Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Stochastic network interdiction: Mod...
~
Pan, Feng.
Linked to FindBook
Google Book
Amazon
博客來
Stochastic network interdiction: Models and methods.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Stochastic network interdiction: Models and methods./
Author:
Pan, Feng.
Description:
134 p.
Notes:
Source: Dissertation Abstracts International, Volume: 66-07, Section: B, page: 3931.
Contained By:
Dissertation Abstracts International66-07B.
Subject:
Operations Research. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3181693
ISBN:
9780542227820
Stochastic network interdiction: Models and methods.
Pan, Feng.
Stochastic network interdiction: Models and methods.
- 134 p.
Source: Dissertation Abstracts International, Volume: 66-07, Section: B, page: 3931.
Thesis (Ph.D.)--The University of Texas at Austin, 2005.
We develop stochastic network interdiction models and associated solution methods. In its simplest form, our model consists of a smuggler who wishes to traverse a network from an origin to a destination without being detected. Probabilities associated with the indigenous transportation network specify likelihoods that a smuggler can traverse each arc in the network undetected. By installing a detector on an arc we can decrease that probability. The decision-making problem is to select arcs to receive detectors subject to budget and policy constraints. The goal is to minimize the probability that a smuggler evades detection when the smuggler's origin-destination pair is known only through a probability distribution. The model has two stages: first we install detectors then the random origin-destination pair of the smuggler is revealed and the smuggler selects a maximum-reliability path knowing detector locations and detection probabilities. When we consider that detectors can only be installed on the "boundary" of the network, we show that the model can be reduced to an interdiction problem on a simpler bipartite network. In other variants of the model, the smuggler has partial information on detector locations and may have a different perception (than the interdictor) of the detection probabilities. These models are cast as stochastic mixed-integer programs, and the complexity of the models is investigated. Our solution procedure includes scenario reduction, other preprocessing techniques and decomposition methods, all exploiting special structures in our stochastic network interdiction problems. We further enhance our solution procedures by developing a class of valid inequalities to tighten the integer-programming formulation.
ISBN: 9780542227820Subjects--Topical Terms:
626629
Operations Research.
Stochastic network interdiction: Models and methods.
LDR
:03058nmm 2200289 4500
001
1825881
005
20061211073554.5
008
130610s2005 eng d
020
$a
9780542227820
035
$a
(UnM)AAI3181693
035
$a
AAI3181693
040
$a
UnM
$c
UnM
100
1
$a
Pan, Feng.
$3
911735
245
1 0
$a
Stochastic network interdiction: Models and methods.
300
$a
134 p.
500
$a
Source: Dissertation Abstracts International, Volume: 66-07, Section: B, page: 3931.
500
$a
Supervisors: David P. Morton; William S. Charlton.
502
$a
Thesis (Ph.D.)--The University of Texas at Austin, 2005.
520
$a
We develop stochastic network interdiction models and associated solution methods. In its simplest form, our model consists of a smuggler who wishes to traverse a network from an origin to a destination without being detected. Probabilities associated with the indigenous transportation network specify likelihoods that a smuggler can traverse each arc in the network undetected. By installing a detector on an arc we can decrease that probability. The decision-making problem is to select arcs to receive detectors subject to budget and policy constraints. The goal is to minimize the probability that a smuggler evades detection when the smuggler's origin-destination pair is known only through a probability distribution. The model has two stages: first we install detectors then the random origin-destination pair of the smuggler is revealed and the smuggler selects a maximum-reliability path knowing detector locations and detection probabilities. When we consider that detectors can only be installed on the "boundary" of the network, we show that the model can be reduced to an interdiction problem on a simpler bipartite network. In other variants of the model, the smuggler has partial information on detector locations and may have a different perception (than the interdictor) of the detection probabilities. These models are cast as stochastic mixed-integer programs, and the complexity of the models is investigated. Our solution procedure includes scenario reduction, other preprocessing techniques and decomposition methods, all exploiting special structures in our stochastic network interdiction problems. We further enhance our solution procedures by developing a class of valid inequalities to tighten the integer-programming formulation.
520
$a
This work is motivated by the Second Line of Defense (SLD) program, a cooperative effort between the US Department of Energy and the Russian Federation State Customs Committee. SLD's primary goal is to minimize the risk of illicit trafficking of nuclear materials and technologies through detection and deterrence by enhancing border detection capabilities.
590
$a
School code: 0227.
650
4
$a
Operations Research.
$3
626629
690
$a
0796
710
2 0
$a
The University of Texas at Austin.
$3
718984
773
0
$t
Dissertation Abstracts International
$g
66-07B.
790
1 0
$a
Morton, David P.,
$e
advisor
790
1 0
$a
Charlton, William S.,
$e
advisor
790
$a
0227
791
$a
Ph.D.
792
$a
2005
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3181693
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9216744
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login