Please use this identifier to cite or link to this item: http://hdl.handle.net/11718/20232
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRamamoorthy, Prasanna
dc.contributor.authorJayaswal, Sachin
dc.contributor.authorSinha, Ankur
dc.contributor.authorVidyarthi, Navneet
dc.date.accessioned2018-02-06T06:05:46Z
dc.date.available2018-02-06T06:05:46Z
dc.date.issued2016-10-25
dc.identifier.urihttp://hdl.handle.net/11718/20232
dc.description.abstractIn this paper, we present computationally effcient formulations for the hub interdiction and hub protection problems, which are bi-level and tri-level mixed integer linear programs, respec- tively. In the hub interdiction problem, the aim is to identify a set of r critical hubs from an existing set of p hubs that when interdicted results in the greatest disruption cost to the hub-and- spoke network. Reduction of the bi-level interdiction model to single level is straightforward using Karush-Kuhn-Tucker (KKT) conditions corresponding to the lower level problem; however, this turns out to be computationally ineffcient in this context. Therefore, we exploit the structure of the problem using various closest assignment constraints to reduce the hub interdiction problem to single level. The modifications lead to computational savings of almost an order of magnitude when compared against the only model existing in the literature. Further, our proposed modifi- cations offer structural advantages for Benders decomposition, which lead to substantial savings, particularly for large problems. Finally, we study and solve the hub protection problem exactly by utilizing the ideas developed for the hub interdiction problem. The tri-level protection problem is otherwise intractable, and to our best knowledge, has not been solved in the literature.en_US
dc.language.isoen_USen_US
dc.publisherIndian Institute of Management Ahmedabaden_US
dc.relation.ispartofseriesW.P.;2016-10-01
dc.subjectLocationen_US
dc.subjectHub-and-spoke networken_US
dc.subjectInterdictionen_US
dc.subjectProtectionen_US
dc.subjectBenders decompositionen_US
dc.titleHub interdiction & hub protection problems: Model formulations & exact solution methodsen_US
dc.typeWorking Paperen_US
Appears in Collections:Working Papers

Files in This Item:
File Description SizeFormat 
WP_2016_10_01.pdfWP_2016_10_1518.38 kBAdobe PDFView/Open


Items in IIMA Institutional Repository are protected by copyright, with all rights reserved, unless otherwise indicated.