A defender-attacker model and algorithm for maximizing weighted expected hitting time with application to conservation planning

ABSTRACT This article studies an interdiction problem in which two agents with opposed interests, a defender and an attacker, interact in a system governed by an absorbing discrete-time Markov chain. The defender protects a subset of transient states, whereas the attacker targets a subset of the unprotected states. By changing some of the transition probabilities related to the attacked states, the attacker seeks to minimize the Weighted Expected Hitting Time (WEHT). The defender seeks to maximize the attacker’s minimum possible objective, mitigating the worst-case WEHT. Many applications can be represented by this problem; this article focuses on conservation planning. We present a defender–attacker model and algorithm for maximizing the minimum WEHT. As WEHT is not generally a convex function of the attacker’s decisions, we examine large-scale integer programming formulations and first-order approximation methods for its solution. We also develop an algorithm for solving the defender’s problem via mixed-integer programming methods augmented by supervalid inequalities. The efficacy of the proposed solution methods is then evaluated using data from a conservation case study, along with an array of randomly generated instances.

[1]  Loon Ching Tang,et al.  A Markov model for single-leg air cargo revenue management under a bid-price policy , 2010, Eur. J. Oper. Res..

[2]  George B.Richardson The Theory of the Market Economy. , 1995, Revue économique.

[3]  H. Beyer,et al.  Thresholds in landscape connectivity and mortality risks in response to growing road networks , 2008 .

[4]  James E. Hines,et al.  Estimating Annual Survival and Movement Rates of Adults within a Metapopulation of Roseate Terns , 1995 .

[5]  M. Finney,et al.  Modeling wildfire risk to northern spotted owl (Strix occidentalis caurina) habitat in Central Oregon, USA , 2007 .

[6]  Feng Pan,et al.  Interdiction of a Markovian Evader , 2010, ICS 2011.

[7]  Heinrich von Stackelberg,et al.  Stackelberg (Heinrich von) - The Theory of the Market Economy, translated from the German and with an introduction by Alan T. PEACOCK. , 1953 .

[8]  F. Burel,et al.  Connectivity measures: a review , 2008, Landscape Ecology.

[9]  James E. Hines,et al.  Spring hunting changes the regional movements of migrating greater snow geese , 2003 .

[10]  Brian D. Ewald,et al.  Computing Expected Transition Events in Reducible Markov Chains , 2008, SIAM J. Matrix Anal. Appl..

[11]  Alain Billionnet,et al.  Solving the probabilistic reserve selection problem , 2011 .

[12]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[13]  James E. Hines,et al.  Natal location influences movement and survival of a spatially structured population of snail kites , 2007, Oecologia.

[14]  M. Lewin On nonnegative matrices , 1971 .

[15]  Martijn van de Pol,et al.  Do changes in the frequency, magnitude and timing of extreme climatic events threaten the population viability of coastal birds? , 2010 .

[16]  H. Possingham,et al.  Spatial conservation prioritization: Quantitative methods and computational tools , 2009 .

[17]  Y. M. Ko,et al.  Epidemic-Based Information Dissemination in Wireless Mobile Sensor Networks , 2010, IEEE/ACM Transactions on Networking.

[18]  David P. Morton,et al.  Models for nuclear smuggling interdiction , 2007 .

[19]  Santiago Saura,et al.  Ranking individual habitat patches as connectivity providers: Integrating network analysis and patch removal experiments , 2010 .

[20]  Garth P. McCormick,et al.  Computability of global solutions to factorable nonconvex programs: Part I — Convex underestimating problems , 1976, Math. Program..

[21]  Martin L. Puterman,et al.  Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .

[22]  Joseph Geunes,et al.  Modern network interdiction problems and algorithms , 2013 .

[23]  David P. Morton,et al.  Stochastic Network Interdiction , 1998, Oper. Res..

[24]  Churlzu Lim,et al.  Algorithms for Network Interdiction and Fortification Games , 2008 .

[25]  Piet Van Mieghem,et al.  Survival time of the susceptible-infected-susceptible infection process on a graph. , 2015, Physical review. E, Statistical, nonlinear, and soft matter physics.

[26]  Sidney J. Yakowitz,et al.  The Spread and Quarantine of HIV Infection in a Prison System , 1997, SIAM J. Appl. Math..

[27]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[28]  Andrew J. Schaefer,et al.  Modeling Medical Treatment Using Markov Decision Processes , 2005 .

[29]  S. Sarkar,et al.  Systematic conservation planning , 2000, Nature.

[30]  Charles Perrings,et al.  Mitigation and adaptation strategies for the control of biological invasions , 2005 .

[31]  David L. Woodruff,et al.  A decomposition algorithm applied to planning the interdiction of stochastic networks , 2005 .

[32]  Julien Martin,et al.  Multiscale patterns of movement in fragmented landscapes and consequences on demography of the snail kite in Florida. , 2006, The Journal of animal ecology.

[33]  W. Kendall,et al.  Extreme weather and experience influence reproduction in an endangered bird. , 2012, Ecology.

[34]  D. Bienstock,et al.  Models for managing the impact of an epidemic , 2015, 1507.08648.

[35]  Donald L. DeAngelis,et al.  Exploring the effect of drought extent and interval on the Florida snail kite: interplay between spatial and temporal scales , 2002 .

[36]  J. Cole Smith,et al.  Conservation under uncertainty: Optimal network protection strategies for worst-case disturbance events , 2015 .

[37]  M. K. Ghosh,et al.  Discrete-time controlled Markov processes with average cost criterion: a survey , 1993 .

[38]  Alexander Gutfraind,et al.  Evader interdiction: algorithms, complexity and collateral damage , 2014, Ann. Oper. Res..

[39]  PAMELA C. TOSCHIK,et al.  Evaluation of Osprey Habitat Suitability and Interaction with Contaminant Exposure , 2006 .

[40]  Matthew E. Watts,et al.  Marxan and relatives: Software for spatial conservation prioritization , 2009 .

[41]  Sheldon M. Ross,et al.  Introduction to probability models , 1975 .

[42]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[43]  Charles ReVelle,et al.  Using mathematical optimization models to design nature reserves , 2004 .

[44]  J. D. Millar,et al.  Modeling potential responses to smallpox as a bioterrorist weapon. , 2001, Emerging infectious diseases.

[45]  S. Polasky,et al.  Dynamic reserve site selection , 2004 .

[46]  Alain Billionnet Integer programming for optimizing habitat network permeability , 2010 .

[47]  Jeff T. Linderoth,et al.  Reformulation and sampling to solve a stochastic network interdiction problem , 2008, Networks.