Skip to main content

Disruption, Protection, and Resilience

  • Chapter
  • First Online:
Location Covering Models

Part of the book series: Advances in Spatial Science ((ADVSPATIAL))

Abstract

A number of location covering models have been developed to address problems of security and safety. Bell et al. (2011) applies the LSCP to identify aircraft alert sites to respond to security threats to the U.S. border and other key assets. Bao et al. (2015) dealt with the problem of locating watchtower locations for forest fire detection and monitoring. Zhang and Du (2012) describe an approach to locate a set of radars, and assign power levels to each of them so that all crucial points along a river are monitored, or covered, while minimizing the total power being used. Other interesting examples can be found in Agnetis et al. (2009), Bar-Noy et al. (2013), and Pan (2010). Addressed is the location of a set of facilities that can guard, protect or respond in an emergency, developed under the assumption that system components are always available and ready to act. In addition, it is almost always assumed that the network infrastructure will always be usable and that services such as emergency response can be made using the best routes on an unimpeded network. That is, the system always works and there are no disruptions to service.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Richard Church wishes to thank Prof. Heinimann of ETH for the gracious invitation to attend a day of meetings at the Risk Center of ETH in which a number of applications of the N − 1 analysis were presented.

References

  • Agnetis A, Grande E, Mirchandani PB, Pacifici A (2009) Covering a line segment with variable radius discs. Comput Oper Res 36:1423–1436

    Article  Google Scholar 

  • Alderson DL, Brown GG, Carlyle WM, Wood RK (2011) Solving defender-attacker-defender models for infrastructure defense. Department of Operations Research, Naval Postgraduate School, Monterey, CA

    Google Scholar 

  • Bao S, Xiao N, Lai Z, Zhang H, Kim C (2015) Optimizing watchtower locations for forest fire monitoring using location models. Fire Saf J 71:100–109

    Google Scholar 

  • Bar-Noy A, Rawitz D, Terlecky P (2013) Maximizing barrier coverage lifetime with mobile sensors. In: European symposium on algorithms. Springer, Berlin, pp 97–108

    Google Scholar 

  • BaÅŸdere M, Aras N, Altınel Ä°K, AfÅŸar S (2013) A leader-follower game for the point coverage problem in wireless sensor networks. Eur J Ind Eng 7(5):635–656

    Article  Google Scholar 

  • Bell JE, Griffis SE, Cunningham WA, Eberlan JA (2011) Location optimization of strategic alert sites for homeland defense. Omega 39(2):151–158

    Article  Google Scholar 

  • Berman O, Drezner T, Drezner Z, Wesolowsky GO (2009) A defensive maximal covering problem on a network. Int Trans Oper Res 16(1):69–86

    Article  Google Scholar 

  • Choi Y, Suzuki T (2013) Protection strategies for critical retail facilities: applying interdiction median and maximal covering problems with fortification. J Oper Res Soc Jpn 56(1):38–55

    Article  Google Scholar 

  • Church RL, Scaparra MP (2007) Protecting critical assets: the r-interdiction median problem with fortification. Geogr Anal 39(2):129–146

    Article  Google Scholar 

  • Church RL, Scaparra MP, Middleton RS (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr 94(3):491–502

    Article  Google Scholar 

  • Corley HW, Sha DY (1982) Most vital links and nodes in weighted networks. Oper Res Lett 1(4):157–160

    Article  Google Scholar 

  • Dong L, Xu-Chen L, Xiang-Tao Y, Fei W (2010) A model for allocating protection resources in military logistics distribution system based on maximal covering problem. In 2010 international conference on logistics systems and intelligent management, vol 1. IEEE, Piscataway, NJ, pp. 98–101

    Google Scholar 

  • Farahani RZ, Hassani A, Mousavi SM, Baygi MB (2014) A hybrid artificial bee colony for disruption in a hierarchical maximal covering location problem. Comput Ind Eng 75:129–141

    Article  Google Scholar 

  • Lei TL (2013) Identifying critical facilities in hub-and-spoke networks: a hub interdiction median problem. Geogr Anal 45(2):105–122

    Article  Google Scholar 

  • Mahmoodjanloo M, Parvasi SP, Ramezanian R (2016) A tri-level covering fortification model for facility protection against disturbance in r-interdiction median problem. Comput Ind Eng 102:219–232

    Article  Google Scholar 

  • Maliszewski PJ (2011) Interdiction models and homeland security risks. J Homel Secur Emerg Manag 8(1): Article 4

    Google Scholar 

  • Murray AT, Grubesic T (eds) (2007) Critical infrastructure: reliability and vulnerability. Springer, Berlin

    Google Scholar 

  • Murray AT, Grubesic TH (2013) Fortifying large scale, geospatial networks: implications for supervisory control. In: Laing C, Badii A, Vickers P (eds) Securing critical infrastructures and critical control systems: approaches for threat protection. Information Science Reference, Hershey, pp 224–246

    Google Scholar 

  • O’Hanley JR, Church RL (2011) Designing robust coverage networks to hedge against worst-case facility losses. Eur J Oper Res 209(1):23–36

    Article  Google Scholar 

  • O’Hanley JR, Church RL, Gilless JK (2007a) Locating and protecting critical reserve sites to minimize expected and worst-case losses. Biol Conserv 134(1):130–141

    Article  Google Scholar 

  • O’Hanley JR, Church RL, Gilless JK (2007b) The importance of in situ site loss in nature reserve selection: balancing notions of complementarity and robustness. Biol Conserv 135(2):170–180

    Article  Google Scholar 

  • Pan A (2010) The applications of maximal covering model in typhoon emergency shelter location problem. In 2010 I.E. international conference on industrial engineering and engineering management (IEEM). IEEE, Piscataway, NJ, pp. 1727–1731

    Google Scholar 

  • Parfomak PW (2014) Physical security of the U.S. power grid: high voltage transformer substations, report 7–7500 (R4304), Congressional Research Service, Washington, DC

    Google Scholar 

  • Salmeron J, Wood K, Baldick R (2004) Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst 19(2):905–912

    Article  Google Scholar 

  • Scaparra MP, Church RL (2008) An exact solution approach for the interdiction median problem with fortification. Eur J Oper Res 189(1):76–92

    Article  Google Scholar 

  • Scaparra MP, Church R (2012) Protecting supply systems to mitigate potential disaster: a model to fortify capacitated facilities. Int Reg Sci Rev 35(2):188–210

    Article  Google Scholar 

  • Scaparra MP, Church RL (2015) Location problems under disaster events. In: Saldanha-da-Gama F, Stefan N, Gilbert L (eds) Location science. Springer International Publishing, Cham, pp 623–642

    Google Scholar 

  • Snyder LV, Scaparra MP, Daskin MS, Church RL (2006) Planning for disruptions in supply chain networks. In: Johnson P, Norman B, Secomandi N (eds) Models, methods, and applications for innovative decision making. INFORMS, Baltimore, MD, pp 234–257

    Google Scholar 

  • Swain R (1971) A decomposition algorithm for a class of facility location problems. PhD dissertation, Cornell University, Ithaca, NY

    Google Scholar 

  • Wall Street Journal (2014) Assault on California power station raises alarm for potential for terrorism

    Google Scholar 

  • Wollmer R (1964) Removing arcs from a network. Oper Res 12(6):934–940

    Article  Google Scholar 

  • Zhang Z, Du DZ (2012) Radar placement along banks of river. J Glob Optim 52(4):729–741

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Church, R.L., Murray, A. (2018). Disruption, Protection, and Resilience. In: Location Covering Models. Advances in Spatial Science. Springer, Cham. https://doi.org/10.1007/978-3-319-99846-6_9

Download citation

Publish with us

Policies and ethics