Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/101281
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Civil and Environmental Engineeringen_US
dc.creatorXu, Xen_US
dc.creatorChen, Aen_US
dc.creatorYang, Cen_US
dc.date.accessioned2023-08-30T04:16:28Z-
dc.date.available2023-08-30T04:16:28Z-
dc.identifier.issn0968-090Xen_US
dc.identifier.urihttp://hdl.handle.net/10397/101281-
dc.language.isoenen_US
dc.publisherPergamon Pressen_US
dc.rights© 2017 Elsevier Ltd. All rights reserved.en_US
dc.rights© 2017. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/en_US
dc.rightsThe following publication Xu, X., Chen, A., & Yang, C. (2017). An optimization approach for deriving upper and lower bounds of transportation network vulnerability under simultaneous disruptions of multiple links. Transportation Research Part C: Emerging Technologies, 94, 338-353 is available at https://doi.org/10.1016/j.trc.2017.08.015.en_US
dc.subjectNetwork vulnerabilityen_US
dc.subjectUpper and lower boundsen_US
dc.subjectVulnerability envelopeen_US
dc.titleAn optimization approach for deriving upper and lower bounds of transportation network vulnerability under simultaneous disruptions of multiple linksen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage338en_US
dc.identifier.epage353en_US
dc.identifier.volume94en_US
dc.identifier.doi10.1016/j.trc.2017.08.015en_US
dcterms.abstractThis paper aims to develop an optimization approach for deriving the upper and lower bounds of transportation network vulnerability under simultaneous disruptions of multiple links without the need to evaluate all possible combinations as in the enumerative approach. Mathematically, we formulate the upper and lower bounds of network vulnerability as a binary integer bi-level program (BLP). The upper-level subprogram maximizes or minimizes the remaining network throughput under a given number of disrupted links, which corresponds to the upper and lower vulnerability bounds. The lower-level subprogram checks the connectivity of each origin-destination (O-D) pair under a network disruption scenario without path enumeration. Two alternative modeling approaches are provided for the lower-level subprogram: the virtual link capacity-based maximum flow problem formulation and the virtual link cost-based shortest path problem formulation. Computationally, the BLP model can be equivalently reformulated as a single-level mixed integer linear program by making use of the optimality conditions of the lower-level subprograms and linearization techniques for the complementarity conditions and bilinear terms. Numerical examples are also provided to systematically demonstrate the validity, capability, and flexibility of the proposed optimization model. The vulnerability envelope constructed by the upper and lower bounds is able to effectively consider all possible combinations without the need to perform a full network scan, thus avoiding the combinatorial complexity of enumerating multi-disruption scenarios. Using the vulnerability envelope as a network performance assessment tool, planners and managers can more cost-effectively plan for system protection against disruptions, and prioritize system improvements to minimize disruption risks with limited resources.en_US
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationTransportation research. Part C, Emerging technologies, Sept 2018, v. 94, p. 338-353en_US
dcterms.isPartOfTransportation research. Part C, Emerging technologiesen_US
dcterms.issued2018-09-
dc.identifier.scopus2-s2.0-85030833815-
dc.description.validate202308 bcchen_US
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberCEE-2274-
dc.description.fundingSourceRGCen_US
dc.description.fundingSourceOthersen_US
dc.description.fundingTextChenguang Program; National Natural Science Foundation of China; Ministry of Education of the People's Republic of China; Shanghai Education Development Foundation; Shanghai Municipal Education Commission; Hong Kong Polytechnic University; Fundamental Research Funds for the Central Universitiesen_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS6787330-
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Chen_Optimization_Approach_Deriving.pdfPre-Published version1 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

91
Last Week
1
Last month
Citations as of Nov 9, 2025

Downloads

34
Citations as of Nov 9, 2025

SCOPUSTM   
Citations

40
Citations as of Dec 19, 2025

WEB OF SCIENCETM
Citations

36
Citations as of Dec 18, 2025

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.