Please use this identifier to cite or link to this item:
http://hdl.handle.net/11718/20801
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ramamoorthy, Prasanna | |
dc.contributor.author | Jayaswal, Sachin | |
dc.contributor.author | Sinha, Ankur | |
dc.contributor.author | Vidyarthi, Navneet | |
dc.date.accessioned | 2018-06-09T11:54:52Z | |
dc.date.available | 2018-06-09T11:54:52Z | |
dc.date.issued | 2018-03-29 | |
dc.identifier.uri | http://hdl.handle.net/11718/20801 | |
dc.description | European Journal of Operational Research, Volume 270, Issue 1, 1 October 2018, Pages 230-245 | en_US |
dc.description.abstract | In this paper, we present computationally efficient formulations for the multiple allocation hub interdiction and hub protection problems, which are bilevel and trilevel mixed integer linear programs, respectively. In the hub interdiction problem, the aim is to identify a subset of r critical hubs from an existing set of p hubs that when interdicted results in the maximum post-interdiction cost of routing flows. We present two alternate ways of reducing the bilevel hub interdiction model to a single level optimization problem. The first approach uses the dual formulation of the lower level problem. The second approach exploits the structure of the lower level problem to replace it by a set of closest assignment constraints (CACs). We present alternate sets of CACs, study their dominance relationships, and report their computational performances. Further, we propose refinements to CACs that offer computational advantages of an order-of-magnitude compared to the one existing in the literature. Further, our proposed modifications offer structural advantages for Benders decomposition, which lead to substantial computational savings, particularly for large problem instances. Finally, we study and solve large scale instances of the trilevel hub protection problem exactly by utilizing the ideas developed for the hub interdiction problem. | en_US |
dc.publisher | Elsevier | en_US |
dc.subject | Location | en_US |
dc.subject | Hub-and-spoke network | en_US |
dc.subject | Interdiction | en_US |
dc.subject | Protection | en_US |
dc.subject | Benders decomposition | en_US |
dc.title | Multiple allocation hub interdiction and protection problems: model formulations and solution approaches | en_US |
dc.type | Article | en_US |
Appears in Collections: | Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Multiple.pdf Restricted Access | 817.71 kB | Adobe PDF | View/Open Request a copy |
Items in IIMA Institutional Repository are protected by copyright, with all rights reserved, unless otherwise indicated.