Efficient Solution Methods for a General r-Interdiction Median Problem with Fortification

被引:4
|
作者
Zhang, Kaike [1 ]
Li, Xueping [1 ]
Jin, Mingzhou [1 ]
机构
[1] Univ Tennessee, Dept Ind & Syst Engn, Knoxville, TN 37996 USA
基金
美国国家科学基金会;
关键词
r-interdiction median problem with fortification; facility location problem; supply chain disruption; cutting-plane method; Benders decomposition; FACILITY LOCATION DESIGN; BENDERS DECOMPOSITION; CRITICAL INFRASTRUCTURE; ALGORITHM; RISK;
D O I
10.1287/ijoc.2021.1111
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This study generalizes the r-interdiction median (RIM) problem with fortification to simultaneously consider two types of risks: probabilistic exogenous disruptions and endogenous disruptions caused by intentional attacks. We develop a bilevel programming model that includes a lower-level interdiction problem and a higher-level fortification problem to hedge against such risks. We then prove that the interdiction problem is supermodular and subsequently adopt the cuts associated with supermodularity to develop an efficient cutting-plane algorithm to achieve exact solutions. For the fortification problem, we adopt the logic-based Benders decomposition (LBBD) framework to take advantage of the two-level structure and the property that a facility should not be fortified if it is not attacked at the lower level. Numerical experiments show that the cutting-plane algorithm is more efficient than benchmark methods in the literature, especially when the problem size grows. Specifically, with regard to the solution quality, LBBD outperforms the greedy algorithm in the literature with an up-to 13.2% improvement in the total cost, and it is as good as or better than the tree-search implicit enumeration method. Summary of Contribution: This paper studies an r-interdiction median problem with fortification (RIMF) in a supply chain network that simultaneously considers two types of disruption risks: random disruptions that occur probabilistically and disruptions caused by intentional attacks. The problem is to determine the allocation of limited facility fortification resources to an existing network. It is modeled as a bilevel programming model combining a defender's problem and an attacker's problem, which generalizes the r-interdiction median problem with probabilistic fortification. This paper is suitable for IJOC in mainly two aspects: (1) The lower-level attacker's interdiction problem is a challenging high-degree nonlinear model. In the literature, only a total enumeration method has been applied to solve a special case of this problem. By exploring the special structural property of the problem, namely, the supermodularity of the transportation cost function, we developed an exact cutting-plane method to solve the problem to its optimality. Extensive numerical studies were conducted. Hence, this paper fits in the intersection of operations research and computing. (2) We developed an efficient logic-based Benders decomposition algorithm to solve the higher-level defender's fortification problem. Overall, this study generalizes several important problems in the literature, such as RIM, RIMF, and RIMF with probabilistic fortification (RIMF-p).
引用
收藏
页码:1272 / 1290
页数:20
相关论文
共 50 条
  • [1] AN EXACT APPROACH FOR THE R-INTERDICTION MEDIAN PROBLEM WITH FORTIFICATION
    Roboredo, Marcos Costa
    Pessoa, Artur Alves
    Aizemberg, Luiz
    [J]. RAIRO-OPERATIONS RESEARCH, 2019, 53 (02) : 505 - 516
  • [2] Modeling r-interdiction median problem with fortification in a fuzzy environment
    Maleki, Hamid Reza
    Khanduzi, Raheleh
    [J]. 2015 4th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS), 2015,
  • [3] Protecting critical assets:: The r-interdiction median problem with fortification
    Church, Richard L.
    Scaparra, Maria Paola
    [J]. GEOGRAPHICAL ANALYSIS, 2007, 39 (02) : 129 - 146
  • [4] Dynamic Gaming Case of the R-Interdiction Median Problem with Fortification and an MILP-Based Solution Approach
    Xiao, Yiyong
    Yang, Pei
    Zhang, Siyue
    Zhou, Shenghan
    Chang, Wenbing
    Zhang, Yue
    [J]. SUSTAINABILITY, 2020, 12 (02)
  • [5] The r-interdiction median problem with probabilistic protection and its solution algorithm
    Zhu, Yueni
    Zheng, Zheng
    Zhang, Xiaoyi
    Cai, Kaiyuan
    [J]. COMPUTERS & OPERATIONS RESEARCH, 2013, 40 (01) : 451 - 462
  • [6] An exact approach for the r-interdiction covering problem with fortification
    Marcos Costa Roboredo
    Luiz Aizemberg
    Artur Alves Pessoa
    [J]. Central European Journal of Operations Research, 2019, 27 : 111 - 131
  • [7] An exact approach for the r-interdiction covering problem with fortification
    Roboredo, Marcos Costa
    Aizemberg, Luiz
    Pessoa, Artur Alves
    [J]. CENTRAL EUROPEAN JOURNAL OF OPERATIONS RESEARCH, 2019, 27 (01) : 111 - 131
  • [8] The budget constrained r-interdiction median problem with capacity expansion
    Deniz Aksen
    Nuray Piyade
    Necati Aras
    [J]. Central European Journal of Operations Research, 2010, 18 : 269 - 291
  • [9] The budget constrained r-interdiction median problem with capacity expansion
    Aksen, Deniz
    Piyade, Nuray
    Aras, Necati
    [J]. CENTRAL EUROPEAN JOURNAL OF OPERATIONS RESEARCH, 2010, 18 (03) : 269 - 291
  • [10] A tri-level covering fortification model for facility protection against disturbance in r-interdiction median problem
    Mahmoodjanloo, Mehdi
    Parvasi, Seyed Parsa
    Ramezanian, Reza
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 2016, 102 : 219 - 232