2018
DOI: 10.1007/s00500-018-3005-4
|View full text |Cite
|
Sign up to set email alerts
|

Two novel combined approaches based on TLBO and PSO for a partial interdiction/fortification problem using capacitated facilities and budget constraint

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…Khanduzi et al [6] proposed a partial interdiction/fortification model for capacitated facilities that considered budget constraints. In this model, the defender was responsible for allocating resources to protect the system and minimize overall system losses.…”
Section: Possible Backup Assignment Potential Warehouse (Fortified)mentioning
confidence: 99%
“…Khanduzi et al [6] proposed a partial interdiction/fortification model for capacitated facilities that considered budget constraints. In this model, the defender was responsible for allocating resources to protect the system and minimize overall system losses.…”
Section: Possible Backup Assignment Potential Warehouse (Fortified)mentioning
confidence: 99%
“…In recent years, the research trend moves toward considering fortification in problem and tri level (defender-attacker-defender) models were developed to explore effect of fortifying networks against intentional attacks (Hesam Sadati, Aksen, and Aras 2020; Khanduzi, Reza Maleki, and Akbari 2018;Matuschke et al 2017;Sadeghi, Seifi, and Azizi 2017;Smith and Song 2020;Zheng 2017). A number of solution structures are used to solve tri-level fortification problems include solution approaches based on strong duality, enumerative procedures, and decomposition approaches (Lozano, Smith, and Kurz 2017).…”
Section: *Corresponding Authormentioning
confidence: 99%
“…Several MH optimizers have been developed in the literature as robust tools that are successfully utilized to solve FS problems. The most common used MH optimizers used in this direction are particle swarm optimization (PSO) [21], genetic algorithms (GA) [22], firefly algorithm [23], manta ray foraging optimizer [24], grey wolf optimizer [25], differential evolution (DE) [26], Harris hawk optimizer (HHO) [27], Henry gas optimizer [28,29], political optimizer [30], flower pollination optimizer [31], Aquila optimizer [32], crow search optimizer [33], cat swarm optimizer [34], and ecosystem-based optimizer [35]. According to the no free lunch theorem (NFLT), there is not a single algorithm that can be successfully used for solving all problems.…”
Section: Introductionmentioning
confidence: 99%