The budget constrained r-interdiction median problem with capacity expansion
نویسندگان
چکیده
In this article, we elaborate on a budget constrained extension of the r -interdiction median problem with fortification (RIMF). The objective in the RIMF is to find the optimal allocation of protection resources to a given service system consisting of p facilities so that the disruptive effects of r possible attacks to the system are minimized. The defender of the system needs to fortify q facilities of the present system to offset the worst-case loss of r non-fortified facilities due to an interdiction in which the attacker’s objective is to cause the maximum possible disruption in the service level of the system. The defender-attacker relationship fits a bilevel integer programming (BIP) formulation where the defender and attacker take on the respective roles of the leader and the follower. We adopt this BIP formulation and augment it with a budget constraint instead of a predetermined number of facilities to be fortified. In addition, we also assume that each facility has a flexible service capacity, which can be expanded at a unit cost to accommodate the demand of customers who were serviced by some other interdicted facility before the attack. First, we provide a discrete optimization model for this new facility protection planning scenario with a novel set of closest assignment constraints. Then, to tackle this BIP problem we use an implicit enumeration algorithm performed on a binary tree. For each node representing D. Aksen (B) College of Administrative Sciences and Economics, Koç University, Rumelifeneri Yolu, 34450 Sarıyer, Istanbul, Turkey e-mail: [email protected] N. Piyade · N. Aras Department of Industrial Engineering, Boğaziçi University, 34342 Bebek, Istanbul, Turkey e-mail: [email protected] N. Aras e-mail: [email protected]
منابع مشابه
A Three-Level Mathematical Model for an r-interdiction Hierarchical Facilities Location Problem
In general, any system may be at risk in a case of losing the critical facilities by natural disasters or terrorist attacks. This paper focuses on identifying the critical facilities and planning to reduce the effect of this event. A three-level model is suggested in the form of a defender-attacker-defender. It is assumed that the facilities are hierarchical and capable of nesting. Also, the at...
متن کاملInterdiction Problems on Planar Graphs
We introduce approximation algorithms and strong NP-completeness results for interdiction problems on planar graphs. Interdiction problems are leader-follower games in which the leader is allowed to delete a certain number of edges from the graph in order to maximally impede the follower, who is trying to solve an optimization problem on the impeded graph. We give a multiplicative (1+ǫ)-approxi...
متن کاملMatching Interdiction
In the matching interdiction problem, we are given an undirected graph with weights and interdiction costs on the edges and seek to remove a subset of the edges constrained to some budget, such that the weight of a maximum weight matching in the remaining graph is minimized. In this work we introduce the matching interdiction problem and show that it is strongly NP-complete even when the input ...
متن کاملInterdiction problem as a tool to identify an effective budget allocation to quality improvement plans
In the face of budgetary limitations in organizations, identifying critical facilities for investing in quality improvement plans could be a sensible approach. In this paper, hierarchical facilities with specified covering radius are considered. If disruption happens to a facility, its covering radius will be decreased. For this problem, a bi-objective mathematical formulation is proposed. Crit...
متن کاملExtensions to Network Flow Interdiction on Planar Graphs
Network flow interdiction analysis studies by how much the value of a maximum flow in a network can be diminished by removing components of the network constrained to some budget. Although this problem is strongly NP-complete on general networks, pseudo-polynomial algorithms were found for planar networks with a single source and a single sink and without the possibility to remove vertices. In ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CEJOR
دوره 18 شماره
صفحات -
تاریخ انتشار 2010