Abstract
Interurban roads are constantly used by transient vehicles. In some places, however, network users are subject to attacks, resulting in assaults to drivers and cargo theft. In an attempt to solve this problem, a binary integer programming model is developed, whose objective is to maximize the expected vehicle coverage across the network. The model dynamically locates patrol units through a fixed time horizon, subject to movement and location constraints, considering a probability of not being able to attend to an attack, due to a distance factor. A chronological decomposition heuristic is developed, and achieves an optimality gap of less than 1 %, in less than 5 min. The problem is also solved by developing a geographical decomposition heuristic. To introduce a measure of equity, two sets of constraints are proposed. Three measures are considered: total vehicle coverage, inequity and network coverage. A trade-off between these three measures is observed and discussed. Finally, scalability of the model is explored, using decomposition in terms of patrolling units, until we obtain subproblems of equal size as the original instance. All of these features are applied to a case study in Northern Israel. In the last section, some adaptations and additions to the model that can be made in further research are discussed.
Similar content being viewed by others
Notes
Several connections (usually highways) between cities/towns in a given region of a country.
As mentioned in Sect. 1, this work address the problem of prevention/deterrence rather than response to attacks. Also, attacks may occur once at a time, and not simultaneously.
The reason for this assumption is that allowing more than one patrolling unit per location node/traveling segment would require to include combinatorial nonlinear terms in the objective function, which would make the model formulation (and hence its tractability) too complex (see Sect. 8 for a more elaborated explanation)
Along with distance, traffic volume between the attack site and unit k may increase. As a way to consider this, we choose f such that \(\frac{df}{dx}<0\) and \(\frac{d^2f}{dx^2}>0\), for \(0\le x < H\), such as the function selected in the formulation.
As the example consists in single road, the vehicle flow for each subsegment is the same (this implies every \(\lambda _{jlt}\) has the same value), and because the situation represents a given time period t, the flow is also considered homogeneous across a given road (and hence the \(\lambda _{jlt}\) term may be taken out of the integral).
This fraction is calculated over \(T-2\), as we do not consider the first and last time period, because each unit is forced to be at their police station (starting point) at that time.
Not considering the time periods \(t=1\) and \(t=T\), because unit k does not exerts any protection during those time periods.
Time period \(t=1\) and \(t=T\) are not considered, because at those time periods there is no protection exerted from the units.
This is because the location of every unit at the beginning of any subproblem must be physically consistent with the location at the end of the previous subproblem.
This is guaranteed because of the use of dummy nodes.
This results are based on this particular case study. On other instances, the result may differ from these.
This results are based on this particular case study. On other instances, the result may be different from these.
This would still imply an increase in solving times, but a significantly more acceptable time than not using this procedure, being the latter case even unsolvable in some cases
This results are based on this particular case study. Results of applying this procedure in other instances may differ.
Modifications in region size should be subject of further research, in order to evaluate more precisely the behavior of the scaled model in such situations.
References
Adler, N., Hakkert, A. S., Kornbluth, J., Raviv, T., & Sher, M. (2014a). Location-allocation models for traffic police patrol vehicles on an interurban network. Annals of Operations Research, 221(1), 9–31.
Adler, N., Hakkert, A. S., Raviv, T., & Sher, M. (2014b). The traffic police location and schedule assignment problem. Journal of Multi-Criteria Decision Analysis, 21(5–6), 315–333.
Anderson, B. (2007). Securing the supply chain-prevent cargo theft. Security, 44(5), 56–59.
Badri, M. A., Mortagy, A. K., & Alsayed, C. A. (1998). A multi-objective model for locating fire stations. European Journal of Operational Research, 110(2), 243–260.
Barth, S., & White, M. (1998). Hazardous cargo. World, 11(11), 46–48.
Bassett, M. H., Pekny, J. F., & Reklaitis, G. V. (1996). Decomposition techniques for the solution of large-scale scheduling problems. AIChE Journal, 42(12), 3373–3387.
Batta, R., Dolan, J. M., & Krishnamurthy, N. N. (1989). The maximal expected covering location problem: Revisited. Transportation Science, 23(4), 277–287.
Berman, O., & Krass, D. (2002). The generalized maximal covering location problem. Computers & Operations Research, 29(6), 563–581.
Brotcorne, L., Laporte, G., & Semet, F. (2003). Ambulance location and relocation models. European Journal of Operational Research, 147(3), 451–463.
Capar, I., Keskin, B. B., & Rubin, P. A. (2015). An improved formulation for the maximum coverage patrol routing problem. Computers & Operations Research, 59, 1–10.
Capar, I., & Kuby, M. (2012). An efficient formulation of the flow refueling location model for alternative-fuel stations. IIE Transactions, 44(8), 622–636.
Chapman, S., & White, J. (1974). Probabilistic formulations of emergency service facilities location problems. In ORSA/TIMS conference, San Juan, Puerto Rico.
Church, R., & ReVelle, C. (1974). The maximal covering location problem. Papers in Regional Science, 32(1), 101–118.
Cox, A., Prager, F., & Rose, A. (2011). Transportation security and the role of resilience: A foundation for operational metrics. Transport Policy, 18(2), 307–317.
Current, J., Min, H., & Schilling, D. (1990). Multiobjective analysis of facility location decisions. European Journal of Operational Research, 49(3), 295–307.
Current, J. R., Velle, C. R., & Cohon, J. L. (1985). The maximum covering/shortest path problem: A multiobjective network design and routing formulation. European Journal of Operational Research, 21(2), 189–199.
Curtin, K. M., Hayslett-McCall, K., & Qiu, F. (2010). Determining optimal police patrol areas with maximal covering and backup covering location models. Networks and Spatial Economics, 10(1), 125–145.
Curtin, K. M., Qiu, F., Hayslett-McCall, K., & Bray, T. M. (2005). Integrating GIS and maximal covering models to determine optimal police patrol areas. In F. Wang (Ed.), Geographic information systems and crime analysis (Chap. 13, pp. 214–235). Hershey: IDEA Group Publishing.
Daskin, M. S. (1983). A maximum expected covering location model: Formulation, properties and heuristic solution. Transportation Science, 17(1), 48–70.
Dijkstra, E. W. (1959). A note on two problems in connexion with graphs. Numerische Mathematik, 1(1), 269–271.
Ekwall, D. (2010). On analysing the official statistics for antagonistic threats against transports in EU: A supply chain risk perspective. Journal of Transportation Security, 3(4), 213–230.
Hodgson, M. J. (1990). A flow-capturing location-allocation model. Geographical Analysis, 22(3), 270–279.
International Road Transport Union. (2008). Attacks on drivers of international heavy goods vehicles. Technical report, 3, rue de Varembé B.P. 44 CH-1211 Geneva 20 Switzerland. http://www.iru.org/cms-filesystem-action?file=webnews2008/Attack
Kaza, S., Xu, J., Marshall, B., & Chen, H. (2009). Topological analysis of criminal activity networks: Enhancing transportation security. IEEE Transactions on Intelligent Transportation Systems, 10(1), 83–91.
Kelly, J. D. (2002). Chronological decomposition heuristic for scheduling: Divide and conquer method. AIChE Journal, 48(12), 2995–2999.
Keskin, B. B., Li, S. R., Steil, D., & Spiller, S. (2012). Analysis of an integrated maximum covering and patrol routing problem. Transportation Research Part E: Logistics and Transportation Review, 48(1), 215–232.
Kuby, M., & Lim, S. (2005). The flow-refueling location problem for alternative-fuel vehicles. Socio-Economic Planning Sciences, 39(2), 125–145.
Kuby, M., & Lim, S. (2007). Location of alternative-fuel stations using the flow-refueling location model and dispersion of candidate sites on arcs. Networks and Spatial Economics, 7(2), 129–152.
Marianov, V., & Revelle, C. (1994). The queuing probabilistic location set covering problem and some extensions. Socio-Economic Planning Sciences, 28(3), 167–178.
Marshall, B., Kaza, S., Xu, J., Atabakhsh, H., Petersen, T., Violette, C., & Chen, H. (2004). Cross-jurisdictional criminal activity networks to support border and transportation security. In The 7th international IEEE conference on intelligent transportation systems, 2004. Proceedings (pp. 100–105). IEEE.
Patel, D. J., Batta, R., & Nagi, R. (2005). Clustering sensors in wireless ad hoc networks operating in a threat environment. Operations Research, 53(3), 432–442.
Rajagopalan, H. K., Saydam, C., & Xiao, J. (2008). A multiperiod set covering location model for dynamic redeployment of ambulances. Computers & Operations Research, 35(3), 814–826.
Revelle, C., & Hogan, K. (1989). The maximum reliability location problem and \(\alpha \)-reliablep-center problem: Derivatives of the probabilistic location set covering problem. Annals of Operations Research, 18(1), 155–173.
ReVelle, C. S., & Eiselt, H. A. (2005). Location analysis: A synthesis and survey. European Journal of Operational Research, 165(1), 1–19.
Sahinidis, N., & Grossmann, I. E. (1991). Reformulation of multiperiod milp models for planning and scheduling of chemical processes. Computers & Chemical Engineering, 15(4), 255–272.
Secretariado Ejecutivo del Sistema Nacional de Seguridad Pública. (2015). Incidencia delictiva del fuero común 2014. Technical report, Gral. Mariano Escobedo 456, Anzures, Miguel Hidalgo, 11590 Ciudad de México, D.F., Mexico. http://www.secretariadoejecutivo.gob.mx/docs/pdfs/estadisticas.
Toregas, C., Swain, R., ReVelle, C., & Bergman, L. (1971). The location of emergency service facilities. Operations Research, 19(6), 1363–1373.
Vaa, T. (1997). Increased police enforcement: Effects on speed. Accident Analysis & Prevention, 29(3), 373–385.
Van den Engel, A., & Prummel, E. (2007). Organised theft of commercial vehicles and their loads in the european union. European Parliament. Directorate General Internal Policies of the Union. Policy Department Structural and Cohesion Policies. Transport and Tourism, Brussels.
Welch, T. F., & Mishra, S. (2013). A measure of equity for public transit connectivity. Journal of Transport Geography, 33, 29–41.
Wright, P. D., Liberatore, M. J., & Nydick, R. L. (2006). A survey of operations research models and applications in homeland security. Interfaces, 36(6), 514–529.
Yan, T., Gu, Y., He, T., & Stankovic, J. A. (2008). Design and optimization of distributed sensing coverage in wireless sensor networks. ACM Transactions on Embedded Computing Systems (TECS), 7(3), 33.
Yoon, S. W., Velasquez, J. D., Partridge, B., & Nof, S. Y. (2008). Transportation security decision support system for emergency response: A training prototype. Decision Support Systems, 46(1), 139–148.
Acknowledgments
The authors would like to thank the Associate Editor and anonymous referees for their comments on earlier versions of this paper. This proved to be of great help, specially for improving many explanations in this work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Auad, R., Batta, R. Location-coverage models for preventing attacks on interurban transportation networks. Ann Oper Res 258, 679–717 (2017). https://doi.org/10.1007/s10479-015-2087-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10479-015-2087-y