Network-level optimisation approach for bridge interventions scheduling

被引:0
|
作者
Mendoza-Lugo, Miguel Angel [1 ]
Nogal, Maria [2 ]
Morales-Napoles, Oswaldo [1 ]
机构
[1] Delft Univ Technol, Dept Hydraul Engn, Delft, Netherlands
[2] Delft Univ Technol, Dept Mat Mech Management & Design, Delft, Netherlands
关键词
Bridge network; interventions; maintenance; repair; mixed-integer linear programming; optimisation; multi-system;
D O I
10.1080/15732479.2024.2403568
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
This paper introduces a novel extension of the multi-system optimisation method, known as the 3C concept, tailored for optimising budget allocation for bridge interventions at the network level. This extended methodology accounts for the interdependencies among bridges due to their spatial proximity within the network. It incorporates direct and user costs, bridge performance indicators, and a bridge deterioration model. A real-world case study involving a portfolio of 555 bridges demonstrates the practicality of the methodology, efficiently determining the optimal intervention sequence. Over an 18-year analysis period, the proposed methodology achieved a 23% reduction in total costs by combining repairs for bridges with high to severe damage and maintenance for the others. This represents a significant improvement compared to the traditional approach, used by bridge management agencies, which relies exclusively on maintenance. The optimised procedure outperforms human intuition in managing complex bridge networks, particularly over extended periods. This methodology can assist transportation agencies in implementing and exploring various scenarios by adjusting the time between consecutive interventions and budget constraints, supporting comprehensive analysis and informed decision-making.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Application-level versus network-level proximity
    Malli, M
    Barakat, C
    Dabbous, W
    [J]. TECHNOLOGIES FOR ADVANCED HETEROGENEOUS NETWORKS, PROCEEDINGS, 2005, 3837 : 225 - 239
  • [32] Revelio: A Network-Level Privacy Attack in the Lightning Network
    Von Arx, Theo
    Tran, Muoi
    Vanbever, Laurent
    [J]. Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023, 2023, : 942 - 957
  • [33] Session-Based Cooperation in Cognitive Radio Networks: A Network-Level Approach
    Ding, Haichuan
    Zhang, Chi
    Li, Xuanheng
    Liu, Jianqing
    Pan, Miao
    Fang, Yuguang
    Chen, Shigang
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (02) : 685 - 698
  • [34] Performance prediction for network-level flexible pavements using an optimised ANN approach
    Wang, Zengyi
    Ling, Jianming
    Du, Hao
    Zhang, Jiake
    Li, Xiang
    [J]. INTERNATIONAL JOURNAL OF PAVEMENT ENGINEERING, 2024, 25 (01)
  • [35] History based distributed filtering - A tagging approach to network-level access control
    Sailer, R
    Kabatnik, M
    [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 373 - 382
  • [36] Revelio: A Network-Level Privacy Attack in the Lightning Network
    von Arx, Theo
    Muoi Tran
    Vanbever, Laurent
    [J]. 2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 942 - 957
  • [37] Network-level characteristics of Spamming: An empirical analysis
    Kokkodis, Marios
    Faloutsos, Michalis
    Markopoulou, Athina
    [J]. 2011 19TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2011,
  • [38] Network-level dynamics of diffusively coupled cells
    Waldherr, Steffen
    Allgoewer, Frank
    [J]. 2012 IEEE 51ST ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2012, : 5517 - 5522
  • [39] Network-level structural covariance in the developing brain
    Zielinski, Brandon A.
    Gennatas, Efstathios D.
    Zhou, Juan
    Seeley, William W.
    [J]. PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2010, 107 (42) : 18191 - 18196
  • [40] Network-level properties of modem anonymity systems
    Rybczynska, Marta
    [J]. 2008 INTERNATIONAL MULTICONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (IMCSIT), VOLS 1 AND 2, 2008, : 781 - 787