Advertisement

Disruption, Protection, and Resilience

  • Richard L. Church
  • Alan Murray
Chapter
Part of the Advances in Spatial Science book series (ADVSPATIAL)

Abstract

A number of location covering models have been developed to address problems of security and safety. Bell et al. (2011) applies the LSCP to identify aircraft alert sites to respond to security threats to the U.S. border and other key assets. Bao et al. (2015) dealt with the problem of locating watchtower locations for forest fire detection and monitoring. Zhang and Du (2012) describe an approach to locate a set of radars, and assign power levels to each of them so that all crucial points along a river are monitored, or covered, while minimizing the total power being used. Other interesting examples can be found in Agnetis et al. (2009), Bar-Noy et al. (2013), and Pan (2010). Addressed is the location of a set of facilities that can guard, protect or respond in an emergency, developed under the assumption that system components are always available and ready to act. In addition, it is almost always assumed that the network infrastructure will always be usable and that services such as emergency response can be made using the best routes on an unimpeded network. That is, the system always works and there are no disruptions to service.

References

  1. Agnetis A, Grande E, Mirchandani PB, Pacifici A (2009) Covering a line segment with variable radius discs. Comput Oper Res 36:1423–1436CrossRefGoogle Scholar
  2. Alderson DL, Brown GG, Carlyle WM, Wood RK (2011) Solving defender-attacker-defender models for infrastructure defense. Department of Operations Research, Naval Postgraduate School, Monterey, CAGoogle Scholar
  3. Bao S, Xiao N, Lai Z, Zhang H, Kim C (2015) Optimizing watchtower locations for forest fire monitoring using location models. Fire Saf J 71:100–109Google Scholar
  4. Bar-Noy A, Rawitz D, Terlecky P (2013) Maximizing barrier coverage lifetime with mobile sensors. In: European symposium on algorithms. Springer, Berlin, pp 97–108Google Scholar
  5. Başdere M, Aras N, Altınel İK, Afşar S (2013) A leader-follower game for the point coverage problem in wireless sensor networks. Eur J Ind Eng 7(5):635–656CrossRefGoogle Scholar
  6. Bell JE, Griffis SE, Cunningham WA, Eberlan JA (2011) Location optimization of strategic alert sites for homeland defense. Omega 39(2):151–158CrossRefGoogle Scholar
  7. Berman O, Drezner T, Drezner Z, Wesolowsky GO (2009) A defensive maximal covering problem on a network. Int Trans Oper Res 16(1):69–86CrossRefGoogle Scholar
  8. Choi Y, Suzuki T (2013) Protection strategies for critical retail facilities: applying interdiction median and maximal covering problems with fortification. J Oper Res Soc Jpn 56(1):38–55CrossRefGoogle Scholar
  9. Church RL, Scaparra MP (2007) Protecting critical assets: the r-interdiction median problem with fortification. Geogr Anal 39(2):129–146CrossRefGoogle Scholar
  10. Church RL, Scaparra MP, Middleton RS (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr 94(3):491–502CrossRefGoogle Scholar
  11. Corley HW, Sha DY (1982) Most vital links and nodes in weighted networks. Oper Res Lett 1(4):157–160CrossRefGoogle Scholar
  12. Dong L, Xu-Chen L, Xiang-Tao Y, Fei W (2010) A model for allocating protection resources in military logistics distribution system based on maximal covering problem. In 2010 international conference on logistics systems and intelligent management, vol 1. IEEE, Piscataway, NJ, pp. 98–101Google Scholar
  13. Farahani RZ, Hassani A, Mousavi SM, Baygi MB (2014) A hybrid artificial bee colony for disruption in a hierarchical maximal covering location problem. Comput Ind Eng 75:129–141CrossRefGoogle Scholar
  14. Lei TL (2013) Identifying critical facilities in hub-and-spoke networks: a hub interdiction median problem. Geogr Anal 45(2):105–122CrossRefGoogle Scholar
  15. Mahmoodjanloo M, Parvasi SP, Ramezanian R (2016) A tri-level covering fortification model for facility protection against disturbance in r-interdiction median problem. Comput Ind Eng 102:219–232CrossRefGoogle Scholar
  16. Maliszewski PJ (2011) Interdiction models and homeland security risks. J Homel Secur Emerg Manag 8(1): Article 4Google Scholar
  17. Murray AT, Grubesic T (eds) (2007) Critical infrastructure: reliability and vulnerability. Springer, BerlinGoogle Scholar
  18. Murray AT, Grubesic TH (2013) Fortifying large scale, geospatial networks: implications for supervisory control. In: Laing C, Badii A, Vickers P (eds) Securing critical infrastructures and critical control systems: approaches for threat protection. Information Science Reference, Hershey, pp 224–246Google Scholar
  19. O’Hanley JR, Church RL (2011) Designing robust coverage networks to hedge against worst-case facility losses. Eur J Oper Res 209(1):23–36CrossRefGoogle Scholar
  20. O’Hanley JR, Church RL, Gilless JK (2007a) Locating and protecting critical reserve sites to minimize expected and worst-case losses. Biol Conserv 134(1):130–141CrossRefGoogle Scholar
  21. O’Hanley JR, Church RL, Gilless JK (2007b) The importance of in situ site loss in nature reserve selection: balancing notions of complementarity and robustness. Biol Conserv 135(2):170–180CrossRefGoogle Scholar
  22. Pan A (2010) The applications of maximal covering model in typhoon emergency shelter location problem. In 2010 I.E. international conference on industrial engineering and engineering management (IEEM). IEEE, Piscataway, NJ, pp. 1727–1731Google Scholar
  23. Parfomak PW (2014) Physical security of the U.S. power grid: high voltage transformer substations, report 7–7500 (R4304), Congressional Research Service, Washington, DCGoogle Scholar
  24. Salmeron J, Wood K, Baldick R (2004) Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst 19(2):905–912CrossRefGoogle Scholar
  25. Scaparra MP, Church RL (2008) An exact solution approach for the interdiction median problem with fortification. Eur J Oper Res 189(1):76–92CrossRefGoogle Scholar
  26. Scaparra MP, Church R (2012) Protecting supply systems to mitigate potential disaster: a model to fortify capacitated facilities. Int Reg Sci Rev 35(2):188–210CrossRefGoogle Scholar
  27. Scaparra MP, Church RL (2015) Location problems under disaster events. In: Saldanha-da-Gama F, Stefan N, Gilbert L (eds) Location science. Springer International Publishing, Cham, pp 623–642Google Scholar
  28. Snyder LV, Scaparra MP, Daskin MS, Church RL (2006) Planning for disruptions in supply chain networks. In: Johnson P, Norman B, Secomandi N (eds) Models, methods, and applications for innovative decision making. INFORMS, Baltimore, MD, pp 234–257Google Scholar
  29. Swain R (1971) A decomposition algorithm for a class of facility location problems. PhD dissertation, Cornell University, Ithaca, NYGoogle Scholar
  30. Wall Street Journal (2014) Assault on California power station raises alarm for potential for terrorismGoogle Scholar
  31. Wollmer R (1964) Removing arcs from a network. Oper Res 12(6):934–940CrossRefGoogle Scholar
  32. Zhang Z, Du DZ (2012) Radar placement along banks of river. J Glob Optim 52(4):729–741CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Richard L. Church
    • 1
  • Alan Murray
    • 1
  1. 1.Department of GeographyUniversity of CaliforniaSanta BarbaraUSA

Personalised recommendations