IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v215y2021ics0951832021004178.html
   My bibliography  Save this article

Defense resource allocation in road dangerous goods transportation network: A Self-Contained Girvan-Newman Algorithm and Mean Variance Model combined approach

Author

Listed:
  • Huang, Wencheng
  • Li, Linqing
  • Liu, Hongyi
  • Zhang, Rui
  • Xu, Minhao

Abstract

A Self-Contained Girvan-Newman Algorithm and Mean Variance Model combined approach is proposed to allocate the defense resource in road dangerous goods transportation network. Firstly, the weighted physical network without direction and its weighted service network with direction are established. The Self-Contained Girvan-Newman Algorithm is applied to separate the whole weighted physical network into several communities. Next, based on the service network, the covariance matrix of each separated community is established, the Mean Variance Model is used to allocate the defense resource for each community, which focuses on selecting the option with the lowest probability of loss caused by the dangerous goods transportation accident/risk. The case study is conducted by using the road network and the dangerous goods transportation volume of Dalian, China as the background. When the whole network is separated into 6 communities, the defense resource capability in the whole network is the best. The Power Function Allocation Model (PFAM) is applied as the comparison approach, the overall rescue capability of the network is defined and applied to evaluate the defense resource allocation schemes. The results show that, the approach proposed in this paper has better effectiveness than PFAM, especially when the whole network is separated into 6 communities.

Suggested Citation

  • Huang, Wencheng & Li, Linqing & Liu, Hongyi & Zhang, Rui & Xu, Minhao, 2021. "Defense resource allocation in road dangerous goods transportation network: A Self-Contained Girvan-Newman Algorithm and Mean Variance Model combined approach," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
  • Handle: RePEc:eee:reensy:v:215:y:2021:i:c:s0951832021004178
    DOI: 10.1016/j.ress.2021.107899
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832021004178
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2021.107899?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Patterson, S.A. & Apostolakis, G.E., 2007. "Identification of critical locations across multiple infrastructures for terrorist actions," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1183-1203.
    2. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
    3. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    4. Huang, Wencheng & Zhou, Bowen & Yu, Yaocheng & Yin, Dezhi, 2021. "Vulnerability analysis of road network for dangerous goods transportation considering intentional attack: Based on Cellular Automata," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    5. Zhen Chen & Jun Zhang & Wen-Bo Du & Oriol Lordan & Jiangjun Tang, 2015. "Optimal Allocation of Node Capacity in Cascade-Robustness Networks," PLOS ONE, Public Library of Science, vol. 10(10), pages 1-12, October.
    6. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    7. Deng, Yu-Jing & Li, Ya-Qian & Qin, Yu-Hua & Dong, Ming-Ru & Liu, Bin, 2020. "Optimal defense resource allocation for attacks in wireless sensor networks based on risk assessment model," Chaos, Solitons & Fractals, Elsevier, vol. 137(C).
    8. Misuri, Alessio & Khakzad, Nima & Reniers, Genserik & Cozzani, Valerio, 2019. "A Bayesian network methodology for optimal security management of critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    9. Zhang, Xuejun & Xu, Guoqiang & Xia, Yongxiang, 2018. "Optimal defense resource allocation in scale-free networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 492(C), pages 2198-2204.
    10. Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Pan, Xing & Dang, Yuheng & Wang, Huixiong & Hong, Dongpao & Li, Yuehong & Deng, Hongxu, 2022. "Resilience model and recovery strategy of transportation network based on travel OD-grid analysis," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    2. Chen, Dingjun & Fang, Xufeng & Li, Yao & Ni, Shaoquan & Zhang, Qingpeng & Sang, Chin Kwai, 2022. "Three-level multimodal transportation network for cross-regional emergency resources dispatch under demand and route reliability," Reliability Engineering and System Safety, Elsevier, vol. 222(C).
    3. Izdebski, Mariusz & Jacyna-Gołda, Ilona & Gołda, Paweł, 2022. "Minimisation of the probability of serious road accidents in the transport of dangerous goods," Reliability Engineering and System Safety, Elsevier, vol. 217(C).
    4. Yongqiang Zhang & Zhuang Hu & Min Zhang & Wenting Ba & Ying Wang, 2022. "Emergency Response Resource Allocation in Sparse Network Using Improved Particle Swarm Optimization," IJERPH, MDPI, vol. 19(16), pages 1-11, August.
    5. Tao, Longlong & Wu, Jie & Ge, Daochuan & Chen, Liwei & Sun, Ming, 2022. "Risk-informed based comprehensive path-planning method for radioactive materials road transportation," Reliability Engineering and System Safety, Elsevier, vol. 219(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Deng, Yu-Jing & Li, Ya-Qian & Qin, Yu-Hua & Dong, Ming-Ru & Liu, Bin, 2020. "Optimal defense resource allocation for attacks in wireless sensor networks based on risk assessment model," Chaos, Solitons & Fractals, Elsevier, vol. 137(C).
    2. Wu, Jiansong & Zhang, Linlin & Bai, Yiping & Reniers, Genserik, 2022. "A safety investment optimization model for power grid enterprises based on System Dynamics and Bayesian network theory," Reliability Engineering and System Safety, Elsevier, vol. 221(C).
    3. David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
    4. Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
    5. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    6. Wu, Taocheng & Wu, Jiajing & You, Wei, 2018. "Optimizing robustness of complex networks with heterogeneous node functions based on the Memetic Algorithm," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 511(C), pages 143-153.
    7. Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
    8. González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
    9. Dong, Mingxin & Zhang, Zhen & Liu, Yi & Zhao, Dong Feng & Meng, Yifei & Shi, Jihao, 2023. "Playing Bayesian Stackelberg game model for optimizing the vulnerability level of security incident system in petrochemical plants," Reliability Engineering and System Safety, Elsevier, vol. 235(C).
    10. César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
    11. Ma, Yajing & Li, Zhanjie & Xie, Xiangpeng & Yue, Dong, 2023. "Adaptive consensus of uncertain switched nonlinear multi-agent systems under sensor deception attacks," Chaos, Solitons & Fractals, Elsevier, vol. 175(P1).
    12. Zhang, Lu & Cui, Li & Chen, Lujie & Dai, Jing & Jin, Ziyi & Wu, Hao, 2023. "A hybrid approach to explore the critical criteria of online supply chain finance to improve supply chain performance," International Journal of Production Economics, Elsevier, vol. 255(C).
    13. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
    14. Johansson, Jonas & Hassel, Henrik, 2010. "An approach for modelling interdependent infrastructures in the context of vulnerability analysis," Reliability Engineering and System Safety, Elsevier, vol. 95(12), pages 1335-1344.
    15. Zhao, Xian & He, Zongda & Wu, Yaguang & Qiu, Qingan, 2022. "Joint optimization of condition-based performance control and maintenance policies for mission-critical systems," Reliability Engineering and System Safety, Elsevier, vol. 226(C).
    16. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    17. Yang, Hanlin & Pu, Cunlai & Wu, Jiexin & Wu, Yanqing & Xia, Yongxiang, 2023. "Enhancing OLSR protocol in VANETs with multi-objective particle swarm optimization," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 614(C).
    18. Mohammad Bagher Abolhasani Jabali & Mohammad Hosein Kazemi, 2017. "Power System Event Ranking Using a New Linear Parameter-Varying Modeling with a Wide Area Measurement System-Based Approach," Energies, MDPI, vol. 10(8), pages 1-14, July.
    19. Jenelius, Erik & Mattsson, Lars-Göran, 2012. "Road network vulnerability analysis of area-covering disruptions: A grid-based approach with case study," Transportation Research Part A: Policy and Practice, Elsevier, vol. 46(5), pages 746-760.
    20. Zio, E., 2009. "Reliability engineering: Old problems and new challenges," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 125-141.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:215:y:2021:i:c:s0951832021004178. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.