Partial interdiction median models for multi-sourcing supply systems

This paper comprehensively explores the partial interdiction median problem for multi-sourcing supply systems (PIM-MS) which has three characteristics: (1) limited capacity for each facility, (2) partial interdiction, and (3) a multi-sourcing delivery strategy for supply systems. PIM-MS is formulated as a bi-level programming model. The upper level involves assignment decisions for offensive resources of the attacker, which tries to maximize the operation cost increment after interdiction. The scheme of reallocating the remaining system resources is formulated in the lower-level problem. An empirical study is taken to verify the effectiveness of the heuristic model, and to observe the influences of new characteristics on the problem.

[1]  António Pais Antunes,et al.  A hierarchical location model for public facility planning , 2008, Eur. J. Oper. Res..

[2]  Deniz Aksen,et al.  A bilevel partial interdiction problem with capacitated facilities and demand outsourcing , 2014, Comput. Oper. Res..

[3]  Mark S. Daskin,et al.  Planning for Disruptions in Supply Chain Networks , 2006 .

[4]  Kai-Yuan Cai,et al.  Protection issues for supply systems involving random attacks , 2014, Comput. Oper. Res..

[5]  Pierre Hansen,et al.  New Branch-and-Bound Rules for Linear Bilevel Programming , 1989, SIAM J. Sci. Comput..

[6]  Kai-Yuan Cai,et al.  A Distributed Protective Approach for Multiechelon Supply Systems , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops.

[7]  Alan T. Murray,et al.  Critical network infrastructure analysis: interdiction and system flow , 2007, J. Geogr. Syst..

[8]  Robert G. Jeroslow,et al.  The polynomial hierarchy and a simple model for competitive analysis , 1985, Math. Program..

[9]  Maria Paola Scaparra,et al.  Hedging against disruptions with ripple effects in location analysis , 2012 .

[10]  S. L. Hakimi,et al.  Optimum Locations of Switching Centers and the Absolute Centers and Medians of a Graph , 1964 .

[11]  Richard L. Church,et al.  Protecting Critical Assets: The r-interdiction median problem with fortification , 2007 .

[12]  P. Shi,et al.  The 2011 eastern Japan great earthquake disaster: Overview and comments , 2011 .

[13]  M. P. Scaparra,et al.  Protecting Supply Systems to Mitigate Potential Disaster , 2012 .

[14]  Zhu Yue-n Leader-follower hierachical decision model for critical infrastructure protection and its solving algorithm , 2014 .

[15]  Heinrich von Stackelberg,et al.  Stackelberg (Heinrich von) - The Theory of the Market Economy, translated from the German and with an introduction by Alan T. PEACOCK. , 1953 .

[16]  George Q. Huang,et al.  Optimal configuration of cluster supply chains with augmented Lagrange coordination , 2015, Comput. Ind. Eng..

[17]  Kai-Yuan Cai,et al.  The r-interdiction median problem with probabilistic protection and its solution algorithm , 2013, Comput. Oper. Res..

[18]  Richard L. Church,et al.  Production , Manufacturing and Logistics An exact solution approach for the interdiction median problem with fortification , 2008 .

[19]  George Q. Huang,et al.  Optimal configuration of assembly supply chains using analytical target cascading , 2010 .

[20]  Richard D. Wollmer,et al.  Removing Arcs from a Network , 1964 .

[21]  George Q. Huang,et al.  Extending analytical target cascading for optimal supply chain network configuration of a product family , 2009, Int. J. Comput. Integr. Manuf..

[22]  Chase Rainwater,et al.  Robust facility location: Hedging against failures , 2014, Reliab. Eng. Syst. Saf..

[23]  Richard L. Church,et al.  Identifying Critical Infrastructure: The Median and Covering Facility Interdiction Problems , 2004 .

[24]  Hugh R. Medal,et al.  A multi-objective integrated facility location-hardening model: Analyzing the pre- and post-disruption tradeoff , 2014, Eur. J. Oper. Res..

[25]  Richard L. Church,et al.  The stochastic interdiction median problem with disruption intensity levels , 2012, Ann. Oper. Res..

[26]  Ting Qu,et al.  Extending analytical target cascading for optimal configuration of supply chains with alternative autonomous suppliers , 2008 .

[27]  Richard L. Church,et al.  A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..

[28]  J. Cole Smith,et al.  Basic Interdiction Models , 2010 .

[29]  Vedat Verter,et al.  Incorporating the threat of terrorist attacks in the design of public service facility networks , 2012, Optim. Lett..

[30]  Alan T. Murray An overview of network vulnerability modeling approaches , 2013 .

[31]  Necati Aras,et al.  A Bilevel p-median model for the planning and protection of critical facilities , 2013, J. Heuristics.

[32]  Jie Lu,et al.  The Definition of Optimal Solution and an Extended Kuhn-Tucker Approach for Fuzzy Linear Bilevel Programming , 2005, IEEE Intell. Informatics Bull..

[33]  Necati Aras,et al.  A Matheuristic for Leader-Follower Games Involving Facility Location-Protection-Interdiction Decisions , 2013 .

[34]  S. Hakimi Optimum Distribution of Switching Centers in a Communication Network and Some Related Graph Theoretic Problems , 1965 .

[35]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[36]  Alan T. Murray,et al.  Vital Nodes, Interconnected Infrastructures, and the Geographies of Network Survivability , 2006 .

[37]  Xuwei Qin,et al.  A two-stage stochastic mixed-integer program for the capacitated logistics fortification planning under accidental disruptions , 2013, Computers & industrial engineering.

[38]  Jonathan F. Bard,et al.  Practical Bilevel Optimization: Algorithms and Applications , 1998 .

[39]  J. C. Smith,et al.  Algorithms for discrete and continuous multicommodity flow network interdiction problems , 2007 .

[40]  George Q. Huang,et al.  A generic analytical target cascading optimization system for decentralized supply chain configuration over supply chain grid , 2010 .

[41]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[42]  David P. Morton,et al.  Stochastic Network Interdiction , 1998, Oper. Res..

[43]  Necati Aras,et al.  The budget constrained r-interdiction median problem with capacity expansion , 2010, Central Eur. J. Oper. Res..

[44]  Fei Tao,et al.  Big Data in product lifecycle management , 2015, The International Journal of Advanced Manufacturing Technology.

[45]  C. L. Philip Chen,et al.  Data-intensive applications, challenges, techniques and technologies: A survey on Big Data , 2014, Inf. Sci..

[46]  Natalia Alguacil,et al.  A trilevel programming approach for electric grid defense planning , 2014, Comput. Oper. Res..

[47]  Maria Paola Scaparra,et al.  Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification , 2011, Comput. Oper. Res..

[48]  George B.Richardson The Theory of the Market Economy. , 1995, Revue économique.

[49]  Da Ruan,et al.  An Extended Branch and Bound Algorithm for bilevel Multi-Follower Decision Making in a Referential-Uncooperative Situation , 2007, Int. J. Inf. Technol. Decis. Mak..

[50]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .