Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/101281
PIRA download icon_1.1View/Download Full Text
Title: An optimization approach for deriving upper and lower bounds of transportation network vulnerability under simultaneous disruptions of multiple links
Authors: Xu, X
Chen, A 
Yang, C
Issue Date: Sep-2018
Source: Transportation research. Part C, Emerging technologies, Sept 2018, v. 94, p. 338-353
Abstract: This paper aims to develop an optimization approach for deriving the upper and lower bounds of transportation network vulnerability under simultaneous disruptions of multiple links without the need to evaluate all possible combinations as in the enumerative approach. Mathematically, we formulate the upper and lower bounds of network vulnerability as a binary integer bi-level program (BLP). The upper-level subprogram maximizes or minimizes the remaining network throughput under a given number of disrupted links, which corresponds to the upper and lower vulnerability bounds. The lower-level subprogram checks the connectivity of each origin-destination (O-D) pair under a network disruption scenario without path enumeration. Two alternative modeling approaches are provided for the lower-level subprogram: the virtual link capacity-based maximum flow problem formulation and the virtual link cost-based shortest path problem formulation. Computationally, the BLP model can be equivalently reformulated as a single-level mixed integer linear program by making use of the optimality conditions of the lower-level subprograms and linearization techniques for the complementarity conditions and bilinear terms. Numerical examples are also provided to systematically demonstrate the validity, capability, and flexibility of the proposed optimization model. The vulnerability envelope constructed by the upper and lower bounds is able to effectively consider all possible combinations without the need to perform a full network scan, thus avoiding the combinatorial complexity of enumerating multi-disruption scenarios. Using the vulnerability envelope as a network performance assessment tool, planners and managers can more cost-effectively plan for system protection against disruptions, and prioritize system improvements to minimize disruption risks with limited resources.
Keywords: Network vulnerability
Upper and lower bounds
Vulnerability envelope
Publisher: Pergamon Press
Journal: Transportation research. Part C, Emerging technologies 
ISSN: 0968-090X
DOI: 10.1016/j.trc.2017.08.015
Rights: © 2017 Elsevier Ltd. All rights reserved.
© 2017. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/
The following publication Xu, X., Chen, A., & Yang, C. (2017). An optimization approach for deriving upper and lower bounds of transportation network vulnerability under simultaneous disruptions of multiple links. Transportation Research Part C: Emerging Technologies, 94, 338-353 is available at https://doi.org/10.1016/j.trc.2017.08.015.
Appears in Collections:Journal/Magazine Article

Files in This Item:
File Description SizeFormat 
Chen_Optimization_Approach_Deriving.pdfPre-Published version1 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show full item record

Page views

91
Last Week
1
Last month
Citations as of Nov 9, 2025

Downloads

34
Citations as of Nov 9, 2025

SCOPUSTM   
Citations

40
Citations as of Dec 19, 2025

WEB OF SCIENCETM
Citations

36
Citations as of Dec 18, 2025

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.