語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Stochastic network interdiction: Mod...
~
Pan, Feng.
FindBook
Google Book
Amazon
博客來
Stochastic network interdiction: Models and methods.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Stochastic network interdiction: Models and methods./
作者:
Pan, Feng.
面頁冊數:
134 p.
附註:
Source: Dissertation Abstracts International, Volume: 66-07, Section: B, page: 3931.
Contained By:
Dissertation Abstracts International66-07B.
標題:
Operations Research. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3181693
ISBN:
9780542227820
Stochastic network interdiction: Models and methods.
Pan, Feng.
Stochastic network interdiction: Models and methods.
- 134 p.
Source: Dissertation Abstracts International, Volume: 66-07, Section: B, page: 3931.
Thesis (Ph.D.)--The University of Texas at Austin, 2005.
We develop stochastic network interdiction models and associated solution methods. In its simplest form, our model consists of a smuggler who wishes to traverse a network from an origin to a destination without being detected. Probabilities associated with the indigenous transportation network specify likelihoods that a smuggler can traverse each arc in the network undetected. By installing a detector on an arc we can decrease that probability. The decision-making problem is to select arcs to receive detectors subject to budget and policy constraints. The goal is to minimize the probability that a smuggler evades detection when the smuggler's origin-destination pair is known only through a probability distribution. The model has two stages: first we install detectors then the random origin-destination pair of the smuggler is revealed and the smuggler selects a maximum-reliability path knowing detector locations and detection probabilities. When we consider that detectors can only be installed on the "boundary" of the network, we show that the model can be reduced to an interdiction problem on a simpler bipartite network. In other variants of the model, the smuggler has partial information on detector locations and may have a different perception (than the interdictor) of the detection probabilities. These models are cast as stochastic mixed-integer programs, and the complexity of the models is investigated. Our solution procedure includes scenario reduction, other preprocessing techniques and decomposition methods, all exploiting special structures in our stochastic network interdiction problems. We further enhance our solution procedures by developing a class of valid inequalities to tighten the integer-programming formulation.
ISBN: 9780542227820Subjects--Topical Terms:
626629
Operations Research.
Stochastic network interdiction: Models and methods.
LDR
:03058nmm 2200289 4500
001
1825881
005
20061211073554.5
008
130610s2005 eng d
020
$a
9780542227820
035
$a
(UnM)AAI3181693
035
$a
AAI3181693
040
$a
UnM
$c
UnM
100
1
$a
Pan, Feng.
$3
911735
245
1 0
$a
Stochastic network interdiction: Models and methods.
300
$a
134 p.
500
$a
Source: Dissertation Abstracts International, Volume: 66-07, Section: B, page: 3931.
500
$a
Supervisors: David P. Morton; William S. Charlton.
502
$a
Thesis (Ph.D.)--The University of Texas at Austin, 2005.
520
$a
We develop stochastic network interdiction models and associated solution methods. In its simplest form, our model consists of a smuggler who wishes to traverse a network from an origin to a destination without being detected. Probabilities associated with the indigenous transportation network specify likelihoods that a smuggler can traverse each arc in the network undetected. By installing a detector on an arc we can decrease that probability. The decision-making problem is to select arcs to receive detectors subject to budget and policy constraints. The goal is to minimize the probability that a smuggler evades detection when the smuggler's origin-destination pair is known only through a probability distribution. The model has two stages: first we install detectors then the random origin-destination pair of the smuggler is revealed and the smuggler selects a maximum-reliability path knowing detector locations and detection probabilities. When we consider that detectors can only be installed on the "boundary" of the network, we show that the model can be reduced to an interdiction problem on a simpler bipartite network. In other variants of the model, the smuggler has partial information on detector locations and may have a different perception (than the interdictor) of the detection probabilities. These models are cast as stochastic mixed-integer programs, and the complexity of the models is investigated. Our solution procedure includes scenario reduction, other preprocessing techniques and decomposition methods, all exploiting special structures in our stochastic network interdiction problems. We further enhance our solution procedures by developing a class of valid inequalities to tighten the integer-programming formulation.
520
$a
This work is motivated by the Second Line of Defense (SLD) program, a cooperative effort between the US Department of Energy and the Russian Federation State Customs Committee. SLD's primary goal is to minimize the risk of illicit trafficking of nuclear materials and technologies through detection and deterrence by enhancing border detection capabilities.
590
$a
School code: 0227.
650
4
$a
Operations Research.
$3
626629
690
$a
0796
710
2 0
$a
The University of Texas at Austin.
$3
718984
773
0
$t
Dissertation Abstracts International
$g
66-07B.
790
1 0
$a
Morton, David P.,
$e
advisor
790
1 0
$a
Charlton, William S.,
$e
advisor
790
$a
0227
791
$a
Ph.D.
792
$a
2005
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3181693
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9216744
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入