期刊
TRANSPORTATION RESEARCH PART E-LOGISTICS AND TRANSPORTATION REVIEW
卷 84, 期 -, 页码 73-87出版社
PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.tre.2015.10.008
关键词
Urban rail transit; Public transport; Network interdiction; Multilevel programming; Resource allocation
类别
资金
- Shanghai Philosophy and Social Sciences Foundation [2014EGL008]
- National Research Foundation Singapore through the Future Cities Laboratory
- National Natural Science Foundation of China [51508325, 71401101]
- Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry, China
This paper advances the field of network interdiction analysis by introducing an application to the urban rail transit network, deploying protective resources against intentional attacks. The resource allocation problem for urban rail transit systems is considered as a game between two players, the attacker interdicting certain rail stations to generate greatest disruption impact and the system defender fortifying the network to maximize the system's robustness to external interdictions. This paper introduces a game-theoretic approach for enhancing urban transit networks' robustness to intentional disruptions via optimally allocating protection resources. A tri-level defender-attacker-user game-theoretic model is developed to allocate protective resources among rail stations in the rail transit network. This paper is distinguished with previous studies in that more sophisticated interdiction behaviors by the attacker, such as coordinated attack on multiple locations and various attacking intensities, are specifically considered. Besides, a more complex multi-commodity network flow model is employed to model the commuter travel pattern in the degraded rail network after interdiction. An effective nested variable neighborhood search method is devised to obtain the solution to the game in an efficient manner. A case study based on the Singapore rail transit system and actual travel demand data is finally carried out to assess the protective resources' effectiveness against intentional attacks. (C) 2015 Elsevier Ltd. All rights reserved.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据