Abstract
A number of location covering models have been developed to address problems of security and safety. Bell et al. (2011) applies the LSCP to identify aircraft alert sites to respond to security threats to the U.S. border and other key assets. Bao et al. (2015) dealt with the problem of locating watchtower locations for forest fire detection and monitoring. Zhang and Du (2012) describe an approach to locate a set of radars, and assign power levels to each of them so that all crucial points along a river are monitored, or covered, while minimizing the total power being used. Other interesting examples can be found in Agnetis et al. (2009), Bar-Noy et al. (2013), and Pan (2010). Addressed is the location of a set of facilities that can guard, protect or respond in an emergency, developed under the assumption that system components are always available and ready to act. In addition, it is almost always assumed that the network infrastructure will always be usable and that services such as emergency response can be made using the best routes on an unimpeded network. That is, the system always works and there are no disruptions to service.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Richard Church wishes to thank Prof. Heinimann of ETH for the gracious invitation to attend a day of meetings at the Risk Center of ETH in which a number of applications of the N − 1 analysis were presented.
References
Agnetis A, Grande E, Mirchandani PB, Pacifici A (2009) Covering a line segment with variable radius discs. Comput Oper Res 36:1423–1436
Alderson DL, Brown GG, Carlyle WM, Wood RK (2011) Solving defender-attacker-defender models for infrastructure defense. Department of Operations Research, Naval Postgraduate School, Monterey, CA
Bao S, Xiao N, Lai Z, Zhang H, Kim C (2015) Optimizing watchtower locations for forest fire monitoring using location models. Fire Saf J 71:100–109
Bar-Noy A, Rawitz D, Terlecky P (2013) Maximizing barrier coverage lifetime with mobile sensors. In: European symposium on algorithms. Springer, Berlin, pp 97–108
Başdere M, Aras N, Altınel İK, Afşar S (2013) A leader-follower game for the point coverage problem in wireless sensor networks. Eur J Ind Eng 7(5):635–656
Bell JE, Griffis SE, Cunningham WA, Eberlan JA (2011) Location optimization of strategic alert sites for homeland defense. Omega 39(2):151–158
Berman O, Drezner T, Drezner Z, Wesolowsky GO (2009) A defensive maximal covering problem on a network. Int Trans Oper Res 16(1):69–86
Choi Y, Suzuki T (2013) Protection strategies for critical retail facilities: applying interdiction median and maximal covering problems with fortification. J Oper Res Soc Jpn 56(1):38–55
Church RL, Scaparra MP (2007) Protecting critical assets: the r-interdiction median problem with fortification. Geogr Anal 39(2):129–146
Church RL, Scaparra MP, Middleton RS (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr 94(3):491–502
Corley HW, Sha DY (1982) Most vital links and nodes in weighted networks. Oper Res Lett 1(4):157–160
Dong L, Xu-Chen L, Xiang-Tao Y, Fei W (2010) A model for allocating protection resources in military logistics distribution system based on maximal covering problem. In 2010 international conference on logistics systems and intelligent management, vol 1. IEEE, Piscataway, NJ, pp. 98–101
Farahani RZ, Hassani A, Mousavi SM, Baygi MB (2014) A hybrid artificial bee colony for disruption in a hierarchical maximal covering location problem. Comput Ind Eng 75:129–141
Lei TL (2013) Identifying critical facilities in hub-and-spoke networks: a hub interdiction median problem. Geogr Anal 45(2):105–122
Mahmoodjanloo M, Parvasi SP, Ramezanian R (2016) A tri-level covering fortification model for facility protection against disturbance in r-interdiction median problem. Comput Ind Eng 102:219–232
Maliszewski PJ (2011) Interdiction models and homeland security risks. J Homel Secur Emerg Manag 8(1): Article 4
Murray AT, Grubesic T (eds) (2007) Critical infrastructure: reliability and vulnerability. Springer, Berlin
Murray AT, Grubesic TH (2013) Fortifying large scale, geospatial networks: implications for supervisory control. In: Laing C, Badii A, Vickers P (eds) Securing critical infrastructures and critical control systems: approaches for threat protection. Information Science Reference, Hershey, pp 224–246
O’Hanley JR, Church RL (2011) Designing robust coverage networks to hedge against worst-case facility losses. Eur J Oper Res 209(1):23–36
O’Hanley JR, Church RL, Gilless JK (2007a) Locating and protecting critical reserve sites to minimize expected and worst-case losses. Biol Conserv 134(1):130–141
O’Hanley JR, Church RL, Gilless JK (2007b) The importance of in situ site loss in nature reserve selection: balancing notions of complementarity and robustness. Biol Conserv 135(2):170–180
Pan A (2010) The applications of maximal covering model in typhoon emergency shelter location problem. In 2010 I.E. international conference on industrial engineering and engineering management (IEEM). IEEE, Piscataway, NJ, pp. 1727–1731
Parfomak PW (2014) Physical security of the U.S. power grid: high voltage transformer substations, report 7–7500 (R4304), Congressional Research Service, Washington, DC
Salmeron J, Wood K, Baldick R (2004) Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst 19(2):905–912
Scaparra MP, Church RL (2008) An exact solution approach for the interdiction median problem with fortification. Eur J Oper Res 189(1):76–92
Scaparra MP, Church R (2012) Protecting supply systems to mitigate potential disaster: a model to fortify capacitated facilities. Int Reg Sci Rev 35(2):188–210
Scaparra MP, Church RL (2015) Location problems under disaster events. In: Saldanha-da-Gama F, Stefan N, Gilbert L (eds) Location science. Springer International Publishing, Cham, pp 623–642
Snyder LV, Scaparra MP, Daskin MS, Church RL (2006) Planning for disruptions in supply chain networks. In: Johnson P, Norman B, Secomandi N (eds) Models, methods, and applications for innovative decision making. INFORMS, Baltimore, MD, pp 234–257
Swain R (1971) A decomposition algorithm for a class of facility location problems. PhD dissertation, Cornell University, Ithaca, NY
Wall Street Journal (2014) Assault on California power station raises alarm for potential for terrorism
Wollmer R (1964) Removing arcs from a network. Oper Res 12(6):934–940
Zhang Z, Du DZ (2012) Radar placement along banks of river. J Glob Optim 52(4):729–741
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Church, R.L., Murray, A. (2018). Disruption, Protection, and Resilience. In: Location Covering Models. Advances in Spatial Science. Springer, Cham. https://doi.org/10.1007/978-3-319-99846-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-99846-6_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99845-9
Online ISBN: 978-3-319-99846-6
eBook Packages: Economics and FinanceEconomics and Finance (R0)