期刊文献+

基于P-中位模型的网络关键设施识别问题的算法设计与实现 被引量:9

Algorithms and Analysis for the Critical Facilities Identification Problem in Network Based on P-median Model
原文传递
导出
摘要 在网络服务系统中,存在由于各种人为因素(恐怖行为、黑客袭击等)导致网络设施服务中断的情况。为抵御有预谋的攻击,需要更加重视如何识别网络系统中的关键设施。结合P-中位选址模型,以设施失效对网络系统运行效率影响最大化为目标,给出针对基于P-中位模型的网络关键设施识别问题(即R-中断模型),并针对该模型提出贪婪搜索、邻域搜索和禁忌搜索3种算法。结合Galvo、Europe 150和USA 263等大型的测试实例,对上述算法进行比较分析,得出禁忌搜索算法最有效的结论。最后,结合Europe 150数据的例子比较了P-中位问题与R-中断问题,认为在选址决策中事先考虑到人为攻击导致的中断问题可以增加网络的抗攻击能力,减少损失。 Vulnerability to sudden service disruption due to deliberate sabotage and terrorist attacks is one of the major threats for network system. Much attention focuses on the need to identify critical facilities for hardening facilities against attacks. In order to identify critical facility that affected the system most after their disruptions, R-interdiction model based on P -median problem is presented. Three heuristics:greedy search, neighborhood search and Tabu search are proposed for this model. Then these heuristics are compared by three test examples: Galvao ,Europe 150 and USA 263. Computational results indicate that Tabu search consistently have the best performance. Finally we include that R -interdiction problem can increase the robustness of net- work by comparing the solutions of P -median problem and R -interdiction problem.
出处 《管理科学》 CSSCI 2008年第4期46-53,共8页 Journal of Management Science
基金 国家自然科学基金(70601011)
关键词 关键设施识别 中位问题 中断模型 启发式算法 critical facilities identification median problem interdiction model heuristic algorithm
  • 相关文献

参考文献20

  • 1M S Daskin. Network and Discrete Location:Models, Algorithms and Applications [ M ]. New York : John Wiley and Sons, 1995.
  • 2W A H Thissen, P M Herder. Critical Infrastructures:State of the Art in Research and Application [ M ]. Boston : Kluwer Academic Publishers, 2003.
  • 3P M Ghare, D C Montgomery, W C Turner. Optimal Interdiction Policy for a Flow Network [ J ]. Naval Research Logistics Quarterly, 1971,18 ( 1 ) :37-45.
  • 4H W Corley, H Chang. Finding the n Most Vital Nodes in a Flow Network [ J ]. Management Science, 1974,21 (3) :362-364.
  • 5R Wollmer. Removing Arcs from a Network [ J ]. Operations Research, 1964,12 (6) :934-940.
  • 6A W McMasters, T M Mustin. Optimal Interdiction of a Supply Network [ J ]. Naval Research Logistics, 1970,17(3) :261-268.
  • 7E Israeli, R K Wood. Shortest-path Network Interdiction [ J ]. Networks, 2002,40 (2) :97-111.
  • 8C Lira, J C Smith. Algorithms for Discrete and Continuous Multi-commodity Flow Network Interdiction Problems [ J ]. IIE Transactions, 2007,39 ( 1 ) : 15 - 26.
  • 9Myung Y-S, Kim H. A Cutting Plane Algorithm for Computing k -Edge Survivability of a Network [ J ].European Journal of Operational Research, 2004,156 (3) :579-589.
  • 10Darren M Scott, David C Novak, Lisa Aultman-Hall, Feng Guo. Network Robustness Index:A New Method for Identifying Critical Links and Evaluating the Performance of Transportation Networks [ J ]. Journal of Transport Geography, 2006,14( 3 ) :215-227.

共引文献33

同被引文献109

引证文献9

二级引证文献79

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部