A tri-level covering fortification model for facility protection against disturbance in r-interdiction median problem

Proposing a tri-level model defense facilities location to provide a full coverage.Suggesting defense facilities providing extra protection for service facilities.Developing concept of possible successful defense according to the distance of them.Presenting EX-EX-EX, GA-EX-EX and BBO-EX-EX based on exact and meta-heuristics. The available literature for facility interdiction problems is separately modeled by the two r-interdiction covering and median approaches. In this paper, a tri-level defense facility location model for full coverage in r-interdiction median problem is addressed which considers both modeling approaches, simultaneously. The purpose of this model is to design a proper service system in a way that after a worst case scenario of disturbance, it can utilize its full capacity of providing services. In this regard, we have considered the defense facilities to provide extra protection for service facilities and the purpose is to optimally locate these facilities. The tri-level model is proposed based on leader-follower games as defender-attacker-defender framework. In order to solve the model, three approaches have been used. In the first approach (EX-EX-EX), explicit enumeration method is used for the first and second levels and an exact approach is used for the third level. In the second and third approaches, hybrid methods consisting of genetic algorithm, explicit exact enumeration and exact approach (GA-EX-EX) and biogeography-based algorithm, explicit enumeration method and exact approach (BBO-EX-EX) have been used to tackle the problem in a reasonable time. Finally, the proposed approaches are used to solve 27 random instance problems. Comparing the proposed meta-heuristics and the exact approach and studying the numerical examples solved using these approaches are quite satisfactory.

[1]  Behrooz Karimi,et al.  Hub network design problem in the presence of disruptions , 2012, Journal of Intelligent Manufacturing.

[2]  Genichii Taguchi,et al.  Introduction to quality engineering. designing quality into products a , 1986 .

[3]  Abdullah Konak,et al.  A Game-Theoretic Genetic Algorithm for the reliable server assignment problem under attacks , 2015, Comput. Ind. Eng..

[4]  Richard D. Wollmer,et al.  Removing Arcs from a Network , 1964 .

[5]  Richard L. Church,et al.  Identifying Critical Infrastructure: The Median and Covering Facility Interdiction Problems , 2004 .

[6]  Mark S. Daskin,et al.  A facility reliability problem: Formulation, properties, and algorithm , 2010 .

[7]  Amanda J. Schmitt,et al.  OR/MS models for supply chain disruptions: a review , 2014 .

[8]  Jie Lu,et al.  An extended Kuhn-Tucker approach for linear bilevel programming , 2005, Appl. Math. Comput..

[9]  J. Bard,et al.  An algorithm for the discrete bilevel programming problem , 1992 .

[10]  Ignacio E. Grossmann,et al.  Design of Supply Chains under the Risk of Facility Disruptions , 2013 .

[11]  Deniz Aksen,et al.  A bilevel fixed charge location model for facilities under imminent attack , 2012, Comput. Oper. Res..

[12]  Jonathan F. Bard,et al.  The Mixed Integer Linear Bilevel Programming Problem , 1990, Oper. Res..

[13]  Mitsuo Gen,et al.  Genetic algorithms and engineering optimization , 1999 .

[14]  J. Bard Some properties of the bilevel programming problem , 1991 .

[15]  Abbas Ahmadi,et al.  A novel learning based approach for a new integrated location-routing and scheduling problem within cross-docking considering direct shipment , 2015, Appl. Soft Comput..

[16]  Daniel Aloise,et al.  A simple and effective genetic algorithm for the two-stage capacitated facility location problem , 2014, Comput. Ind. Eng..

[17]  Qingwei Li,et al.  Reliable facility location design under disruptions , 2013, Comput. Oper. Res..

[18]  Majid Salari,et al.  A bi-level programming model for protection of hierarchical facilities under imminent attacks , 2015, Comput. Oper. Res..

[19]  Herminia I. Calvete,et al.  A new approach for solving linear bilevel problems using genetic algorithms , 2008, Eur. J. Oper. Res..

[20]  Maria Paola Scaparra,et al.  Hedging against disruptions with ripple effects in location analysis , 2012 .

[21]  Andrew Lim,et al.  Reliable logistics networks design with facility disruptions , 2011 .

[22]  Richard L. Church,et al.  A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..

[23]  Richard L. Church,et al.  Protecting Critical Assets: The r-interdiction median problem with fortification , 2007 .

[24]  B. Vahdani,et al.  A robust parameter design for multi-response problems , 2009 .

[25]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[26]  M. P. Scaparra,et al.  Optimizing Protection Strategies for Supply Chains: Comparing Classic Decision-Making Criteria in an Uncertain Environment , 2011 .

[27]  Jesse R. O'Hanley,et al.  Designing robust coverage networks to hedge against worst-case facility losses , 2008, Eur. J. Oper. Res..

[28]  Herminia I. Calvete,et al.  A genetic algorithm for solving linear fractional bilevel problems , 2009, Ann. Oper. Res..

[29]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[30]  Natalia Alguacil,et al.  A trilevel programming approach for electric grid defense planning , 2014, Comput. Oper. Res..

[31]  F.D. Galiana,et al.  A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat , 2005, IEEE Transactions on Power Systems.

[32]  Deniz Aksen,et al.  A bilevel partial interdiction problem with capacitated facilities and demand outsourcing , 2014, Comput. Oper. Res..

[33]  Kai-Yuan Cai,et al.  The r-interdiction median problem with probabilistic protection and its solution algorithm , 2013, Comput. Oper. Res..

[34]  Maria Paola Scaparra,et al.  A hierarchical compromise model for the joint optimization of recovery operations and distribution of emergency goods in Humanitarian Logistics , 2014, Comput. Oper. Res..

[35]  Mark S. Daskin,et al.  Planning for Disruptions in Supply Chain Networks , 2006 .

[36]  Seyed Taghi Akhavan Niaki,et al.  A multi-objective harmony search algorithm to optimize multi-server location-allocation problem in congested systems , 2014, Comput. Ind. Eng..

[37]  Haluk Damgacioglu,et al.  A genetic algorithm for the uncapacitated single allocation planar hub location problem , 2015, Comput. Oper. Res..

[38]  Richard L. Church,et al.  Production , Manufacturing and Logistics An exact solution approach for the interdiction median problem with fortification , 2008 .

[39]  G. Anandalingam,et al.  Genetic algorithm based approach to bi-level linear programming , 1994 .

[40]  Deniz Aksen,et al.  Locating collection centers for incentive-dependent returns under a pick-up policy with capacitated vehicles , 2008, Eur. J. Oper. Res..

[41]  Y. Jiao,et al.  Orthogonal genetic algorithm for solving quadratic bilevel programming problems , 2010 .

[42]  Necati Aras,et al.  The budget constrained r-interdiction median problem with capacity expansion , 2010, Central Eur. J. Oper. Res..

[43]  J. Arroyo,et al.  On the solution of the bilevel programming formulation of the terrorist threat problem , 2005, IEEE Transactions on Power Systems.

[44]  Shine-Der Lee,et al.  On solving unreliable planar location problems , 2001, Comput. Oper. Res..

[45]  Kai-Yuan Cai,et al.  Protection issues for supply systems involving random attacks , 2014, Comput. Oper. Res..

[46]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[47]  Özlem Ergun,et al.  The Maximum Flow Network Interdiction Problem: Valid inequalities, integrality gaps, and approximability , 2010, Oper. Res. Lett..

[48]  Chase Rainwater,et al.  A bi-objective analysis of the r-all-neighbor p-center problem , 2014, Comput. Ind. Eng..

[49]  Dan Simon,et al.  Biogeography-Based Optimization , 2022 .

[50]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[51]  Jesse R. O'Hanley,et al.  Optimizing system resilience: A facility protection model with recovery time , 2012, Eur. J. Oper. Res..

[52]  Maria Paola Scaparra,et al.  Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification , 2011, Comput. Oper. Res..

[53]  Reza Tavakkoli-Moghaddam,et al.  Addressing a nonlinear fixed-charge transportation problem using a spanning tree-based genetic algorithm , 2010, Comput. Ind. Eng..

[54]  David P. Morton,et al.  A Stochastic Program for Interdicting Smuggled Nuclear Material , 2003 .

[55]  Lawrence V. Snyder,et al.  Reliability Models for Facility Location: The Expected Failure Cost Case , 2005, Transp. Sci..

[56]  Mohammad Mehdi Sepehri,et al.  Linear bilevel programming solution by genetic algorithm , 2002, Comput. Oper. Res..

[57]  Mustapha Nourelfath,et al.  Critical supply network protection against intentional attacks: A game-theoretical model , 2013, Reliab. Eng. Syst. Saf..

[58]  Alan T. Murray,et al.  Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure , 2010, Comput. Oper. Res..

[59]  Yanfeng Ouyang,et al.  A Continuum Approximation Approach to Competitive Facility Location Design Under Facility Disruption Risks , 2013 .

[60]  Necati Aras,et al.  Locating collection centers for distance- and incentive-dependent returns , 2008 .

[61]  E. Aiyoshi,et al.  A new computational method for Stackelberg and min-max problems by use of a penalty method , 1981 .

[62]  Li Hecheng,et al.  Exponential distribution-based genetic algorithm for solving mixed-integer bilevel programming problems , 2008 .

[63]  Gary R. Weckman,et al.  Applying genetic algorithm to a new bi-objective stochastic model for transportation, location, and allocation of hazardous materials , 2016, Expert Syst. Appl..

[64]  M. P. Scaparra,et al.  Protecting Supply Systems to Mitigate Potential Disaster , 2012 .

[65]  George E. Apostolakis,et al.  Identification of critical locations across multiple infrastructures for terrorist actions , 2007, Reliab. Eng. Syst. Saf..

[66]  Necati Aras,et al.  A Bilevel p-median model for the planning and protection of critical facilities , 2013, J. Heuristics.

[67]  Robert G. Jeroslow,et al.  The polynomial hierarchy and a simple model for competitive analysis , 1985, Math. Program..