Skip to main content
Top

2013 | OriginalPaper | Chapter

Network Interdiction Methods and Approximations in a Hazmat Transportation Setting

Author : Justin Yates

Published in: Handbook of OR/MS Models in Hazardous Materials Transportation

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The United States transportation system is an extensive and integrated component in the eight key infrastructures upon which the livelihood of the U.S. is dependent (Department of Homeland Security 2009). The accessibility and mobility enabled through open use of the transportation system is a vital and necessary freedom which contributes to the fluidity of the American environment. The transportation system is expansive and heavily utilized with an average of over 2 billion daily vehicle-miles of travel (nearly twice as much travel since the early 1980s) on the roughly 4 million miles of paved roadway, nearly 47,000 miles of Interstate highway, 600,000 bridges and 366 U.S. highway tunnels over 100 m (Texas Transportation Institute 2011; Transportation Security 2012). Travelers and shippers may also choose to utilize more than 300,000 miles of freight rail, nearly 10,000 miles of urban and commuter rail systems, or connect between 500 commercial-service and 14,000 general aviation airports (Transportation Research 2002).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Anselin L (1995) Local indicators of spatial association – LISA. Geogr Anal 27:93–115CrossRef Anselin L (1995) Local indicators of spatial association – LISA. Geogr Anal 27:93–115CrossRef
go back to reference Bard J (1998) Practical bilevel optimization; algorithms and applications. Kluwer Academic Publishers, BostonCrossRef Bard J (1998) Practical bilevel optimization; algorithms and applications. Kluwer Academic Publishers, BostonCrossRef
go back to reference Batta R, Chiu S (1998) Optimal obnoxious paths on a network: transportation of hazardous materials. Oper Res 36(1) Batta R, Chiu S (1998) Optimal obnoxious paths on a network: transportation of hazardous materials. Oper Res 36(1)
go back to reference Brown G et al (2006) Defending critical infrastructure. Interfaces 36(6):530–544CrossRef Brown G et al (2006) Defending critical infrastructure. Interfaces 36(6):530–544CrossRef
go back to reference Burch C et al (2003) A decomposition-based approximation for network inhibition. Network interdiction and stochastic programming. Kluwer, Boston, pp 51–69CrossRef Burch C et al (2003) A decomposition-based approximation for network inhibition. Network interdiction and stochastic programming. Kluwer, Boston, pp 51–69CrossRef
go back to reference Casas et al. (Louisiana Tech University, 2012, unpublished) Casas et al. (Louisiana Tech University, 2012, unpublished)
go back to reference Church R, Scaparra M (2007) Protecting critical assets: the r-interdiction median problem with fortification. Geogr Anal 39:129–146CrossRef Church R, Scaparra M (2007) Protecting critical assets: the r-interdiction median problem with fortification. Geogr Anal 39:129–146CrossRef
go back to reference Church R, Scaparra M, Middleton S (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr 94(3):491–502CrossRef Church R, Scaparra M, Middleton S (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr 94(3):491–502CrossRef
go back to reference Corley HW, Chang H (1974) Finding the n most vital nodes in a flow network. Manage Sci 21:362–364CrossRef Corley HW, Chang H (1974) Finding the n most vital nodes in a flow network. Manage Sci 21:362–364CrossRef
go back to reference Cova T, Conger S (2003) Transportation hazards. In: Kutz M (ed) Handbook of transportation engineering. McGraw Hill, New York, pp 17.1–17.24 Cova T, Conger S (2003) Transportation hazards. In: Kutz M (ed) Handbook of transportation engineering. McGraw Hill, New York, pp 17.1–17.24
go back to reference Cunningham WH (1985) Optimal attack and reinforcement of a network. J Assoc Comput Mach 32:549–561CrossRef Cunningham WH (1985) Optimal attack and reinforcement of a network. J Assoc Comput Mach 32:549–561CrossRef
go back to reference Erkut E, Verter V (1998) Modeling of transport risk for hazardous materials. Oper Res 46(5) Erkut E, Verter V (1998) Modeling of transport risk for hazardous materials. Oper Res 46(5)
go back to reference Field M (2004) Highway security and terrorism. Rev Policy Res 21(3):71–91CrossRef Field M (2004) Highway security and terrorism. Rev Policy Res 21(3):71–91CrossRef
go back to reference Ghare P, Montgomery D, Turner WC (1971) Optimal interdiction policy for a flow network. Nav Res Logist Q 18:37–45CrossRef Ghare P, Montgomery D, Turner WC (1971) Optimal interdiction policy for a flow network. Nav Res Logist Q 18:37–45CrossRef
go back to reference Gopalan R et al (1990) Modeling equity of risk in the transportation of hazardous materials. Oper Res 38(6) Gopalan R et al (1990) Modeling equity of risk in the transportation of hazardous materials. Oper Res 38(6)
go back to reference Grubesic T, Murray A (2006) Vital nodes, interconnected infrastructures, and the geographies of network survivability. Ann Assoc Am Geograph 96(1):64–83 Grubesic T, Murray A (2006) Vital nodes, interconnected infrastructures, and the geographies of network survivability. Ann Assoc Am Geograph 96(1):64–83
go back to reference Hilbe JM (2007) Negative binomial regerssion. Cambridge University, CambridgeCrossRef Hilbe JM (2007) Negative binomial regerssion. Cambridge University, CambridgeCrossRef
go back to reference Huang B, Cheu RL, Liew YS (2004) GIS and genetic algorithms for HazMat route planning with security considerations. Int J Geogr Inf Sci 18(8):769–787CrossRef Huang B, Cheu RL, Liew YS (2004) GIS and genetic algorithms for HazMat route planning with security considerations. Int J Geogr Inf Sci 18(8):769–787CrossRef
go back to reference Israeli E, Wood K (2002) Shortest-path network interdiction. Networks 40(2):97–111CrossRef Israeli E, Wood K (2002) Shortest-path network interdiction. Networks 40(2):97–111CrossRef
go back to reference Jenelius E, Petersen T, Mattsson LG (2006) Importance and exposure in road network vulnerability analysis. Transp Res A 40:537–560 Jenelius E, Petersen T, Mattsson LG (2006) Importance and exposure in road network vulnerability analysis. Transp Res A 40:537–560
go back to reference Jin H, Batta R (1996) On the analysis of two new models for transporting hazardous materials. Oper Res 44(5) Jin H, Batta R (1996) On the analysis of two new models for transporting hazardous materials. Oper Res 44(5)
go back to reference Jin H, Batta R, Karwan M (1996) On the analysis of two new models for transporting hazardous materials. Oper Res 44(5) Jin H, Batta R, Karwan M (1996) On the analysis of two new models for transporting hazardous materials. Oper Res 44(5)
go back to reference Kara B, Verter V (2004) Designing a road network for hazardous materials transportation. Transp Sci 38(2):188–196CrossRef Kara B, Verter V (2004) Designing a road network for hazardous materials transportation. Transp Sci 38(2):188–196CrossRef
go back to reference Laefer D, Pradhan A (2006) Evacuation route selection based on tree-based hazards using light detection and ranging and GIS. J Transp Eng 132(4):312–320 Laefer D, Pradhan A (2006) Evacuation route selection based on tree-based hazards using light detection and ranging and GIS. J Transp Eng 132(4):312–320
go back to reference Lim C, Smith JC (2007) Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans 39:15–26CrossRef Lim C, Smith JC (2007) Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans 39:15–26CrossRef
go back to reference List G et al (1991) Modeling and analysis for hazardous materials transportation: risk analysis, routing/scheduling and facility location. Transp Sci 25(2) List G et al (1991) Modeling and analysis for hazardous materials transportation: risk analysis, routing/scheduling and facility location. Transp Sci 25(2)
go back to reference Luedtke J, White C (2002) HazMat transportation and security: survey and directions for future research. Department of Industrial and Systems Engineering, Georgia Institute of Technology, Atlanta, GA Luedtke J, White C (2002) HazMat transportation and security: survey and directions for future research. Department of Industrial and Systems Engineering, Georgia Institute of Technology, Atlanta, GA
go back to reference Matisziw T, Murray A, Grubesic T (2007) Bounding network interdiction vulnerability through cut-set identification. Adv Spat Sci 61:243–255CrossRef Matisziw T, Murray A, Grubesic T (2007) Bounding network interdiction vulnerability through cut-set identification. Adv Spat Sci 61:243–255CrossRef
go back to reference Matisziw T, Murray A (2009) Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure. Comput Oper Res 36:16–26 Matisziw T, Murray A (2009) Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure. Comput Oper Res 36:16–26
go back to reference Morton D, Pan F, Saeger K (2007) Models for nuclear smuggling interdiction. IIE Trans 39:3–14CrossRef Morton D, Pan F, Saeger K (2007) Models for nuclear smuggling interdiction. IIE Trans 39:3–14CrossRef
go back to reference Murray A, Matisziw T, Grubesic T (2007) Critical network infrastructure analysis: interdiction and system flow. J Geogr Syst 9:103–117 Murray A, Matisziw T, Grubesic T (2007) Critical network infrastructure analysis: interdiction and system flow. J Geogr Syst 9:103–117
go back to reference National Highway Institute (1996) Highway routing of hazardous materials, guidelines for applying criteria. The Institute, USA, p 123 National Highway Institute (1996) Highway routing of hazardous materials, guidelines for applying criteria. The Institute, USA, p 123
go back to reference Nemhauser G, Wolsey L (1999) Integer and combinatorial optimization. Wiley-Interscience, New York Nemhauser G, Wolsey L (1999) Integer and combinatorial optimization. Wiley-Interscience, New York
go back to reference Phillips (1993) The network inhibition problem. Proceedings of the 25th annual ACM symposium on the theory of computing (STOC), May 1993, pp 776–785 Phillips (1993) The network inhibition problem. Proceedings of the 25th annual ACM symposium on the theory of computing (STOC), May 1993, pp 776–785
go back to reference Przemieniecki JS (2000) Mathematical methods in defense analyses. AIAA Education Series, Reston, VirginiaCrossRef Przemieniecki JS (2000) Mathematical methods in defense analyses. AIAA Education Series, Reston, VirginiaCrossRef
go back to reference Qiao J et al (2007) Allocating security resources to a water supply network. IIE Trans 39:95–109CrossRef Qiao J et al (2007) Allocating security resources to a water supply network. IIE Trans 39:95–109CrossRef
go back to reference Ratliff HD, Sicilia G, Lubore S (1975) Finding the n most vital links in flow networks. Manage Sci 21:631–639CrossRef Ratliff HD, Sicilia G, Lubore S (1975) Finding the n most vital links in flow networks. Manage Sci 21:631–639CrossRef
go back to reference Scaparra M, Church R (2008) A bilevel mixed-integer program for critical infrastructure protection planning. Comput Oper Res 35:1905–1923CrossRef Scaparra M, Church R (2008) A bilevel mixed-integer program for critical infrastructure protection planning. Comput Oper Res 35:1905–1923CrossRef
go back to reference Southworth F (2008) Multi-criteria sensor placement for emergency response. Appl Spatial Anal 1:37–58 Southworth F (2008) Multi-criteria sensor placement for emergency response. Appl Spatial Anal 1:37–58
go back to reference Texas Transportation Institute (2011) The 2011 urban mobility report. Texas A&M University, College Station Texas Transportation Institute (2011) The 2011 urban mobility report. Texas A&M University, College Station
go back to reference Transportation Research Board (2002) Deterrence, protection, and preparation: the new transportation security imperative – special report 270 Transportation Research Board (2002) Deterrence, protection, and preparation: the new transportation security imperative – special report 270
go back to reference US Department of Transportation (2006) Biennial report on hazardous materials transportation. Washington, DC. Report (obtained online). Accessed 12 Aug 2012 US Department of Transportation (2006) Biennial report on hazardous materials transportation. Washington, DC. Report (obtained online). Accessed 12 Aug 2012
go back to reference Wein L, Atkinson M (2007) The last line of defense: designing radiation detection-interdiction systems to protect cities from a nuclear terrorist attack. IEEE Trans Nucl Sci 54:654–669 Wein L, Atkinson M (2007) The last line of defense: designing radiation detection-interdiction systems to protect cities from a nuclear terrorist attack. IEEE Trans Nucl Sci 54:654–669
go back to reference Wood K (1993) Deterministic network interdiction. Math Comput Model 17(2):1–18CrossRef Wood K (1993) Deterministic network interdiction. Math Comput Model 17(2):1–18CrossRef
go back to reference Wood RK (2003) Deterministic network interdiction. Math Comput Model 17(2):1–18CrossRef Wood RK (2003) Deterministic network interdiction. Math Comput Model 17(2):1–18CrossRef
go back to reference Yamada I, Thill JC (2010) Local indicators of network-constrained clusters in spatial patterns represented by a link attribute. Ann Assoc Am Geogr 100(2):269–285CrossRef Yamada I, Thill JC (2010) Local indicators of network-constrained clusters in spatial patterns represented by a link attribute. Ann Assoc Am Geogr 100(2):269–285CrossRef
go back to reference Yates J, Sanjeevi S (2013) A length-based multiple resource type approach to shortest path network interdiction. Int J Crit Infrastruct Protect (Spring) Yates J, Sanjeevi S (2013) A length-based multiple resource type approach to shortest path network interdiction. Int J Crit Infrastruct Protect (Spring)
go back to reference Yates J, Wang X, Chen N (2013) Assessing k-Shortest approximation accuracy for shortest path network interdiction. Optimiz Eng (Summer) Yates J, Wang X, Chen N (2013) Assessing k-Shortest approximation accuracy for shortest path network interdiction. Optimiz Eng (Summer)
go back to reference Yates J, Casas I (2010) Role of spatial data in the protection of critical infrastructure and homeland defense. Appl Spat Anal Policy 5:1–18 Yates J, Casas I (2010) Role of spatial data in the protection of critical infrastructure and homeland defense. Appl Spat Anal Policy 5:1–18
go back to reference Yates J, Lakshmanan K (2011) A constrained binary knapsack approximation for shortest path network interdiction. Comput Ind Eng 61:981–992 Yates J, Lakshmanan K (2011) A constrained binary knapsack approximation for shortest path network interdiction. Comput Ind Eng 61:981–992
go back to reference Yates J, Sanjeevi S (2012) Assessing the impact of vulnerability modeling in the protection of critical infrastructure. J Geogr Syst 14:415–435CrossRef Yates J, Sanjeevi S (2012) Assessing the impact of vulnerability modeling in the protection of critical infrastructure. J Geogr Syst 14:415–435CrossRef
go back to reference Yen J (1971) Finding the k shortest loopless paths in a network. Manage Sci 17(11):712–716CrossRef Yen J (1971) Finding the k shortest loopless paths in a network. Manage Sci 17(11):712–716CrossRef
Metadata
Title
Network Interdiction Methods and Approximations in a Hazmat Transportation Setting
Author
Justin Yates
Copyright Year
2013
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-6794-6_7