11.07.2015 Views

View - Universidad de Almería

View - Universidad de Almería

View - Universidad de Almería

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

226 J. Cole Smith, Fransisca Sudargho, and Churlzu Limmight not only be to generate initial revenues for us, but might also be used as <strong>de</strong>coys to trickthe opponent into making a poor interdiction <strong>de</strong>cision, if their algorithm relies on these initialflows.In the second stage, the enemy acts to inflict damage to our network arcs by reducing thecapacity of certain arcs (perhaps setting some of their capacities to zero). This action is oftenreferred to as interdiction. The enemy’s objective function can vary <strong>de</strong>pending on its goal. Inparticular, we consi<strong>de</strong>r three different cases of the enemy’s objective function. The first casehandles the situation in which the enemy <strong>de</strong>stroys the largest-capacity arcs in our network<strong>de</strong>sign. The second case <strong>de</strong>als with the problem in which the enemy <strong>de</strong>stroys arcs having thelargest initial commodity flows. In the third case, the enemy makes an effort to minimize thetotal profit obtained from transporting commodities to the <strong>de</strong>stination no<strong>de</strong>s in the network.The first two cases might represent the case in which our enemy intends to maximally disruptour network, but is acting according to a heuristic strategy due to real-time consi<strong>de</strong>rationsor due to the complexity of the system. For all of these cases, it is important to note thatthe enemy can <strong>de</strong>stroy portions of arcs by removing some of their capacity, rather than beingrestricted to integer interdiction actions.In the third stage, after the enemy interdiction, some of the arcs in the network will beinaccessible and we will modify the flow in the surviving proportion of the arcs in or<strong>de</strong>r tomeet the <strong>de</strong>mand. If some arcs in the network that consist of some <strong>de</strong>mand flows should failand become completely or partially unavailable, another flow pattern must be built on theexisting (previously constructed) arcs. There might not be any possible flows at all if thereexists a small cut-set of network arcs that are inexpensive to <strong>de</strong>stroy. Un<strong>de</strong>r this condition,redundant arcs and no<strong>de</strong>s in the network <strong>de</strong>sign are nee<strong>de</strong>d to ensure the survivability of thenetwork, given the importance of meeting <strong>de</strong>mands un<strong>de</strong>r inopportune situations.The network interdiction problem has received much attention in the literature due to itsapplications in military and homeland security operations. Such papers form the basis forsolving the last two echelons of the problem consi<strong>de</strong>red in this paper. Wollmer [6] proposesan algorithm that interdicts a prescribed number of arcs in a network in or<strong>de</strong>r to minimizethe follower’s maximal flow. Wood [7] provi<strong>de</strong>s an integer programming formulation for adiscrete interdiction problem, and provi<strong>de</strong>d an extension of the mo<strong>de</strong>l to allow for continuousinterdiction, multiple sources and sinks, undirected networks, multiple interdiction resources,and multiple commodities. This work is continued by Cormican et al. [1], in which the lea<strong>de</strong>rminimizes the expected maximum flow, given uncertainties regarding the success of interdictionand arc capacities. A different interdiction problem is examined by Fulkerson andHarding [2], who examine the problem of maximizing the shortest source-sink path in thepresence of arc-extension costs, which serve as interdiction costs. A recent study by Israeliand Wood [3] <strong>de</strong>velops two <strong>de</strong>composition algorithms using super-valid inequalities and setcovering master problems. Finally, Lim and Smith [4] examine the multicommodity flow networkinterdiction problem un<strong>de</strong>r assumptions of discrete and continuous enemy action.2. Mo<strong>de</strong>ls and Solution MethodsIn this section, we <strong>de</strong>scribe mo<strong>de</strong>ls and solution methods un<strong>de</strong>r three different interdictionscenarios. To facilitate our discussion, consi<strong>de</strong>r a graph G(N, A), with no<strong>de</strong> set N and arcset A. Associated with each arc i ∈ A are a nonnegative construction cost c i , a nonnegativedisruption cost b i , and a mutual arc capacity q i . Define RS(j) and F S(j), ∀j ∈ N, to be theset of arcs going to and going from no<strong>de</strong> j, respectively. Furthermore, <strong>de</strong>fine K to be theset of commodities, and let d j k<strong>de</strong>note the <strong>de</strong>mand of commodity k ∈ K at no<strong>de</strong> j ∈ N. Ifd j k > 0, then j is a supply no<strong>de</strong> of commodity k, while dj k< 0 implies that j is a <strong>de</strong>stinationof commodity k. Without loss of generality, we assume that ∑ j∈N dj k= 0, ∀k ∈ K. We are

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!