4.7 Article

Optimal allocation of protective resources in urban rail transit networks against intentional attacks

出版社

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.tre.2015.10.008

关键词

Urban rail transit; Public transport; Network interdiction; Multilevel programming; Resource allocation

资金

  1. Shanghai Philosophy and Social Sciences Foundation [2014EGL008]
  2. National Research Foundation Singapore through the Future Cities Laboratory
  3. National Natural Science Foundation of China [51508325, 71401101]
  4. Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry, China

向作者/读者索取更多资源

This paper advances the field of network interdiction analysis by introducing an application to the urban rail transit network, deploying protective resources against intentional attacks. The resource allocation problem for urban rail transit systems is considered as a game between two players, the attacker interdicting certain rail stations to generate greatest disruption impact and the system defender fortifying the network to maximize the system's robustness to external interdictions. This paper introduces a game-theoretic approach for enhancing urban transit networks' robustness to intentional disruptions via optimally allocating protection resources. A tri-level defender-attacker-user game-theoretic model is developed to allocate protective resources among rail stations in the rail transit network. This paper is distinguished with previous studies in that more sophisticated interdiction behaviors by the attacker, such as coordinated attack on multiple locations and various attacking intensities, are specifically considered. Besides, a more complex multi-commodity network flow model is employed to model the commuter travel pattern in the degraded rail network after interdiction. An effective nested variable neighborhood search method is devised to obtain the solution to the game in an efficient manner. A case study based on the Singapore rail transit system and actual travel demand data is finally carried out to assess the protective resources' effectiveness against intentional attacks. (C) 2015 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据