259
Views
16
CrossRef citations to date
0
Altmetric
Articles

Passenger railway network protection: a model with variable post-disruption demand serviceFootnote

&
Pages 603-618 | Received 24 May 2016, Accepted 19 May 2017, Published online: 16 Jan 2018

References

  • Akgun, I., Gumubuga, F., & Tansel, B. (2015). Risk based facility location by using fault tree analysis in disaster management. Omega, 52, 168–179.
  • Aksen, D., Piyade, N., & Aras, N. (2010). The budget constrained r-interdiction median problem with capacity expansion. Central European Journal of Operations Research, 18(3), 269–291.
  • Aksen, D., Akca, S., & Aras, N. (2014). A bilevel partial interdiction problem with capacitated facilities and demand outsourcing. Computers & Operations Research, 41, 346–358.
  • Azad, N., Hassini, E., & Verma, M. (2016). Disruption risk management in railroad networks: An optimization-based methodology and a case study. Transportation Research Part B: Methodological, 85, 70–88.
  • Balinski, M. L. (1965). Integer programming: Methods, uses, computations. Management Science, 12(3), 253–313.
  • Bayrak, H. & Bailey, M. D. (2008). Shortest path network interdiction with asymmetric information. Networks, 52(3), 133–140.
  • Berman, O., Krass, D., & Menezes, M. B. (2007). Facility reliability issues in network p-median problems: Strategic centralization and co-location effects. Operations Research, 55(2), 332–350.
  • Cappanera, P. & Scaparra, M. P. (2011). Optimal allocation of protective resources in shortest-path networks. Transportation Science, 45(1), 64–80.
  • Chen, Q., Li, X., & Ouyang, Y. (2011). Joint inventory-location problem under the risk of probabilistic facility disruptions. Transportation Research Part B: Methodological, 45(7), 991–1003.
  • Church, R. L., Scaparra, M. P., & Middleton, R. S. (2004). Identifying critical infrastructure: The median and covering facility interdiction problems. Annals of the Association of American Geographers, 94(3):491–502.
  • Church, R. L., & Scaparra, M. P. (2007). Protecting Critical Assets: The r-interdiction median problem with fortification. Geographical Analysis, 39(2), 129–146.
  • Cormican, K. J., Morton, D. P., & Wood, R. K. (1998). Stochastic network interdiction. Operations Research, 46(2), 184–197.
  • Council Directive 114/EC. (2008). On the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Retrieved July 11, 2017, from http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2008:345:0075:0082:EN:PDF
  • Cui, T., Ouyang, Y., & Shen, Z. J. M. (2010). Reliable facility location design under the risk of disruptions. Operations Research 58(4- part-1):998–1011.
  • Desai, J., & Sen, S. (2010). A global optimization algorithm for reliable network design. European Journal of Operational Research, 200(1), 1–8.
  • Fiumara, F. (2015). The railway security: Methodologies and instruments for protecting a critical infrastructure. In R. Setola, A. Sforza, V. Vittorini, & C. Pragliola (Eds.), Railway infrastructure security. New York, NY: Springer.
  • Fulkerson, D. R. & Harding, G. C. (1977). Maximizing the minimum source-sink path subject to a budget constraint. Mathematical Programming, 13(1), 116–118.
  • García-Archilla, B., Lozano, A. J., Mesa, J. A., & Perea, F. (2013). GRASP algorithms for the robust railway network design problem. Journal of Heuristics, 19(2), 399–422.
  • Gong, J., Mitchell, J. E., Krishnamurthy, A., & Wallace, W. A. (2014). An interdependent layered network model for a resilient supply chain. Omega, 46, 104–116.
  • Hakimi, S. L. (1964). Optimum locations of switching centers and the absolute centers and medians of a graph. Operations Research, 12(3), 450–459.
  • Hakimi, S. L. (1965). Optimum distribution of switching centers in a communication network and some related graph theoretic problems. Operations Research, 13(3), 462–475.
  • He, X. & Liu, H. X. (2012). Modeling the day-to-day traffic evolution process after an unexpected network disruption. Transportation Research Part B: Methodological, 46(1), 50–71.
  • H. R. 3162. (2001). Patriot Act. An Act to deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and for other purposes. Retrieved July 11, 2017, from http://www.gpo.gov/fdsys/pkg/BILLS-107hr3162enr/pdf/BILLS-107hr3162enr.pdf
  • Israeli, E. & Wood, R. K. (2002). Shortest path network interdiction. Networks, 40(2), 97–111.
  • Jin, J. G., Lu, L., Sun, L., & Yin, J. (2015). Optimal allocation of protective resources in urban rail transit networks against intentional attacks. Transportation Research Part E: Logistics and Transportation Review, 84, 73–87.
  • Khaled, A. A., Jin, M., Clarke, D. B., & Hoque, M. A. (2015). Train design and routing optimization for evaluating criticality of freight railroad infrastructures. Transportation Research Part B: Methodological, 71, 71–84.
  • Kirkpatrick, S. (1984). Optimization by simulated annealing: Quantitative studies. Journal of statistical physics, 34(5–6), 975–986.
  • Laporte, G., Mesa, J. A., & Perea, F. (2010). A game theoretic framework for the robust railway transit network design problem. Transportation Research Part B: Methodological, 44(4), 447–459.
  • Li, X. & Ouyang, Y. (2010). A continuum approximation approach to reliable facility location design under correlated probabilistic disruptions. Transportation Research Part B: Methodological, 44(4), 535–548.
  • Liberatore, F., Scaparra, M. P., & Daskin, M. S. (2011). Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification. Computers & Operations Research, 38(1), 357–366.
  • Liberatore, F., Scaparra, M. P., & Daskin, M. S. (2012). Hedging against disruptions with ripple effects in location analysis. Omega, 40(1), 21–30.
  • Lim, C. & Smith, J. C. (2007). Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Transactions, 39(1), 15–26.
  • Losada, C., Scaparra, M. P., Church, R. L., & Daskin, M. (2012). The stochastic interdiction median problem with disruption intensity levels. Annals of Operations Research, 201(1), 345–365.
  • Losada, C., Scaparra, M. P., & O’Hanley, J. R. (2012). Optimizing system resilience: A facility protection model with recovery time. European Journal of Operational Research, 217(3), 519–530.
  • Matisziw, T. C. & Murray, A. T. (2009). Modeling st path availability to support disaster vulnerability assessment of network infrastructure. Computers & Operations Research, 36(1), 16–26.
  • Milmo, D. (2011). Copper thefts from railways escalating out of control, warns union leader. Retrieved July 11, 2017, from http://www.theguardian.com/uk/2011/sep/30/copper-thefts-rail-delays-bob-crow
  • Murray, A. T., Matisziw, T. C., & Grubesic, T. H. (2007). Critical network infrastructure analysis: Interdiction and system flow. Journal of Geographical Systems, 9(2), 103–117.
  • Myung, Y. S., & Kim, H. J. (2004). A cutting plane algorithm for computing k-edge survivability of a network. European Journal of Operational Research, 156(3), 579–589.
  • Nielsen, L. K., Kroon, L., & Maro′ti, G. (2012). A rolling horizon approach for disruption management of railway rolling stock. European Journal of Operational Research, 220(2), 496–509.
  • O’Hanley, J. R., & Church, R. L. (2011). Designing robust coverage networks to hedge against worst-case facility losses. European Journal of Operational Research, 209(1), 23–36.
  • O’Hanley, J. R., Scaparra, M. P., & Garcia, S. (2013). Probability chains: A general linearization technique for modeling reliability in facility location and related problems. European Journal of Operational Research, 230(1), 63–75.
  • Peeta, S., Salman, F. S., Gunnec, D., & Viswanath, K. (2010). Pre-disaster investment decisions for strengthening a highway network. Computers & Operations Research, 37(10), 1708–1719.
  • Peng, P., Snyder, L. V., Lim, A., & Liu, Z. (2011). Reliable logistics networks design with facility disruptions. Transportation Research Part B: Methodological, 45(8), 1190–1211.
  • Perea, F. & Puerto, J. (2013). Revisiting a game theoretic framework for the robust railway network design against intentional attacks. European Journal of Operational Research, 226(2), 286–292.
  • Rad, M. A. & Kakhki, H. T. (2013). Maximum dynamic network flow interdiction problem: New formulation and solution procedures. Computers & Industrial Engineering, 65(4), 531–536.
  • Robinson, N. (2014). UK storms destroy railway line and leave thousands without power. Retrieved July 11, 2017, from http://www.bbc.co.uk/news/uk-26042990
  • Scaparra, M. P., & Church, R. (2012). Protecting supply systems to mitigate potential disaster a model to fortify capacitated facilities. International Regional Science Review, 35(2), 188–210.
  • Scaparra, M. P., Starita, S., & Sterle, C. (2015). Optimizing investment decisions for railway systems protection. In R. Setola, A. Sforza, V. Vittorini, & C. Pragliola (Eds.), Railway infrastructure security. New York, NY: Springer.
  • Schmitt, A. J., Sun, S. A., Snyder, L. V., & Shen, Z. J. M. (2015). Centralization versus decentralization: Risk pooling, risk diversification, and supply chain disruptions. Omega, 52, 201–212.
  • Snyder, L. V., Scaparra, M. P., Daskin, M. S., & Church, R. L. (2006). Planning for disruptions in supply chain networks. In Models, methods, and applications for innovative decision making (pp. 234–257). INFORMS.
  • Snyder, L. V., & Daskin, M. S. (2005). Reliability models for facility location: The expected failure cost case. Transportation Science, 39(3), 400–416.
  • Starita, S., & Scaparra, M. P. (2016). Optimizing dynamic investment decisions for railway systems protection. European Journal of Operational Research, 248(2), 543–557.
  • Wang, J. Y., Ehrgott, M., & Chen, A. (2014). A bi-objective user equilibrium model of travel time reliability in a road network. Transportation Research Part B: Methodological, 66, 4–15.
  • Wollmer, R. (1964). Removing arcs from a network. Operations Research, 12(6), 934–940.
  • Wood, R. K. (1993). Deterministic network interdiction. Mathematical and Computer Modelling, 17(2), 1–18.
  • Zhu, Y., Zheng, Z., Zhang, X., & Cai, K. (2013). The r-interdiction median problem with probabilistic protection and its solution algorithm. Computers & Operations Research, 40(1), 451–462.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.