Your new experience awaits. Try the new design now and help us make it even better

ORIGINAL RESEARCH article

Front. Ind. Eng., 25 August 2025

Sec. Industrial Informatics

Volume 3 - 2025 | https://doi.org/10.3389/fieng.2025.1620422

This article is part of the Research TopicLearning-driven Optimization for Solving Scheduling and LogisticsView all 5 articles

Hybrid heuristic approach for generalized police officer patrolling problem

  • 1Department of Life Science and Informatics, Graduate School of Engineering, Maebashi Institute of Technology, Maebashi, Gunma, Japan
  • 2Department of Life Engineering, Faculty of Engineering, Maebashi Institute of Technology, Maebashi, Gunma, Japan

In urban areas with many commercial facilities, patrolling by police officers or security guards is essential for crime prevention, in addition to the use of surveillance cameras. To address the challenge of planning effective patrol routes, Tohyama and Tomisawa introduced the Police Officer Patrolling Problem (POPP), an arc routing problem that allows for visual monitoring from intersections and is proven to be NP-complete. Building on this work, we propose the Generalized POPP (GPOPP), a more realistic bi-objective combinatorial optimization model. This model simultaneously minimizes the total patrol route length and maximizes the coverage of surveillance areas. The contributions of this paper are threefold: (1) we formulate the GPOPP by incorporating practical constraints, such as mandatory patrolling of high-security roads and visibility-based coverage from intersections; (2) we develop a novel hybrid heuristic method that combines a multi-objective evolutionary algorithm (MoEA-HSS) with an improved Jaya algorithm to solve the GPOPP effectively; and (3) we conduct comprehensive computational experiments using benchmark instances to evaluate the effectiveness and competitiveness of the proposed method. These contributions demonstrate the practicality and efficiency of our approach for addressing realistic urban patrolling problems.

1 Introduction

In the fields of information engineering and science, to solve various social and economic problems, these problems are generally structured as mathematical models, and solutions are found using algorithms that are suited to that structure. Many of these problems are modeled using discrete graphs, and there are many studies on them.

One of the problems modeled by discrete graphs is the routing problem. Routing problems are classified as node routing problems (NRPs), which traverse the nodes of a graph, and arc routing problems (ARPs), which traverse the edges (or arcs). A typical NRP is the traveling salesperson problem (TSP). The TSP is a problem that involves finding the minimum-cost route that visits every vertex exactly once. The vehicle routing problem (VRP) (Dantzig and Ramser, 1959) is a generalization of the TSP. This problem involves planning transportation from a distribution center to multiple customers using trucks or other transportation methods. Both the TSP and VRP are NP-hard; thus, evolutionary algorithms, such as genetic algorithms (GAs), have been studied (Elatar et al., 2023).

The most famous ARP is probably the Euler circuit problem. This problem determines whether there exists a circuit that traverses all edges exactly once for a given graph, and this problem is solvable in polynomial time. The Chinese postman problem (CPP) (Mei-Ko, 1962), which is a generalization of the Euler circuit problem, involves determining whether a tour exists for a post officer in a given area within a given amount of time that starts and ends at the post office. The post officer must traverse every street in the area at least once; however, they may traverse any street several times. The CPP on undirected or directed graphs can be solved in polynomial time (Edmonds and Johnson, 1973). Papadimitriou (1976) showed that the CPP on mixed graphs is NP-complete. Mixed graphs represent realistic situations in urban areas with both two- and one-way streets. The rural postman problem (RPP) is a generalization of the CPP with a given set of edges that must be traversed by a post officer. This problem considers the fact that, in rural areas, not every street has a delivery destination. Lenstra and Rinnooy-Kan (1976) and Lenstra and Rinnooy-Kan (1981) showed that the optimization version of the RPP on undirected or directed graphs is NP-hard. The capacitated ARP (CARP) is an ARP corresponding to the VRP, which belongs to the NRP. The CPP, RPP, and CARP correspond to mathematical models of real social problems such as postal delivery, delivery planning, snow shoveling, and garbage collection. Finding exact solutions for the CPP and RPP optimization problems is intractable, along with the TSP and VRP; thus, various heuristic methods have been proposed for these problems. Recent examples include methods using GAs (Gil-Gala et al., 2023), the Tabu search algorithm (Tang et al., 2024), and ant colony optimization (Sgarro and Grilli, 2024).

Police patrols play a crucial role in preventing crimes and accidents, thereby ensuring public safety within their jurisdictions. Recent studies such as (Kim et al., 2023; Dewinter et al., 2020; Samanta et al., 2022) have proposed methods for optimizing patrol routes. These approaches primarily employ heuristic algorithms to generate efficient patrol routes for multiple officers operating within the shared area.

Recently, Tohyama and Tomisawa (2022) proposed the police officer patrol problem (POPP) as a mathematical model of the patrolling route problem of police officers (or security guards), and showed that the decision problem is NP-complete (Tohyama and Tomisawa, 2022). Patrolling areas generally include one- and two-way streets; thus, the POPP is modeled using a mixed graph. At each intersection, police officers may conduct security checks visually even if they do not traverse the streets connecting to it. If the POPP is considered a CPP model, it is necessary to find a patrolling route that traverses all streets. The POPP model allows some streets to conduct visual security checks without traversing, making it possible to find more efficient patrolling routes. In addition, Tomisawa and Tohyama showed that the POPP on weighted digraphs is NP-complete (Tomisawa and Tohyama, 2024).

In this study, we introduce the generalized POPP (GPOPP) as a model to adapt the POPP to more realistic patrolling routes by police officers. The POPP model requires that all areas be guarded. However, in reality, some streets require security because important facilities are located there, and some roads do not necessarily require security (Chainey et al., 2021). In addition, there are cases where a patrolling route needs to be found that can be patrolled within a given time. Therefore, we define the GPOPP as an optimization problem with the following two objectives. The first objective is to find the shortest patrolling route among the routes that traverse all high-security streets. The second objective is to find a patrolling route that guards as large a given area as possible (maximizes coverage).

Many GAs have been proposed to solve multi-objective problems (Deb et al., 2002; Sardinas et al., 2006; Pizzuti, 2009; Ghoseiri and Ghannadpour, 2010; Aiello et al., 2012; Akyurt et al., 2015; Yu et al., 2015; Lu et al., 2019). The hybrid sampling strategy based multi-objective evolutionary algorithm (MoEA-HSS) (Zhang et al., 2014) is based on a hybrid sampling strategy that combines a vector-valued GA (VEGA) (Schaffer, 2014) and a sampling strategy according to the Pareto dominating and dominated relationship-based fitness function (PDDR-FF) (a goodness-of-fit function based on Pareto dominance–dominance relations). The MoEA-HSS has demonstrated effectiveness for several problems. The Jaya algorithm (Rao, 2016) is a meta-heuristic algorithm with a very simple structure based on the concept that solutions obtained for a particular problem progress toward the best solution and avoid the worst solution. We propose a hybrid heuristic approach that combines the MoEA-HSS with an improved Jaya algorithm, and demonstrate its effectiveness through numerical experiments.

The remainder of this paper is organized as follows. In Section 2, we formally define the Generalized Police Officer Patrolling Problem (GPOPP) and present the necessary graph-theoretical concepts. Section 3 provides a mathematical formulation of the GPOPP as a bi-objective optimization problem. In Section 4, we describe the proposed hybrid heuristic method that combines the MoEA-HSS and an improved Jaya algorithm. Section 5 presents the results of the numerical experiments conducted to evaluate the performance of the proposed method. Finally, Section 6 concludes the paper and discusses potential directions for future research.

2 Generalized police officer patrolling problem (GPOPP)

In this study, we introduce a bi-objective problem that can be applied to more realistic problems based on the POPP, which is NP-complete edge routing decision problem, and propose a heuristic algorithm to solve the problem. One police officer (or security guard or robot) is assigned to a security area, and each officer patrols his/her assigned area. Each street through which a police officer is traversed during a patrol is considered guarded. In addition, except for streets with important facilities, police officers are allowed to visually confirm each street adjacent to an intersection without traversing it. The GPOPP is a bi-objective optimization problem with the following two objectives: One is to find the patrolling route with the shortest length, and the other is to find the route with the largest guarded area. Here, we note that all high-security streets must be traversed. In this section, we define the notion in graph theory necessary to formulate the GPOPP.

Throughout this paper, let N={1,2,3,} be the set of all natural numbers. Let Ik={0,1,2,,k1} and Ik+={1,2,3,,k} for each kN. Let G=(V,E,A) be a connected simple mixed graph, where V is the set of vertices, E is the set of undirected edges and A is the set of arcs. Hereafter, the number of vertices in G is denoted as n and fixed to V={1,2,,n}. Here, we denote an undirected edge by {u,v} and an arc by (u,v). The term “edge” refers to either an undirected edge or an arc, denoted by u,v. Thus, if u,v is an undirected edge, u,v=v,u; if it is an arc, v,uA.

Let m be a sufficiently large positive integer. Then, let d be a function from V2 to N satisfying the following conditions: for all u, vV

1. d(u,v)=d(v,u),

2. u,vEAorv,uEAd(u,v)<m,

3. u,v, v,uEAd(u,v)=m.

Here, d(u,v) denotes the distance between u and v if there exists an edge u,v (or v,u). For convenience, d(u,v)=m when there is no edge between u and v.

Let H be a subset of EA. We consider that there exist important facilities on each edge in H that must be stopped at. Each edge in H is considered a high-security edge. A sequence s: v0, v1, v2, , vk of vertices is considered a patrolling route on G if the following conditions hold:

1. The sequence s is a walk. That is, vi,vi+1EA for each iIk.

2. All edges in H are on s. That is, if {u,v}H, there exists iIk satisfying u=vi and v=vi+1 or u=vi+1 and v=vi. If (u,v)H, there exists iIk satisfying u=vi and v=vi+1.

3. vk=v0. That is, the walk s is closed.

The length L(s) of a patrolling route s is the total sum of the distances of all edges on s and is calculated as follows:

Ls=i=0k1dvi,vi+1.

For a patrolling route s, let Vs={viV|iIk} and Es={vi,vi+1EA|iIk}. Here, Vs denotes the set of vertices on s, and Es denotes the set of edges traversed in s. Let u,v be an edge of G. If uVs or vVs, the edge is considered guarded. In particular, if u,vEs, said the edge is considered guarded by traversing; otherwise, if exactly one vertex of u and v is in Vs, the edge is considered guarded by visual confirmation.

Let Esg={u,vEA|uVs or vVs} be a set of edges guarded by a patrolling route s. Then, the total sum of the distances of all edges guarded by s is denoted as u,vEsgd(u,v). The total sum of the distances of all edges of G is denoted as u,vEAd(u,v); thus, the covered ratio cov(s) of G by s is defined as follows:

covs=u,vEsgdu,vu,vEAdu,v1.

Similarly, cov̄(s)=1cov(s) is called the noncovered ratio of G by s. For any patrolling route s of G, 0<cov(s)1 and 0cov̄(s)<1 holds.

An example of a patrolling route for a mixed graph is illustrated in Figure 1. The red edges represent high-security edges, and the blue line indicates a patrolling route. The green area is guarded by this patrolling route. In particular, the green area not on the patrolling route is guarded by visual confirmation. The graph shown in Figure 1 has 60 vertices and 104 edges. Let us assume that the distance between any two vertices is one. Then, the length of the patrolling route is 44. The total sum of the distances of the guarded edges is 84, and the covered and noncovered ratios are 0.808 and 0.192, respectively.

Figure 1
Grid network diagram illustrating nodes connected by green lines and arrows. Black arrows indicate primary connections, while blue and red arrows highlight a specific path. Orange circles mark the nodes' intersections.

Figure 1. Patrolling route (blue line) on mixed graph. The red edges represent high-security edges, and the green area indicates a guarded area.

Let vi (iIk) be a vertex on a patrolling route s: v0, v1, v2, , vk of a mixed graph G=(V,E,A). If vi1,vi, vi,vi+1H and vi1,vi+1EA, then the sequence s: v0, v1, v2, , vi1, vi+1, , vk1, vk by removing vi from s is also a patrolling route of G (In the case i=0, s: v1, v2, v3, , vk1, v1 is a patrolling route if vk1,vk, v0,v1H and vk1,v1EA). Some edges guarded by visual confirmation from vi on s may not be guarded on s, although two edges removing from s are guarded by visual confirmation. That is, cov̄(s)cov̄(s) holds. On the other hand, the increase or decrease in the length of the sequence v0, v1, v2, , vk does not determine the increase or decrease in the length of the patrolling route. That is, L(s)L(s) holds if the triangle inequality d(vi1,vi+1)d(vi1,vi)+d(vi,vi+1) (d(vk1,v1)d(vk1,vk)+d(v0,v1) in the case i=0) is satisfied, otherwise, L(s)L(s) holds.

3 Formulation

The GPOPP is a bi-objective optimization problem that obtains a patrolling route with the shortest length and the lowest noncovered ratio for a given connected simple mixed graph G=(V,E,A), a set HEA of high-security edges, and a distance function d:V2Z+. The parameters n, cu,v, hu,v, and du,v for the GPOPP are defined as follows:

(i) n: number of vertices.

(ii) cu,v=1,if u,vEA,0,otherwise.

If G has an undirected edge {u,v}, cu,v=cv,u=1; if G has an arc (u,v), cu,v=1 and cv,u=0.

(iii) hu,v=1,if u,vH or v,uH,0,otherwise.

Note that hu,v=hv,u=1 even if u,v is an arc in H.

(iv) du,v=d(u,v) for each (u,v)V2.

(v) cu,v=1,if cu,v+cv,u>0,0,otherwise.

In other words, cu,v=1 when there is an edge that has endpoints u and v; cu,v=0 when there is no edge between them in the mixed graph G. cu,v is immediately obtained from cu,v.

The decision variables for the GPOPP are xu,v and yu,v. The decision variable xu,v represents the number of times the edge u,v is traversed from u to v. If there exists no edge between u and v, xu,v=0. The decision variable yu,v is expressed as follows:

(vi) yu,v=12,if k=1nxu,k>0 and k=1nxv,k>0,1,if k=1nxu,k>0 and k=1nxv,k=0,0,otherwise.

We remark that k=1nxu,k is strictly positive if and only if the vertex u is in Vs. Thus, yu,v=yv,u=12 when both u and v are on s; yu,v=1 and yv,u=0 when u is on s even though v is not on s. Note that yu,v=yv,u=12 does not mean that u,v or v,u are in Es. Then, u=1nv=1ncu,vdu,vyu,v denotes the total length of edges guarded by the patrolling route s.

Let x=(x1,1,x1,2,,xn,n) be an n2-tuple of nonnegative integers. The mathematical model for the GPOPP is formulated as follows:

minimizef1x=u=1nv=1ndu,vxu,v,minimizef2x=1u=1nv=1ncu,vdu,vyu,vu=1n1v=u+1ncu,vdu,v1.

The objective function f1 is the function that minimizes the total length of the patrolling route, and f2 is the function that minimizes the noncovered ratio.

The following constraints must be satisfied:

xu,v0u,vV,(1)
cu,v=0xu,v=0u,vV,(2)
hu,v=1xu,v+xv,u>0u,vV,(3)
v=1nxv,u=v=1nxu,vuV,(4)
WϕWVxuWvWxu,v>0WVx,(5)

where Vx=uVv=1nxu,v>0 is the same as Vs defined in the previous section. Equation 1: The number of times to directly traverse from u to v is nonnegative. Equation 2: If there exists no edge between u and v or even if there exists an arc from v to u, it is not possible to directly traverse from u to v. Equation 3: The edge u,v (or v,u) must be traversed if it is a high-security edge. Equation 4: For any vertex u, the number of times traversed from other vertices to u is the same as the number of times traversed from u to other vertices.

Suppose that x does not satisfy Equation 5. Then, there exists a nonempty proper subset W of Vx that satisfies uWvWxu,v=0. This means that any edge u,v incident to uW and vVxW is not traversed; therefore, x represents two or more separate walks. In other words, based on Equation 5, the patrolling route is a continuous closed walk.

The notation used in formulating the mathematical programming model for GPOPP is summarized as follows:

Parameters

cu,v    1 if u,vEA, 0 otherwise

cu,v    1 if u,vEA or v,uEA, 0 otherwise

du,v     same as d(u,v)

hu,v    1 if u,vH or v,uH, 0 otherwise

n     number of vertices

Decision variables

xu,v    number of traversing from u to v

yu,v    12 if both u,v on s, 1 if only one of u or vis on s0 otherwise,

Objective functions

f1   minimize the length of the patrolling route L(s)

f2   minimize the length of the non-covered ratio cov̄(s)

4 Proposed methods

4.1 Framework

The GPOPP requires two conflicting objectives to be considered simultaneously: minimizing the total length of the patrolling route and minimizing its noncoverage ratio. Many Pareto-optimal solutions with incomparable qualities must be generated for the decision-maker. In this section, we introduce a hybrid heuristic approach based on the MoEA-HSS and the improved Jaya algorithm for the GPOPP.

The MoEA-HSS is based on a hybrid sampling strategy that combines the VEGA and a sampling strategy according to the PDDR-FF. The sampling strategy of the VEGA is a natural extension of simple GAs in the sense that the individuals are divided and reproduced independently according to each objective function. It prefers the edge region of the Pareto front with less time complexity, and the qualities of the solution are not good because of the selection bias. Conversely, the PDDR-FF-based sampling strategy tends to converge toward the central area of the Pareto front. The combination of these two mechanisms is expected to maintain both the convergence rate and distribution performance. The Jaya algorithm modifies a given individual to move closer to the best solution and away from the worst solution based on the best and worst candidates in the population. The Jaya algorithm is expected to accelerate the convergence rate.

The main framework of the proposed method is shown in Figure 2. The assemblage of chromosomes in each generation t is divided into two groups A(t) and P(t). A(t) and P(t) are called Archive and Population, respectively. The Pareto solution set update shown in the figure follows the same procedure as in the MoEA-HSS (Zhang et al., 2014) framework.

Figure 2
Procedure outlining the Hybrid MoEA-HSS and Improved Jaya Algorithm. It details the inputs, outputs, and steps involved in generating Pareto-optimal solutions. The process includes initializing variables, creating mating pools, calculating objective functions, performing crossover and mutation, and updating archives to achieve the best Pareto solution. The procedure is divided into phases, each focusing on selection, integration, and optimization.

Figure 2. Pseudocode for the proposed method.

Let np be a positive constant. Initially, archive is set to empty, and the initial population consists of n(0)(np) individuals. For each individual p in population, the objective functions f1(p) and f2(p) and the evaluation function eval(p) are calculated. We adopt the PDDR-FF as the evaluation function eval. Let gd(p) be the number of individuals that can be dominated by the individual p and gnd(p) be the number of individuals that can dominate the individual p. Then,

evalp=gdp+1gndp+1.

Based on these values, the Pareto-optimal solution in the population is obtained and maintained.

The following three phases are executed in each generation t. In each generation t(>1), archive A(t) contains na individuals and population P(t) contains n(t)(np) individuals generated by genetic operations (Crossover and Mutation) and Improved Jaya algorithm in the previous generation.

Phase 1: generating mating pools

1. Using the VEGA, two subpopulations M1(t) and M2(t), called mating pools from P(t), are created. M1(t) is created by 12np individuals selected from P(t) based only on the value of f1. Then, the value of f2 is ignored. Similarly, M2(t) is created by 12np individuals selected from P(t) based only on the value of f2.

2. An integrated mating pool M(t) is created by combining the two mating pools M1(t) and M2(t) and Archive A(t).

Phase 2: create P(t+1)

For individuals in the integrated mating pool M(t), Crossover and Mutation operations and the Improved Jaya algorithm are applied, and the t+1-th generation population P(t+1) consisting of np or more individuals is created. These three operations are described in detail in the following.

Phase 3: create A(t+1)

1. For each p in A(t) and P(t+1), the values f1(p), f2(p), and eval(p) are computed.

2. A(t+1) is created by selecting na individuals from A(t) and P(t+1) in the order of decreasing eval value.

Phases 1 – 3 of the proposed method are depicted in Figure 3.

Figure 3
Flowchart illustrating a genetic algorithm process over three phases across generations. - Generation \(t\): Individuals in \(A(t)\) and \(P(t)\).- Phase 1: Splits into \(A(t)\), \(M_1(t)\), \(M_2(t)\) using VEGA.- Phase 2: Applies crossover, mutation, Jaya method.- Phase 3: Selects best individuals for \(A(t+1)\) from \(A(t)\) and \(P(t+1)\).Transition to generation \(t+1\).

Figure 3. Phases 1–3 of the proposed method.

4.2 Chromosome representation and notation

The most natural route expression is adopted as the chromosome expression in the proposed method. For example, if a sequence s: v0, v1, v2, , vk of vertices is a legal patrolling route, its chromosome representation is a k-tuple p=(v0,v1,v2,,vk1). The first component of p is considered the starting point. By rotating the genes in p, the chromosome at which the starting point is replaced with vi is denoted by p(i). That is,

pi=vi,vi+1,,vk1,v0,v1,,vi1.

Since GPOPP does not have a fixed starting point, all chromosomes p(0), p(1), p(2), , p(k) represent the same patrolling route. This representation p(i) obtained by routing the genes of chromosome p is useful for explaining the genetic operations introduced below. Let V=V be the set of all genes and Vp={vi|1i<k} be the set of genes contained in chromosome p. For each gene vV, let Ivp={iIk|vi=v} be the set of gene loci whose gene is v. Let E=EA and Ep={vi,vi+1|0i<k1}{vk1,v0} be a set of pairs of adjacent genes in chromosome p and H=H. Genes vk1 and v0 are also considered adjacent. Here, Vp=Vs and Ep=Es. Let vi and vi+ denote the previous and next genes of vi (0i<k) in chromosome p, respectively. Here, these gene loci are i=i1(mod k) and i+=i+1(mod k), where x (mod k) denotes the least nonnegative remainder when x is divided by k. Then, the two sets Wup and W̄up of the gene loci are defined as follows:

For each gene uVp,

Wup=iIk|vi=u,vi,vi,vi,vi+Ep\H,vi,vi+E.

For each gene uVp,

W̄up=iIk|vi,vi+Ep\H and vi,u,u,vi+E.

4.3 Initial population

As mentioned in Section 4.1, an initial population consisting of np individuals is constructed. Each individual in the initial population is generated as follows:

1. First, the direction traversing each high-security undirected edge is decided randomly, since because all high-security edges are traversed on every patrolling route.

2. Determine the order of traversing high-security edges randomly.

3. Generate chromosome q representing the patrolling route that traverses high-security edges in the order determined in step 2. Here, to maintain the diversity of the initial population, two consecutive high-security edges are connected by a shortest path via a randomly selected vertex. The shortest walk w[u,v,u] from vertex u to u via v can be determined using the Dijkstra’s algorithm.

4. The patrolling route represented by the generated chromosome q may be able to reduce the total length without changing the noncoverage rate. Therefore, the improvement procedure described below is used for chromosome q generated in step 3.

The pseudocode for the procedure generating the initial population P(1) consisting of np individuals is presented in Figure 4.

Figure 4
Text detailing an algorithm for creating an initial population. It includes inputs and outputs, iterative steps with conditions for selecting and setting variables, and the use of functions and walks to generate a chromosome. The procedure concludes with returning the initial population.

Figure 4. Pseudocode for the creation of the initial population.

Let s:v0, v1, v2, , vk1, vk be a patrolling route, and assume that v0=vi+1=vj=u and v1=vi=vj+1=v (i, jIk, ij). Then, the edge connecting u and v is undirected. If i<j, the edge is traversed three times on s, as shown in the left panel of Figure 5a, and there exists a patrolling route that reduces the total length, as shown in the right panel of Figure 5a. Such a patrolling route traverses all edges on the original route; thus, the noncoverage rate remains unchanged. Similarly, even if j<i, the edge is traversed three times, as shown in the left panel of Figure 5b, and there exists a patrolling route that reduces the total length without changing the noncoverage rate, as shown in the right panel of Figure 5b. In general, assume that undirected edge {u,v} is traversed from u to vl1(1) times and from v to ul2(1) times. If l1l2, there exists a patrolling route that reduces both the number of times traversing from u to v and from v to u by min{l1,l2} times without changing the noncoverage rate. If l1=l2>1, there exists a patrolling route that reduces both the number of times traversing from u to v and from v to u by l11 times without changing the noncoverage rate. The pseudocode for the improvement procedure of the chromosome is shown in Figure 6.

Figure 5
Diagram showing two-step graph transformations. Panel (a) depicts a sequence of vertices \(v_0\) to \(v_3\) in lines colored blue, red, and green, with transformation arrows leading to vertex adjustments. Panel (b) illustrates a similar structure with different edge configurations, maintaining the same vertex sequence and colors. Both panels are connected by an arrow symbolizing the transformation process.

Figure 5. Construction of patrolling route from which redundant traversing of undirected edges is reduced: (a) case i < j, (b) case j < i.

Figure 6
Pseudocode for a procedure named

Figure 6. Pseudocode for the improvement of individual.

4.4 Crossover

Let p1=(u0,u1,,uk1) and p2=(v0,v1,,vl1) be two parent individuals. Then, the crossover operation is used in the proposed method to replace a partial walk on the patrolling route corresponding to p1 with that corresponding to p2. The procedure is as follows:

(a) Any patrolling route requires that all high-security edges are traversed. First, one high-security edge e0 is randomly selected from H, and one gene ui0 in p1 such that e0=ui0,ui0+ and one gene vj0 in p2 such that e0=vj0,vj0+ are selected (Figure 7a).

(b) Find the high-security edge e1=ui1,ui1+ that first appears in the rotated chromosome p1(i0+), and in the rotated chromosome p2(j0+), randomly select one gene vj1 such that e1=vj1,vj1+ (Figure 7b).

(c) In the patrolling route corresponding to the chromosome p1(i0+), the partial walk between ui0+ and ui1 does not include high-security edges. Therefore, offspring q1 can be created by replacing this partial walk with the partial walk between vj0+ and vj1 in p2(j0+). However, when selected high-security edges e0 or e1 are undirected edges, the direction of traversing them on p1 may differ from the direction of traversing them on p2. In this case, simply exchanging partial walks does not lead to creating an accurate patrolling route. Based on the direction of traversing e0 and e1, the process of creating offspring q1 can be divided into four steps as follows (Figure 7c): Let q=(vj0+,,vj1,ui1+,,ui0) be a chromosome to be created by simply replacing the partial walk from ui0+ to ui1 on p1(i0+) with the partial walk vj0+ to vj1 on p2(j0+). Then,

(1) When both e0 and e1 are traversed in the same direction on p1(i0+) and p2(j0+) (that is, ui0=vj0 and ui1=vj1), let q1 be q.

(2) When e1 is traversed in the opposite direction although e0 is traversed in the same direction (that is, ui0=vj0 and ui1vj1), let q1 be the chromosome created by inserting gene vj1+ between vj1 and ui1+ on q.

(3) When e0 is traversed in the opposite direction although e1 is traversed in the same direction (that is, ui0vj0 and ui1=vj1), let q1 be the chromosome created by appending gene ui0+ at the end on q.

(4) When both e0 and e1 are traversed in the opposite direction (that is, ui0vj0 and ui1vj1), let q1 be the chromosome created by inserting gene vj1+ between vj1 and ui1+ and by appending gene ui0+ at the end on q.

(d) Find the high-security edge e2=vj2,vj2+ that first appears in the rotated chromosome p2(j0+), and in the rotated chromosome p1(i0+), randomly select one gene ui2 such that e2=ui2,ui2+. Following the procedure used to create offspring q1, offspring q2 is created.

(e) Create offspring q1 and q2 by applying the improvement procedure described in Section 4.3 to q1 and q2.

Figure 7
Three panels labeled (a), (b), and (c) show graphs with paths and edges. Panel (a) has graphs \(p_1\) and \(p_2\) with paths between labeled nodes connected by edges \(e_0\). Panel (b) has graphs \(p_1(i_0^+)\) and \(p_2(j_0^+)\) showing paths with additional edge \(e_1\). Panel (c) displays four graphs \(q_1\) with conditions labeled (1) to (4), illustrating different configurations of paths and edges \(e_0\) and \(e_1\) at various nodes. Each graph contains circular node markers and curved lines for path sections.

Figure 7. Creation of offspring from parent individuals in Crossover operation: (a) original parent individuals p1 and p2, (b) rotated chromosomes p1(i0+) and p2(j0+), and (c) offspring q1 created from p1(i0+) and p2(j0+).

The pseudocode for the proposed crossover operation is presented in Figure 8.

Figure 8
Pseudocode for a crossover procedure in a genetic algorithm. It involves two parent individuals, denoted as \( p_1 \) and \( p_2 \), to produce offspring \( q_1 \) and \( q_2 \). The process includes selecting strictly guarded edges, creating offspring from parent chromosomes, and applying an improvement function before returning the results.

Figure 8. Pseudocode for crossover operation.

4.5 Mutation

In the crossover operation, the walk of parent individuals tends to be inherited by their offspring. Therefore, it is seldom that generated offspring will traverse vertices or edges that their parents do not. To maintain the diversity of the population, we introduce a mutation operation (Figure 9).

Figure 9
Procedure for

Figure 9. Pseudocode for mutation operation.

In this operation, the following steps are executed repeatedly: randomly select a gene (vertex) u and

1. if gene u exists on the patrolling route corresponding to the chromosome, select one locus i such that vi=u, and if there exists an edge vi,vi+ connecting vertices vi and vi+ before and after u, remove gene vi from the chromosome (see Figure 10a).

2. if gene u does not exist on the patrolling route corresponding to the chromosome and succsessive genes vi and vi+ exist on the route such that both vi,u and u,vi+ are in E, insert gene u between vi and vi+ (see Figure 10b).

Figure 10
Diagrams (a) and (b) illustrate transformations of paths in a graph. Each consists of green and yellow nodes connected by blue, red, and dashed black lines. In both, a green node labeled \(v_{i-}\) or \(v_i\) connects to a yellow node labeled \(u\), then to another green node labeled \(v_{i+}\). Diagram (a) shows the initial configuration, while diagram (b) shows the altered path using different colors for paths and placements of nodes.

Figure 10. Mutation operation in which a vertex u is selected. (a) the case that u is on the patrolling route and there exists an edge vi,vi+ connecting vertices before and after u; (b) the case that u is not on the route and there exist edges vi,u and u,vi+ for some vertex vi on the route.

4.6 Local search strategy based on the Jaya algorithm

The crossover operation introduced in Section 4.4 is an order-based operation in which the orders of traversing the high-security edges of parents and other edges are inherited by offspring. To compensate for the ability to converge the solutions of this crossover, we introduce an improvement strategy that moves dominated solutions closer to a Pareto-optimal solution by combining the strategy used in the mutation operation with the Jaya algorithm.

As mention in Section 2, if the triangle inequality holds, removing a vertex v from the patrolling route tends to reduce the noncovered ratio since edges may be no longer guarded by visual confirmation from v, although the total length of the patrolling route becomes shorter. Conversely, adding a vertex that is not on the patrolling route increases the total length; however, this is expected to improve the noncovered ratio because edges guarded by visual confirmation may increase.

The approach we propose here (called the improved Jaya algorithm below) modifies a given individual to move closer to the best solution and away from the worst solution based on the best and worst candidates in the population. The outline of the proposed strategy is presented in Figure 11. Let pb and pw be the best and worst chromosomes in the current population, respectively, and let sb and sw be the patrolling routes corresponding to pb and pw, respectively. Let ϵ be a sufficiently small positive real number. By putting f1b=L(sb), f2b=cov̄(sb), f1w=L(sw), f2w=cov̄(sw), the coordinates of sb and sw are (f1b,f2b) and (f1w,f2w), respectively. Then, to modify a certain dominated solution s(f1,f2) to be closer to sb and away from sw, a hypothetical solution so(o1,o2) is computed based on the strategy of the improved Jaya algorithm. To move s closer to the hypothetical solution so, the mutation strategy is strategically repeated as follows: Let g1=1f1w|f1o1| and g2=1f2w|f2o2|, which are normalizations of |f1o1| and |f2o2|, respectively. If all edges are high-security edges, set g2=0 because f2w=0. The following operations are performed if the triangle inequality holds.

if g1g2, an operation is performed to move the first component of point (f1,f2) closer to the first component of point (o1,o2). Specifically, if f1o1, vertices are removed from the patrolling route to reduce the total distance; if f1<o1, vertices are added not on the patrolling route increase the total distance.

If g1<g2, an operation is performed to move the second component of point (f1,f2) closer to the second component of point (o1,o2). Specifically, if f2<o2, vertices are removed from the patrolling route to reduce the noncovered ratio; if f2o2, vertices are added not on the patrolling route to increase the noncovered ratio.

Figure 11
A scatter plot illustrating points in the f1 and f2 space. Points include orange, teal, pink, yellow, and blue dots. The teal dots are connected with green dashed arrows leading towards the pink and yellow points. The yellow point is enclosed in a dashed circle labeled ε. The axes are labeled

Figure 11. Behavior of the improved Jaya algorithm in the criterion space.

Remark that so is a hypothetical solution that does not always exist; thus, the operation is repeated until approaching the neighborhood of so (inside a circle of radius ϵ centered on so), or the operation is repeated until the terminal condition is reached. The pseudocode for the improved Jaya algorithm is presented in Figure 12.

Figure 12
Pseudocode text describing an improved Jaya algorithm. It includes input and output specifications, and a sequence of steps using variables, functions, and conditions to generate an individual as a solution. Key operations use mathematical expressions and random number generation. The text is formatted for easy reading and understanding.

Figure 12. Pseudocode for the improved Jaya algorithm.

5 Numerical experiments

In this section, we report the results of numerical experiments conducted to verify the effectiveness of the proposed method (the hybrid strategy of MoEA-HSS and the improved Jaya algorithm) for the GPOPP. In these experiments, we compared the proposed method (called pMH) with the NSGA-II (called NSGA-II) proposed by Deb et al. (2002) and the original MoEA-HSS without the improved Jaya algorithm (called MoEA-HSS). All these methods incorporated the crossover and mutation operations proposed in this paper.

Evaluating the performance of multi-objective optimization methods is not easy since it is difficult to compare the Pareto-optimal solutions (also called the nondominated solutions) obtained by different methods. We compared pMH with NSGA-II and MoEA-HSS using three representative comparison methods. Let Nex be the number of numerical experiments for each method. Let S NSGA-II[i], S MoEA-HSS[i] and S pMH[i] be the Pareto-optimal solution sets of NSGA-II, MoEA-HSS and pMH obtained by the i-th experiment, respectively. The reference solution set S* is defined as the set of nondominated solutions in the union of all Pareto-optimal solution sets iINex+S NSGA-II[i]S MoEA-HSS[i]S pMH[i].

The three evaluation criteria we used are as follows:

1. Number of nondominated solutions. For each method α{NSGA-II, MoEA-HSS, pMH}, |Sα[i]| is the number of nondominated solutions obtained by the i-th experiment for α. In general, the selection of the final solution is left to human judgment; thus, the number of Pareto-optimal solutions is an important evaluation criterion.

2. Generational distance. For the nondominated solution set Sα[i] obtained by each method α{NSGA-II, MoEA-HSS, pMH} and the reference solution set S*, the generational distance GD is defined as follows (Van Veldhuizen, 1999; Ishibuchi et al., 2015):

GDSαi=1|Sαi|xSαiminδx,y|yS*p1p,

where p=2 and δx,y=(f1(y)f1(x))2+(f2(y)f2(x))2 denotes the Euclidean distance between a solution x in Sα[i] and a reference solution y in S*. A smaller GD(Sα[i]) value implies that Sα[i] is closer to S*.

3. Coverage of two sets. For two α,β{NSGA-II,MoEA-HSS,pMH}, where αβ, the coverage C is defined as follows (Zitzler and Thiele, 1999):

CSαi,Sβj=xSβjySαi,yxSβj,

where yx means that f(y)f(x) holds for any objective function f. The value C(Sα[i],Sβ[j]) is in the interval [0,1], with values approaching 1 indicating that a greater number of solutions in Sβ[j] are covered by those in Sα[i].

The benchmark problems used in the experiments were created based on the Mixed Rural Postman Problem (MRPP) benchmark problems RB422 (|V|=357, |E|=674, |A|=210), RB452 (|V|=465, |E|=796, |A|=259), RB472 (|V|=498, |E|=849, |A|=265), RB522 (|V|=388, |E|=828, |A|=278), RB552 (|V|=488, |E|=987, |A|=331) and RB572 (|V|=498, |E|=986, |A|=340) shown in Arc Routing Problems: Data Instances (https://www.uv.es/corberan/instancias.htm). The number of high-security edges (called required edges) defined in the MRPP benchmark problems is sufficiently large. Therefore, they are not suitable for use as benchmarks for methods against the GPOPP in which visual confirmation is allowed. To confirm the effect of visual confirmation, in these experiments, we changed the required edges of each benchmark problem to non-required edges, creating four patterns of benchmark problems with 10, 20, 30, and 40 high-security edges. We used these edges in the experiments. In addition, the ratio of the number of high-security undirected edges to high-security arcs was set to 4:1.

The experiments were conducted on a PC with Windows 11, an AMD Ryzen 5 3500 CPU, 3.59 GHz, and 16.0 GB RAM. We conducted preliminary experiments using the benchmark problem RB422_10 with eight high-security undirected edges and two high-security arcs. The parameters were set as follows: the positive constant np=150, the archive size na=300, the initial population size n(0)=300, the crossover rate=0.3, the mutation rate=0.05, the terminating condition for the improved Jaya algorithm T=50, the radius ϵ=0.1 of a circle centered on the hypothetical solution so and the maximum generations MaxGen=300. When using the improved Jaya algorithm in pMH, the best solution sb is selected from the nondominated solution set S pMH[i]. If many nondominated solutions in S pMH[i] are concentrated in close proximity, the probability that sb will be selected from among these concentrated individuals increases. Consequently, the individuals generated by the improved Jaya algorithm also tend to move in the direction of the concentrated population. To distribute the location of the individuals generated by the improved Jaya algorithm to some extent, sb was selected as follows: Let m=|S pMH[i]|+1010 and l=|S pMH[i]|(modm). Then

1. If m=1, then let S1=S pMH[i].

2. If m>1, then partition S pMH[i] into m subsets S1, S2, , Sm, which satisfy the following conditions:

iIm+Si=S pMH[i],

SiSj=ϕ (i, jIm+, ij),

|Si|=|S pMH[i]|m (iIl+), |Sj|=|S pMH[i]|m (jIm+\Il+).

For each iIm1+,

f1x<f1yxSi,yjIm+\Ii+Sj.

3. Randomly select one subset Si from the m subsets, randomly select one solution x from Si, and put sb=x.

We ran 10 numerical experiments for each method (that is, Nex=10). Comparison results of pMH with NSGA-II and MoEA-HSS at 10, 50, 150 and 300 generations are shown in Table 1. The number of nondominated solutions, generational distance and CPU time are shown in (a) and these are the maximum, minimum, average and standard deviation obtained by 10 experiments. Here, the GD(Sα[i]) for each generation gen{10,50,150,300} is calculated using the Pareto-optimal solution sets Sα[i] at the gen-th generation and the reference solution set S* at the 300th generation. The comparison results for the coverage are shown in (b) and these are calculated by 100 values of C(Sα[i],Sβ[j])(1i,jNex). The evolution of the Pareto-optimal solution set Sα[1] at the 1st experiment for each method is shown in Figure 13.

Table 1
www.frontiersin.org

Table 1. Comparison of pMH with NSGA-II and MoEA-HSS during evolution (benchmark problem: RB422_10).

Figure 13
Four scatter plots (a, b, c, d) depict the relationship between total length \( f_1 \) and non-covered ratio \( f_2 \), comparing three algorithms: NSGA-II, MoEA-HSS, and pMH. Each algorithm is represented with distinct symbols and colors. Overall, points show a descending trend from top left to bottom right, illustrating performance variations.

Figure 13. Evolution of nondominated solutions when executing NSGA-II, MoEA-HSS and pMH for RB422_10. (a) gen = 10 (b) gen = 50 (c) gen = 150 (d) gen = 300.

The number of nondominated solutions |Sα[i]| for NSGA-II and pMH are no significant difference, although the value for MoEA-HSS is slightly lower. If the Pareto-optimal solution set Sα[i] contains even a single solution that is far from S*, the generational distance will have a large value. Therefore, method α cannot be considered inferior simply because the generational distance has a large value. On the other hand, when the minimum value of the generational distance is sufficiently small, method α is considered superior because the nondominated solutions obtained by method α are likely to be close to the solutions in the reference solution set S*. For these reasons, it is more appropriate to use the minimum value, rather than the average or maximum, when conducting evaluations with the generational distance. Therefore, from these experimental results, in evaluations based on the number of nondominated solutions and the generational distance, pMH can be considered superior to other methods. In particular, the comparison between MoEA-HSS and pMH based on these criteria implies that the ability of local search for the improved Jaya algorithm has achieved the expected results.

The coverage C(Sα[i],Sβ[j]) is the rate that solutions in Sβ[j] are covered by solutions in Sα[i]. Hence, if the average of C(Sα[i],Sβ[j]) is higher than the average of C(Sβ[j],Sα[i]), Sα[i] can be considered as better than Sβ[i] under this criterion. Therefore, by comparing the average of two coverages C(S pMH[i],Sβ[j]) and C(Sβ[j],S pMH[i]) (β{NSGA-II, MoEA-HSS}), the Pareto-optimal solution set S pMH[i] is considered statistically superior to Sβ[j] obtained by other methods at every generations.

The experiment results of comparing pMH with NSGA-II and MoEA-HSS when we ran each method until 300 generations for all benchmark problems are shown in Tables 2, 3.

Table 2
www.frontiersin.org

Table 2. Comparison of pMH with NSGA-II and MoEA-HSS by the number of nondominated solutions, generational distance and CPU time (gen =300).

Table 3
www.frontiersin.org

Table 3. Comparison of pMH with NSGA-II and MoEA-HSS by the coverage (gen =300).

Our method pMH achieved better results than other methods in all benchmark problems with respect to the generational distance and the coverage of two sets, although pMH and NSGA-II are evenly-matched at the criterion the number of nondominated solutions. Here, even if pMH is inferior to that of other methods α at the criteria the number of nondominated solutions, since it is considered that the ratio of solutions in Sα[j] covered by solutions in S pMH[i] is high, S pMH[i] is not necessarily inferior to S NSGA-II[j] or S MoEA-HSS[j]. Based on these numerical experiments, we confirmed that the local search based on the improved Jaya algorithm is effective and that pMH can generate superior Pareto-optimal solutions.

6 Conclusion

In this study, we defined a new arc routing bi-objective optimization problem (GPOPP) that models the patrol security of police officers (or security guards) based on the POPP and proposed a hybrid heuristic approach for the GPOPP. The proposed method combines the hybrid sampling strategy MoEA-HSS, which combines sampling strategies based on the VEGA and PDDR-FF, with a solution improvement strategy based on the improved Jaya algorithm. The solutions of the MoEA-HSS approach to the true Pareto differ in various directions because the VEGA-based sampling strategy has a preference for the edge region of the Pareto front and the PDDR-FF-based sampling strategy tends to converge toward the center area of the Pareto front. The proposed method (pMH) improves convergence by combining the MoEA-HSS with the improved Jaya algorithm-based local search method. The numerical experimental results demonstrate that the proposed method can obtain better solutions than the NSGA-II and the MoEA-HSS. The remaining challenge for us is to improve efficiency by reducing CPU time while maintaining high solution quality. In addition, extending GPOPP model will enable us to more accurately replicate the complex challenges of real-world urban policing. One extension would be to model situations where multiple officers work together, and we consider to adapt our method to address such extended problems.

Data availability statement

The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.

Author contributions

FK: Writing – review and editing, Writing – original draft. HT: Writing – original draft, Writing – review and editing. MT: Writing – original draft, Writing – review and editing.

Funding

The author(s) declare that financial support was received for the research and/or publication of this article. This work was supported by research funding provided by the Maebashi Institute of Technology, Japan.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Generative AI statement

The author(s) declare that no Generative AI was used in the creation of this manuscript.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

Aiello, G., La Scalia, G., and Enea, M. (2012). A multi objective genetic algorithm for the facility layout problem based upon slicing structure encoding. Expert Syst. Appl. 39, 10352–10358. doi:10.1016/j.eswa.2012.01.125

CrossRef Full Text | Google Scholar

Akyurt, İ. Z., Keskinturk, T., and Kalkancı, Ç. (2015). Using genetic algorithm for winter maintenance operations: multi depot K-Chinese postman problem. EMAJ Emerg. Mark. J. 5, 50–59. doi:10.5195/emaj.2015.69

CrossRef Full Text | Google Scholar

Chainey, S. P., Matias, J. A., Nunes Junior, F. C. F., Coelho da Silva, T. L., de Macêdo, J. A. F., Magalhães, R. P., et al. (2021). Improving the creation of hot spot policing patrol routes: comparing cognitive heuristic performance to an automated spatial computation approach. ISPRS Int. J. Geo-Information 10, 560. doi:10.3390/ijgi10080560

CrossRef Full Text | Google Scholar

Dantzig, G. B., and Ramser, J. H. (1959). The truck dispatching problem. Manag. Sci. 6, 80–91. doi:10.1287/mnsc.6.1.80

CrossRef Full Text | Google Scholar

Deb, K., Pratap, A., Agarwal, S., and Meyarivan, T. (2002). A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6, 182–197. doi:10.1109/4235.996017

CrossRef Full Text | Google Scholar

Dewinter, M., Vandeviver, C., Vander Beken, T., and Witlox, F. (2020). Analysing the police patrol routing problem: a review. ISPRS Int. J. Geo-Information 9, 157. doi:10.3390/ijgi9030157

CrossRef Full Text | Google Scholar

Edmonds, J., and Johnson, E. (1973). Matching, euler tours and the chinese postman. Math. Program. 5, 88–124. doi:10.1007/bf01580113

CrossRef Full Text | Google Scholar

Elatar, S., Abouelmehdi, K., and Riffi, M. E. (2023). The vehicle routing problem in the last decade: variants, taxonomy and metaheuristics. Procedia Comput. Sci. 220, 398–404. doi:10.1016/j.procs.2023.03.051

CrossRef Full Text | Google Scholar

Ghoseiri, K., and Ghannadpour, S. F. (2010). Multi-objective vehicle routing problem with time windows using goal programming and genetic algorithm. Appl. Soft Comput. 10, 1096–1107. doi:10.1016/j.asoc.2010.04.001

CrossRef Full Text | Google Scholar

Gil-Gala, F. J., Afsar, S., Durasevic, M., Palacios, J. J., and Afsar, M. (2023). “Genetic programming for the vehicle routing problem with zone-based pricing,” in Proceedings of the genetic and evolutionary computation conference, 1118–1126. doi:10.1145/3583131.3590366

CrossRef Full Text | Google Scholar

Ishibuchi, H., Masuda, H., Tanigaki, Y., and Nojima, Y. (2015). “Modified distance calculation in generational distance and inverted generational distance,” in Evolutionary multi-criterion optimization: 8Th international conference, EMO 2015, guimarães, Portugal, march 29–April 1, 2015. Proceedings, part II 8 (Springer), 110–125.

Google Scholar

Kim, D., Kan, Y., Aum, Y., Lee, W., and Yi, G. (2023). Hotspots-based patrol route optimization algorithm for smart policing. Heliyon 9, e20931. doi:10.1016/j.heliyon.2023.e20931

PubMed Abstract | CrossRef Full Text | Google Scholar

Lenstra, J. K., and Kan, A. H. G. R. (1976). On general routing problems. Networks 6, 273–280. doi:10.1002/net.3230060305

CrossRef Full Text | Google Scholar

Lenstra, J. K., and Kan, A. H. G. R. (1981). Complexity of vehicle routing and scheduling problems. Networks 11, 221–227. doi:10.1002/net.3230110211

CrossRef Full Text | Google Scholar

Lu, Z., Whalen, I., Boddeti, V., Dhebar, Y., Deb, K., Goodman, E., et al. (2019). “NSGA-Net: neural architecture search using multi-objective genetic algorithm,” in Proceedings of the genetic and evolutionary computation conference, 419–427. doi:10.1145/3321707.3321729

CrossRef Full Text | Google Scholar

Mei-Ko, K. (1962). Graphic programming using odd or Even points. Chin. Math. 1, 237–277.

Google Scholar

Papadimitriou, C. H. (1976). On the complexity of edge traversing. J. ACM (JACM) 23, 544–554. doi:10.1145/321958.321974

CrossRef Full Text | Google Scholar

Pizzuti, C. (2009). “A multi-objective genetic algorithm for community detection in networks,” in 2009 21st IEEE international conference on tools with artificial intelligence (IEEE), 379–386.

CrossRef Full Text | Google Scholar

Quiza Sardiñas, R., Rivas Santana, M., and Alfonso Brindis, E. (2006). Genetic algorithm-based multi-objective optimization of cutting parameters in turning processes. Eng. Appl. Artif. Intell. 19, 127–133. doi:10.1016/j.engappai.2005.06.007

CrossRef Full Text | Google Scholar

Samanta, S., Sen, G., and Ghosh, S. K. (2022). A literature review on police patrolling problems. Ann. Operations Res. 316, 1063–1106. doi:10.1007/s10479-021-04167-0

CrossRef Full Text | Google Scholar

Schaffer, J. D. (2014). “Multiple objective optimization with vector evaluated genetic algorithms,” in Proceedings of the first international conference on genetic algorithms and their applications, 93–100.

Google Scholar

Sgarro, G. A., and Grilli, L. (2024). Ant colony optimization for Chinese postman problem. Neural Comput. Appl. 36, 2901–2920. doi:10.1007/s00521-023-09195-4

CrossRef Full Text | Google Scholar

Tang, J., He, L., Cao, Y., and Bai, H. (2024). Critical-edge based tabu search algorithm for solving large-scale multi-vehicle Chinese postman problem. Sci. Rep. 14, 12437. doi:10.1038/s41598-024-62992-2

PubMed Abstract | CrossRef Full Text | Google Scholar

Tohyama, H., and Tomisawa, M. (2022). Complexity of the police officer patrol problem. J. Inf. Process. 30, 307–314. doi:10.2197/ipsjjip.30.307

CrossRef Full Text | Google Scholar

Tomisawa, M., and Tohyama, H. (2024). Computational complexity of the police officer patrol problem on weighted digraphs. Electron. J. Graph Theory Appl. 12, 297–313. doi:10.5614/ejgta.2024.12.2.10

CrossRef Full Text | Google Scholar

Van Veldhuizen, D. A. (1999). Multiobjective evolutionary algorithms: classifications, analyses, and new innovations. Air Force Institute of Technology, 6–15.

Google Scholar

Venkata Rao, R. (2016). Jaya: a simple and new optimization algorithm for solving constrained and unconstrained optimization problems. Int. J. Industrial Eng. Comput. 7, 19–34. doi:10.5267/j.ijiec.2015.8.004

CrossRef Full Text | Google Scholar

Yu, W., Li, B., Jia, H., Zhang, M., and Wang, D. (2015). Application of multi-objective genetic algorithm to optimize energy efficiency and thermal comfort in building design. Energy Build. 88, 135–143. doi:10.1016/j.enbuild.2014.11.063

CrossRef Full Text | Google Scholar

Zhang, W., Gen, M., and Jo, J. (2014). Hybrid sampling strategy-based multiobjective evolutionary algorithm for process planning and scheduling problem. J. Intelligent Manuf. 25, 881–897. doi:10.1007/s10845-013-0814-2

CrossRef Full Text | Google Scholar

Zitzler, E., and Thiele, L. (1999). Multiobjective evolutionary algorithms: a comparative case study and the strength pareto approach. IEEE Trans. Evol. Comput. 3, 257–271. doi:10.1109/4235.797969

CrossRef Full Text | Google Scholar

Keywords: arc routing problem, police officer patrolling problem, genetic algorithm, MoEA-HSS, Jaya algorithm

Citation: Kudo F, Tohyama H and Tomisawa M (2025) Hybrid heuristic approach for generalized police officer patrolling problem. Front. Ind. Eng. 3:1620422. doi: 10.3389/fieng.2025.1620422

Received: 29 April 2025; Accepted: 09 July 2025;
Published: 25 August 2025.

Edited by:

Mitsuo Gen, Tokyo University of Science, Japan

Reviewed by:

Wenqiang Zhang, Henan University of Technology, China
Huizhen Zhang, University of Shanghai for Science and Technology, China

Copyright © 2025 Kudo, Tohyama and Tomisawa. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Masaki Tomisawa, dG9taXNhd2FAbWFlYmFzaGktaXQuYWMuanA=

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.