. However, it cannot be used directly to give an accurate measure of the expected,
or average, count time that would be available on incoming containerships. This is
because containers are not uniformly imported to the U.S. from all parts of the globe. To
derive a reasonable estimate of how much count time will actually be available on
average, the voyage times from ports that ship more containers to the U.S. must be given
higher relative weightings. The information in Table 4-2 documenting the volume of
container imports broken down by country can be used to assign weighting factors. Since
the 25 countries listed in Table 4-2 make up 86.5% of the total containerized imports to
the United States, using voyage times from ports located in these countries alone should
yield a reasonable estimate. Using this approximation, weighting factors were then
calculated as follows,
nTEU
E
(6)
'nTEU
where Wi is the weighting factor for the ith country in Table 4-2 and nTEUiis the number
of imported containers from the ithcountry (in TEU). Distances from the countries listed
in Table 4-2 to the U.S. reference ports were obtained using information from the
distance analysis presented above. Each country of interest has at least one port listed in
Table 4-3. For countries with multiple ports listed in Table 4-3, the arithmetic mean of
the port distances from that country was used to establish a single representative distance.
73
Voyage times from the countries in Table 4-2 were then calculated using the mean vessel
speed of 21.29 knots (because an expected value was being sought). The appropriate
weighting factors were then applied to the voyage times for each country to find expected
count time values for ships calling on New York and Los Angeles. Results are shown in
Table 4-7.
Table 4-7: Mean voyage times to New York and Los Angeles
LosAngeles
NewYork
Imports Weighting
(TEUx 1000) Factor Avg. Distance(n.m.) Time [Mean](days) Avg.Distance(n.m.) Time [Mean](days)
China
4447
0.36997
11991
23.5
6057
11.9
23.4
6380
12.5
1292
0.10749
11981
HongKong
9.5
0.06007
11371
22.3
4839
Japan
722
Taiwan
651
0.05416
11774
23.0
6011
11.8
Italy
473
0.03935
4067
8.0
9643
18.9
Korea
469
0.03902
11771
23.0
5374
10.5
18.9
3654
7.2
9661
Germany
467
0.03885
Brazil
388
0.03228
4413
8.6
7366
14.4
Thailand
378
0.03145
13257
25.9
7775
15.2
Indonesia
261
0.02171
12042
23.6
8392
16.4
India
253
0.02105
11730
23.0
9758
19.1
Malaysia
239
0.01988
12160
23.8
8087
15.8
Netherlands
225
0.01872
3391
6.6
9402
18.4
6.2
9181
18.0
206
0.01714
3169
UnitedKingdom
France
195
0.01622
3211
6.3
9167
17.9
CostaRica
166
0.01381
3537
6.9
4243
8.3
Spain
158
0.01314
3314
6.5
9183
18.0
Belgium
156
0.01298
3358
6.6
9365
18.3
Guatemala
156
0.01298
1804
3.5
6546
12.8
Honduras
152
0.01265
1764
3.5
6535
12.8
12.8
0.01173
13543
26.5
6530
Philippines
141
Chile
135
0.01123
6073
11.9
5135
10.0
Turkey
114
0.00948
4997
9.8
10471
20.5
DominicanRepublic
98
0.00815
1489
2.9
6290
12.3
Australia
78
0.00649
11321
22.2
7271
14.2
Total
12020
1
WeightedAvg.
=
13.3
Country
The mean count times available for vessels calling on New York and Los Angeles are on
the order of 2 weeks. This represents a significant amount of time to make a confident
detection of fissile material. Finally, even though the average count times shown above
were calculated using mean vessel speeds, the assumption that all voyages are non-stop
still makes these numbers reasonably conservative.
74
4.3 Vessel Container Capacities
Modem containerships vary considerably in size, with the largest vessels in the
current fleet able to carry over 8,000 TEU [MacGregor, 2003]. The number of detection
units needed to provide adequate coverage of a given vessel will depend on the
dimensions of that particular vessel's container array and the number of commercial
containers being transported. Therefore, to gauge the number of containerized detections
units that will be necessary to implement a comprehensive ship-based detection regime, a
container capacity distribution must be derived for the commercial fleet.
Information from the containership database that was discussed in the vessel
speed section was used to construct a similar CDF for container capacity. The screened
database contained 1,313 capacity entries ranging from 724 TEU to 8,200 TEU. The
CDF development process used for vessel speed was employed again for container
capacity. The general formulae shown in Eqs. (3) and (4) were used, with the frequency
of each distinct container capacity serving as n in Eq. (3) and container capacity (in TEU)
being represented by x in Eq. (4). The resulting capacity CDF is shown in Figure 4-9,
with the 25t h, 50th , 75t h , 95t h , and
9 9 th
percentile values illustrated graphically.
75
Vessel Capactiy - Cumulative Distribution Function
(N = 1313 Vessels)
0.9
0.8
0.7
k
In
.o
0
0
U.
0.6
0.5
0.4
0.3
0.2
0.1
0
0
1000
2000
3000
4000
5000
Capacity(TEU)
6000
7000
8000
Figure 4-9: Vessel capacity CDF
The mean, median, and mode values of the container capacity from the screened
containership database are shown in Table 4-8 along with interpolated numerical values
of the
2 5th, 7 5 th, 9 5 th,
and
9 9 th
percentiles.
Table 4-8: Vessel capacity statistics
Capacity (TEU)
2722
3047
4300
MEDIAN
MEAN
MODE
25TH
75TH
95TH
99TH
1666
4173
6204
6782
76
9000
The container capacity CDF generated here will be used in subsequent analysis to
develop defensible estimates for the total number of containerized detection units that
will be needed for a fully implemented system.
4.4 Cargo Density
For a ship-based approach to be effective, the signal emitted by concealed fissile
material must be strong enough to be confidently distinguished from natural background
fluctuations by a passive detection unit some distance removed from the source. The
signal will be attenuated by intentional shielding that is likely to be present in the
container bearing the weapon and by the commercial cargo in containers that are oriented
between the source and detector. The maximum amount of intentional shielding is
constrained by the physical dimensions of the container and the 32-ton weight restriction
imposed by international shippers [Lok, 2004]. Although they still allow for a very
substantial amount of intentional shielding, the space and weight constraints do bound the
problem and worst-case signal attenuation can be calculated. What is less
straightforward is the extent to which the intervening commercial cargo will attenuate the
signal.
Density is a cargo parameter that is helpful when trying to accurately model
radiation transport through intervening commercial material. One way to obtain a rough
but useful measure of the density of imported cargo material is to assume that the
contents of a container (and the mass of the contents) are equally distributed throughout
the volume of the container. This "distributed density" (in g/cm3 ) can then be found
using the following expression,
m
(7)
Pdist =
VOlcontainer
where m is the total mass of the cargo,
VOlcontainer
is the interior volume of the container.
Although the homogeneous distribution of mass throughout the container is clearly
77
unphysical, it can be a helpful measure for benchmarking computer simulations. When
simulations are run where representative types of cargo (e.g. furniture, electronics,
clothing, etc.) have been explicitly modeled, it is important to know how the aggregate
distributed density of the modeled cargo compares with the average distributed density of
actual imported cargo (i.e. is the model more, less, or similarly attenuating as actual
cargo). A simple method for obtaining a point estimate of the average distributed density
of actual imported cargo is given by,
mtot
(8)
Pdist TEU
VOITEU
where mtotis the total tonnage of a large sample of imported containers, nTEUis the
number of imported containers, and VOlTEU
is the interior volume of a TEU. Using
imported cargo data for calendar year 2001 (the most recent year for which MARAD
reported total tonnage information) as the large container sample, mtot, nTEU, and VOITEU
are 80,725 metric tons (MT), 11,268 TEU, and 1360 ft2 respectively [MARAD, 2002].
Converting these values into appropriate units and plugging into Eq. (3) gives an average
distributed density of 0.1977 g/cm3 . However, a single point estimate of the average
distributed density is less instructive than a distribution that reflects the relative
probabilities of a range of distributed densities.
The 2001 data for container imports at the top 25 U.S. ports was used construct an
average distributed density CDF. Table 4-9 below shows mtot,nTEuand the calculated
average densities for the top 25 ports [MARAD, 2002].
78
Table 4-9: Average distributed density, Pdist,values for imported cargo
Port
n TEU
m tot
(TEU x 1000) (MT x 1000) Avg Density (glcc)
Los Angeles
2614
16221
0.1712
Long Beach
2376
14355
0.1667
New York
1588
12758
0.2217
Charleston
612
4890
0.2204
Seattle
500
2993
0.1652
Norfolk
454
3556
0.2161
Savannah
431
2998
0.1919
Oakland
419
3058
0.2014
Houston
381
3656
0.2647
Tacoma
356
2111
0.1636
Miami
347
3120
0.2481
Baltimore
178
1942
0.3010
PT Everglades
171
1235
0.1993
San Juan
108
1006
0.2570
Wilmington (DE)
103
965
0.2585
New Orleans
86
891
0.2858
Gulfport
74
599
0.2233
Philadelphia
71
913
0.3548
Boston
51
445
0.2407
Portland
47
350
0.2055
Wilmington (NC)
37
232
0.1730
Chester (PA)
31
316
0.2812
Ponce
30
332
0.3053
W Palm Beach
27
195
0.1993
Jacksonville
25
210
0.2318
All Other
153
1379
0.2487
Total
11268
80725
0.1977
By specifying mtot and nTEu for 26 separate sample populations (i.e. the top 25 ports and
the lumped data for all others) this data can be used to construct an approximate CDF.
The same CDF derivation procedure outlined earlier is used here with the tabulated
values of nTEuserving as the frequency of the given average distributed density value.
The resulting CDF is plotted in Figure 4-10.
79
Dist. Density - Cumulative Distribution Function
1
1
0.9
0.8
0.7
7 0.6
' I 0.5
U. 0.4
0.3
0.2
0.1
0
0.15
0.2
0.25
0.3
0.35
Dist. Density (g/cmA3)
Figure 4-10: Cargo distributed density, Pdist,CDF
Ideally the mass of every individual imported cargo container would be known so that an
exact CDF for Pdist could be derived.
In this case, however, the data points used to
construct the CDF were themselves already point estimates of larger data sets. Although
some useful information about the character of the original data is lost when a single
point estimate is used to represent a population of data, these point estimates encapsulate
the most important aggregated attributes of the original data. Therefore, even though it is
based on aggregated point estimates instead of exhaustive raw data, the approximate
average distributed density CDF is still a useful measure of the probability that the
distributed density of a cargo container will exceed a given value.
80
Chapter 5: Deployment Simulation
5.1 Introduction
The fact that the proposed ship-based approach would deploy containerized
detection units aboard commercial containerships has been discussed, but the manner in
which these units would be deployed (i.e. how they are loaded onto the ship and
distributed throughout the vessel's container array) has not been addressed. Ideally, the
detection units could be loaded in a manner that simultaneously allowed completely
clandestine deployment and maximum detection coverage with the minimum number of
units. If this could be accomplished, total system costs would be minimized and
adversaries would be kept utterly unaware of the number and location of deployed
detection units that could interrupt or thwart their efforts. In reality, however, there is a
trade-off between the precision with which one can dictate or predict the placement of the
detection units and the covert nature of the deployment process. Specifying exactly
where or how certain cargo containers are to be loaded into the container array can
optimize the amount of the containership covered per detection unit, but it could also
provide enemies with valuable information about the defensive measures being employed
against them. This fundamental trade-off leads to a potential clash between coverage
efficiency and stealth.
A computer-based deployment simulator was created using Matlab to help inform
the process of striking an appropriate balance between coverage efficiency and stealth.
This simulator was used to quantify the coverage efficiency gains that could be reaped by
adopting increasingly constrained (and consequently less stealthy) deployment strategies.
Three strategies were investigated, including a random deployment where units could be
placed anywhere in the container array, a partially constrained deployment where units
were randomly placed anywhere except a specified exclusion zone one container deep
around the surface of the array, and a fully constrained deployment where units could
only be placed along a row down the length of the array. Hereafter, these strategies are
referred to as random, constrained, and centerline deployment, respectively.
81
An extremely important remaining uncertainty (that is outside the scope of this
thesis) is the effective detection range of a deployed unit. The effective range is the
maximum distance at which a unit is expected to reliably detect the presence of fissile
material when deployed amongst commercial containers with realistic and representative
cargo. Once a reasonable estimate for the effective range is obtained, it is a
straightforward problem to determine the expected detection coverage provided by
centerline deployment. The relative ease of calculating centerline coverage stems from
the highly constrained nature of this deployment strategy, which uniquely determines the
spatial distribution of detection units for any given container array. The spatial
distributions arising from the other two strategies, however, are determined either totally
or partially by chance. Mean attributes, such as expected detection coverage, of systems
with this stochastic character are often difficult or impossible to derive analytically and
instead lend themselves to Monte Carlo analysis.
Monte Carlo techniques use random numbers to sample distributions for
parameters to be used in a calculation, or calculations, of interest. The calculation is then
carried out a large number of times with each iteration using different randomly sampled
parameter values. The large population of outputs from the calculation of interest can
then be statically analyzed to gain meaningful insights. The speed with which modem
digital computers can carry out large numbers of computations makes Monte Carlo
analysis a very powerful tool for solving complex problems.
Detection coverage calculations for container arrays of arbitrary sizes were
carried out using Monte Carlo methods for both random and constrained deployment.
Random numbers were used to sample the uniform distributions representing Cartesian
coordinates that determined the placement location of a given detection unit within the
container array. Once a given number of detection units with a specified detection range
were randomly distributed throughout a container array with known dimensions, the
detection coverage calculation could be carried out for this geometry. The output was
then logged and the entire detector placement and coverage calculation process was
82
carried out again until the output population was large enough to yield good statistics.
Expected values, along with corresponding standard deviations, for random and
constrained deployment could then be determined through statistical analysis.
5.2 Model Development
The deployment simulator was programmed in Matlab and takes advantage of the
ease with which the Matlab environment can create and manipulate n-dimensional
matrices. The entire container array of a hypothetical vessel is modeled in matrix space
with each cubic foot of actual volume represented by an individual element in a 3dimensional matrix. Detection units are then distributed through the container array in a
manner consistent with the constraints of the scenario (i.e. random, constrained, or
centerline) being studied. With the geometry of the problem now uniquely specified, the
fractional volume of the actual container array that would be effectively covered by the
detectors in the generated configuration can be calculated using a few simple matrix
operations in Matlab. If Monte Carlo analysis were being used, as would be the case for
random and constrained deployment, this process of detector placement and fractional
coverage calculation would be repeated many times.
5.2.1 Assumptions
Key assumptions will be identified, and explained before a detailed treatment of
the simulator's algorithm and mechanics is offered. First, it was assumed that all
container arrays were continuous rectangular prisms. This is an approximation given that
large vessels often have container arrays that taper below deck (to accommodate hull
dimensions) and some discontinuity created by the ship's superstructure. These effects
were not explicitly modeled because the degree of tapering and the location and
magnitude of superstructure discontinuities vary depending on the size and design of the
containership and cannot be meaningfully generalized.
83
Since the detection suite is not necessarily confined to the center of a
containerized unit, it was also assumed that detectors could be centered at any (nonconstrained) location in the container array and not limited solely to coordinates that
corresponded to the midpoints of containers. This assumption simplifies calculation but
was made primarily to conserve computation time. It was noted that this assumption
could lead to the non-physical situation of two or more detectors being randomly
assigned to the volume corresponding to a single container. The probability of any two
detectors being randomly assigned to the same (TEU) 0° container volume is represented
by the following expression,
p=
1 fnl(xyz-i) = (xyz-1)!
(xyz)(
i-
xyz
- ' (xyz
-
(9
n)!
where x, y, and z are the number of unconstrained TEUs arrayed in the respective x, y,
and z directions and n is the number of detectors being deployed. In general, the
probability of 2 detectors being assigned to the same container volume increases as n
increases and as the total number of TEUs (i.e. [xyz]) decreases. The effects of this
"double-assignment" will be examined in more detail in subsequent sections.
Another important assumption is that deployed units provide coverage of a
perfectly spherical volume with a radius determined by the effective detection range.
(Estimates for the effective detection range are being developed by Gallagher at MIT and
are still evolving as design decisions and improvements are made, so a series of range
values were assumed as part of a parameter study). This is an approximation of a realworld setting, where shielding effects manifested by the specific loading and cargo
characteristics of surrounding commercial containers and the threat container itself would
render the effective detection volume non-spherical. It is further assumed that fissile
material located anywhere within the idealized coverage sphere will be detected with
equal probability. In reality, a source close to the detector will be more easily detected
'0The probability that any two detectors will be assigned to the same 40' container can also be found using
Eq. (9) by substituting (xyz/2) for each (xyz) term.
84
than one at the outer edge of the sphere (along the same line of sight) as a result of
shielding by intervening materials and the inverse square nature of detector solid angles.
This assumption was deemed acceptable because the definition of the effective detection
range is the expected maximum distance at which a source can be confidently and
reliably detected with a given count time under realistic conditions. Also, by not
considering or crediting the enhanced ease of detection afforded by source proximity and
detection sphere overlap, the analysis gains a measure of conservatism.
5.2.2Input/Output
The Matlab-based deployment simulator accepted user-defined inputs for
container array dimensions (length, width, and height in TEUs), the number of detectors
to be distributed through the array, the effective detection range (in ft.) and the number of
runs to be completed for Monte Carlo analysis. Output for Monte Carlo calculations
were statistics (mean, median, standard deviation, minimum, and maximum values) that
described the set of fractional detection coverages calculated for each run, or iteration, of
the simulation. Output for the deterministic centerline analysis consisted of a fractional
detection coverage corresponding to the evaluated scenario.
5.2.3 Algorithm
The simulation of each deployment strategy (i.e. random, constrained, and
centerline) used the same algorithm to generate a virtual container array and then
calculate the fractional volume that was "covered" by deployed detectors. Differences in
random, constrained, and centerline deployment simulation were limited primarily to the
manner in which the detectors were placed into (or distributed through) the virtual array.
For clarity, the algorithm will be explained in its entirety using random deployment as an
example. Differences in the detector placement step for constrained and centerline
deployment will then be identified and discussed. The actual Matlab codes used to
simulate each type of deployment are found in Appendix B.
85
The simulation began by creating a matrix representation of the physical space to
be modeled by employing user inputs that defined the desired container array dimensions.
The inputs specify array dimensions in terms of how many (TEU) containers are to be
aligned along the length, width, and height of the array. Figure 5-1 shows the assumed
orientation of the containers along the 3 Cartesian axes.
20'
I'l
(height)
I
8'
I
Y
(width)
I"
z
0ength)
Figure 5-1: Container orientation for simulation
A 3-dimensional matrix was then constructed in which each cubic foot of physical space
in the user-specified container array was represented by a matrix element with an initial
value of 0. This "geometry matrix" had dimensions [(x*8),(y*8),(z*20)], where x, y, and
z were the user inputs for the number of containers along the respective height, width,
and length of the array and the scaler multipliers are the corresponding height, width, and
length dimensions of (TEU) containers in feet.
Detector placement was the next step in simulation. For random deployment,
Matlab's random number generator was used to assign arbitrary coordinates (referred to
here as dx, dy, and dz) to fix the center-point of an emplaced detector. Once dx, dy, and
dz had been identified, a new null matrix, referred to hereafter as the "detector matrix",
was created. The detector matrix was of the same dimensions as the geometry matrix and
the element at (dx,dy,dz) representing the emplaced detector was assigned a value of 1.
86
Next the coverage sphere associated with the emplaced detector was generated.
An approximated sphere can be created within a 3-dimensional matrix by serially
evaluating individual elements to determine the linear distance between the given
element and the emplaced detector using the following expression,
D= (i dx)2+(j -dy)2+(k -dz)2
(10)
where i,j, and k are the respective x, y, and z coordinates of the matrix element being
evaluated. If this distance is greater than the effective detection radius, R, then the
element under evaluation is outside the detection sphere and the value of that element
remains 0. If the distance is less than or equal to R, the element in question is within the
detection sphere and its value in the detector matrix is changed to 1. To save
computation time, only matrix elements inside a cube centered at (dx, dy, dz) with sides
measuring 2R were evaluated using Eq. (10). This cube bounding the detection sphere is
shown (2-dimensionally) in Figure 5-2.
2R
I
2R
(dx4yjdz)
2R
Figure 5-2: Cube bounding the detection sphere
Once the entire coverage sphere, represented by elements with a value of 1, had
been generated, an element-by-element comparison of the detector matrix and the
geometry matrix was performed using the logical OR operator, whose properties are
shown in Table 5-1.
87
Table 5-1: Properties of the OR operator
x (OR)Y
0
X
O
Y
0
0
1
1
1
0
1
1
1
1
The matrix resulting from this operation becomes the updated geometry matrix. The
process of detector placement is then repeated and a new detector matrix is created. The
new detector matrix is then compared to the updated geometry matrix, again using the
logical OR operator, and the result becomes the new geometry matrix. Each time the
geometry matrix is updated, the OR operation imprints it with another coverage sphere.
The OR operator is used in lieu of matrix addition to avoid overlapping coverage regions
being double counted in the final fractional coverage calculation.
The process of emplacing detectors, creating detector matrices, and updating the
geometry matrix continues until the user specified number of detectors has been
deployed. At this point, the geometry matrix holds the placement and coverage
information of every detector, in addition to information defining the overall dimensions
of the simulated container array. An element of the geometry matrix with a value of 1
represents physical space that is within the effective detection range of an emplaced
detector, and is therefore "covered". Matlab can then sum the values of all the elements
in the geometry matrix to find the volume covered by deployed detectors. The coverage
volume, represented by the summation of the geometry matrix, can then be divided by the
total number of elements in the geometry matrix, which represents the total volume of the
simulated container array, to find the fractional coverage volume. The fractional
coverage volume calculation is shown symbolically as follows,
V
Vtotal
88
(11)
where F is the fractional coverage volume, Vcovis the volume of the array that is
"covered" by deployed detectors, and Vtotalis the total volume of the array.
This entire process is repeated until the user-defined number of fractional
coverage volume outputs has been generated. At the end of each run, the calculated
fractional coverage value is added to an output vector. Once the vector has been fully
populated, Matlab performs statistical analysis on the output data and returns the mean,
median, standard deviation, minimum and maximum values for the fractional coverage.
Detector placement for constrained and centerline deployment is the only major
difference from the simulation process described above. Matlab's random number
generator is also used to determine coordinates for detector placement in constrained
deployment simulations. However, before a detector matrix is generated reflecting a
given placement location, the coordinates are checked to ensure that the detector is not
being placed in physical space that would be in a container that is along the surface of the
array (i.e. the first or last [TEU] container in any row, column, or span of the array). If
the prospective placement coordinates fall in this exclusion zone, then they are discarded
and new sets of random numbers are generated until coordinates are obtained that satisfy
the constraints. When coordinates are found that do not place the detector in the
exclusion zone, a detector matrix is generated and the element representing the placement
coordinates is given a value of 1. For deterministic centerline deployment calculations,
detector placement is determined by the user inputs concerning the geometry of the
container array and the number of detectors to be deployed.
5.2.4 Validation and Verification
During development, a 2-dimensional version of the each simulation code was
created to facilitate validation and debugging. Once the 2-dimensional models were
found to work as expected with high confidence, they were scaled up to the full 3-
dimensional simulations of interest. Prior to actual data collection, the output from 3dimensional test simulations, starting with small scale runs (i.e. modestly sized arrays
89
with a small number of deployed detectors) and concluding with a limited number of
larger scale runs, were extensively checked against hand calculations.
This validation and verification process also sought to ensure that reality was
being modeled with reasonable accuracy. One problem with representing physical space,
and especially spherical regions of space, with elements of 3-dimensional matrices is the
discretization error introduced by the non-continuous nature of matrix space. To provide
reasonably high fidelity models of coverage spheres, each matrix element represented 1
cubic foot. For reference, at this resolution, it takes 2720 matrix elements to model the
interior of one full sized 40' cargo container. To check the error introduced by
discretization, the calculated volume values for spheres generated in matrix space were
compared to the theoretical volume (in ft3 ) given by the following formula,
4
V = '-r
3
where r is the radius of the sphere (in ft). Table 5-2 shows the discretization error
observed for spheres of varying radii.
90
(12)
Table 5-2: Spherical volume error
Radius (ft)
45
Simulation (ftA3) Theoretical (ftA3)
381615
381703.5
Error (%)
0.0232
50
523305
523598.8
0.0561
55
60
65
696507
904089
1149651
696910
904778.7
1150346.5
0.0578
0.0762
0.0605
70
75
1436385
1767063
1436755
1767145.9
0.0258
0.0047
80
85
2143641
2571711
2144660.6
2572440.8
0.0475
0.0284
The errors tabulated above are quite small, so the volume underestimation caused by the
discrete nature of matrix space will not significantly impact the accuracy of the fractional
coverage values output by the simulations.
5.3 Random Deployment
A deployment methodology where containerized detection units are randomly
loaded onto containerships is vastly preferable in terms of both logistics and stealth. By
imposing no constraints on the placement of these units, there is no opportunity for an
adversary to identify their presence due to abnormal or preferential treatment during the
loading process. Therefore, the enemy is not afforded an opportunity to study and probe
the defense posture prior to attack or the opportunity to take compensatory action during
an attack. The logistics of random deployment are also favorable in that the detection
units can be simply delivered to the embarkation port or commercial shipper and then
monitored from afar without the need for further direct involvement.
Despite these important advantages, randomly placed detection units can lead to
highly inefficient container array geometries due to spatial clustering of units or
deployment on or near the fringes of the array. Due to the possibility of poor container
array geometries, additional units must be deployed to ensure that an adequate level of
detection coverage will be provided. Simulation was carried out in an attempt to better
quantify the effects of placement randomization on coverage efficiency (i.e. the fractional
coverage provided by a given number of detection units) and to estimate the number of
91
units that would be required for different levels of coverage for containerships of a given
size.
The simulation explained in Section 5.2.3 calls for the specification of container
array dimensions, effective detection range, number of deployed detectors, and number of
runs as inputs. Five standard container array geometries were selected for use throughout
this analysis to facilitate comparison between the deployment strategies. The dimensions
of these "reference arrays" are shown in Table 5-3.
Table 5-3: Reference array dimensions
Reference Array Dimensions
Capacity
Height (cont)
Width (cont)
Length (cont)
(TEU)
8
8
10
10
10
9
12
12
15
17
20
26
30
32
38
1440
2496
3600
4800
6460
Reference arrays shown above were selected to provide a representative sample of the
capacities and array geometries of the contemporary containership fleet.
Gallagher at MIT is currently investigating the effective detection range.
Preliminary analysis and modeling suggests that the range may be somewhere around 65
ft. Using this uncertain estimate as a point of departure, detection ranges spanning from
45 ft. to 85 ft. (in 5 ft. increments) were studied.
To determine the appropriate number of iterations to obtain high confidence
results with good statistics, a sample simulation was run using 1, 5, 10, 50, 100, 200, 500
and 1000 iterations. Results of the test, which used 15 detectors with 65 ft. ranges
randomly deployed within the 4800 TEU reference array, are shown in Table 5-4.
92
Table 5-4: Mean fractional coverage results for variable run sizes
Runs
Mean
Std Dev
1
0.7133
0
5
0.7308
0.0646
10
0.7750
0.0922
50
0.7577
0.0673
100
0.7522
0.0566
200
0.7523
0.0584
500
0.7566
0.0583
1000
0.7553
0.0587
Table 5-4 shows that the mean fractional coverage begins to converge at around 50
iterations and the standard deviation has been reduced to the extent practicable by the
100th run. These results are similar to those obtained for cases using different test
parameters. As a result, 200 was chosen to be the standard number of iterations used in
the simulation of each scenario. This number of runs was large enough to provide high
confidence results with good statistics, but small enough to make efficient use of limited
computational resources.
Simulations were carried out as follows. Starting with the smallest reference
array, the shortest effective detection range was held fixed and the number of deployed
units was varied until a distribution of outputs with mean fractional detection coverage
values having a nominal span of at least 0.75 to 0.95 was obtained. Then 5 ft. was added
to the effective detection range input and the process was carried out again. Once this
had been completed for each 5 ft. increment of effective detection range from 45 ft to 85
ft. the next reference array was selected and the entire process began anew. Inputs and
output statistics for each simulated scenario are shown in Table 5-5.
93
c0
0000000000
0000000000
C) 0
N
w?
x
0N4CO
CO
- NCCO
N
0
0u CO4
N
co 0)
O
OO
U
C0o
0)
LO
4..
NN
NN
N
0 CN 0
CN
aO 1-
d
O O
O
6
°
600
aO
O
0 "ItC')) ) CoN
hM t
O 0
0 0C) 0
COS
c C
000x ~0.0000
C
O OC
o
c0
c
2
0 t
oo oo
D 0
0
0f)
0006
00
CN
ot c
6O
00
O
00000000
Uf
0
( 000 '0 0 cO IO
0 O
00 00 0
D) CN C
O3 C
a) 0- d t C (0
CD - 00) CCO O
0co0co0co 00)
0) O I-0c 0 0 O -.
CO
U- h-0
0
000 000
O 0 , o, C;
00
1<
(0rO . 0) 00) 0) 0
r-4C'
11t CY co
C)
U)
0 5O
C0
CN
CO
04) CN
) (0 0) C0t
L
CO
v) ) vc
0 000
3E
m
0
Cu
c c c O O
N
.O. 00
6
-tI- - - -tN
)0(C'
00 r
C N No
04 04 04C04
C,)° LO(0COC
C0(
0 O CDO
O
D
co
O O C O O
ro o) N
c
_
-00a 0) Nr
) 0)a
0) - C C) ) D D
0 0 OCO C0 cr),-0
-- 00 0 0) co
> c
O
NNNCNNNNN
O o oo 0
00000000
. ,U)
L) ._
00000000
00000000
O o o 0)
o 0)o 040(a)CO
00
co
d
d0)0)3)d)0)
60666600
o CD
O
I c)
O 0)
O O)
O
d a)CO
Q
coo
a)sc)C0 0)()0 a)c"
O 0o )
IOO O ° O O ° CD O
V) C
00C O O
0.
0
o)- a
I- m
0)00)0)0)0)0)
6 6i
O
00000000
00000000
0 0 C0 04 C
- U)
i
0M M
00000000 ciciC;C5C=
C
C OU )
U)O
00 00 00 o6
0
0
S)
NV
NV
t
a)0
O<
CN 0 "i C
(0
cOC
- c -O
O)
O) OV O O ° O O
(0066C)0660r~
CO CO O
004 -
D 00C
O(: 0)0
(d 'Od
r9
E
=s
0) 'The0Jcv))C0)
O 0 C)
0
0
LO LO
O
O
(tDCVnO P-0
v - -C T
- -O
0
I
r-
.0
t
0
- M Lr) r_
04 O C) O
a
E
ct
LO O .O o
1J
0)
w
rj
"0
--
C
)
C tXT
L
00000000
00 00 0)0 0)
( u (0((0((0((0( 00000
C(000 0
O)I U)
IO
()U) O)
0
r (D
lY
Ig%
O
C
0
!A
0000000000
00000000
00000000
00000
N
NO
N NC
NN
0N N N N N N
N N (I C40C
CN CN CO
M~
O
Cq I
N4
C
I
4N
CNC
O O
0CN N
C0
0
a
E
a0
O
cU00
44
U u
C
0
00 U
!t
CD
CL
(D
0
S_
0a 0)
3
o)0)oa)m00)) 0) 0)0)0))0)0)00
0) 0) a) a)00))
0
0) 0)C 0) 0)
4.4
,>
m L_
aC-
0000000000 00000000 00000000 00000 O O
't Tt tt tt T'tV-I'
'
V 'l'T
- - IT
'T
%"
v
--
w--
,-
Kr
d
t
"g
110 1
I
%
94
t
l T
,
,c'
0000
00
0O 0O )0000
)0000
$
JiNCN N
CO CO
F)
0) 0)
66
,O0 0 )) 0O 0O 0O )) 0
0 00 00 00
1 NI 1 NICNi
CV
i
N
ro C)
o
X) a)
rO)
Doc0
0) o)
0)
bOO
,- U)CD O
0)CD O
-j D5O
- CD 0) 0)
0*
s --- dNN
s CO
0 L)
C
) 0 to 0 Lc
o
CO CO DO
00
0a) 0O0 (u3) 0Cm
COU)
CD
O OqO
0000
CD
,)
0
3
-'-000
OC
(NI)
F)0
CD
a Dt0 ) 0)
O6O
6 0 O
o
a.
C
i) CDO
c O
0)
CY) CD L
cO
CO
O;
6
0-
-00.0
CDI-
- 00
-
0C1 (NI
0 0N
CNNI
C') LO CN
'TCf)
- 0)
-C 00 o) 0)
O
(D CDN
F)n
0000L
C)
O a) CD CD
OO
C
- 0 0)
.,
CNICN
C) 0
-
a)
e)
0
5- cO
c O)c cO; F
.I
I- D
- .OD
"t
- CO0) 0) 0)
) 00
OO
F)0 0 0
CD -
6 c c
NI
- -
d C (N
0C5 0ci66O 0
IF
0N
0tD
V
-0
-CD
NI0) Nt CD
O)
UO (N LO
O-
N
J N C O0
N .
LO '. -
)
'- O O
c . . D 0' 0 0 0 0
O
c5 c5
0) n
,
CD CD o 00 C0
F)0 0 0
- cO'0
0
0
L
N
,o6660 5cC66
i
F)
0 C) 0) CD
) (N CD CY)
i C CO O 0
jO
:5
N
)t
O
D-00) 'toz a)0) wC0
0)
F) 0)
.
5o 0
m C) r 0
0 0)N
CO :° N 0 0)
r)
LO )a N L C
I- I
) CD CD
O0O
()
,O'
n LO O O
) a) )
0) 0) 0)
CO 00 -
CV
) ,0 0 0
) O O O O
CD 0) 0)
:r 0)
N- CY)
CDN--
O
0 ,V- CY
1<
C
)0t0
0000
o 0) O O
0 N- CD0
0 0 ) )00ac
cD0O
j
101
.
CO) v
00 "I
0
o 0-)0cCO
) 0) 0 ) 0t:O
I000oo 0C
tN
0
.
C .0 O IO .O I,
) C D 000
I- - Nl- -
N N- N- N_
CD CO CD CC
-
0(N 0N N0 CC
N N 04 CN C N N (NCN C
(
0) 0)
0) 0) 0) 0) C 0) 0) 0) 0)
'4
q' '
)
,c
·ct m~' m~' '
0 0 0 C 0000
-
m'
r'~
mr'
ml-
000,-
C
00
C
C
CD c
-
0
')
D
0) :)
0
CD
.
NCD C) 0)
CD 0)
T-
j66
C
C N0 0C 0
N C
. 1O ' I,
O OD CO O
00
C
N CN NI C
I
0 0 0 C
'4. - '4-I
t
v-
95
I- 0
' )
O.
O
60
)
05.
c5
0
n .O .O L
t
V
j
0
0
a- 00 0
O O O
O
000
I
NI 0)
-LO)CD0)I
) 0
N
M
n N-) NN00
CDC(N
)
C
) ) LO O C
D N- CD 0)
O
0 0 0
N t0 NCf
LO LO L
L)
O LO LO LO
CD CD C.D CO CC CD CD CD C CC CD C C CD
N CN
CNN NINC N C N tN C N N CNN
I
0'4t '40 0- c
t
CV)V" C0 - CD
N- CD 1 0
_N CN N CN N C'
0) 0) 0) C 0) ) 0
00 00 c 0000 c
ml ~
CO
-
-
-
CV CN CV N4 C
.%,
~
Ci CN NC
V"
,
CD CD CD CD CD
CD CO CD CD CA
(
N CN N
N C
v0 "t
r
C
c0) 0) 0) CD 0)
N N C
0) 0) ) 0) c
CN
C
N
x"-
D
CD
0)0)0)
0)
C
t
C
O
O
N
)0000 )) 0000
)0000
O O0 0
) 04 (N N N
a)
a)
m
n 0) N
) a0)
D 0)
a =; C; C;
C
(CJ CN N N
C4
-
) a 0 c00
') CD C1 It
!u
(D
CD 0)
1:0 *F
_
(0
0 0 t 0
a)
c-
-t
C 00
00,
Lo
o
0)
)'
:soO orC)
co
_D ) 0o
00
V)0
o
:81)
N - CV9
))OOCO
0V
V) 0
PO O
a O 0.
o01C)
000
C;
(<
LO 0o
0
a)
O
60
C
)M
' ON C)
OO CO
O o;
cO
1l- N t
0D c0 a) 0 a) 0
Il
000
rJ (NJ (NI (NI (N (J
L
0.
O , 1.) iO .0 IO o
(NI
ci 6 6 6 ci C
o
00
CO)(0
co0 0
10 CD 0N '0t (NI
1.0 -0
0
t
cV)o
CD
0
5 C
)n-
5
Cn CD LO -
0CY0a) c0oN0 0a)
: C
f ) "1-sLf
O
F)
f0
03d 10
)) 1.0
- LO 1.
I
It
LO Cf
6O
-
CV) f-
*r
C
I
D
5
5
L) 1- N CN
0
0 N- C) N- CD (<)
N-O q0CD
.0CD0)
1)
co
OD
00 0)
c0
C ) o 00 NI
0
V
CT Ot0, O Nq0 0O
l- C'CO0)
Cd O O
0 00 CD00
00)oo)
(66O OO
c;
P.-
- cD
Oa)0) O)
56
I O O
oo
0
D
O 0 0 a)
- r- 0) a)
-)
5 0)
.00
O a) CD N CY)CD :) '-
0) )0) )
J N CN Cl N N
1 C
0D C O)
0
)O
U
-
° O oO O3
C 0 CD N
)000000)00000
O)0 0 LO 0O
M M C)40)
CD 0 0) CY)- ) N 0 o
D T CD 0
O (N
D 0 LO COD (N
NX1
lNO (0 0)
1(O 1'
a)
t,
3. CO. tCO co
CD 1-
C) o'
o
° O O O
:1 ci6
0 0
) 0
C) 0
co 0' 0
C-
0 00QN
N
C C) C OD C)
CDLI:)O oCY)
:)0C
CO
O0
0N
Oa LO
CCC0
0C
.
C)
m
O 0)
: oOD
ooco
0
0
0
.5
c 0
D
00(OO
N
C)O CD O 0
)
)0 a) 0)
6.5,
- Co
(eN-.CD
0)
0 (0
C;
cI0
'0
) 0OJ(N0ONI(ION
00o
(N
-
t- cO) )0)
oooooo6
6 o o o0
D
0 C- O O O O
LO co
0 O-
N c
6
0 C0 1.) 1. ) N CoDC)
0
a) n~ N- co ) 0)
cdc
c
c
O w-
0
0 '- L C-J
O0N
)0000 Dn
In 10 LO n
W.
(C .0 0 CO co(0CO
C
C
o
Cs O CO C C( C O CO CO (
(N N N CN CN C(N N C C C
OC CO CO cD 00
C
t) 0)t a)t N( 0) ) a) )
N N N C
C
C(D
(O
I
- I-
C'
v*
C
(NJ N
tNC'
"o ( V V
VI
V
.0
-00000
N-
CO o0 CD0(0
. ,
N- - -
CO a
CY)
a) ) ) )
tt TNt TN
N N C C C
c
00l'r.
V-
CD D
.
D (
N
C0 00cD
1
C
N1
4
d
T
C
CN C
96
C
C(D
tO
N
1-
1
1-
-
T-
N
0 CC IO
o0 00 0 co
CO (
N N
C(N
00DCD 0
O0 CO c0
V-
c
CC
C
O
co
a( O
N NCN N N N C N N N C( N C'
T-
C
t
0
oC) 00
°- ° c N
C
NU1.fl10
0D
66006O
UO ) Lo IN- a)
( CO CO (D CO CD C
a) ) a) ) 0)
t
0) t-"
0
N C (I N CN
l CN
N
N
C
ODCOD 0 00
'-
0
00C 0 0 C
O iO LO LO .
CN CN CN CN C
CODcOD
V-
N co N t cO
N
L
N .)Ai, .-o- n oq1Ln
C Y) in
N- N- o-
NN CN C
N-
0
0 0 0:5
C (D CO CoDD CO C
(N C
0 (N'N
N
CN N N N NC C( NJ CN NC N N Cs
'-
C
cw~
N- N
C0
0
C
N (N CNN
N N NCN C
-
o
C
O
-C
CODc0 C
T
-
c
X) )V-I -
6
OC) CD
C)
00 CO CO cO o
C,
-
LO
C
0a
0c C)0C
0000 Q =;6 56
A~
- I0n
C n
O0vo.O
L0n Cc
)0) C D(00
NC
v
cO (0
co (0
O CC
O 0
D a1
CD(0
CD (0
QD(0
C D(0O(0 a
C (0
(0
0)a)a 0) 0)
C O
) ,
aT ) a) ) Ct
N CNN CN CN C
0t
C
N CN
CN
N C
CV)
0000
O U)O
N1 N
O O
CN 0N
CO 0)
(N Cl '1
w
011U.
0 LO
0 00 00 D
0 0 0 0 D0 0 0 0 0 :)0 0 0 0 0
D ) .O . O D0 0 0 0 0
CN
CN N
N 1 U U N
CO
NiN CI IN N
CN N N IN N
JI
N4
N N
C
o
1
-
Vt C) U)
L
LO0T
t0C\l
t 0)
s 0)
0 .01 0)CN4
1
0
a)
10
a) 0)
CO O, °, OO
s
00 0)
0) 0)
Q
0 o,
0 o
0
O 0QO
,0 a,
%i'-t a) Ce)CD C
) - 0) 't N
) 0 U 0 0)
D 0) 0 0 )
)
- N- Ce gJ 0)
O 1) "It N r*- Ce) :
o 0) CY) - 00 a)
00O() C)0) 0)
0 0 v0 0 0
O O
0
LO
t)
LO tLO
0) 10b10N(
CO-C
O
O
- O CD0)vo
06
OD °
co
co
14
C
M
Cf)
C)
T
N
C 0- 00
10 dtt 10
Y) N- 0) '-0C
0C11
4J to 0 0) co U tO
3)~1.0
) CO
0N OD
CO
0
")
U)N- - 0 0 I U)
d
0 0
5 ci C 6 ci
0 LO N
0
0
C CO C; 6
O I 00 0 0CC) 1T N
0 10
0 0 CNr-1- t 0) - cqt0
CO C)
) t CY)N ¢N o LOIt t CY)N
D0 0 0 O
0
0D C C0
O C
D 00
0 OO 0O OO
0)-
0 D C
N, N
'-
t
C) C) C) 0
D
tO 1O l- Cv) C)
co co r- 19t U
n (D c
Ycle coC T 10 N CO0 v) t
N U) 10 v- U)
C
0 0) 0)
CO 0F c-
0 000: O
0 C 0a C) C)
r, aO
t
'4T
O
0 - 0 0 0) 0j -
C 10 C) 1)
) CV
N 1O N
LO T c CD
0)
.
C;
.
0)
CO
U1
C)
CO
0 V OD3
D60000
N-
10 10 0)
CO
O
0)
6 Oo o o
C6
LO00)
N-t
Ct
o
O0) )
o66
19- 0 - U) 10 - it C)
C0
N 0)
0) 0) Vt co r) 10
1O
a) O - 0 0))
cD
O O
)) It
o oo
10
00000
) t l-tO
O- 00000
'N 0 )t1010
D L
O )O)
U)
L L L
O O U:
'IT1101t 0
0000
C) CO)Cf)
0000
000000
00010
V '
T,
0000C 0 0000
C 00000
OOOOC
,
OD (O CD OD C
cf) c)
C)
C
O 00000
Do 001 CD
0 u 0)101
C
Cv
VI'
CO
O
-
-
-
-
V
V-
C
c) C) C: cO C) C) C) C) C
00000
V
V-
V-
-
r,
C
C
0 ODO OCO D
0000CO C CC
C) CO C
'
I
Cf)
N N
-
.-
C
'
-
N
-
C
DO
C O
0
It
j
C
-
0
0) 0' ,rU) 0
It
5 C;
O
10
'
CC
cC oC;6
oo6cido
o
10 Vt
Cr
-
CN
t
0 CvM CN
N N U) - C O -
D 1O -
0 L O
,,-
C
00000
-
N N NCCs N
N N N N C
t- ~--~--~-VI
.
O O
N CO)C00
-v- C
0 O u O
C) c)
O °O °o
0)
0
06
O O O OO
O O
N CN CN N C(' N N N N NC Cs N
N-'--
0OO0 0Oc
-0
D C0 6
a)0
0 0 0 0 0
C
CV
vO
O
co
tN0 000
C
. C
cO - co CY)
0 CDN- 00
O O
CD1
C O00000
CV C Cv) C
) CO CV C
-¶-
1- 0
Cv)10
..
j666 0oo
CODO
- 0 o) 0
Nr-
0;
U
') IC
V cf
0 C)N
ND IT CY) I- 'Vt N)
O)
"'
CO
r- co a- ) 0)
a)~
r - 't
04 N 14 Iq 0
- 00 CD T- C)
C N
to 14 ) C) L l
V
C- 0 0 0) C Vt
10
C) 0) 0)
C C c
o)1 N
0 U)0(c
o
LD6
0Y 04
0O 0 0
0n
U)
L
O CO
o 00 C
DO
O
-N
0) 0) ) ) O
)
- 00 0 0
LO0C) 0) 0)
O) °I OV O O O
O
'-
c6 c
't 10
Cs C) C O
O (D 0
:D O 'N N
N
,-
: 000 0 0 0
CV dO
)0)N
nV)
N- CD 0) 0) '
N 10
t
:4 N- C0 r- 0) 0)
NC N N .N N
o0 0
I
co
DO
O
'-0)
R c5
OOOOOOC
0 CY
n I- O
L)
LN C
O
04
N- VI'
000000C
~ - - - Nl -l
000000C
C") C) C)
T
0
-
.,
C ) C)
000
I-
-
C)
V
-
"N
00
Cv C
C)
CO
O
CNN N NCN N C N N
I,
Ir
r
-
I-
T
00 00 00 0
0 0 0 0 0 C 00000C 0) 0 0 0 0 0 C 0 O
0 0 C
0 C
C 0O 00 00O
C O
O 0 00 0 C
0O
O 0 0 C
10 D D D C
0 1o CD oD
Ct DO (CD D D D cc D 0D 0 0QD0 0 C
00000C
C
Cv
C)
Cv C) Cv) C) Cv) C
CY) m CV C
97
C
CT C) C) C)CV) C) C, C
C
C
C
co c
C
000 D000O
14 NCN0N0
.-
cr) cr)
6oo
0 0
cOo
C; N
)I 0N 00C4 00CN4100
J C4 CN CI N C4 (N
0) 1- N CO
) Cr) T ,- 0)
rCO 0- co 0)
) Cr) r- a) a)
D 0. 0. 0. 0
)00000
)000000
)00000 00
)000000
I 04 04N N CNN0
N
0 0) 0)
Cr)0 0) 0)
o
CO N O-
',- CO C()
D
I-
(D c0 L0
U) I-
CD 't
-C000)
0000
_
00
-tC
00
0)0D0)
.J C N N N
)0000
JDOON
%4 U)
)
- o 0) 0) 0)
U) C)
N
)n C
D
LO
1.0 CO
O CO
) Y)
DO0) 0O 0O 00O
U')0 0)N
10 0 N N
NJ N N t -
00
CD
CO-L co0C)
(3)
a
ao )aa)
CO CO
CO U'
CO
4 co
o Lo
; C U) U. C14 r) CO1 0 t
n CO
C0o0
T0 U 0 C0
:f) 4)
) 1)
D
CO
d O O
1 N- '
CO CO
O0
0r-COIt0
d-COD
00
OLON',-
)J aa) CO 0N N
C
D
LO a)
-:
n
I
00co
) N 0 c CO r
C; CO
ci·
rCY)
I a C4
04
0 ) e) '6C;
C 0O
)
CO - 00 a)
j0000
C
i-
I°O-O
CO C)
a)
0o
N
000
q O
oo 5od
r) CO - - N
N "qt
CO r)) C) NCO CO cO
O - co aY)a)
N-
0 00
0
006
~T C4
IO
U) O
- IN-
00
C
cO CO
O0) 000
jCC6C
-
- "CtU
0)
0 C
r) - 1.0 NN C)
D N-CO
.)
O 6
U) - wi0oCuD
-
9-
CN O -
N CN C
C
C'
-.
.
Cr) Co) Cor)
00 -
-
co
:1
On O O C
o0
O
C
O
O
;
CO
Ln
0) N Nc
M
U')
OC
T
O00000Ca
10
C
C
0 C)
0C C
C
0 CO CO CO CO U
N NCN N N N0
Cr) nm
Cr) C) Cr C)
000000C
C N N N C'
IO C
V
-
.-
.%-,,.
T
I-
1
O O C
O
C
C O C
Cr) Cr C)
Cr
C
U:
I ~ v
'%- .w-~
-
-
I UO I
~
.%-
i
~
C
.N
i-
CO CO
N000000
N
m "Cr L O
0
.0
O O O
.- M60
o 0
000
N Cr)
Ni0 NO N N N
f
C
N
Cr) Cr) Cr) Cr) Cr) Cr C)
V-
.
'J
'l l
98
N
C)
4N N0 Ci
V)
C') Cr
'
O CO I
CO I.U UO
%-.
--
tt
.'J
'
I )O OUU
I
-
0
,"
N
I)0)CO I)N
a
t C
" o o oC
·
N
CY) t
0
U:
0o C
O CO CD OC(
N CI C4 CV C(
Cr) cr C r)
Y C
00 00C
OOO-
T
~
wwwwwwo
zLL
.0 CO CO O LC
0
0 0O CO
0cO0c C 000000C
0CO 000 co
00 000 00 000
'14. 'ItT '1J IT
:
C) LL
t
r- O CD CD
0
C; C
N- CO N
NV
04C~
I-
')
d o (D
°
It
0
NCa
L0 CO C) C
O
j660o
~c*
t
0) a
000000C ur *n u3 u
O u1 CO C)
w'
Cr) NV C
i~j
0000
.
° oo
.0
) N- CO
'~
r V%CO 0)
D N- o
.~ CO n
a; 'tco
a) 0 N4
C)
N NV .-
jcoa)
00
j666606
owo omo o
C
00
O 0 00
j6066
r..
0
0'ITO
C
0
t t
CO
aO N) N a) r U3
- Cr)
-M.M
, C C C
co,q o o
00 00C
,-
OOC 00 O
0O
O0 C
0
OOC
C CO
CO
C CO CO CO CO Q
C
C
t
.e)o 0) N
CN 'N CN CN C'
'
D
Cr)
000000
c; ;
C c c
CN
0000C
,-
D
V
C
-
C
-
a
0 000
C
00 C
C) C)
e Cr
-
0 0 CO
0
0O r) (o C
CO Cr) CO
CO aCr)
Cr)0) r) CO 0
0) 0
, - 0 a) a) D.I-56- 0oCOt0 0) a C0 c
oo~ 0)
d
o~~~'
I0I
o 0000
000O0 CO C
Co
-
NI Cr) C) O) CO
'C
)
CO
*O CO
D 0 0
CO -LO
)0 4 CO N CO
O0 0c
V-
O; O C O -- C
ddc5cdc
CO D
O
el "t
5o.00 d0 c..0
doo D
Cr) Cr) c'" C) C
OOC
5
N
U) -'-
,'
0 C
CO (O
D d
0t
00
D
r
CODUO N
V
I
O) LO Ci CO U
-
-
-
-
.
O o O 0 C
0o O 0 C
O CO O C CO ac0 00 CO
'e' " 'T 'T
0000000
0000000
In I
LO O
o00-
0
C LO
-)
c
C 0)
c 0)
S CO0c0 )0) 0
d
.
.
,,
.
0C0)
t0CYV)
v L L)
OCOD )
.
,J 6 0 0 0 0
O o 00 o o O
Co
0)
Co
C6;O60
0o
066
D( 0) LO0) -
O C
t'D Dto
c U- O C
CD LOo
C)
O
0 ,
0 LO 0o 1
O
O
IL:
oo oo C
. L . co. co. 0 . 00.
:)0
- 1.0
F)
0 0(0
0 Co
0D(0Co0
0- I'0
F)
C
0 )0 N
CO CD
0
00 D
O -
C
(O (OD
OD O O
rD
C
- -
O O
)n 0)
(NII1.
CI 'IT
t~ V
) tD
o co0
N- -'0) LO 0) 0) -
r)0
)0) 00
,C
" 0O
) at'0a 0O
aOa
O O° 6
0)0
O
T0 v- 0
F) - LO't
N
o. . .
o o o) o
LO0
O N N
0
?F)
0F)
,t
C5CROR0dI
OC0I
O 1
v- N- C
-
O
C:
0000
C
N- N-. N-
o)
o °
o
0
F) (0 (D u1
a0
N tN 10 LO
LO
C
O)
Ct
0)
0 0t ,
O 0
2 CV C10 C) (0 o (0 a
0 0)
0N co
c0 0 D0
O0 C
~Co
=;-56 )0)
600
7) U.cn
OOoc
-
00
N O OC L: 0 O O 0 C: 0 N- 0 O
9~ N C(N v-- N Cs
-9-
n LO o
000o0 o0 C
LO
)0 CO
0co0
O
N
S
C
10 0 10 10 u
-
-
10 110
-
9-
9r-
.
10
V-
Il,
LO 1010
-
-
LO 1U0 U LO L
000000C
9
00000C
0
cO
9,
9-
)
9r 91 -
9-
0aD-0OD.aD.0aD aD
0 aDC
9T 9
ao ao a
mt l ''t ,T 't '
le
)
9- .
U) C D s
n O
C
co CY)
9T 9
9rl
V) C)
9V*
9rl
r
9
.O 0O uLO10 10 ,
v
r·
v
v
0
O 00
D O O( 0
OV 1T L D
N ON C N N N N N CO 0
Co) C)
(I1.
C) (O
D tD
0 U)
N
C' N
O ~t O r
d O) N O
1.LO O I O LO
"' -'1
O0 O 0
00
LO LO
9-
nC) C
N t C) C)) O)t
00 0 0
0 O0 0 C 0 0 0 0 0 C
9
D-_ co co
(Ico 'ItN
NCo
coo co C9 0-N0
MI ) O
0 (0
C) N
C1
0
000OOC 00000C 0000C
9
F6660666
)0) N
o 0CD0D- 1.0'C00cO000
a Oz0C)
a
0 c(010
' c
0) t (C
co
ta:
LO 10 (t 10
r
N- o aC
O
ci CO
-(O
'-'tJ
N LO rO
CY)
N N
-
0U)- N
-It LO
U)
0) 0) 0)
X-- 0 1co (D O
-C IDtco0
0 0
F6o 0-6666
N N N N N N .C N 0 N C N Cs N N N N
C1 CV)() CV)C) C1 Cv ) cf) () COce) C C) C) V) m CV
-
CNiONI(NI ONC ONON
r00
0) C
6I- 00t
t- N 0) ) ON
'F)
ll
0
c c00
t C14
00 aa
(N 0)Co
0 I- co,0) 0)
) 0) 0) 0)
LO
j d C;C; D)0O 6
o
-O O
)J 0(I 0(I (N0 (N0 O
N
) -(0
) N C V- LO
31 ) s N 'CI- N-O*
C)
D0 N
C D N 10 InO'I
O
F)
10
o
LO
,
F)
V- CO 1.0 OD
I
O
O
°
O
O7
) V) (0 I- 00 0 LO
O D
5 U0 CD IN
O
() )
3D 066660
o 0O cVo
"
c O -C
d O 0 0 0 I 1.0
F)
~0C1o 0)V-
O1 O L
CNI (N
v-
0
C
JC
O 'IT
II)
stD
N0
,n- m.oC14
) ',C
- co
0 t ODc c) CD ) - 0)
r) tX
0 0 aC
oOOOOOC
CC
oo
NI
OI)1 0O
.0 (CO
F ) .- C)
000000 C)o0o
0666666
.OCOLO T
N
0000
)) 0N 0LO00.0 0 0N
N
mC O
'.0
I 010
' 94'
0 0 a) (J
0 QO a
a
O
- c000) C_
i0 I) 1)
l 'el
94
l mr'
COm0
0 O00 O CO
O Cm
m
O CO CO C C)
-
00000000
9-
-
-
-
-
- - -
99
9-
-
9-
-
N - V-
-
-
0000000
(0(0
0
C 0 0 0 0 0 C0
r4- (0(0(0(
0 00 00 00 C 0O 00 00 0O CO
4 94."IT4q.
0O 0O cO O0 O0 C
94. 94 94 9-
99
9
C
Co o Co Co c
(.0
IT-94.94-94
(0(00(0((0(
00O0
)000000
)000000 )) 00 00 00 00 00
0) 00
OD
1. T (D (0 t
S)
0) (.0 NI O
) 4, 0
Lf - co
1.
CN
4 04 C CV
0 0
0) a)
it)
CD
0(0 CD
0o
(
(N
0 0) 0 ) C0)
0) ,-
C iV ·
N (D C) Cf) 0
(3) C14
o CD C
.0 r-O CC0o( )
j66
000
co LO 3- T 0r (D N 'r- 'IT
'el-
4l 0C CN (N
3)
0
N) O
4.
CD U)
00 04
(TN
LO
(0to
*T-
0
j666oo
0 0) 0) 0) 0)
s
0 :' d in
3NI0D lc- C
O C-
cc C
1. Cl 10
·00
'.0d
O
(0
LO
0r ) )
0W 0 0 0
U,
0
0) C
0;
a O°OO OOO
00(% 0OO 0 0 0 0
l) l" i) 0D 0O
O-
C
WU:.
C 0 0 00
OC
CV) f
c)
O C
If
.
Nl- 1"
OC
CD
0000000
I
1.
I'l
0)
0
0
)
:r 00
Co0
0)
:) t1 "
3)
(0
: CO
0O N N
D
O -0 O0
O (0
N 1- 0cN
(0
N 0)
DDC
'- V-i"NIco tl co c 0 C)
r) 1)
56 ci 6 c
O C5
O O O
O Cc
d
gI1
CD(NI0N 00
a
C) 1.0
D
,It
0
6066 (006,
cVo~c
0
co
00000
N C)
CD -
LO
it U 0
)
U) it) i
LO L
0 0 OC o 00O00(0
oC
00co 00
C) (C) C) c'e C) cV ce) e
N%-
-
0CO (O00000
(0 CD C
.
V
0 0 C
r
v
'
aOOOOOC
OOOOOC
0DrD
0 rD
0 rD
0 40
C co oco O o C
((0 (O
( (O
0 (O
(0 (O
0, (0
(D CL
c Co (0coC C (D C
0*
CW) C
,
-
V
0O
d
l C(N
0) N- o ':t
0 'T O ItO Cl) (O
-0 N N OD N (o
0 0r- L 0CN
"T U
-
0 0 00
COC
0c0 c
C C)
Cr m
NVI --
100
C
Cl C
~0000
o o o
· C)
0.)
D
C) UN
- 0 0) O
00
(0
-
-- I,- I
co CD (0 CD (
6O
C
) i. O i. 0
0 O -N 0 C)
N Cl)
M
- N,-
CO 0
0c
C C C)
LO 1.
0i LO
) .0
- - - -
0 0co
C C) CC C
CC cO CO
cO
:
OOOOOC
00000
roe o
I-
'-
r
v
~
~
r
v
r
I
%,
O 0 0 0 0 C 0 0 0 0 C 00000C
(D C( (0 CO (D C
CO C(DC (D (D
D
0 m6o_)0CD
C cr,
Ir-V- -
j066o
-t 0D 0 - C) 1. 0) CN
00~.0)
C 0 ":2 0) 0o C O
Ccr C wo (N T- - - C(D · C
0 C n I- oo co o
,0)
0 W0 0 0 O O
O C
.0 i Di CD) CO
.. 0
0000
N- N-- - Nl-
00w CC
- - - - - r N- - - -
V- V-
CY)
CD DCD O
00000
I
m
CD
O
co
0) 0)
0C0 0 CO0 n-(co
0 0 0 0 0
0o t O
O O 000
N C)
L CO
C; C
i
j 0 0 0 0
O O O O °
:C) 0C N-- INCl co
- N O0 CO
N C)
CC
(D0'T "- o o o co o'
C, N 00
0 0t
T0
N 1. C
N- N- c0 CD
-O - co
CO0O
:O O5 O c
C5
j60
oN
.
0)
(D
O
- , CD .CO c 0n CU) O)
- N 0) C (CD
N- c0 c0 0) 0) = C
IN
60 a
ON-(0
O 0ic C=
aO 6oO O
0
0 0 0
. 0 0 00
C) U) r- 0
- co(
W0 :)DC
c cc
r)L
(0
CO I- 0'
C
ot 0Co
ao
000<
~a0o 0 0 a)00 0
) 0 .
1)
*c
D N c
00, 000 CO O 0
- -
CD -0
00000
D c c)
~O
.0 - O O v- 04
N 1. 'D 0 0 Cl r-
) C) C) C C) C: C)
-
-
0c 0c
l_
!,
V 0 (N 0 0 0 0 0CO
O 00C 0W
OCr 00
r 0*
CO
Cr
I 0 CY) C,
(N
D0 0 0 0 0 c0 '666oo
c:2c5
C)
o
t C Ct Ct 1< U '.4 Cl, Ml (0 'ITI'l
T00 LOC)
11 F N - N 0 00
- CY)r- U) 00
o C) ':) 0 CY)ND o rl- r- cc cc
0 0 ) 6 0O0000cc 0 Ot 0 00 00 O0
( C
0
jd
O O
O
0 I0 0 0 0 0 ) 0 0 0 0
I)0 0 0 C o )J 0N0 0 0ClN(N
:.J CN C N 0N N 'J 0N 2N N °
N CN ,J N N CNlN N
(C C(D o
C0 C(DC
N- N- N-NN
'fl-
-
00000
CD CO (D (0
(0(0(0(0(
CD
00000
NNCNCNN
CN
O0
O
Co
Cn
O
C) CN
v-
:°o o o
o
)
C)
0 !6 c
O'
0o
O
O a'~O'
~0
OD
o
cO
co
co
0
Lu
N
O
1.
LO C
N2 N N N N
C
N-CC)
CD
- Co
C) cn
tD co
C 0O
)t
0 0 0 M0
o C
2 Co 0
oO
C
a
Ico
N- N- CO y)
C)
Co
a)
0
- Co
0 0 C 0
r · Cs- s-
o°oL
0O 0D
000't0 N
04
o
Co
C)O
0*0*0
't
6
-
N N
o) Lo o
°
: D)O
DL
C)
60
oT, C
OC
C
00
C) C0
iO
C-) C
OC n O
0 J0 I
V C)
0 It
t
D N-.DCo
C) r-a
C) D~
,'
0
N CO
O
CO C) CODc
O
0)c
NcoC)C)C)
) - '- COCV)Co 1 l- C
D) CNO
v CO 1- O 'T " r._
0) CD C) 0) C) Co
C - Co co C) a)
0 0d 0 0
D
c)
) 'T O CO )
' I cON) 0)
.
5
C5o c o
CNIO O CO O .
,,-v
CY)
o0
C
C0
O U) O
r-
)O
CNC')
0 0 Co
O
LO LO O) LO) IO
Nl- 0O O Co co cO CO O3 00 00
c0 CO
00
C
00 o0
r
I,
v-
0 C 00000C
T
N-
N- - - - -
c
00000C
I--
-
- r-- rT-
-- ,
IV
CO CO Co Co Co C CO CO CO CO C
cc Co to Ct Co Co Ct
CO c4
D ~D
Co Co
C
cO CD CD CD CD
rt
~ Co
CD ~
101
To distill the information captured in Table 5-5 for easier inspection and analysis, Figures
5-2 through 5-6 show plots that relate the mean values of fractional coverage volume, as
defined in Eq. (1 1), to the number of deployed detectors for each reference array.
Coverage vs. Detectors (1440 TEU)
0.9
-0
E
*R 45
* R 50
R 55
v R.60
X R_65
.o
* R70
+R 75
- R80
- R_85
0U0.7
E
0.6
0.5
0
5
10
15
20
25
30
35
Numberof RandomlyDeployedDetectors
Figure 5-3: Coverage vs. Detectors plot for the 1440 TEU array [Random]
102
40
Coverage vs. Detectors (2496 TEU)
0.9
0
.s
* R_45
& 0.8
R50
R_55
R_60
XR65
R_70
+ R_75
-R_80
- R.85
R85
-R
0
o
00.7
0
0.6
0.5
0
10
20
30
40
Numberof RandomlyDeployedDetectors
60
50
Figure 5-4: Coverage vs. Detectors plot for the 2496 TEU array [Random]
Coverage vs. Detectors (3600 TEU)
+w
. UI~..-_
1
+ ~
0.9
~~
0·
·-- ·
x
·.
B
·
:·: i·~
a~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~::'j
0
E
g 0.8
-x~~~~~~~-
0)
133
0
o
p ; a~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.'st,
'''I'
oE 0.7
-·.-- ~rw
X :'.'r*n~,~: a..
- .......
' ' r' "...
' ..---:..
!
!.,v - ir x' .. - >-:o.Yb
e 0.6
;7
+
f
.._
·e
:··
··;
·
·
'·
-
.r·
:.
;·:
·..::C
:':''r""'ii;·· Til.·:'
-ta"" t··l·-·
·
r
-·2···i···
I'··:·· _l"i'r·r-rJr.l·
·:.*·' 7;;i
i·r
''""
,
:II
·
:
h·;;·; '''
;.·
,1-. .'··;··
'·
;'-'·"":
Lj·:':)`··
i; i·;· .I
s·
0.4
0
10
20
I
":i?·
0.5
·
,,f"VI·"ir·
· ;··-.
40
30
50
Numberof RandomlyDeployedDetectors
60
1:
i·l
· h'.
70
Figure 5-5: Coverage vs. Detectors plot for the 3600 TEU array [Random]
103
80
*R_45
*R.50
R_55
I R_60
XR_65
*R_70
+R_75
- R_80
- R 85
Coverage vs. Detectors (4800 TEU)
0.9
0
E
*R_45
R_50
R_55
o
'
R_60
x R65
* R70
+R_75
& 0.7
U.
-R80
- R 85
0.6
0.5
0
10
20
30
50
40
60
70
80
100
90
Numberof RandomlyDeployedDetectors
.4,~~~~
Figure 5-6: Coverage vs. Detectors plot for the 4800 TEU array [Random]
Coverage vs. Detectors (6460 TEU)
-
0.9
-+
:C
x
· ;,
+ ~~
U;·I·
,·.
e 0.8
CD
E
0
x*
t*
.·;
·-
* R-45
*R-50
R-55
, R 60
x R-65
*R-70
+ R-75
~~+:
0.7
0)
00
0
1
E.o_
U.
c
-R80
1·
0.6
0
- R85
.:"
·(·
II.
i
i
sc
·
0.5
·
·
· :·-.·.
··
·
.·::
·
`
,.·
·
;
·
·
·'::'
·- .
... a ,~.?¥,
Number~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~;
Deployed:Deetr
of~.Randoml
/.i i ~,
0.4
0
20
40
80
60
Number of Randomly Deployed Detectors
100
120
Figure 5-7: Coverage vs. Detectors plot for the 6460 TEU array [Random]
104
140
It is unclear what minimum acceptable level of detection coverage is appropriate,
given the reality that it will not always be possible to provide 100% coverage of every
containership and that attempting to do so will likely prove to be cost prohibitive.
Acknowledging this uncertainty, all subsequent analysis will measure the system against
three potential choices for minimum acceptable coverage. These three levels are 75%,
85%, and 95%.
To identify the number of detectors with a given range that are required to
provide 75%, 85%, and 95% coverage for each of the 5 reference arrays, the mean
fractional coverages for each simulated scenario were plotted and graphical techniques
were employed. Figure 5-7 shows an example using the 1440 TEU reference array and
detectors with a 65 ft. effective range (error bars represent +/- 1 standard deviation).
1440 TEU (Range = 65 ft)
I
0.8
cm
0.6
o
0.4
0.2
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Detectors
Figure 5-8: Graphical determination of detectors required for various coverage levels
For the example case illustrated in Figure 5-7, it was estimated that 75%, 85%, and 95%
fractional detection coverage could be provided with 6, 8, and 14 detectors, respectively.
105
Results of these graphical analyses showing the estimated number of detectors needed to
provide various levels of coverage for each scenario are listed in Table 5-6.
Table 5-6: Estimated number of detectors needed for various scenarios [Random]
Reference Array Capacity (TEU)
Random Deployment
Coverage
(ft)
Range (ft) Range
Coverage
45
50
55
60
65
70
75
80
85
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
1440
2496
3600
4800
6460
13
19
32
11
15
25
9
12
19
7
10
15
6
8
14
5
7
11
5
6
10
4
6
9
4
5
8
21
31
50
17
23
39
13
19
30
11
15
25
9
12
21
8
11
18
7
9
15
6
8
14
5
8
12
30
40
69
22
31
53
18
25
41
15
20
34
12
17
27
10
14
23
9
12
19
8
10
17
7
9
15
37
52
88
29
40
69
23
31
53
18
26
43
15
20
34
13
18
29
11
15
24
9
13
21
8
11
19
59
68
117
37
52
88
30
41
70
24
33
55
20
27
45
16
22
38
14
18
31
12
17
29
10
15
25
One clear trend observed in the Figures above (particularly 5-2 through 5-6) are
the diminishing returns in coverage afforded by the deployment of each additional
detector, especially in the high coverage region (i.e. above around 0.80). It takes the
addition of considerably more detectors to get from 85% to 95% coverage than it took to
get from 75% to 85%. Using the scenario where detectors with a 65 ft. range were
deployed in the 6460 TEU reference array as an example, it took 7 additional detectors to
go from 75% to 85% coverage and 18 additional detectors to go from 85% to 95%.
106
The primary cause of this phenomenon is the fact that random deployment does
not promise uniform distribution of detectors throughout a container array. As a result,
randomized placement will unavoidably give rise to some well-covered regions with
significant coverage overlap and some sparsely covered regions with little to no detection
coverage. Detectors cannot be preferentially deployed to uncovered or inadequately
covered areas. Therefore, to enhance the fractional coverage area with additional
detectors, one must rely on the capricious nature of random placement to fortuitously
deploy added units to sparsely covered regions. Inefficiencies associated with this
process lead to the diminishing marginal returns observed in the simulation results. The
extent to which random deployment is less efficient than optimal centerline deployment
will be discussed in a later section.
Although the mechanism discussed above is the primary determinant, there is
another factor at work in the deployment simulation that artificially magnifies the
diminishing returns effect. Given that the simulation used for this analysis assumed that
the center point of detectors could be placed at any point in space within the container
array, there is a non-negligible probability, given by Eq. (9), that 2 detectors could be
randomly assigned to the space that corresponds to a single container. The probability of
this "double assignment" increases as the number of deployed detectors increases. Since
double assignment is an inefficient distribution of detectors, it could make a small
contribution to the diminishing returns effect. Table 5-7 shows the probability that any 2
detectors will be randomly assigned to the same 20' and 40' container volumes for a
sampling of simulated scenarios.
107
Table 5-7: Double assignment probabilities for 20' and 40' containers [Random]
Capacity
Detectors
Double Assign.
Double Assign.
Capacity
Detectors
Double Assign.
Double Assign.
1440
1440
1440
1440
1440
1440
1440
1440
2496
2496
2496
2496
2496
2496
2496
2496
2496
2496
3600
3600
3600
3600
3600
3600
3600
3
5
10
15
20
25
30
35
3
5
10
15
20
25
30
39
47
52
3
5
10
20
30
40
50
0.002
0.007
0.031
0.071
0.124
0.189
0.262
0.341
0.001
0.004
0.018
0.041
0.074
0.114
0.161
0.258
0.353
0.414
0.001
0.003
0.012
0.052
0.114
0.195
0.290
0.004
0.014
0.061
0.137
0.234
0.344
0.458
0.568
0.002
0.008
0.036
0.081
0.142
0.215
0.296
0.451
0.584
0.660
0.002
0.006
0.025
0.101
0.216
0.354
0.497
3600
3600
4800
4800
4800
4800
4800
4800
4800
4800
4800
4800
6460
6460
6460
6460
6460
6460
6460
6460
6460
6460
6460
6460
6460
60
70
5
10
20
30
40
50
60
70
80
90
5
10
20
30
40
50
60
70
80
90
100
110
120
0.390
0.491
0.002
0.009
0.039
0.087
0.150
0.226
0.310
0.397
0.484
0.568
0.002
0.007
0.029
0.065
0.114
0.173
0.240
0.313
0.388
0.464
0.537
0.607
0.671
0.630
0.743
0.004
0.019
0.076
0.166
0.279
0.402
0.525
0.638
0.736
0.816
0.003
0.014
0.057
0.126
0.215
0.317
0.424
0.529
0.627
0.714
0.787
0.847
0.893
Table 5-7 shows the probability that any two detectors will be assigned to a single
container becomes quite large as the number of deployed detectors gets large and in some
extreme cases, double assignment is almost assured. Since this inefficient double
assignment is non-physical, the fractional detection coverage output by the simulation
will be marginally underestimated and the diminishing returns effect will be slightly
exaggerated.
Another notable feature of the results captured in Table 5-6 is the strong relation
between the number of detectors needed to provide a given fractional coverage level and
the effective detection range of the deployed units. This dependence is illustrated in
Figures 5-8 through 5-12 where the estimated number of detectors required for 75%,
85%, and 95% coverage are plotted against detection range for each of the 5 reference
arrays.
108
Detectors vs Range (1440 TEU)
100
0
0
0
Q
* Cov 0.75
* Cov 0.85
10
Cov_0.95
1
40
50
60
70
90
80
Range (ft)
Figure 5-9: Required Detectors vs. Range for the 1440 TEU array [Random]
Detectors vs. Range (2496 TEU)
*.'.'
100
-
I; (.Cov
.ek 0.75
U
..
10- ..
....
;,-,
0
40
50
60
70
80
..
..
Cov
0.85
I
Coy_0.95
90
Range (ft)
Figure 5-10: Required Detectors vs. Range for the 2496 TEU array [Random]
109
Detectors vs. Range (3600 TEU)
100
0
E
.o
* Cov 0.75
* Cov 0.85
10
0
Cov_0.95
03
4-I
1
40
50
60
70
90
80
Range (ft)
Figure 5-11: Required Detectors vs. Range for the 3600 TEU array [Random]
Detectors vs. Range (4800 TEU)
100
I * Cov 0.75
mr
10
,
*Cov
0.85
Cov_0.95
1
'I
40
'
50
I
60
I
70
80
90
Range (ft)
Figure 5-12: Required Detectors vs. Range for the 4800 TEU array [Random]
110
Detectors vs. Range (6460 TEU)
1000
p
100
a
10
* Cov 0.75
* Cov 0.85
Cov_0.95
1
40
50
60
70
80
90
Range (ff)
Figure 5-13: Required Detectors vs. Range for the 6460 TEU array [Random]
The pronounced "range effect" illustrated in Figures 5-8 through 5-12 can be
explained by the relation between the effective detection range and the volume of
coverage provided by a detection unit. Equation (12) shows that the volume of the
idealized detection sphere increases as the cube of the effective detection radius.
Therefore, the volume of a detection sphere created by a detector with an 85 ft. radius is
6.74 times greater than that of a detector with a 45 ft. radius. By covering a significantly
larger detection volume per unit, fewer long-range detectors are needed, on average, to
provide a given fractional coverage.
Finally, although the 6460 TEU reference array represents a larger container
capacity than the 95 th percentile vessel in the current fleet, it is likely that the trend to
build and deploy larger and larger containerships will continue in the coming years until
capacities exceed 10000 TEU [Ircha, 2002]. Figures 5-13 through 5-17 plot the number
of detectors needed for given coverage levels versus vessel capacity for a representative
sampling of ranges.
111
Detectors vs. Capacity (Range = 45 ft)
,
,
140
120
100
,
* Cov 0.75
80
· Coy 0.85
* Cov_0.85
60
Cov_0.95
40
20
0
0
2000
4000
6000
8000
Capacity (TEU)
Figure 5-14: Required Detectors (with 45 ft. range) vs. Array Capacity [Random]
-
Detectors vs. Capacity (Range = 55 ft)
80
70
60
50
.
-. . ...
.
4
....
...
.
; i ;RtJI
Cov
40
2010
- ;
-
830
u
O
Cov_0.85
C _0.95
I
.. ..
.r
:
. .
. . .
..
0.75
.
-
0
2000
4000
6000
8000
0
2000
4000
6000
8000
Capacity (TEU)
Figure 5-15: Required Detectors (with 55 ft. range) vs. Array Capacity [Random]
112
Detectors vs. Capacity (Range = 65 ft)
mA
50
45
40
35
E 30
* Cov 0.75
O 25
aCov 0.85
* Cov_0.85
a 20
Cov_0.95
15
10
5
Nv
2000
O
4000
6000
8000
Capacity (TEU)
Figure 5-16: Required Detectors (with 65 ft. range) vs. Array Capacity [Random]
Detectors vs. Capacity (Range = 75 ft)
35 -
E
15
20
-0000
":
2
"'
:
(T)Cov
|
*Cov 0.75
·
0.85
Cov 0.95
5
0
0
2000
4000
6000
8000
Capacity (TEU)
Figure 5-17: Required Detectors (with 75 ft. range) vs. Array Capacity [Random]
113
Detectors vs. Capacity (Range = 85 ft)
30
25
20
0
U
* Cov 0.75
* Cov 0.85
15
Cov_0.95
a lO
0
0
2000
4000
6000
8000
Capacity (TEU)
Figure 5-18: Required Detectors (with 85 ft. range) vs. Array Capacity [Random]
Figures 5-13 through 5-17 show relationships between the number of required
detectors and vessel container capacities that are linear to a very good approximation.
This linearity could be used in the future to estimate the number of detectors needed to
provide coverage of proposed vessels with capacities exceeding those of containerships
in the fleet today.
5.4 Constrained Deployment
Deviation from random deployment could challenge and potentially comprise the
desired surreptitious nature of the ship-based approach and invite serious logistical
difficulties. However, given the coverage inefficiencies that are an unavoidable
consequence of completely random deployment, the constrained deployment strategy was
investigated to determine the efficiency gains that could be reaped by imposing minimum
loading constraints. In an effort to limit the undesirable and inefficient situation in which
detectors are placed close to the edge or surface of the container array, the constrained
114
deployment simulation explicitly barred the assignment of detectors to space that
corresponded to the first or last (TEU) container in any row, column, or span of the array.
It is unclear whether even this limited constraint would be possible to impose in practice.
Constrained deployment simulation was carried out in the same manner as
described above for random deployment. The only modification to the simulation
schedule was the exclusion of scenarios with detectors having 45 ft. and 85 ft. effective
ranges. Limited computing resources necessitated the tailoring of the simulation
schedule and the excised scenarios were the most computationally intensive 1 . Table 5-8
shows the output statistics for constrained simulations.
" 45 ft. range scenarios were intensive due to the large number of detectors that had to be deployed to
achieve desired fractional coverages. 85 ft. range scenarios were intensive because of the large number of
computations required to construct their detection spheres.
115
00 0
0 00 00 00 C
r 00 C o0N 0,0 0C0 0 CC 00000C
C 0 N4 0C 00 CC o0 0 0 o cc 00 00 00
N CN N N N C 0 0
CN
N N N
a
w
)M
A
U' N t
- M
a) CD LO N 0 Co
a0 0)
0)
NLO
Cd
C CO - 0) Co)
0a
-
6
- a0)
- a)ac
0 0
0000 a CO C O O)CDLOCr) CD
O
C a) a0 00c
C
C
(I)
CD 0
0
o C
o CN CN
c c o
o Cl.c
sO NV
CV oi
CVsC
Ua
,
- a)
sO
U3
0
-~
tmB
o'
O.
o. oo. oC
oo o ooo
o
C 0) - )
a) ' C) N O -00
.) TCr
n
0)
%J
4)
cu o
C) CD
Co0)
C00
a a a
o C o Co C
a) Lo
I
o O
M)
._
a
0
0
tC
C)
t u
r.
C
C)
DO N
M
00
-
T-
M 0 CD CD o
0a? O 0a 0a
o oo
0
0)
C
aV O '
V)
c
cM
CN C
c
0* o . o.
0
j
C 0) 0) c: O IT 'r
c
N- cr
c: ) - N 'T C
r 00 a a 0 a 0)
o Co
0 a
C
0)N-CD
E
NC Cs
an
in
CD
0)
c~
n CO-
T
c
CO
0) 14 O
C) ) "tt C,
N-a
0 0 c
" t
Co
c
OCDQb
6 (=00
It- 00 -N-
-
a a
~t
CV CO o
) C a
- t C U a
6 oc° o
0 0 0
CD
0C
'
CD C)
LOV00 0)
D Na.
COCD Ir
cc CN
0 0 o c O C O001S CO O
5
C) I-
cv) 0)
C00
L
N-
ooooc
N O CD C Cc
Cr)
Cc
N O00 LO
Co c ,
0- 00C
N t O O
00a
)C00
CN
'q 0)
CD cc
O
O O
Co - a a0)
a V uCo au
C
~n
o00
t oc o A
dt
CDC
cD - 0 a0)
a
- "-
O 0)
'4 ."
6oo C 6
c; c oC
6
Do
oM Co
ooooC
(aD
a0)
Ca
C0a a0)
o o o
0)
N LC
Cr) C ) LO N- N
'0 00
0
0000 c I
CN N0000 CN C
Co
0 0)
C
CO)N CO
It
CO0
CDpD~?~
6oce
o;o6 o6 °0 o o c
0CD
0) a )
Cy Co
) r- CD C a
C Co U 0 c) C - 0 N
N
a) CDa4
C
0o 0 - 0 C d
C C a) a) a
T
U) 0 00 Co
C O cc
0
CO
oi Ooo O
C C0 1
0o
C
o
c
j. 01 c
U)C
IT
O C I't <D b
C0
D
-
cC
CDN 0) C
cr
N C
Cr) CD Co co N
5q 0 0 0
6 c;c;
._
0
o o C0
o
n
Lo
aM ac
c
- 0)
o V56Cr) C
CD 0)
C
c
tM C
OC)
O CD
CD cM) 0
O o a aq CC
a
oo
o
o
) LO
-
-
)
00 0 0o o
O CDCO u
u D D D CD
C)O i LO CO U 4 CO .CD o
oo00000O
NNNNNNN
C (~
O 0
NONION O
N N N
O0000 0000 NJNC NC NC0 Na 0000
N CN CN CN N
N O
C1l
N O
N~ N
Cl O
C(
) 0) 0) 0) 0) 0 0
) 0) ) 0 0 0)
D 0) 0) 0o)
) 0) 0 0) 0)a 1) 0 ) 0 0
'
) 0't 0t 0t 0t 0t D 0 0 0
() CD CD CD CD CD 1
6)
0) ) '
0) 0)
C
C
)
.:O a ) -0 6 0 0
r-
o-a0)0) 0)
a-TcC
oc.~
-C
0
N 0)0)
C) aC aN a
oCN0)
oNN ao Lo
Co
) C
cr
I
co
CD 0c c
0 C
C
CN C
xr
.0 O O O O
,
O (CD
CDOD
I,- N-
- oi,
.OC) O
LOD
UO
a,
0
0
*_
0
a
E
'1)
N NV NV N
N
a,
0 Z.)0
E Mf,
0 UM)
a, cm
.3c
0
D
U
t,
0.
M
a
0)
R:
U
)7
0o o o o
'
%
V
V-
'T
r1,'t "t" q
t, t", m.
- t- v-
116
o o oo D)0 0 0
t 'T'elt 't t t r t
~) O) O
) 0
=0) 0 0
0
:2-":3 "- ":3- ,It-
00000
00000
CN N (N
C4
N
00 00 00 00 )) 0
00 00 00
00 D
O
O04
0040 0 00C000 D
0 00 00 00 )D)
')00 O0 00 D:O00
00
)) CN
qN N N N
J ( CN(N (NI
(I C N C
NI 1 0I C0 (C CN
NfI
ClN (N
3)(NI0) CD
) a) ,a
CO"t
O LO D CD NU
1. :0 O) 00
CCO 0 )0
) CD N- CD 0) ) 1.0 D ) a)
co
0 C)0 a) 0 0 o a) 0) 0) a0)
)
) O) I~ C,, 'ct e
0)-0)
ao0
1-
-
00
c;
(D
C 0 0 03 0 ) · O
n 'dO ci OC a)~ m
.- d c
O
_·, _ ) - 00 0)
OD
00
'-
· D O(D
C5
U C
0000c
o
V.
°O1cc
(D 0 'It 0 C
0C
c
N
d
N CO
t
V
CDvT- CD'
LO
CO CD
CO
,- 0
Cr) sc
(IN t
CO
CC N $ 0
l_
o -o 0o 0o ° -5
I-
I
Ij O °n O
co.0) 0)
- 0
ci
m
OC
)6
0)
, 66 C
0O
CO
tM
o N- O
D
ac co.f
0O O6O 6
O O
O LO0
)
0) 00C
0000
N N N
(NI (N
C
CDC
CD C(O CO CD C
N N N NC N NC
O O O
CODCD CO CD CO CD
(1
w-
C
1q
X llt ll~
-
~--m
X)
Il
I,
.ql
V
O
LO LO L
0
01
t
LO 10
N C N NC
.
N
D CD
g0
j 0)
5
D
D
-
I
D
) 0 0a
- LO O
N_- CN CD O CO - CY)
C (V)
o CO)O 0
co 'C
oI
0 0 0 0
CD CD a)
cOLO'IT I-)
LO 'IT
O0
coN
:)5C56C5
0 0 0 c0
OCDO0)
00 0
°)
3 C) CN C
D
0c0
0
a 0
Ca
0CY
DO 0
0
O
r)
CDD
00 L.O
N0N.
C 0 i.OU.O .
1
CD CC 0O CO CD D (0O
C
C
Nw
o 0
CY) CY) N-
N'r-a
04CO
0 CD0 U')
c aa
D
o o o
O
,r-
CD CD CD C
C
.N
O
0 c - a 0a
a
o oo
j
) CO
T
O
LO1C
O C U- L)
O
- - N- 0
OO
N CS04
CNN
N' N
T
CD C
6;B
O
3)
D00O CO OO O
. O i.o
C
C
a) a) a) ) a a) a a) a) a) C) c a) a) ) )
a) ) a) )
Ca a) )
CT Ct Ct 'T Ct Nt C'
Nq N- 'C
t
C C N C N N C CNC C~lN C
C C CN N C
117
D
OCD cO CD CC CO CO CO CD CC CD (0
C
~- CN
- VI
CD
,,
O1 O O
Cf) t-a0Cv)M
L CY)
N'q
D U'
s0 N-~ C
0
N N C N C N N N
C N N C C N C0 C
q- yTt
- 1
CD CD (O
CD o C CD CD C
0) 0-tc0IO
- 5
0- 0o 0o
CO CD
NNC
2
0
0)
00
C)
0 COa)
r) 0
co
D
t co
0,
CD O0 a 0 0 C 0 0
j O 0 CD
c. - O O 00 O) O O CD
OCDCO Cq C CC 0 D CD C
N CN
C
C N CN
V
0
D 0 0) C
d
N N N N N N CO
a) a) Ca 0) 0
w-
O N
Y
O0 C 0 10 1.0 1.0 10 1.0 1.
CO
O) N CD
0CO't
cc
1v OI N) C
(
0 0
1.
D
O LO
CD
X1 CO N- 0
D
D
00
D CY) CY) 10
00
't U) X) C
o C0
r0Cl 0
0
00 O 0
"Cr
OOlt
5 C c5 c5 c5
LO -CY ) OcO O O N 1.
N- I-t a)
O1.
to I-
1.
D 0) CD (N (N
O O
)co~ a)
6 a Cl c s;
Ir) Cf 'T
CO
C C) 0) co
Lt LO)
0 O5 CO
P-
r) t
06
0 LO 10 1.0 C
CO
N
* 0tO 0a a :
NI
0) 0) C) 0)
V)O
0) a 0)
D
360 6ooo j6606~)0j O
D
v)
6,
r CD
C_ OD
>0000
O cO
C'1 C
) O 00 0
d' 00
CD -N)OO O) - 0 0N
O U. Cn cYN 0N J) '- (v CfD
0 D o o 0o0
c5
*t
TNO
-
D 0 U) 0 0
L
- 0)COD-
Dooo 0 0
cdoo
CY
O)
a)
Ul)
)0
,O
't
1
¶-
))
.,
C C
I-
(CC co
C
C N
0404
-
C
N
.-
I
CD
CD A CD cO CO
)
C
C'
c'
)
(N
C
C
C
(NJN '
a)
'4-
N1
0000
0CN 0c CN
0N N0 N0C
0 CC 00
t.-
L0 0)
cc
0V)
0 C000)
0 0rC>
0)
60 a
00) aO
C
Co ooaao
0d
0
d
C\
000000
00000C
(0 - 0 C) u:
CV)
,- 0) c0 N-G0 L
000
000
000) -
CY)
t N
Ct C3
CV
C
0)
c(C
C 0 N 11,
NrN-
Cl
Cr
t
'RT-
o o 6 C;0 0 0 0 C
0 N- LOco
(
06
o o
U) 't
a
CN N
)
000000
6c
0C C
0
66666
C
LO cPI
- co c
C5 C; C VC=;
c0 (0 (0 LO CD
t
O) CNCD -
O t
00000
CN-
C
0 0000
o o o0)0)0)
6i66oo
00 OC,
O
(00)0CO
0
'
0C 00 t0C
to co o
co
- o a -N
CD
co 00 C
N- 0 0 0) a
00 o0
CM C)
0O
CC
CN
C
a)
CY N (0
CN c0 O
00 - C)0
C
't
:O -N-
000I,-0001
C CD)CON
0000"I000
U) 0)
c o - C,-r C co
C)VCD
·
N IC 00 CO
C)
r
co co co Lo CY
C=;
C C C)
.
0O00 000a
U
Mro
oo
m
- ac
CD rc 0 ~rco
m-I,
t
N o
co M
0 (0Y)
U,)
CD
000
t 0
C
co
) cm
C LO
C)
co 0
0
00000
C
) 0 I
.i
o)
.
L
U) C% Cf)
0
0o LOo''- I
o0O
U)
1CO
'--N
N N1 L)
N
C N C C)
T
1
r-
rl
-
Il
r
V C) Ct) C)
00000 00000
0000
,r -
N N N CN C0 C l N CN C
- 1-1-
CD o (O
O tO CO CD CD0
C
C
C
C)
Cy)
-
-
CN N4 NCN
000 O0
O C) CO)CD
c C Co
C) C)
CN CN CN N CN C
VI
D
D 0D 4
Cl
(D I- 0
C c 0
Cl) Cl) Cl)
N
CN
N
0)
C 0
i. ,. .0
O- ,))O0C
118
)
C)
CY)
Y)
C)
- 0) N
CD I 00
cO 000c
0
1S-)O
')
CV) ()
C
C0000)
(V
Cl
-
r-
t)
CO C
C
00
C" C) C)
000
00000
C N C N C
C)
00
000
V-
m
(D c
LOL
LO L )
Nl- - N-_N- 0o 0o 00
N
CN
-
o >0 0 0 o 000o 0
D c( (c (c D CD O CO C)
0 0 0cDD
0o
r) (rn
c
CO CD
C) Cl Cl) C) CD
(I)
CO
0o o
I-
00000
0C) 0 0 ~0-
-
O
0 0CC a
c) c) D r- U
UIOC)NC C
N C)O CN0)
00000
-- - - .0
LO .0 (0(0(0D
C) C)
Y) C)
U) C
Co
o o oo
a) 0
C.c C6C
.
000000
o
.C.;
Nl't
,D co D O C CD .CO D
.6
.
V0
LO ) L Uo L
LO LO 10 U) ,
.
VT
tn CD
0) ) co 00 00 0
Ml Cl) Cl) C) Cl
00000
stN rl coNl
0)
o
co
0 oaC)C;LOI)0
0)ciCOC)
6a) IC) oO 0cO CO
r LO C
V. Cy"
) ocooo0C; Lo
6 co 00a00
00U,)
CV
U
,-00
00
00M
) C
s 0
LO
N0
00 a)
rLO
00
,-NILO
-ooO
0
00
c o CN CD 0
CO C
w-
C) C)
000
NNN
CN N
0 0 0 n-
'-
0 0 0 000
C) C)
N
(0 T0
"tI-o0t a)
(0
NO
C;
co U C
(C
ci
O O C
c5 C5 c5 c5 N-
U) U
00
NcNN
C
0
c c5cc c
V) C)
N N
00000 660
00000 00000 000000 0000 00000
~v)
DCO(
0 0) 0)
O
0
00oc
N N C,
C CNC
N
I,
o 0) c0)
0 0
C;
LO
.,
0co
c
CO ar- L
0 - 0)
o0 ad an
( C
N
000
0000(0 .0(00000
LO0,)0(0L
I')
co
6
co
C
0 O00 0 C
C 0000
C
CN C' C N
0c
LO LO0) CD04 v-
00 C) N a0) U)
(0O
a)
0L- COU)QClN co
000000(0"I
0 (D
0a
0000 00 C
C O 000
000
N~ N1 N (N (N C Nl
U(0C0 a (C
- CY)
CO0)0
I
't CNN 0. U
00
0N r- C4 Il- aa C14 C LO
CY)
N- 0) aCC (0(0
Cf) st CO s ao az N (
,ID (DO (D
a CN
,Tf *Rtc0 a) a 0) - 0
c0
) 0) . 000)C
o)o)°.C
co
oo 0 0 CD 0
0 co
0 co N-o 0)
Cm ) CD r
00
NT
I
'-
C
C
N C
CO
-
-
N
-
000
O O O
V)CO
C)
00
NN
0o
)000000
)000000
N N N No
3
NI N, C C C
00 00 00 00
D
N1 CN C CN N
C
)00000
JO O
)00000
40N 0N0N CN0C
104
)0
ONO
00 0 0
)
0C
c 0 00CO
o,
DO-
CD
CNo
O
c
CO
) C) C N N L
) DCo )
c) r-
Ce) CN CN L
(DLsD U
n
t N N- 0 CD
N 0) 0) - O o0o C) 0)
o 0) 0) 0) 0) ) a) c) a) c)0)
i 0 0 0 0 0
OCoV')ciC
N
O C 0)
L C
00 aC;CV
C
~-
,oo66
~ 66
D
a)
0t
C)
O%JN
(VCD
' 010YN
Oo co
PI
o
)
0 00
N I
0
0 0 0O 0 O0rO
coO n,tLO
O,- O
r,o
fJCo)
C') Cl4 Co C-
o)
ooo
O
Cc)
O)
co
0 T0
t
00 00
N04
do oo
CDO
a) UD
-
) COa) co C>
) 0
) 0)
4j
Cl')CY')
1L"OON
2 coNr 0 co co
o6C , ;6
LD N
O
0
C10
N
-
't
'-
10 Co
3 oo Co o)
0) Co
o oo
Co Co
O 0N 0 O 0)
0
0~
tn
CD
odo'
OR
° ~°O000000
O OO
LO0o
0 O O O
CN N C0 't
0
CD OO
- C
0
oooo
00
".- )
C)
,O u
tn
LO LO
101
'-
o0ooo
N C)T
10
-
0000
O CD CO C
.
0
01O
uO
CC DOCo CD CO C
N C' 10 10 u1 u
'l
I
V-
OC
OC O 0OO 00
o
10
-V
I
v
O C
ot o oT ot T C "
N N
o) C
1) N
00 0 0
O o
t CD
N CO
NC r)
-rO n CO
-D O
I.O
CC
000 0 0 0 C 0 0 0 O C 0 0 O 0 C 0
VI
, CON D 0
0c
Cn Cl -
N
O C
IV-
't co
OO0
1LO o0 O o0 .
N N N N N N Cs N CNN N 0 N N N N CS N CN N N N Ci
C
C C C
C C C Cr
C) C
Cl') Cl') Cl
C) Cl C' C) C c) cr
-
O
N
0)C
o 0
CO
c)
j6ooo
OC
C
cq
CV)C
),00 0 0O)N
j66oo
g-
(CDCoD
V-
:DO1. C
'q
C) Ce
"
- Co
.- C1
(Co !.N N. C
LO T d - C) N) N CO
0 CV)0)
o Co N a)
O0
0
c5 c O
c OR C C- ·n
CJ)Cn c5
0 c5
CDC)
0) 00 N)
- D 0C') 0t Cl
to O - C)o
CD
0 O O
O N C a) c)
'-10
Co a)
a) na) t 6 066
O o 0
v
0
O)o O O O ° jdd 0 0 0 C
5 c C; c c
OOOOO0C
0 0 0 0O I0 .
o0
Co Co
T- -
)M N ) 0'
'*T
0) CDC
CoC)
1t 0>
0 NO
OC OO
O o* 00 CO)
CoJ)
0)
ICo N
Co
CD
C
0
t
Q C v- UDl
'-
0)CD-
00C
0 0 00 0 - 0
% CO CO CO N 5c5
0
D
0
0 0 0
D o3 o o, oD o
c) 0
CO 0CJ)
O, Q>C07
0
'-
-O
T
'
1-
L-
O
'IlV-
Il
LO
-
-
T
-
.
LO O O 1
U 10 10 O LO L u
VI'
CO
O 0 0
0Co coO00 Co
0 C
0 O 00 C
C CO 0o0 0Coo
,, t ' ,r N
0 rO
O
C
· r· ~T- .
't
119
ItT
I-
O0 O00 0
*t
V I
C
't2*"t '
) 0CN
C')
CO Co 0)
-0)NC
100)0
0 Co0)o
0) o q0
0 00
r Co Co
oN oT N
C!',
ol
uo ')o
'It
M N
10
c 10 N
CIO
LO
LO
CD
00D
-
N CJ)
0
) 00
o
O
o oa) a)
C) a)a)
'-
O CO O
)o Cl' C o C dCt
CtO CNr a0
L0 O t c
- N N :
v-
0 0Nl 0N- C .0
L LO
N N
IV) C
CN N Cs
C
0 00
'-
LO L
'-
'
U
-
C
'-
-
) U
=;6
0
Uo O O
00 Co
N
N N N N s N
C C
CC
CO
.
0 C
CN O
I,
-N
Dc)
CY
0 0
%-T--
L)
C
C O O
V
LO LO L
u
-
1
V-
l-
O O
0 0 0 0 C OOOOC
o o
00
0 0 C O 0 0 0 C 00 o
OOOOC~`
I
OD
000
000 )000000
)000000
N
Ci (I
CN
J
CNN
CN1(N N
0
00 0 O
O 0 O1 C
C'
%IN
-t CO N 0 C
'00 'It
COo) 0) 0) 0) 0)
-00 M
OC
cO i O)
C
OO
CD C
O
'(
OC
D I. I- N
1 C :D C1 0
- L) f-.
0)NCD
CN
CN
(Cu C )
D
0 0 00
-
-
ICD
0 CD -
0
00 0
CD
0)
0 O C0 5
,N 0~
't0
(0
4- tD 6
CD0)CD)
0)
000
N
0 CDIt C ) c
0
D 00co
cO 0)
O
066066
0 't
N- CD00
OO0000
0
CD CD CD CD CD I
N
N CO 0C
e
C)
C") C,
CD)
C s
w00 mo
0) r
S VCO
f
- 0) 0)C oU:~~~~~
CD
w CD
ws C
m
:
0 ~Sn C0 0
~~~=
C5
0
.
O CO)
*
q
- -
- - N'-
rD D
(0
oD
1-c
0
0 0 0 0 0) 0
j.)°)tj
)
00
N4 N4 CD 0) 0) 0)
6
0 CNI C0 c."
r) t-- (NI
o
O o~
CO O Cd
00000
lD
Ln
to C
D D
D C, C
rQ
D (
Cq
CD
v0
O
0CD00
000
0
D O UD LD UDO00000
O
n
.)
O O UI) O U' c
00 0
IC
00
CO) C)
0
C)
s s ss
CD 0
D
:i c
- ' CC y) V' N (D
cO t CS 0 0c 0)
0 000ci C;
O aO Q, Q
O
rN000
C4)''
N CV) 't O CO
s
0 c
O
O CO
(D
.O uL) L LD u
CD CD D Co
(0 .
o00 CO Oc
Co C Co C0 (C' 0
m 0 Cf) C) :
')
m) ('E CY) C) C)
- V- V- V- I
-
N C0 CD D C
00000 O- 0000
C C") '-
O CD
C
000000C 00000
0o Co
0OCC
0t 0 0 t
C
l
C
0 00
00
X) 0)
n CD
U
(N CD
O 00
O LO
O 0)
)c
CD0
Nl O I) N Co "4
N3 6
N N 01D0
CD
O
C)
0CY)
00\ 66C
0
0 t , N NIJv o CD CN C 00 U) C) N
0 c6 c .i O
C
O O O 0
CY
O
LO
0
N0000
V0
00 0
'IT~ 'I
Uc
0
D - N '0
O 0 00 OC).
.
)C0
.
. C
j
O
sCD rN CD
0 0 O0
N
£
006
0 CD .
N0D
06
co
N
') C)
to
NOt 0
t
N
O 000
oo0666
D
: 0 )V-
DOO0000
0 0 0 0 0 0 0 N
o Uo I,
0)
) CD - 0C
(D
4
Ct') CD C N 0 C) c c) C I,
') N N
CV
0C CoDT- t 0) - 0) C(DC
C
'-N N ITN
m c- corl
t 0) N C) ) O I- 0 00 0
L 0
O N
L O
00 t .CN
0 R
0 CD - r-- - r,
N CD
0
N
N' 'IT
q O
0 DO
CD
0)
0
CD
,
N
0 O,(NJ
0 c O)0)N 0C.D0 00 0)
' 15D) 0) ) o Ir 00) 0)
0) 0) 0
0a T)
0)
o
O O zj
6OoO
(OC
c5
5 0~ O;
c c
O
0 O
- 0T L
1R0l 0)t
OR
) cD
o
0 dy
O 10(3
C) CD
=O
O - CD
O
00 000
ON. .0). .,0) D
LO
0
o
0
N
CO CD(Ot L C) 0) 0) D
N ) Ct
co
CD
) 0
U)CDOCD
o UO
OOO
CD 0
(D N 0)
)) 0)N
CD
'0t
'C0)
0 O)0 0
0000300
C
O
j5 OO 0OOC000
OOiC
co
C
C
N N tSo 0 't
r) U)
000c
0 00
I.NCNNL
0 00
o,
N ' 0) C N NJ0) D) -*- 00 0
CO
C oa
: 0 0 0 0CJ 0CN N0 0N DOOOOO
0 0 0C%
0
C0
N(N
CI
N
C0 0 0 0C
N N N N (N :4 N N N N
NJ - 0 rl U0 - 0) cr) c (Y
0 LO
Ta0
CDO
-t CDCDU)
0 0)
- 00 CO
N c 0)
't
s0 c)
.:00
')
00)
a0)
CD0)0)
0)
0)
=;
C
C;
00 0 0 0 0
C;
06
o, 0 0 0
cN
No
oN
0
N N N N
C C0000
Ir
r
-. I' -I-
OOOOOC O 0 0
C
m
co
C)
C
0I, I0 V00 C 000
-
N N N N "
C
Co c
C) c
Il
0) 0 0) 0
O co
0O c OCD
0O D C
CoD
(C CD CO CD cD (C cD CO CD C
Cdt
Dt (
(0O
QD
CD D C4DQ CIOCD CD co Q CD
CD CD
120
0 00
- N- - -
C
00
00
oo6606
D O O10 CO
"N N C) C)
O
.O U) C L i) UC
N N N N N N-
O 00
) CV) Cf)
C
V- IrlV-
,
I-
- N i
V,%1-
,l-
o C 0) - 0)C
3)D -
V-
'w"T-
C)
T-
',,"'
'%'"'
C
C 0cD 0c 0D O
co CD
tCD
dt
d
D t
CD
(0 C
C C
C
o
0
00 0 ao 00
c) Cf) C co,
-. I- I- N'- '
,-
-
r
t C O Cd't(
O
D
c Q
N
O
,D
'I,.
co
o 0oc
0
o0oc
0
', - CC
C o. Cl)'- c)a
o6o
00
cCDND
c; Qa
(
00oo
0
6d c
r (o I
CO
- ( CCC
c oo C
L
L 0O
O o oC
0000
m CY) C) Ce)
(0 CD (
121
For ease of inspection, the mean fractional coverage volumes for each scenario and
reference array are plotted in Figures 5-18 through 5-22.
Coverage vs. Detectors (1440 TEU)
1
0.9
o.
o
0
* R50
° 0.8
L
o0
* R 55
R 60
R
R65
x R70
C
o
0
t
* R75
+ R80
0.7
0.6
0.6
0.5
0
5
10
15
20
25
Numberof Detectors
Figure 5-19: Coverage vs. Detectors plot for the 1440 TEU array [Constrained]
122
Coverage vs. Detectors (2496 TEU)
0.9
._
* R50
g 0.8
o
I.
0
a
* R 55
R 60
R65
*RR70
+ R75
+R 80
o 0.7
I
0.6
0.5
0
5
10
15
20
25
Numberof Detectors
30
35
40
45
Figure 5-20: Coverage vs. Detectors plot for the 2496 TEU array [Constrained]
Coverage vs. Detectors (3600 TEU)
1
+
4·
a
0.9
II·
*
0.8
.2
:9
S
0
+·
I~'
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~i:-,,
i···:
ii
R 60
RR65
0~·
0.7
.2
0
"~·
*R 50
*R 55
* R70
R75
:~~
+R 80
I~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'·i·
C
I
0.6
0.5
0
10
20
30
40
50
60
Numberof Detectors
Figure 5-21: Coverage vs. Detectors plot for the 3600 TEU array [Constrained]
123
Coverage vs. Detectors (4800 TEU)
0.9
0
E
* R50
* R55
f 0.8
1!
R60
RR65
x R_70
0o
0
0o
0
* R75
+ R80
= 0.7
0.6
0.5
0
10
20
40
30
50
70
60
Numberof Detectors
Figure 5-22: Coverage vs. Detectors plot for the 4800 TEU array [Constrained]
Coverage vs. Detectors (6460 TEU)
U; -4
+
0.9
2
+
.
X
y
~~~~~~~~~~~~~~~~~~~~~l:
i:~'
:··
I
a
0
0,
0.8
+
La
0
0
X
'a
IL
+*
* R50
* R55
x.
R_60
R_65
x R_70
.i
S
0.7
0.6
x
,
J;
.
'e' I
:
.
,of
,-
*R_75
~~~~~~~~~~~~~~~~~~~~~.·.::
: "-. ,
+R 80
·
'
. D' ec
,
'·
.
't
,
'~· ' ...' ''',~ ·'::' · ·- ,
'
'
g
'
,
',?.'' ,' S;",''.
'',t
'
j ; :;
0.5
0
10
20
30
40
50
60
70
80
90
Numberof Detectors
Figure 5-23: Coverage vs. Detectors plot for the 6460 TEU array [Constrained]
124
The number of detectors needed to provide 75%, 85%, and 95% coverage for
each scenario were estimated in the same manner as described in the previous section and
results are shown in Table 5-9.
Table 5-9: Estimated number of detectors needed for various scenarios [Constrained]
Constrained
Depl
ent
1440
2496
3600
4800
6460
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
9
12
21
7
10
18
6
8
15
14
20
38
12
16
28
9
13
23
20
28
51
16
21
39
12
18
31
25
35
65
20
28
50
15
23
40
33
48
86
26
37
65
21
29
51
0.75
5
8
11
13
18
0.85
0.95
0.75
0.85
0.95
0.75
0.85
7
11
5
7
11
4
6
11
19
8
10
16
7
9
15
25
9
12
20
8
11
18
32
11
16
28
10
13
24
43
15
20
36
15
20
0.95
9
14
18
23
35
0.75
0.85
4
5
6
8
7
10
9
11
11
15
0.95
9
13
15
20
26
Range (ft) Coverage
50
55
60
65
70
75
80
Capacity (TEU)
When the numbers tabulated above for constrained deployment are compared to
the random deployment results shown in Table 5-7, the differences are not particularly
striking. Surprisingly, very little is gained in terms of coverage efficiency by
constraining placement in containers along the surface of the array. It appears, that by
excluding placement in such a large volume fraction of the total container array, that
inefficient overlapping was promoted in the center. This seems to have offset efficiency
gains that were realized by limiting coverage volume "losses" at the surface of the array.
Double assignment effects also played a larger role in the constrained simulation because
the (xyz) term in Eq. (9) was smaller due to the imposed placement constraint.
125
5.5 Centerline Deployment
Centerline deployment, where detectors are optimally distributed along the length
of the middle row and column of the container array, is the least secure of the examined
deployment strategies, in terms of concealing the location of detection units. It is also
dubious as to whether this approach would be logistically feasible in practice. However,
the completely constrained nature of this strategy does afford extremely efficient
utilization of detector coverage. As a result, this deployment approach is useful for
establishing a lower bound for the number of detectors that would be needed to cover a
vessel with a given capacity. This lower bound can also be used to quantify the coverage
efficiency losses resulting from full randomization.
Since the imposed constraints dictate that detectors could only be placed along the
centerline of the reference arrays, the geometry of each scenario was uniquely specified
so only one calculation (as opposed to multi-run Monte Carlo analysis) was needed to
determine the coverage. For the purposes of these calculations, the centerline of each
array was assumed to consist of 40' containers to more accurately model arrays
encountered aboard actual containerships. It was further assumed that detectors were
only placed in the center of these full-sized containers. The first scenario for each
reference array would place a detector in each of the available full containers along the
centerline. The next scenario would place detectors in every other container, then every
third container, and so on. Sometimes using placement patterns of this fashion did not
uniquely specify the arrangement of detectors. For example, if detectors are to be placed
in every third full sized container and there are 15 containers along the length of the
centerline, then the desired placement pattern can be realized with an equal number of
detectors when the pattern is begun with a detector in the first, second, or third container
in the line. Whenever there were degrees of freedom associated with which container to
place the first detector in, the coverage for each available geometry was calculated and
the arrangement with the highest coverage was used. The results of these calculations
are shown in Table 5-10.
126
0
4)
N CO O 0
COCOCoaCa
0o
m
L.
COO0)0
O q (D t
- COOC)
CCo
o
CO
Oo
C
CN
oo0 CLO
04O I
Co
a
oC
oo o C o60) C;C)O'
1-0000
0
0
0 LO 0o o
oo cC
o d·t-t aC
CO
0
C
O L
0 N 0) Co C
00o CON
N
)o O
sCD
QO
C 0 a) UON a
C0)
CO
N
o 0o
0 if 0 0) a N Lr o0)
ooocci6
:
00)CO
o C) CD
CDOo0
) acC oo
a)
6 C; o oa)
'
a
LO t
C) c( 0 LO 'tI
--
1-
) CN
0O.C)
"ILO "I C
O
CI
C
It- LO"
C
4
0OCLOI'll
COIC)
V-U" "T
) (N
C
O
.
w
cn
o ca
00
a,
L
C
-
CV)
CO c
CO5 U)5 L
"V)
- ) 1 ) - ) V)
-C
0(1C
-
n
-
V- -
C).
) CO
M
V)
C (V )
in
V)
-Cy
-
-
r-
MV) 1-
-
-
-
rV)
0-
U)
CVN
C t
N Ms
st U')
2'- ' 2' 2~a,
0 0 0
i
O
bb2-111~I
-1
aUi 0 0 0 LU
Wi wi Wi iL
iL W
Lu
0
L LJ
CV "C0
L
C0 C)
t
LO
L,
2' L2 2 2
0 La0 a,0 w
w aL
IWWW
0 0 L0
WWWW
UJ
WWWW>
~uLU
WU
rC n
N CO t LO
0
L1
C
2' =COLO
2
'D Cn)
0N
a 0
-
)0)w0
ww
llii
UJ
> > LU>>·L
iuwwWW
In
0
0E
0
a 0
a
0
C C
0
0
-j 0 0000
1-Ir
-
1-
-
00000 00000 00000 00000 00000 000
1-
-
-
-
-
I-
-
-
-
-
1-
-
-
-
-
._
E
0
1-
-
VI
-
-
1-
o-
o
C
0
bItU
0
t t t T T0 0000
0
n)
cm
C
m
-
O
)LO LO
n
LO O LO LO 0
O O UO rO LO O
U)LO O
00000 co
CD
co
CO O
.O CO O COC
oco coo
00000
s . N. rNN
O CO
LO
. N. N
'-
0
l
00000 0000 00000 00000 00000
0000 000
N N C
N
02
cm` N C0 N
C
CN CN N C C N N
N C C N CN N C0 CN C0 C
N C C C C
NNNV (
C'm
4-.R
0
E *C
O_
o
0 =
)n0_UI
0)
0) 0)Dm)
) )
0)
ooo000
0
,It.
) )
) )
0) C) CD a)
m)O)C0)
) 0 0 0) ) Om 0)
O0
'CCL
0 m
0
L
00o0o o0o
~ ~j ml'~w·
o o tooo It t I'l' 't
00000
1-
127
-
1-
1-
1-
00000 00000 000
44
1-
w' 4
1-
-
44.'14 '4
1-
0 o0
)O ON
)00-r-_9-- -o
v
00
C C
o o
c 04
)
9-
t
O
°
sr
cn
0D I- D
_
0IO - C) C
Q-
.-
0
o
) CC
-
)
9V
a) L
C L)- Lo
,U
Li
>' >Vq'
u
L L
o0
00
0T- Vc
L
r
CNi
000
LO
it
C a, LL
W W W IL
LjuJ
L
L
0) C
0)
O C
4' ,
0 0 0 0 C
C
CS
) 0) 0) C
,'t "It't ' t
N ON
2 2
2:
?t-- Ln I CY)0
u U--
u)
TN 04
C
WWW
9.-
W
C) C
V-
-
)
0 o Un)
o L0 Ln
C
C
N N N N N C0 N N N N C0 C
C
94-t
t'9 4
9
4 '94
L LL
C.(
CD
) ) C 0) ) 0) 0) 0) C
9
0
N1 C
N N N CN N C N N CqV
128
L
I
Ot
, -
I,,
L
IC
,
Wi W1
W
i LU
>
W
C)
Cv C)
Cr
"-
CN 9
) t-=
) CV)CV)c
CY)CO
9-
9-
(
V"
DO C
) 0) )
4
N
C
N
9
(
CD (
N
D
C NV-
9-
.
D
Vt t t I
C
I
D
N
0 (CO(COco D
V- T-
CN4
9.
oo
0COO0(D cC
00coDcC
N ON C C C N
C
0
_
*-~
N CNN N NV
cO
( D) 0) 0)
Co(
0) 0)
-
)
>i)0) 00) 0
U
W WWUW
9-
0n nLOn u u u:
n
Lnun un u:
I
I
I
DC
(Y)
C C
9
ci) ci c
) m
CN
- M0
C
)
CO cO CO CC oDc CoDcD CcO
NNCV( CCC
CD (co CD
CO 0
4T 4t 94
O
O V)
C
CY CV
c-
NNN N N C' N CI C1 N C OC C N1N
0) 0) 0) C N
*v9
V9.
0 00 OC 0)D C0O
) )
)(
-
L0n
(CO
C
'I
i>
uL
D cO cO
L
N MV
c) rC)
U
t3
Li
-
LO Lu LO Lr
110 14 Ill 1
cLOCM
-
-- -UNCV C)
en e Ut;
, wN
U
LU L J U
--
?t-
Ib
e) CO)C) C) C) cV) e) c) C
CC rt 't
> CD C)
) cON CO)CD
IOn
c00
N
) co
cT CON ) c -. LO
r.
co ) 0) 00 O Oc
o o o
d o od d o d o o C o
NCv)jLOr'
W Z WC C14C)
W a)
n u
O
00
N4NN
I
t,
)) Co
0)coc Occ
) -0-00)
C0) C
cj
T- - - 0 C)
L
cc 0 cO 0 0
o O0 co 0
C4
s Ln t
?
V)
9
O 0 00
OC
NC
.,.
C
1
C
o Co Co o
)L
-t :
) CO "C C
od
LD
O tC)
CyV
)
)
0) I,- ' C
) O CN- Ln o)
) COCO000
-0-
co
9D
N1
0)
0)0 0V- C4CY) )-
a)
0 0- 00't
tJ)
t0 - CO 0
O)O0'-CV)
OO
2
C
-
DN )
_
N C) t
L)
0)
C
0
c co
) r- CD
N-
-00000
U Tq ONC
-
N-
T
D O) N
3 a)
) 0)
L
C/)
'O a
_
00
c
CO
co
C') O)
0DO
Ic.o ' 0 c 0 co o
N
c
D C
I
-
C -
0)
a C
-
-t
C C
000LO
C 0
r
2 r- o
C
N-
WWI
ILU
0 0 0 a
ULU.JWW
L
u
Ul
c; o
-
CvN
'
L -
00 c
c0
CO
c0)
CN
'
0)C/)
-V
CC CO
-
z
L
M
,W CW W W
LI
B
D t -0 O d
C3) CY CN Nt
0 CVN t CD ) I.
-CO O
)N -
I)(nV)V)~CV)
~- - CV
V- Ir-
z
-
) 00
O OCO
)
Z5Z;0C
-)
- C M
z
N Cn
I
O O t Cel
) O 0 N
) o0 0)
) ) c-OLO-, I"
-'-,C;0000C
6
O O C
L
LI
W
D O 0
) N 2 -- 15 t C) N 2 r- c
-T-
) /--
OU)
) 0 0)
D O
4-.
4c
.
w
w
.1
5
Li
WWWWW
Cq aM I-O
-
U
U
UJWWWW
a)
0 0 0 0)
WWWU W
lw
iULU LU UJ L
c') C") C) CV)C)
T
-
'oV-
oI
uO U)I
O00000
(c cDoD cD (C r- I-
rD C(Oc
CO TCV) It()
V)
CY)
C)
rT-
V-
-
Y)
I-
C)
C)
T-
T-
C) C)
-
c
00
c
acc co 0c c
N ClNN N4 C, N N CN NC N Cl
~
(D Co O O C c0 cC
%--.
T- T-
Lo LO LO Lo O00000
N- 0 CO 0 cO cO 0O
.nU)
(D cc cr CO CO CO CD CO CO cO CD
rc
Cc c
C') mCCY) C) CY) 'V C) C) C) C) C)
- N- I- I'- I'- I'- I'- I
~
,-
N N N
'
'
t
-
LOU Lc
CO 0c0 c
cc cc
0 0
Co cc o CO CO
C (D D CO D CD D (D DCO
CO
CN C CN .N CNCN N(l
N N N N CN
C N N N N CNCS N CNN
0c c 0c0 c
CO ')
T-
CN C N N(N
co co oc 00 co c00c
.
c
cc 00 0C 0c0 c
-
U')
r
-
o LO
n) C)
T
LO L Ur r
-
LO
-
urLO c
LC O O
I) U)
O O
000
C CV)
Cr C C)
0 0 0 0 CO O
.-
-
I-
T
V-
It
N N N CI N N N Nc N , CNN4
CNC N N N .N N CS CN CC
T%,-.
-,
T
-
.
-
V-
"
c c c
c
cO CD CO CD C cO Co CO C CO c
a) ) CD 0 cD
O) O) O) O) O) 0 a)O 0)) a) C
oNN N N O N N N N N C N N N N
00 0c
O )
Ir
Co cO CD cO (D C4
a) ) a) a) a)
C N N N N N C4N N N N N C
129
V
Tl
O
V
0 0 00 C O
O
O CO O C
C C)C)n c
co co c
m
T-T-I
coco c
X-
O
O
.o O
o
N N
N-O
CO
CDC)
O rO (,
6ooo
DI-) CO
t' - 0- nco
'- ',1 '
t D O (N 0 CD
t
C 0
: 0
C DC
D CO C(OC CO) CO
C C " C
04NNCOV)
OO O O j
- C ,O -
CD
c
- -CO
CD
) O)
t 0)
uf
C CC
CV C
-
"
ULUU
-
I-
-
LC
) I
UI)
LO
1-
-
Ir-
O U)
T-
0000
.)
00O
0 0000
O o
CY)
- C
C
i
D c)
U
C
Cy nV)C) CV)C) c
C.
O O 0 C
.-
0
0 0 C OD
OO
D
CD cD D
C) m) C)
-
Cm) C)
-
-
CO C
)
C)
) )
D
I..
4-
) 0 0)
d O
O CO
-66ddc
C C4
C%
M.T
C C
)OCD
0) 00 CD T
r- I
-
C-a
c -a
-
CU) ) u) oo
LLJ W Ui LL IL
iU) Lo O C
0 0nM Cv)
0 C)
0
M
V- T-
IV,
00000
O 0 0 C
CY) CV) C)
L
V
nV) C)
NC N N C C C N N (JN (
4-
U I
D Ofl
WWW) 2 W
2
a) > > >
0 0000
N CN (NI C
'-
C
'c
WWUJW
U
LLU
0
ICDi
>
-S
LO 0c
n CD U CnUC
CD D CD (o CD C
0000
-
i
r S
Cv) 't
.-
N t
It U)
-
DO
) 0) ) -
-00000
C) 'Itt
0o 00000
D CD CD C
O 00 c
-
a
2'N
0)
U)
)
) CD c
CD U) o
CD
C" cL
U a)
Li
w` LU
wW
LLJiLL
O u
L io n
L.
C iCD
0U
LoO U)
L:
0D 00
c0Dc0
T-I
L) UC) ) LO 0 UC)CD U) CD ILn
C)
5) C
NC)
(U)
0 O O O O 0
CD C
a0
) 0)
- 0)
) 0) 0) -
U) nc
'a -0 = = =
C
C
Cy)IT toco
> N C) T CO c
03
C
C
C0 w
00 I D 2' 2' 2' 2^,
J
a a)U)U)
U) LI)a , L)
l >>>>
> 11 a,WWWWW
WWWW
l Ul L 11 Ul
L) U) L
I- r- C00U) 0
1=. (N CC)
-
CD c
CCV
-
-
-
-
C C N
-
T-
N C N
(C
0r 00000
- - -
C
CV
000000
u
n
C)
(c)
00000
-
Cr) C
- -
C"
C) C
V C)
0N CN 04 C 04N
C CV
CD C
C C
C) CV
CV)CV)
) CV) C)CV) C0 C
130
- - N,- -
00
0)
C C) c) C)
IVV) CC)O CC CV Cy
C0 O O OO c
C OC 0 0 0 c
O
0 00cD
0 c O
O0
O0
0 0
0 00 C
CO D
CO c cc CD D CD C CODQ
C) C) C)
-
'4
T'
V-
1*
T
CN CN N
CN CN
O CDO
C
I-
·e
,
T
C) CV) C?) C) C
v
000
CN
N CN
000
000
C
(4
co
c co
C) cr)
) LO - - ) 0) 0 0) o r- D0
Co
- t'N 00
P-CoN :)) O
0 0)
o CD
) O
0 ) - 0 0 - 0 ) I)O -- 00
O
a) (O
oo
C 00 5) Co t:. '- Go c)
O D) C) t
'D 0O 0) C) C- ..O
D ) 't CO ON N
o66
· -:
o
Z
-- C0'OC -0
1CO
-'el'
4'- oo-
C
U)U
(0
Co-t -t
)2
- t-
0 NI M
)t
C
-
N4 C')
t
2'- U)
2 U)U
2 2
> 2>> Li i,,, U)
0 -",O T-U) VU) V-O T-U
LI)
O
O
0CY) C)
00000O
fC C CY)C
OOC
00000
O
CN N C
Cl C
10
0
C)
ut uto '
VI'
NN
.)
C') () CY
'
C
CN N
.T
I
C CY) C) C) C)C
CN
N N C
C) Cl) Cm Cf) C
C)
tO
C
O O) I
V~
IV
,
>,
LLW
LLJ L
Co (o
CD co O
D CD CD C
-
T-
f
WC
IO
,OtO O O It
IV-
T
C
-
-
V-
o
o
I
a)
W ) lll
LjW
-
O 00000
n U) to tou) Io
C) C
V) C) C
. t
I.O I n O CO CoD(O CO (D CO.
C
00 0 0
V
LO
O On O
-,-
-
T-
T-
0 0 0 0o
L-
D (0 CD o (D CO D CD(o CO
Cs CN N N C N CN
C') C
C
N C) 'IT
r-
tO
LO
f W
Tc c/)" C
'tW W W)
Z
T
O
O
D Co CO*-
ii
a)
11 Lj L W U I
N N4 N N
C
0a)
D 0) -
2WW
to .
C
V
0
.-
-"- - 04 - 0
)D CO c
c
t2
o
-U
U25
z
t
WWa)
-
cCl'
c o I- I C)
O
O0000
tn uO IO tO )
o
O O000
r
MI
0. (DCD
GO-00 C~ ce)
5 5 c c c.
C)
2 2'2
(
-D'-
N v- 0
- T-T
U)U) CD) >1N
O
T
CoD t -t
_~
0 0 0 00 C 00000
C
CN C, I
OOC O
0O O
OOC
0 00 00 0 CC
CD .o CI co O (oCO D r
C)
to
CY)
jdCo C;acooCCc;
'a
C L-
I
O Co to0 o 0o 0o
CN
-
C)
Z5 'O -c
z CD C
C
WaW
IjJ UJ
X) Co Co Co Co Co,
t
-0
CDO (o CD O
0 cO
LO
5- - 0
M M C 0 C
- r-T cy r· C-
LWW
L LLWW
0U)
- t
-
2 00
C
U)U)
)
C')
-C
s sc
U)
U
C) N
) 0o) 0 O0
CO (.0 q-
N CY) TLO (D
W >
WLLU
UJ LLJ
>
>>>
WWWWW
LO
t
C
D
-
LO Co
J)
WWW
Ll
oo o o
3 5 oc C c c5
- CvT)NC
0 I
C) cN
(
c
s) a)
Cv) '
-
O
-
C O0 0 0
.
I
I
C
I,
.,
,
-
-
-
O U)
CO Co
NN NN N C N
C) Cv) C) C ) C
-
CO:CY)C
C'N
CO C)
C 0000
V
O L) L)
to
LO )O tO Lo LO It
'!-
0000C
00 0 00 C
Tl
ITT
0000
0000
o o CO
o 00
o C O0 0 00
0 Co 0 00 00 00T C co
oc 'I
C0
0 C Co
0 00
aq) cc0o 'IT
'I, T 1 "r 14
l' ' ' m '
~' ' ~' ml '~ ~1
131
D't C)( Ot
1
r O) 0 0 C N- -0 ) a) o Cr ) 00
o DD I-O I-DC) - CLO CO
- o)
T30)
o CD.0
-NCL0 n) C
)
(D
O
D
O
)) CO t LO CY) (.0 3 ) r- (N ) )
0)
D
U)
J
N C 0( r- D
u)
C) 0( D '0 '0 1) a) 0) N- o 10 D 0) 0) D (D C
s 0C;
- a). 0 . 00
0C
0 0O 0O rO
C.
.
0 0; 0 6 6 D)0O, O
6 C
It)~
'-
-00000
CY) D 00 CD
:
C)
ww
C
s
'a
C 2>
--
'.0(0
)
ct
1)0
(D 't
Z- -
C
M
2'
-2=
) CD
W
0
C
M
"
Cc
-
N C4 I- C
c
-
_0
=
a)))
Wa)
C'4 C "It
ct Co
N
-
liJ
L i
IWW
C C/
M
C
,e
Cr) 'O CO (OD
Cl)
c
C
)Z
.-
C)
C
-
M
== c
LO to
C
.I
U
LWWWJ
L
LWL LJ
CU
c
cs
-
Lo
- - cN
C
ii 0)0)0)002 (
WWW
F)0-
-
a) 2' 2'
?at a> Q
a, a,
> V' 0 .CC 0
)
CW C
W
'C '
2^ cuC4'
LO C
L LLI LU LL
WWWWW
Li W
I)
.D ,-
,
-' = -'=
a)
>
Ll
D O
joo666
slC
.
) O) C) (. CD
-- C
CN)
) OCD
000-C
D ) C) N N
i
O O O CO
't
U
C14 -V
O
C
- fl LO 'I
) WCC
_
'n n
rcV
VVCS
L.
C
. >-
lC 0
Q
2' W 2'
)
) 0
-
u >, > >>
LL U L LL
CC
2' 2
(
(D (CD ( O
C
I-
-
O '.
(CC(
OC
U)L
'4-
O C
O C
CO c
':1-
OOO-
oOOOC
'w"
~
~
x-
'0 IU) L O
'
'T-
CD O C(D
D O Co (D (O C
)) ) ) ) ) ) ) ) ) )0)
1rl
0 OO-0
O C
'-
"
(D (D C(
-
0000
L Ln O O n un
~-I_ r- fs I- r
U It
'
(0 CD
OC
.4
00000
(
(
LO(0 (0 It ( u)
V-
It-
-
V-
-
-
c
'-
C
U0I
0 00
-
-
COO
00 O
VI'
(O (0 U( It (
-
LO
(
I
'4
.)
UL .
0o
0Cc
'
V
(0 (0 It
V'
0 00
c
0 Co0 CO
0 CO
0 CO
0 aC 00 00
0 0 0 O 0 a Co
0CO
00 a
CC) OD CD ODCC
(
(
(
(0
mr l '~', 'e '' 'l
132
CO0
00 0 0
a
C
(0 (0 (T (T a, N
V-
-
"r-
u) LO " U) O
T I
1T t
O0 O 0 O
NN-Nl4--
00000 00000
O 0 C) O C
C
V- V-
- --s VIs
l VV-
(D(t C ( (D(
I-
T-
-
00000
CD CD C
(Da( O D (D C( CDCDo
C
t
O
CD
0)
C)
) 0C
O
0oOu
jddd
I.
) CY)
D
0
N- 0
oo '--wToCO N- oc N o CO ) n ) O
- O I- O'UI O
DcO
-N0 CV)C
i C 0 C 0 0=
N
3) (CD
C0 )
0 00 0C
0
- 0 0 0 0 00
O )t
U)
C)
u
C
N
C
CN
Ml
`
-
-
U) CI)C)
C CY)
L-_
CD
a) U
wL
C)
0LO
CO
C
O
2' a)a
W
2
LWLW
'
0
a)
lI
V
-
C
/
U
uz
C
UM
04T
C
ito
iI- CN C
M (0
Wa) ) ) u )
WWUIWW
O 0 CD
0 CD
00D
- r
o o0 0 0DOO CC CD
00000C
CD CD CD
O
CC CT CD CD 'CD Ct '
(O (.0
Cto
Ir
C
oo OL
j 0o 00
0
Cl
0
L
CD
C
)
) 0) 0) C 0) 0
O LOO'.0 )O t) Lr
CC CD cD C CS CD Cc
) C) C) C) CC
-
U) C) o
I-C
) O 0) N-c) C CO
c CDCO
) 0) ) 0 CDLO
0o o
65666
c5
o CO
o0
oo
0 - Lnd'
M
Q
I-
0 0,1N-- Lo
)
2:X,LL)
L
,
W UWWWW
C
C
N
C
)
s ii
?-)(D D
N5
0
Q
-v-
-
' N C) "T LOtCD
J
-t
COC) 't
- N-
cl) cl C C ci
- C 04 '
U) =
t
d
-T
Nv
ao, @, ia) a)
0 CO 00 CO cD CO O 0C 0D0 CO 00 CC
COCC ' C C) C) CV) C C C C C: Cr)
T
CC
O10O 't
) 0 1- Lo - -T
't
S W L W
.n LO LO ILO LO U)
1D LO U t UO ) C CO C
00 00 C0 00
1-0
'D -0 t
_~
3) 0) 0) 0) C) 0) ) 0) C) 0) ) 0
r - - N- N- - !
C
C
- CN
,- O
C
co m;'
t CO
co CD
T 5(V) GO
-
-
L-
C
.-
V
VS
0)
0)
a
)
00 0
OD
cO
CV) C)
C)
N
4
_;
_
L-
CD CD CD LO C
N- -
L)
- N- -
;
) IW Wi
WWiW
W LW
LiWW
UW
) 0) ) 0 0) or
_I.
VI
0 0 0 0- Nl- -
~-
C C
N C) T LD CD
) ) ) 0)
o) 0 3) 0) 0) 0) 0) C
-
)
00000
CO 00 00
C
00 cOD C
CD Cc 00 CO 0D CO CO CC cO Co CO OD CO Cc
CV) CO
C) CY)
)
C) ':
-,
C
C
C) CV) CV) C:
0 0 C 0 0 0 0 C OOr- OO
OC
OOOOOC 0 00 0 0 C
-VI
T
v
- N- N-
D CD CD CD C
IT,
.
V
ss s s s F N-
N- N- N- - N- N
0 CO 0CD CD0 O
C
CD Q
C)
-
CD C
CDctD to4:3CD
3' CD '4
co
Cl C
CC CD CD D CD CD C co
133
N,-
D CDC(D
oD
CD
C
(CDCO i
N- -
- - -
N- - N- N- - r
V- If
0 O O O 0 C
CD CD D CD
cD CO
CD coD CD C
D
C
V-
cD C>DCD CDC
CD CD co CD CO C'
oo ~
a) O0
O
O
o-
C) C
sO
r
C\ r vc-
oO
a) or: s
LO'DIU) LL)
C
CD
) C
c I-
0
a
7dd
CC
?
r-
llJ LL LI UJ 11j
(7
) av
)
) C3)
0
CO LO
DO
CO
0 U00
0o
o o 0- coLOU
oo
00 o00
000000
CO D
CD
O
D
cO (D CD (D (D D
'(0It(ItIt
( ( (cc)co It cI
134
For ease of inspection, the fractional coverage volumes provided by selected detector
loading patterns 1 2 in each reference array are plotted in Figures 5-23 through 5-27.
Coverage vs. Detectors (1440 TEU)
..
1.0
i
.·
lj
··
··
ii.
...· · li·'
··
·
i:
r.i .i
cFd:
i
i· ·
0.9
:·
"-
-s
-0
:
E
_= 0.8
.i
i
*··IL·
;I·1
:
i
03
::·
:
'·.
D
T:
.··
.;
i:
E
;
:pc·;
i·
L
m 0.7
·i·
i":-
1·
.t
i"
"
'?
;;·
· ··
i·C
,
""'
i.·.'';··i
1·
U
e1U
:
·.
1 -i
.J
0.6
':"'t'
:···
··
, l":ar:i
-- R65
-"·
'··85
:·,
--
"'
j
".
0.5
;I· r?·
"Ir i :I-;;'; r :·· i-···
· :;· i -;-·1·· -:-q-?-p-··i-?·;
- R_80
-R 85
-i
;··
;i i
:'··· :I'i:
;i- -7*XI*---n;r;
'::,;;:···
'····-
·. :·
··-· ::
Y-
iS!1""'.`
a
zr· '
iir..
jre
.it
.1·
0.4
?d
·;1 r
·! :
·-1
-- i·
0.3
1
2
3
4
5
6
7
8
9
10
11
Numberof Centerline
DeployedDetectors
Figure 5-24: Coverage vs. Detectors plot for the 1440 TEU array [Centerline]
12 When two or more loading patterns resulted in the same number of detectors being deployed, only the
result from the pattern with the highest fractional coverage was plotted.
135
R_-70
-- R_75
'·
Ila
R_45
R_50
R_55
-RR_60
i
.;·1..,.
j
---
't;',·r
i·
Coverage vs. Detectors (2496 TEU)
1.0
0.9
0.8
E
0
-e-- R_45
0.7
-- R50
Ol
R_55
- R60
R65
o 0.6
-* 0.5
R-70
-- R75
-R80
iL
I 0.4
R-85
R
0.3
0.2
0.1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Numberof CenterlineDeployedDetectors
Figure 5-25: Coverage vs. Detectors plot for the 2496 TEU array [Centerline]
Coverage vs. Detectors (3600 TEU)
r·:
1.0
y·
0.9
:(::·
·
:·
0.8
-:L
E
-e-- R_45
-- R_50
R_55
"R_60
--- R65
-- R_70
> 0.7
'::-"T:·.r: r·'-i;. -·. -· -. ·
0
:-:"
·ti ;·
·"
I:E4S?i'r
:·F-·
0
0.5
I
V//
0.4
*Q< r |
. A. .
In
~ ~ ~ ~~ ~~~
-·_LI
k a se nrrsS
a E :, W
z aa z ew.r s s s Ac;i·;-·;·t·e
r,·T·i-:n------·i·--r
-r~~~'·w'r;2;;,.
,·.·
.;·; ' ,,,: o,
·r·--·Y·--_
-;1
.
...;
0.3
"··."li·.:.:i:
0.2
1···-- ,- · ::r:...sar·::
'''
;r-·i·::r*ma··.i· -:;-··zlni
.
2
3
I
I
zm.X;,,;_
R-R-80
--- R 85
::
Hill
0.1 t
1
--- R75
·· ?
yi
:·: IPSP, i--:Q,;··:1··
4
5
6
''c
.:
.··i:
:·bi r· :
i"t'i·
"
: 2*
'
11
12
L
;··
...
`;='"f
il.·'.
\1J":;'"- iii.it
.· -. ,··
·-'"
-.
:
7
8
9
10
13
14
Numberof CenterlineDeployedDetectors
Figure 5-26: Coverage vs. Detectors plot for the 3600 TEU array [Centerline]
136
w
Coverage vs. Detectors (4800 TEU)
1.0
0.9
0.8
E
0.7
-eR_45
- R50
o 0.6
I- R60
e
o0
R-55
0
R-65
R70
I--R 75
R-80
-- R 85
U.
0
-
--
0.4
0.3
0.2
0.1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Numberof CenterlineDeployedDetectors
Figure 5-27: Coverage vs. Detectors plot for the 4800 TEU array [Centerline]
Coverage vs. Detectors (6460 TEU)
1.0
-·:·
·;··?.
0.9
I·
·-L;
.i-·
`··
`I
i
-·I-··'
'I'·:"r"
:·
0.8
0
E
2 0.7
.·'
:·
:1
·
0.6
.
i
,·
r--)
0.5
irbi_.
;
.· ·· ·
·i;
·
·.
.·-.- r-l · Ir
-·=.?.-·
'
.··
"' -··
··· ---
::
'I
:: - · i d:
·1-
i·
·:-
LI 0.3
;
·I
,i-. -"
·
;
·
·
·
:·;'
··
= :
c· ,.i
:·
t::
ir:
Y.··,
·'!
...
i
.'T·-'
i:-
:
:. ···
':
"::·
:·'
R65
··
I
0.1
-
s··
., ·-··Z;'·
... I
I ··i".·:.·:.:?·':j"i·
:-
:·--YL-rf"C:
i;. .
0.2
"-:;'i":':'
-·; .r ·-i
.. · ·. ·
R_50
R_55
I R60
--- R_70
+-- R_75
R_80
-;r
;·:·-.a
0.4
R 45
--
,·
·..XII:ri.rr.:·.rl
c
-
·
.,c--.ke
: ·i 3'.'
··
.·
' -·-. :;-·
I*' -1 '-" · "1";`::7'F:':"'' ":'
· ; "':':i·1·':· .,' "
·'·
0.0
3
4
5
6
7
8
9
10
11
12
13
14
15
Numberof CenterlineDeployedDetectors
16
17
18
19
20
Figure 5-28: Coverage vs. Detectors plot for the 6460 TEU array [Centerline]
137
-- R85
The number of centerline deployed detectors needed to provide 75%, 85%, and
95% coverage for each evaluated range and reference array are shown in Table 5-11.
Table 5-11: Estimated number of detectors needed for various scenarios [Centerline]
Centerline
Depi
Range (ft)
45
50
55
60
oment
Coverage
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
Reference Array Capacity (TEU)
1440
2496
3600
4800
6460
5
7
10
5
5
7
4
5
5
4
4
5
3
10
N/A
N/A
6
9
N/A
6
6
10
5
6
7
5
N/A
N/A
N/A
8
13
N/A
7
8
N/A
5
6
9
5
N/A
N/A
N/A
N/A
N/A
N/A
12
N/A
N/A
7
12
N/A
6
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
12
N/A
N/A
8
65
0.85
4
5
5
7
15
70
0.95
0.75
0.85
0.95
0.75
4
3
4
4
3
6
4
5
5
4
7
4
5
6
4
14
4
6
8
4
N/A
7
8
19
6
75
0.85
3
5
4
5
7
0.95
0.75
0.85
0.95
0.75
0.85
0.95
4
2
3
3
2
3
3
5
3
4
5
3
4
4
5
4
4
5
3
4
4
7
4
5
7
4
4
5
9
5
6
8
5
5
6
80
85
Depending on the effective range of the detection unit, there are some levels of
coverage for certain reference arrays that cannot be achieved through the use of detectors
deployed exclusively along the centerline (denoted in Table 5-11 as N/A). However, in
cases where the range is sufficient to provide desirable coverage using only centerline
deployment, the deployment efficiency resulting from the preferential placement
attendant to this approach allows high levels of coverage to be achieved with a significant
economy of detection units.
138
5.6 Deployment Comparison
The most germane comparison that can be drawn between the deployment
strategies examined in the previous sections is to contrast the number of detectors
required by each method to achieve given levels of fractional coverage when faced with
identical range and array capacity scenarios. Since constrained deployment was not
found to hold any significant efficiency advantages over random deployment (despite its
stealth and logistical disadvantages), only random and centerline deployment will be
considered in the following analysis.
Table 5-12 shows the number of detectors required for each scenario using both
random and centerline deployment. It also tabulates the ratio of randomly deployed
detectors to centerline deployed detectors for each case so that a measure of the
efficiency cost of randomization can be obtained.
139
Table 5-12: Random vs. Centerline deployment comparison
Random vs.
Reference
Centerline
Ranae ftl Coveraae
.I
-- '113
0.75
0.75
45
0.85
0.95
I
50
32
IZn A,
IIIf
v. I'~ '" E
0.85
0.95
I
I
55
I
I
60
65
70
75
80
85
U.
7
I.
1440
R
C IR/C
5D2,-I
13
5 2.6
19 7 2.7
I
10
15
5
25
7
Ia ,
3.2
v
3.0
23
9
A
#
3.6
39
.
Ile_
L.31
I
'I
4
13
0.85
12
5
2.4
0.95
19
5
3.8 30
1n
VI 7
I1 7I
A
-TI
I I.
19
I
.v^I
v
2.6
n
'1
I lele-I
6
31
13
14
3.2
7I
2.4
25
8
1 I
1I
1I1
.&.I
le__U
3.1
.
I .;
rJ
N
Z.
II J. V
n I I ga
4
2.5
15
6
2.5
20
6
3.3
26
0.95
15
5
3.0
25
7
3.6
34
9
3.8
43
0.75
6
3
2.0
9
5
1.8 12
5
2.4 15
0.85
8
4
2.012
0.95
14
4
3.5
21
6
V,
52
88
IZ
I
I
I
,fan
ati
41
70
I e-v
1 'A
r_-
12
22
33
6
2.5 20
I
II
I -. W
55
3.4
20
7
2.9
27
7
3.9
34
14
2.4
45
5
27
?7
31
10
3.5
117
53
0.85
2.417
59
68
40
I
6460
C
C I
R
69
OR
I
4800
C IRIC
37
52
88
9
&.v
'
10
10 3.0 41 :
I II I
R
.v
53
U
(TEU
40
69
50
/
-v v. '
Array Capac
3600
R
C IR/C
30
2496
R
C IR/C
21 10 2.1
31
15 1.8
0.75
5
3
1.7
8
4
2.0
10
4
2.5
13
4
3.3
16
7
0.85
7
4
1.8
11
5
2.2
14
5
2.8
18
6
3.0
22
8
2.8
0.95
0.75
11
5
4
3
2.8
1.7
18
7
5
4
3.6
1.8
23
9
6
4
3.8
2.3
29
11
8
4
3.6
2.8
38
14
19
6
2.0
2.3
0.85
6
3
2.0
9
5
1.8
12
4
15
5
3.0
18
7
2.6
0.95
0.75
0.85
0.95
10
4
6
9
4
2
3
3
2.5
2.0
2.0
3.0
15
6
8
14
5
3
4
5
3.0
2.0
2.0
2.8
19
8
10
17
5
4
4
5
24
9
13
21
7
4
5
7
3.4
2.3
2.6
3.0
31
12
17
29
9
5
6
8
3.4
2.4
2.8
3.6
3.0
3.8
2.0
2.5
3.4
2.3
0.75
4
2
2.0
5
3
1.7
7
3
2.3
8
4
2.0 10
5
2.0
0.85
0.95
5
8
3
3
1.7
2.7
8
12
4
4
2.0
3.0
9
15
4
4
2.3
3.8
11
19
4
5
2.8
3.8
15
25
5
6
3.0
4.2
Comparisons between random and centerline deployment could be rendered moot
if the centerline strategy is definitively judged to be logistically infeasible or if it is
determined to be an unacceptable compromise of the stealth characteristics that are so
important to the ship based approach. Additionally, centerline deployment, by itself,
would presumably stop receiving serious consideration if the effective detection range is
found to be too low to provide the minimum acceptable detection coverage for all vessels
of interest. That said, Table 5-12 clearly illustrates the efficiency gains realized through
centerline deployment. Table 5-13 shows the average random to centerline, R/C, values
for the three analyzed fractional coverage volume targets.
140
Table 5-13: Average R/C values
Fractional Coverage Volume
R/C
0.75
0.85
0.95
2.249
2.531
3.306
As Table 5-13 illustrates, the efficiency advantage enjoyed by centerline deploy
increases as the desired level of coverage increases. This stems from the diminishing
marginal returns phenomenon associated with random deployment. Unlike the random
case, when additional detectors are deployed along the centerline to achieve a higher
level of fractional detection coverage they will preferentially "fill in" uncovered or
sparsely covered areas of the container array. Therefore, marginal returns are greater
when employing the centerline approach and as a greater number of detectors are added
to provide higher levels of coverage this amplifies the efficiency advantages over random
deployment.
5.7 Total Detector Estimates
To estimate the total number of detectors required to field a comprehensive
system (i.e. to cover every inbound commercial containership) the data compiled in the
previous sections must be combined with information from the shipping industry and
U.S. ports. If all classes of containerships called on U.S. ports with uniform frequency
then the capacity distribution derived in Chapter 4 could be used directly to determine the
total number of detectors. Some types of container vessels, however, make more port
calls than others, so these vessels should receive a higher importance weighting in the
analysis. Table 5-14 shows the relative frequency of calls at U.S. ports broken down by
vessel size (i.e. container capacity) [MARAD, 2000] and the number of calls that these
vessel classes would make out of the CY 2003 call total of 17287 [MARAD(1), 2004].
Table 5-14: U.S. port calls by vessel capacity
Relative Freq.
Calls
<2000
0.3491
6035
Vessel Capacity (TEU)
2001-3000 3001-4000 4001-5000
0.2853
0.2129
0.1147
4932
3680
1983
141
>5000
0.038
657
Total
1
17287
Since one of the reference arrays described in the previous analysis fits
approximately in the middle of each of the capacity bins shown in Table 5-14, the
number of detectors found to be required to cover a given reference array can be
considered roughly representative of the entire binned vessel class. Estimates for the
total number of detectors needed for comprehensive deployment can now be made using
the following expression,
(13)
DetTotal =
Avgclv
i
where Avgc/vis the average number of calls made per vessel, Ci is the number of calls for
a given vessel class, and Deti is the number of detectors required for a given vessel class.
In 2003, the average number of calls made by containerships was 17 [MARAD(1), 2004].
Since the detection units have no inland destination and are intended solely for
deployment aboard containerships, once they are discharged from a given vessel they can
be redeployed with minimal downtime. Downtime that could be required for
maintenance and calibration is not considered. For the purposes of this analysis, it is
assumed that turn-around can occur immediately, so the discharged detection unit can be
shipped out (i.e. transported back to a foreign port where it can be deployed for its
intended purpose) without delay. It should be noted that the export leg of the detection
unit's voyage could be used to perform performance reliability tests and to monitor for
the unlikely event that a fissile or radiological source was being smuggled out of the
United States, for use abroad. Stops between foreign ports on the export leg could also
be used to monitor for radioactive material movement abroad, which could discourage or
thwart international smuggling attempts and augment the ability of other nations to
defend against nuclear or radiological attack.
Eq. (13) was applied to the results from the random and centerline deployment
simulations and estimates for the total number of detectors that would be necessary using
either deployment strategy are shown in Table 5-15.
142
Table 5-15: Total detector estimates
Total Detector
II
I Estimoatea
Fatimtnt
-- 7 ---
I Rnna
,
,-
..
45
fft
nvarnna
0.75
0.85
0.95
I
GaI%
23798
33091
55589
0.75
18412
25384
43112
0.75
0.85
0.95
7
14705
20385
33211
4O.x4
0.85
16539
0.95
27079
0.75
0.85
0.95
0.75
9861
13378
22612
8395
0.85
11657
4962
0.95
0.75
18957
7578
5837
3790
75
0.85
0.95
0.75
9784
16012
6406
4235
5117
3106
80
0.85
8789
3906
0.95
14507
4724
0.75
0.85
5706
7907
2890
3751
0.95
12751
3906
55
60
65
70
85
I
l ll 1
0.85
0.95
50
I
Deployment Strategy
DAnrm
__.,
I
_
_
__
_
4607
5349
3828
Table 5-15 shows that if only purely random or purely centerline deployment strategies
are being considered, the option space is limited if the effective detection range of the
containerized units is less than 70 ft. An additional advantage to units with effective
ranges equal to or greater than 70 ft is the significant reduction in the number of detectors
required to provide any of the evaluated fractional coverage volumes. Table 5-15 also
demonstrates the reduction in detection units required for full deployment if the fractional
coverage volume is chosen to be less than 95%.
143
Chapter 6: Summary, Conclusions, and Recommended Future Work
6.1 Summary
The rise of highly mobile, religiously motivated transnational terrorist
organizations that are not restrained by conventional means of deterrence has changed the
dynamics of the threat that nuclear weapons pose to the United States. The international
commercial container trade that delivers over 19,000 cargo containers to U.S. ports every
day is one possible avenue that could be exploited by a terrorist organization to mount an
unconventional nuclear attack. Due to the unique power and range of nuclear weapons,
defensive measures that have been envisioned or deployed that would not detect threats
until they come ashore at U.S. ports do not provide adequate protection against attacks
that are planned and executed by rational, determined adversaries.
We propose a new ship-based approach to fissile material detection where large
effective area, commercial off the shelf, radiation detectors, enhanced with imaging
capabilities, are enclosed in standard, non-descript cargo containers and shipped
alongside commercial containers. When deployed in limited numbers aboard commercial
vessels the detection units would passively measure any nuclear signature emitted by
nearby containers with count times limited only by the duration of the voyage. By
outfitting the dedicated detection units with communication hardware, identification and
notification of a potential threat could be made while the danger was still safely removed
from U.S. shores.
To better characterize the feasibility of the proposed ship-based approach,
"external" uncertainties associated with the deployment environment and potential modes
of deployment were investigated. Characteristics of the deployment environment that
were evaluated included the count times that would be available on container import
voyages terminating at U.S. ports, the container capacities of the vessel fleet that ply the
international container trade, and the average densities of cargo being imported to the
U.S. Table 6-1 summarizes the salient results of these analyses.
144
Table 6-1: Results summary for deployment environment analyses
Vessel Capacity Avg. Density*
Count Time (days)
(TEU)
(q/cmA3)
To NY
To LA
Mean
3047
0.1977
19.2
13.3
Median
2722
0.1708
19.1
13.3
25th
75th
1666
4173
0.1664
0.2208
21.7
17.2
15.1
11.9
95th
99th
6204
6782
0.2620
0.2998
15.9
15.6
11
10.8
* 0.1977 g/cm3 corresponds to 15.23 metric tons / 40'container
To study different potential modes of deployment, a Matlab-based simulator was
developed. The simulator was used to evaluate and compare detection coverage
efficiencies for fully random detector deployment, partially constrained deployment
where containerized detection units could not be placed along the surface of container
array, and fully constrained deployment where detectors could only be placed along the
centerline of the array. Partially constrained deployment was not found to have any
particularly desirable attributes. The number of detection units required to provide
various degrees of coverage for random and centerline deployment are summarized in
Tables 6-2 and 6-3 respectively. Coverage is defined as the fractional volume of a
vessel's container array that is within the effective detection range of one of the deployed
containerized detection units. The effective detection range is the expected maximum
distance at which a source can be confidently and reliably detected in a given count time,
under realistic conditions.
145
Table 6-2: Random deployment results summary
-
Reference ArravCaoacitv(TEUI
-
Random Deployment
Range(ft) Coverage
0.75
45
0.85
0.95
0.75
50
0.85
0.95
0.75
55
0.85
0.95
0.75
60
0.85
0.95
0.75
65
0.85
0.95
0.75
70
0.85
0.95
0.75
75
0.85
0.95
0.75
80
0.85
0.95
0.75
85
0.85
0.95
1440
2496
3600
4800
6460
13
19
32
11
15
25
9
12
19
7
10
15
6
8
14
5
7
11
5
6
10
4
6
9
4
5
8
21
31
50
17
23
39
13
19
30
11
15
25
9
12
21
8
11
18
7
9
15
6
8
14
5
8
12
30
40
69
22
31
53
18
25
41
15
20
34
12
17
27
10
14
23
9
12
19
8
10
17
7
9
15
37
52
88
29
40
69
23
31
53
18
26
43
15
20
34
13
18
29
11
15
24
9
13
21
8
11
19
59
68
117
37
52
88
30
41
70
24
33
55
20
27
45
16
22
38
14
18
31
12
17
29
10
15
25
TotalDetectors
23798
33091
55589
18412
25384
43112
14705
20385
33211
11951
16539
27079
9861
13378
22612
8395
11657
18957
7578
9784
16012
6406
8789
14507
5706
7907
12751
Table 6-3: Centerline deployment results summary
I
eployment I
ICenterl-neDeployment
45
50
55
60
65
70
75
80
85
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
__ntene
..
1440
5
7
10
5
5
7
4
5
5
4
4
5
3
4
4
3
4
4
3
3
4
2
3
3
2
3
3
ReferenceArrayCapacity(TEU)
.
I
.
I
2496
3600
4800
10
N/A
N/A
6
9
N/A
6
6
10
5
6
7
5
5
6
4
5
5
4
5
5
3
4
5
3
4
4
N/A
N/A
N/A
8
13
N/A
7
8
N/A
5
6
9
5
5
7
4
5
6
4
4
5
4
4
5
3
4
4
146
N/A
N/A
N/A
N/A
N/A
N/A
12
N/A
N/A
7
12
N/A
6
7
14
4
6
8
4
5
7
4
5
7
4
4
5
6460
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
12
N/A
N/A
8
15
N/A
7
8
19
6
7
9
5
6
8
5
5
6
5349
3828
4962
6837
3790
4235
5117
3106
3906
4724
2890
3751
3906
Tables 6-2 and 6-3 show that the geometrically optimal centerline deployment provides
significantly more efficient detection coverage than the stealthier and more logistically
appealing random deployment. The efficiency advantage of centerline deployment is
evidenced by the finding that an average of 2.249, 2.53 1, and 3.306 times more randomly
deployed detection units are required to provide 75%, 85%, and 95% fractional
coverages, respectively, for vessels with a given container array. The preceding tables
also demonstrate the considerable benefit to developing detection units with an effective
detection range equal to, or greater than, 70 ft. Units with ranges at or exceeding 70 ft.
will yield maximum flexibility in terms of deployment options and will significantly
reduce the number of units required to cover a given vessel and to field a comprehensive
ship-based detector network.
6.2 Conclusions
Since this work was performed as one element of an integrated effort, not all of
the calculations and evaluations documented in this thesis may carry significant relevance
and meaning when viewed alone. These results will be combined with, and serve as
input to, ongoing work being conducted by Gallagher at MIT on system design and
performance modeling. The end product of this continuing effort will yield crucial
information regarding the expected performance of the detection units and the overall
efficacy of the ship-based approach. Despite the essentially unfinished nature of system
development, there are a number of notable conclusions that can be drawn strictly from
the analysis presented and discussed in this document.
First, and perhaps most importantly, none of the results obtained in the preceding
analyses serve to discredit the overall feasibility of the ship-based approach. A
primary objective of this thesis was to assess the practical viability of this new
detection methodology and nothing was discovered that suggested the ship-based
approach could not be viable and effective if prudent design and deployment
decisions are made.
147
Mean count time estimates for the representative East Coast and West Coast ports
were particularly encouraging. With an average of 19.2 days and 13.3 days of
available count time for voyages to New York and Los Angeles respectively, the
ship-based detection units will have a lengthy window of opportunity to passively
detect incoming fissile material and communicate warning to responders while the
threat is still safely at sea.
The results of deployment simulation highlighted the effective detection range of
containerized units as being especially important to promoting and ensuring the
viability of the ship-based approach. Special consideration should be paid to
maximizing this parameter during upcoming design and optimization activities.
Design decisions that increase the expected detection range at the expense of unit
costs should be vigorously examined in light of the dramatic reductions in per
vessel and total detectors required as effective range was increased. The observed
relationship between the required number of detectors and the effective range
suggests that while unit costs may increase as range enhancing features are
incorporated, the total system costs could fall as less detectors are required on the
whole.
Simulation also helped to quantify the efficiency costs associated with random
deployment. While a purely random deployment strategy is very desirable from
both stealth and logistical standpoints, the use of this approach necessitates the
deployment of 2.2 to 3.3 times more detectors (depending on the fractional
coverage target) than the less covert strategy of deploying detection units only
along the ship's centerline. This inefficiency could become quite costly.
Therefore, some combination of random and centerline deployment may prove to
be the most attractive strategy. In such a "hybrid" deployment scenario, if even a
small number of detectors could be deployed along or near the array's centerline
with the remaining detectors randomly distributed, an important degree of stealth
would be preserved by the random component and a helpful boost in efficiency
will be afforded by the centerline component.
148
6.3 Recommendations for Future Work
The deployment strategies described and modeled in this thesis were selected to
represent archetypal cases useful in studying the fundamental trade-off between
deployment stealth and coverage efficiency. Random deployment is at one end of the
spectrum, being the stealthiest approach, but having less than optimal efficiency.
Centerline deployment (i.e. fully constrained placement of detectors along the ship's
centerline) resides at the opposite end of the spectrum, affording optimal efficiency, but
being among the least covert of any potential strategies. Simulations documented in
Chapter 5 provide some quantitative insights into the trade-offs involved when going
from one end of the deployment spectrum to the other. This analysis, however, was
somewhat divorced from important practical considerations that arise from the common
practices and capabilities of the international shipping trade. For instance, it is unclear
whether centerline deployment would be logistically feasible in practice. Therefore, a
clear priority for any future deployment analysis should be to conduct more in-depth
consultations with individuals possessing intimate knowledge of the shipping trade
(particularly the loading and discharging of containerships) to better understand what
types of placement constraints are and are not practicable. This practical knowledge is
essential to understanding the true performance capabilities of a ship-based system and to
developing an effective deployment strategy that can be reliably implemented in the real
world.
Future deployment modeling conducted either to refine the results of this analysis
or to study alternative deployment strategies could employ an enhanced version of the
Monte Carlo simulation codes used to produce the results presented in this thesis.
Simulation codes used in this analysis (and documented in Appendix B) assumed that
detectors could be placed anywhere within a container being used as a dedicated
detection unit. This assumption saved considerable computation time but also created the
opportunity for unphysical situations (e.g. multiple detectors in a single container) to
arise that underestimated the actual performance of the ensemble of deployed detectors.
149
Reality would be more accurately modeled if the locations where detectors could be
randomly placed were limited to the centerpoints of simulated containers. Output
distortions caused by double-assignment situations would be eliminated with this
modification. Additionally, by imposing a minimum separation distance between
detectors (i.e. the distance separating the centers of adjacent containers) better overall
distribution should be observed. Therefore, the enhanced simulation would be expected
to show better and more realistic coverage efficiencies than the results shown above.
Another assumption used in deployment modeling that warrants further attention
is the geometry of the coverage volume provided by deployed detectors. In the preceding
analysis, this volume was represented by a perfect sphere centered at a detector and
having a radius equal to the effective detection range of the unit. A focus of future efforts
should be to investigate factors that morph or distort this idealized sphere. This includes
better characterization of important radiation transport phenomena, such as the effects of
potential radiation streaming through tiny openings, or "pinholes", in commercial cargo
packed in containers. More thorough understanding of these mechanisms can lead to
more realistic and appropriate coverage patterns that can be incorporated in future
performance and deployment models.
Another useful extension of the work presented above would be to model a
number of different hybrid deployment scenarios where some detectors were placed
along the ship's centerline (assuming this mode of deployment is found to be practicable)
and the balance were randomly distributed. By performing parameter studies, an optimal
ratio or mix of centerline to random detectors may be identified. The results from this
optimized hybrid deployment could then be compared to the results of pure random and
pure centerline deployment.
Some of the results presented and discussed in this thesis have direct and
important implications for the on going design and performance assessment activities
being conducted by Gallagher at MIT. One outcome with direct bearing on the
continuing design process is the pronounced benefit of detectors that can achieve
150
effective detection ranges equal to, or greater than, 70 feet. Results of the parameter
study undertaken as part of the deployment simulation demonstrated that significant gains
in coverage efficiency and deployment flexibility were realized when detection units had
effective ranges of 70 ft or higher. These findings strongly suggest that any available
means to augment the detection range of the containerized detection suite should be
investigated and seriously considered. Even design features that enhance range while
increasing unit costs should be considered since the eventual reduction in the number of
longer-range detectors required to provide a given degree of coverage may ultimately
offset the unit cost increases.
Finally, while computer simulations are very instructive in guiding the design
process and estimating the performance of the proposed ship-based containerized
detection units, there is a limit to what can be confidently demonstrated on the strength of
computer modeling alone. Therefore, at the earliest practical juncture, a full-scale
prototype of a containerized unit, complete with a full detection suite, should be built and
vigorously tested in environments as close to those that would be realistically
encountered as possible.
151
References
Albright, D., O'Neill K. (eds.), The Challenges of Fissile Material Control, Institute for
Science and International Security Press, Washington D.C., 1999.
Baryshevsky, V.G., A.A. Khrutchinsky, V.I. Moroz, M.D. Dezhurko, "Gamma-ray
Spectroscopic System for Remote Detection and Monitoring of Fissile Materials," IEEE
Trans. on Nucl. Sci., Vol. 41, August 1994.
Bunn, M., A. Weir, J. Holdren, "Controlling Nuclear Warheads and Materials: A Report
Card and Action Plan," Nuclear Threat Initiative, March 2003.
Bunn, M., J. Holdren, "Managing Military Uranium and Plutonium in the United States
and the Former Soviet Union," Annu. Rev. Energy Environ., Vol. 22, November 1997.
Carter, A., J. Deutch, P. Zelikow, "Catastrophic Terrorism," Foreign Affairs, Vol. 77,
December 1998.
DOE (Department of Energy), "Additional Information Concerning Underground
Weapon Test of Reactor-Grade Plutonium," DOE Openness Press Conference Fact
Sheets, Washington, D.C., June 27, 1994.
Emsley, J., The Elements 3 rd Ed., Oxford University Press, New York, 1999.
Evans, R., The Atomic Nucleus, McGraw Hill, New York, 1955.
Fetter(l),
S., V. Frolov, M. Miller, R. Mozely, O.Prilutskii, S. Rodionov, R. Sagdeev,
"Detecting Nuclear Warheads," Science and Global Security, Vol. 1, No. 3-4, 1990.
Fetter(2), S., V. Frolov, O. Prilutskii, R. Sagdeev, "Appendix A: Fissile Material and
Weapons Design," Science and Global Security, Vol. 1, No. 3-4, 1990.
Fetter(3), S., T. Cochran, L. Grodzins, H. Lynch, M. Zucker, "Gamma-Ray
Measurements of a Soviet Cruise-Missile Warhead," Science, Vol. 248, May 1990.
Fetter(4), S., R. Mozely, "Appendix B: Emission and Absorption of Radiation," Science
and Global Security, Vol. 1, No. 3-4, 1990.
Frank, M., S. Prussin, P. Peterson, M. Tobin, "A Monte Carlo Model of Sea-Level
Neutron Background: Directionality, Spectra, and Intensity," Journal of Radioanalytical
and Nuclear Chemistry, Vol. 249, December 2000.
Gopalakrishnan, A., "Evolution of the Indian Nuclear Power Program," Annu. Rev.
Energy Environ., Vol. 27, November 2002.
152
Gosnell, T., "Detecting Fissile Material: Limitations of Current Technology,"
presentation for the Alternative Signatures for Detecting Fissile Materials Workshop,
Livermore, CA, March 29, 2000.
Hammond, World Map, International Collector's Series Wall Map, Hammond
Publishing, 1999
Hoffman, B., "Holy Terror: Implications of Terrorism Motivated by a Religious
Imperative," Studies in Conflict and Terrorism, Vol. 18, December 1995.
IAEA (International Atomic Energy Agency) "IAEA Safeguards Glossary, 2001
Edition," International Nuclear Verification Series No. 3, 2001.
Ircha, M., "Handling Tomorrow's Mega-Size Container Ships," Association of European
Civil Engineering Facilities Newsletter, January 2002.
Kang, J., F. Von Hippel, "U-232 and the Proliferation-Resistance of U-233 in Spent
Fuel," Science and Global Security, Vol. 9, 2001.
Knorr, Klaus, "Controlling Nuclear War," International Security, Vol. 9, No. 4, Spring
1985.
Krane, K, Introductory Nuclear Physics, John Wiley & Sons, New York, 1988.
Laqueur, W., "Terror's New Face," Harvard International Review, Vol. 20, Fall 1998.
Lee, R., Nuclear Smuggling: Patterns and Responses, Parameters, Vol. 33, Spring 2003.
Lok, C. "Cargo Security," Technology Review, Vol. 107, June 2004.
MacGregor, "Now Samsung Steps Up to 8100 TEU Series," MacGregor News, Autumn
2003.
MARAD(1), "Vessel Calls at U.S. Ports: 2003," U.S. Department of Transportation
Maritime Administration, July 2004.
MARAD(2), "Top 30 U.S. Container Ports by Direction CY 2003," U.S. Department of
Transportation Maritime Administration, available online at http://www.marad.dot.gov/
Marad Statistics/Container-03.htm, March 2004.
MARAD(3), "Top 25 Container Trading Partners CY 2003," U.S. Department of
Transportation Maritime Administration, available online at http://www.marad.dot.gov/
Marad Statistics/PIERS TRADING PARTNERS 2003.pdf, April 2004.
153
MARAD, "Top 15 U.S. Containership Ports by Port Calls and Vessel Size (CY 1999),"
U.S. Department of Transportation Maritime Administration, May 2000.
MARAD, "Top 25 U.S. Ports by Direction (CY 2001)," U.S. Department of
Transportation Maritime Administration, available at http://www.marad.dot.gov/
Marad Statistics/C-Port-Dir.html, October 2002.
Mark, C., "Reactor-grade Plutonium's Explosive Properties," Nuclear Control Institute,
available online at www.nci.org/NEW/NT/rgpu-mark-90.pdf, August 1990.
Mark, C., T. Taylor, E. Eyster, W. Maraman, J. Wechsler, "Can Terrorists Build Nuclear
Weapons?" Nuclear Control Institute, 1987.
Morgan, M., "The Origins of the New Terrorism," Parameters, Vol 34, Spring 2004.
NCT (National Commission on Terrorism), "Countering the Changing Threat of
International Terrorism: Report of the National Commission on Terrorism," Government
Printing Office, 2000.
NERAC (Nuclear Energy Research Advisory Committee), "Annex: Attributes of
Proliferation Resistance for Civilian Nuclear Power Systems," issued by the U.S.
Department of Energy, October 2000.
NIMA (National Imagery and Mapping Agency), "Publication 151 - Distance Between
Ports," issued by the U.S. Department of Defense, 2001.
NTI (Nuclear Threat Initiative) "Technical Background: A Tutorial on Nuclear Weapons
and Nuclear-Explosive Materials," NTI Research Library, available online at
http://www.nti.org/e research/cnwm/overview/technical2.asp, accessed April 2003.
O'Brien, K., H. Sandmeier, G. Hansen, J. Campbell, "Cosmic Ray Induced Neutron
Background Sources and Fluxes for Geometries of Air Over Water, Ground, Iron, and
Aluminum," Journal of Geophysical Research, Vol. 83, January 1978.
Oetting, F., "Average Beta Energy of 24 1 Pu by Calorimetry," Phys. Rev., Vol. 168, April
1968.
Peurrung, A. "Predicting 232 U Content in Uranium," PNNL-12075, issued by Pacific
Northwest National Laboratory, December 1998.
Sampson, E.A., J.L. Parker, "Application of Gamma-ray Spectrometry in the
Quantitative Non-Destructive Assay of Special Nuclear Materials," Nucl. Instr. and
Meth., Vol 299A, December 1990.
Stone, R., "Radiological Terrorism: New Effort Aims to Thwart Dirty Bombers,"
Science, Vol. 296, June 2002.
154
Tozer, D., "Ultra-Large Container Ships: the Green Ships of the Future?" Shipping
World & Shipbuilder, October 2003.
Turekian, K., Oceans, Prentice Hall Scientific, 1976.
Wijnolst, N., M. Scholtens, F. Waals, Malacca-max: The Ultimate Container Carrier,
Delft University Press, 1999.
WNA (World Nuclear Association), "Information and Issue Briefs: Thorium," World
Nuclear Association, available online at http://world-nuclear.org/info/inf62.htm,
November 2003.
WSC (World Shipping Council), "In-Transit Container Security Enhancement," World
Shipping Council, available at http://www.worldshipping.org/security white paper.pdf,
September 2003.
155
Appendix A
156
Vessel name
Capacity
Speed
Vessel name
Yun Long
A.P. Moller
6600
(knots)
24.6
Agnete Maersk
Albert Maersk
Alva Maersk
Amersham
Axel Maersk
Caroline Maersk
Carsten Maersk
Cecilie Maersk
Charlotte Maersk
Chastine Maersk
Chesham
Christian Maersk
Claes Maersk
1100
1100
1100
658
18.0
18.0
18.0
14.8
6600
6600
6600
24.6
24.6
24.6
Zhao Gang No.1
Zhao Qing He
Zhen He
Zhen Wu
1750
19.0
Zhi Shan 1
6600
6600
658
24.6
24.6
Zhong Hang 608
(TEU)
-
Clara Maersk
1550
1750
1550
Clementine Maersk
Clifford Maersk
Columbine Maersk
Cornelia Maersk
Cornelius Maersk
6600
6600
6600
6600
Denham
658
4300
4300
4300
4300
4300
2840
2840
2840
2840
6000
6000
6000
6000
6000
3700
3700
3700
3700
Dirch Maersk
Glasgow Maersk
Gosport Maersk
Grasmere Maersk
Greenwich Maersk
Jens Maersk
Jeppesen Maersk
Johannes Maersk
Josephine Maersk
Karen Maersk
Kate Maersk
Katrine Maersk
Kirsten Maersk
Knud Maersk
Laura Maersk
Laust Maersk
Leda Maersk
Lexa Maersk
Lica Maersk
Luna Maersk
Madison Maersk
Maersk Aberdeen
Maersk Ahram
Maersk Antwerp
Maersk Arun
Maersk Atlantic
Maersk Avon
Maersk Carolina
Maersk Gairloch
6600
Zeus
Zhong Hang 905
Zhong Hang 909
Zhong Hang 912
Zhong Hang 913
Zhong Hang 915
Zhong Hang 916
Zhong Hang 917
Zhong Hang 919
Zhong Hang 920
24.6
24.6
24.6
24.6
14.8
24.2
24.2
24.2
24.2
24.2
22.4
22.5
22.5
23.0
24.6
24.6
24.6
1100
1100
1100
1100
1100
1100
18.0
18.0
18.0
18.0
18.0
18.0
4300
4300
24,20
24.2
Speed
(TEU)
(knots)
12.0
83
345
2728
72
16.5
3801
108
36
36
80
80
80
60
104
104
120
22.5
96
118
118
118
4215
22.0
1668
15.5
Zhu Chuan 992
Zhu Hai 203
ZIM Adriatic
ZIM America
42
ZIM Asia
ZIM Barcelona
72
2810
19.0
3029
3429
3429
4992
21.0
21.7
21.7
24.0
4992
3029
3429
2998
2606
3429
3005
2810
24.0
21.0
21.7
21.0
21.0
21.7
20.0
19.0
3029
3429
21.0
21.7
3029
3029
3429
3029
21.0
21.0
21.7
21.0
ZIM Buenos Aires
ZIM California
ZIM Canada
ZIM China
ZIM Dalian
ZIM Eilat I
ZIM Europa
ZIM Florida
ZIM Haifa I
ZIM Hong Kong
ZIM Iberia
ZIM Israel
ZIM Italia
ZIM Jamaica
ZIM Japan
ZIM Keelung
ZIM Korea
ZIM Mediterranean
ZIM New York
ZIM Pacific
157
12.6
20.5
Zhong He
Zhuang He
ZIM Atlantic
24.6
3700
4300
II
Zhong Hang 901
Zhong Hang 903
14.8
18.9
19.0
18.9
24.6
24.6
24.7
27.7
24.7
24.7
25.0
25.0
23.5
3700
Yu Quan Shan
Yu Xi Quan
Capacity
19.5
2810
19.0
3029
21.0
24.0
24.0
21.0
4992
3429
Maersk Gateshead
Maersk Georgia
Maersk Gironde
Maersk Missouri
Maersk Virginia
Magleby Maersk
Majestic Maersk
Marchen Maersk
Maren Maersk
Margrethe Maersk
Marie Maersk
Marit Maersk
Marstal Maersk
Mathilde Maersk
Mayview Maersk
Mc-Kinney Maersk
Mette Maersk
Munkebo Maersk
Nele Maersk
Nexoe Maersk
Nicolai Maersk
Nikoline Maersk
Nora Maersk
Nysted Maersk
Regina Maersk
Sea-Land Champion
Sea-Land Charger
Sea-Land Comet
Sea-Land Eagle
Sea-Land Freedom
Sea-Land Intrepid
Sea-Land Lightning
Sea-Land Mariner
Sea-Land Mercury
Sea-Land Meteor
Sea-Land Pride
Sea-Land Racer
Sea-Land Value
Sally Maersk
Sine Maersk
Skagen Maersk
Sofie Maersk
Soroe Maersk
Sovereign Maersk
Susan Maersk
Svend Maersk
Svendborg Maersk
Taasinge Maersk
Thies Maersk
Thomas Maersk
Thuroe Maersk
Tinglev Maersk
4300
4300
4300
4300
4300
4300
4300
4300
4300
4300
4300
4300
4000
4300
4300
4300
4300
4000
2200
2200
2200
2200
2200
2026
6000
3733
3733
3733
3733
2344
3733
3733
2344
3733
3733
3918
3733
3612
6600
6600
6600
6600
6600
6600
6600
6600
6600
1750
1350
1500
1350
1500
24.0
24.2
24.2
24.3
24.0
23.5
23.5
23.0
23.0
ZIM Panama
ZIM Piraeus
ZIM Ravenna I
ZIM Shanghai
ZIM Shenzhen
ZIM Singapore I
ZIM USA
ZIM Venezia II
ZIM Virginia
23.0
Zi Ya He
23.5
23.0
24.5
23.0
23.5
23.5
23.0
24.5
21,80
21,80
21,80
21,80
21,80
21.8
24.6
24.0
24.0
24.0
24.0
20.3
24.0
24.0
20.3
24.0
24.0
21.0
24.0
21.0
24.6
24.6
24.6
24.6
24.6
24.6
24.6
24.6
24.6
19.0
Hyundai Republic
Hyundai Kingdom
Hyundai National
Hyundai Dominion
Hyundai Patriot
Hyundai Independence
Hyundai Liberty
Hyundai Discovery
Hyundai Freedom
Hyundai Fortune
Hyundai General
Hyundai Highness
Hyundai Admiral
18.6
18.9
18.6
18.9
Hyundai Baron
Hyundai Commandore
Hyundai Duke
Hyundai Emporer
Hyundai Federal
Hyundai Explorer
Hyundai Poineer
Hyundai Frontier
Hyundai Commander
Hyundai Vladivostok
Hyundai Future
Hyundai Stride
Hyundai Advance
Hyundai Sprinter
Hyundai Progress
Hyundai Highway
Hyundai Bridge
Hyundai Primorskiy
Hyundai Infinity
Hyundai Nobility
Suzuran
Asian Zephyr
Cape Canet
Doris Waluff
Saturn
Star Eagle
Star Evanger
Star Evviva
Star Florida
158
4992
5000
2998
4992
2633
2474
3429
2682
4992
764
6479
6479
6479
6479
6479
5551
5551
5551
5551
5551
5551
5551
4411
4411
4411
4411
4411
4411
3014
3014
3014
3014
2174
2174
2174
2174
2174
2174
2174
2174
628
2241
2241
1177
1032
834
1203
1129
24.0
21.0
24.0
21.0
21.0
21.7
21.0
24.0
19.2
26.4
26.4
26.4
26.4
26.4
25.6
25.6
25.6
25.6
25.6
25.6
25.6
25.1
25.1
25.1
25.1
25.1
25.1
21.7
21.7
21.7
21.7
21.5
21.5
21.5
21.5
21.5
21.5
21.5
21.5
15.8
23.0
23.0
18.1
18.5
18.0
19.5
18.5
15.0
15.0
15.0
15.0
Tobias Maersk
Torben Maerks
Tove Maersk
Trein Maersk
Troense Maersk
Achim
1300
1300
1350
1300
1350
ACX Dahlia
ACX Hibiscus
ACX Lily
ACX Magnolia
ACX Marguerite
ACX Marigold
1430
1430
1250
1480
1467
ACX Primrose
820
ACX Raffiesia
1430
Agios Dimitrios I
Akashi Bridge
Akinada Bridge
Alexandria
3428
3456
5600
400
2199
3209
2199
Al Mariyah
Alva Star
Al Wajba
Ambassador Bridge
America Senator
Anan Bhum
An Rong 1
Aotea
Apollon
I
181
18.0
18.0
18.6
18.0
18.6
15.5
19.5
19.5
19.0
19.5
19.0
19.0
19.5
19.5
18.5
23.0
25.0
17.5
21.0
21.5
2661
993
116
1842
1566
16.5
21.0
Star Fraser
Star Fuji
Star Geiranger
Star Gran
Star Grindanger
Star Grip
Star Hidra
Star Hoyanger
Star Ikebana
Star Inventana
Star Isoldana
Star Istind
Star Isfjord
Star Ismene
Adeline Delmas
Africa
Alpana
Astrid
Blandine Delmas
Bougainville
Caroline Delmas
Delmas Acacia
Delmas Aloe
Delmas Blosseville
Delmas Cartier
Delmas Casablanca
Delmas Charcot
937
1935
1664
574
937
1730
937
676
676
1202
1728
518
1706
1740
15.0
15.0
15.0
15.0
15.0
15.0
16.0
16.0
17.0
17.0
17.0
17.0
17.0
17.0
13.5
18.0
20.0
13.5
13.5
13.5
18.5
18.5
19.0
20.0
15.5
19.6
Arafura
Aramac
2432
2732
Delmas Forbin
Delmas Fjacaranda
Aris I
1810
357
1032
14.3
18.5
2258
20.0
3100
3100
18.0
18.0
18.0
18.0
18.0
Delmas Kenya
Delmas Kerguelen
Delmas Mascareignes
Delmas Sycamore
Delmas Tourville
Delphine Delmas
Eax Sanctity
1158
1740
1466
789
1730
937
940
13.5
Elisa Delmas
20.3
Kaduna
Kamina
1614
1614
1614
1935
582
511
1113
Kwanza
4355
Asian Glory
Asian Gyro
Astoria Bridge
Atlantic Cartier
Atlantic Companion
Atlantic Compass
Atlantic Concert
Atlantic Conveyor
Australia Bridge
3100
3100
3110
2400
Bai Yun He
1674
Baltrum Trader
2470
456
Banga Bijoy
Banga Biraj
Banga Birol
Banga Bodor
Banga Bonik
Banga Borak
Banga Borat
Banga Lanka
Bao Zhong 23
Bao Zhong 68
Barcelona Bridge
Flora Delmas
Gaby Delmas
Giorgia
Heide
20.0
21.0
669
606
510
500
510
846
538
66
140
3965
23.1
159
676
La Bourdonnais
Laura Delmas
Lauren
Lucie Delmas
4473
2150
4473
Madagascar
1346
Marie Delmas
Mirella
Mol Horizon
2207
2152
21.0
18.5
17.0
20.5
18.5
18.0
20.0
20.3
20.3
18.0
15.5
15.3
16.5
19.0
1600
1113
19.0
23.0
19.0
22.6
19.0
16.5
Bay Bridge
2257
20.0
Beauty River
Berlin Senator
Mol Karina
1932
17.5
3007
21.0
15.5
Nicolas Delmas
Paraguay
Parana
Patricia Delmas
9.0
Ponl Mahe
14.5
16.0
Bimba
1
Bin Cheng
Bin Dong Shan
Bing He
Blue Moon
Bonn Express
Bonvoy 88
Bo Shi Ji 386
Bosporus Bridge
BPW 2031
Bremen Bridge
Bremen Senator
Bunga Mas Empat
Bu Yi He
Cai Yun He
California Luna
California Senator
Camilla Rickmers
74
724
78
1696
3400
21.0
Rejane Delmas
Reunion
Rokia Delmas
Roland Delmas
Romain Delmas
Rosa Delmas
Roxanne Delmas
Saint Roch
Santa Barbara I
Santa Margherita
Sassandra
1432
19.0
St Pauli
2916
2850
22.0
Trave Trader
CSAV Shanghai
Copiapo
614
2803
279
45
3210
22.8
11.5
24.0
350
5576
1730
135
1728
1510
20.0
Cap Colville
Cap Delgado
2442
21.5
Cape Campbell
Cape Canaveral
Cape Canet
834
356
590
Cape Coldbek
834
Cape Cook
Caraka JN3-9
Caraka JN319
Carinthia
Caroline Schulte
834
18.5
16.0
18.5
18.5
18.5
10.0
10.0
2824
2532
CEC Mayflower
CEC Morning
Centre Point 28
Chang An 104
650
650
80
104
Chang Jiang Bridge
3456
Chang Sheng 301
Chang Xing 108
Chang Xing 208
Chao He
Chao Shan He
74
Cherokee Bridge
Chesapeak Bridge
Chesapeak Bay Bridge
Chicago Bridge
Chiswick Bridge
Chuan He
Chun He
Concord
Concord Bridge
Conti Arabian
128
24.0
21.0
20.2
20.2
48
1322
836
4226
4226
3400
5576
5600
5446
1322
1452
24.5
24.5
21.0
25.0
25.0
22.5
3308
1742
1895
4355
411
1608
2214
2074
IGA
Sea Puma
IZU
2205
Alice Rickmers
Donna Schulte
1900
2256
CSAV Livorno
CCNI Ancud
1878
1816
1878
1829
Ankara
Arnis
Berulan
Cabo Creus
3482
23.0
Cap Aguilar
Cap Blanco
Cap Bonavista
1466
18.5
Cap Carmel
160
5278
3308
3308
2578
3590
1613
Alianca Urca
16.0
1113
1104
1684
1364
2524
2450
2456
Alianca Macarena
Alianca Sao Paulo
Alianca Shanghai
Alianca Singapore
17.2
17.0
2129
Ikoma
Alianca Hong Kong
Alianca Ipanema
48
1935
CSAV Callao
CSAV Shenzhen
Buxfavourite
CSAV Barcelona
CSAV Genova
Alianca Bahia
Alianca Brasil
Alianca Europa
24.0
770
2207
1613
1613
2460
2045
2045
2468
2233
2233
2524
2442
2456
1151
1388
1208
907
2524
1740
2154
2442
2542
22.6
18.0
17.5
16.5
18.0
16.0
17.0
17.0
16.0
15.5
17.0
19.2
20.0
19.0
14.0
21.0
Conti Cartagena
2432
20.0
Conti Jork
Conti Valencia
Cosco Antwerp
Cosco Atlantic
Cap Castillo
2442
1597
18.0
Cap Colorado
2305
5446
2054
21.0
24.5
21.4
22.2
24.5
24.5
24.5
Cap Colville
Cap Cortes
1510
1510
1651
Cosco Cape Town
Cosco Felixstowe
Cosco Hamburg
5446
5446
Cosco Hong Kong
Cosco Kiku
5446
542
Cosco New York
Cosco Norfolk
Cosco Qingdao
2728
3330
5446
24.5
Cosco Ran
542
1164
18.0
18.7
5446
24.5
Cosco Redsea
Cosco Rotterdam
Cosco Sakura
Cosco Sao Paulo
Cosco Shanghai
Cosco Singapore
Cosco Tianjin
542
5446
Da Qing He
Daxin
5446
5752
96
3801
1932
764
588
Delaware Bridge
4452
CRC No. 1
Da He
Dainty River
Diman
II
Donau Bridge
Dong He
Dong Rong
Dong Xu
Dong Yun 009
Dong Yun 030
Dong Yun 556
Dubai
Duburg
1822
18.0
17.5
22.0
Cap Ortegal
Cap Pasado
Cap Pilar
Cap Polonio
Cap Reinga
Cap Roca
18.0
Cap San Antonio
Cap San Augustin
Cap San Lorenzo
22.2
24.5
24.5
26.3
Cap San Marco
Cap San Nicolas
Cap San Raphael
24.0
Cap Velas
Cap Vilano
Cap Vincent
Castor
City of Glasgow
City of Hamburg
18.5
19.2
15.6
19.0
4038
2761
58
83
36
Cap Domingo
Cap Ferrato
Cap Finisterre
Cap Frio
Cap Lobos
Cap Norte
City of Istanbul
City of Manchester
City of Tunis
Columbian Express
Columbus Australia
Columbus Canada
Columbus China
18.5
9.5
24
96
2199
Columbus Florida
1464
1704
21.0
Eagle Strength
E Cheng
Elbe Bridge
725
680
17.0
18.3
Elisabeth Schulte
Empress Dragon
2532
3494
Empress Heaven
Empress Phoenix
3494
3494
Empress Sea
En Hui
En Yuan
Ever Able
3494
24.5
21.9
21.0
21.0
21.0
21.0
Columbus Victoria
Columbus Waikato
Copacabana
Courier
Damaskus
88
88
1164
1164
1164
4211
20.5
20.5
20.5
25.0
Eagle Express
Ever Ally
Ever Apex
Ever Dainty
Flamengo
Independente
Intrepido
Kairo
Kapitan Kurov
Karthago
Leblon
Mekhanik Kalyuzhniy
Santa Felicita
Santa Fiorenza
Santa Francesca
161
2100
2478
2023
2456
1645
2468
2442
1550
1581
2023
1651
2640
3739
3739
3739
3739
3739
3739
1709
1742
1835
1129
956
2228
1232
300
1709
752
2062
1215
2524
1651
1229
1837
1402
1452
1645
1254
1138
1138
1709
1250
1354
1157
1167
2169
2169
2169
Ever Delight
Ever Deluxe
Ever Diadem
Ever Diamond
Ever Dynamic
Ever Gaining
Ever Gallant
Ever Garden
Ever Gather
Ever General
Ever Genius
Ever Gentle
Ever Gentry
Ever Gifted
Ever Given
Ever Glowing
Ever Golden
Ever Goods
Ever Govern
Ever Growth
Ever Guest
Ever Guide
Ever Uberty
Ever Ultra
Ever Union
Ever Unique
Ever Unison
Ever United
4211
4211
4211
4211
4211
3428
25.0
25.0
25.0
25.0
25.0
21.7
22.1
2728
2728
3428
2868
2868
2868
2728
3428
2868
3428
2868
2728
3428
2390
5364
5625
21.7
20.5
20.7
21.3
21.3
21.3
21.0
22.2
21.9
21.3
22.2
21.3
22.5
22.2
22.0
25.0
Santa Isabella
Santos Express
Sea Tiger
Stoja
Tausala Samoa
Uranus
Vernuda
Westmed
II
Bruarfoss
Dettifoss
Godafoss
Manafoss
Selfoss
Skogafoss
Heinrich S
1894
21.0
I
26.7
Ever Pearl
Ever Urban
Ever Useful
Fair Wind 18
Fair Wind 28
5652
120
120
25.0
Ever Reach
Ever Refine
Ever Renown
Faith I
3428
Fang Gang 1001
Fang Gang 3
Fang Gang 6
Fei He
Fei Yun He
Feng Da 328
54
32
18.5
8.0
Ever Racer
Feng Guang 2
Feng Shun 8
Feng Yun He
Fo Hang 906
1432
60
19.0
France
Franconia
Franklin Strait
4158
946
518
23.1
Fu Feng
Fu Feng Shan
Fu Gang 811
132
132
96
52
96
Fu Gang 812
Fu Gang 815
Ever Repute
Ever Result
Ever Reward
Ever Right
Ever Round
Ever Royal
20.2
7.0
Ever Unific
Ever Unity
Green Modest
Green Moral
Hansa Africa
Hansa India
208
21.0
Athena
Ever Gleamy
Ever Grade
Ever Peace
1702
16
80
416
2474
17.6
17.5
Caribbean Sea
8.0
14.0
724
1457
1457
518
724
657
Conti Barcelona
Dimitra II
23.0
1181
1555
25.0
25.0
45
3764
703
Agiasofia
Angeln
5364
5364
5364
5652
5652
Ever Uranus
703
1116
1835
Global Rio
Birk
Cala Paestum
5364
2400
2532
2562
657
17.0
1645
3681
1597
1894
21.0
24.0
2728
2728
1618
1618
4229
4229
4229
4229
4229
4229
4229
4229
4229
4229
5652
5652
951
951
18.0
21.0
20.5
20.5
19.3
19.3
23.0
23.0
23.2
23.2
23.2
23.2
23.2
23.0
23.0
23.0
25.0
25.0
15.5
15.5
20.0
Hatsu Ethic
LT Going
15.5
Pelopensian Pride
3424
3424
6332
2728
3428
Poseidon VII
1894
21.0
Rhoneborg
1643
UNI Accord
UNI Ahead
UNI Ardent
1164
1164
1164
17.5
18.7
18.7
18.7
162
23.5
22.8
24.5
20.5
18.0
Fu Gang 816
Fu Gang 818
Fu Tai
Gallant Wave
Ganta Bhum
Gao Cheng
Gao He
96
96
63
1510
1094
724
2761
10.0
18.0
18.0
15.6
18.5
Gao Yao Gang No. 1
Genoa Bridge
George Washington Bridge
Gigi
Gihock
Gijoo
Gikim
Gileong
36
5600
9.0
25.0
21.5
152
504
152
276
597
Gi Lian
396
235
278
11.0
14.0
11.0
10.5
14.0
12.0
12.5
15.0
11.0
13.5
11.0
11.0
8.0
18.0
Gimeng
Ginter Star
Giseng
Gisiang
Gisoon
Giswee
Global 3
Glory D
Golden Cloud
191
384
191
202
100
946
5610
Great Pride
Guang Da Lun
Guang Liong Lun
538
Guang Xing Lun
Guan Hang 109
Guan Hang 238
Guan Hang 278
Guan Hang 362
Guan Hang 393
Gulf Bridge
Guo Dian 1001
Haifenglianfa
Hai Feng Shan
Hakone
Han Bo 1 Hao
Han Bo 2 Hao
Han Da
Hang Feng
Ha Ni He
Han Jiang He
Hanjin Amsterdam
Hanjin Athens
Hanjin Barcelona
Hanjin Basel
Hanjin Beijing
AnnaJ
Cape Falcon
Castor
Chesapeak Bay
City of Cape Town
24.4
City of Stuttgart
Colombo Bay
Columbus New Zealand
Delaware Bay
Endeavor
Endurance
Enterprise
Genua Express
Heemskerck
208
14.2
45
45
45
64
60
10.0
60
84
45
9.0
1984
106
19.0
358
283
13.5
11.5
Heide J
Ijsseldijk
Jervis Bay
Karin B
Luetjenburg
Marivia
Mercosul Palometa
Mercosul Pescada
Mercosul Uruguay
Merkur Lake
1864
66
66
51
10.0
140
3400
422
5618
5618
4024
5753
5302
Vlaherna
Vladivostok
Kapitan Afanasyev
Fesco Voyager
Amsteldiep
APL Manaus
Argana
Argonaut
Astor
Aynur Urkmez
Baltimar Boreas
Beliz Urkmez
618
Golden Gate Bridge
Golden Star
UNI Assent
UNI Forever
UNI Fortune
UNI Oasis
UNI Onward
UNI Order
UNI Orient
UNI Phoenix
21.0
17.5
26.3
26.3
24.0
26.3
26.4
163
1164
978
953
1170
1278
1170
1182
1618
1555
1748
1748
1684
446
198
1016
353
1236
1129
580
256
580
1200
446
2411
3126
1900
4224
4112
2411
1928
1928
1928
2157
3230
202
301
4224
350
3510
2082
Mount Ida
1512
1730
740
1012
724
Nedlloyd Africa
Nedlloyd America
Nedlloyd Asia
Nedlloyd Clarence
Nedlloyd Clement
Nedlloyd Europa
Nedlloyd Hong Kong
3604
3604
3604
2515
2470
3604
4169
18.7
16.5
16.5
15.6
14.8
15.6
14.8
18.7
17.6
18.5
18.5
20.0
Hanjin Bremen
2692
Hanjin Brussels
5618
5447
5752
Hanjin Cairo
Hanjin Chicago
Hanjin Colombo
Hanjin Copenhagen
Hanjin Elisabeth
Hanjin Felixstowe
Hanjin Geneva
Hanjin Gothenburg
Hanjin Hamburg
Hanjin Helsinki
Hanjin Kaohsiung
Hanjin Kelung
Hanjin Lisbon
Hanjin London
Hanjin Los Angeles
Hanjin Madrid
Hanjin Malta
Hanjin Marseilles
Hanjin Nagoya
Hanjin New York
Hanjin Osaka
Hanjin Oslo
Hanjin Ottawa
Hanjin Paris
Hanjin Pennsylvania
Hanjin Philadelphia
Hanjin Phoenix
Hanjin Portland
Hanjin Praha
Hanjin Pretoria
Hanjin Rome
Hanjin San Francisco
Hanjin Savannah
Hanjin Shanghai
Hanjin Singapore
Hanjin Taipei
Hanjin Tokyo
Hanjin Valencia
Hanjin Vancouver
Hanjin Vienna
Hanjin Washington
Hanjin Wilmington
Han Long
Hansa Stavanger
Hanseduo
Han Shui He
Han Tao He
Han Zhong He
Hao Sheng 101
Happy Island
4024
5618
2846
2692
5752
5447
2692
5447
2692
2668
5752
5306
4024
5752
4024
4024
4024
4038
4024
5308
5618
5302
4389
4389
4389
4024
4389
4389
5308
4024
4038
4024
2666
5447
4024
4024
2692
22.0
26.3
25.9
26.3
24.0
26.3
21.0
21.0
26.3
24.0
21.0
24.2
21.0
22.0
26.3
26.4
24.0
26.3
24.0
Nedlloyd Honshu
Nedlloyd Oceania
Newport Bay
Olivia
Oriental Bay
P&O Nedlloyd Abidjan
P&O Nedlloyd Acapulco
P&O Nedlloyd Accra
P&O Nedlloyd Aconcagua
P&O Nedlloyd Adelaide
P&O Nedlloyd Adriana
P&O Nedlloyd Agulhas
P&O Nedlloyd Algoa
P&O Nedlloyd Altiplano
P&O Nedlloyd Andes
P&O Nedlloyd Antisana
P&O Nedlloyd Apapa
P&O Nedlloyd Araucania
P&O Nedlloyd Atacama
24.0
P&O Nedlloyd Bantam
24.0
22.0
24.0
26.0
26.3
P&O Nedlloyd Barentsz
P&O Nedlloyd Barossa Valley
P&O Nedlloyd Beirut
P&O Nedlloyd Botany
P&O Nedlloyd Brisbane
26.4
P&O Nedlloyd Brunel
24.3
24.3
24.3
24.0
24.3
24.3
26.4
P&O Nedlloyd Buenos Aires
P&O Nedlloyd Cagliari
P&O Nedlloyd Calypso
P&O Nedlloyd Caracas
P&O Nedlloyd Caribbean
P&O Nedlloyd Cesme
P&O Nedlloyd Chania
24.1
P&O Nedlloyd Christine
22.0
24.0
22.0
25.9
24.0
P&O Nedlloyd Chusan
P&O Nedlloyd Cobra
P&O Nedlloyd Cook
P&O Nedlloyd Curacao
P&O Nedlloyd Damietta
24.0
P&O Nedlloyd Dejima
21.0
P&O Nedlloyd Drake
5752
26.3
P&O Nedlloyd Dubai
5302
4024
52
26.4
24.0
P&O Nedlloyd Encounter
P&O Nedlloyd Houston
500
422
422
422
96
400
4181
3604
4224
1452
4180
2506
2556
2506
2556
3005
2556
2506
2506
2556
2556
2556
2506
1102
2556
3430
5468
2602
1717
4112
2686
2080
1779
970
1730
4253
4253
1022
1012
856
3430
4038
6802
1012
3607
3430
5468
2732
4112
1779
10.0
P&O Nedlloyd Houtman
6802
20.0
16.0
P&O Nedlloyd Hudson
P&O Nedlloyd Hunter Valley
5468
17.5
P&O Nedlloyd Inca
17.5
P&O Nedlloyd Juliana
17.5
P&O Nedlloyd Kowloon
2478
923
2556
6690
6690
P&O Nedlloyd Los Angeles
1548
P&O Nedlloyd Kobe
15.0
164
Hatsu Eagle
Hatsu Elite
Hatsu Envoy
Hatsu Excel
Hatsu Pride
Hatsu Prima
Heidelberg Express
Henry Hudson Bridge
Hera
Hermes
III
Hong Kong Senator
Hong Yun He
Honor River
Hope
Howrah Bridge
Hsh Ubin
Hua Chang Hai 16
Hua Hang 229
Huai Ji He
Huai Lai He
Hua Lun 1
Hua Tai He
Hua Yun He
Hui Long 7
Hui Xin Hang 508
Humber Bridge
Humen Bridge
Hunsa Bhum
Hu Tuo He
6332
6332
6332
6332
1618
1618
3468
24.5
24.5
24.5
24.5
P&O Nedlloyd Magellan
P&O Nedlloyd Mahe
P&O Nedlloyd Mairangi
P&O Nedlloyd Malindi
18.7
P&O Nedlloyd Marita
P&O nedlloyd Maxima
2556
2556
22.0
21.5
P&O Nedlloyd Mercator
P&O Nedlloyd Muisca
5468
1102
2728
18.5
P&O Nedlloyd Nina
2014
21.3
20.0
P&O Nedlloyd Obock
P&O Nedlloyd Olinda
P&O Nedlloyd Palliser
384
3430
16.5
P&O Nedlloyd Panama
21.0
20.0
P&O Nedlloyd Pantanal
P&O Nedlloyd Pinta
1926
2850
1700
1932
3480
2257
2097
17.0
P&O Nedlloyd Regina
P&O Nedlloyd Remuera
P&O Nedlloyd Rotterdam
150
36
424
724
100
1216
1700
16.9
17.3
P&O Nedlloyd Salsa
P&O Nedlloyd Samba
P&O Nedlloyd San Francisco
24.8
20.0
P&O Nedlloyd Seattle
P&O Nedlloyd Shackleton
5642
1104
4112
1116
4112
3014
2474
2394
2556
4112
6690
2061
1742
1716
3450
6802
2169
6690
6802
154.0
P&O Nedlloyd Singapore
60.0
21.0
21.0
P&O Nedlloyd Southampton
P&O Nedlloyd Stuyvesant
P&O Nedlloyd Surat
18.0
19.2
P&O Nedlloyd Susana
P&O Nedlloyd Taranaki
2556
20.5
20.5
P&O Nedlloyd Tasman
P&O Nedlloyd Tema
P&O Nedlloyd Teslin
5468
16.0
14.5
19.8
P&O Nedlloyd Thekwini
P&O Nedlloyd Torres
P&O Nedlloyd Trinidad
1055
5642
384
25.0
19.5
P&O Nedlloyd Valentina
P&O Nedlloyd Vera Cruz
2556
14.5
P&O Nedlloyd Vespucci
3400
21.0
P&O Nedlloyd Xiamen
Peninsula Bay
8.5
Providence Bay
Jin He
36
52
5446
Jin Long Jiang
71
Jin Sheng
386
1432
120
5551
802
3456
3008
1094
764
Hyundai Challenger
Hyundai Innovator
3014
Ibn Sina
2850
Indonesian Star
1203
3014
Intra Bhum
Jade Trader
James River Bride
Japan Senator
Jaru Bhum
Ji Hai Xiang
Jing Po He
Jin Hai Feng
Jin Hai Yan
Jing Yun He
Jun Chuan 9
Jupiter Bridge
Jurong Bauhinia
Kaido
Kai Fa
Kai Yue
1122
5610
2661
640
96
450
90
8.5
Repulse Bay
23.0
10.0
18.0
19.0
San Lorezo I
Santa Federica
Shenzhen Bay
Singapore Bay
Stadt Kiel
25.9
Sydney Express
16.5
15.0
Tai Chuang
Ulsnis
Volkers
Providence
113
165
3430
1270
1511
2556
1779
5642
2986
4180
4224
4224
1512
2169
4224
4224
373
4112
1034
1388
374
1624
Kasuga
1
2450
Khaled Ibn Al Waleed
Kota benar
Kota Bintang
Ksh Kusu
Kuoyu
Kwong Ta No. 8
Lan Shi 10
2211
Lausanne
2826
Lian Fa 66
Lian Fa 67
Lian Feng
Liao He
Lilium
Ling Chang He
Ling Quan He
Ling Yun He
Lin Hai 103
Lions Gate Bridge
London Senator
Long Beach Bridge
Long He
Long Lun 103
LT Garland
LT Genova
LT Giant
LT Grand
LT Greet
LT Guard
LT Lloydiana
LT Pearl
LT Popular
LT Power
LT Trieste
LT Ulysees
LT Unica
LT Unicorn
LT Unity
LT Universo
LT Ursula
LT Usodimare
LT Utile
Lu He
Lumoso Express
Lunar River
Luo Ba He
Luo He
Lu Sheng
Lykes Ambassador
Lykes Deliverer
Lykes Discoverer
Lykes Explorer
764
476
1674
1169
132
64
Karukera
Anterpen Express
Tokyo Express
Bremen Express
Rotterdam Express
17.0
15.0
17.5
18.0
Kuala Lumpur Express
16.1
New York Express
Singapore Express
Kobe Express
Dusseldorf Express
London Express
Hannover Express
Leverkusen Express
Dresden Express
Hoechst Express
Ludwigshafen Express
1702
54
20.3
Essen Express
5610
2850
5576
25.0
725
52
18.9
10.0
Stuttgart Express
Paris Express
Busan Express
San Francisco Express
Bankok Express
Los Angeles Express
3428
2987
2728
2728
2728
2868
21.0
21.0
Berlin Express
Hong Kong Express
17.5
2511
1618
1566
1618
20.0
Hamburg Express
Shanghai Express
Santiago Express
Humboldt Express
Frankfurt Express
Abu Dhabi
Al Abdali
24.0
140
140
1234
387
377
672
2820
5652
4948
5652
5652
5346
5652
4948
5652
5446
12.0
17.7
15.0
12.5
25.0
20.5
17.5
19.3
21.0
18.7
17.5
Al Farahidi
Alnoof
Asir
25.0
25.0
25.0
25.0
25.0
Deira
Fowairet
19.5
21.0
1234
127
18.3
3266
11.5
3026
3026
18.8
18.8
166
7506
7506
7506
7506
2181
2181
3430
3800
3800
3800
3800
3800
Al Ihsa'a
1665
1718
AL Manakh
2199
Hammurabi
Hanjin Berlin
4051
6732
PONL Beirut
Port Said Senator
Najran
Al Sabahia
MSC Brasilia
MSC Carla
MSC Germany
MSC Levina
MSC Maria Laura
MSC Pretoria
138
494
3400
6732
3800
3800
3800
3800
3800
3074
3022
2708
2900
2557
2829
2199
5302
2199
AlMutanabbi
25.0
25.0
24.5
1624
4890
4890
4890
4890
4890
4890
4890
4612
4612
4612
4639
4639
4639
4639
4639
4639
4639
4639
6732
6732
24.0
24.0
24.0
24.0
24.0
24.0
24.0
24.0
24.0
24.0
23.0
23.0
23.0
23.0
23.0
23.0
23.0
23.0
25.6
25.6
25.6
25.6
25.0
25.0
25.0
25.0
18.0
18.0
23.0
Lykes Hero
Lykes Innovator
Lykes Liberator
Lykes Motivator
Lykes Navigator
Lykes Pathfinder
Mackinac Bridge
Maersk Doha
Maersk Norfolk
3026
2808
3026
2954
3026
2280
2875
4158
2300
Man Fu
72
Manhattan Bridge
Maple River
Mare Balticum
Mare Doricum
Mare Lycium
Mare Thracium
Margret Knueppel
Mathu Bhum
Matsuko
Med Taipei
Mentor
Mercury Bridge
Merkur Bay
Methi Bhum
Mild Lin
Mild Star
Mild Sun
Mild Union
Min Feng
Ming America
Ming Asia
Ming Bamboo
Ming Cheng
Ming Cosmos
2157
1054
1054
3900
Ming Longevity
Ming North
Ming Ocean
Ming Orchid
Ming Pine
Ming Plum
Ming South
Ming West
Ming Zenith
Min He
Min Su
Min Tai No.2
Min Tai No.4
Min Tai No.5
18.8
21.7
18.8
19.8
21.5
CMA-CGM Eiffel
18.0
17.5
17.5
Norasia Enterprise
CMA-CGM Vernet
CMA-CGM Vega
24.0
21.0
CMA-CGM Neptune
564
2550
294
20.7
5551
25.9
23.0
928
17.0
15.5
15.0
15.0
14.0
422
422
443
308
3494
3604
5551
724
5551
3502
3604
5551
1984
3502
1984
5551
5551
5551
Qatari Ibn Al Fuja'a
Norasia Valparaiso
22.4
16.0
17.0
746
Canmar Bravery
Canmar Endurance
Canada Senator
Canmar Glory
Canmar Triumph
Canmar Valour
Canmar Victory
Al Mirqab
20.0
532
1080
Ming Cypress
Ming East
Ming Europe
Ming Green
21.0
22.0
CMA-CGM Mercure
DAL Kalahari
DAL Madagascar
Karonga
OOCL Hamburg
21.0
OOCL Long Beach
OOCL Ningbo
OOCL Qingdao
OOCL Rotterdam
OOCL Shenzhen
OOCL Chicago
OOCL San Francisco
OOCL Netherlands
OOCL Singapore
OOCL America
OOCL Britain
OOCL California
OOCL China
21.2
21.2
25.9
15.6
25.9
25.9
24.0
21.2
25.9
OOCL Hong Kong
OOCL Friendship
OOCL Fair
OOCL Fidelity
OOCL Freedom
OOCL Envoy
OOCL Exporter
OOCL Montreal
19.0
24.0
19.0
25.9
25.9
25.9
OOCL Belgium
MV Helgafell
MV Arnafell
3502
3502
3052
24.0
MV Skaftafell
MS Jokulfell
2761
144
106
140
18.5
24.0
24.0
MV Regina J
MV Kurske
MV Adele J
MV Carina
MV Virtsu
80
MV Dirhami
167
1737
1952
2017
1074
1061
1061
1053
2199
2199
4100
3900
4444
3538
3900
4369
4365
3177
1730
1191
8063
8063
8063
8063
8063
8063
5714
5714
5390
5390
5344
5344
5344
5344
5344
3218
3161
3161
3161
2544
2544
4402
2808
703
703
364
140
395
266
202
202
266
266
16.5
16.5
15.5
13.8
15.0
13.0
12.5
12.5
14.0
14.0
Min Tai No.6
Min Yun He
Mol Glory
Mol Triumph
mol Wellington
Montreal Senator
MSC New Plymouth
Na Xi He
Nevelsk
New Blessing
Newpac Cirrus
Newpac Cumulus
Newport Bridge
Nicolas Delamus
Nithi Bhum
Noble River
Nordseas
Nordstrand
Nordsun
Norfolk Express
Normandie Bridge
Northern Fortune
Northern Virtue
NYK Prosperity
OOCL Atlantic
72
1432
19.0
2400
2400
20.6
1600
18.0
3400
270
706
650
650
21.0
12.5
16.5
20.2
20.2
3456
2207
23.0
21.8
ACX Cosmos
ACX Hokuto
ACX Lilac
ACX Sakura
ACX Swan
Angela J
928
969
1400
17.0
15.0
20.0
California Jupiter
California Mercury
Cape Charles
2280
20.0
Cape May
1158
3607
17.0
23.5
23.0
19.3
Commodore
1899
2987
3607
3161
OOCL Harmony
OOCL Japan
OOCL Japan
5344
2762
Oriental Bright
1001
Orient Brilliancy
OSG Argosy
Oxford
545
2880
2500
P&O Nedkowlown
2890
2890
2890
2890
2720
2890
Pac Bali
Pac Banda
Pac Bintan
306
314
306
728
2661
2661
Panagia Tinou
Patmos Senator
Conti Malaga
Hotaka Maru
Ipanema
Iris
Iwaki
Iwashiro
Kaedi
Kaga
22.0
22.5
23.5
20.5
20.5
22.0
23.0
22.0
Kamakura
Katsuragi
Kitano
17.0
15.0
NYK Andromeda
NYK Antares
NYK Aphrodite
NYK Apollo
NYK Aquarius
NYK Argus
21.5
21.5
21.5
21.5
22.0
21.5
NYK Artemis
NYK Athena
NYK Canopus
NYK Castor
NYK Fantasia
NYK Freesia
NYK Kai
NYK Leo
NYK Libra
NYK Lodestar
NYK Lynx
NYK Lyra
16.3
18.0
18.0
22.0
916
725
2661
ACX Cherry
Hansa Constitution
279
P&O Nedlloyd Auckland
P&O Nedlloyd Genoa
P&O Nedlloyd Jakarta
P&O Nedlloyd Marseille
P&O Nedlloyd Newark
P&O Nedlloyd Sydney
Pan He
MV Marienborg
23.8
821
6690
Pancaran Sinar
Libra New York
Ocean Trader
Libra Buenos Aires
1174
1550
OOCL Europe
OOCL Faith
OOCL Fortune
Pacific Envoy
Pacific Senator
Palermo Senator
22.0
MV Kalana
MV Muuga
CMA-CGM Rodin
16.0
16.8
18.0
168
266
266
2602
2526
1608
2470
1684
1048
1048
338
1430
1350
484
260
2841
2990
2829
2826
2764
2432
2760
1939
1613
2113
1613
1613
2020
3618
3611
3609
3618
6141
6141
6200
6200
6238
6238
6200
6200
6135
6135
2532
3468
3618
NYK Pegasus
NYK Phoenix
6200
6200
6200
6200
6200
6200
6238
NYK Pride
2641
14.0
13.0
21.5
21.7
21.0
22.0
19.0
Peking Senator
Penang Senator
4545
4545
23.7
23.7
Pira Bhum
628
15.5
Pohang Senator
Ponl Nelson
Portland Senator
Portugal Senator
4545
23.7
Potomac Bridge
Precious River
Pretty Lake
Pretty Ripple
Pretty River
Pretty Sea
Pretty Wave
Progress 3
Pudong Senator
Pugwash Senator
Pu He
Punjab Senator
Pusan Senator
Qian Jin 303
Qian Jin 310
Qian Yuan Shan
Quin Yun He
Qing Yun No.2
Qui He
Qi Yun He
1600
4545
4545
3965
969
420
420
1932
316
316
126
4545
4545
2716
4545
4545
16
36
137
1702
30
1318
1432
Rainbow Bridge
23.7
23.7
23.1
15.0
14.0
18.5
15.9
14.0
7.0
23.7
23.7
18.0
23.7
23.7
Victory
15.5
19.1
21.5
628
Ratstor
Reestborg
Resourceful
516
558
100
15.5
16.0
17.5
16.0
3681
23.0
23.0
River Aquamarine
River Crystal
River Elegance
River Wisdom
65
542
22.5
Rong Feng
524
14.5
Rotterdam Bridge
5576
Rui Yun He
1702
25.0
21.0
Saipan Winner
428
3482
San Pedro Bridge
Santa Elena
Santa Giovanna
Santiago
Savannah
Sea Breeze
Seabright
Sea Dragon
Seto Bridge
1664
Athlete F
Baltic Tern
18.0
18.0
25.2
2157
3802
3802
14.5
21.5
21.5
17.5
19.0
2000
2868
21.0
261
517
12.5
15.0
424
2310
23.0
1
America Feeder
Angelica Schulte
ANL Australia
ANL Bass Trader
ANL Emblem
ANL Explorer
ANL Pacific
ANL Progress
Anne Catharina
APL Cyprine
Aron
Asturia
20.3
9.0
Ratha Bhum
Rhein Bridge
Rialto Bridge
Ri Feng
NYK Procyon
NYK Sirius
NYK Springtide
NYK Starlight
Provider
Sagar
Sakura
Sandra Azul
Sandra Blanca
Santa Barbara
Santa Cruz
Santa Monica
Sanuki
Satsuki
Settsu
Shima
Shion
Soga
Sophia Britannia
Sumida
Sumire
169
1782
1005
4931
4895
4895
2893
2918
2905
1157
1181
1152
1152
1122
1091
3618
1100
1181
3066
584
366
2668
642
3300
2266
4250
910
298
5016
17.5
15.3
19.0
16.0
22.5
21.0
23.3
19.0
12.5
22.5
333
13.5
2202
369
357
20.0
Banjaard
Barrier
Burak Bayraktar
Cap Canaille
550
133
15.0
13.5
14.5
17.0
16.0
16.0
Cap Melville
2532
21.5
Carola
Cervantes
1107
538
Cimil
426
City of Lisbon
City of Oporto
700
700
2811
18.5
15.5
13.5
16.5
16.5
CMA CGM Aegean
CMA CGM Alabama
CMA CGM Alger
CMA CGM Amazonia
CMA CGM Arno
CMA CGM Balzac
15.1
4895
6135
2893
2918
912
860
2758
678
405
22.0
21.5
1668
17.0
15.0
19.5
6447
25.9
Sha He
Shamrock
Shang Cheng
Shanghai Bridge
Shanghai Senator
1234
18.3
CMA CGM Baudelaire
350
724
5576
6447
16.0
CMA CGM Belem
1162
17.0
15.5
25.0
CMA CGM Bellini
CMA CGM Berlioz
24.5
18.0
CMA CGM Bizet
5700
6627
6627
3538
San He
Sheng He
2661
3801
725
Shi Gang 233
45
Shi Gang 388
75
Shimanami
450
Shi Tai 3 Hao
Shuang Feng Shan
Sinar Bali
Sinar Bangka
Sinar Batam
Sinar Bintan
Sinar Bontang
Sinar Java
Sinar Lombok
Sinar Salju
Sinar Solo
Sinar Sunda
Sinar Surya
Sing Ping
Siri Bhum
Sky Light
Sky River
Sky Success
Song Cheng
Song He
Song Yun He
Star River
Steamers Prudence
St Petersburg Mariner
Su Da
Suez Canal Bridge
Sui Da 3
Sui Jian Hang JI 129
Sui Jian Hang JI 131
Sui Jian Hang 133
Sui Shun 101
Sui Shun Hang 28
Sui Shun Hang 32
Sui Sun 77
Sui Wu 501
Sui Xing 3
Sui Yue 2 Hao
Sun Hop Lee
Synthesis No.28
22.0
18.0
CMA CGM Capella
CMA CGM Caribbean
CMA CGM Chardin
CMA CGM Chopin
CMA CGM Claudel
CMA CGM Colombie
CMA CGM Condor
CMA CGM Constellation
CMA CGM Debussy
CMA CGM Eygpt
CMA CGM Elbe
CMA CGM Emerald
CMA CGM Energy
CMA CGM Falcon
CMA CGM Force
CMA CGM Fort St Georges
CMA CGM Fort St Louis
11.0
15.0
90
140
1060
1054
1556
1054
1054
1146
816
197
1060
1556
1556
18.5
96
550
14.5
746
1960
617
724
1688
1432
494
779
3005
288
5608
18.0
18.0
18.5
18.0
18.0
17.0
18.0
16.0
18.0
18.5
CMA CGM Fort St Pierre
CMA CGM St Marie
CMA CGM Greece
16.5
CMA CGM Hispaniola
23.0
CMA CGM Hudson
14.0
15.5
15.5
19.0
19.2
17.5
20.0
14.0
25.0
CMA CGM Hugo
CMA CGM Impala
CMA CGM Kalamata
CMA CGM Kingston
CMA CGM Kiwi
CMA CGM Komodo
CMA CGM La Bourdonnais
CMA CGM Latour
CMA CGM Lea
CMA CGM Licorne
CMA CGM Maghreb
CMA CGM Makassar
36
45
45
45
9.0
9.0
7.5
CMA CGM Manet
100
45
45
48
24
36
CMA CGM Marmara
CMA CGM Matisse
CMA CGM Mozart
CMA CGM Normandie
CMA CGM Okapi
CMA CGM Oran
CMA CGM Papagayo
CMA CGM Pasteur
CMA CGM Potomac
CMA CGM Puccini
CMA CGM Puget
CMA CGM Puma
9.0
39
124
96
Tai Hang 302
Tai Heng 8
42
Takeko
564
51
10.0
9.5
20.7
170
25.9
25.9
25.9
22.5
516
15.5
3300
5700
2602
2113
22.5
24.5
21.5
20.0
1354
19.5
22.5
3359
6627
2811
2917
2458
2438
2432
2438
2260
2260
2260
2260
2824
25.9
22.0
22.0
21.0
20.5
21.0
20.5
21.5
21.5
21.5
21.5
24.0
1367
1668
17.8
19.5
8200
24.5
1726
19.6
2917
4250
22.0
23.3
20.0
22.0
1730
2917
1684
18.0
2272
21.5
541
1728
20.0
580
2917
2272
2811
2262
5700
4688
1708
352
1354
2023
1645
5700
4404
1716
15.0
17.0
22.0
21.5
22.0
20.5
24.5
24.0
19.8
13.0
19.5
19.0
19.5
24.5
24.0
21.8
Teng He
3764
Teng Yun He
1702
TMM Campeche
3032
TMM Yucatan
Tong Jie
Tong Wei
Tower Bridge
Trade Eternity
3200
Trade Freda
Trade Hallie
Trade Harvest
Trade Selene
Trade Tesia
Trade Worlder
Trisk
Tsing Ma Bridge
Twadika
Umeko
UNI Active
UNI Adroit
UNI Ample
UNI Angel
UNI Arise
UNI Aspire
UNI Assure
UNI Chart
UNI Concert
UNI Concord
UNI Corona
UNI Crown
UNI Forward
UNI Pacific
UNI Patriot
UNI Perfect
UNI Popular
UNI Premier
UNI Probity
UNI Promote
UNI Prosper
UNI Prudent
UNI Ahead
UNI Phoenix
22.0
20.2
20.5
21.6
80
75
2140
2480
4038
4038
2227
2480
4038
442
204
5610
267
564
1164
1164
1164
1164
1164
998
998
998
998
998
956
1618
1618
1618
1618
1618
1618
1618
1618
1618
20.6
19.0
24.0
24.0
20.0
19.0
24.0
25.0
12.5
20.7
18.7
18.7
18.7
18.7
18.7
18.7
18.7
17.0
17.0
17.0
17.0
17.0
16.5
18.7
18.7
18.0
18.0
18.0
18.0
18.0
18.0
18.7
18.7
18.7
15.0
19.6
CMA CGM Rabat
CMA CGM Ravel
CMA CGM Rio Para
511
15.3
2478
5700
370
2986
2732
2917
21.7
24.5
CMA CGM Strauss
5700
24.5
CMA CGM Tage
CMA CGM Tatiana
CMA CGM Tucano
CMA CGM Turkey
CMA CGM Ukraine
CMA CGM Utrillo
CMA CGM Verdi
CMA CGM Verlaine
CMA CGM Virginia
CMA CGM Vivaldi
CMA CGM Voltaire
CMA CGM Wagner
CMA CGM Wallaby
CMA CGM Yantian
1645
19.5
18.5
Corona
Denizhan Bayraktar
Doerte
Dollart Trader
Dutch Runner
Enforcer
Engiadina
Er Caen
Er Calais
Er Camargue
Er Cannes
Er Sydney
Euro Storm
Fas Damman
Fas Gulf
Fas Provence
Fas Var
3482
Wang Foong 18
Wang Foong 9
228
130
WanHai 215
Indamex Godavari
Ingo J
500
Jan D
784
5551
25.9
1118
1020
23.0
19.2
17.0
2500
21.6
Gascogne
Holger
Iduna
Indamex Delaware
171
17.5
25.8
CMA CGM Romania
CMA CGM Rossini
CMA CGM Santiago
CMA CGM Sapphire
CMA CGM Seagull
CMA CGM Seine
CMA CGM Skikda
CMA CGM Springbok
CMA CGM St Laurent
CMA CGM St Martin
Van Xuan
Vega Diamond
Venus Bridge
Victoria Bridge
Victoria Strait
VN Sapphire
Wadi Alrayan
594
976
6712
516
1608
1162
1162
822
2008
2811
2824
2262
5700
6456
2811
8200
6456
5700
1684
4250
372
470
448
1608
221
750
2824
2556
2556
2556
2556
3359
686
847
1102
581
601
558
508
325
2890
3607
202
440
15.3
21.5
22.5
22.0
16.0
21.0
17.0
17.0
21.5
22.0
24.0
20.5
24.5
25.8
22.0
24.5
25.8
24.5
20.0
23.3
15.5
15.0
15.5
21.0
12.5
18.0
24.0
21.5
21.5
21.5
21.5
22.5
17.6
17.5
20.0
15.5
14.3
17.5
15.0
14.5
21.8
23.5
11.5
14.0
WanHai 262
1240
Wan Hai 266
Wan Hai 301
Wan Hai 302
Wan Hai 303
Wan Hai 305
Wan Hai 307
Wan He
2496
2496
2496
Washington Senator
Wehr Bille
Wehr Havel
Wei Xing
Welcome
Well Grace
Well Union
Westerhever
Wide Tech 23
Wide Tech 33
Wing Hing NO.18
Wing Lee No.1
Wing On 838
World D
Xetha Bhum
XHSJ 0288
Xiang Da
Xiang Dan
Xiang He
Xiang Kun
Xiang Lain
Xiang Peng
Xiang Qian
Xiang Tan Huo 0029
Xiang Xing
Xiang Yun He
Xi Bo He
Xie Hang 1
Xie Hang 12
Xie Hang 198
Xie Hang 2
Xie Hang 28
Xie Hang 313
Xie Hang 88
Xie Hang 9
Xing He
Xin Hai Run
Xin Hui He
Xin Hui JI 12
Xin
Xin
Xin
Xin
Hui
Hui
Hui
Hui
JI
JI
JI
JI
13
15
16
19
Xin Hui J 20
2496
2496
2496
5446
2850
2546
2526
65
437
132
124
1572
72
100
120
120
120
934
1080
64
200
200
1686
582
200
576
582
392
316
1702
3400
21.0
22.0
22.0
22.0
22.0
22.0
22.0
22.5
19.8
22.0
10.0
14.0
96
80
96
1328
612
836
10
36
48
48
16
12
Madeleine Rickmers
Margaretha
Maria Schulte
Neva
Nicola
Nordmed
Northern Dignity
Orient Aishwarya
Pacheco
Priwall
Promoter N
20.0
17.0
12.0
12.0
14.5
15.0
12.0
15.0
15.0
Rahana
Renate Schulte
Rigena
Rybno
Sadan Bayraktar
Saipan Carrier
Saipan Harvester
Saipan Voyager
Sea Explorer
Sieltor
Stella J
Sunshine
II
Sylvette
14.0
20.3
21.0
10.0
868
366
263
847
2478
3607
21.7
23.8
1020
300
17.0
13.5
2480
20.0
756
1122
1354
1810
261
596
602
576
13.5
18.5
19.5
17.0
12.5
15.0
14.0
14.0
14.0
15.0
15.5
16.0
13.5
17.5
12.0
701
384
516
520
347
844
132
4030
Ville De Mars
Ville De Mijo
2954
21.5
601
3961
4031
3961
23.7
23.8
23.7
4030
23.7
3961
23.7
22.0
9.0
9.0
9.0
9.0
Andalusia
Safmarine Cotonou
Alicantia
Safmarine Maluti
Safmarine Cameroun
Safmarine Concord
Safmarine Asia
Safmarine Europe
Safmarine Lobito
Safmarine Soyo
8.0
Elise D
172
847
1728
17.0
17.5
17.5
19.6
18.5
15.3
12.5
17.5
Ville D'Antares
Ville D'Aquarius
Ville De Dubai
Xiang Ling
17.6
15.5
16.5
8.0
678
657
VD Mina Qaboos
Ville De Mimosa
Ville De Tanya
Ville De Taurus
Ville De Virgo
Ville D'Orion
Westerland
Wotan
36
36
120
60
45
Janina
Kappel N
Karina
3961
847
23.7
23.7
17.5
14.3
2764
297
210
2262
21.5
1737
19.5
2262
2063
2096
21.5
21.5
21.0
1799
1972
1972
17.5
17.5
17.5
14.5
15.0
14.5
428
428
428
12.5
12.5
Xin Hui JI 22
Xin Hui JI 23
Xin Hui JI 3
Xin Hui JI 5
Xin Hui JI 9
Xin Tong 16
Xiu Shan
Yang Jiang He
Yang Xian 8
Yan He
Yantra Bhum
Yellow Sea
Yin He
YM Athens
YM Bremens
YM Earth
YM Fountain
YM Genova II
YM Great
YM March
YM Milano
YM Napoli
12
8.0
36
16
16
36
24
66
8.0
8.0
8.0
16.5
54
725
1080
3681
1328
16.8
17.0
16.5
5618
5576
26.3
1620
5551
1400
5576
5576
19.7
25.9
YM New york
4038
25.0
25.0
22.0
22.4
22.2
YM Pearl River I
YM People
1464
1620
18.0
19.7
YM Savannah
4038
22.2
YM Sky
1620
5551
YM Success
YM Tacoma
YM Wealth
YM Wilmington
YM Yantian
Yokohama Senator
2800
3359
3456
5551
4038
3916
4545
Yongyue No.6
Young Liberty
631
1295
12.0
17.0
Yuan He
Yu Chang 2
3764
24.0
Yue An Yun 05
Yue Feng 902
Yue Feng 903
Yue Hai 1028
Yue He
Yu Feng
Yu Gu He
Yu He
Yun Bao
Yun He
3101
3101
3101
3101
Safmarine Letaba
2080
20.5
20.5
20.5
20.5
21.0
20.0
22.2
Safmarine Mgeni
1730
Safmarine Kei
2474
LT Grace
LT Greet
LT Garland
LT Glamor
LT Usodimare
LT Unica
LT Universo
MV R.J. Pfeiffer
MV Mahimahi
MV Mokihana
MV Manoa
MV Manukai
S.S. Maui
17.0
45
118
72
60
60
96
5446
14.5
13.0
15.0
15.5
15.5
14.0
14.0
14.0
14.0
15.5
15.0
15.5
16.5
Safmarine Igoli
Safmarine Ibhayi
Safmarine Ikapa
19.7
764
140
428
640
925
519
525
925
414
414
414
448
390
523
510
Pongola
Safmarine Zambezi
Safmarine Tugela
Maersk Dakar
25.9
24.0
25.9
22.2
22.5
23.7
Yong Ding He
Yong Feng
Yong Hang 9
Safemarine Gabon
Theofano
Safmarine Bioko
Safmarine Onne
Safmarine Houston
Safmarine Douala
Safmarine Evagelia
Safmarine Meroula
Safmarine Congo
Elizabeth
Portlink Caravel
Portlink Pacer
Sven Oltmann
SA Winterberg
Maersk Constantia
SA Sederberg
SA Helderberg
S.S. Chief Gadao
S.S. Lurline
S.S. Kauai
S.S. Lihue
S.S. Ewa
S.S. Matsonia
24.7
65
3400
20.0
1686
98
14.5
5446
24.5
Independent Trader
Independent Venture
Independent Endeavor
Independent Action
173
797
18.0
2496
2063
2106
3152
2732
2732
2728
2728
3428
3428
5652
5652
5652
2229
2824
2824
2824
2600
2600
21.7
21.5
21.0
22.0
22.5
22.5
20.5
20.5
20.7
20.7
25.0
25.0
25.0
23.0
23.0
23.0
23.0
22.5
22.5
21.0
21.5
22.5
21.0
21.0
21.5
1981
1379
1626
1979
2015
1712
1208
1468
1452
1388
17.5
18.5
19.0
17.5
Appendix B
174
%Random Deployment Simulation
function cov = cov_3d(X,Y,Z,r,num det,N)
%
%
%
%
%
%
X: Height of container array (in TEUs)
Y: Width of container array (in TEUs)
Z: Length of container array (in TEUs)
r: Effective detection range (in feet)
num_det: Number of detectors to be deployed
N: Number of runs
tic
x = 8 * X; % Conversion from TEUs to feet
y = 8 * Y; % Conversion from TEUs to feet
z = 20 * Z; % Conversion from TEUs to feet
for 1 =
:N % Number of runs loop
% Constructs initial geometry matrix
DO = logical(zeros(x,y,z));
count
= 1;
% Generates random number vector
pos = rand(1,3);
while count < (numdet
% Number of detectors loop
+ 1)
% Constructs a new detector matrix
D1 = logical(zeros(x,y,z));
pos = rand(1,3);
%
%
%
%
%
dx = ceil(pos(l)*x);
dy = ceil(pos(2)*y);
dz = ceil(pos(3)*z);
Dl(dx,dy,dz)
=
1;
% x-axis loop
for i = dx-r:dx+r
if
((i < 1)
I
Fixes the x-coordinate of the detector
Fixes the y-coordinate of the detector
Fixes the z-coordinate of the detector
Establishes the detector's center-point
in the detector matrix
(i > x))
% Ensures
detector
matrices
& geometry
% remain equi-dimensional
continue
end
% y-axis loop
for j = dy-r:dy+r
if
((j < 1)
I (j > y))
% Dimension
control
continue
end
% z-axis loop
for k = dz-r:dz+r
if
((k <
1)
I (k > z))
% Dimension
control
continue
end
if sqrt((i-dx)^2+(j-dy)^2+(k-dz)^2)
175
<=
r
%
%
%
%
Checks whether
element is within
the detection
sphere
Dl(i,j,k) = 1;
% Fills in the detector matrix
end
end
end
end
% Current geometry matrix and detector matrix are 'OR'ed together
DO = DO
D1;
count = count + 1;
end.
det cov = sum(sum(sum(D0)));
cov(l) = det_cov/(x*y*z);
% Sums the number of elements within detection spheres
% Calculates fractional coverage volume and writes it
% to an output vector
end
cov = coy'
mean cov = mean(cov)
mediancov = median(cov)
stdcov = std(cov)
min cov = min(cov)
max cov = max(cov)
% Statistical analysis of full output vector
% Statistical analysis of full output vector
%
toc
176
% Constrained Deployment Simulator
function cov = new_3d(X,Y,Z,r,num_det,N)
%
%
%
%
%
%
X: Height of container array
Y: Width of container array
Z: Length of container array
r: Effective detection range
num_det: Number of detectors
N: Number of runs
(in TEUs)
(in TEUs)
(in TEUs)
(in feet)
to be deployed
tic
x = 8 * X; % Conversion from TEUs to feet
y = 8 * Y; % Conversion from TEUs to feet
z = 20 * Z; % Conversion from TEUs to feet
for
1 =-
:N
DO = logical(zeros(x,y,z));
count
% Constructs initial geometry matrix
= 1;
% Generates random number vector
pos = rand(1,20);
while count < (numdet
+ 1)
% Number of detectors loop
D1 = logical(zeros(x,y,z)); % Constructs a new detector matrix
pos = rand(l,20);
rnd cnt = 1;
x switch = 0;
%
y_switch = 0;
% Initializes constraint test variables
z switch
%
= 0;
while x switch < 1
dx_test = ceil(pos(rnd_cnt)*x);
if
((dx_test
> 8) & (dx_test
%
%
%
Checks
dx = dx test;
< (x-7)))
%
satisfies constraints
if x-coordinate
rndcnt = rndcnt +1;
%
x switch = 1;
%
else
rnd cnt = rnd cnt + 1;
end
end
while y_switch < 1
dy_test = ceil(pos(rnd_cnt)*y);
if
((dy_test
> 8) & (dy test
%
%
< (y-7)))
dy = dy_test;
rnd cnt = rnd cnt + 1;
y_switch = 1;
else
rndcnt = rnd cnt + 1;
177
%
Checks
%
%
%
satisfies constraints
if y-coordinate
end
end
while
z switch
< 1
dz_test = ceil(pos(rnd_cnt)*z);
if
> 20) & (dz test < (z-19)))
((dztest
dz = dz test;
%
%
Checks if z-coordinate
satisfies constraints
rnd cnt = rnd cnt + 1;
z switch
= 1;
else
rnd cnt = rndcnt
+ 1;
end
end
Dl(dx,dy,dz) = 1;
% Establishs detector center-point
% in the detector matrix
% x-axis loop
% Dimension control
for i = dx-r:dx+r
if
((i
< 1)
))
I (i >
continue
end
for j = dy-r:dy+r
if ((j < 1)
(
))
% y-axis loop
% Dimension control
I (k > z))
% z-axis loop
% Dimension control
>
continue
end
for k = dz-r:dz+r
if
((k
< 1)
continue
end
if sqrt((i-dx)^2+(j-dy)^2+(k-dz)
2)
<= r
% Checks whether
% element is within
% the detection
% sphere
Dl(i,j,k)
% Fills in the detector matrix
= 1;
end
end
end
end
% Current geometry matrix and detector matrix are 'OR'ed together
DO = DO
D1;
count = count + 1;
rnd cnt = 1;
178
end
det_cov = sum(sum(sum(DO)));
cov(l)
= det_cov/(x*y*z);
% Sums the number of elements within detection spheres
% Calculates fractional coverage volume and writes it
% to an output vector
end
File = strcat(num2str(X), '',num2str(Y) , ',num2str(Z),'
), ' ',num2str(N))
meancov = mean(cov)
median cov = median(cov)
stdcov = std(cov)
min cov = min(cov)
',num2str(r),' ',num2str(numdet
% Statistical analysis of full output vector
max cov = max(cov)
toc
179
% Centerline Deployment Simulator
function cov = centerline(X,Y,Z,r,det_start,det_step,det_stop)
tic
x = 8 * X; % Conversion from TEUs to feet
y = 8 * Y; % Conversion from TEUs to feet
z = 20 * Z; % Conversion from TEUs to feet
DO = logical(zeros(x,y,z));
% Constructs initial geometry matrix
for det = det_start : det_step : det_stop
% Detector placement loop
D1 = logical (zeros(x,y,z));
% Constructs a new detector matrix
dx = ?;
% 1440 TEU -> dx = 28
%
%
%
%
dy = ?;
2496
3600
4800
6460
TEU
TEU
TEU
TEU
->
->
->
->
dx
dx
dx
dx
=
=
=
=
36
36
36
36
% 1440 TEU -> dy = 36
%
%
%
%
2496
3600
4800
6460
TEU
TEU
TEU
TEU
->
->
->
->
dy
dy
dy
dy
=
=
=
=
44
44
60
68
dz = det
% Places detectors along the length
Dl(dx,dy,dz) = 1;
% Fixes center-point of detector in
% the detector matrix
for i = dx-r:dx+r
if
((i <
1)
I
% x-axis loop
(i > x))
% Dimension
control
continue
end
for
j = dy-r:dy+r
((j < 1)
(j
continue
end
% y-axis loop
if
>
y))
% Dimension
for k = dz-r:dz+r
if
((k
< 1)
I
cont:rol
% z-axis
(k > z))
% Dimension
cont: rol
continue
end
if sqrt((i-dx)^2+(j-dy)A2+(k-dz)A2)
<= r
% Checks whether
% element is within
% the detection
% sphere
180
Dl(i,j,k) = 1;
% Fills in the detector matrix
end
end
end
end
DO = DO
Dl;
% Current geometry matrix and detector matrix are 'OR'ed together
end
= sum(sum(sum(DO)));
detco
co = det_cov/(x*y*z);
cov
% Sums the number of elements within detection spheres
% Calculates fractional coverage volume
% Outputs fractional coverage volume
toc
181
MITLibraries
Document Services
Room 14-0551
77 Massachusetts Avenue
Cambridge, MA 02139
Ph: 617.253.5668 Fax: 617.253.1690
Email: docs@mit.edu
http: //libraries, mit. edu/docs
DISCLAIMER OF QUALITY
Due to the condition of the original material, there are unavoidable
flaws in this reproduction. We have made every effort possible to
provide you with the best copy available. If you are dissatisfied with
this product and find it unusable, please contact Document Services as
soon as possible.
Thank you.
Some pages in the original document contain color
pictures or graphics that will not scan or reproduce well.
Download