2020
DOI: 10.1016/j.cie.2020.106480
|View full text |Cite
|
Sign up to set email alerts
|

Joint optimizing network interdiction and emergency facility location in terrorist attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 43 publications
0
3
0
Order By: Relevance
“…Furthermore, neither the implicit enumeration method nor Benders decomposition algorithms cannot be used effectively to solve the proposed model. This is because the lower-level program is a highly complicated nonlinear model (Xiang et al 2020). In order to solve the DMFNIAI problem (2-9), we propose a hybrid algorithm which is hereunder called the DM-PHA algorithm which is comprising of a two-phase Decomposition Method (DM) and the Progressive Hedging Algorithm (PHA).…”
Section: Solution Methods For Dmfniai (Dm-pha)mentioning
confidence: 99%
“…Furthermore, neither the implicit enumeration method nor Benders decomposition algorithms cannot be used effectively to solve the proposed model. This is because the lower-level program is a highly complicated nonlinear model (Xiang et al 2020). In order to solve the DMFNIAI problem (2-9), we propose a hybrid algorithm which is hereunder called the DM-PHA algorithm which is comprising of a two-phase Decomposition Method (DM) and the Progressive Hedging Algorithm (PHA).…”
Section: Solution Methods For Dmfniai (Dm-pha)mentioning
confidence: 99%
“…A leader–follower game with the State and the Terrorist was first modeled by Berman and Gavious (2007), in which the State as a leader decides the location of the facilities to minimize the worst‐case losses caused by a terrorist attack, and the Terrorist as follower strikes a city that incurs maximum damage. Xiang and Wei (2020) develop a novel defender–attacker model, that is, a bi‐level optimization problem, to integrate network interdiction with the facility location problem. To solve the model, the upper level variables are implicitly enumerated by a branch and bound algorithm, whereas an efficient vertex enumeration method is used to solve the lower level program.…”
Section: Related Workmentioning
confidence: 99%
“…The attacker knows that the user will choose the shortest route between two nodes they are familiar with, so they interdict travel on a subset of arcs by making those arcs more expensive. It is typical to presume that the interdictor has a restricted budget, which limits the amount of potential harm to a network [7,8].…”
Section: Introductionmentioning
confidence: 99%