Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/76546
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Civil and Environmental Engineeringen_US
dc.creatorXu, XDen_US
dc.creatorChen, Aen_US
dc.creatorYang, Cen_US
dc.date.accessioned2018-05-10T02:56:10Z-
dc.date.available2018-05-10T02:56:10Z-
dc.identifier.issn2352-1465en_US
dc.identifier.urihttp://hdl.handle.net/10397/76546-
dc.description22nd International Symposium on Transportation and Traffic Theory (ISTTT), Northwestern Univ, Evanston Campus, Chicago, IL, US, Jul 24-26, 2017en_US
dc.language.isoenen_US
dc.publisherElsevieren_US
dc.rights© 2017 The Authors. Elsevier B.V.en_US
dc.rightsThis is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)en_US
dc.rightsThe following publication Xu, X., Chen, A., & Yang, C. (2017). An optimization approach for deriving upper and lower bounds of transportation network vulnerability under simultaneous disruptions of multiple links. Transportation research procedia, 23, 645-663 is available at https://doi.org/10.1016/j.trpro.2017.05.036en_US
dc.subjectNetwork vulnerabilityen_US
dc.subjectVulnerability envelopeen_US
dc.subjectUpper and lower boundsen_US
dc.titleAn optimization approach for deriving upper and lower bounds of transportation network vulnerability under simultaneous disruptions of multiple linksen_US
dc.typeConference Paperen_US
dc.identifier.spage645en_US
dc.identifier.epage663en_US
dc.identifier.volume23en_US
dc.identifier.doi10.1016/j.trpro.2017.05.036en_US
dcterms.abstractThis paper aims to develop an optimization approach for deriving the upper and lower bounds of transportation network vulnerability under simultaneous disruptions of multiple links without the need to evaluate all possible combinations as in the enumerative approach. Mathematically, we formulate the upper and lower bounds of network vulnerability as a binary integer bilevel program (BLP). The upper-level subprogram maximizes or minimizes the remaining network throughput under a given number of disrupted links, which corresponds to the upper and lower vulnerability bounds. The lower-level subprogram checks the connectivity of each origin-destination (O-D) pair under a network disruption scenario without path enumeration. Two alternative modeling approaches are provided for the lower-level subprogram: the virtual link capacity-based maximum flow problem formulation and the virtual link cost-based shortest path problem formulation. Computationally, the BLP model can be equivalently reformulated as a single-level mixed integer linear program by making use of the optimality conditions of the lower-level subprograms and linearization techniques for the complementarity conditions and bilinear terms. Numerical examples are also provided to systematically demonstrate the validity, capability, and flexibility of the proposed optimization model. The vulnerability envelope constructed by the upper and lower bounds is able to effectively consider all possible combinations without the need to perform a full network scan, thus avoiding the combinatorial complexity of enumerating multi-disruption scenarios. Using the vulnerability envelope as a network performance assessment tool, planners and managers can more cost-effectively plan for system protection against disruptions, and prioritize system improvements to minimize disruption risks with limited resources.en_US
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationTransportation research procedia, 2017, v. 23, p. 645-663en_US
dcterms.isPartOfTransportation research procediaen_US
dcterms.issued2017-
dc.identifier.isiWOS:000404871100035-
dc.identifier.scopus2-s2.0-85030833815-
dc.relation.conferenceInternational Symposium on Transportation and Traffic Theory [ISTTT]en_US
dc.description.validate201805 bcrcen_US
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberOA_IR/PIRA-
dc.description.fundingSourceRGCen_US
dc.description.pubStatusPublisheden_US
Appears in Collections:Conference Paper
Files in This Item:
File Description SizeFormat 
Xu_Optimization_Approach_Deriving.pdf694.37 kBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

127
Last Week
2
Last month
Citations as of Apr 21, 2024

Downloads

153
Citations as of Apr 21, 2024

SCOPUSTM   
Citations

29
Last Week
0
Last month
Citations as of Apr 26, 2024

WEB OF SCIENCETM
Citations

16
Last Week
0
Last month
Citations as of Apr 25, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.