1,987 research outputs found

    Optimizing dynamic investment decisions for railway systems protection

    Get PDF
    Past and recent events have shown that railway infrastructure systems are particularly vulnerable to natural catastrophes, unintentional accidents and terrorist attacks. Protection investments are instrumental in reducing economic losses and preserving public safety. A systematic approach to plan security investments is paramount to guarantee that limited protection resources are utilized in the most efficient manner. In this article, we present an optimization model to identify the railway assets which should be protected to minimize the impact of worst case disruptions on passenger flows. We consider a dynamic investment problem where protection resources become available over a planning horizon. The problem is formulated as a bilevel mixed-integer model and solved using two different decomposition approaches. Random instances of different sizes are generated to compare the solution algorithms. The model is then tested on the Kent railway network to demonstrate how the results can be used to support efficient protection decisions

    Too-connected-to-fail Institutions and Payments System’s Stability: Assessing Challenges for Financial Authorities

    Get PDF
    The most recent episode of market turmoil exposed the limitations resulting from the traditional focus on too-big-to-fail institutions within an increasingly systemic-crisis-prone financial system, and encouraged the appearance of the too-connected-to-fail (TCTF) concept. The TCTF concept conveniently broadens the base of potential destabilizing institutions beyond the traditional banking-focused approach to systemic risk, but requires methodologies capable of coping with complex, cross-dependent, context-dependent and non-linear systems. After comprehensively introducing the rise of the TCTF concept, this paper presents a robust, parsimonious and powerful approach to identifying and assessing systemic risk within payments systems, and proposes some analytical routes for assessing financial authorities’ challenges. Banco de la Republica’s approach is based on a convenient mixture of network topology basics for identifying central institutions, and payments systems simulation techniques for quantifying the potential consequences of central institutions failing within Colombian large-value payments systems. Unlike econometrics or network topology alone, results consist of a rich set of quantitative outcomes that capture the complexity, cross-dependency, context-dependency and non-linearity of payments systems, but conveniently disaggregated and dollar-denominated. These outcomes and the proposed analysis provide practical information for enhanced policy and decision-making, where the ability to measure each institution’s contribution to systemic risk may assist financial authorities in their task to achieve payments system’s stability.Payments systems, too-connected-to-fail, too-big-to-fail, systemic risk, network topology, simulation, central bank liquidity. Classification JEL:E58, E44, C63, G21, D85.

    Locating Post Offices Using Fuzzy Goal Programming and Geographical Information System (GIS)

    Get PDF
    This paper deals with the problem of locating new post offices in a megacity. To do so, a combination of geographicalinformation system (GIS) and fuzzy goal programming (FGP) is used. In order to locate new offices, first six types of servicefacilities with high levels of interactions with post offices are defined. Then, aspiration level of proximity for each servicefacility is determined. Based on these values, a fuzzy goal programming model is constructed to find potential locations offacilities. In order to determine the optimal locations among potential facilities, a maximal covering location problem(MCLP) is solved and results are reported. Results show that although the current state is near-optimal, for future expansionsof the network, the government should spend money on central and southern parts of this megacity

    Improving supply system reliability against random disruptions: Strategic protection investment

    Get PDF
    Supply chains, as vital systems to the well-being of countries and economies, require systematic approaches to reduce their vulnerability. In this paper, we proposea non linear optimisation model to determine an effective distribution of protectiveresources among facilities in service and supply systems so as to reduce the probability of failure to which facilities are exposed in case of external disruptions. Thefailure probability of protected assets depends on the level of protection investmentsand the ultimate goal is to minimize the expected facility-customer transport ortravel costs to provide goods and services. A linear version of the model is obtainedby exploiting a specialized network flow structure. Furthermore, an efficient GRASPsolution algorithm is developed to benchmark the linearised model and resolve numerical difficulties. The applicability of the proposed model is demonstrated usingthe Toronto hospital network. Protection measures within this context correspondto capacity expansion investments and reduce the likelihood that hospitals are unable to satisfy patient demand during periods of high hospitalization (e.g., during apandemic). Managerial insights on the protection resource distribution are discussedand a comparison between probabilistic and worst-case disruptions is provided

    Facility Location Planning Under Disruption

    Get PDF
    Facility Location Problems (FLPs) such as the Uncapacitated Facility Location (UFL) and the Capacitated Facility Location (CFL) along with the k-Shortest Path Problem (k-SPP) are important research problems in managing supply chain networks (SCNs) and related operations. In UFL, there is no limit on the facility serving capacity while in CFL such limit is imposed. FLPs aim to find the best facility locations to meet the customer demands within the available capacity with minimized facility establishment and transportation costs. The objective of the (k-SPP) is to find the k minimal length and partial overlapping paths between two nodes in a transport network graph. In the literature, many approaches are proposed to solve these problems. However, most of these approaches assume totally reliable facilities and do not consider the failure probability of the facilities, which can lead to notably higher cost. In this thesis, we investigate the reliable uncapacitated facility location (RUFL)and the reliable capacitated facility location (RCFL) problems, and the k-SPP where potential facilities are exposed to disruption then propose corresponding solution approaches to efficiently handle these problems. An evolutionary learning technique is elaborated to solve RUFL. Then, a non-linear integer programming model is introduced for the RCFL along with a solution approach involving the linearization of the model and its use as part of an iterative procedure leveraging CPLEX for facility establishment and customer assignment along with a knapsack implementation aiming at deriving the best facility fortification. In RUFL and RCFL, we assume heterogeneous disruption with respect to the facilities, each customer is assigned to primary and backup facilities and a fixed fortification budget allows to make a subset of the facilities totally reliable. Finally, we propose a hybrid approach based on graph partitioning and modified Dijkstra algorithm to find k partial overlapping shortest paths between two nodes on a transport network that is exposed to heterogeneous connected node failures. The approaches are illustrated via individual case studies along with corresponding key insights. The performance of each approach is assessed using benchmark results. For the k-SPP, the effect of preferred establishment locations is analyzed with respect to disruption scenarios, failure probability, computation time, transport costs, network size and partitioning parameters

    Optimization Approaches To Protect Transportation Infrastructure Against Strategic and Random Disruptions

    Get PDF
    Past and recent events have proved that critical infrastructure are vulnerable to natural catastrophes, unintentional accidents and terrorist attacks. Protecting these systems is critical to avoid loss of life and to guard against economical upheaval. A systematic approach to plan security investments is paramount to guarantee that limited protection resources are utilized in the most effcient manner. This thesis provides a detailed review of the optimization models that have been introduced in the past to identify vulnerabilities and protection plans for critical infrastructure. The main objective of this thesis is to study new and more realistic models to protect transportation infrastructure such as railway and road systems against man made and natural disruptions. Solution algorithms are devised to effciently solve the complex formulations proposed. Finally, several illustrative case studies are analysed to demonstrate how solving these models can be used to support effcient protection decisions

    Passenger railway network protection: A model with variable post-disruption demand service

    Get PDF
    Protecting transportation infrastructures is critical to avoid loss of life and to guard against economic upheaval. This paper addresses the problem of identifying optimal protection plans for passenger rail transportation networks, given a limited budget. We propose a bi-level protection model which extends and refines the model previously introduced by Scaparra et al, (Railway infrastructure security, Springer, New York, 2015). In our extension, we still measure the impact of rail disruptions in terms of the amount of unserved passenger demand. However, our model captures the post-disruption user behaviour in a more accurate way by assuming that passenger demand for rail services after disruptions varies with the extent of the travel delays. To solve this complex bi-level model, we develop a simulated annealing algorithm. The efficiency of the heuristic is tested on a set of randomly generated instances and compared with the one of a more standard exact decomposition algorithm. To illustrate how the modelling approach might be used in practice to inform protection planning decisions, we present a case study based on the London Underground. The case study also highlights the importance of capturing flow demand adjustments in response to increased travel time in a mathematical model

    Passenger railway network protection: A model with variable post-disruption demand service

    Get PDF
    Protecting transportation infrastructures is critical to avoid loss of life and to guard against economic upheaval. This paper addresses the problem of identifying optimal protection plans for passenger rail transportation networks, given a limited budget. We propose a bi-level protection model which extends and refines the model previously introduced by Scaparra et al, (Railway infrastructure security, Springer, New York, 2015). In our extension, we still measure the impact of rail disruptions in terms of the amount of unserved passenger demand. However, our model captures the post-disruption user behaviour in a more accurate way by assuming that passenger demand for rail services after disruptions varies with the extent of the travel delays. To solve this complex bi-level model, we develop a simulated annealing algorithm. The efficiency of the heuristic is tested on a set of randomly generated instances and compared with the one of a more standard exact decomposition algorithm. To illustrate how the modelling approach might be used in practice to inform protection planning decisions, we present a case study based on the London Underground. The case study also highlights the importance of capturing flow demand adjustments in response to increased travel time in a mathematical model

    Sentara Healthcare: A Case Study Series on Disruptive Innovation Within Integrated Health Systems

    Get PDF
    Examines how integration and ties with health plans, physicians, and hospitals helped protect against revenue volatility and enabled experimentation; factors that facilitate integration; innovative practices; lessons learned; and policy implications
    • 

    corecore