Vulnerability analysis of evacuation transportation networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, J. | - |
dc.contributor.author | Lee, J.-H. | - |
dc.contributor.author | Kim, H.-J. | - |
dc.contributor.author | Do Chung, B. | - |
dc.date.accessioned | 2021-07-29T21:46:19Z | - |
dc.date.available | 2021-07-29T21:46:19Z | - |
dc.date.issued | 2018-00 | - |
dc.identifier.issn | 1072-4761 | - |
dc.identifier.issn | 1943-670X | - |
dc.identifier.uri | https://scholarworks.bwise.kr/skku/handle/2021.sw.skku/23587 | - |
dc.description.abstract | As natural disasters are increasing in frequency and scale, there is increasing interest in determining appropriate reactions to the disasters, such as evacuation planning and disaster relief distribution. When an evacuation network is built, strategic analyses are needed to support its operations. One of these is a vulnerability analysis to determine the weak points of an evacuation transportation network is one of those. This study aims to analyze the vulnerability of evacuation transportation networks constructed using the cell transmission model. Previous studies have considered all the possible scenarios to investigate weak points without using mathematical approaches. In this paper, we propose a bi-level optimization model to identify the fragile spots in a network. Due to the complexity of the problem, a genetic algorithm combined with linear programming is developed to find good solutions in a reasonable computational time. Solutions from the proposed algorithm are compared with optimal solutions. © 2018 International Journal of Industrial Engineering. | - |
dc.format.extent | 11 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | University of Cincinnati | - |
dc.title | Vulnerability analysis of evacuation transportation networks | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.scopusid | 2-s2.0-85060674655 | - |
dc.identifier.wosid | 000456069800009 | - |
dc.identifier.bibliographicCitation | International Journal of Industrial Engineering : Theory Applications and Practice, v.25, no.5, pp 663 - 673 | - |
dc.citation.title | International Journal of Industrial Engineering : Theory Applications and Practice | - |
dc.citation.volume | 25 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 663 | - |
dc.citation.endPage | 673 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Engineering, Industrial | - |
dc.relation.journalWebOfScienceCategory | Engineering, Manufacturing | - |
dc.subject.keywordPlus | Disaster prevention | - |
dc.subject.keywordPlus | Disasters | - |
dc.subject.keywordPlus | Genetic algorithms | - |
dc.subject.keywordPlus | Linear programming | - |
dc.subject.keywordPlus | Numerical analysis | - |
dc.subject.keywordPlus | Bi-level optimization | - |
dc.subject.keywordPlus | Bi-level optimization models | - |
dc.subject.keywordPlus | Cell transmission model | - |
dc.subject.keywordPlus | Evacuation | - |
dc.subject.keywordPlus | Evacuation planning | - |
dc.subject.keywordPlus | Mathematical approach | - |
dc.subject.keywordPlus | Transportation network | - |
dc.subject.keywordPlus | Vulnerability analysis | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordAuthor | Bi-level optimization | - |
dc.subject.keywordAuthor | Cell transmission model | - |
dc.subject.keywordAuthor | Evacuation | - |
dc.subject.keywordAuthor | Genetic algorithm | - |
dc.subject.keywordAuthor | Vulnerability analysis | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(03063) 25-2, SUNGKYUNKWAN-RO, JONGNO-GU, SEOUL, KOREAsamsunglib@skku.edu
COPYRIGHT © 2021 SUNGKYUNKWAN UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.